Wednesday, October 30, 2019

Climate Assignment Example | Topics and Well Written Essays - 500 words

Climate - Assignment Example The main theme of this article is to offer detailed information regarding the harassment of the weather scientists by various sections of society, especially the fossil fuel industry. Since the scientific community has identified exploitation of fossil fuel as the main reason for global warming, this section of society has been prosecuting them on various levels, in spite of mounting evidence. Climate change can be broadly defined as the long-term time period shift in weather statistics including the average climate (NOAA, 2007). One of main concerns in environmental study is global warming with the continuous increase in temperature all over the world. It is also one of the topics that are hotly debated between various sections of the modern society (US National Academy of Sciences & the Royal Society, 2008). Mann begins by saying that weather scientists who are working in this area are gathering mounting evidences regarding the increase of surface warming all over the world. One such source is the thermometers that are monitoring the changes in hundreds and thousands of locations all over the world and recording those changes at a permanent location. The scientists are also getting indirect estimates from such sources as the ice cores as well as tree rings; for calculation of change in temperature during past years (US National Academy of Sciences & the Royal Society, 2008). Since last few decades, there are many theories that seek to explain the reason of the global warming such as the cycle of sun spots and changes in Earth climate, natural variability of the climate or changes due to human activity. Mann states that as per some climatologists, the main source of global warming is the sun spots and the 11 year Sun–cycle. The energy output of the Sun varies considerably depending on the abundance of some isotopes of beryllium or carbon atoms and number of sunspots. But, as per the evidence that

Monday, October 28, 2019

Sherlock Holmes and The Speckled Band Essay Example for Free

Sherlock Holmes and The Speckled Band Essay Watson takes notes for Holmes as well as accompanying him to dangerous situations and even tales a gun with him. Watson is never busy as a doctor but has medical knowledge. He shares the same code of honour as Holmess rights and wrong. The villains are less realistic than the characters of Holmes and Watson, using more exaggeration. Dr. Grimsby Roylott has a connection with gypsies and went to India with them and brought back dangerous exotic animals with are a red herring in the story. He is a doctor like Dr. Watson with specialist knowledge. He is a brutal bully who insults Sherlock Holmes. John Clay is the least developed of the three characters and a little like Moriatry with a sense of mystery, bright and intelligent. Moriarty is Sherlock Holmess equal adversary and a criminal genius (good gone wrong). Once he has lost most of his power he becomes even more dangerous on a professional level for Sherlock Holmes himself. Moriarty will devote his whole energies to revenging himself upon Holmes. He tracks Holmes down very effectively and seemingly, takes him to his death. The Sherlock Holmes stories have a very unique setting and use of descriptive atmosphere. When Sherlock Holmes and Dr. Watson get to Reichenbach falls you get a very distinct sense of mystery, dangerous and dramatic like we as the reader kind of guess whats going to happen. There is lots of detail to London, Baker Street, country house with varied settings to give tremendous atmosphere and mystery. This comes into effect in the Red Headed League and The Final Point especially. The style and structure is very simple, its written in first person narrator by Dr. Watson. Direct speech brings alive different charters and personalities. Descriptions of charters and settings are a reason to the plot. The Speckled Band is a muscular mystery, the Red Headed League is to do with the values of property and money, The Final Point is politics and crime put together and they all have a moral code at the heart of the stories which is to bring bad people to justice. The Speckled Band and Red Headed League has a straight forward structure with the problem introduced and eventually solved by Holmes. However in The Final Point Dr. Watson is forced to use detective powers demonstrated to him by his friend Holmes in realising both Holmes and Moriatry are dead. Between 1887 and 1927, Sir Arthur Conan Doyle wrote sixty Sherlock Holmes stories, and his great Canon has become the most praised, most studied, and best-known chapter in the history of detective fiction. Over twenty thousand publications pertaining to the Sherlock Holmes phenomenon are known to have been published, most of them historical and critical studies. In addition, however, almost since the first stories appeared, such was their uniqueness and extraordinary attraction that other authors began writing stories based on or derived from them. A new genre had appeared: pastiches; parodies; burlesques; and stories that attempted to copy or rival the great detective himself. This is why Sherlock Holmes is the most popular, entertaining and strong examples of popular crime writing which is still read a century later. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Arthur Conan Doyle section.

Saturday, October 26, 2019

Faith in Kierkegaards Breaking the Waves Essay -- Kierkegaard Breakin

Faith in Kierkegaard's Breaking the Waves In Soren Kierkegaard's Fear and Trembling, he discusses the "Three Movements to Faith." For Kierkegaard, faith of any kind involves a paradox. This paradox, as well as Kierkegaard's suggested path to faith, is illustrated by the main characters of Breaking the Waves, Bess and Jan. Kierkegaard explains there are steps one can take towards faith; however, they are so difficult he believes only one person, the "Knight of Faith," has completed the movements. The first step is for one to make her/his wish the complete focus of her/his concentration. This finite desire must dominate one's consciousness, and must be the only wish she/he hopes for. Although the desire may seem impossible, it becomes possible when expressed spiritually. Kierkegaard calls the second movement the "infinite resignation": this involves the person acknowledging the impossibility of her/his wish. By resigning the finite desire, says Kierkegaard, the wish is bent inward. With this, the wish becomes religious, and thus not finite, but infinite. The third step involves...

