Monday, December 30, 2019

Dickinson’S Infatuation With Death.Emily Dickinson Is...

Dickinson’s Infatuation with Death Emily Dickinson is well-known due to the fact that she uses an immense amount of death in her poetry; she is also known as being reclusive and death-obsessed. Although other poets don’t typically use large amounts of death in his or her own poetry, Dickinson decided to take her own path in order to get her point across; meanwhile, some found her obsession with death rather disturbing. On the other hand, death could be interpreted through various forms of symbolism. For example, death can symbolize things such as equality, religion, and journeys. Additionally, death can be used to express the loss of a loved one or even an internal loss of yourself, such as despair. Her poems about death†¦show more content†¦She appears to be irritated with the fact that she was labeled as something without having a choice; also, she was â€Å"[b]aptized, before, without the choice. . . [u]nto supremest name† (8,10). In poem 1732, she s tates that her life had already closed twice before it was close, but she is waiting to see if there is a third event ready to happen; however, â€Å"[p]arting is all we know of heaven,/ [a]nd all we need of hell (1,4,7-8). Dickinson mentions in Poem 324 how [s]ome keep the Sabbath going to church†, but she â€Å"keep[s] it, staying at [h]ome†; she talks about â€Å"[s]ome keep[ing] the Sabbath in Surplice. . . [but she] just wear[s her w]ings†, as well (1-2,5-6). She believes â€Å"instead of getting to Heaven, at last -/ [she’s] going, all along†, even without keeping the sabbath at church and without wearing surplice (11-12). Dickinson mentions in Poem 49 about how â€Å"[t]wice. . . [she] stood a beggar/ [b]efore the door of God† (3-4). Dickinson doesn’t necessarily put down religion, however, she doesn’t quite agree with parents who enforce religion upon their children due to the fact that she was once a child raised simil ar to that kind of lifestyle. Dickinson utilizes death in order to describe the stages of life as a journey. By elaborately using

Saturday, December 21, 2019

The Eating Disorder And Anorexia Nervosa - 1555 Words

The eating disorder anorexia nervosa is one of complex nature that is caused and sustained by many interconnected factors of life. Characterized by strict dieting, an unrealistic perception of body image, excessive exercise, depression, and OCD, this disorder has the ability to boycott the lives of many individuals (Pinel, 2014). In order to understand the effects that this disorder has, it is essential to look at the socio-cultural, psychological, and physiological factors this disorder can entail. In addition, gender discrepancy is evident in relation to anorexia nervosa, with females presenting anorexia nervosa more often than males due to the differing â€Å"ideal† body types of both sexes. According to the Statistical Manual of Mental Disorders, Anorexia nervosa (AN) is defined as â€Å"an eating disorder in which people refuse to maintain a minimally required healthy weight for their age and height (body weight less than eighty five percent of expected), have an intense fear of gaining weight and significantly misinterpret their body and shape† (Hasan and Hasan, 2011). Occurring in 0.6% of the population, AN largely affects young adolescent females from a wealthy demographic between the ages 10-30 (Pinel, 2014) (Hasan and Hasan, 2011). These teenage years are distinctive periods of social, psychological, and biological changes. The complexity of the disorder lies in the fact that the cause of it cannot be pinpointed down to a particular reason or event (Lucas, 2004). There areShow MoreRelatedEating Disorder : Anorexia Nervosa1622 Words   |  7 Pages Bulimia Nervosa To be diagnosed with eating disorder, someone must meet certain criteria. The criterion for diagnosis slightly varies depending on if you are referring to people who (A) fear gaining weight, and have significant weight loss,(B) eating a huge amount of food , then use laxative to remove the binged food, (C) the use of excessive exercise and fasting in order to remove or to reduce the amount of calories consumed, and (D) distorted body image, no matter how thin they become, theyRead MoreEating Disorder : Anorexia Nervosa1658 Words   |  7 Pagesbeen affected by this disorder. The specific disorder that is being referred to in this paper, an eating disorder, is Anorexia Nervosa, the restricting type. An eating disorder â€Å"involve[s] disordered eating behaviors and maladaptive ways of controlling body weight† (Nevid, Rathus, Greene, 2014, p. 335). Another well-known eating disorder is Bulimia Nervosa which is characterized by binging and purging (Nevid, Rathus, Greene, 2014, p. 338). Bulimia is different than anorexia since victims of bulimiaRead MoreEating Disorders And Anorexia Nervosa Essay1948 Words   |  8 Pagesnotion of an â€Å"ideal† body and eating disorders, there is no consensus as to the root cause of eating disorders. The general belief is that eating disorders result from one or more biological, behavioral, and social factors including genetics, unpleasant experiences/trauma, peer pressure, teasing, and family members with eating disorders, among others. There are numerous types of eating disorders. Both women and men are affected by eating disorders each day. Eating disorders can occur from an early ageRead MoreEating Disorders : Anorexia Nervosa1493 Words   |  6 PagesIllness Paper – Anorexia Nervosa February 28, 2016 According to the Mayo Clinic (2016), eating disorders are â€Å"conditions related to persistent eating behaviors that negatively impact your health, your emotions, and your ability to function in important areas of life.† One such eating disorder is anorexia nervosa. Not to be confused with anorexia, which is simply a general loss of appetite that can be attributed to many medical ailments, anorexia nervosa is a serious eating disorder and mental illnessRead MoreEating Disorders: Anorexia Nervosa1653 Words   |  7 PagesAnorexia Nervosa Anorexia Nervosa is one of several subtypes descending from feeding and eating disorders. It is a crippling life-threatening condition marked by a patient placing restriction on energy intake relative to needed energy requirements, resulting in a relentless pursuit of low body weight in the context of age, sex, development and physical health. According to American Psychiatric Publishing of diagnostic and statistical manual of mental disorders (DSM-5) â€Å"Anorexia Nervosa, often timesRead MoreEating Disorders And Anorexia Nervosa947 Words   |  4 PagesEating disorders such as anorexia nervosa, bulimia nervosa, and binge eating disorder consist of emotions, attitudes, and behaviors surrounding weight and food issues. Up to 24 million people of all ages and genders suffer from an eating disorder in the U.S (ANAD, n.d.) bulimia nervosa as well as the other eating disorders are considered to be a female eating disorder, a disorder that only affects women which limits males to seek treatment let alone make aware to other that they suffer from bulimiaRead MoreEating Disorders : Anorexia Nervosa974 Words   |  4 PagesI have always been intrigued with eating disorders, particularly Anorexia Nervosa. When I was 18 years of age, my mother questioned whether or not I was Anorexic and she took me to the family practitioner, who then informed me that I was three pounds shy from being considered underweight. I knew I was thin, but I was really thin, but also really proud of my size. In an African American urban environment being thin was related to illness and drug abuse. I was often teased about how thin and fragileRead MoreEating Disorders : Anorexia Nervosa889 Words   |  4 PagesANAD Eating Disorder Statistics about thirty million people in America of all ages and genders suffer from one of the three main eating disorders. Many people suffer from more than one of the eating disorders. Only 1 in 10 individuals receive the treatment that is needed to recover(AND A). Often eating disorders are known to be triggered by outside factors in their life, but studies show that it is more likely to be a part of their genetics. According to Webster the definition of an â€Å"Eating Disorder†Read MoreAnorexia Nervosa- Eating Disorder1685 Words   |  7 PagesEffects of anorexia are mostly seen on the outside of the victim’s body, but do not be fooled. This detrimental eating disorder affects one’s mind just as much as it would the body. What Anorexia does to the mind is that it distorts the way one views their body. Victims of anorexia become fixated on their body image and overly critical about their flaws and weight. Even being obviously underweight, Anorexics will continuously deny that they have a problem and continue with their fatal practices.Read MoreEating Disorders : Anorexia Nervosa1462 Words   |  6 Pagessuffer from many illnesses, one in particular is eating disorders. There are many types of eating disorders, but there are three common ones that are known today, which are anorexia nervosa, bulimia nervosa, and binge-eating disorder. Eating disorders are not healthy, thi s type of disease can be very fatal and crucial to one s health   mentally, physically, and socially. The purpose of this report is to provide background information about eating disorders, strategies to prevent this illness from occurring

