Thursday, October 31, 2019

Global Energy Consumption Essay Example | Topics and Well Written Essays - 750 words

Global Energy Consumption - Essay Example As the report stresses  coal is a mineral that is mined either in underground mines or surface mines. Exploration is a process of gathering geological information from a number of different sources including existing data, seismic instrumentation, and geographical observation. Holes are drilled into the selected areas to determine the size and quality of the coal bed. Contributing to today's modern exploration methods are "microelectronics-based technology, such as; personal computers, digital down-hole logging, remote sensing, global-positioning systems, and vastly improved communications".This paper declares that  crude oil is drilled from wells located beneath the surface of the earth by forcing it up when pressure is applied inside the well. In addition, there are oil reserves beneath the oceans and other bodies of water that are tapped by offshore oilrigs. It is transported around the world on ships known as super-tankers, where it is off loaded at refineries typically built along the coast around the world. The quantity of oil, the quality, and the size of the oil field all impact the value of the field. Oil exploration is accomplished by utilizing the geological history of an area in conjunction with radar, sonar, sounding, and data acquisition techniques that look beneath the surface and reveal what may lie below.  Eventually, test wells are drilled to determine the depth of the oil, the quantity, and obtain more precise information on the layout of the field. ... Natural gas is a natural byproduct of fossil fuels and is found associated with oil fields and coal beds. A major problem with natural gas is transportation, which must be done primarily by pipeline. This limits it to inland applications, as trans-oceanic pipelines are impractical. Coal shale is a relatively new source of oil and extraction technologies are still being developed and improved. The process depends on the oil that is embedded in the rock and the sand where oil has accumulated. It is estimated that there is enough oil in the US oil shale reserves to meet our present oil demands for the next 200 years (The Benefits of Oil Shale Production, 2007). However, the process of grinding the shale rock and heating it to separate the material is an expensive process. In addition, moving the oil from the fields to the refineries within the US must be done by truck, and could also become expensive. At today's oil prices, it may be impractical, though with escalating demand and diminishing supplies its economic outlook may improve in the future (The Benefits of Oil Shale Production). In addition, it would free the US from the political concerns encountered when acquiring crude oil. There has recently been some debate within the Senate that would favor offshore oil drilling off the coast of the US. Advocates contend it is a necessary step to reduce our dependence on foreign oil. However, critics maintain that the amount is so limited and the production so far in the future that it will only have a marginal effect on supply or price (Jervis, Welch, & Wolf, 2008). In addition, environmentalists have objected to the lifting of

Tuesday, October 29, 2019

Analysis principles of logisties management within Mishubishi company Assignment

Analysis principles of logisties management within Mishubishi company in singapore - Assignment Example The competition in the local industries and markets grew stronger, and therefore, the production of products and services improved in the domain of quality in the recent years. The industry of sophisticated transportation developed as a niche of many industries (Spanos, Zaralis, & Lioukas, 2004). The companies have a duty to provide their clientele with their orders on their doorsteps, and therefore, the companies are busy in developing their private cargo services so that they can ship orders to their clients at a global level (Akhter, 2007). The company known as Mitsubishi has developed the most advanced transportation system in the world, and they have the proven capability to deliver products within one or two days beginning from the time when the customer placed the order (van de ven, 1992). The key of success in the industry of consumer goods lies with the power of marketing and advertisement (Beasley & Frigo, 2011). The ultimate level of success an organization can achieve thr ough placing the products into the market effectively and timely as well. However, the company does not use any single means of transportation. They decide according to the specific needs of the consumers (David, 2015). The company applies various statistical models in order to manage the demand of its products (Child, 1972). The applied techniques include regression analysis that measures the impact of different independent variables over a target one (David, 2015). The companies have a keen interest in knowing the semi-exact level of demand that they might face in the future (David F. R., 2011). The company uses linear programming as well that assists them in terms of balancing out productivity with quantity so that the organisation can create an optimal level of cost structure that will in turn generate maximum level of profitability in the market (Roulac, et al., 2005). The company operates with the help of having

