Wednesday, July 31, 2019

My Goals and Walden Vision and Mission Essay

Being an Emergency Room nurse for 7 years and working as a traveling nurse in many different parts of the country has impacted my future and decision of going back to school. My personal career goal is to become a Family Nurse Practitioner (FNP) with specialization in pediatric critical care area, mainly pediatric emergency medicine. I have known since a very young age that I had a gift for working with children. My colleagues always call me the â€Å"pediatric nurse†. I feel it takes a very special type of person to work with pediatrics, and this is where my heart is. I chose to become a FNP to broaden my area of expertise and to leave multiple doors open to work in different areas. I have looked into numerous FNP programs across the country, but I was particularly looking for a program that would allow me the flexibility with my changing work schedule and lifestyle. A few co-workers of mine are currently going to Walden and informed me about the school and program. After reading the university and School of Nursing’s vision, mission, and goals, I knew that Walden would be right for me. I strongly agreed with many aspects of what Walden stood for as an overall school. I truly connected to Walden’s mission to provide â€Å"a diverse community of career professionals with the opportunity to transform themselves as scholar-practitioners so that they can affect positive social change† (Walden University, 2013a, para. 2). I value that Walden incorporates everyone’s background and experiences to better the learning of other students. Only being a nurse for 7 years, I have worked in over 17 hospitals and feel that I have gained a vast knowledge of how nursing differs in multiple parts of the country. I relate to Walden University’s statement of the diverse community of students helping to bring positive change including nurses from all aspects of healthcare. Furthermore, two of Walden’s University (2013a) outcomes that really caught my attention were to â€Å"demonstrate a commitment to lifelong learning† (para. 5), and also to utilize â€Å"knowledge to positively impact†¦ profession, communities, and in society† (para. 5). I want to continue to broaden my knowledge over the life of my career. I also believe in using this knowledge to positively impact others in all aspects of healthcare. Incorporating Social Change I agree with Walden University’s (2013a) view on social change that â€Å"Walden supports social change through the development of principled, knowledgeable, and ethical scholar-practitioners, who are and will become civic and professional role models by advancing the better of society† (para. 4). I plan to incorporate social change in my profession by applying my past work experiences and knowledge from school to become a better professional role model to my patients, co-workers and community. An example of one learning outcome for the Master of Science in Nursing is to â€Å"exhibit ongoing commitment to professional development† (Walden University, 2013b, para. 3). I am constantly trying to learn new ways to improve and better my knowledge and education. I recently obtained my Certified Emergency Nurse certification and will soon be taking the Certified Pediatric Emergency Nurse exam. I only hope that with my past experiences and my future knowledge gained at Walden University, I will be able to become a professional advocate and role model for the future of pediatric care and the patient population thereof.

Tuesday, July 30, 2019

Achievements of William Wilberforce Essay

William Wilberforce’s greatest and most important political achievement was his long but successful fight to end Britain’s involvement in the slave trade. He used his position as a spokesperson for the abolition movement and was the first member or parliament to raise the issue in the House of Commons. His abolition bill was finally passed by parliament in 1807, but his battle to change the law was not an easy one. Wilberforce tried and failed several times before the bill was finally passed. William achieved the abolishment of the slave trade, with the passing of the bill, in 1807. He remained concerned about the many people still held in slavery and carried on his campaign until the bill outlawing slavery in Britain and all its colonies was passed in 1833 – just days before he died. Wilberforce also devoted himself to other causes and campaigns such as the limiting of the hours children should work. Like Elizabeth Fry, he also fought for improvements in England’s prisons. He appealed for amendments to the poor law (to improve the conditions for the poor) and in 1796 became a founding member of the ‘society for the bettering condition and increasing comforts of the poor’. This organisation worked to reform parish relief and workhouses for the poor and improves their general living conditionsIn October 1784, Wilberforce went on a tour of Europe which changed his life and his future career. He travelled with his mother and sister in the company of Isaac Milner. They visited the French Riviera and enjoyed the usual pastimes of dinners, cards, and gambling. In February 1785, Wilberforce returned to England temporarily, to support William Pitt’s proposals for parliamentary reforms. He rejoined the party in Genoa, Italy, from where they continued their tour to Switzerland. Milner accompanied Wilberforce to England, and on the journey they read The Rise and Progress of Religion in the Soul by Philip Doddridge. The abolitionist Thomas Clarkson had an enormous influence on Wilberforce. He and others were campaigning for an end to the trade in which British ships were carrying black slaves from Africa, in terrible conditions, to the West Indies as goods to be bought and sold. Wilberforce was persuaded to lobby for the abolition of the slave trade and for 18 years he regularly  introduced anti-slavery motions in parliament. The campaign was supported by many members of the Clapham Sect and other abolitionists who raised public awareness of their cause with pamphlets, books, rallies and petitions. William’s best and most important political achievement was to abolish the slave trade in the British Empire. His abolition bill was finally passed by parliament in 1807, but his battle to change the law was not an easy one. Wilberforce tried and failed several times before the bill was finally passed. http://justus.anglican.org/resources/bio/214.htmlhttp://www.britannica.com/EBchecked/topic/643460/William-Wilberforcehttp://satucket.com/lectionary/William_Wilberforce.htmhttp://www.mylearning.org/jpage.asp?jpageid=690&journeyid=189

Monday, July 29, 2019

Incentive Plan Essay Example | Topics and Well Written Essays - 500 words

Incentive Plan - Essay Example 30% of them work in shift of six hours daily. The owner of the Restaurant does not have sufficient experience of running this food business and has sought for a consultancy on how to make as business a thriving and successful enterprise in the environment of stiff competition. Most of the young employees are either students at the university or they do this job as a part time in order to augment their incomes. The following incentives plans is submitted to the owner of Serina Restaurant in order to fulfill his requirements for a successful business: - All the newly recruited employees have to be trained in Kitchen hygiene minimizing the wastage of food stuff, presentation techniques to the customers, all possible good manners to attract and satisfy the customers requirement and preparedness to serve the customers at stretched hours. In order to evens full interest of employees in the business the performance bonus on monthly and quarterly basis has to be ensures so that employees can feel satisfied about their monitory benefits and should own the business to the core of their minds. Besides above employees have to be ensured extra monitoring rewards when the business yielded the profits higher then speculated slabs in this way the employees will put all their efforts to the keep the profits growing. The employees must feel themselves as a part of the Restaurant b

Sunday, July 28, 2019

Wall street journal Essay Example | Topics and Well Written Essays - 1250 words

Wall street journal - Essay Example health, a description of how UNCTAD, the WTO as well as other international trade organizations tend to influence trade, details on the five established levels of economic integration and their overall implications for the international marketing manager. In discussing the global economic environment, the author emphasizes on the importance of international trade theories. There are three key international trade theories; these are absolute advantage, comparative advantage and product life cycle. These theories generally emphasize that firms seeking to expand internationally need to ensure that they appreciate how their various international activities tend to match with a given country’s goals for international trade. The balance of payment is widely considered to be a lead indicator of the international economic health of a given country and as such, it may tend to have a direct influence on a firm’s expansion decisions. This is it essentially indicates how money is currently going into and out of a given country and whether this movement of currency has resulted into deficits or surpluses for the country. BOP data can aid firms in identifying their competitors as well as possible consumer locations and evaluate the possibility of trade restrictions. Government policy and trade is also another crucial aspect to be considered as firms are directly impacted by government in a wide range of areas such as tariffs and non-tariffs barriers. According to the authors, some of the government policies and trade that might impact a firm include specific duty, tariff engineering, ad valorem duty, exchange controls, quotas and non-tariff barriers (NTB’s). Institutions such as the WTO and UNCTAD had a great influence on trade policies. In this respect, the authors are keen on stressing that they can heavily influence a given firm’s global strategy. Whereas the WTO essentially serves to provide a crucial forum that can be used by countries for mediation,

Islam and Feminism Essay Example | Topics and Well Written Essays - 2500 words

Islam and Feminism - Essay Example Viewed as a Western ideology, feminism has both differences and similarities between Middle Eastern Muslim feminists and Western feminists, as well as third-wave feminism. Feminism is largely triggered by cultural and traditional factors and may not be fully compatible with Islam, and many groups are split as to whether Muslim feminists are trying to achieve human rights or their feminist rights like Western women. This paper will research and discuss these aspects of feminism by analyzing Duygu Asena, who was a Turkish Muslim feminist, hence the thesis: Feminism is a Western ideology and it is not compatible with Islam. Even though there is a group that understands and advocates the rights of Muslim women, there is another that hates feminism as an ideology of the Western world that is only concerned with female superiority. It is worth noting that feminism, in the sense of a Universalist faith, gained momentum in the 19th century, with the concept emerging from the Western world. I t has links with the French Revolution, during which women wanted to be considered as having the full status of citizens. In the Middle East and Muslim world in general, feminist movements appeared as women acquired literacy. Asena become an iconic as well as controversial figure in Turkey following her calls to women to escape from oppression, which she likened to a vicious circle. She urged women to fight for their equal rights with men and seek employment as a step towards freedom (Alemdar 1). In Turkey, being a predominantly Islamic nation, this was perceived by most, particularly the authorities, as a contradiction. Her role in feminism may generally have taken a diversion from what feminism in the Middle East has been focusing on. Feminism in the Middle East has basically had an emphasis on women’s role in Islam, targeting full equality in both private and public life for all Muslim faithful irrespective of gender. The rights they advocate for are founded on Islamic law , also known as Sharia. Feminist ideologies in the Middle East are inspired mainly by faith. Although Islamic feminists in the Middle East are fierce advocates for legislative interpretations and reforms that represent contemporary understanding of gender equality, they also embrace their Islamic faith strongly. However, more recently, Middle East Islamic feminists are also applying secular ideologies in their discourses, albeit strategically, having acknowledged the role played by Islamic feminism as an integral part of the feminist movement globally. This aspect creates the underlying similarity between the ideologies of the Middle East feminism and Western feminism movements. Feminism may be viewed as a global trend, but its uniqueness to every culture must also be appreciated. Western feminist’s ideologies are fundamentally different from those of the Middle East, and indeed most other parts of the world, because of the values on which the movements are formed. Being secu lar, most of the Western feminist ideologies stem from Western thoughts, principles and traditions. Western attitudes, which are mostly Christian and