Friday, December 13, 2019

Mechanical Engineering Career Paper Free Essays

| Mechanical EngineeringRobert MolinowskiVocollect703 Rodi Road, Pittsburgh, PA, 15235(412) 829-8145| | | | | Pd. 6/7 Career Paper December 15, 2011 Mechanical Engineering According to projected job employment in the year, 2018, mechanical engineering will have an estimated quarter of a million jobs nationwide. This is an increase of roughly 6% between 2008 and 2018. We will write a custom essay sample on Mechanical Engineering Career Paper or any similar topic only for you Order Now As the need for better, more economical necessities, a need for mechanical engineers will always be on the uplift. Many mechanical engineers â€Å"research, design, develop, manufacture, and test tools, engines, machines, and other mechanical devices. (Bureau, 4). This branch, within the engineering field, happens to be the broadest category. Mechanical engineers are seen throughout all aspects of life, from agricultural production to maintenance of engines of cars and machines. With mechanical engineering, most people will be stationed in an office building/manufacturing facility. Others will have the benefit of traveling to job sites to see what their team needs to design for the specific company. A normal, typical work week would consist of working a total of forty hours. This, however, would change if the company was on a tight time schedule to get something produced for someone. Only then will the average mechanical engineer work more than forty hours a week. â€Å"We also spend time working with engineers in manufacturing and design to plan design iterations and product fixes that can be made quickly and cheaply. † (Camenson, 85). Mechanical engineering is, â€Å"†¦very much a â€Å"people-person† job. † (Camenson, 90). Everything written down in logbooks will be subject to engineer scrutiny, and that would look bad on the source’s end. If mechanical engineers were to write/draw something that could take different meanings, for example, an ink blot, this could cause a serious setback in how you go about your future in mechanical engineering. If the offense is serious enough, it could cost someone their job. This shows that you must be careful in how you go about your job in that you don’t know who’s going to see your drawings. Women, in the field of mechanical engineering are at a disadvantage when it comes to comparing men to women. Women are more content to gossiping in the office instead of working on their job. â€Å"Patience is essential. You have to check most of your ego at the door when you walk into a meeting you’ve called, but retain enough leadership skills to keep the meeting focused on its objectives. † (Camenson, 90). This quote accurately describes one of the challenges that women have while working in this field. I can be a witness to this when I went on my job shadow. There were few females working and the ones that did would do little and chit-chat with one another for great lengths of time. When it comes to men, they dominate the field in that they â€Å"outnumber women by a ratio of 3:1† (Bureau, 16). Men can be more communicative with one another during meetings as I witnessed also. Men, as I saw, were more scrutinizing during meetings but they were subtle about it. One thing of advice, â€Å"Learn how to speak in front of a group. It doesn’t matter if the only chance you get is talking to high schoolers about not drinking and driving- that counts, and probably more than giving a lecture on acoustics or materials technology. (Camenson, 94). To sum things up, working in the field of mechanical engineering is highly competitive, be careful what you design, you don’t know who could see it, and that women are at a disadvantage for various reasons when being compared to men in the field. When it comes to mechanical engineering, a detailed course study of engineering and physics is necessary if you are to want to â€Å"make it big† in the field. For just about any field of engineering, especially mechanical, â€Å"a bachelor’s degree in engineering is necessary. † (Bureau, 6). Having flexibility in an engineer’s study program allows him/her to boast a wide variety of fields of engineering for their resume. â€Å"A design course is usually the way to go but having a course study that included mathematics and the physical and life sciences would further benefit the engineer since they’ll be a more defined engineer. † (Bureau, 6). Many colleges offer two or four year degree programs in engineering. For example, Penn State offers what they call a 2+2 program. The program lets the student do his undergraduate studies at any of the branch campuses throughout Pennsylvania for the first two years. After those two years, the student will then be admitted to the main campus in University Park to complete their graduate studies. The main difference between the set of two years is that for the first two years, you’ll be doing your core courses as well as courses designed for your intended major. When you get to the main campus, that’s where you’ll focus primarily on your specific field of engineering with other students from across the state. â€Å"Businesses often look for college graduates who studied through a four year program instead of a two year. † (Bureau, 6). Graduate training is essential if you were to want to earn promotions within a certain company. This training isn’t required for most entry-level jobs. All fifty states and the District of Columbia require that any engineer who offers their services to the public to have a license or they can be fined heavily for it. These licenses are good for up to four years and must be renewed much like a driver’s license. â€Å"Most states accept out of state licensees. † (Bureau, 7). Engineers should be able to work well with others and communicate on a very high level, both orally and in writing. To stay up-to-date with the latest technologies, â€Å"many companies and firms will send their engineers to training as part of the job duties. † (Hutchinson, 4). An employment prospect for mechanical engineering graduates is the highest in any of the engineering fields. â€Å"Federal agencies such as the U. S. Army Corps of Engineers have a large number of mechanical engineers on their staff. † (Hutchinson, 4). â€Å"Over the period of ten years, from 2008 to 2018, employment in the field of engineering is expected to increase roughly eleven. † (Hutchinson, 5). This is good for me in that I will be entering the field within the next ten years, hopefully. With the high demand for new and improved products, the mechanical engineering career won’t see a downfall for quite some time. There is, however, a minor setback in the globalization of engineering. That is, â€Å"With the rise of the Internet, it has become much easier for firms to use mechanical engineers in other parts of the world to do a lot of the engineering work that once done solely by mechanical engineers in this country. † (Hutchinson, 5). This could prove to be a major setback if I would want to work overseas someday. This is something that comes up with just about any profession that I would want to work in. The mechanical engineering field, I know for a fact, took a hard hit during the recent recession. I found this information out from the use of my job shadow. Mechanical engineers are one of the top paid occupations for out-of-college graduates. â€Å"Starting salaries for a beginning mechanical engineer career will find salaries in the mid-range of engineering salaries according to 2009 data provided by the National Association of Colleges and Employers. † (Hutchinson, 5). This kind of a salary is tremendous when compared to other occupations just within engineering itself. With the kind of salary I’ll be making when I become a mechanical engineer, I’ll be able to pay off most of my student loans well before my goal, which is by age thirty. â€Å"Earnings for engineers vary significantly by specialty, industry, and education. With mechanical engineering having the highest salary in the lowest 10% of the job corps. † (Bureau, 13). Having a higher degree, such as a Master’s instead of a Bachelor’s will give you an edge in how you’re paid. Obtaining that higher degree ensures that you have a vast amount of knowledge in that specific field of knowledge. Before the invention of the computer, every design was drawn up by hand and took a much longer amount of time to complete. A vast knowledge in art would’ve been necessary to draw something as elaborate as a headset, for example. When the computer began making its march across the technological community, mechanical engineers went crazy because, they could now do their drawings on the computer instead of drawing it by hand. Now that they had their computers to work on, it was a matter of time before programs began surfacing that would further benefit a mechanical engineer and his drawings. With the invention of the three-dimensional printer, mechanical engineers can now draw their product on the computer program, then take that drawing and have it printed out in 3D to see what it would look like in reality. The 3D printer is good in that you can print out a small scale version of the product and see if it’ll be good enough to withstand various testing. I guess we owe it to Steve Jobs and Mike Wozniak for inventing the first computer. Without them, mechanical engineers might still be doing drawings by hand. â€Å"Mechanical Engineers work closely with several other engineering disciplines such as civil engineering, electrical engineering, and aerospace engineering. † (Hutchinson, 6). This just goes to show how closely related the fields of engineering truly are. In fact, all of the fields of engineering are connected to one another in one way shape or form. When it comes to the auto industry, â€Å"mechanical engineers work closely with automotive engineers. † (Hutchinson, 6). This shows that mechanical engineers work in all different kinds of environments. Other related professions include: aerospace engineering, aeronautical engineering, engineering technicians, computer scientists, physicists and astronomers. † (Hutchinson, 6). This final quote resembles the fact that mechanical engineers work with a wide variety of other professions. It is that a mechanical engineer is a piece that keeps a wide variety of occupations running at tip-top shape. Works Cited Works Cited Bureau of Labor Statistics, U. S. Department of Labor, Occupational Outlook Handbook, 2010-11 Edition, Engineers, on the Internet at http://www. bls. gov/oco/ocos027. htm (visited September 21,2011) Camenson, Blythe. Real People Working in Engineering. Lincolnwood, IL: VGM Career Horizons, 1998. Print. Hutchinson, Jonathon. â€Å"Mechanical Engineering Job Outlook: Employment and Salary Information. † Job Outlook: Employment and Salary. Online Degrees, 2006. Web. 23 Sept. 2011. http://www. onlinedegrees. org/calculator/salary/mechanical-engineers Job Shadowing Job Shadowing I arrived at Vocollect Industries off of Rodi Road in Penn Hills a little after eight in the morning. I was greeted warmly by the man whom I shadowed, Mr. Molinowski. He showed me around his specific floor of which he works on in Vocollect. He ushered me into his office and began discussing what he had planned out for toady. He overviewed what he did within the company itself. He designs products for customers from anything from a microphone to a computer. This could only be possible by the works of a computer program called, Pro-Engineer. Pro-E, as engineers call it, can turn any two-dimensional drawing into a three-dimensional drawing were the designer can be as detailed with the drawing as he wants to. In this industry, it’s bad if there is little detail so, lots of detail is key to producing the best product. After the overview of his job and the day’s events, Robert then showed me around the labs they use to test the integrity of their products, not as a whole, but rather is little individual parts. There were many labs of which I got to personally see myself. Most of the labs had computer simulations of testing the integrity of the product in various ways. For example, the product of which was being tested was their new edition of a headset and a terminal electrical power station. This headset and terminal combination is going to be used in the manufacturing industry over in China. The different labs tested for how long a certain feature of either the headset or terminal would function properly for before it failed (broke). Other labs included applying extreme heat and cold onto the parts. The lab that caught my eye the most was the one that counted the number of times until a cord that’s connected to the terminal broke through the entire cord. When I first saw the count, in the morning, it was a mere 31,586. I asked if I could check it again before I left and when I checked it for the second time in the afternoon, the count was up to 123,874. I asked Mr. Molinowski if the second number was high because, I would think that the second count wouldn’t last much longer before it broke. He answered that this test usually goes up in excess of half a million times before it breaks apart. They do the tests to simulate the usage on the part for a five year period. This reminded me of when I learned of the various tests a car goes through before it hits the road. The test has to simulate the entire life of a car, much like they were testing for the entire life of the specific part of the headset or the terminal. After we toured all throughout the labs, we settled back in his office so he could show me his Pro-E drawings he had for the headset. Someone other than him was in charge of drawing the terminal. I asked him how