Sunday, October 27, 2019

A Cloud Based Immune System For Computers Information Technology Essay

A Cloud Based Immune System For Computers Information Technology Essay Cloud Computing is a Web-based processing, where services are hosted on the Internet. Resources like infrastructure, software, and information are provided to computers and other devices on demand over the Internet. It is in the 1960s that the concept of Cloud Computing first emerged as described by John McCarthy, computation may someday be organized as a public utility. From the 1960s to the 1990s, Cloud Computing has barely improved. In the 1990s, there was a major advancement of bandwidth that triggered the development of Cloud Computing. Salesforce.com, which came along in 1999, introduced the idea of distributing business software through websites. Four years later, Amazon Web Services expended the could-based services to storage, computation as well as human intelligence. Amazon Web Services then built the first Cloud Computing infrastructure that now offers worldwide access. C:UsersKanika AgarwalDesktopTECH COMMUNICATIONS300px-Cloud_computing.svg.png Cloud computing has already become an integral part of peoples lives today. A search engine that we are use every day is the simplest example. As a recent technology, only few researches have been done in this area. Cloud Computing is still an involving paradigm. Therefore, an accurate and comprehensive definition of Cloud Computing is currently unavailable. Cloud security involves the same fundamental issues as any computer security program. These include: restricting access to authorized users, maintaining the integrity of data, and ensuring the availability of data and services. When data and services reside on servers external to the campus, safeguarding those assets involves additional concern. Encrypting data transit is important, as are the service providers security procedures. Cloud computing typically uses server virtualization, and if the virtualization isnt secure, data from one segment of a server could escape into another area. Cloud based immune systems are very efficient in solving problems related to computer software which use the idea of cloud computing. Such softwares gather the data and information from the cloud to process its application. A new approach for managing bugs in computer software, Dimmunix, has been developed by a team led by Prof. George Candea at EPFL. Deadlock immunity is a property by which programs, once afflicted by a deadlock pattern, develop the ability to avoid future occurrences of that deadlock pattern. Overtime, programs with such an immune system progressively increase their resistance to deadlocks.  Dimmunix is a tool for giving software systems an immune system against deadlocks, without any assistance from programmers or users. It is well suited for general purpose software (desktop and enterprise applications, server software, etc.) and a recent extension allows application communities to collaborate in achieving enhanced immunity. It also enables entire networks of c omputers to cooperate in order to collectively avoid the manifestation of bugs in software. Literature Review The Dependable Systems  Lab  at  EPFL  in  Switzerland  has  developed a new IT  tool,  called  Dimmunix,  which  allows  programs  to  prevent future  recurrence  of bugs  without  any  assistance  from  the users  or programmers. The approach, called failure  immunity, starts working  for the  first  time a bug occurs. It saves  the signature of the  bugs,  and then  observes how the  computer reacts  and  records a trace.  When the  bug  is about to attack again,  Dimmunix  uses these trace to recognize the error and automatically changes  the execution  so  that  the program  continues  to  run smoothly. The use of cloud computing technology means the tool that can protect the entire network of computer bugs, even in an environment like the Internet. (Sparky3887, 2010)   With  Dimmunix, the  web browser  learns how to avoid freezing when the bugs related to plug-ins happen.  Moving  a step  further,  using  the  latest  version  of  cloud computing technology,  they take an advantage of network and therefore immunize the entire communities of computer. Dimmunix  could  be  compared  with the  human  immune  system. When  the  body is infected, the immune system  develops  antibodies. Then,  when  the  immune system encounters the same  pathogen again,  the  body  recognizes  and  knows  how  to effectively  combat the  disease. Based  on  the principle of  cloud computing,  the computers  participating  in  the Dimmunix application community benefit from vaccines automatically produced whenever the first manifestation of a given bug occurs within that community. The new version of Dimmunix programs is safely protected from the bugs, even in environments as unreliable as the internet. At present, for the computer programmers, Dimmunix works for all programs used widely by private individuals and companies.  It is useful for programs written in Java and C / C + +, obtained on real systems software (JBoss, MySQL, ActiveMQ, Apache httpd, MySQL, JDBC, Java JDK, and Limewire).  (Carron-Gasco, 2010) If the browser crashes or the application gives up the ghost, it might be required to send an error report to the creator of the program.  