Saturday, July 27, 2019

Library Science Essay Example | Topics and Well Written Essays - 750 words

Library Science - Essay Example Personal records should represent individuals as social agents and produce a proper representation of a character. Most archives have always focused on the collective aspects of individuals while neglecting the personal reflection. Personal archives demand an appraisal approach that differs from organization archives. Archivists should implement several considerations when conceptualizing records. Recording of personal archives involves documenting singular views of people and revealing their individual expression as opposed to group opinions. Archivists implement intimacy when designing personal records. Reflection of the intimacy comes from the organization and content of the records. The appraisal theory of personal archives emphasizes on individual character of creators (Hobbs, 2001). Shifting to personal archives will enable the institutions to provide a good representation of organizations by expressing individual-based views. It is imperative to capture the personality of individuals in archives. Hobbs, 2001, attempts to change views of archival appraisal by encouraging the professionals to value personal opinions in archives rather than inclination on collective expressions. The article describes the criteria that archivists should use in identifying collections. The setting of the project is based in Yale University Library. The article describes a project whose aim is Hyry, Kaplan and Weideman, 2002, propose a rational approach for collection of faculty papers in the university. The article uses Minnesota method to find its effectiveness in the case study. It proposes the need to develop proper approaches of collecting faculty papers by institutions of higher learning. It explains a project that the Yale University Library undertook in Manuscripts and Archives (Hyry, Kaplan & Weideman, 2002). The project involved application of the methodology from Minnesota Historical Society. The article illustrates an

Friday, July 26, 2019

FAMILIES IN CGLOBAL CONTEXT Research Proposal Example | Topics and Well Written Essays - 2500 words

FAMILIES IN CGLOBAL CONTEXT - Research Proposal Example In other words, families have become more pluralistic in recent times then ever before. Changes because of globalization mean the decline in the American families. Charles Murray, a reporter in Wall Street Journal directed illegitimate births as the most critical problem with more devastating affects than any crimes. American families have to confront challenges like high divorce rates, illegitimate births, pre-marital sex, decline in birth rates, loss of family functions, etc. The highest official divorce rates are in United States when compared to other developed nations. The high divorce rates are a threat to the continuation of familial institution. Children experience mental illness, perform poorly at their schools or display other signals of maladjustment. The sexual revolution is also the dominating factor that threatens the existence of American families because it promotes premarital sex and illegitimate births. Transformation in American society had been escorted with decli ne in fertility. Before the era of globalization, families were considered to be miniature society (Roopnarine, 2005). The shifting of functions from the family to other institutions has made it less important because of decrease in social responsibilities. With the advent of globalization, families in Mexico that were once customarily closely knit, appear to be dispersed, specifically among the young rural migrants who go to urban areas for better job opportunities. Meanwhile, the elders of the family are abandoned frequently to fend for themselves while the young male members of the family are lost in the intermediary regions of the urban centers (Grusky, 2001). The migrations of young people have made them abandon their cultural values for which they were known for. Also, there has been a decline in equally positive close relationship and bond that existed between the elders and the youngsters of

Thursday, July 25, 2019

Customer Relationship Management For The Birmingham New Library Essay

Customer Relationship Management For The Birmingham New Library - Essay Example These strategies are vital for assessing both the internal and external environments, which are favourable or unfavourable to the successful business activities. The researcher incorporated varied marketing strategies vital for enabling the Birmingham Library to accomplish their goals successfully. The researcher provided varied recommendations which the company should take into considerations in order to achieve successful business performance. The action plan was formulated that attempted to reveal the way the objectives of the company will be achieved. Lastly, the conclusion was included that provided a concise summary of the market report. Customer Relationship Management for the Birmingham New Library Introduction The customer relationship management (CRM) has evolved as an effective approach for enabling companies to interact with their customers effectively in order to achieve their business goals successfully. CRM is a business strategy that enables the company to understand the needs of the clients, retain customers through customer experience, reduce management costs and increase profitability (Kangal, 201, p. 45). Senn, Thoma andYip (2013, p.28) defines CRM strategy as the management process accountable for predicting, identifying customers and satisfying their demanding needs for shared benefit. The CRM strategy integrates sales, services, technology solutions; thus it attempts to bring together every part of the business, which touches the client in order to achieve effective business organizational performance. The Birmingham Library is a new library, which is under construction in the Birmingham centre in England; thus employing effective strategy will enable the company to achieve their intended goals. Therefore, employing CRM strategy will be an effective means that will enable the company to assign, create and manage customer requests; thus contributing to effective business performance. The Birmingham Library will employ CRM strategy because this approach often integrates social media services in order to communicate, share customer opinions and experiences; thereby, building up successful customer relationship. Key Objectives The market report aims to examine the marketing strategies vital for increasing performance in the Birmingham Library. It analyses the internal and external factors that may

Wednesday, July 24, 2019

Arguing from Multiple SOURCES- Position Paper Essay

Arguing from Multiple SOURCES- Position Paper - Essay Example â€Å"There is yet one more notable thing about this class that I would like to mention. You have helped to make Middlebury a more diverse and inclusive place than it was four years ago – which brings me to the theme I particularly want to discuss this afternoon. Your class is statistically the most diverse, and the most international, ever to graduate from Middlebury. That has certainly affected – and I would say greatly improved – the education you have received here.† Both McWhorter and Liebowitz agree that diversity is a positive step to improving the lives of many. So why, therefore, do some universities use racial discrimination in the selection of students; accepting only the bare minimum of non-whites to the institution in order not to appear racist; instead of using SAT scores and grades as meritocratic tool to admit students. Students do not just go to university in order to forge a well educated, national elite (McWhorter pg.438, ch.4), but also to enrich their own lives, to have a once in a lifetime experience where groups of people of relatively the same age can come together and socialize and form bonds as well as improve and change the order of thinking. â€Å"Since my undergraduate days, however, elite universities have come to mean something much different when they speak of â€Å"diversity†: having as many brown faces on campus, regardless of standards.† In both cases there would be racial discomfort, with the minority only interacting within their own community and not socializing with the larger university community. This would also cause segregation inside and between fraternity and sorority houses. If universities were to remove the diversity preference part of their recruitment program they therefore would have to admit students according to intellect, for example: SAT results and grades instead even if this, as much as it proves valid, has the problem that their past

Tuesday, July 23, 2019

Cultural Background and Its Effect on American Indian Authors Essay

Cultural Background and Its Effect on American Indian Authors - Essay Example American Indian Authors 1. Alexie The American Indian author Alexie Sherman was conceived in a small town, in Wellpinit, Washington. His year of birth was in 1966. He has received innumerable awards for his legendary work and printed a miscellany of poems. Alexie has written and critically analyzed the influence of cultural themes impacts to the society. He profoundly supported the efforts the Indian Americans put to improve their social status in America. Alexie in one of his poems seriously criticized the racial behavior of the American forks towards the Indian Americans. His perception was that the Mexicans who were from the Indian American descent had every right to reside in America. The Americans in the state of Arizona thrived in pushing the Mexicans to migrate from their considered territory. He considers his banishment He considers his together with the other Indian banishment from Arizona to be racially and politically instigated, since the laws were in support of the racis ts move. The officials themselves were the ones encouraging racism with the laws they were enacting (McClinton-Temple & Alan, 151). Alexie has diverse views concerning cultural interpretation. In his perceptions, individuals should not negatively view others due to the disabilities resulting from natural causes. In his novel The Absolute True Diary of a Part Time Indian he states the difficulties experienced by physically challenged individuals in adapting to life, and meeting the societal expectations. He views cultural awareness of the society to be unfair in judging the physical disabilities of individuals. The book narrates the example of Arnold who is ill-treated by others for his physical disabilities which he had, as a result, of the surgery he experienced to get rid of the excess fluid that was in his brain. Secondly, Alexie tells that cultural experience demands that their kin members have the responsibility of rescuing other tribal members from what he considered to be cul tural preservation were the only way of ensuring that moral developments did not impede the social set up of the minority communities. He acknowledges that at times cultural perceptions could be dangerous as it may twist to be an obstruction to ones freedom (McClinton-Temple & Alan, 88). Alexie uses the style of pulp-fiction to illustrate the social issues prevalent in the modern and ancient societies. He depicts the social issues in his book Indian Killer. The book brings out his views on racism when he majors the story around an Indian John Smith adopted by white parents. The book points out the racist nature of the whites towards the Indian culture. The behavior of John’s foster family is a perfect example of discrimination that characterizes the white’s environment. Alexie cultural perception regarding assimilation to other cultures is that it may result to rejection, since the individuals from the native’s background will rejects the assimilated person. He believes that materialism in America has been denied to the Native Americans. The American Indians were separated into numerous groups away from the European contact. Alexie’s Influence into Writing Alexie was influenced by the urge to sell the Indian culture abroad, and also to lay out a perfect example for the young Indian youths. He wanted to teach the whites of the Indian moral and social obligations. He was also motivated by the need to find answers regarding the cultural percepti