long it took him to make such a detailed sketch of the headset. He said that this design took him a little over two hundred days to complete because he had to design all the small components that make up the headset, then he had to assemble them all together. By this time it was now time for a brief meeting about the upcoming month of December with the customer before the big, weekly, two-hour long meeting. The brief meeting was only a half hour but, a lot of stuff was said and discussed. They had the customer on the phone so he could put in his voice in the meeting. In this meeting, something major was brought up. Since, in Chinese culture, they give the entire country the last two weeks of our American calendar year off for the Chinese New Year’s, a time constraint was evident because nothing would be able to get done from December 23-January 1. What made matters worse is that the customer would be out of his office three days earlier, December 20. Thus essentially putting the project on hold until the New Year. With only twenty-seven days remaining until the customer shuts down for the year, things at Vollect will be very hectic. Now it was time for the long meeting, which I was already warned of at the beginning of the day. I was introduced and welcomed warmly by Bob’s fellow employees. Bob and his boss, Rich, presented to the other designers on the project design team. For two hours, they deliberated over how they could improve on the present drawing by going over every square inch of the drawing. After the meeting it was time for lunch. After we got back from lunch, Bob let me try out the Pro-E program on his computer. With my knowledge of the program from my CAD class, Pro-E came naturally to me. I told him about how in the CAD class we are designing a model replica of the old Civic Arena. He asked if I had any drawings made in Pro-E and I said, â€Å"No. Just a program called AutoCAD. † He offered his assistance and we both began working on a design for the Civic Arena. It wasn’t difficult for him to design it since he’s had so much experience with the program and that’s pretty much all he does most of the day. The only part that proved to be difficult was that every five minutes or so the program would crash without us saving the drawing. We learned that after the fifth time of crashing that we should start saving our drawing after every little thing we do. After roughly two and a half hours of messing around with the program and drawing, we had ourselves a not-to-scale model of the Civic Arena. This helped me out greatly because now I can take what I learned from Bob about the Pro-E program back to the CAD class and draw up the scale model of the Civic Arena. Interview QA Interview QA 1. What influenced you to become a mechanical engineer? What influenced me the most was that I wanted to be a guy who designs things for people and I could go to the store and say that, â€Å"I designed that! † 2. Was mechanical engineering your first choice as a major or was it a second option? Mechanical engineering was, in fact, my first choice of major. Right from my junior year in high school I was destined to be a mechanical engineer. 3. What sub-topic of mechanical engineering do you prefer the most? Why? I like all details of my job. I specifically like when I can put all the components of a product together in the Pro-E program. . What can a person like you contribute to a company such as Vocollect? I am pretty much the person who puts all of the parts together so the company and the customer can view what they want. I pretty much make the final drawing of the product and my boss puts his input in and I make changes. The final drawing then gets sent to the customer for a pproval and then we manufacture the product. So I am a pretty big factor in the company. 5. How would you approach a problem/set back that this field would present to you? Most of the problems that I have are with the computer program. It will always crash and close before I get the chance to save my work. I call tech support but whatever they do never works. Another problem that I may encounter would be when my co-workers/boss have revisions for a certain part of a product drawing. We have a meeting specifically for this. We go through every square inch of the drawing and everyone says what they think they’d do to improve on the drawing. I take notes on their improvements and then after the meetings I go back to my office and revise the drawing to suit their needs. 6. Is this your ideal/dream job? If not, what would it be? My ideal/dream job would have to be the president of the United States. I always wanted to have such immense power. I wanted to become president until I found out that they don’t get paid an entirely large amount of money. And that my public speaking skills aren’t that great so, I would not do well in getting the American people to vote for me. The job I have now is my true job. It’s where I am destined to be, in my opinion. I’ve come to know some really great people from working at Vocollect. 7. What are your short-term and long-term goals as an employee of Vocollect? My short-term goals is hoping that the Chinese company were designing this headset for will be pleased with the design. Once they approve of the drawings, it’ll feel like a weight has been lifted off my shoulders. I’ve been working on this project for almost a year now. It’s sort of a bittersweet moment that the project is almost over, in my area of expertise. As for any long-term goals, I have none yet at the moment. When I get my next design project, my goal will to get the designs done within the given amount of time. 8. Where do you see yourself in five years’ time? In five years, I see myself sitting in this same seat. I have no plans for moving up in the company ladder. I’m perfectly content with where I’m at now. 9. If you were needed to relocate across the country, Oregon, would you accept the offer? Why or why not? Even though this hasn’t been a something on my mind, yet (knock on wood), I believe that I would not take the opportunity for the fact that I would have to give up my friends and family for my job. You can always find another job, but you can’t find another best friend. Even if it was for a significant increase in my pay, I would not take the offer. 10. How did your schooling in college prepare you to be a mechanical engineer for Vocollect? My schooling prepared me immensely for my involvement at Vocollect industries. I took two years of undergrad work at the University of Pennsylvania. I then moved up to the main campus of the school to complete my work to earn my bachelor of engineering degree. I am now in pursuit of gaining my masters in order to receive to a bonus in my paycheck. With the amount of schooling I have, I am fairly confident that I’ll be able to do wondrous things for Vocollect. 11. What comes to mind when you think of the word, â€Å"success†? When I think of success, I think of myself being content with my life, i. e. health, financial, etc. Success also means that I’m happy with where I’m at in life. I’m very healthy, I’m financially stable, I have friends who love me dearly. I think that I’m pretty successful in my life, according to my definition. I’m sure if you ask anyone else, they would give you a completely different answer. 12. What kind of outside experiences aided to your success in mechanical engineering? There’s only one notable outside experience that has aided to my success and that’s how I handle with criticism from my co-workers. I slowly came to accepting their criticism after my first project with Vocollect. 13. If you weren’t a mechanical engineer, what other profession would you seek? Why? If I wasn’t a mechanical engineer, I would want to be someone who would work for PennDOT, and that would be a civil engineer. I would want to work for PennDOT mainly because they make so much money and I’m a guy who likes to have money. 14. What would you consider to be your most influential accomplishment? My most influential accomplishment would have to be the day of which I graduated from college. This was a big day for me in that I came to the realization that I can now become a true mechanical engineer. All of my hard work and hours of study has finally paid off. 15. What positions within Vocollect are you hoping to reach or are you content with the position that you’re at now? With the current position I am at now, I am happy with where I’m at. I don’t see myself progressing up the job title chart. If I was to get a promotion, I would have to move to a different part of the office and have to leave my friends who I’ve grown within the company. I don’t think I’m ready for that kind of a change yet. 16. What would be some adjectives that would describe you? Some adjectives to describe me would be: creative, innovative, accepting, and courageous. I think of myself as creative because I have to be able to compile a three-dimensional drawing to present to my bosses. I’m innovative in that I can take an existing product on the market and make changes to it to make it better. I’m accepting in that I can accept people’s (my bosses) criticism and not get overly worked about it. I think of myself as being courageous in that I can take â€Å"leaps of faith† in my drawings depending on the product we’re designing, I’ll try to implement some of my own ideas into the drawing. 17. When on the job hunt, what kind of factors played a role in selecting the right company? In making my decision to work at Vocollect, I thought of mainly two deciding factors. The first one being the amount of money that I’ll be making on an annual basis. I used this factor because I don’t want to be working an insane amount of hours and not getting paid generously for it. With Vocollect, I’m able to make enough money to support myself and I can still have some extra money to do whatever I want to. The other factor in choosing Vocollect was close proximity to my house. Vocollect is less than fifteen minutes from my house. This makes it easy on me for when it comes to fueling my car. This helped very much during the recession a few years back. I saved loads of money just by having only a less than ten mile commute to work. 18. Have you had any previous jobs before this one? If so, what was/were it/they and what made you leave that job? Before finally settling down at working with Vocollect, I worked at Kennywood Park to help me pay my way through college. I left my duties at Kennywood to pursue my career as a mechanical engineer. Working at Kennywood helped me in that how I deal with working with a group of people to do a common job. 19. What was your least favorite and favorite subject(s) while in school? Why? My favorite subject while going through school would have to be my history classes. I liked history because, if it wasn’t for the past, we wouldn’t be here in the present. We need the past to occur, both mistakes and heroics, which shaped our present. My least favorite subject during my high school career would have to be my math classes. I never liked working with variables and problems that took more than ten minutes to do or an entire page to do. I also didn’t like my English classes. It was a difficulty for me to understand what I was reading for just about every story we read. 20. What went into your decision making process when prompted the question, â€Å"What do you want to be when you grow up? † When I first heard of this question, when I was 10, I wanted to be a professional baseball player since I played baseball. As I grew up it slowly developed to working with machines. Then, finally, it became that I wanted to be an engineer. I went after the fact that I wanted to be a mechanical engineer to find a job to get me through high school and college. I was lucky enough to land me a job at Kennywood Park my junior year in high school. I worked there through the rest of high school and throughout my four years of college. Lucky for me, working at Kennywood helped me in understanding how a complex machine, such as a roller coaster, works and functions under such intense forces. 