Following the crashes, one would probably start to wonder if the error reports were even read. This is not the case for Dimmunix. It learns from crashes, bugs and errors without assistance from the user or for a programmer, to automatically prevent replication of the same deadlock in the future.   This approach starts to work for the first time a crash occurs.  Dimmunix saves a signature of the error, see how the computer reacts and tracks a record.  The next time the bug appears, Dimmunix will be able to recognize the error, step in and influence the application so as to not hit the same deadlock again. Dimmunix does not actually change the code or try to fix the bug.  It does not touch the program at all.  Dimmunix amends interleaving of program threads from below the program in question, so as to run the program without any deadlocks. With subtle manipulations of the program schedules, the deadlocks can be avoided without compromising the program code or influence the behaviour of typical applications. The Dependable Systems Lab boasts that Dimmunix has been proven to work on many real systems, using all kinds of programming languages such as MySQL, ActiveMQ, Apache and JDK forJava, while only introducing modest performance overhead. It has also proven itself to be effective in a test case of 100 errors, Dimmunix has managed to avoid all the deadlocks and run each test to completion. The latest version of Dimmunix goes one step further. Inspired by the cloud computing, the software uses the experiences and information from an entire connected community to share bug reports and fixes. This obviously opens the system up to a host of potential problems such as privacy worries and malicious denial-of-service attacks.  There is actually no concern for privacy, because the deadlock signatures solely contain a fingerprint of a segment of execution and absolutely no data, neither of the user nor of the program itself. As for malicious attacks, the new Dimmunix employs a quick verification technique that allows each Dimmunix runtime to receive a deadlock signature and check it before actually employing it to avoid hangs. (Brown, 2010) Results and Discussion Case Study The concept of cloud computing evokes different perceptions in different people. The word Cloud itself reflects the idea of how it works. In cloud computing, processing is not in a specified, known or in a static place. Cloud computing is still in the phase of a developing technology. Currently there have been some attempts to use this technology in solving the immunity problems in modern computers. Cloud based immune systems are very efficient in solving problems related to computer software which use the idea of cloud computing. Such software gathers the data and information from the cloud to process its application. These include: Cloud software development platform: software platform to host cloud-based enterprise applications such as Windows Azure, Google Software used to maintain cloud based infrastructure (Servers, storage, security and databases) like Amazon Web services and Sun Microsystems etc. These software integrate the technique of cloud computing in the background to process their applications. The method of how this software uses this particular technique will be discussed below by randomly choosing a simple software more commonly known as Windows Azure. Azure platform lessens its emphasis on the desktop by shifting more resources to web-based products. It just uses the end user computer to run the software. All the data and information are stored in the cloud. By doing so it has an access to vast amount of data stored in the cloud. Since it is open to a vast arena of cloud, the software has the ability to counter itself from errors that occur as it runs. (Tim Mther, 2009) 3.1 Problems in Cloud Computing There are a large number of problems/errors that the cloud based software faces in the current era of computing. These errors can be divided into two main categories. They are viruses and issues due to immature technology. Some of them are listed below: Kernal mode rootkits: This uses the hypervisor technology to run. It affects the system by installing itself as a hypervisor below the OS. By doing so, it becomes more difficult to detect. Viruses: There are two kinds of viruses. They are non-resident and resident viruses. Non-resident resident viruses consist of finding and replicating modules. Finder modules find new files and call the replicating module to infect that particular file. Resident viruses, when executed, load into the memory and execute when a particular file of its interest start to run. (wikipedia, Computer Viruses) Lock overhead: the extra resources using for locks like memory space allocated for locks, CPU time to initialise the lock and destroy a lock etc Lock contention: This occurs whenever one process attempts to acquire a lock held by another process. Deadlock: The situation when each of the two tasks is waiting for a lock that another task holds. Unless something is done, the two tasks will wait forever. (Wikipedia) The above mentioned errors are some of the vulnerabilities that can be treated using cloud based immune systems. Here, the deadlock will be studied in detail in order to describe how it can be resolved using cloud based systems. The pros and cons of the particular system