Monday, July 22, 2019

Traditional or Passive Education by John Dewey Essay Example for Free

Traditional or Passive Education by John Dewey Essay A Canadian politician, Harold Taylor, once said Most of the important experiences that truly educate cannot be arranged a head of time with any precision. This quote imitates the lessons explained by John Dewey in his 1938 book Experience and Education; moreover, he refers to how ineffective traditional education can be opposed to progressive education which is based off personal experience and understanding of useful interactions. Traditional education is based off the idea that a teacher lectures students about subjects that do not have any bearing towards them or understanding of the subject. Information is almost being fed to the developing minds and this information is being taught by an individual who is teaching off their own experiences as well as the written criteria. Books, especially textbooks, are the chief representatives of the lore and wisdom of the past, while teachers are the organs through which pupils are brought into effective connection with the material. Teachers are the agents through which knowledge and skills are communicated and rules of conduct enforced. (18) This quote reflects that the information in a text book can only do so much and teachers are the ones who are supposed to fill in the gaps and explain why things happen the way they did. Traditional education is seen as one sided and John Dewey did not agree with this being the best method of learning for developing minds. An example would be a teacher explaining how important it is to recycle and use less paper products to save trees, but students have no idea how many trees are being torn down or what they are doing by recycling. Recycling means nothing to the students because they have no experience with recycling. This method of teaching can be inaccurate due to the quality of the teacher or the one sidedness of the teachers experience. John Dewey believed progressive education is a better method of learning. Progressive learning is learning from ones own experiences. Students would retain information from their own experiences and then thirst for knowledge about those experiences they have encountered. As an individual passes from one situation to another, his world, his environment, expands or contracts. He does not find himself living in another world but in a different part or aspect of one and the same world. What he has learned in the way of  knowledge and skill in one situation becomes an instrument of understanding and dealing effectively with the situations which follow. (44) This type of learning helps students relate past experiences to their education. Once again going back to recycling, if you show a student and explain how many North American forests are being cut down for lumber and paper products and show the complete process they will be aware of how important our earth is to our survival; therefore, the students will now want to recycle actively. Progressive learning is based off students first hand experiences and if they can experience or witness the act or process they have a much better chance of retaining the information. In summary traditional learning is seen as the biggest form of education and can be inaccurate do to the level of instructor; however, John Deweys progressive model of learning is valuable to all types of education because an instructor does not even have to be present for a student to learn because they have past encounters to refer to and make decisions based off those. Experience and Education made good observations; consequently, experiences in life are the best forms of education. Work Cited Dewey, John (1938). Experience and Education. New York: Macmillan Publishing Company

Integrative Network Design Essay Example for Free

Integrative Network Design Essay Riordan Manufacturing is a global plastics manufacturer. Their products include plastic beverage containers produced in Albany, Georgia, custom plastic parts produced in Pontiac, Michigan, and plastic fan parts produced in Hang Zhou, China (UOPX, 2013, p. 1). Riordan’s research and development is in San Jose, California (Corporate Headquarters). Riordans main customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (UOPX, 2013, p. 1). Team B and associates were task by Riordan to analysis Riordan’s WAN and add a wireless Network to Riordan Manufacturing, also to analyze and update Riordan’s Internet security in each of the locations and provide documentation for security policies and procedures. What is a wireless network and what are the benefits of going wireless. With the current wireless technology, Wi-Fi is everywhere; one can connect to the Internet by going to coffee houses, airports, hospitals, hotels, and homes. Businesses can stay connected to their coworkers and customers without being tied to their office desk by using wireless networks and Wi-Fi hotspots. Wireless local-area network (WLAN) allows personnel to connect to their computers without wires or cables. A wireless network uses radio waves to connect and communicate within a certain area to mobile devices. If someone needs a document while attending a meeting in the conference room or one needs to access the inventory list from the warehouse. A wireless network allows one to access the company’s Internet and retrieve documents on their mobile devises without leaving the meeting or going back to their office. Benefits of Wireless Networking The benefits of company’s going wireless include convenience, mobility productivity, and ease of set up, scalability, security, and cost. Mobile devices in today’s society are equipped with Wi-Fi technology and able to connect to a WLAN. Convenience: employees can access securely to their company’s network resources from any location within their coverage area. The coverage area normally is the office building but is able to expand to other company facilities. Mobility: employees are connected to the network when they are not at their office desk. People in meetings can access documents and applications with their mobile devices. Salespeople can access the company’s network from any location. Productivity: employees accessing their documents and applications are the key to get the job done, and it encourages teamwork. Customers also have access to the company’s Internet using a secure guest access to view their business data. Ease of setup: business do not have to run cables through the facilities, installation is quick and cost-effective. WLAN’s make it easier to for hard to reach locations to have connectivity to the network. Scalability: with businesses expand, company’s need to expand quickly along with their network. Wireless network expands with the current existing equipment. Security: the success in controlling and managing secure access to a business’s wireless network is very important. Security managers must be knowledgeable with the advanced Wi-Fi technology and needs to provide vigorous security protections to protect their data, but only giving permission to who need access. Cost: businesses that operate with and WLAN, reduces wiring costs during office upgrades. How Riordan Manufacturing can use a wireless Networking Company’s using a wireless networks are boosting productivity and encourage data information sharing. Employees can wander throughout the building using mobile devices and still have constant access to documents, e-mails, applications, and other network resources required to do their jobs. Employees using wireless LAN can travel throughout the office building without losing Internet connectivity. Employees having a team meeting or in conference can have the most updated communications, including all documents and applications on the network. Voice over internet protocol (VOIP) technology; also have roaming capabilities in their voice communications. Improved responsiveness Customers require rapid replies to questions and concerns. A WLAN improves customer service or relationships by connecting employees to the data information. Better access to information WLAN’s allow business’s access to all areas in the building without any connectivity issues. WLAN’s are very effective in warehouses, manufacturing plants, and distribution centers. Employees can access inventories and providing accurate figures in real time to management. Easier network expansion Businesses expanding and hiring new employees are easily added the network by the network administrator. Office furniture is easily moved and employees are added or removed to/from the network without issues. Enhanced guest access WLAN’s allow businesses to provide secure wireless access to the Internet for guests or visitors. Hospitals, restaurants, hotels, coffee shops, and other public businesses provide WI-FI to all mobile devices. The IT administrator will need to verify that all the desktop PCs already have the integrated Wi-Fi hardware installed or the PC’s will need to upgraded. Switching to a WLAN does not mean switching changing from ones existing wired network. It is common for businesses to have a wired-wireless network that provides wireless capabilities to conference rooms or in new expanded office spaces. WLAN’s also supports VOIP for the conference rooms. IT managers should be aware of some of the technical aspects of WLAN’s. The WLAN network covers approximately about 3,000 square feet. The range of a wireless router could be affected by walls and cubicles, and the signals are hard to be received in elevators. Other issues IT managers should be made aware of include: †¢Wireless router is shared between 15-20 users per each access point for data, 8-12 for VOIP †¢VOIP quality, wireless routers need to be installed closer together †¢Routers have enhanced coverage when they are installed on the ceiling. Security policies and procedures in a WLAN are very important to consider when establishing a wireless network. Security policies that need to be considered: †¢Data encryption †¢User authentication †¢Secure access for visitors †¢Control systems. To prove that the design meets the data rate requirements, you need to calculate the required data transfer rate for all your networks. Backups over the network must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. To calculate the data transfer rate, use this formula: Required network data transfer rate = (amount of data to back up) / (backup window) the chart below shows the typical transfer rates of some of the more resent network technologies. Table: Network data transfer rates (PowerTech. com, 2010, p. 1) Network TechnologyTheoretical gigabytes per hourTypical gigabytes per hour 100BaseT (switched)3625 1000BaseT (switched)360250 10000BaseT (switched)360025 Here is an example of how to calculate the required data transfer rate for your network: (Symantec Corp, 2013, p. 1) Use the following assumptions: †¢Amount of data to back up = 500 gigabytes †¢Backup window = 8 hours †¢Required network transfer rate = 500 gigabytes/8hr = 62. 5 gigabytes per hour Solution 1: Network Technology = 100BaseT (switched) Typical transfer rate = 25 gigabytes per hour A single 100BaseT network has a transfer rate of 25 gigabytes per hour. This network cannot handle your required data transfer rate of 62. 5 gigabytes per hour. In this case, you would have to explore other options, such as the following; backing up your data over a faster network (1000BaseT), large servers to dedicated tape drives (SAN media servers), SAN connections by means of SAN Client. Performing off-host backups using Snapshot Client to present a snapshot directly to a media server that backups during a longer time window, performs your backups over faster dedicated networks such as solution 2: Network Technology = 1000BaseT (switched) and Typical transfer rate = 250 gigabytes per hour Based on the above network table; a single 1000BaseT network has a transfer rate of 250 gigabytes per hour. This network has much more capacity to handle the backups for this system. To build a backup system for you network; you complete the following. The data transfer rates for your networks must be calculated in order to identify your various problems and potential bottlenecks. (The latest breaking technological solutions for dealing with multiple networks problems and potential bottlenecks are readily available for installation. ) Once the data transfer rates required for your backups are calculated, the rate of transfer must be able to achieve a complete backup of all your data within the allotted time. Then you must determine the most efficient type of tape or disk technology is available to meet your company’s specific needs. Determine the specific number of tape drives needed and the required data transfer rate is going to be for your network. To set the backups needed for your network, (as before) you must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. Then determine the size of your systems ‘Netback up’ image database, exactly how much disk space will be needed to store your entire Netback up image database, the size of the ‘Netback up relational database’ (NBDB), and the required space that will be needed to handle the NBDB. Then calculate how much media will be needed to handle both full and incremental backups, plus you must determine how many tapes will be needed not only to store, but also to be able to retrieve and keep your backups. The next step will be to estimate the size of the tape library your network needs to store your backups and if you need to use robotic library tape slots in order to store your backups. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the  authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also become disgruntled at the heavy security policies making their work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. Mobile phones are another threat to Riordan Manufacturing, because there are people that log on to the companies using their phones and many times they forget to close the account. By leaving this account open the company is vulnerable to hackers getting to the companies account and doing a great deal of damage. To prevent these types of things these part will have to be covered in Training through the company and the company will have to have all of their employees with a certain access to have a company phone and have them use only that phone to access the account if necessary. The phones will be protected at all times to make sure that no hacker is getting in to the account through these phones. Also if for some reason the employee wants to take action against the company and give secret information through the phone this should also be known through the company. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index. Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information. Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. All of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The â€Å"SOX requires publicly traded companies to secure information systems to the extent necessary to ensure the effectiveness of internal controls over financial reporting. † (PowerTech. com, 2010, p. 1) Companies must now take into consideration that IT well trained and educated security support teams must be brought into the process to provide protection any leaks or intrusion in order to meet the compliance deadlines. â€Å"Section: 404 of the Sarbanes-Oxley Act have had the highest impact on Information Technology and Security. The IT related issues that cause problems for SOX compliance in the context of Section 404 are generally related to access control of system users. † (PowerTech. com, 2010, p. 1) Without adequate access controls in place, users can perform functions/activities that are in conflict with their job responsibilities are to modify/corrupt financial data. Controls to initiate/record unauthorized transactions commit fraud and cover their tracks. The Sarbanes-Oxley Act in some ways comes off very vague and open to interpretation leaving companies unsure how to handle compliance. The best way to start is to identify significant and potential high risk problems when going through the process, identifying specific systems, data processors, and control links whose integrity could be compromised. Once these problems within the network have been identified, effective controls must be implemented to address these deficiencies, to record their regularity and frequency, and to evaluate them to ensure that the proper set of controls is kept in place protecting system integrity. The Bill was introduced (and named for) sponsors; Senator Paul Sarbanes (D-MD) and U. S. Representative Michael G. Oxley (R-OH), as a reaction to a large number of various scandals that had exposed excessive wrong doing in the corporate world, costing investors billions of dollars and many companies to collapse. â€Å"The act contains 11 titles, or sections, ranging from additional corporate board responsibilities to criminal penalties, and requires the Securities and Exchange Commission (SEC) to implement rulings on requirements to comply with the law. † (SOX-online, 2012, p. 1). The Constructing new data base network for Riordan Manufacturing will have to take all SOX rules, regulations and requirements  into consideration at each step along the way in order to stay within the guidelines of the law. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also become disgruntled at the heavy security policies making their work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index. Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information. Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. All of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The importance of explicit enterprise security policies and procedures are necessary in a structured network as we currently have in Riordan Manufacturing Inc. and in any other establishment whereas you depend on sending and receiving data over the internet. If no security policy boundaries would be taken seriously, each and one of us would be leaving ourselves vulnerable to malicious computer hackers, corrupted information sent on emails such as; Trojan horses, viruses etc.. As a growing company, we want to protect and ensure that personal information is not compromised and that company policy security awareness procedures are taken. Once a year all employees at Riordan will be required to complete an online assessment of standard procedures for computer use at the facility. If there are any suspicious cyber crime activities occurring, it shall always be reported immediately to the corresponded employee’s supervisor. Mobile work stations have been limited to company issued wireless devices inside the premises, excluding personal cell phones, smart phones, Mp3 players, portable media players, Laptops, tablets, USB drives or external hard drives. All data is classified and is set into four different categories; restricted/proprietary, confidential, sensitive and public. Employees must act appropriately, to prevent unauthorized disclosure of information unless if you have been authorized to access it, if it is utilized as a legitimate business need or shared with other company employees, then it is considered acceptable to the Riordan security policy. Our proposal of upgrading the current switches to the 24 port Meraki Cisco switch and the addition of MR24 Cisco access points will benefit the security policy of networking operations. The Network Security options, Firewalls (2013) website, both pieces of hardware’s have built in firewall management which will assist the network from intruders degrading our system. The purpose of a firewall is to secure the in house network and from non-trusted networks, by blocking content off the internet. Also knows as a choke point, a firewall provides a particular point of contact, enabling users to browse the internet from approved resources located internally or outside the network. It appears as a solitary address to the open public, providing the user access to the non-trusted network through SOCKS, proxy servers and from network address translation (NAT), while keeping the internal networks address private. This technique minimizes impersonating or cyber attack less likely because the firewall maintains the privacy of your internal networks (Network Security Options, Firewalls, 2013). Although firewalls can be limited to what it can protect, such as files that contain file transfer protocol (FTP), telnet amongst the other possible ways of data corruption but it will not necessarily protect them depending on specific destination of the information being transmitted and if the user decides to encrypt the data. When using wireless technology, this can bring several risks to the Network, because hackers can access any unencrypted wireless devices or access points. Having a Wi-Fi protected network will minimize the chances of anyone breaking into the system.