Thursday, October 24, 2019

Cpu Research Paper

CPU: Past, Present,   â€Å"A CPU (central processing unit) is the â€Å"brain† of the computer; it follows the instructions of the software to manipulate data into information. † (Sawyer, 2010, p. 208) The CPU performs logic and arithmetic operations, controls instruction processing, and supervises the overall operation of the computer. The main components of the CPU are the CU (control unit) and the ALU (arithmetic/logic unit). (Dugger & Gerrish, 1994, p. 78) The CPU also has registers which temporary store data during processing, and buses that act as roadways which transmit bits of data within the CPU and to other components on the motherboard. CPU: The control unit deciphers the instructions from the input and moves them into memory. For each instruction the CPU will fetch the instruction, decode the instruction, execute the instruction, and store the result. These four basic operations are known as a machine cycle. The control unit is therefore responsible in th e CPU to instruct and control where the data goes to and what will happen to it. (Sawyer, 2010, p. 208)ALU: The arithmetic/logic unit executes data that the control unit has sent to it. It performs basic arithmetic operations such as addition, subtraction, multiplication, and division. The ALU also performs basic logic operations such as comparing two numbers to see if they are equal, less than, greater than, or not equal. (Dugger & Gerrish, 1994, p. 581) Registers: â€Å"Registers are high-speed storage areas that temporarily store data during processing. † (Sawyer, 2010, p. 209) The CPU contains several types of registers such as an instruction register, address register, storage register, and an accumulator register.These registers may store a program instruction, store data while being processed, or store the results of a calculation. Without the registers the control unit or arithmetic/logic unit could not complete their work. Buses: â€Å"A bus is a group of parallel c onductors which carry information. † (â€Å"Microprocessors,† 1983, pp. 2-2) The conductors may be wires in a cable, foil patterns on a printed circuit board, or microscopic metal deposits in a silicon chip. Buses act as data roadways to get data from one place to another as needed. The term CPU/central processing unit has been in use since the 1960s.Nowadays, we are more familiar with the term microprocessors which are CPUs that are manufactured on integrated circuits in a single-chip package. However, before getting into today’s technology I will take a look at the past CPU technology. Past Exactly which computer was the first electronic computer completed in the United States is a controversial subject. Iowa State University claims that the Atanasoff-Berry Computer at ISU was completed in 1942 just before its creator was called up for duty in the war effort. (Munns) Another computer at the University of Pennsylvania which was funded by the military was complet ed in 1946 by J.Presper Eckert and John Mauchly. First Generation: Eckert and Mauchly’s invention was called the Electronic Numerical Integrator and Calculator, or as many now know it, as ENIAC. This first generation computer weighed 30 tons and contained 18,000 vacuum tubes. ENIAC could do 5000 additions per second. Each specific sequence of calculations had to be hard-wired into the machine. To change programs, ENIAC had to be completely rewired. ENIAC is generally known as the first electronic computer in the United States. However, since ENIAC could not store a program it did not have, what we would call, a CPU. Dugger & Gerrish, 1994, p. 571) In 1945 John von Neumann created a design for a computer system. His design included four basic units for a computer: a CPU, an input device, an output device, and storage. (Dugger & Gerrish, 1994, p. 571) In 1946 John von Neumann joined with Eckert and Mauchly at the University of Pennsylvania to create the Electronic Discrete Vari able Automatic Computer (EDVAC). EDVAC was completed in 1949. It contained almost 6000 vacuum tubes and had 12,000 diodes. EDVAC covered 490 square feet of flooring and weighed almost 9 tons. It required thirty people to operate it.EDVAC is considered the first truly programmable electronic computer that included a central processing unit. No doubt the CPU was enormous, but still a recognizable CPU. (â€Å"EDVAC†) Second Generation: In 1954 Texas Instruments introduced the silicon transistor. This revolutionized computer technology and created the Second Generation of computers. Transistorized CPUs of the 1950’s and 60’s were no longer hampered by vacuum tubes and electrical relay. Second Generation computers were smaller, faster, more rugged, and more reliable. â€Å"With this improvement, more complex and reliable CPUs were built onto one or several rinted circuit boards containing discrete transistor components. † (â€Å"Central Processing Unit† ) Third Generation: The development of integrated circuits and their use in computers began in the mid 1960’s. This shift in technology brought about the Third Generation of computers which were faster, more reliable, cheaper to operate and much smaller. Throughout the advances in computer technology and electronics the CPU continued to become faster and smaller. Fourth Generation: In the early 1970’s, Ted Hoff at Intel invented the first microprocessor.Essentially, this was the first time that a complete processing unit was contained within a single chip and it revolutionized the way computers were applied and designed forever. This is where the Fourth Generation of computers was born. The Intel 4004 was a four bit device, measured 1/8 inch by 1/6 inch, and could execute 60,000 operations per second. (Dugger & Gerrish, 1994, p. 574) By 1972 Intel had come out with an 8-bit microprocessor, the Intel 8008, and within a year had bettered it with the Intel 8080 which coul d execute about 290,000 operations per second.In 1979, Motorola developed a 16-bit microprocessor. The Motorola 68000 was very popular in the blossoming personal computer market. Around the same time Intel rolled out their 16-bit microprocessor; the Intel 8086. While other companies tried to compete in the microprocessor market, it was generally Intel and Motorola who were in the race to built smaller and better processors with each other. By the mid 80’s each had produced 32-bit microprocessors. Beyond: According to Moore’s Law, at our rate of technological development, the complexity of an integrated circuit will double in about 24 months.By the early 90’s, 64-bit microprocessors entered the market. Each succeeding processor is smaller and can produce data much faster. The 90’ saw Intel introduce its first Pentium chip and Motorola introduced their Power PC CPU. Throughout the 90’s Intel improved on its Pentium technology releashing the Pentium P ro, Pentium II, Pentium MMX, and Pentium III. In the late 90’s AMD introduced their Athlon CPU. The Athlon worked at 800 MHz. In 2000, both Intel and AMD released 1 GHz microprocessors in the Pentium 4 and Athlon CPU. By 2002, Intel’s Pentium 4 reaches 3. 06 GHz.By 2006, both Intel and AMD introduce dual-core processors. 64-bit processors have been around for use in mainframes and supercomputers, but now 64-bit processors are being made for personal computers. Present Today’s main competitors for CPU’s in microprocessors are Intel and AMD. Motorola sold off their semiconductor manufacturing section to become Freescale, and has basically bowed out of the CPU race. CPU’s of today are extremely fast. The new Intel Core i7-980X Processor Extreme Edition released the beginning of 2010 has six cores, 12 threads, a max turbo speed of 3. GHz , a 12 MB Smart Cache, and a clock speed of 3. 33 GHz. (â€Å"Intel Processors,†) â€Å"The faster a CPU run s the more power it consumes and the more waste heat it produces. † (Sawyer, 2010, p. 206) For that reason, rather than increasing clock speed, Intel and AMD have pursued using multi-core technology, which employs additional CPU cores and runs them in parallel. Dual, Quad, and multi-core processors are very popular today in CPUs for computers, games and other technology that needs a CPU. Future 128-bit microprocessors are still being developed. Some experts predict that advances in microprocessor technology will produce a 50 GHz processor by 2010, the kind of power that will be required to support such function as true speech interfaces and real-time speech translation† (Sawyer, p. 206) ClusterOnaChip (CoC) is a popular example of the future in CPU technology. Engineers are working on how to place thousands of more processors in a â€Å"cluster† on a single chip. IBM in collaboration with the Georgia Institute of Technology has created a prototype silicon-germaniu m hetero-junction bipolar transistor able to operate at a speed of 500 GHz at 4. degrees Kelvin. At room temperature, the transistor achieves a speed of 350 GHz. â€Å"This demonstrates that speeds of half a trillion cycles per second can be achieved in a commercial, silicon-based technology, using large wafers and low-cost, silicon-compatible manufacturing techniques,† says John D. Cressler, Byers Professor at Georgia Tech’s School of Electrical and Computer Engineering and a researcher at the Georgia Electronic Design Center at Georgia Tech. Our current technological knowledge is not good enough to produce the microprocessors and CPU’s of the future.We are limited by our current materials and in need of innovation to jump start us towards even smaller and faster CPU’s. One can only dream of the day when rather than having a bulky transistor made of silicon, we have processors that are scaled down to the size of an electron itself. Conclusion With Mooreà ¢â‚¬â„¢s Law in mind, we can see that over the past decades we have certainly obeyed his law. From ENIAC to EDVAC, to transistors, to integrated circuits and single chip microprocessors, CPU technology has evolved and is still evolving to bring us the computers that e want and need. Further advances into CPU technology will allow us to compute faster and realize scientific discoveries that can change our world for the better. Our thirst for deep space exploration could become a reality. Medical research will be simplified. The possibilities are endless. References (1983). Microcomputer Basics. In Microprocessors (pp. 2-2). Benton Harbor, MI: Heath Company. Central Processing Unit. (n. d. ). Retrieved from http://www. spiritus-temporis. com/central-processing-unit/history. html Dugger, W. E. , & Gerrish, H.H. (1994). Electronics Technology: Devices and Circuits. South Holland, IL: Goodheart-Wilcox Company, Inc. EDVAC. (n. d. ). Retrieved from http://www. spiritus-temporis. com/edvac/ Intel Processors. (n. d. ). Retrieved from http://www. intel. com/products/processor_number/about. htm Munns, R. (n. d. ). First-Computer controversy finally nearing a conclusion. Retrieved from http://www. scl. ameslab. gov/abc/articles/first-computer. html Sawyer, W. (2010). Hardware: The CPU & Storage. In Using Information Technology. New York, NY: McGraw-Hill.