21. What role does technology play in mechanical engineering? Technology plays an important role in mechanical engineering for various reasons. For what I do, without the use of technology, I would have to draw all of my designs by hand which would be a pain in the backside because; my art skills aren’t that great and no one would be able to understand what I draw. With technology, I’m able to take my three-dimensional drawing in the Pro-E program and take it down to a three-dimensional printer and create a prototype of the product to see my drawing in reality instead of through a computer screen. I’ll admit that there are times that I wish I would free-hand my drawings instead of on the computer (whenever the program crashes). And there are times were I just lose track of time by drawing on the computer. Conclusion Conclusion With the combination of job shadowing and researching what goes on in the mechanical engineering field, I can say that I am pleased with what I will be able to do in my near future. After job shadowing a true mechanical engineer to get a feel of what I will be doing, I can honestly say that I can see myself being a mechanical engineer. After doing much intensive research, my amount of salary on an annual basis will be sufficient in repaying my student loans before I turn thirty, my primary objective once I get out of college. I feel that being a mechanical engineer could be really interesting since I get to render two-dimensional objects and envision them in the third-dimension. I did, believe it or not, think about a different job, but I’m hoping I don’t have to go to that resort. I only thought about this for a roughly short amount of time. I thought about how I could possibly be a structural engineer. This, I think, will act as my fallback option in case if I don’t make in the mechanical engineering field. At first, I wanted to be a structural engineer, believe it or not, but then I did some of my own separate research and found out that there aren’t too many job openings that are within fifty miles of Pittsburgh. Then, with that job plan on the â€Å"back burner†, I decided that I wanted to be the next best thing, a mechanical engineer. As I did some of my own research about mechanical engineering to find that there are several job openings that are within a twenty mile radius of the city of Pittsburgh. After doing this research, I immediately turned my attention to becoming a mechanical engineer and seeing which colleges would offer me the opportunity to get a degree in mechanical engineering. I feel that I could provide the mechanical engineering world with great knowledge of usage of technology that goes into mechanical engineering. ? Career Plan Career Plan Starting with right after graduation, my parents and family are rewarding my twelve years of hard work by accompanying me on a trip to Disney in Orlando, Florida. When I get back home, I will be on the job hunt to hopefully pay for some of my college tuition. During the summer, I hope to find an internship at some company that would further enhance my knowledge of mechanical engineering even before I go to college. Some obstacles that will probably keep my ego down would be the fact that I get bored too easily with one thing. I will have to overcome this obstacle if I want to become a mechanical engineer since most of their day involves someone sitting at a computer all day. I hope that this weakness of mine won’t play a negative role in my future. For example, I wouldn’t want my short attention span to make me change my choice of a major because I got bored with what I was doing. If it happens, it happens. You can’t mess around with what fate has to say about your life choices. I think the most training I would get to become a mechanical engineer would be from a college of engineering. Since that school would specifically be focused on engineering. After this said training in college, I hope to be able to jump right into a job that will have a good salary. As long as I’m a mechanical engineer, it doesn’t matter what the pay is. What matters is that I’ll be satisfied with myself of where I came thus far. I also hope that with a modest salary, I’ll hopefully be able to pay off any student loans of which I may acquire during my time in college. In conclusion, I’ll be happy with whatever company I work for as long as I’m long as I get to do something that involves mechanical engineering. Article â€Å"A† Summary Patrick Rogers’ article, â€Å"Vertical Leap† is an interesting article about the evolution of mechanical engineering through an example that is used in our everyday lives, an elevator. The elevator as we know today wasn’t invented until 1852 by an Elisha Graves Otis. Today’s elevators now come in all sizes and shapes to suit our everyday needs, to give a perspective as to where this engineering feat has gone in the past 150 years. The whole idea of a skyscraper is linked to the elevator itself because, no one would want to climb up fifty flights of stairs to get to their offices day in and day out. Elevators have been used upon many occasions by many notable monarchs over the course of history. For example, Louis XV had an elevator constructed at his palace in Versailles to whisk him around to all sorts of the castle because the castle was of enormous size. As the evolution of machines progressed, the use of â€Å"muscle power† was being drawn out after being used since the Industrial Revolution. Otis displayed the elevator invention to the world at America’s first world’s fair in New York in 1854. Everyone who saw the exhibit was in awe of its sleek design. The invention of the elevator almost didn’t happen because, Otis was in financial ruins and thought about leaving New York to go west to the Gold Rush in hopes that he would get rich off that. Otis’ exhibit displayed him on the platform of one of his steam-driven hoist and slowly began to rise above the crowd, awing them all. When Otis died in 1861, he left his heirs in financial debt but, he left his schematics of an elevator that was constructed so that if the rope breaks from the platform, it cannot freefall to the ground. A new man to the scene by the name of, Otis Tufts (no relation to previous Otis), developed upon Otis’ previous ideas to create an elevator that was roomy enough to carry up to a dozen guests. Reliable steam lifts soon adorned the lobbies of hotels throughout much of the U. S. and thus, the elevator had become a new material item in which business-owners could employ in their stores to move people throughout their store more efficiently. It wasn’t until 1870 that the thought of a silent elevator had begun to surface. Prior to 1870, elevators were powered by large steam pistons and pulleys which were loud and annoying for tenants of apartments of lived on the lower levels of the building. Especially dramatic was the transformations of major cities throughout the country. Many cities began construction on skyscrapers, capable of using elevators. The construction of the Otis elevator can still be viewed, not in a building, but in a home in North Carolina. This shows that Otis’ designs were able to withstand the test of time. In the 1800s, the thought of using panoramic views as a mean of romance wasn’t thought of. The Golden Age of elevators didn’t occur until the 20th century, when the world was beginning to look ahead to the future. In 1903, Otis introduced a gearless traction elevator, a quantum leap for the time. With this new elevator contraption, the secret to building true skyscrapers was defined, by eliminating the need for the cumbersome winding drums. During the Jazz Age, elevator design seemed to pulsate with the energy of the time period. The next big improvement of the elevator came when people figured out how to manage the flow of people on and off of elevators. These people, known as operators, became a popular breed of people. Improvements in technology of the elevator came during World War II by a team of Otis aiding Westinghouse, Cmp. Otis’ work could be compared to that of Henry Ford in the automobile industry. Every so often, Otis et al would try and come up with ways to improve on the previous design of the elevator. Sort of like how Apple does with their iOS devices. Today, cranes hoist the metal gears into place and construction workers assemble the shaft on the job site. The cost of a full elevator system could run you about in excess of fifteen million dollars. Article â€Å"B† Summary James Lissaint’s article, entitled, â€Å"Mechanical Engineering and Why We Need It† encompasses the true value of mecahnical engineering and the progression of the field. He also describes how the field will be able to grow in the future, as long as there is an interest for it. Mechanical engineering, when talking about it, is a very broad topic. There are many subdivisions within the field itself. Mecahnical engineering is vital in the construction of large structures (i. e. skyscrapers, bridges, etc. ) as well as new-age gadgets. This form of engineering can be dated back to ancient Greek, with their invention of the steam engine. It came to the center of discussion and modern society during the Industrial Revolution. Since its beginning, this field has undergone numerous enhancements thanks in part to the advancements in modern technology. With the help of high school physics, a small understanding of mechanical engineering basics will be known in the form of kinematics and mechanics. Mechanical engineering looks at engines in several different, yet efficient, ways. For starters, the steam engine helped to develop the world into a modern society. The idea that the steam engine could be used in motor vehicles really helped the development of transportation systems. Since then, a wide variety of engines have been produced, with diesel and petrol being the most common forms of an engine. It’s essential to know that mechanical engineering is a very broad field with many different subfields that interconnect with one another. Modern society has progressed with topics such as robotics, thermodynamics, and kinematics. The most technical field of mechanical engineering is robotics. These robots, neither human nor animals, are used in a number of practical applications throughout the manufacturingn industry. Lots of companies look for the involvemnt of robots to aide in their assembly line to quicken their production speed to gain a higher profit. Mechanical engineering plays a major role in how, and if, the robot will be able to function properly. June 24, 2016 Sean Robertson Engineer Aerotek CE 15200 Santa Fe Trail Drive, Suite 100 Lenexa, KS, 66219 Dear Mr. Robertson, Having done an internship for your company for the past two years, I believe that my involvement in your company would be a positive thing. Once I heard that there would be a job opening at the time of my completion of my internship, I immediately started to think out my options for the future. With my internship nearly complete, it is time that I look for a full-time job and this was the first company I thought of working for. Through my schooling at Temple University, I feel that I would be an excellent addition to Aerotek as an engineer. Temple was able to provide me with the necessary knowledge to further my interest in engineering. With a â€Å"big-name† company like Aerotek, I thought it would be rather fascinating to work for your company. And with my experience with all the design programs, I believe I could be a key asset for Aerotek’s future in the engineering world. I believe that I would be the best fit for the position because; when I was young I knew that I wanted to be a structural engineer. I was destined to be one, per say. While I was in high school, I worked for Kennywood Park in West Mifflin, Pennsylvania as a ride operator. My duties included making sure the park’s several roller coasters were structurally safe for the days Anschluss of people and forces being applied to it. A major accomplishment of mine would be that in my entire two years of working there, none of the rides I inspected the morning before the park opened, never broke down. This won me an award known as the Most Reliable Worker. I won this both years I worked there. I would be ecstatic if I was selected to hold this position at Aerotek. The best time frame to reach me for a personal interview is when I’m off for holiday break, December 12 thru January 6. I hope that we’ll be meeting in the near future. Sincerely, Objective: A mechanical engineer were my experience in 3-D CAD, GDT design, and a solid edge modeling experience would be sufficiently tested. Strengths: * Excellent use of a three-dimensional CAD. * Ability to work under strict time constraints * Ability to work in Excel to provide accurate budgets for each project * Works more efficiently under stressful conditions Ability to keep up with improvements in technology in the ever-growing field Honors: * Product launch: newer headset for manufacturing industry * Article publication: â€Å"Engineers of Today† * High honors, Penn State University School of engineering * Internship: Vocollect industries Employment: Internship: Mechanical Engineering, 2012-Present Vocollect Industries, Penn Hills, Pennsylvania. Aided in drafting various produ cts for customers around the world. Gave in my words of advice during meetings about each product drawing. Brought more business to the company by my propaganda skills. Ride Operator: 2009-2012 Kennywood Park, West Mifflin, Pennsylvania- observed and repaired roller coaster and thrill rides throughout the park on a daily basis from early May to late September; working at least 10-hour shifts daily during the summer months. Rides were at peak performance whenever I was on the clock. Education: June 2016: School of Engineering, University of Pennsylvania, State College, Pennsylvania B. A. in Mechanical Engineering Specialization: 3D CAD program Bibliography Bibliography Aerotek. Advertisement. Structural Engineer Job in Overland Park. Aertek. Monster. com, 31 Aug. 2011. Web. 21 Sept. 2011. http://jobview. monster. com/Structural-Engineer-Job=Overland-Park-KS-102559902. aspx. Bureau of Labor Statistics, U. S. Department of Labor, Occupational Outlook Handbook, 2010-11 Edition, Engineers, on the Internet at http://www. bls. gov/oco/ocos027. htm (visited September 21,2011) Camenson, Blythe. Real People Working in Engineering. Lincolnwood, IL: VGM Career Horizons, 1998. Print. Dick, Chris J. â€Å"Job Shadowing. † Personal interview. 23 Nov. 2011. Hutchinson, Jonathon. â€Å"Mechanical Engineering Job Outlook: Employment and Salary Information. † Job Outlook: Employment and Salary. Online Degrees, 2006. Web. 23 Sept. 2011. http://www. onlinedegrees. org/calculator/salary/mechanical-engineers Lissaint, James. â€Å"Mechanical Engineering and Why We Need It. † gEzine Articles, 2011. Web. 4 Nov. 2011. http://ezinearticles. com/? Mechanical-Engineering-And-Why-We-Need-Itid=6658188. Rogers, Patrick. â€Å"Vertical Leap. † Preservation. May/June 1998: 52-61. SIRS Renaissance. Web. 23 Sept. 2011. Vocollect. Advertisement. Mechanical Engineer-Design Engineer-Engineer. Monster. com, 21 Sept. 2011. Web. 21 Sept. 2011. http://jobview. monster. com/Mechanical-Engineer-Job-Pittsburgh-PA-102601518. aspx. How to cite Mechanical Engineering Career Paper, Papers