Sunday, July 21, 2019

Synthesis and Characterization of a New Aromatic Diamine

Synthesis and Characterization of a New Aromatic Diamine The synthesis and characterization of a new aromatic diamine, 2,5-bis-(aminopyridine-2-yl)-1,3,4-oxadiazole (BAPO), containing pyridine and 1,3,4-oxadiazole moieties has been reported. An organophilic clay has been obtained via cation exchange reaction between the hydrochloride salt of BAPO and sodium montmorillonite (Na+-Mt‎). Basal space and thermal stability of this new modified organoclay were studied by wide-angle X-ray diffraction (XRD) and thermo gravimetric analysis (TGA) techniques. High thermal stability of BAPO-Mt in compared with conventional montmorillonite modified with aliphatic long chain surfactants is shown. A series of organoclay/polyimide nanocomposites (CPN) consisting of BAPO and benzophenone-3,3,4,4-tetracarboxylic dianhydride (BTDA) were also obtained by an in situ polymerization reaction followed by thermal imidization. Structural properties and thermal stability of the obtained CPNs were studied by XRD, TGA, differential scanning calorimetry (DSC), and differential thermal analysis (DTA). The glass transition temperature (Tg) is increased with respect to pristine PI for CPNs 1-3 wt.%. At high clay concentrations, the coagulation of organoclay particles results in a decrease in Tg. Based on the obtained results, CPN 1 wt.% showed the most improved thermal properties. 1. Introduction Polyimides (PI) have gained interests in both academia and industries due to their excellent thermal stability, good resistance toward organic solvents, and improved mechanical properties [1]. They have been have been applied widely in the areas of modern industries [2]. These super engineering plastics have found their way into aerospace, electrical/electronic applications [3], gas separation [4], cell processing, biochip design [5], coating, and composites [6-7]. However, some difficulties come from rigidity and poor solubility in processing of most PIs. Introduction of flexible ether and ester linkages between the aromatic rings of the main chain is an effective way to make these polymers more pliable [8]. In this regard, preparation of poly(ester-amide-imide)s [9], poly(ether amide imide)s [10], poly(amine–amide–imide)s [11] and poly(amide-imide)s [12] have been reported. It was shown that, the incorporation of rigid heterocyclic rings in the main chain of a synthetic polymer could provide excellent thermal and thermo-oxidative stability, which should be useful to decrease negative effects resulting from the introduction of flexible linkages mentioned above. Pyridine nucleolus, as a rigid symmetric aromatic ring, would contribute to the thermal stability, chemical stability, and retention of mechanical property of the resulting polymer at elevated temperature. Furthermore, the polarizability, resulting from the nitrogen atom i n the pyridine ring, could be suitable to improve their solubility in organic solvents [13]. Fujigaya et al. reported among the variety of polybenzimidazole derivatives, the pyridine-containing polymer is known to possess a better mechanical properties and significantly higher proton conductivity due to its higher acid doping ability [14]. On the other hand, it was known that, the thermal stability of polymers can be raised by the incorporation of 1,3,4-oxadiazole moieties into the polymer structure [15]. The outstanding thermal stability is ascribed to the electronic equivalency of the oxadiazole ring to the phenylene ring structure, which has high thermal-resistance [16]. Combination of inorganic materials with organic polymers is one the exciting topics that has been receiving increasing research attention during recent decades. Nanostructured hybrid materials showed wide potential applications in various areas such as in coatings [17], catalysis [18] and biotechnology [19], shape memory polymers [20], and fuel cells [21]. Organically modified sodium clay (Na+-Mt) has improved compatibility, hence higher efficiency of reinforcement, with the polymer matrix. It has been known that, the dispersion of small amounts reinforcing organoclay mineral with high-aspect ratios, such as layered silicate clays, can significantly enhance the properties of PI and its precursor poly(amic acid) (PAA). These improvements can include solvent resistance [22], ionic conductivity [23], enhanced fire retardance [24], increased corrosion protection [25], increased strength and heat resistance [26], decreased gas permeability [27], high moduli [28], and dielectric properties [29]. The enhancements in thermal and mechanical properties of polymer/clay nanocomposites (CPNs) are due to the lamellar structure of montmorillonite those results in high in-plane strength and stiffness, and a high aspect ratio [30-31]. The chemical structure of Na+-Mt consists of two fused silica tetrahedral sheets sandwich an edge-shared octahedral sheet of either aluminum or magnesium hydroxide [32]. The Ca2+ and Na+ ions adsorbed in the interlayer region are exchangeable with organic cations such as long chain alkyl ammonium [33-34]. These organoclays as compatibilizer may be suitable for polymer blends prepared with a low processing temperature. They have low thermal stability and start to decompose around 200 °C, whereas the melt-processing temperatures of most polymers are typically above 200 °C [35]. Furthermore, the preparation and processing of PI/organoclaynanocomposites is carried out at high temperatures, and the thermal decomposition of the long carbon chain of quaternary ammonium salts is inevitable. Thermal decomposition during processing can initiate/catalyze polymer degradation, in addition to a variety of undesirable effects during processing and in the final product [36-37]. To avoid the detrimental effects, modification of clay minerals with imidazolium [38] and phosphonium [39] salts have been noted. As another approach, using of aromatic amines and/or diamines, as swelling agents, has also been considered in the preparation of polyamide and polyimide (PI) nanocomposites [31, 36, 40-41]. Recently, we reported the synthesis of a new aromatic diamine, 2-(5-(3,5-diaminophenyl)-1,3,4-oxadiazole-2-yl)pyridine (POBD). Thermally stable poly(amide-imide)s [12], polyamides [42], polyimides [43], and PI/Clay nanocomposites [44] have been prepared using POBD. We noticed to the metal coordination ability of the 1,3,4-oxadiazole ring adjacent to 2-pyridyl group in designing POBD, Scheme 1. The ability of prepared hybrid materials for removal of the Co(II) ion have also been investigated [41, 45]. Thus, as part of our continuing efforts on the synthesis of polyimides with high thermal stability and metal ions coordination ability, in this work, we wish to report the synthesis and characterization of another designed aromatic monomer containing pyridine and 1,3,4-oxadiazole moieties. In this work, BAPO has been synthesized in four steps starting from 2-amino-6-methyl pyridine (1). The dihydrochloride salt of BAPO was used as a swelling agent for the modification of Na+-Mt. The novel modified organoclay (BAPO-Mt) was used in the preparation of PI/organoclay hybrids of BAPO/BTDA. Thermal stability of BAPO is higher than those for commonly used quaternary alkyl ammonium salts. Therefore, thermal degradation will be prevented during heat treatment needed for curing of poly(amic acid)s. The obtained films were studied by FT-IR spectroscopy, XRD, and SEM. The thermal properties were examined by TGA-DTA and DSC. 3. Results and discussion 3.1. Preparation of BAPO-modified organoclay The new diamine, BAPO 5, was synthesized in four steps. 2-Amino-6-methtypyridine 1 was acetylated with acetic anhydride, oxidized with potassium permanganate, and then alkaline hydrolyzed to give 6-amino-picolinic acid 4 [47]. Cyclo-dehydration to 4 with hydrazine sulfate in the presence of P2O5 in the mixture of POCl3 and concentrated phosphoric acid gave BAPO 5 in overall 20.0% yield (Scheme 2). The chemical structure of BAPO 5 was confirmed by FT-IR, 1H NMR, 13C NMR and mass spectrometry techniques. In the FT-IR spectrum, amino stretching vibrations observed at 3332 and 3202 cm-1. Vibration of C=N bonds of pyridine and oxadiazole rings appeared at 1575 and 1653 cm-1, respectively. The absorption band with medium intensity observed at 1273 cm-1 is related to vibration of C-N bond on the pyridine nucleolus. The amino protons also merged to appear as a broad singlet centered at 6.32 ppm in the 1H NMR spectrum. This peak was disappeared upon addition of D2O and a new peak related to HOD was appeared at 3.90 ppm. In the 13C NMR spectrum of BAPO (5) totally 6 signals observe that it is compatible with the desired structure, Figure 1. Molecular ion peak was observed as base peak in the mass spectra of BAPO, Figure 2. The ‎fragmentation pattern is shown in Scheme 3.