Wednesday, October 23, 2019

Contribute To Children And Young People Essay

1.1 Outline the health and safety policies and procedures of the work setting 1.2 Identify the lines of responsibility and reporting for health and safety in the work setting SUPERVISION OF PUPILS – The safety of pupils in the classrooms is the responsibility of the Class Teacher. Class Teachers are expected to exercise effective supervision of the pupils and to know the emergency procedures in respect of fire, bomb scare and first aid, and to carry them out; to give clear instructions and warning as often as is necessary. Children should never be left unsupervised. Suitable supervision will also be carried out when Children are leaving the school premises at the end of the day, during break times and Mid-day break. ELECTRICAL EQUIPMENT All electrical equipment will receive a regular inspection by a suitably trained member of staff. STORAGE OF CLEANING MATERIALS Authorised chemicals and other cleaning materials must be kept under lock at all times FURNITURE Furniture that is not in good condition should be reported to the Headteacher and removed from use if considered unsafe. LIFTING AND MANUAL HANDLING Injuries can be caused by incorrect lifting and handling of objects, (which need not be large or heavy). Therefore any operation where lifting or handling is involved should be avoided where possible. WORKING AT HEIGHT All staff are asked not to carry out work at height unless it is agreed by their line manager that it is necessary. The site manager will keep a checklist of regular inspections of any steps, ladders and stepladders. No displays are to be higher than 3.5 m in the school hall. CONTRACTORS The Site Manager will liaise with and manage all contractors coming onto the site. All contractors RISK ASSESSMENT An annual risk assessment will be carried out by the Finance and Staffing Committee who will inform the Headteacher of their findings. All potential hazards should be reported to the Headteacher immediately. STRESS Stress is acknowledged by the school as a potential cause of staff illness and all efforts are made to reduce it. NEW AND EXPECTANT MOTHERS The school recognise the fact that new and expectant mothers (NEMs) are at an increased risk of a) injury to themselves and their unborn child b) injury to others who may be affected by their actions. To ensure the safety of the NEM a risk assessment will be carried out by a competent person and the implementation of controls to eliminate or reduce risk will be put in place. C.O.S.H.H. The Caretaker will maintain a C.O.S.H.H. record for the school. All hazardous substances are under lock in the caretaker’s cupboard. ASBESTOS The School’s asbestos survey is kept in the Admin Office and is available for inspection by contractors working on the site who are also required to sign a book confirming that they have seen the survey. ACCIDENTS TO STAFF AND PUPILS All accidents will be recorded in the appropriate accident book (see Reporting Procedures). Parents/Carers should be contacted by phone for any child who has suffered a bump to the head they will then either be sent home or will remain in school under close supervision. Should parents/carers be unavailable the child will be given an advice slip to take home with him/her at the end of the day. FIRST AID * First Aid will be administered but only as far as knowledge and skill permit. * All teaching and support staff have either undergone the required basic First Aid training or have agreed to participate in future training offered by the school. ILLNESS If a child is taken ill in school, the parent/carer will be informed as soon as possible and the child will be cared for in school until such time as the parent can arrange to take the child home. FIRE DRILL During any Fire Drill or evacuation due to the sounding of the Fire Alarms all staff must ensure that visually or hearing impaired children or adults are located immediately and led to safety. 1. The Headteacher, Assistant Head, School Secretary or Caretaker will set off the alarm, (in the case of a real fire person finding the fire would set off the nearest alarm). 2. Each class will evacuate the building as quickly and quietly as possible and children will assemble on playground. If during registration time teachers should take their class register with them, if it is outside registration time the School Secretary will bring the registers and signing-in book to the playground, pupils will then be checked off. 3. The Headteacher or Assistant Head will check with Class Teachers that all are accounted for. FIRE EXTINGUISHERS are located at the following points: – Sterile entrance area by Secretary’s Office door; water extinguisher (red) and Carbon Dioxide (red) – Staff room by Fire Exit; powder extinguisher (red) and fire Bomb Scare The person made aware of the scare will raise the alarm by setting off the nearest fire alarm and evacuation would occur in the same way as it would for a fire. Gas Leak In the event of a Gas Leak there must be a Verbal Evacuation starting with the nearest class in session. DO NOT TURN ON OR OFF ANY SWITCHES AND DO NOT OPERATE FIRE ALARM. Proceed as for a Bomb Scare. AREAS OF RESPONSIBILITY Headteacher: The Headteacher is responsible and accountable to the Governors for implementing this school policy and for all matters relating to health, safety and welfare within the establishment. In particular this will include: – being the focal point for day-to-day references on safety and giving advice or indicating sources of advice; – Co-ordinating the  implementation of safety procedures; – ensuring that regular health and safety inspections of the school are undertaken and that working practices are checked; – ensuring that adequate assessment of significant risks from hazards in educational activities is made and appropriate measures are in place for such safe practice; – reporting to the Chairman of Governors so that arrangements can be made to deal with premises management issues, e.g. repair and maintenance of buildings, selection and control of contractors and the development and implementation of emergency procedures; – maintaining contact with outside agencies able to offer expert advice; – ensuring that accidents and hazards are recorded, reported as appropriate and that remedial action is taken, when necessary; – reviewing, at least annually, the procedures and systems of work in place; – identifying and fulfilling training needs. In the event of the Headteacher and Assistant Head being off-site or unable to fulfil their responsibilities due to injury, the next most senior member of staff will assume these responsibilities. VISITS Visits out of school are organised by staff who are fully informed of any physical ailments of the children in their care. Pabulum Supply the catering facilities to the school and operate their own codes of Health and Safety, monitored by their client managers. SAFER RECRUITMENT / SAFEGUARDING CHILDREN The procedures for safer recruitment and safeguarding pupils will follow council guidelines. VISITORS TO THE SCHOOL All visitors to the school must report to the Office and sign the Visitors Log. When they leave they should sign out. ALCOHOL, DRUGS AND SMOKING The abuse of alcohol or drugs is a safety hazard and if there is any suspicion that a member of staff or visitor is under the influence of either, then this must be reported to the Head Teacher who will take the appropriate disciplinary action. Smoking within the school site is prohibited and signs are posted at entrances. VIOLENCE Violence and harassment in both physical and verbal forms will not be tolerated within the school, either between employees or between employees and non employees. EDUCATIONAL VISITS The school recognises that educational visits, away from the safety of the school site, expose school employees, pupils and non employee volunteers to potentially unknown risk. 1.3 Explain what a risk assessment is and how this is managed in the work setting A risk assessment is a document employees must create to evaluate the risks regarding health and safety and use it to help improve the protection in the workplace. Employers must identify hazards and assess the associated risk. When a risk assessment is required in my work setting. The person(s) in charge of the activity will create the document and then have it approved by the heard teacher and health and safety officer. The document Is then uploaded to the school network for other member of staff to modify if they require a similar risk assessment. However all risk assessments must be authorised but the head teacher and must also be re-assessed yearly. 2.1 Explain why a safe but challenging environment is important for children and young people It is important for children and young people to have a safe but challenging environment so they are able to develop their skills and not become afraid of trying new things. However safety is an essential so they are comfortable and have a positive experience. 2.2 Identify the difference between a risk and a hazard A hazard is an existing condition/situation that is likely to cause harm. For example, ice on the school site. A risk is a potential condition/situation that may occur and could become a hazard. For example if the cold temperatures continue there could be ice on the school site. 3.1 Identify non-medical incidents and emergencies that may occur in the work settings. Non-medical incidents and emergencies that may occur in my school are things such as flooding in classrooms or playgrounds, or electrical faults in the school, for example, internet not working, lighting down or heating not working. These are issues that require sorting quickly but do not require medical assistance. 3.2 Outline the actions to take in response to the following situations Fires During any Fire Drill or evacuation when the Fire Alarms sound, all staff must ensure that visually or hearing impaired children or adults are located immediately and led to safety. The person finding the fire would set off the nearest alarm. Each class will evacuate the building quickly and quietly. Children will Line up on the playground. The school Secretary will bring the registers and signing-in book to the playground, pupils will then be checked off. The Headteacher or Assistant Head will check with Class Teachers that all are accounted for. All class teachers should take evacuation key if needed and shut all internal doors after doing a final check. If in the hall all children and staff must evacuate by front entrance and continue to the playground the using path around the back of pre-school. Any staff members of pupils are in the staff room or PPA room they must evacuate via the fire exit and continue to playground. Staff members and pupils in the office and head teachers office must evacuate using the main fire door and head to the playground. Receptionist must take the key for the gate and leave by the front entrance and proceed to the playground. Pupils and staff in working in the ICT Room and Den must Take the evacuation key and leave by Fire exit continue across car park and follow the path around the back of pre-school The Secretary must Telephone Fire Brigade (unless in instant danger) and collect evacuation key, registers and signing-in book and proceed through main entrance to playground. Kitchen staff must leave via the fire exit and proceed to the playground. Security incidents All visitors to the school must register at the Office and sign the Visitors Log. When they leave they should sign out. They will be presented with a  visitors badge to wear and must keep it on until they leave the site. All visitors must be accompanied by a member of staff during their time on the school site. If I notice a person has come onto the site that is not authorised I should notify a senior member of staff and they will question why they are on the site. My school is very close to a wooded area is it very easy for people to accidently enter the site. The unauthorised person must always exit the way they entered. Emergency incidents If a child becomes unwell whilst at school and they require immediate medical care an ambulance would be called, followed by a call to the parent or guardian. If the child could move easily, for example an injured arm we would take them to a calm area. If the child cannot move the area will be cleared until the person has been moved by a medical team all members of staff involved in the situation must monitor the child, especially for shock. 4.1 Identify the signs and symptoms which may indicate that a child or young person is injured or unwell Children will normally tell you if they are feeling unwell, you can check for signs by feeling is they are hot or cold, they may be shivering or sweating. They may look pale, or if are complaining of a sore throat you may be able to see the tonsils or glands are enlarged. The obvious signs of injury are blood if a child has cut themselves, if a child has fallen but there is no blood there will often be a bruise or slight swelling, if a child is complaining of severe pain, there could be a chance of a sprain or breakage, the limb could be in an unusual position, and swelling. 4.2 Identify circumstances when children or young people may need urgent medical attention A child will need urgent medical attention is they are unconscious, have had a nock to the head and are suffering from concussion, if a child has been electrocuted, if they are having an allergic reaction. They will also require urgent medical attention if they have a breakage or severe fracture. In my setting I must also look for symptoms for meningitis  in children as they will require urgent medical attention. 4.3 Outline one role and responsibilities in the event of a child or young person requiring urgent medical attention If a child requires urgent medical attention I am able to take control of the situation as I am paediatric first aid trained.I would need assistance is an ambulance is required. I must carry out whatever actions required and after fill out an incident form. 5.1Describe the reporting procedures for accident, incidents, emergencies and illnesses All accidents, incidents and emergencies must be logged in the accident book unless treatment from a medical team is needed. In this case the incident would have to be recorded on a full accident form. 6.1 Outline procedures for infection control in own work setting The schools infection control is as follows – Children with rashes should be considered infectious and assessed by their doctor. A child diagnosed with chicken pox, measles, and shingles should be kept away until all vesicles have crusted over. Children diagnosed with Impetigo should be kept away from school until lesions are crusted and healed, or 48 hours after starting antibiotic treatment. Children suffering from Diarrhoea and/or vomiting should be kept out of school for 48 hours from last occurrence. 6.2 Describe personal protective clothing that is used to prevent spread of infection When performing any type of first aid, gloves and an apron must be worn to prevent spread of infection. If the child or young person requires CPR the first aider can use a mouth shield when giving the rescue breaths. 7.1 Identify the procedures of the work setting governing the receipt, storage and administration of medicines If a child requires a medicine whilst on the school premises they will be given a form to complete which allows members of staff at the school to administer the medicine. The information required is: Name of illness and medication required What time medicine should be administered and how often Dosage and method Side effects Self-administration or help required The form is then checked over by the secretary and information is passed on to the member of staff that will be administering the medicine. The form also states the medicine must be in the original container as dispensed by the pharmacy. 7.2 explain how the procedures of the work setting protect both children and young people and practitioners It is important to have policies and procedure set in place for administering medicines to ensure the medication they are taking is and the school have been given permission to administer it. If a child is given the wrong dosage they can become extremely ill or possibly have an anaphylactic shock. Have in a policy in place will ensure the person administering has the correct knowledge so that the child will be safe when taking the medication.