will also be discussed below. Deadlock A deadlock refers to a specific condition where two or more demanding performance are waiting for each other to free a resource, or many actions are waiting in a circular chain for resource. This results in both the programs ceasing their function. When we consider multiprocessing,  in which many processes share a particular type of mutually exclusive resource, deadlock is commonly known as a software lock  or  soft lock. It is tremendously vulnerable in the case where multiple threads coexist in the same address space of a system. Dead lock remains the ultimate bug when there is a trade-off among two problems. The deadlocks are troubling mainly because there is no  Ã‚  solution to avoid them and only possible way to attack such a situation is by having a deadlock detector and a breaking mechanism or system. (Deadlocks, 2011) There are four essential and adequate conditions known as Coffman Conditions  for a deadlock to take place. These include: Mutual exclusion  condition-A particular resource that cannot be used by more than one program at a time Hold and wait  condition-Process which holds some resources but at the same time requests for new ones No  pre-emption  condition-Resources cannot be forcibly removed from a process holding them but can only be released by the explicit action of the process. Circular wait  condition: More than one processes form a circular chain where each process waits for a resource while the subsequent process in that chain holds. 3.2.1 Avoidance or Prevention Removing the  mutual exclusion  condition is one way to avoid the dead lock. Another way is by requiring a process, to request for all the resources they will need before starting up. As it will not be an efficient use of resources, it is better to use algorithms such as  lock-free and wait-free algorithms  ,  optimistic concurrency control and solution, that permit pre-emption and avoid circular waits. Dead locks can be avoided if certain information about processes is accessible in advance, but for many systems, it is impossible to know the required resource information well in advance. (Detecting and Ending Deadlocks) 3.2.2 Technology against deadlock occurrence Algorithms which are used mainly to avoid the dead lock are: Bankers algorithm-This is used for the dead lock avoidance but requires the advance knowledge of resource limit, which is impossible most of the time. Wait/Die and Wound/Wait algorithms-This uses a symmetry-braking technique. It can avoid the dead lock occurrence but it is only by allowing one of the processes to become an unsafe condition. In most deadlock detections, process restarts are used by employing an algorithm to remove the deadlock by tracking resource allocation and process states. It is because detecting the possibility of a deadlock  before  it happen is very difficult. The deadlock detection techniques such as Deadlock Checker Tool and Model checking and detecting and Ending Deadlocks are examples. (Deadlocks, 2011) Model checking-It constructs a finite state -model on which it performs analysis to find out all possible terminal sets in the model, in which each of them represents a dead lock. Deadlock Checker Tool-It performs a variety of checks on parallel programs written in CSP in order to establish freedom from deadlock. Detecting and Ending Deadlocks-The SQL Server Database Engine detects deadlock cycles within the Server and chooses one of the sessions as a deadlock victim to be terminated. 3.3 Dimmunix : A Tool for DEADLOCK Operating reliably without any effect by bugs is one of the biggest challenges in Cloud Computing. Prof. George Candea and Cristian Zamfir worked on a project to solve this problem and came up with a solution, which was developed by DSL (Dependable Systems Lab) at Ecole Polytechnique Fà ©dà ©rale de Lausanne (EPFL) in Switzerland. More commonly known as Dimmunix, it has a self-healing mechanism and is called failure immunity. It studies the failure which occurs due to bugs for the first time and saves bugs digital signature. It also observes how a computer reacts subsequently in order to overcome the failure and trace the track of the reaction. Dimmunix functions on an on-going basis. When the program threads make the method calls, Dimmunix observes its order in which they occur. It then identifies the specific method-call sequences that results in dead-lock. Using the identified method calls and program-execution processes, Dimmunix traces and stores it as a digital signature. (A Cloud-Based Immune System For Computers).When the bug tries to enter the system again, Dimmunix uses this signature to identify the bug and traces the track to prevent the system from deadlock which occurred in the past by the same bug. It does so by making changes in the sequence in which threads run, to prevent the conflicts that can cause deadlock in the host system. So the system continues to work smoothly without any interruption as it worked before the bug entered the system. (Failure Immunity Mechanisms for Embedded Software in Consumer Devices). Dimmunix is comparable with our immune system, where both have similar functions. When we are infected, the human immune system develops antibodies to protect us from infectious agents. If our body encounters the same agent again, the immune system will recognize