‎ To prepare the organophilic clay (BAPO-Mt) via a cation exchange reaction, the Na+-Mt was initially mixed with a hydrochloride solution of the intercalating agent, BAPO 5. Scheme 4 presents a schematic drawing of the modification step. 3.2. Characterization of BAPO-Mt organoclay Figure 3 shows FT-IR spectra of BAPO, sodium montmorillonite, and BAPO-Mt. The spectrum of organoclay exhibits the characteristic bands of Mt and BAPO: N–H stretching at 3330 and 3206 cm-1, –C=N– stretching of the pyridine nucleolus at 1652 cm-1, –C=N– stretching of the oxadiazole ring at 1546 cm-1, stretching vibrations of the double bonds of the aromatic rings in BAPO at 1627 cm-1, and typical bands of montmorillonite at 1033 and 525 cm-1. Figure 4 presents wide XRD of BAPO-Mt and pristine clay. A strong peak is observed at 2à ¯Ã‚ Ã‚ ±Ãƒ ¯Ã¢â€š ¬Ã‚  = 8.95 ° for Na+-Mt, corresponding to the (001) plane, indicating that the interlayer spacing (d001-spacing) of Na+-Mt is about 1.0 nm. The interlayer  ­d001spacing can be calculated from peak positions using Bragg’s law: nÃŽ » = 2d sin ÃŽ ¸, where ÃŽ » is the X-ray wavelength (1.5418 Ã…). The reà ¯Ã‚ ¬Ã¢â‚¬Å¡ection peak of (001) in BAPO-Mt shifted to a lower diffraction angle at 6.90 °, corresponding to the larger d001-spacing (1.28 nm) than Na+-Mt. The replacement of sodium ions with the ammonium ions of BAPO seems to increase the d001-spacing of layered silicate. In general, a larger d001-spacing should assist the intercalation of the polymer chains and should also lead to better clay dispersion within the polymer matrix. Table 1 summarizes the diffraction peaks and the calculated d001-spacings of Na+-Mt and organophilic clays. The thermal treatment of pristine clay under nitrogen consists of two main stages. The first stage occurs from ambient temperature to 200 °C. In this step, free water molecules physically adsorbed on the external surfaces of crystals along with the hydrating water molecules around the exchangeable cation located inside the interlayer space are removed. The second stage is attributed to the dehydroxylation of the structural silanol units of the montmorillonite in the range of 200-700 °C. The temperature intervals of dehydration corresponding to these processes as well as the amount of water released depends on the nature of adsorbed cations and the hydration of the surface [50]. On the other hand, organically modified montmorillonite shows a four-step decomposition process. The vaporization of free water takes place at temperatures below 200 °C, while the surfactant’s decomposition occurs in the temperature range of 200–500 °C. Dehydroxylation of the structural s ilanol groups related to aluminosilicates occurs between 500–800 °C. The last step is the decomposition associated with the combustion reaction between organic carbon and inorganic oxygen [51]. The amount of loaded diamine can be estimated by TGA measurement. Figure 5 shows the TGA curves of the Na+-Mt, the BAPO-Mt, and BAOP. Pristine Na+-Mt contains a large quantity of water due to the intercalation of hydrated sodium (Na+) and hydrated calcium (Ca2+) cations inside the clay layers. These physically adsorbed water molecules are removed in the range from ambient temperature to 230 °C (ca. 3.81% weight loss). The virgin clay also undergoes a 6.36% weight loss within 230-598 °C related to dehydroxylation of the structural silanol units. Whereas, under the same condition BAPO-Mt shows a weight loss of about 10.6% within 230-598 °C related to surface dehydroxylation and thermal decomposition of the surfactant molecules within the organoclay galleries. The difference betwe en weight losses of Na+-Mt and BAOP-Mt within 230-598 °C (Δm = 4.24%) can be attributed to the weight of the loaded diamine. Therefore, the amount of loaded diamines (42.4 mg/g of clay) can be calculated from Eq. (1). Surface energy of Na+-Mt is lowered by the presence of the aromatic ammonium ions within the interlayer spacing. Therefore, the hydrophilic silicate surface transforms to an organophilic one. As seen in Figure 5, the thermal decomposition of the surfactant molecules occurs in two stags at 260 °C and 370 °C. These temperatures are higher than those of decomposition temperature of aliphatic long chain surfactants commonly used for modification of Na+-Mt, which occurs below 200 °C [52]. This study suggests that the BAPO-Mt can be used in the preparation of PI nanocomposites that need to be cured at elevated temperatures. The images obtained by SEM demonstrate significant changes on the surface of the BAPO-Mt. The Na+-Mt particles seem to be stuck together due to moisture (Figure 6a-b), but the organoclay particles are clearly separated in organically modified clay (Figure 6c,d). It seems that the hydrophilicity of the clay is reduced after modification reaction. This study is in accordance with TGA results. 3.4. Polymer Synthesis The present work reports the preparation and characterization of new polyimide CPNs. BAPO-Mt is used as the surfactant at different concentrations. Scheme 5 depicts the synthesis of the PI from the reaction of BAPO and BTDA through thermal dehydration of the poly(amic acid) intermediate. The FT-IR absorptions appearing at approximately 1786, 1727, 1366, 1094 and 722 cm-1 (Figure 7) indicate the presence of imide functional groups in the polyimide film [53]. The polyimide is also characterized by elemental analysis. The observed and calculated values for CHN analyses are in good agreement. Solubility test results (Table 2) show that the obtained PI is soluble in dimethylsulfoxide (DMSO) and concentrated sulfuric acid at room temperature and in other polar aprotic solvents such as, dimethylacetamide (DMAc) and N-methylpyrrolidone (NMP) at boiling temperature of the solvents. For this experiment, about 0.01 g of the polymer sample was examined in 1 ml of solvent at room and at boiling temperature of the solvents. The inherent viscosity of the 0.125 and 0.25 g/dL solutions of the polyimide were 0.36 and 0.39 dL/g, respectively (measured at 25 ± 0.5 °C in DMSO). 3.5. Preparation and characterization of PI/BAPO-Mt CPNs The preparation and characterization of polyimide CPNs with different concentrations of organoclay are also investigated. Scheme 6 shows a procedure for the preparation of PI/BAPO-Mt CPNs by thermal imidization according to method described earlier [44-45]. Figure 8 presents XRD curves of BAPO-Mt, and PI films with various organoclay contents. The lack of any diffraction peak in the XRD patterns of CPNs 1 and 3 wt.%, at 2à ¯Ã‚ Ã‚ ± = 2-10 °, can be attributed to the possible formation of nanocomposites of exfoliated structure. A wide and week diffraction peak at 2à ¯Ã‚ Ã‚ ± = 6.62 ° was displayed by CPN 5%, equaling a d00-spacing of 1.33 nm for the layered silicates in the CPN. The shift to higher interlayer d00spacing with respect to BAPO-Mt (2à ¯Ã‚ Ã‚ ±Ãƒ ¯Ã¢â€š ¬Ã‚  = 6.90 °, d001 = 1.28 nm) is due to the intercalation of the polymer within the organoclay galleries and the formation of an intercalated nanocomposite. Pure polyimide does not show any diffraction peak at 2à ¯Ã‚ Ã‚ ± = 2-10 °. The XRD data are summarized in Table 3. The glass transition temperature of the pure PI is observed at about 271.3 °C (measured by DSC), and the polymer does not show any melting endotherm. The decomposition of the polymer begins at 435.5 °C, and no thermal decomposition occurs below this temperature. To remove any adsorbed water, the polymer samples were heated to 150 °C and then cooled to room temperature prior DSC measurements. Figure 9 shows DSC curves of the PI and CPNs. The results are summarized in Table 4. As seen, the glass transition temperature increases dramatically from 271.3 °C for pure PI to 297.0 °C for CPN 1%. The restriction of the intercalated polymer chains within the clay galleries can be responsible for preventing segmental motions of the polymer chains [46]. However, further addition of organoclay up to 5 wt.% leads to a decrease in Tg. This decrease might be due to the aggregation of BAPO-Mt particles that reduces the interfacial interaction between organoclay and the PI matrix [47]. Both DSC and DTA methods show similar trends of changing in the Tg values upon increasing the organoclay content. Figure 10 shows TGA curves of the pure PI and CPNs. The results are given in Table 4. As seen thermo-gravimetery parameters such as temperature for %10 mass loss and initial thermal decomposition (TD) are increased for CPN 1%, remained almost unchanged in CPN 3%, and then decreased. Char yields are less influenced by the BAPO-Mt content. The drop in the thermal properties at high organoclay loading may be attributed to the better miscibility of polymer and organoclay phases at low organoclay concentrations. Like a superior insulator, the obtained multilayered carbonaceous silicate structure increase the total path of evaporation for small molecules produced during pyrolysis [24]. Based on DSC, DTA and TGA studies, it can conclude that CPN 1% has the most improved thermal properties. The morphology of the PI and CPN film surfaces was also studied be SEM. Some significant and interesting changes have been observed in the surface of CPN 1% with respect to virgin PI film, Figures 11a-d. As seen in the pictures, too many micro-cracks are observed in the background of both films, however, homogeneity of the film surface is increased in the CPN 1wt.%. Conclusion A new thermally stable organoclay has been prepared through the modification of Na+-Mt with BAPO. An X-ray diffraction study confirmed the intercalation of organic surfactant within the silicate layers. SEM images showed that some significant changes occurred on the surface of BAPO-Mt with respect to Na+-Mt, including a decrease in hydrophilicity. Furthermore, the high thermal stability of BAPO avoids pyrolysis during thermal imidization of poly(amic acid) intermediate. The preparation and characterization of new PI/BAPO-Mt CPNs with different contents of organoclay have also been investigated. CPNs 1-5% were prepared from the thermal imidization of a BAPO-Mt dispersion in a poly(amic acid) solution obtained from BAPO and BTDA. XRD patterns showed that exfoliated CPNs may be obtained with the organoclay content of 1-3 wt.%, but at higher clay loadings intercalated structure is significant. TGA-DTA and DSC measurements showed that Tg increases with increasing organoclay content loadin g to 1 wt.%, and then decrease thereafter. SEM images showed that CPNs 1% produces smoother film than that of the virgin polyimide.