Tuesday, October 22, 2019

Free Essays on Groups

Why is group forming and group development crucial to the success of businesses? Introduction A group is â€Å"a collection of one or more interacting individuals who maintain stable patterns of relationships, share common goals and perceive themselves as being a group.† Greenberg, J & Baron, R. A. (1997) Within the context of this essay I hope to prove the following hypothesis, that group forming and group development are crucial to organisations. In all aspects of society whether at home, school or work we participate in and interact with members of groups. A large organisation can be viewed as a collection of small groups (Huczynski & Buchanan 1991.) If an organisation is made up of groups then the goals, performance and effectiveness of these groups will have a direct affect on the organisation they are involved with. Content There are two types of groups formal and informal. Formal groups are created by the organisation and are intentionally designed to direct members. Informal groups develop naturally amongst organisations personnel without any direction from the management. (Greenberg, J & Baron, R. A. 1997) According to Tuckman and Jenson (1977) there are 5 stages to group development. 1. Forming. In this stage the group is formed, members meet and ground rules are set out. Failure of the group even at this early stage to clarify goals and objectives can lead to the group not working at maximum efficiency (Tuckman and Jenson 1977). 2. Storming. In this stage the group show conflict and resist control from group leaders. (Tuckman and Jenson 1977) â€Å"The good relationships and acceptance of the leadership helps the group perform well.† (Greenberg & Baron 1997) When an organisation creates a group, the leader has to be chosen not only considering the needs of the task but also the members of the group. Failure of a leader to recognise the needs of his group members could lead to a drop in... Free Essays on Groups Free Essays on Groups Why is group forming and group development crucial to the success of businesses? Introduction A group is â€Å"a collection of one or more interacting individuals who maintain stable patterns of relationships, share common goals and perceive themselves as being a group.† Greenberg, J & Baron, R. A. (1997) Within the context of this essay I hope to prove the following hypothesis, that group forming and group development are crucial to organisations. In all aspects of society whether at home, school or work we participate in and interact with members of groups. A large organisation can be viewed as a collection of small groups (Huczynski & Buchanan 1991.) If an organisation is made up of groups then the goals, performance and effectiveness of these groups will have a direct affect on the organisation they are involved with. Content There are two types of groups formal and informal. Formal groups are created by the organisation and are intentionally designed to direct members. Informal groups develop naturally amongst organisations personnel without any direction from the management. (Greenberg, J & Baron, R. A. 1997) According to Tuckman and Jenson (1977) there are 5 stages to group development. 1. Forming. In this stage the group is formed, members meet and ground rules are set out. Failure of the group even at this early stage to clarify goals and objectives can lead to the group not working at maximum efficiency (Tuckman and Jenson 1977). 2. Storming. In this stage the group show conflict and resist control from group leaders. (Tuckman and Jenson 1977) â€Å"The good relationships and acceptance of the leadership helps the group perform well.† (Greenberg & Baron 1997) When an organisation creates a group, the leader has to be chosen not only considering the needs of the task but also the members of the group. Failure of a leader to recognise the needs of his group members could lead to a drop in...

Monday, October 21, 2019

The History and Origins of Candy

The History and Origins of Candy By definition, candy is a rich sweet confection made with sugar or other sweeteners and often flavored or combined with fruits or nuts. Dessert refers to any sweet dish, for example, candy, fruit, ice cream or pastry, served at the end of a meal. History The history of candy dates back to ancient peoples who must have snacked on sweet honey straight from beehives. The first candy confections were fruits and nuts rolled in honey.  Honey was used in Ancient China, Middle East, Egypt, Greece and the Roman Empire to coat fruits and flowers to preserve them or to create forms of candy.   The manufacturing of sugar began during the middle ages and at that time sugar was so expensive that only the rich could afford candy made from sugar. Cacao, from which chocolate is made, was re-discovered in 1519 by Spanish explorers in Mexico. Before the  Industrial Revolution, candy was often considered a form of medicine, either used to calm the digestive system or cool a sore throat. In the Middle Ages, candy appeared on the tables of only the most wealthy at first. At that time, it began as a combination of spices and sugar that was used as an aid to digestive problems. The price of manufacturing sugar was much lower by the 17th century when hard candy became popular. By the mid-1800s, there were more than 400 factories in the United States producing candy. The first candy came to America in the early 18th century from Britain and France. Only a few of the early colonists were proficient in sugar work and were able to provide the sugary treats for the very wealthy.  Rock candy, made from crystallized sugar, was the simplest form of candy, but even this basic form of sugar was considered a luxury and was only attainable by the rich. Industrial Revolution The candy business underwent major changes in the 1830s when technological advances and the availability of sugar opened up the market. The new market was not only for the enjoyment of the rich but also for the pleasure of the working class. There was also an increasing market for children. While some fine confectioners remained, the  candy store  became a staple of the child of the  American working class. Penny candy  became the first material good that children spent their own money on.   In 1847, the invention of the  candy press allowed manufacturers to produce multiple shapes and sizes of candy at once. In 1851, confectioners began to use a revolving steam pan to assist in boiling sugar. This transformation meant that the candy maker didnt have to continuously stir the boiling sugar. The heat from the surface of the pan was also much more evenly distributed and made it less likely the sugar would burn. These innovations made it possible for only one or two people to successfully run a candy business. History of Individual Types of Candy and Desserts Cake mix (commercial) was invented in 1949.Candy CanesCaramel Apple kits were designed by Kraft Foods sales representative, Dan Walker during the 1950s. The origin of Candy Apples is unknown.CheesecakeChocolateChocolate Chip CookiesCracker JackCupcakesFig Newton CookiesFortune Cookies were invented in America in 1918, by Charles Jung.Good and Plenty - On June 12, 1928, the Good and Plenty trademark was registered. Good and Plenty are the brightly colored, candy-coated, licorice candy.Graham CrackersGranola bars were invented by Stanley Mason.Gum - Bubble Gum, Chewing GumHOT ROCKS - On October 17, 1961, HOT ROCKS Candy was trademark registered.Gummie CandyIce CreamJelloLife Savers CandyLollipopsMarshmallows Marshmallow PeepsMoonpiesMMsThe Milky Way bar was invented in 1923 by Frank C. Mars.Popsicle

Sunday, October 20, 2019

How to Get Free Cat and Dog Food

How to Get Free Cat and Dog Food If youre having trouble affording dog food and cat food, you may have a variety of solutions to check out before re-homing your companion animal. Animal shelters increasingly recognize they can avoid contributing to shelter overpopulation by thinking outside the box. Food programs are popping up in many different venues to help you keep your cat or dog right at home. Why Keeping a Pet Matters When personal finances tank, putting food on the table is challenging enough without adding a few furry faces to feed. But it’s when things are at their lowest point that when the true value and worth of animals become crystal clear. Writing for Webmd.com, Dr. Ian Cook, psychiatrist and director of the Depression  Research and Clinic Program at UCLA, says: Pets offer an unconditional love that can be very helpful to people with  depression†¦ Taking care of a pet can help give you a sense of your own value and importance. It will remind you that you are capable that you can do more than you might think. A little boost in attitude and outlook could mean a lot to someone who is feeling pretty hopeless. Looking for an alternative to giving up your companion animal will not only give you a mission, it will remind you of the kindness of other humans; something of which we all need to be reminded from time to time, but especially in cases of misfortune. Where to Find Free Pet Food If youre in search of sources of free pet food, youre not alone. In fact, many organizations are aware of the issue and have created resources to help. For example: Some animal shelters maintain a pet food bank. When a distraught companion animal guardians visit the shelter with the intent to surrender their animal, instead of signing a surrender form they are given an application for food subsistence.Meals on Wheels found that pets are the only family that some seniors have and that some of their clients were sharing their meals with their pets when they couldnt afford pet food. In 2006, Meals on Wheels started the We All Love Our Pets (WALOP) initiative. Not all local Meals on Wheels programs offer pet food, so check with your local program.The Humane Society of the United States maintains a  list of national and local organizations that offer free pet food, low-cost spay/neuter services, and temporary foster care if you need help. How to Request Or Provide Help with Finding Pet Food If youre not sure where to start looking for or providing free pet food, you may find these suggestions help to break the ice. Ask your local shelter if they have a pet food bank. If you are not in need of one at the moment, offer to start one.Use search engines to research â€Å"pet food banks and meals on wheels programs in (your city). You may be surprised at all the good things that are happening in your own community.Talk to your grocer about saving dented and newly out-of-date pet food items and donating them to a shelter where you may be able to avail yourself of same.Use social media to let everyone you know you are taking up a collection to build a food bank and ask for donated food items once intended for a now-deceased animal.