the pathogen and fight effectively to overcome the illness. Dimmunix also reacts for bugs in the same manner as how the immune system reacts for pathogen, and prevents system from deadlocks which has been described in the above section. (Deadlock). Dimmunix need no assistance from programmers or users and can act as an immune system in software systems to act against deadlock. For general purpose, softwares such as desktop OS, server software, and enterprise applications, Dimmunix is well suited. A recent extension of Dimmunix can even allow the application communities to collaborate in achieving superior immunity. (Garber) Quoting the lines of Professor George Candea, director of Dependable Systems Lab We do not touch the p rogram at all. Dimmunix modifies the interleaving of program threads from underneath the program in question, so as to essentially trick the program into running without deadlocking.Its almost as if the program is rolling down the hill, heading for a collision with a tree, and with a slight impulse from the side you alter the programs trajectory just enough for it to avoid hitting the tree and continue running as if it was never in danger. (wired.co.uk, 2010) Dimmunix is a prototype tool which does not need a central sever, platform-independent, and even runs on mobile devices. It has been built to work with application written in programming languages like Java, C and C++. It is,also, effective on various systems that consist of MySQL ,SQLite databases, Limewire peer to-peer file-sharing client JBoss application server, Apache ActiveMQ message broker, and Java Development Kit(JDK). 3.3.1 Dimmunix and Cloud computing technology After the Dependable Systems Lab of Switzerland developed the technology called Dimmunix, it has undergone various kinds of experiments in enhancing that particular technology. One such experiment is the incorporation of cloud computing into the Dimmunix. What is cloud computing and how is it being integrated into Dimmunix? These are the two important questions in this scenario. Cloud computing is computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that http://upload.wikimedia.org/wikipedia/commons/thumb/b/b5/Cloud_computing.svg/300px-Cloud_computing.svg.png delivers that services (wikipedia, cloud computing). Figure X shows the cloud computing conceptual diagram. Cloud computing is actually a byproduct of the ease of access to remote computing sites provided by the internet. It always works in the form of web based application or tools. End users can use these tools through internet web browsers in such a way that they were installed locally on their own computers. The key characteristics of cloud computing is that the cloud is in the cloud itself. That is the processing of the data is not taking place in a specified static places. When Dimmunix integrates this technology, it can do wonders. In cloud computing, once Dimmunix is installed in the computers, it acts like a vaccine for the entire system in cloud. Once the signature of a bug is saved, it will be exchanged among other Dimmunix servers in the cloud and the entire cloud will be protected from a deadlock. The deadlocks need not occur in each and every computer in the network for the first time. If it has occurred in any workplace in a cloud, it is enough to protect the cloud from the same deadlock again. (Dimmunix: A crowdsourced immune system for computers) This integration of cloud computing in Dimmunix opens the system up to a host of potential problems such as privacy worries and malicious denial of service attacks. Professor Candea assures that there is actually no concern for privacy, because the deadlock signatures contain solely a fingerprint of a segment of execution [and] absolutely no data, neither of the user nor of the program itself. As for malicious attacks, the new Dimmunix employs a quick verification technique that allows each Dimmunix runtime to receive a deadlock signature and check it before actually employing it to avoid hangs. (wired.co.uk, 2010) Advantages Users can install the Dimmunix on individual computers as an efficient immune system against deadlock as it does not need a central server for its function. According to Researcher George Candea, assistant professor and director of EPFLs Dependable Systems Lab, Dimmunix technology is platform-independent and could even run on mobile devices. (Garber) Disadvantages Dimmunix is not user friendly as it cannot be used by everybody who is a computer literate. Dimmunix cant prevent the deadlock occurrence. It needs a particular dead lock to occur at least once in order to develop the immunity. That is, the system must experience a bug-related deadlock before the tool can create defences. It can be considered as Dimmunix key weakness. Another incapability of the Dimmunix is that, its particular approach to handle dead lock situations does not work with deterministic bugs. It is because deterministic bugs can cause crashes under specific circumstances regardless of thread schedules. (Garber) Suggestions Currently Dimmunix is only being used to solve deadlock problems. But as seen in section x, there are a lot other bugs out in this computer world. It would be better if the technology can be developed in such a way that it can used to apply as an immune system to such a vast variety of problems.