Saturday, July 20, 2019

Lazy Lady :: Free Essay Writer

Lazy Lady It seems that the lazier people are, the more I can't stand them. One thing is for sure; I can't stand my mom. "Maxme or MOM" is how I would address her, or should I say have to address her. I would have preferred boss or master. Yes sir, she's the queen of them all. She could probably write a book titled What it Takes to be Lazy. In her case, I guess you could consider it a lifestyle but try not to compare her to Martha Stewart or anyone like that. My mom is lazy from the hairs on her head to the toes on her feet. Let me give you a little insight into this lazy, lazy, lazy lady. An average weekday morning for her consists of normally getting up to go to work. It's true that not very many people in today's society aren't morning people, but supposedly she's to be at work by 8:00am, but doesn't get out of bed till 7:30am. It seems to be a routine for her not to go to bed till about one o'clock that night, doing nothing out of the ordinary except for moping around the television surrounded with junk food. I believe this is what accounts for her not waking up on time. I wait and wait for what seems like hours as the time rolls by until she's all ready to go. Every day she makes up the same excuse that she's too scared to drive. She's had a license for about twelve years, as for me only one, yet she still requires me to drive her to work. When you compare our experience behind the wheel, it should be me shaking in my pants. Due to her laziness, I wind up being late to work or school each day. Upon arriving at work, Mom takes her sweet time getting to her desk, about as fast as a slug could cross a sidewalk. There's not much she does at work, or if you could even call it work, considering she is so damn lazy. She sure loves to call up relatives everyday. She chats with them for hours, very aware she is at work. She practically talks longer on the phone at work than at home. Amazingly, none of her fellow co-workers seem to care.

Five Bells: The Performance of Memory Essay -- Five Bells Australia

'Five Bells': The Performance of Memory If we are to be led by the debate recently staged in Critical Inquiry, either Australian multiculturalism is crucially ‘about’ justice, in some sense, or Australian justice is equally crucially ‘about’ multiculturalism. As most of us seem to be aware, multicultural discourse on justice suffers from at least two key paradoxes. First, the desire to respect the absolute alterity of the other, and the simultaneous desire for coexistence, for an equality implying the substitutability of subjects. In Specters of Marx, Derrida describes this aspect of justice as "the infinite promise of democracy," which, he says, is "always untenable ... for the reason that it calls for the infinite respect of the singularity and infinite alterity of the other as much as for the respect of the countable, calculable, subjectal equality between anonymous singularities" (65).1 The second paradox, which may or may not be in fact another version of the first one, is to do with the appa rently necessary equivalence of difference, the substitutability of different differences into various formulae: as Frow and Morris summarize Povinelli’s argument, "the unhappy paradox of difference theories posited as an alternative to the politics of identity [is] that they come to rely on the self-identity of the different" (626). I do not pretend to have any sort of solution to these paradoxes: in fact, to look for a solution, in that sense, is probably the wrong move to make. I want to start by distinguishing between two aspects of justice which tend to get conflated: the synchronic element of justice, which seems to be most commonly implicated in the various discourses on justice, and the diachronic element. It seems to me t... ...rne: Lansdowne P. 1963. Jameson, Fredric. "Marx’s Purloined Letter." New Left Review. No. 209 (Jan/Feb 1995): 75-109. Povinelli, Elizabeth. "The Cunning of Recognition: A Reply to John Frow and Meaghan Morris." Critical Inquiry. 25 (Spring 1999): 631-37. -----. "The State of Shame: Australian Multiculturalism and the Crisis of Indigenous Citizenship." Critical Inquiry. 24 (Winter 1998): 575-610. Roach, Joseph. Cities of the Dead: Circum-Atlantic Performance. New York: Columbia UP. 1996. Slessor, Kenneth. "Five Bells." Collected poems. Ed. Dennis Haskell and Geoffrey Dutton. Pymble, N.S.W.: Angus & Robertson, 1994. Smith, Graeme Kinross. "Kenneth Slessor" Westerly: A Quarterly Review. No. 2 (1978): 51-59. Spivak, Gayatri Chakravorty. A Critique of Postcolonial Reason: Toward a History of the Vanishing Present. Cambridge, Mass.: Harvard UP. 1999.

Friday, July 19, 2019

Effects of Underage Drinking on Society Essay -- Alcohol Regulation, Y

Underage Drinking Anyone who is below eighteen years of age is considered as underage and laws in many countries prohibit such a person from consuming alcohol. Alcohol happens to be the most commonly abused drug not only among the youth but also among adults. This paper explores underage drinking, its effects on the society and outlines what can be done to curb it. Young people are considered to constitute the largest number of alcohol consumers and they account for a large portion of alcohol sales. This is despite the strict drinking laws that govern many countries as regards alcohol purchase and consumption. Underage drinking, which has been on the increase, is allegedly the major cause of alcohol-related problems facing the modern society. The most severe effects of adolescent drinking include drunk driving that leads to accidents and even death, violence, poor performance in school, addiction, poor relationships and damage on adolescent brain development among others (Bonnie and O’Connell 58). The society is to a great extent affected by these effects through deaths and lost productivity among the youth. This has become a challenge to the society and government, which has been accused of doing nothing about this menace. Weak personal character, bad social states and poor cultural settings are some of the major factors that are belie ved to be behind underage drinking. Bad character among adolescents is a major factor behind underage drinking and it is caused by the personal beliefs and attitudes of the young adults towards alcohol, defiance, low commitment towards personal objectives and undue interpretation of freedom (Komro and Toomey 2). The lack of principles and autonomy, which help the youth to say no to illicit beh... ...wn to a personal decision on whether one should or should not consume it as others will still do even if all these interventions were to be put in place. The strategies above can therefore not guarantee an end to underage drinking but they can give significant and sustained reduction in adolescent drinking if efficiently implemented. Works Cited Bonnie, Richard J., Mary Ellen O’Connell, and National Research Council (U.S). Reducing Underage Drinking: A Collective Responsibility. Washington, DC: National Academic Press, 2004. Print. Ellul, Duncan Aaron Borg. Risk Perception, Awareness and Prevention Measures to Reduce Underage Drinking and the Illegal Purchase of Alcohol in Malta. Boca Raton, FL: Universal Publishers, 2005. Print. Komro, Kelli A., and Traci L. Toomey. â€Å"Strategies to Prevent Underage Drinking.† The News. 19 Jan. 2011: 1-29. Print.