Saturday, October 19, 2019

Summary for the freedom writers movie Essay Example | Topics and Well Written Essays - 250 words

Summary for the freedom writers movie - Essay Example There are students who are not of ethical or acceptable moral conduct and some even belong to gangs. Initially they are not willing to share information or personal things with her. However, with time Erin figures out ways in which she can engage them. She directs them to write regular journals and in this way they start sharing some information and personal experiences with her. â€Å"As Erin tries harder and harder to have resources provided to teach properly (which often results in her needing to pay for them herself through working second and third jobs), she seems to face greater resistance, especially from her colleagues, such as Margaret Campbell, her section head, who lives by regulations and sees such resources as a waste, and Brian Gelford, who will protect his "priviledged" position of teaching the senior honors classes at all cost. Erin also finds that her teaching job is placing a strain on her marriage to Scott Casey, a man who seems to have lost his own idealistic way in life.†

Friday, October 18, 2019

Economics 2 Essay Example | Topics and Well Written Essays - 1500 words

Economics 2 - Essay Example The stark contrasts in these unemployment figures reveal causative features in these two diverse European economies. The UK has a rich tradition of work culture resulting in high economic activities and thereby yielding low unemployment figures. The activities comprising employment turnover in UK is generally well coordinated ensuring better chances of employment for the unemployed while moving from one job to another in short period of time within the financial year. The job market is upbeat with healthy prospects for part time and contract employments. The availability of employment, however, does not per se serve as criteria for better quality economy. The parameters for economic excellence extend beyond the precincts of the employment factor. Advancing technologies, changing business practices, communication and information systems, globalization, etc. require adequate qualified and trained manpower. The lack of adequate education and training among significant number of job seekers in UK to meet the growing demands of the industries is the mitigating factor in UK's economy. This factor is problematic for employers on the lookout for candidates possessing the right educational qualification and skills. Nonetheless, organizations such as Learning and Skills Councils (LSCs) have taken up the responsibility of providing ways and means for continually educating young adults over 16 years of age and also providing them with job-specific training. One of the major causes for unemployment in the UK can be attributed to the insufficient availability of prospective candidates possessing the right educational qualifications and skills. Other reasons may comprise job seekers' lack of motivation or disproportionate expectations. Still, other factors may relate to the job market situation of the day necessitating lay off, etc. Also, changing or leaving jobs for better prospects could leave some people without employment for some time. Advancing technologies is another reason for unemployment. Technologies and communication systems are changing the way we work the world over. Job competition in such situation causes employers to seek out hard working, efficient candidates for various posts leaving less efficient or motivated individuals jobless. (Tim Miller) Unemployment in Italy The unemployment scenario in Italy is spread unevenly along the lines of region, gender and age. Unemployment among the female workforce is approximately 14.4%. It is 8% for the male working population. Given the fact that Italy espouses conservative social values, many female young adults choose to stay home if safe and secure jobs are not available. Unemployment among

International decorative glass Essay Example | Topics and Well Written Essays - 2250 words

International decorative glass - Essay Example I will view the results and properly document them for further research and reference. Wound healing is mainly defined as the body’s natural process, which lies in regeneration of dermal and epidermal tissue. After a person receives some sort of injury or a wound several events take place in the individual’s body to heal the wound and repair the damage. It should be kept in mind that these events should not necessarily be consecutive. Sometimes they overlap in the course of time /Stadelmann, Digenis & Tobin , 1998; Iba., Shibata, Kato & Masukawa, 2004/. I’m interested in all these steps and the influence of the phytochemicals into the wound healing in all the steps. That’s why I would like to briefly outline the processes, which take place on all the stages of the wound. The first phase - the inflammatory process – bacteria and debris are phagocytized and removed. Due to this the factors, which are the causes of migration and division of cells, are released. The next step is known as the proliferative phase. It is characterised by the following processes - angiogenesis, collagen deposition, granulation tissue formation, epithelialization, and wound contraction /Midwood, Williams & Schwarzbauer, 2004/. In the course of the angiogenesis stage new blood vessels appear from endothelial cells /Chang., Sneddon, Alizadeh, Sood, West, Montgomery, Chi, van de Rijn, Botstein, Brown, 2004/. After that there comes a new stage of fibroplasia and granulation tissue formation, where fibroblasts grow and create a new, provisional extracellular matrix (ECM) by disgorging collagen and fibronectin /Midwood, Williams & Schwarzbauer, 2004/. In epithelialization stage epithelial cells advance to the wound bed in order to cover it /Garg, 2000/. Finally due to the previous process there begins the stage of contraction, in the course of which the

Thursday, October 17, 2019

Packet Data Transmission Essay Example | Topics and Well Written Essays - 2500 words

Packet Data Transmission - Essay Example The transport layer establishes a session management between the two hosts. Data received from the application layer is segmented into packets. Each packet is given a unique label before being transmitted. The packets contain the necessary information that is sent to the host computer to fetch a web page; these packets are transmitted to the internet layer. The internet layer constitutes the Internet Protocol (Parziale, 2006). Data is packaged into Internet Protocol datagrams, which hold the address details of the client and server. The addresses of the client and server side are referred to as IP addresses (Osterloh, 2001). The packets are then transmitted to network interface layer. The network interface layer is responsible for determining how data is transmitted over the network (Rufi, 2008). The transmission of data is dependent on the network medium used, for example, Ethernet and the optical fiber. TCP/IP protocol stack In order for communication to be effective, the internet protocol is based on the TCP/IP model. The TCP/IP constitutes protocols, mainly the Transmission Control Protocol (TCP) and the Internet Protocol (IP), hence the name but there exist other protocols as well. The TCP/IP is a hierarchical model composed of interactive modules where each module is assigned a specific task (Bonaventure, 2011, p.75). The layers in the model are composed of protocols that can relate to each other depending on the system type. In terms of hierarchy, a number of layers below the higher layer protocols support it.

VISUAL ANALYSIS PAPER Essay Example | Topics and Well Written Essays - 1500 words - 2

VISUAL ANALYSIS PAPER - Essay Example Thesis statement: The stylistic features in the artwork named as Fox Games, by the renowned artist named as Sandy Skoglund, prove that the artist combined different elements of art (composition), provided importance to the usage of contrasting colors (color), the decision to use light/shadow determines the artwork’s visual beauty, perspective provides depth to the theme, figures help the viewers to evaluate the differences among different figures, pose elevates the artwork from predictability to originality, and gestures provide charm to the work as a whole. One can see that unity is the basic element of composition within visual art. As this term (composition) is superimposed into the scenario of the artwork-Fox Games (see appendix-1), is evident that the artwork can be easily detached as animate objects (fox and human beings) and inanimate objects (chairs, tables, chandelier, table cloth, food etc) and enjoyed differently. Still, there is a symmetrical connection among these visual elements in general. Similarly, the sense of movement is visible in the artwork because the foxes dominate the artwork as a whole. For instance, the presence of foxes is symbolic of fast movement, and the human images/figures in the artwork are symbolic of slow movement. On the other side, the chandelier is the focal point of the artwork and this is symbolic of the division between two worlds in general. The basic pattern within the artwork proves that the artist is obsessed with curved and straight lines. For instance, the basic proportion of the room is s ymbolic of straight lines and the table cloth (curved lines) and other elements are symbolic of the wise usage of pattern within the artwork. Similarly, Skoglund provides ample importance to proportion and the same is evident in the proportionate alignment of objects in the artwork. So, it is evident that the artist provides ample importance to composition, and the

Wednesday, October 16, 2019

Packet Data Transmission Essay Example | Topics and Well Written Essays - 2500 words

Packet Data Transmission - Essay Example The transport layer establishes a session management between the two hosts. Data received from the application layer is segmented into packets. Each packet is given a unique label before being transmitted. The packets contain the necessary information that is sent to the host computer to fetch a web page; these packets are transmitted to the internet layer. The internet layer constitutes the Internet Protocol (Parziale, 2006). Data is packaged into Internet Protocol datagrams, which hold the address details of the client and server. The addresses of the client and server side are referred to as IP addresses (Osterloh, 2001). The packets are then transmitted to network interface layer. The network interface layer is responsible for determining how data is transmitted over the network (Rufi, 2008). The transmission of data is dependent on the network medium used, for example, Ethernet and the optical fiber. TCP/IP protocol stack In order for communication to be effective, the internet protocol is based on the TCP/IP model. The TCP/IP constitutes protocols, mainly the Transmission Control Protocol (TCP) and the Internet Protocol (IP), hence the name but there exist other protocols as well. The TCP/IP is a hierarchical model composed of interactive modules where each module is assigned a specific task (Bonaventure, 2011, p.75). The layers in the model are composed of protocols that can relate to each other depending on the system type. In terms of hierarchy, a number of layers below the higher layer protocols support it.

Tuesday, October 15, 2019

The Social Concept in Terms of Culture and Norms Research Paper

The Social Concept in Terms of Culture and Norms - Research Paper Example To begin with, it is imperative to define the exact nature and importance of these strategies in the context of the concert hall. Interpretive strategies spring from that aspect of a field’s study which seeks to define the same in the context of an individual’s life and link the same with various factors at a regional, international and global level. (Norberg - Schulz,1996; P 414 – 428) The role of an interpretive strategy in the case of the two concert halls discussed here is to bring out a variety of features in the structural implications of the building. These features have been further discussed below. One of the major features of an interpretive strategy lies in its ability to transform a space and transport an individual to a place beyond the structure where the building and the individual in question are in perfect tandem as far as everyday activities and a sense of drama in this everyday life are concerned. This has been termed as Hermeneutics. (Hale, 20 00; P 213 – 233) On a more technical grid, the term hermeneutics adheres to the play of a person’s sense of aesthetics when regarding the two concert halls discussed in this paper. The finer point shows that the hermeneutic tradition helps create a platform where a person may experience the concert hall as an extension of his or her daily living. This is an important point made by the term ‘modern aesthetics’, which cater to more than a marriage of fine art and engineering for positive structural implications in the concert hall.