Thursday, December 5, 2019

Computing Paradigm Scenarios And Security - Myassignmenthelp.Com

Question: Discuss about the Computing Paradigm Scenarios And Security. Answer: Introduction Networking is a design and use of network, which includes the selection and use of telecommunication protocol including the use of cabling, switches and routers for managing the network. Networking refers to the exchange of information and resource sharing among the different devices connected over a particular network. Therefore, ensuring proper security in networking is to be ensured in order to prevent the unauthorized access of the information and computer resources. This is necessary because generally, a business connects all their systems and computers over a common network, and security issue in a single device can affect the entire system or put the system into risk. The report discusses the different security issues associated with the networking and the different improvements in the networking system over the years [3]. Background and related Areas The security issue in networking can arise from vulnerability present in the security system that is exploited by a security risk or threat. The different security issue that may arise in networking includes, security breaches, loss of data along with the threat of malicious attacks. Therefore, ensuring proper measures is essential in order to reduce the vulnerability of the network. Over the years, different researches have been conducted in this field to avoid these network security threats. This includes, use of different security devices, firewalls and antivirus software in the network and devices, to detect and prevent the malicious use and unauthorized access of information from the system. Other security measures that can be taken in order to prevent the unauthorized access to the confidential data stored over a particular network includes encryption of systems data in order to prevent any unauthorized access [2]. In order to eliminate the security issues of the system, the use of VPN or virtual private network is widespread across the organization. This is because the virtual private network helps in creating a secure link for protecting the information exchange over a particular network. It prevents anyone from accessing and modifying any information while it is being transferred across the channel [1]. There are different cause of network security problems, which includes the technology weakness, policy weakness and the configuration weakness [5]. The use of technology in every business operation is widespread and therefore, some unknown inherent weakness and vulnerabilities in a network can sufficiently act as a huge threat in a particular network. Similarly, lack of proper policy management in a network leads to security threats in a network. This includes lack of a proper disaster recovery plan, lack of policy for changes in hardware and software of system along with the lack of proper security monitoring. Security Issues in Networking Every networking device is subjected to different threats that require implementation of proper preventive measures for detecting and eliminating these vulnerabilities from the system. The different security issues associated with networking are as follows- Hacking into a network is one of the primary security issues associated with networking. Hacking refers to the unauthorized use of data and servers. This can be prevented by use of proper intrusion detection system in the network. Denial of Service attack is less harmful yet one of the most common security issues in networking. There had been a considerable increase in the rate of DoS and DDoS (Distributed Denial of service attack) in different networks over the years [4]. In this attack, the attacker floods the servers that overwhelm the victim resources making it impossible for the legitimate users in accessing the system. This might further result in a system crash, thereby stopping the entire operation of the network [6]. It has been observed over the years that the different security issues in the network arise from the misconfiguration of the systems and servers and not by any vulnerability. Misconfiguration of the servers results in the firewall breaches that lead to the loss of data and data theft. Botnet is another major issue that is observed on networking security. A lot of improvement are needed in this area in order to prevent the accordance of such attacks [7]. A botnet is a system that is been hacked by an attacker in order to forward viruses and spams to the computers that are connected over a common network [9]. Shared computer over a particular network is a threat as a number of people can access these systems. Another major security attack in networking is the password attack, where the hackers are able to determine the password of a network and can able to access it without the knowledge of the owner. This is very difficult to prevent, as many hacking software is used in order to access the password and therefore, it is one the major security issues in networking. Technical Specifications Vulnerabilities in Configuration is one of the major causes of the networking security issues and therefore, proper configuration of the firewall in a system or a network is essential in order to prevent it. The steps involving proper configuration of the system are illustrated below- All the ports of the server that are not in use should be blocked, as this will prevent the opening of the unwanted ports to launch an attack. The configuration of the server of a network should be in accordance to an average hit rate. This is because if the attacker can access the main server, it can degrade the performance of the network by sending unwanted spam and emails. The VPN implementation for disaster recovery should include the proper encryption methods [9]. The wireless networking system if implemented in a network should be subjected to proper authentication method preferably WPA2 as WEP is more prone to attacks [8]. Advantages and Disadvantages There are various advantages and disadvantages of evaluating the different security issues in networking. It helps in understanding and identifying the different vulnerabilities present in a network. Knowledge about the security issues in a network is essential for mitigating the risks associated with the system. Different researches over the years have considerably helped in unveiling the different security issues associated with networking and introduction of different risk mitigation approaches that can be implemented in order to eliminate the problem. One of the major disadvantages is that improper use of different risk mitigation approaches might have a negative effect in the networking system, leading to the risk of misconfiguration security issue. Improvements in security in networking over the years Over the years, the networking security issues have increased by many folds, however, there is a considerable advancement in breach detection tools such as, improve in security and event-monitoring system. The use of multifactor authentication and encryption has considerably helped in increasing the security of the system. The security assessment tools are emerging over the years that are able to detect the network vulnerability thus reducing the occurrence of network security attack [11]. Conclusion Therefore, from the above discussion, it can be concluded that there are certain network security issues that are associated with networking, which includes the hacking, botnet attack, DDos attack and so on. This can be prevented by proper system configuration and use of proper intrusion detection systems. Proper configuration of the hardware and software is necessary for detecting any present threat in the network and eliminate the threats. A lot of improvements in the field of networking has been observed over the years and thus at present, it becomes possible to detect the a threat present in the system. References [1] Stojmenovic, Ivan, and Sheng Wen. "The fog computing paradigm: Scenarios and security issues." InComputer Science and Information Systems (FedCSIS), 2014 Federated Conference on, pp. 1-8. IEEE, 2014. [2] Stolfo, Salvatore J., Malek Ben Salem, and Angelos D. Keromytis. "Fog computing: Mitigating insider data theft attacks in the cloud." InSecurity and Privacy Workshops (SPW), 2012 IEEE Symposium on, pp. 125-128. IEEE, 2012. [3] Jung, Taeho, Xiang-Yang Li, Zhiguo Wan, and Meng Wan. "Privacy preserving cloud data access with multi-authorities." InINFOCOM, 2013 Proceedings IEEE, pp. 2625-2633. IEEE, 2013. [4] Zhang, Heng, Peng Cheng, Ling Shi, and Jiming Chen. "Optimal DoS attack scheduling in wireless networked control system."IEEE Transactions on Control Systems Technology24, no. 3 . 2016: 843-852. [5] Shin, Seungwon, and Gu. Guofei, "Attacking software-defined networks: A first feasibility study." InProceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 165-166. ACM, 2013. [6] Bogdanoski, Mitko, Tomislav Shuminoski, and Aleksandar Risteski. "Analysis of the SYN flood DoS attack."International Journal of Computer Network and Information Security5, no. 8. 2013: 1. [7] Zhao, David, Issa Traore, Bassam Sayed, Wei Lu, Sherif Saad, Ali Ghorbani, and Dan Garant. "Botnet detection based on traffic behavior analysis and flow intervals."Computers Security39. 2013: 2-16. [8] Ambavkar, S. Pranav, U. Pranit, B. Patil, B. Meshram, and Pamu Kumar Swamy. "WPA exploitation in the world of wireless network."Int J Adv Res Comput Eng Technol1, no. 4. 2012: 609-618. [9] Lim, Sharon, J. Ha, H. Kim, Y. Kim, and S. Yang. "A SDN-oriented DDoS blocking scheme for botnet-based attacks." InUbiquitous and Future Networks (ICUFN), 2014 Sixth International Conf on, pp. 63-68. IEEE, 2014. [10] F. Ahmed, Z. U. Butt, and U. A. Siddiqui. "MPLS based VPN Implementation in a Corporate Environment."Journal of Information Technology Software Engineering6, no. 5. 2016: 1-7. [11] Eldardiry, Hoda, Evgeniy Bart, Juan Liu, John Hanley, Bob Price, and Oliver Brdiczka. "Multi-domain information fusion for insider threat detection." InSecurity and Privacy Workshops (SPW), 2013 IEEE, pp. 45-51. IEEE, 2013.