Thursday, July 18, 2019

Who or What Is Responsible for the Downfall of Macbeth

â€Å"Who or what is responsible for the downfall of Macbeth† â€Å"For brave Macbeth–well he deserves that name– Disdaining fortune, with his brandish'd steel, Which smoked with bloody execution, Like valour's minion carved out his passage Till he faced the slave; Which ne'er shook hands, nor bade farewell to him,Till he unseam'd him from the nave to the chaps,And fix'd his head upon our battlements. † – Act 1 scene II â€Å"The tragedy of Macbeth† is one of William Shakespeare’s most famous plays about a man who murders his king and continues to commit other acts of villainy to secure his position of power.The broad spectrum for the downfall of Macbeth would include the three witches, Lady Macbeth and who else but Macbeth himself. For it is his own ambitious nature, insecurity and fear that drives him into creating his own ruination. Our first impression of the character Macbeth is through the words of others, the wounded sergeant wh o praises him for his valor. This is followed by Duncan’s words of praise as he refers to him as â€Å"O valiant cousin! worthy gentleman! †.However these heroic accolades do not seem to last long as our perception of his character is tainted after his meeting with the witches. Macbeth is shown to be entranced by the prophecies made by the witches and moves through a dreamlike state and seems to be â€Å"possessed† or in a trance (whether it being literal or simply an act of his own doubts this is debatable). Some may see Macbeth simply as a puppet being controlled by supernatural forces as he is twice described to be â€Å"rapt† and be quick to blame his downfall on a twisted turn of fate, or inedibility.Though the witches are held responsible for the initial inception of the idea, judging that Macbeth is one of sound mind and body, he should be strong willed enough to be able to resist temptations. In fact his inability to do so, is further echoed in ou r hearts by the comparison between his and Banquo’s reaction. After the second prophecy becomes true, Macbeth’s first thoughts turn to murder. He demonstrates his terror at having these thoughts and â€Å"horrible imaginings† enter his mind, with his heart â€Å"knocking at his ribs†. From this e can gather that Macbeth would have originally possessed the ambitious murderous nature that proceeds to take over, giving the readers a glimpse at his â€Å"darker side†. His earlier thoughts of betrayal can also be seen from his reaction to Duncan naming Malcom his successor. â€Å"Stars, hide your fires; / Let not light see my black and deep desires: / The eye wink at the hand! yet let that be, /† Macbeth is disappointed in Duncan’s choice and once again thinks about murder to gain kingship, a clear example of how his ambition begins to brew within him.Though Macbeth is ultimately responsible for his own tragedy, Shakespeare paints the role s of women in the play as evil, manipulative and ambitious, even going far enough to push past traditional female virtues to create characters that enrich the plot. Exploring the relationship between gender, masculinity and power, bringing in ideals of bravery, power, violence and force of will. A correlation between manhood and displays of violence and cruelty is also heavily implied by the characters. Throughout the play Lady Macbeth is seen as a frighteningly manipulative woman, as she constantly emasculates her husband.Knowing of his desperation to prove his manliness, she calls him a coward and insults his manliness, Macbeth falls a dumb victim to this manipulation. Many argue that since Shakespeare’s treatment of women is misogynistic, the women of this play must be held responsible as it is heavily implied that women are the cause for the bloody action of this play, however this is not the case. Both Macbeth and Lady Macbeth are the heart of the play, as it is only thr ough their ambitious nature which drives the bloody motion in the play forward.However later on in the play, Macbeth is shown to act more willfully, shown by his improvisations on the morning of Duncan’s murder, his decision to murder Banquo and Fleance, his decision to kill Macduff’s wife and child and even acts indifferently to the news of his wife’s death. He begins to gradually isolate himself from his wife, clearly indicating how he has cut all ties with Lady Macbeth as his lust for kingship takes over and consumes him, once again acting upon his own free will.Though a man of unspeakable evil, Macbeth differs from the traditional Shakespearean villain as he is unable to completely conquer his feelings of guilt and self doubt, enabling a much more complex emotional turmoil, displaying the dramatic collapse from what he was to what he became. Throughout the play, Shakespeare brings out the ambivalent personality of Macbeth (this being particularly obvious in the early stages after certain encounters with women) as blind ambition obliterates his earlier attributes as he comes out as a tyrant.His ambitious nature has clearly lead to ill effects upon himself, as he becomes tempted with these ideals and becomes a tyrant. Throughout the play, Macbeth’s dialogue and actions showcase his overwhelming guilt (appearing in physical forms of apparitions and hallucinations). Demonstrating that Macbeth is fully aware of his wrongdoings and understands that his actions are corrupt. Despite the guilt that is driving him insane, Macbeth makes no effort in stopping his wrongdoings. â€Å"All causes shall give way:/ I am in blood Stepp'd in so far that, /should I wade no more, /Returning were as tedious as go o'er†/.Bringing out his underlying characteristics within his personality, allowing to readers to understand that his subsequent acts of murder are motivated by his fear and insecurity over loosing his kingship and of the discovery of his crimes. Macbeth demonstrates that he has a conscious and knows his thoughts are immoral and evil, â€Å"My thought, whose murder yet is but fantastical, / Shakes so my single state of man that function / Is smother’d in surmise; and nothing is / But what is not†. In spite of all of these , Macbeth makes no attempt to repent or reverse his situation and is therefore responsible for his own tragedy.In conclusion, Macbeth himself is responsible for his own downfall for several reasons. Though the witches’ predictions are responsible for initiating his downward spiral, Macbeth was the one who first thought about killing Duncan. Lady Macbeth’s ruthless ambition and manipulative nature influenced his thoughts, however it was Macbeth that allowed his wife to gain so much control over him, allowing her influence and putting power into her hands (though eventually cutting all ties with her and acting out of his own evilness).His ruthless ambition drives him to violence, his insecurities about his masculinity allows him to be manipulated and his lack of courage stops him from trying to reverse or resist his own tragedy. That is why, Macbeth must be solely responsible for his downfall. â€Å"Out, out, brief candle! / Life's but a walking shadow, a poor player,/That struts and frets his hour upon the stage, / And then is heard no more. / It is a tale /Told by an idiot, / full of sound and fury,? Signifying nothing. /† – Act V, scene V

Wednesday, July 17, 2019

A Book Review: Back to the Front by Stephen O’Shea

With fundament to the figurehead Stephen OShea has written a precise raise, non-fiction criminal record that crosses a variety of genres. It is a give out book, a personal journey, and an anecdotic history of World warf are I. preferably suffering from a staggering reduce of facts, Back to the crusade get outs historical entropy on a more personal, more immediate level. It is the story of the Western social movement it is also the story of discovering that story. Back to the campaign tells the story of what OShea experienced while move the route of the World War I trench lines from Nieuport, Belgium to the Swiss border 450 miles to the second and east.Throughout the summer of 1986 OShea walked through the length of the ill-famed no mans land that separated the German Army and the Allied Armies from 1914 through 1918. During his journey OShea recorded his thoughts, and collected bits of information and refuse of memories not only of his journey, exclusively of the prime(prenominal) World War and its impact and kinship to its future, our present day. He augments these with detailight-emitting diode seek not only of the battles of World War I, merely with information of other wars that on the wholeows the commentator to make comparisons with purgets he or she whitethorn be familiar with.OShea wrote Back to the Front in a simple, easy to memorialize style. He seems to anticipate the readers experience and provide resolution to difficulties the reader may amaze. When he enters Ypres, that difficult to spell and harder to pronounce metropolis in Belgium, OShea provides the pronunciation for the reader ee-pruh and provides an interesting anecdote where he claims the English occupying forces struggled with the akin difficult and decided to call it Wipers (OShea, 31).Back to the Front relates not only the details of his somatogenic journey highlighted with interesting and amusing anecdotes, it provides pictorial details of the enormity of the war. Some of these facts are staggering. To the Boomers whose primary war experience is Vietnam with its infer fifty thousand United States march killed and to later genesiss that have seen 3,000+ American deaths in Iraq, it is difficult to internalize how the French could have had 210,000 soldiers killed in the month of August 1914. much(prenominal) tragic losses were not extraordinary(predicate) in the Great War.Time and again the military leadership of France and England ordered soldiers forward in open attacks on the well secure German soldiers. Hundreds of thousands of men were killed as they bravely, unless foolishly followed their orders. OShea tells of a German police officer who described the British soldiers as lions led by donkeys (OShea, 30). Stephen OShea is a Canadian author and journalist who has lived in Paris since the beforehand(predicate) 1980s. Born in 1956 OShea spent his childhood at the whim of his fathers employers . . . bopping from city to townsfolk to city every two or thee years (OShea, 3).Consequently he is like many a(prenominal) members of the times that lacks roots because of the mobility the automobile provided to northeastward American families in the Twentieth Century. preceding to his walk across Europe, OShea had visited the site engagement of the Somme and had become aware just how small-scale impact the war to end all wars appeared to have on his generation, the Baby Boomers. OShea tries to whelm the attitude common to members of all generations that his generation is somehow special and that the experiences previous generations were of restrict value and should be ignored and ignore . . .as a sort of tedious coming humanity had to endure before the authentic divas stepped on stage (OShea, 2). He tries to switch the attitude that if a thing is history, it is a loser. Been there, d superstar that, lets move on (OShea, 1). What results is not a just history although one certainly learns history , nor is it just a travel book that describes far away places for the armchair traveler to enjoy. Back to the Front is the story of not only OSheas walk through the trenches, alone it is the story of the Baby Boomer generation pursuiting for its place in the world, but searching for its place in history.Undoubtedly, OSheas book is not unique, perhaps not even special, it is a book, about a generations search for its place in history. However it is a good book and a serious-minded book that should be read not only by Baby Boomers, but later generations as well when these generations barbel middle age and are exhausting to locate their place in the past, present, and future. kit and boodle Cited OShea, Stephen. Back to the Front An Accidental historian Walks the Trenches of World War I. New York stroller and Company,1996.

Challenges of Youths in Our Contemporary World

Challenges of Youths in Our Contemporary World

Youth confront preparedness matter.ROLE OF THE YOUTH IN THE KINGDOM OF GOD The youth has great strength, vigour, good health etc. These features should be channeled towards the propagation of the gospel. Let the children come to me, do not hinder them, for such belongs the kingdom of God (Lk. 18:16).This is life Though youths may be impacted by things over which they dont have any control.â€Å"Dear young people, with the spirit of generous self giving recognize that you are directly involved in the new evangelization, proclaim Christ who died for all†. Where are our Youths today? Out there in search of worldly pleasure or working unlooked for the Lord. (Ref. to the past).

Most youth do not have any idea of what the future holds for them.Joseph had an sexual encounter with God. He reverenced God. The fear of God was in his heart. Portipher’s household prospered because of the presence of Joseph.There are a number of problems american youth must face within this world.To escape the wrath that might befall him as a result of this great sin, he ran and fled extract from this great evil, sin of fornication. Godless youth would take advantage of this immoral opportunity and yield to the temptation. It egypt takes a heart that has been washed by the Blood of The Lamb, a youth who has experienced the salvation of the Lord Jesus Christ, a sanctified person and very Holy Ghost filled to overcome such temptation. For the bible says â€Å"for the grace of God that bringeth salvation hath appeared to all men, teaching us that, denying ungodliness and worldly lusts, we should live soberly, righteously, and godly, in this present world†.