Monday, October 14, 2019

Social reformers Essay Example for Free

Social reformers Essay 1. Gautama Buddha, also known as SiddhÄ rtha Gautama, or simply the Buddha, was a sage on whose teachings Buddhism was founded. Buddha means awakened one or the enlightened one. Buddha is also used as a title for the first awakened being in an era. In most Buddhist traditions, Siddhartha Gautama is regarded as the Supreme Buddha of our age. Gautama taught a Middle Way between sensual indulgence and the severe asceticism found in the Sramana (renunciation) movement common in his region. He later taught throughout regions of eastern India such as Magadha and KoÅ›ala. The times of Gautamas birth and death are uncertain: most historians in the early 20th century dated his lifetime as circa 563 BCE to 483 BCE, but more recent opinion dates his death to between 486 and 483 BCE or, according to some, between 411 and 400 BCE. However, at a symposium on this question held in 1988, the majority of those who presented definite opinions gave dates within 20 years either side of 400 BCE for the Buddhas death. These alternative chronologies, however, have not yet been accepted by all other historians. Gautama is the primary figure in Buddhism, and accounts of his life, discourses, and monastic rules are believed by Buddhists to have been summarized after his death and memorized by his followers. Various collections of teachings attributed to him were passed down by oral tradition, and first committed to writing about 400 years later. Primary biographical sources The primary sources for the life of SiddhÄ rtha Gautama are a variety of different, and sometimes conflicting, traditional biographies. These include the Buddhacarita, Lalitavistara SÃ… «tra, MahÄ vastu, and the NidÄ nakathÄ . Of these, the Buddhacaritais the earliest full biography, an epic poem written by the poet AÅ›vaghoá ¹ £a, and dating around the beginning of the 2nd century CE. The Lalitavistara SÃ… «tra is the next oldest biography, a MahÄ yÄ na/SarvÄ stivÄ da biography dating to the 3rd century CE. The MahÄ vastu from the MahÄ sÄ Ã¡ ¹Æ'ghikaLokottaravÄ da tradition is another major biography, composed incrementally until perhaps the 4th century CE. The Dharmaguptaka biography of the Buddha is the most exhaustive, and is entitled the Abhiniá ¹ £kramaá ¹â€¡a SÃ… «tra, and various Chinese translations of this date between the 3rd and 6th century CE. Lastly, the NidÄ nakathÄ  is from the TheravÄ da tradition in Sri Lanka, was composed in the 5th century CE by Buddhaghoá ¹ £a. From canonical sources, the JÄ takas, the Mahapadana Sutta (DN 14), and the Achariyabhuta Sutta (MN 123) include selective accounts that may be older, but are not full biographies. The JÄ takas retell previous lives of Gautama as a bodhisattva, and the first collection of these can be dated among the earliest Buddhist texts. The MahÄ padÄ na Sutta and Achariyabhuta Sutta both recount miraculous events surrounding Gautamas birth, such as the bodhisattvas descent from Tuá ¹ £ita Heaven into his mothers womb. Nature of traditional depictions Queen MÄ yÄ  miraculously giving birth to SiddhÄ rtha. Sanskritpalm leaf manuscript. NÄ landÄ , Bihar, India. PÄ la period Traditional biographies of Gautama generally include numerous miracles, omens, and supernatural events. The character of the Buddha in these traditional biographies is often that of a fully transcendent (Skt. lokottara) and perfected being who is unencumbered by the mundane world. In the MahÄ vastu, over the course of many lives, Gautama is said to have developed supramundane abilities including: a painless birth conceived without intercourse; no need for sleep, food, medicine, or bathing, although engaging in such in conformity with the world; omniscience, and the ability to suppress karma. Nevertheless, some of the more ordinary details of his life have been gathered from these traditional sources. In modern times there has been an attempt to form a secular understanding of SiddhÄ rtha Gautamas life by omitting the traditional supernatural eleme nts of his early biographies. Andrew Skilton writes that the Buddha was never historically regarded by Buddhist traditions as being merely human: It is important to stress that, despite modern Theravada teachings to the contrary (often a sop to skeptical Western pupils), he was never seen as being merely human. For instance, he is often described as having the thirty-two major and eighty minor marks or signs of a mahÄ puruá ¹ £a, superman; the Buddha himself denied that he was either a man or a god; and in the MahÄ parinibbÄ na Sutta he states that he could live for an aeon were he asked to do so. The ancient Indians were generally unconcerned with chronologies, being more focused on philosophy. Buddhist texts reflect this tendency, providing a clearer picture of what Gautama may have taught than of the dates of the events in his life. These texts contain descriptions of the culture and daily life of ancient India which can be corroborated from the Jain scriptures, and make the Buddhas time the earliest period in Indian history for which significant accounts exist.[27][full citation needed] British author Karen Armstrong writes that although there is very little information that can be considered historically sound, we can be reasonably confident that SiddhÄ rtha Gautama did exist as a historical figure.[28][dubious – discuss] Michael Carrithers goes a bit further by stating that the most general outline of birth, maturity, renunciation, search, awakening and liberation, teaching, death must be true. Biography Conception and birth Purported birthplace of Gautama Buddha in Lumbini, a holy shrine also for Hindus, who believe Buddha is the 9th of 10 Dashavataras of Vishnu. Most scholars regard Kapilavastu, present-day Nepal, to be the birthplace of the Buddha.Other possibilities are Lumbini, present-day Nepal Kapileswara, Odisha, present-day India; and Piprahwa, Uttar Pradesh, present-day India. According to the most traditional biography, Buddha was born in a royal Hindu family to King Ã…Å¡uddhodana, the leader of Shakya clan, whose capital was Kapilavastu, and who were later annexed by the growing Kingdom of Kosala during the Buddhas lifetime. Gautama was the family name. His mother, Queen Maha Maya (MÄ yÄ devÄ «) and Suddhodanas wife, was a Koliyan princess. Legend has it that, on the night Siddhartha was conceived, Queen Maya dreamt that a white elephant with six white tusks entered her right side, and ten months later Siddhartha was born. As was the Shakya tradition, when his mother Queen Maya became pregnant, she left Kapilvastu for her fathers kingdom to give birth. However, her son is said to have been born on the way, at Lumbini, in a garden beneath a sal tree. The day of the Buddhas birth is widely celebrated in Theravada countries as Vesak. Buddhas birth anniversary holiday is called Buddha Poornima in India as Buddha is believed to have been born on a full moon day. Various sources hold that the Buddhas mother died at his birth, a few days or seven days later. The infant was given the name Siddhartha (PÄ li: Siddhattha), meaning he who achieves his aim. During the birth celebrations, the hermit seerAsita journeyed from his mountain abode and announced that the child would either become a great king (chakravartin) or a great holy man. By traditional account, this occurred after Siddhartha placed his feet in Asitas hair and Asita examined the birthmarks. Suddhodana held a naming ceremony on the fifth day, and invited eight brahmin scholars to read the future. All gave a dual prediction that the baby would either become a great king or a great holy man.[32]Kaundinya (Pali: Kondaà ±Ãƒ ±a), the youngest, and later to be the first arahant other than the Buddha, was reputed to be the only one who unequivocally predicted that Siddhartha would become a Buddha While later tradition and legend characterized Ã…Å¡uddhodana as a hereditarymonarch, the descendant of the Solar Dynasty of Iká ¹ £vÄ ku (PÄ li: OkkÄ ka), many scholars think that Ã…Å¡uddhodana was the elected chief of a tribal confederacy. Early texts suggest that Gautama was not familiar with the dominant religious teachings of his time until he left on his religious quest, which is said to have been motivated by existential concern for the human condition.At the time, many small city-states existed in Ancient India, called Janapadas. Republics and chiefdoms with diffused political power and limited social stratification, were not uncommon amongst them, and were referred to as gana-sanghas. The Buddhas community does not seem to have had a caste system. It was not a monarchy, and seems to have been structured either as an oligarchy, or as a form of republic. The more egalitarian gana-sangha form of government, as a political alternative to the strongly hierarchical kingdoms, may have influenced the development of the Shramana-type Jain and Buddhist sanghas, where monarchies tended toward Vedic Brahmanism. Early life and marriage Departure of Prince Siddhartha Siddhartha was born in a royal Hindu family.[30] He was brought up by his mothers younger sister, Maha Pajapati.[38] By tradition, he is said to have been destined by birth to the life of a prince, and had three palaces (for seasonal occupation) built for him. Although more recent scholarship doubts this status, his father, said to be King Ã…Å¡uddhodana, wishing for his son to be a great king, is said to have shielded him from religious teachings and from knowledge of human suffering. When he reached the age of 16, his father reputedly arranged his marriage to a cousin of the same age named YaÅ›odharÄ  (PÄ li: YasodharÄ ). According to the traditional account,[which?] she gave birth to a son, named RÄ hula. Siddhartha is said to have spent 29 years as a prince in Kapilavastu. Although his father ensured that Siddhartha was provided with everything he could want or need, Buddhist scriptures say that the future Buddha felt that material wealth was not lifes ultimate goal.