Friday, October 25, 2019

Slaughterhouse-Five: The Novel and the Movie Essay -- Movie Film compa

Slaughterhouse-Five: The Novel and the Movie In 1972 director George Roy Hill released his screen adaptation of Kurt Vonnegut's Slaughterhouse-Five (or The Children's Crusade; A Duty Dance With Death). The film made over 4 million dollars and was touted as an "artistic success" by Vonnegut (Film Comment, 41). In fact, in an interview with Film Comment in 1985, Vonnegut called the film a "flawless translation" of his novel, which can be considered an honest assessment in light of his reviews of other adaptations of his works: Happy Birthday, Wanda June (1971) "turned out so abominably" that he asked to have his name removed from it; and he found Slapstick of Another Kind (1984) to be "perfectly horrible" (41,44). (This article was writen prior to Showtime's Harrison Bergeron, and Fine Line's Mother Night). A number of other Vonnegut novels have been optioned, but the film projects have either been abandoned during production or never advanced beyond an unproduced screenplay adaptation, indicating the difficulty of translating Vonnegut to the silver screen. So why does Slaughterhouse-Five succeed where others fail? The answer lies in how the source is interpreted on screen. Overall, while there are some discrepancies that yield varying results, the film is a faithful adaptation that succeeds in translating the printed words into visual elements and sounds which convincingly convey the novel's themes. While Vonnegut's literary style is very noticeable in Slaughterhouse-Five, the novel as a whole differs from the majority of his other works because it is personal with an interesting point of view techniq... ...kle every time I watch that film, because it is so harmonious with what I felt when I wrote the book" (Film Comment 41). Whether or not someone who has not read the novel could get some meaning from the film is hard to decide, but if one considers that it would take just about as long to watch the movie as it would to read the book, the decision should be obvious. Works Cited Bianculli, David. "A Kurt Post-mortem on the Generally Eclectic Theatre." Film Comment Nov.-Dec. 1985: 41-44. Loeb, Monica. Vonnegut's Duty-Dance With Death. UMEA, 1979. Nelson, Joyce. "Slaughterhouse-Five: Novel and Film." Literature/Film Quarterly. 1 (1973): 149-153. Slaughterhouse-Five, dir. George Roy Hill, with Michael Sacks, Universal Pictures, 1972. Vonnegut, Kurt. Slaughterhouse-Five. New York: Dell Publishing, 1968.