Thursday, November 28, 2019

Life in Silence free essay sample

Nothing in the room moved. I looked up, stared at my friends, and looked back down at my knees. In a matter of seconds something in the room had changed. We had gone from laughing and joking to sitting in complete and utter silence. I looked up again. A quick furtive glance and then it was back to my knees. Two of my friends sat talking quietly to each other. They stopped, paused, and with surprising ease, broke the silence with â€Å"Hey, take my iPod. I really want to hear†¦Ã¢â‚¬  but were cut off before the end of the sentence. The response that bounced back was â€Å"Shhh, I want to hear the rest of this song first.† Song? I thought to myself. What song? The silence that draped over us was music, but how could it be? All it was was, well, silence. For a short time no one moved again. We will write a custom essay sample on Life in Silence or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page And then the room’s atmosphere changed and swirled around me once again. Someone mindlessly grabbed the cord hanging from the stereo, plugged in their mp3 player, and pushed play. Secluded in the silence of my thoughts, I made myself comfortable on couch I was sitting on, leaned back, and started to think. I thought back to when I used to play the cello and asked my instructor why there were rest notes in the piece were learning. At the time, only the first half of her response resonated with me. She told me rest notes were there so I could take a break and then jump back into the music. That made sense to me. My fingers were tired and I could have used a break. But she was not finished talking. She went on to tell me that the silence was just as musical as the rest of the piece. She told me that I should play the rest notes with as much energy and vigor as I would any other note. At the time, I shrugged off her words as I pushed my eight-year-old frame as far away from my cello as my seat would allow me. I had forgotten my conversation with my cello instructor until that moment and, once I remembered, was mystified. The song we were listening to, which I later found out was entitled â€Å"Two Minutes of Silence,† had been comprised entirely of notes. John Lennon had made a conscious choice to eliminate all sound from the piece of music. He was making a point. Too often my life has been filled silence with unnecessary sound. Given the commotion and bustle of daily life, there are times in which I forget to slow down and think. We must rest but we must not cease thinking. As I leaned back in my seat on the couch, I learned to sit back and start to rationalize the flurry of notes that came before. It is during these moments that thoughts crystallize and become clear.

Monday, November 25, 2019

Virtual Private Network

Virtual Private Network Virtual Private Network Introduction The sharing of information amongst departments within corporations has become an integral part of ensuring efficiency and decision making hence yielding in productivity. In order to bolster the communication channel within our corporation, it becomes necessary to adopt new technology such as the Virtual Private Network (VPN). The VPN can be defined as a private network that operates through the use of a public network such as the Internet in order to connect multiple locations, which are remote. The VPN facilitates interconnectivity of networks over long distances and, therefore, forms a wide network area (Stairs et al., 2009). In technical terms, the VPN is Wide Area Network across the Internet that creates links between sites even though it appears to users as a private network link (Wouters Bantof, 2006). The VPN also supports secure connections between an organizations private network and that of the remote users through a third party service provider. The network is normally encrypted, and telecommuters have vouched for the reliability, safety and low-cost of VPN in a bid to connect an organization's intranet (Shinder Shinder, 2004; Stairs et al., 2009). It is, however, important to note that there are basically two types of VPN namely: the remote access VPN and the site-to-site VPN. I highly recom mend a site-to-site VPN, otherwise referred to as the router-to-router VPN connection. Summary of Technology/Problem Solution The Site-to-Site VPN Connection The Site-to-Site VPN connection is a network that enables an organization to have routed connections between its varied separate offices and/or with other affiliate organizations through a public network without compromising the security of the network (Morimoto et al., 2008, Schnider, 2011). In essence, a routed VPN across the routed VPN connection through the use of the internet operates logically as a Wide Area Network link. Whenever the network is connected through the use of the Internet, a router effectively sends forward packets into another router along the VPN connection. In terms of the routers, the VPN connection serves as data layer link (Lewis and Lewis, 2006; Morimoto et al., 2008, Schnider, 2011). Besides, the Site-to-Site VPN connection can be used to link two disparate portions of a private network. In this case, the VPN server plays the role of providing a routed connection to the network that is attached to the VPN server. Therefore, the calling router- also referred to as the VPN client- automatically authenticates itself to the VPN server which is otherwise termed as the answering router. It should be noted that for the purpose of mutual authentication, the answering router does authenticate itself in response to the calling router. Therefore, in a Site-to-Site VPN connections the packets sent from either of the routers across the VPN connection do not typically originate from the router (Morimoto, 2004; Bendell, 2006; Morimoto et al., 2008). In essence, the site-to-site VPN connects two networks that are dispersed by linking them with a leased line, a WAN circuit or through a public network such as the Internet. The actual underlying infrastructure for the network is inconsequential, provided that the sites can be linked to each other through the IP (Khan, 2005; Matei, 2012). The sites can operate using the pre-shared keys: the key can be shared between the sites to enable mutual authentication and to help establish the encryption of initials that can be exchanged IPsec tunnel parameters. On the other hand, the site-to-site VPN may operate using digital certificates, which belong to each particular site. This is provided by a central CA for the facilitation of authentication and encryption of the earlier exchanges between the sites (Khan, 2005; Matei, 2012). The use of a site-to-site VPN connection provides substantial constant savings when compared to the other network that uses dedicated Wide Area Network link. Whatever is required to use a site-to-site VPN is a VPN gateway and a working Internet connection that is relatively inexpensive. After the VPN connection has established connections between sites, the site-to-site VPN link is invariably established (Shinder Shinder, 2004; Schinder, 2011). The users on each end can then communicate with the other networks through the site-to-site VPN link as it would be the case with the routed connection on their very own networks. In this case, the gateways serve as routers and, therefore, route the packets to the designated networks. In a typical context, the site-to-site VPN connections are established between the offices of an organization either between departments, the main office and the myriad branch offices (Schinder, 2011). This is considered as an approach to social theory that is agent based. The theory bears its origin from social studies and regards objects as being part and parcel of a social network. The theory puts much emphasis on the agency of non-humans in a communication channel and helps in mapping the simultaneous relationships between the semiotics or the concepts and the material within a communication network (Fenwick et al., 2010). Therefore, the ANT provides the means through which the relational ties in a particular network can be explored but does not shed additional light on the reason and the form of the network. In a nut shell, this theory provides the explanation of how the material and semiotic networks are built up so that they function as a whole. Therefore, the clusters of actors who are involved in the creation of meaning can be described as being both material and semiotic. This explicitly relates the various elements that are found within a network, thereby coming up with the coherent whole. Such networks are invariably transient, and as a result, they exist in a constant re-making and making process. Subsequently, the relations are repeatedly performed without which the network is subject to dissolution. The theory also makes the assumption that the networks of relations are by no means intrinsically coherent (Fenwick et al., 2010). The actors in this theory include both human and non-humans and in the context of the network they relate with one another. This theory assumes that there is nothing that lies outside this network of relations; implying that there are no distinct differences in the abilities of the technology, human and non-human to act. Therefore, as soon as the actor engages with the actor-network, it is invariably involved in the web of relations, thereby becoming part of the entelechy (Fenwick et al., 2010). This theory is imperative in the quest to install the site-to-site VPN as it helps in understanding the position and interaction of various players (human and non-human) within the network. The understanding of this relation is critical in ensuring that the network is exploited to the maximum. Structuration Theory The structuration theory talks about the duality of structures of communication. This duality involves the relationship between structure and agency. In essence, the theory attempts to look at how agents relate to the structural elements of the society. The theory perceives structure as that which gives form to the social life without necessarily being the form itself. Therefore, structures come into being through the activities of the agents (human). On the other hand, agency refers to the patterns of peoples actions and not their intentions for doing their activities (Stones, 2005). In general term, the structuration theory is considered as a theoretical approach towards sociological phenomenon. Initially, during its formulation the theory did not address the technological aspect of human relations. However, as technology began to take a critical and almost central place in human relations, especially in the organizational setups the theory was extended to include the information technology dimension (Stones, 2005). This theory will be instrumental in the implementation of this set-to-set VPN as it will help to understand the position of the corporations staff as agents; and how their interactions across the network is a dual nature. Therefore, this gives the interactions a form that either displays the success or failure of the communication system. Systems Theory The systems theory has been considered as a study that rather cuts across all disciplines. This study delves into the abstract organization of various phenomena bearing in mind the independence of their types, substances and/or spatial scales of existence. The theory investigates the principles that are found in all complex entities and models that can be used to lend their understanding. According to this theory, a system consists of four main components. The first components can be defined as objects: they involve variables, elements and parts within the system. They can either be abstract, physical or both in accordance to the systems nature. The second component includes the attributes: these are qualities or properties that the objects and system exhibit. The third component is the internal relationship between the objects in the system, and the final component is the environment in which the system exists (Dwivedi, 2012). Therefore, according to the theory, the system is a set of things that impact on each other within a particular environment, forming a larger pattern that is disparate from any other parts. In the analysis of the organizations, the important systems interactive paradigm consists of looking at the continual stages such as the input, processing and the output. These stages reveal the concept of openness and/or closeness. The closed system does not interact with the environment in which the system is set up: such a system does not take in new information and can, therefore, wither and die away. On the other hand, an open system takes in new information since it interacts with the environment in which it is based. The open system, therefore, increases the possibilities of survival and prosperity (Dwivedi, 2012). This theory is critical in helping shape that kind of system that will be effective for the corporation. The theory proposes that we open our soon to be implemented site-to-site VPN connection to new information as this will not only enable our sustainability, but this appreciation of our environment will make our communication channel efficient and productive. Social Construction of Technology Theory Also referred to as SCOT, this theory posits that technology does not determine the actions of humans within a communication channel but rather it is the human actions that shape the technology. The theory also posits that the ways in which technology is used, can hardly be understood whereby a full comprehension of the ways in which that technology is ingrained in the social context. This theory is referred to by some scholars as technological constructivism, especially those who consider it a response to technological determinism (Bijker, 2012). According to the theory, the study of the social world is critical in understanding the criteria that people use to determine whether to accept or reject a particular technology. The theory is, therefore, a methodology as it helps in the formalization of the principles and steps that need to be followed when analyzing the failures and success of a particular technology (Bijker, 2012). This theory is fundamental in these initial stages of implementing the site-to-site VPN connection in our corporation. The theory proposes that we understand the effectiveness of this system by taking a critical look at the social milieu in which it is going to be set. This is because; the social environment will determine the form and productivity of the system. The Activity Theory This theory principally aids in understanding the mental capabilities of an individual. The theory, however, goes ahead to confirm that isolated individuals are sufficient to conduct the analysis of a unit, the analysis of the technical and cultural aspects of the interactions between human beings. Therefore, the theory is mostly used in the description of socio-technical system based on six interrelated elements. These elements include the objective of the system; the actors that are engaged in the system (Kaptelinin and Nardi, 2009). The other elements also include the tools that are used by the actors in the communication system; the social context within which the system is based; the division of labor or rather the hierarchical structure of the actors in the system and finally the conventions, rules and guidelines put in place to regulate the various activities of the system (Kaptelinin and Nardi, 2009). This theory is invaluable in the implementation of the site-to-site VPN connection in the company. The theory helps in understanding the various actors in the system and more so the role that they play in the conception and effectiveness of the system. Understanding the individuals is crucial in further understanding the general social context within which the system is based, thereby making it possible for the prediction of its suitability and potential. The Technical Specification of the Site-to-Site Virtual Private Network The system will use an OpenVPN, which is an open source SSLVPN client server that will enable the setting up of the corporations encrypted VPN. The OpenVPN is crucial in securing the sharing and access of information between offices irrespective of their distances. The system will require a central office that will be linked to a handful of computers across the various departmental offices. These computers will be connected by routers. This will require access to both the client and server side routers (Teska, 2008). Therefore, the client network and the server network will be separated into disparate broadcast domains - a process that will require a WINS server in order to route the Windows file-share information between the two or various sub-nets. The required hardware will, therefore, include the Linksy WRT54G (for the client router); the D-Link DLG-4300 (for the server router). The server OpenVPN Machine will have the following specifications: Processor AMD Athlon 1600+, RAM 768 Mb and Operating System Slackware 10.2. The client OpenVPN Machine will have the following specifications: Processor AMD Athlon X2 3800+, RAM 2 GB and Operating System Slackware 12 (Teska, 2008). Feasibility Study The installation of the site-to-site Virtual Private Network is not just feasible for the organization but also an inevitable measure. Notably, the installation of this system can be completed within the next six months as reflected in the operation plan, given the commitment of the corporation to prioritize its implementation. The installation will not be an added financial burden to the corporations already scheduled financial budget. This is because some of the equipment required for successful installation of the system is already in place, including cable networks and computers and other installation materials. While an upgrade of some of the computers is called for, they can still be used for the installation purpose and be replaced at a later stage, at the corporations convenience. Arguably, the only new dimension that the site-to-site VPN connection introduces to the already existing communication system is the Internet aspect, which will be able to bridge the offices that ha ve not been able to communicate due to geographical distances. It is worth noting that the Internet is affordable, and the necessary measures have been put in place to ensure that the corporations information will be secured. Due to the magnitude of the corporation, especially with offices scattered across the country, there is a need for swift up-to-the-minute communication between these various departments. The site-to-site VPN connection is the apt solution that can help bridge this information gap due to its cost effectiveness and information safety. Operation Plan The implementation dates of the various aspects of installation of the site-to-site VPN is indicated chronologically in the table below. Time Line Activity January 25 to February 15, 2013 Review and Approval of the Site to Site VPN Proposal Report February 16 to March 30, 2013 Examination of the Existing System across the Countrywide Offices April to June 15, 2013 Setting Up the New Infrastructure between the Main Office and the Remote Offices June 16 to July 31, 2013 Testing the installed system. August 1, 2013 Launching the system. Recommendations After intensive discussion in this report on the merits of the site-to-site VPN connection and the provision of the reasons as to why the corporation should adopt the system, I would recommend that the implementation of the same be given prominence to enable timely communication between the various departments in the corporation. In this case, time is of the essence as information is considered today as one of the determinants of profitability and efficiency in organizations. Therefore, the corporation should promptly consider the merits of the proposed communication system and embark on its implementation. In the installation process, the proposed installation price should be duly followed to avoid the omission of the key elements of the proposed system. Conclusion In this discussion, it is proposed the site-to-site Virtual Private Network is befitting for the upgrade of the communication system of the corporation. This proposed VPN model will use the Internet to facilitate communication between different offices within the corporation. The security of the information and the affordability of the Internet are some of the merits that we have pinpointed as being inherent with this system. We have also discussed its pertinent requirements and how they enable the efficiency and security of the system. Besides, we have discussed how the five telecommunication technology theories are applied in the proposed system and revealed the theories that help in understanding the various components of the system. In summary, the recommendation of the site-to-site VPN connection is in recognition of the corporations communication needs and financial constraints. This system will help the corporations effective sharing and access of information, which is critical in timely decision making and hence productivity.