[38 ] Departure and ascetic life. The Great Departure of Siddhartha Gautama, surrounded by a halo, he is accompanied by numerous guards, maithuna loving couples, and devata who have come to pay homage; Gandhara, Kushan period Prince Siddhartha shaves his hair and becomes an ascetic. Borobudur, 8th century At the age of 29, the popular biography[which?] continues, Siddhartha left his palace to meet his subjects. Despite his fathers efforts to hide from him the sick, aged and suffering, Siddhartha was said to have seen an old man. When his charioteer Channa explained to him that all people grew old, the prince went on further trips beyond the palace. On these he encountered a diseased man, a decaying corpse, and an ascetic. These depressed him, and he initially strove to overcome ageing, sickness, and death by living the life of an ascetic.[39] Accompanied by Channa and riding his horse Kanthaka, Gautama quit his palace for the life of a mendicant. Its said that, the horses hooves were muffled by the gods[40] to prevent guards from knowing of his departure. Gautama initially went to Rajagaha and began his ascetic life by begging for alms in the street. After King Bimbisaras men recognised Siddhartha and the king learned of his quest, Bimbisara offered Siddhartha the throne. Siddhartha rejected the offer, but promised to visit his kingdom of Magadha first, upon attaining enlightenment. He left Rajagaha and practised under two hermit teachers of yogic meditation.[41][42][43] After mastering the teachings of Alara Kalama (Skr. Ä€rÄ Ã¡ ¸ a KÄ lÄ ma), he was asked by Kalama to succeed him. However, Gautama felt unsatisfied by the practise, and moved on to become a student of yoga with Udaka Ramaputta (Skr. Udraka RÄ maputra).[44] With him he achieved high levels of meditative consciousness, and was again asked to succeed his teacher. But, once more, he was not satisfied, and again moved on.[45] Siddhartha and a group of five companions led by Kaundinya are then said to have set out to take their austerities even further. They tried to find enlightenment through deprivation of worldly goods, including food, practising self-mortification. After nearly starving himself to death by restricting his food intake to around a leaf or nut per day, he collapsed in a river while bathing and almost drowned. Siddhartha began to reconsider his path. Then, he remembered a moment in childhood in which he had been watching his father start the seasons plowing. He attained a concentrated and focused state that was blissful and refreshing, the jhÄ na. Awakening See also: Enlightenment in Buddhism The Buddha surrounded by the demons of MÄ ra. Sanskritpalm leaf manuscript. NÄ landÄ , Bihar, India. PÄ la period According to the early Buddhist texts,[web 6] after realizing that meditative jhana was the right path to awakening, but that extreme asceticism didnt work, Gautama discovered what Buddhists call the Middle Way[web 6]—a path of moderation away from the extremes of self-indulgence and self-mortification.[web 6] In a famous incident, after becoming starved and weakened, he is said to have accepted milk and rice pudding from a village girl named Sujata.[web 7] Such was his emaciated appearance that she wrongly believed him to be a spirit that had granted her a wish.[web 7] Following this incident, Gautama was famously seated under a pipal tree—now known as the Bodhi tree—in Bodh Gaya, India, when he vowed never to arise until he had found the truth.[46] Kaundinya and four other companions, believing that he had abandoned his search and become undisciplined, left. After a reputed 49 days of meditation, at the age of 35, he is said to have attained Enlightenment.[46][47] According to some traditions, this occurred in approximately the fifth lunar month, while, according to others, it was in the twelfth month. From that time, Gautama was known to his followers as the Buddha or Awakened One (Buddha is also sometimes translated as The Enlightened One). According to Buddhism, at the time of his awakening he realized complete insight into the cause of suffering, and the steps necessary to eliminate it. These discoveries became known as the Four Noble Truths,[47] which are at the heart of Buddhist teaching. Through mastery of these truths, a state of supreme liberation, or Nirvana, is believed to be possible for any being. The Buddha described NirvÄ na as the perfect peace of a mind thats free from ignorance, greed, hatred and other afflictive states,[47] or defilements (kilesas). Nirvana is also regarded as the end of the world, in that no personal identity or boundaries of the mind remain. In such a state, a being is said to possess the Ten Characteristics, belonging to every Buddha. According to a story in the Ä€yÄ cana Sutta (Samyutta Nikaya VI.1) — a scripture found in the PÄ li and other canons — immediately after his awakening, the Buddha debated whether or not he should teach the Dharma to others. He was concerned that humans were so overpowered by ignorance, greed and hatred that they could never recognise the path, which is subtle, deep and hard to grasp. However, in the story, BrahmÄ  Sahampati convinced him, arguing that at least some will understand it. The Buddha relented, and agreed to teach. Formation of the sangha Dhà ¢mek Stà »pa in Sà ¢rnà ¢th, India, site of the first teaching of the Buddha in which he taught the Four Noble Truths to his first five disciples After his awakening, the Buddha met two merchants, named Tapussa and Bhallika, who became his first lay disciples. They were apparently each given hairs from his head, which are now claimed to be enshrined as relics in the Shwe Dagon Temple in Rangoon, Burma. The Buddha intended to visit Asita, and his former teachers, Alara Kalama and Udaka Ramaputta, to explain his findings, but they had already died. He then travelled to the Deer Park near VÄ rÄ Ã¡ ¹â€¡asÄ « (Benares) in northern India, where he set in motion what Buddhists call the Wheel of Dharma by delivering his first sermon to the five companions with whom he had sought enlightenment. Together with him, they formed the first saá ¹â€¦gha: the company of Buddhist monks. All five become arahants, and within the first two months, with the conversion of Yasa and fifty four of his friends, the number of such arahants is said to have grown to 60. The conversion of three brothers named Kassapa followed, with their reputed 200, 300 and 500 disciples, respectively. This swelled the sangha to more than 1,000. Travels and teaching Buddha with his protector Vajrapani, GandhÄ ra, 2nd century CE, Ostasiatische Kunst Museum For the remaining 45 years of his life, the Buddha is said to have traveled in the Gangetic Plain, in what is now Uttar Pradesh, Bihar and southern Nepal, teaching a diverse range of people: from nobles to outcaste street sweepers, murderers such as Angulimala, and cannibals such as Alavaka. From the outset, Buddhism was equally open to all races and classes, and had no caste structure, as was the rule for most Hindus in the-then society. Although the Buddhas language remains unknown, its likely that he taught in one or more of a variety of closely related Middle Indo-Aryan dialects, of which Pali may be a standardization. The sangha traveled through the subcontinent, expounding the dharma. This continued throughout the year, except during the four months of the vassana rainy season when ascetics of all religions rarely traveled. One reason was that it was more difficult to do so without causing harm to animal life. At this time of year, the sangha would retreat to monasteries, public parks or forests, where people would come to them. The first vassana was spent at Varanasi when the sangha was formed. After this, the Buddha kept a promise to travel to Rajagaha, capital of Magadha, to visit King Bimbisara. During this visit, Sariputta and Maudgalyayana were converted by Assaji, one of the first five disciples, after which they were to become the Buddhas two foremost followers. The Buddha spent the next three seasons at Veluvana Bamboo Grove monastery in Rajagaha, capital of Magadha. Upon hearing of his sons awakening, Suddhodana sent, over a period, ten delegations to ask him to return to Kapilavastu. On the first nine occasions, the delegates failed to deliver the message, and instead joined the sangha to become arahants. The tenth delegation, led by Kaludayi, a childhood friend of Gautamas (who also became an arahant), however, delivered the message. Now two years after his awakening, the Buddha agreed to return, and made a two-month journey by foot to Kapilavastu, teaching the dharma as he went. At his return, the royal palace prepared a midday meal, but the sangha was making an alms round in Kapilavastu. Hearing this, Suddhodana approached his son, the Buddha, saying: Ours is the warrior lineage of Mahamassata, and not a single warrior has gone seeking alms The Buddha is said to have replied: That is not the custom of your royal lineage. But it is the custom of my Buddha lineage. Several thousands of Buddhas have gone by seeking alms Buddhist texts say that Suddhodana invited the sangha into the palace for the meal, followed by a dharma talk. After this he is said to have become a sotapanna. During the visit, many members of the royal family joined the sangha. The Buddhas cousins Ananda and Anuruddha became two of his five chief disciples. At the age of seven, his son Rahula also joined, and became one of his ten chief disciples. His half-brother Nanda also joined and became an arahant. Of the Buddhas disciples, Sariputta, Maudgalyayana, Mahakasyapa, Ananda and Anuruddha are believed to have been the five closest to him. His ten foremost disciples were reputedly completed by the quintet of Upali, Subhoti, Rahula, Mahakaccana and Punna. In the fifth vassana, the Buddha was staying at Mahavana near Vesali when he heard news of the impending death of his father. He is said to have gone to Suddhodana and taught the dharma, after which his father became an arahant. The kings death and cremation was to inspire the creation of an order of nuns. Buddhist texts record that the Buddha was reluctant to ordain women. His foster mother Maha Pajapati, for example, approached him, asking