Thursday, October 24, 2019

Drug Trafficking in the United States Essay

Drug trafficking has become an even bigger problem than ever before in the world today. Now days, more people are buying, selling and using drugs. To people who do it, it is just a fast and easy way to get money, not knowing all the risks. Some drug dealers are even aware of the risk that comes with the action and they still do it anyways. There are many risks when dealing drugs and the risks are all different depending on what kind of drug it is and how addictive it is. Drugs are not only spreading fast through the streets, but today drugs and dealers have found their way into high school systems. The most common drug in high school is marijuana, more commonly known as pot or weed, and hashish or â€Å"hash. † Although this drug is said to be harmless or not addicting, it can still be dangerous in many ways. This is the reason drug trafficking in the USA must be stopped. Illegal drug trafficking from Mexico into the United States is and has been killing our society for many years. For decades, the border of the United States with Mexico has been used to smuggle illegal drugs into the country with the intention to sell it for illegal usage. Many of the drugs come from Mexico or other South American countries where drugs are easily grown. Once the drugs are grown and packed, they are then smuggled across the borders of Mexico and the United States. When the illegal drugs reach the United States, they are then distributed to many drug dealers around the country. These substances are then sold in our neighborhoods, our cities and states to those corrupted enough to purchase them. Sometimes the people that buy these large quantities of drugs have drug addictions, but a lot of the time it’s people that are addicted to money that sell to the addicts for a price of good profit. Customs Agents and x-ray devices that are at the borders are the only factors that need to be bypassed in order to successfully smuggle drugs into the United States. A lot of the times, illegal substances are stopped and confiscated at our borders. However, the effort to prevent the smuggling of drugs has not reached a one hundred percent success rate. Organized crime groups from Mexico have been smuggling marijuana into the United States since the early 1970s. Which may be surprising to some, being that president Richard Nixon declared a â€Å"war on drugs† in 1971. These groups maintain a wide range of associates, often related through family or regional ties to associates living in the United States. In my opinion this makes drug trafficking seem even more dangerous than it already is. It’s scary enough that people are sneaking drugs into our country, but knowing that they live here and not knowing where or who is even scarier. According to Mark Kleiman, â€Å"Most of the illicit drugs consumed in the United States come through or from Mexico, and virtually all the revenue of Mexican drug-trafficking organizations comes from sales to the United States†. What this says to me is that the United States has got to be at the top of the charts for the largest illegal drug trafficking market. This also means that not only are other countries at fault for bringing illegal drugs into our country, but the drug dealers and drug users that live in our country are making the United States seem at fault as well for keeping the system going. If you ask me, the president of Mexico should worry about the amount of legal drugs leaving his country and declare somewhat of a â€Å"war on drugs† like president Richard Nixon did in 1971. Although the war on drugs still continues, it at least makes it known that there is a solution in progress and sooner or later it will be in effect. â€Å"Mexico is the highway of the drug trade, not the destination-or so goes the conventional wisdom†, says Malcolm Beith. (Newsweek. New York: August 17, 2009 Vol. 154, Iss. 7) The United States has been fighting a losing war against drugs for decades. Budgets have increased dramatically over the last two decades and drug-related incarcerations consistently reach new records yet drug problems worsen: adolescent drug abuse is increasing, overdose deaths are at record levels, heroin and cocaine are cheaper, more pure and more available than ever before, and health problems related to drugs, especially the spread of HIV/AIDS are peaking. Meanwhile an expensive and ineffective policy is failing to work at a rate of speed that is sufficient enough. Drug problems can be reduced at less cost if we change course and start thinking and using strategies that actually work. At a time like this when the federal budget is limited programs need to be re-evaluated. Funding needs to go to programs that work. We need new ideas to save lives; we can’t afford to continue to be wrong. Police have done their jobs with record arrests, drug seizures and record incarceration of drug offenders yet drug problems continue to worsen. Something different must happen soon before this growing problem becomes too out of hand. According to the National Coalition for Effective Drug Policies, there are a number of different things that may have to happen to ensure a change. These are, shift resources into programs that work, make treatment available on request like any other health service, prevent drug abuse by investing in American youth and providing them with accurate information, focus law enforcement resources on the most dangerous and violent criminals, international drug control efforts should be demilitarized and focus on economic development, restore justice to the US justice system, respect state’s rights and allow new approaches to be tried, and make prevention of HIV and other blood borne diseases a top priority. This may seem like a lot on paper but in exchange for a better society it is no question that whatever needs to happen must happen quick. The war on drugs has now been going on for over forty years and our government still continues to fight hard to end it. As long as our government stays strong and continues to pursue this problem, I believe that it will one day happen. And possibly even more important than that, as long as we citizens of the United States stay strong and say no to drugs or drug activity, we will continue to grow as a country and make for a better place to grow and raise our children.