Thursday, November 21, 2019

Substance Absue Relapse Amung Women Essay Example | Topics and Well Written Essays - 3750 words

Substance Absue Relapse Amung Women - Essay Example Relapse is a situation of 'converting back' from a condition after a short or long abstinences. In drug addiction and substance abuse, it can be defined as "the resumption of the use of drugs after leaving it for some time" (Harris, J., Anderson, J. and Sharon, W, 1998). For substance abuse relapse among women, the issue of resumption of females to substance abuse after they have recovered. The World Health Organization (WHO) defines substance abuse as "the harmful or hazardous use of psychoactive substances which include illicit drugs and alcohol". A prolonged or repeated use of such substances can lead to addiction which is usually evident with continued use of the substances despite the fact that physical and mental deterioration is being noticed. In fact, various researchers in the world have come up with different conclusions and suggestions regarding the causes, effects, solutions and recommendations on how to deal with substance abuse and relapse not only among women but also in all genders (Laws, D. & Ward, T. 2000). Substance abuse is a global issue. ... "In some producing areas, in Iran, between 4 and 6 percent of the population are opium addicts. The country has an estimated 1.2 million opiate addicts, including 150,000 heroin users. In the producing areas of Laos and Thailand, the addiction rate is as high as 10 percent. Fully 80 percent of the heroin consumed in Europe comes via the Balkans. Of the opium that comes from Southeast Asia, as much as 50% is sent to China. In the United States and Canada, in 1991 there were 360,000 heroin addicts; in 2000 there were 600,000 heroin addicts." (Cherry, Dillon, & Rugh, 2002) "Indeed, on the average, the federal government has spent well over $10 billion a year on drug control for at least the last ten years. Currently, fifty-two federal agencies have a stake in drug control, and each must justify its budget." (Cherry, Dillon, & Rugh, 2002) The U.S. has a lengthy history of legal and social measures aimed at thwarting substance abuse. The first legal measures against substance abuse came in 1875 when opium dens were outlawed in San Francisco in 1875. (Cherry, Dillon, & Rugh, 2002) "The first national drug law, the Pure Food and Drug Act of 1906, required accurate labelling of patent medicines containing opium and certain other drugs."(Cherry, Dillon, & Rugh, 2002) "The spirit of temperance led to the prohibition of alcohol by the Eighteenth Amendment to the U.S. Constitution in 1919." (Cherry, Dillon, & Rugh, 2002) Narrowing the substance abuse view down, the literature shows that in 2003 there were 56, 671 treatment admissions in the state of New Jersey. (New Jersey Department of Human Services, 2004) Of those admissions 56, 671 treatment admissions in the state of New Jersey, Essex county recorded

Wednesday, November 20, 2019

How do you measure political corruption, and what are the difficulties Assignment

How do you measure political corruption, and what are the difficulties involved - Assignment Example Another important form of this type of corruption is extortion. Here the political persons get involves in various criminal offences for acquiring property, money etc from an individual or institution through illegal means. Political corruption depends on the jurisdiction and country. The practice of political funding differs from places to places. In some places considered as legal and in some places are considered as illegal. In many places government officials have indefinite powers. There the distinction between illegal and legal power is difficult. Institutional corruption is also included in political corruption. The problem of corruption in institute which is associated with the economic support from the government officials who have different interest related with the institution. Political corruption has a negative effect on the good governance and democracy of the country. It reduces the accountability in legislature and election. Corruption in politics hampers the represen tation process in policy making. Political corruption also leads in the compromising the rule of laws. This type of corruption often occurs at the higher levels of the state which a strong impact on politics. Political corruption leads to the improper use and resources misallocation. It influences the political system and government institutions. As a result institutional decay is a common phenomenon in this type of corruption. It is a deviation from ethical code of conduct and written legal norms by the ruling political party. The ruler systematically abuses the rules and regulations of the state to fulfil their personal gains. It is also perceived as an ignorance of principles and rational legal values of the state. The legal base of many authoritarian countries is weak. This helps to grow political corruptions and subjects to the downfall of their political system. Moral, ethical and normative standard are the necessary benchmarks to differentiate legitimacy from legality in