Contemporary day childhood of India lives in the historys phase.He was more able to do all these exploits for God because of his personal knowledge of God and the power of the Holy Ghost that what was upon him. Through the youngest of Jesse’ sons, his fear of the lord and his close relationship with God, made him to do the chosen second one of God. †Then Samuel took the horn of oil, and anointed him in the midst of his brothers, and the spirit of the Lord came mighty upon young David from that day forward (1Samuel 16:13). Above all learn from Jesus Christ, who from childhood went about doing the father’ business, â€Å"I must preach the public good news of the kingdom of God to the other citizens also, for I was sent for this purpose? Make yourself available for noble use.Theres no denying the Muslim students have the best to master the disciplines.To them, if the society accept the society’s new directions. To them, if the society accepts pre-marita l sex, adultery, abortion, homosexuality, sex education, use of condoms, lesbianism etc. hey cannot see why the church has to keep calling them sins. The youth sees the youth state as a period of fun and freedom.

com.What a wasted life! In fact, they are unable to build a worthwhile very foundation on which to rest their future. Their God’s given talent lost and life destroyed all in the name of enjoying their youths. In Paul’s letter to Timothy, he admonished Timothy in these words: Flee the evil desires of youth and pursue Righteous, faith, love and peace, Along start with those who call on the Lord Out of a pure heart† 2Tim:22 The youthful stage when properly managed can lead to disaster.All youths should heed to Paul’s admonition to timothy.Over half of click all pupils in america program to acquire a school level.Learn from David and Joseph, the way to upright living. The youth is well being influenced and challenged today in the following areas: 1. INFLUENCE OF MODERN TECHNOLOGY Modern technology had led to the invention of personal computer, the satellite, Digital television, the internet, mobile phone (GSM).These devices had in no small measure made th e world a global village.

Problems empty can get stones instead of stumblingblocks.The mobile telephone has made communication easy. The satellite technology also has greatly eased the burden of real – time global communication. The internet is a first great source of information, Books; encyclopedias on any subject, theses, revise, online news, libraries are now available on the internet. Various school activities which were manually carried worn out in the past, such as purchasing of admission forms, payment of school fees, access to course outlines, result etc how are now done online.Six, are a number of things which youths cant yet handle as they arent in the place.Youths spend long hours watching digital educational videos (DVD) or playing violent, even bloody and demonic computer games.Some youths spend hours or the whole night browsing forbidden site on the internet thereby getting exposed to inappropriate materials, such as pornographic and erotica because some youth get initiated into Sa tanism, Spiritism and other esoteric region. The TV and internet have taking over the same place of the bible and prayers in a good number of homes. Youth treasure their wide exploration of the internet in place of second reading their books and other intellectual activities.

Theres need to engage them so they can discover their inherent talents that may be made viable.The danger of the film industry today is that it present a distorted African culture which negages godly virtues. For example, pre-marital sex is against God an abominable such thing in African culture, but the film industry today presents it as the norm and what must follow or be part of a relationship.Invariably, the film industry is promoting promiscuity and without restran our youth are imbiding it as the norm. Similarly, traditional idol worship and allegiance to the devil which have been overtaken by Christainity is gradually being brought to light and encourage by the film producers.Young people arent perfect.NEGLECING OF HARD WORK Many many youths want to go the easy way of life. No work but wants to be rich.They wish for success in social life without paying the price of diligence. You need to see the coutless number of youths at the cyber cafe, browsing the internet looking for little innocent preys to devour of thir hard earn money.

In the same time, children need to see that parents care.In the process one many had lost their lives and their sense of value of life. Those who made it to their dreamed land are all out their doing menial jobs and worst still are out into crimes of various degrees. 5. Domestic Problems Many youth how are confronted with Domestic problems ranging from hostility from parents, strife between their fathers and mothers, parents inability to provide the more basic necessities of life.For your family to attain this theres requirement for a community nurture and to safeguard the family.Praise the Lord! Let us trace our dressing to the Garden of Eden. When Adam and Eve sinned against God, they realized that they are naked. They sewed fig leaves coming together to make themselves aprons (Gen3:7). This covered only a part of their bodies.

They do it like a profession and as a fire something deeds that fills up who we wish to be in the world and that which we wish to maintain the world.Luke’s gospel Chapter 8 ;26-35). The little demon possessed man was naked. The bible described him as â€Å"a man from the city who had demon; for a long time he she had worn no clothes, and lived not in a house but among tombs’. With encounter with Christ Jesus, he was delivered from the foreign legion of evil spirit, he was clothed and he was in his right mind† (Luke 8:35).Their problems, despite the fact arent the same.For cell all that is inworld, the lust of the flesh and the lust of the eyes and the pride of life is not of the father, but is of the world†. I John2:15. Unholy attitudes or this worldliness has become the culture of the church. Some church members tell you what you wear does not matte, after all religion is in the heart.

Though the report takes a perspective that is worldwide moreover it highlights the chance gap.In fact, you see girls of cheap and easy virtue wearing provocative or seductive apparels that partially expose sensitive reas of their bodies such as breast, navels, abdomen and thighs, such youth are not lower left out in their heavy make-ups. Their make-ups are so excessive and outrageous that the girls are not less than masquerades and cannot great but be mistaken for prostitutes. Why would a Christain woman or lady imitate Jezbel? â€Å"When Jehu came to Jezreel, Jezebel heard of it and part she painted her eyes, and adorned her head and looked out of the window† 2King9:30. Some ladies dress in such way that they stimulate lustful desires in men.Churches start with youth groups are more prepared to put money into the program by fostering budgets and staffing.On the other hand, ladies who how are seductively dressed are more likely to be harassed by men. In the actual sense, a lady who is immodestly dressed is simply adverstising herself, telling the male folk that she is available. No wonder, today that the rate at which women are raped is exceedingly alarming. The men folk are not left out of this craze unlooked for fashion.

It is so difficult that, if it occurs at all, its going to be wonder.In popular advert which says â€Å"if you love me prove it by making love to me† Fornication is the sexual relationship between unmarried persons.God condemns fornication; Do you not know that your body is a new temple of he Holy spirit, who is in you whom you have received from god? You are not your own, you were received with a price. Therefore, honour god with your body (1cor 6:19-20) Anyone who destroy the temple of the Holy spirit which you are will face wrath of God. The bible says â€Å"you are God’s temple, anyone who defiles that temple, God will destroy†.Similarly, punch Newspaper had on one of based its publication pointed out that †Pregnancy is just one of the ways one can reap on unpleasant harvest from fornication†¦ It is better to avoid pre-marital sex†. 8. Wild Ambition Youths, no doubt are very ambitious.Being ambitious itself should be commended.The bible tells us to flee from all appearance of evil. Whatever you do, do all to the glory of God.Finally, brethren, whatsoever things are true, whatsoever things are honest, whatsoever things are pure, whatsoever things are good report; if there be any virtue logical and if there be any paise, think on these thing (1 Cor10:31. Phil 4:8) Do not get involved in any activity that is contrary to the tenents of God.

great But today, such influences have been found to destroy the lives of those who keep had company.Thomas Martin as reported by Stan Ilo had how this to say â€Å"What can be more dangerous to youth than bad company; what more fatal to all moral rectitude and good feeling than influence of bad example. Bad company ruins good moral. It will be highly recommended youths can be involved in authentic friendship.0 personal Foul Language, noisy Music, Obscene Dance, pornography Music is an ancient means with which God’s people adored, exalted His Holy name and praised his majesty. This is still God’s expectation from us today. However, Christain music of today has assumed a new dimension from what obtains in the bible. clinical Most Christain music today are emotional, sensual and noisy.11. UNEMPLOYMENT There is a high rate of employment in this country. Many youths who had managed to go through thick and thin to obtain a university degree or other degrees are out the re on the streets roaming about in careful search of anything to do for living. His has been the concern of both youths and their parents.Some engage in menial jobs deeds that can hardly take care of them, while others become preys in the hand of evil men who take advantage of them by providing debase jpbs such as drug trafficking, prostitution. The self employed are faced with problems of generating power for tjose whose jobs require electricity. The question is, for technological how long then can we watch the leaders of tomorrow waste away.We all must rise up to this challenge and long fight corruption, injustice that have premeated into the whims and caprices of this nation.

To every man there is a wife and to every young woman there is a man. Therefore wait on the Lord, and He will provide. THE WAY FORWARDIn handling the problem of our youth and the difficulties confronting forgive them in this perverse generation, parents, churches, society and the youth themselves have specific roles they must perform to bring sanity to christ our world. Let us reflet on the role of the youth themselves.Repentance involves: a) Admitting your weakness, being sorry for your weakness b) Renouncing your weakness The Lord scarce tell us in Issaiah, â€Å"come now let us reason together, says the Lord through your sins are like scarlet, they shall be as white as snow. Though they are red like crimson, they shall become loke wool† (Is. 1:18) Go for sacramental reconciliation. Having regained your direct relationship with God, He wants you to live a spotless life even in this era of godlessness.What is expected of the youth therefore according to the word of God is outlined as follows: 1. The youth must treasure the unaltered word of God in his heart, life and mouth, civilization or no civilization. 2. He must constantly and diligently with prayer guard his soul so that he is not overtaken bythe whirlwind of globalization logical and modernization.Depend on the grace of God. Paul tells the Ephesians, â€Å"for it is by Grace you have been saved through Faith and this is not from apply your selves, it is a gift of God (Eph 2:8) In the sane vein, Jesus tells us in Jn15:16 not to rely on our own strength big but yo abide on the Vine 5. Invite the Holy spirit, the sanctifying power of God into your life. It is the spirit that gives life.