Wednesday, October 23, 2019

Friedrich Wilhelm Froebel Essay

Friedrich Wilhelm Froebel is said to be the â€Å"Father of the Kindergarten† for his huge involvement, and devoting his life to the development of a system of education for young children. In German, the word kindergarten means children’s garden, and he thought that this was best in the age of six and younger. He spent his entire life helping with the development of the young and early childhood development. Wilhelm Froebel was born in the Thuringia region of Germany. He had a childhood that was not so fond for remembrance because of how terrible it had been for him. This is what shaped him to be able to come up with the idea of kindergarten. Froebel lost his mother before the age of one, and this meant that he had been left with this father who had to take care of three boys because Froebel had two other brothers. Their father never had much time for any of them. As a boy that would be hard for any child, and this caused him to have to spend most of his time alone at his home. He spent a lot of that time in the gardens by his home, and would play there for most of the day (Coron 4). Exploring all day was what he loved to do the most, and this would make a major influence on what he would do for the rest of his life. He started teaching at a school when he was a young man at Frankfurt Model School, and this school was a school that was focused on the teachings of Johann Heinrich Pestalozzi, who was a very well respected teacher of his day. This school accepted poor children, and orphans. He believed that children needed to be involved in very active ways. As he left this school, he left it with his very hands on learning approach, and went to privately tutor children. The parents of the children that he tutored were very kind in giving him space in their garden to use to help teach the children. In 1837 Froebel founded his first school, and called it Kindergarten, or the children’s garden (Coron 4). This was a very exciting thing because before he opened this school, if you were under the age of seven, you did not attend school. At the age of seven, you then could go to school. Now that Froebel opened his school, children at the age of two were able to go to school (coron 3). Froebel was very free with the children, he allowed them to have a lot of activity time to be free with themselves, and figure things out. He believed that this was the best idea for them to have their own space, and time to figure out, as he did as a child. The mot that Froebel gave the children was a classroom, he believed that giving children a place to create, and imagine freely was the best gift anyone could have given them. Froebel wrote books, and in his book â€Å"Education of Man† he wrote â€Å"Play is the highest phase of child development-the representation of the inner necessity and impulse.† (coron 5). He thought that teachers should be friendly people who are helpers, not discip linarians. In his classroom there were blocks, pets, and finger plays. (Coron 5). He was inspirational to all. Froebel designed his classroom to have the following things as meeting a child’s needs; Physical activity, because it is important for a child to move, the development of sensory awareness and physical dexterity, creative expression, exploring of ideas, the pleasure of singing, the experience of living among others, and satisfaction of the soul. (Coron 4). These are all things we teach today to our children, and encourage our children to do. I think going back and looking at the bones of things could really help our society as a whole. Froebel was a very inspirational man to a lot of other great theorists such as Maria Montessori, who started Montessori schools. (Coron 2). I am in great belief of how much of a influence Froebel had on the early childhood education as a whole. He really was the father of kindergarten. I think that him having such an influence, really helped us shape the early education now. Froebel believed that â€Å"Humans are essentially productive, and creative† (coron 1.) I believe he is right, no matter what age you are, you are creative in your own way. It starts out at birth, even with how you relate to your mother, and father is creative, and how you interpret things as a young child is important. I know that if Froebel had not been involved, that what we call early childhood now, would not be the same as it is now. I am a firm believer in how he started to do things, letting children develop their own ideas about who they are, and how to do things in the world around them is really all a part of life.