Monday, November 18, 2019

Conflict Resolution-Mediation Essay Example | Topics and Well Written Essays - 2500 words

Conflict Resolution-Mediation - Essay Example A working agreement which spells out the rules of engagement and conduct during the negotiations is essential in the process. The mediation process involves acceptable third party intervention and confidential caucuses which enable the disputants become the decision makers in ending the conflict. The caucus stage entails making confidential meetings with each of the disputants whereby each party is allowed to reveal his or her grievances to the dispute. Party-directed mediation process can be summed up in to five stages which include the opening statement, the education phase, and the alternatives generation phase, the actual negotiation phase and the final closing phase. There are two pillars of the party-directed mediation that is the preliminary meetings which comprises of the pre-caucus and pre-mediation. Mediation process saves the parties to the dispute money while managing conflicts. Mediation is applicable in a wide variety of situations thus its effective in resolving disput es. Unlike arbitration where a third party makes a decision for the disputants, mediation is neutral process that accords the disputants the opportunity to solve their dispute with the support of a third party. The objectives of the pre-caucus are to enable the parties to the mediation to reduce the negative emotions to mediation and enable the negotiators to mediate more effectively. The initial aim of the pre-caucus is to facilitate empathic listening and develop an active listening approach as developed by Carl Rogers in the client-centered therapy. The initial joint session enables each party to confront the other through interpersonal negotiation while avoiding all the dysfunctional behaviors. Workplace mediation is always different since the parties address the working relationships which are part of the job and as a legal obligation. Party-directed mediation is useful in particular when mediating ethnic clashes or deep-seated interpersonal disputes between two individuals. Me diation process helps the parties to the dispute to develop tools which are critical in examining their disagreement. I agree with the book that the third party acts as a quasi arbitrator to the dispute. The pre-caucus affords the parties to the dispute an opportunity to vent their emotions, discover the blind spots and increase their commitment to resolving the dispute. The individuals at this stage will learn on how to listen to each other, and understand the issues of confidentiality to the mediation process. I have learned that empathic listening is an essential skill to effective mediation process since it encompasses attentive listening, asking questions about the mediation process as well as suggesting solutions to the dispute. The diagnostic stage of effective listening motivates the parties to speak without feelings of fear of being judged due to self-understanding and confidence. I personally believe that opening statement of the mediation process is aimed at ensuring conf identiality to the negotiations and setting the rules of engagement. The education phase provides an ample opportunity for all the parties to share their perspectives of the dispute and relive any negative emotions. The parties should aim at building cordial and close working relationships at this stage. The options generation phase entails brainstorming on all possible alternatives of resolving the conflict. In

Friday, November 15, 2019

Evolutionary Roots of Deception: Book Review

Evolutionary Roots of Deception: Book Review Loredana Lenghel Deception – Evolution’s Hidden Agenda â€Å"Deceit is the Cinderella of human nature† (2004, p.2) says David Livingstone Smith in his book â€Å"Why We Lie, The Evolutionary Roots of Deception and the Unconscious Mind†. The author tries to show, through several examples and intriguing connections, that lying is an evolutionary adaptation which allowed the human species to thrive. He argues that â€Å"Deceit () is essential to humanity but disowned by perpetrators at every turn† (2004, p.2). The book proves to be an ambitious try at showing that deception is an intrinsic part of cognition; that it comes naturally to all humans. Even more spectacular is his try to convince us that deception is controlled by the unconscious mind, thus allowing for self-manipulation. For this purpose, Smith uses The Machiavellian Mind Theory arguing that humans’ extra Intelligence allows them to overcome primal needs, thus being advantageous for social manipulation. The author’s aim is to convince the reader that manipulation plays a central role in the evolution of humans. He argues that in order for our ancestors to thrive in the ever developing social context and increase their fitness, they were required to come up with ways to mediate social encounters. He starts by showing that everyone is a â€Å"natural-born liar†. From baby monkeys to human infants, from religious myths to children stories, lying is ubiquitous and a part of all cultures. Smith argues that lying does not resume to just words, people also lie with their bodies and actions. Even more intriguing, lying is not always aimed at someone else. He proposes that â€Å"we are equally adept at deceiving ourselves† (2004, p.21). The unconscious is actively trying to conceal information from us through the process of self-deception; an idea not unique to Smith (Chance et al., 2011; Hippel Trivers, 2001). He continues to show that not only humans are â€Å"manipu lators and mind readers†. He gives examples of deception from the animal sphere, from camouflage and mimicry to more sophisticated ways of deception, such as language, he argues that these are proof that deception is an evolutionary advantage. Mind reading, an organism’s ability to predict another’s behaviour, increases its chances of survival, thus acting as an adaptation. It is the driving force behind evolution because â€Å"Mind reading facilitates deception, and deception encourages mind reading† (2004, p.35). In â€Å"The Evolution of Machiavelli† he elaborates on the roots of deception and self-deception. He argues that deception was used by our ancestors to conceal their true intentions. The ones that were superior in this aspect had an edge over others. He presents Nick Humphrey’s papers in which he argues that the race between the best deceiver and the best mind-reader was what gave birth to human intelligence, allowing them to manage the increasing social complexity. This hypothesis is supported by others, who, by looking at the neocortex’s size, brain part involved in relationship mediation, found evidence in support for the social intellect theory (Dunbar, 1992). They argued that the ratio of the neocortex volume is the best predictor of group size. Moreover, Orbell et al. argued that Machiavellian intelligence could have evolved alongside cooperation (Orbell et al., 2004). This idea raises the question whether, as Smith said, unconscious deception would be eve n more beneficial for cooperation and the increase of the human species. His next chapter builds on the idea that self-deception is possible due human mind’s division into unconscious and conscious regions. He argues that the time between the unconscious awareness and conscious perception is what allows the Machiavellian module to act and distort the information. He supports Freud’s idea that â€Å"consciousness had no role in mental processing† (2004, p.97). To portray this intriguing proposition of self-deception being an adaptation, Smith used a creative analogy. He argued that humans are constantly part of a game of â€Å"social poker†. In order to win it, one needs to anticipate the other player’s move by using the mechanisms of deception and mind-reading. To improve their own strategy and avoid being foreseeable, the mechanism of self-deception became an adaptive advantage. By believing the lie themselves, other players could not predict their moves. This analogy shows the benefits of self-deception. That being sai d, some argue that even though there might be short-term psychological benefits, self-deception can come with long-term costs, such as an inaccurate prediction of future performance (Chance et al., 2011) or loss of information integrity which can result in inappropriate action (Hippel Trivers, 2011). The device that allowed for this to happen, he says, was the evolution of language, which ushered the struggle between deception and detection. Language offered an advantage in the social poker game, giving more chances of success to those with this skill. In his view, social exchanges are monitored by the unconscious Machiavellian mind. This module is sensitive to both the conscious and unconscious cues of others because it is the Machiavellian module itself who communicates through unconscious verbal insinuations. He argues that this idea is â€Å"less bizarre than it might at appear† (2004, p.121). Coded communication might have evolved due to the language’s initial purpose, gossip. Concealing information from third parties and exchanging confidences through cheap gossip allowed for secret alliances and a favoured position in the social circle. He affirms that â€Å"For our species, all roads lead to self-deception and thus to unconscious communication† (2004, p.147). At a first look online, it is noticeable that only with the title this book has stirred some controversy. Commentaries stating that the book â€Å"got them hooked† from the beginning were prevailing. The book was generally regarded as an interesting read, but not a piece of strong evidence for its propositions. Pinker (2010) did not view it as an attempt to persuade readers, but rather, as an attempt to recruit researchers into conducting studies to test the theory’s value. Others regarded the book as highly speculative without even considering the â€Å"obvious counterarguments† (Sager, 2004). Sager argued that not even the speculations seem plausible, thus begging the question whether they could even lead to anything more. Dickins (2005), although being less critical, agrees with the general argument that the connection made between the unconscious and deception is questionable. In conclusion, Smith’s book presented itself as a worthwhile read. First catching my attention by not completely disregarding Freud’s theories, and then using it to stir controversy upon human integrity, it undoubtedly offered some food for thought. Even though converting readers into believers of its cause is improbable, the book will make them critically analyse their interactions and looks for the smallest hints of (self)deception. The style of writing and creativity in portraying ideas were an additional bonus to the book’s appeal, raising interest in Smith’s other works. Bibliography Chance, Z., Norton, M. I., Gino, F., Ariely, D. (2011). Temporal View of the Costs and Benefits of Self-Deception. PNAS, 15655-15659. Dickins, T. E. (2005). A Necessary Pain in the Heart. Retrieved March 02, 2014, from Human Nature. Dunbar, R. I. (1992). Neocortex Size as Constraint on Group Size in Primates. Journal of Human Evolution, 469-493. Hippel, W. v., Trivers, R. (2011). The Evolution and Psychology of Self-Deception. Behavioral and Brain Sciences, 1-56. Orbell, J., Morikawa, T., Hartwig, J., Hanley, J., Allen, N. (2004). Machiavellian Intelligence as a Basis for the Evolution of Cooperative Dispositions. American Political Science Review, 1-15. Pinker, S. (2010). The Cognitive Niche: Coeolution of intelligence, sociality, and language. PNAS, 8993-8999. Sager, A. (2004). Review Why We Lie The Evolutionary Roots of Deception and the Unconscious Mind . Retrieved March 02, 2014, from Metapsychology: http://metapsychology.mentalhelp.net/poc/view doc.php?type=bookid=2262 Smith, D. L. (2004). Why We Lie The Evolutionary Roots of Deception and the Unconscious Mind. New York: St. Martins Griffin.