to join the sangha, but he refused. Maha Pajapati, however, was so intent on the path of awakening that she led a group of royal Sakyan and Koliyan ladies, which followed the sangha on a long journey to Rajagaha. In time, after Ananda championed their cause, the Buddha is said to have reconsidered and, five years after the formation of the sangha, agreed to the ordination of women as nuns. He reasoned that males and females had an equal capacity for awakening. But he gave women additional rules (Vinaya) to follow. Assassination attempts According to colorful legends, even during the Buddhas life the sangha was not free of dissent and discord. For example, Devadatta, a cousin of Gautama who became a monk but not an arahant, more than once tried to kill him. Initially, Devadatta is alleged to have often tried to undermine the Buddha. In one instance, according to stories, Devadatta even asked the Buddha to stand aside and let him lead the sangha. When this failed, he is accused of having three times tried to kill his teacher. The first attempt is said to have involved him hiring a group of archers to shoot the awakened one. But, upon meeting the Buddha, they laid down their bows and instead became followers. A second attempt is said to have involved Devadatta rolling a boulder down a hill. But this hit another rock and splintered, only grazing the Buddhas foot. In the third attempt, Devadatta is said to have got an elephant drunk and set it loose. This ruse also failed. After his lack of success at homicide, Devadatta is said to have tried to create a schism in the sangha, by proposing extra restrictions on the vinaya. When the Buddha again prevailed, Devadatta started a breakaway order. At first, he managed to convert some of the bhikkhus, but Sariputta and Maudgalyayana are said to have expounded the dharma so effectively that they were won back. Mahaparinirvana The Buddhas entry into Parinirvana. Sanskritpalm leaf manuscript. NÄ landÄ , Bihar, India. PÄ la period The sharing of the relics of the Buddha, ZenyÃ… mitsu-Temple Museum, Tokyo According to the Mahaparinibbana Sutta of the Pali canon, at the age of 80, the Buddha announced that he would soon reach Parinirvana, or the final deathless state, and abandon his earthly body. After this, the Buddha ate his last meal, which he had received as an offering from a blacksmith named Cunda. Falling violently ill, Buddha instructed his attendant Ä€nanda to convince Cunda that the meal eaten at his place had nothing to do with his passing and that his meal would be a source of the greatest merit as it provided the last meal for a Buddha.[web 8] Dr Mettanando and Von Hinà ¼ber argue that the Buddha died of mesentericinfarction, a symptom of old age, rather than food poisoning.[48][note 11] The precise contents of the Buddhas final meal are not clear, due to variant scriptural traditions and ambiguity over the translation of certain significant terms; the Theravada tradition generally believes that the Buddha was offered some kind of pork, while the Mahayana tradition believes that the Buddha consumed some sort of truffle or other mushroom. These may reflect the different traditional views on Buddhist vegetarianism and the precepts for monks and nuns. Ananda protested the Buddhas decision to enter Parinirvana in the abandoned jungles of KuÅ›inÄ ra (present-day Kushinagar, India) of the Malla kingdom. The Buddha, however, is said to have reminded Ananda how Kushinara was a land once ruled by a righteous wheel-turning king that resounded with joy: 44. Kusavati, Ananda, resounded unceasingly day and night with ten sounds—the trumpeting of elephants, the neighing of horses, the rattling of chariots, the beating of drums and tabours, music and song, cheers, the clapping of hands, and cries of Eat, drink, and be merry! The Buddha then asked all the attendant Bhikkhus to clarify any doubts or questions they had. They had none. According to Buddhist scriptures, he then finally entered Parinirvana. The Buddhas final words are reported to have been: All composite things (Saá ¹â€¦khÄ ra) are perishable. Strive for your own liberation with diligence (Pali: vayadhammÄ  saá ¹â€¦khÄ rÄ  appamÄ dena sampÄ dethÄ ). His body was cremated and the relics were placed in monuments or stupas, some of which are believed to have survived until the present. For example, The Temple of the Tooth or Dalada Maligawa in Sri Lanka is the place where what some believe to be the relic of the right tooth of Buddha is kept at present. According to the PÄ li historical chronicles of Sri Lanka, the DÄ «pavaá ¹Æ'sa and MahÄ vaá ¹Æ'sa, the coronation of Emperor AÅ›oka (PÄ li: Asoka) is 218 years after the death of Buddha. According to two textual records in Chinese (Ã¥  Ã¥â€¦ «Ã©Æ' ¨Ã¨ «â€" and éÆ' ¨Ã¥Å¸ ·Ã§â€¢ °Ã¨ «â€"), the coronation of Emperor AÅ›oka is 116 years after the death of Buddha. Therefore, the time of Buddhas passing is either 486 BCE according to TheravÄ da record or 383 BCE according to Mahayana record. However, the actual date traditionally accepted as the date of the Buddhas death in TheravÄ da countries is 544 or 545 BCE, because the reign of Emperor AÅ›oka was traditionally reckoned to be about 60 years earlier than current estimates. In Burmese Buddhist tradition, the date of the Buddhas death is 13 May 544 BCE,[49] whereas in Thai tradition it is 11 March 545 BCE.[50] At his death, the Buddha is famously believed to have told his disciples to follow no leader. Mahakasyapa was chosen by the sangha to be the chairman of the First Buddhist Council, with the two chief disciples Maudgalyayana and Sariputta having died before the Buddha. While in Buddhas days he was addressed by the very respected titles Buddha, ShÄ kyamuni, ShÄ kyasimha, Bhante and Bho, he was known after his parinirvana as Arihant, BhagavÄ /Bhagavat/BhagwÄ n, MahÄ vira,[51] Jina/Jinendra, SÄ str, Sugata, and most popularly in scriptures as TathÄ gata. Relics After his death, the Buddha was cremated and the ashes divided among his disciples. According to the PBS series Secrets of the Dead, an urn containing these was discovered in a stupa at Piprahwa near Birdpur [historical British variant as Birdpore], a Buddhist sacred structure in the Basti district of Uttar Pradesh in India by amateur archaeologist William Claxton Peppe in 1898. They were given to the King of Siam (Thailand) a couple of years later, where they still reside. Physical characteristics Main article: Physical characteristics of the Buddha GandhÄ ran depiction of the Buddha from Hadda, Afghanistan; Victoria and Albert Museum, London An extensive and colorful physical description of the Buddha has been laid down in scriptures. A kshatriya by birth, he had military training in his upbringing, and by Shakyan tradition was required to pass tests to demonstrate his worthiness as a warrior in order to marry. He had a strong enough body to be noticed by one of the kings and was asked to join his army as a general. He is also believed by Buddhists to have the 32 Signs of the Great Man. The Brahmin Sonadanda described him as handsome, good-looking, and pleasing to the eye, with a most beautiful complexion. He has a godlike form and countenance, he is by no means unattractive.(D,I:115). It is wonderful, truly marvellous, how serene is the good Gotamas appearance, how clear and radiant his complexion, just as the golden jujube in autumn is clear and radiant, just as a palm-tree fruit just loosened from the stalk is clear and radiant, just as an adornment of red gold wrought in a crucible by a skilled goldsmith, deftly beaten and laid on a yellow-cloth shines, blazes and glitters, even so, the good Gotamas senses are calmed, his complexion is clear and radiant. (A,I:181) A disciple named Vakkali, who later became an arahant, was so obsessed by Buddhas physical presence that the Buddha is said to have felt impelled to tell him to desist, and to have reminded him that he should know the Buddha through the Dhamma and not through physical appearances. Although there are no extant representations of the Buddha in human form until around the 1st century CE (see Buddhist art), descriptions of the physical characteristics of fully enlightened buddhas are attributed to the Buddha in the Digha Nikayas Lakkhaá ¹â€¡a Sutta (D,I:142).[52] In addition, the Buddhas physical appearance is described by Yasodhara to their son Rahula upon the Buddhas first post-Enlightenment return to his former princely palace in the non-canonical Pali devotional hymn, NarasÄ «ha GÄ thÄ  (The Lion of Men).[web 10] Among the 32 main characteristics it is mentioned that Buddha has blue eyes.[53] Nine virtues The nine virtues of the Buddha appear throughout the Tipitaka.[54] Recollection of the nine virtues of the Buddha is a common Buddhist devotional practice, it is also one of the 40 Buddhist meditation subjects. Araham – Worthy of homage. An Arahant is one with taints destroyed, who has lived the holy life, done what had to be done, laid done the burden, reached the true goal, destroyed the fetters of being, and is completely liberated through final knowledge. Sammasambuddho – Perfectly self-awakened Reclining Buddha in Jade Temple, Shanghai Some scholars believe that some portions of the Pali Canon and the Ä€gamas contain the actual substance of the historical teachings (and possibly even the words) of the Buddha.[55][56] Some scholars believe the Pali Canon and the Agamas pre-date the MahÄ yÄ na sÃ… «tras.[57] The scriptural works of Early Buddhism precede the Mahayana works chronologically, and are treated by many Western scholars as the main credible source for information regarding the actual historical teachings of Gautama Buddha. However, some scholars do not think that the texts report on historical events.[58][dubious– discuss][59][60] Hajime Nakamura writes that there is nothing in the traditional Buddhist texts that can be clearly attributed to Gautama as a historical figure:[61] [I]n the Buddhist texts there is no word that can be traced with unquestionable authority to Gautama ÅšÄ kyamuni as a historical personage, although there must be some sayings or phrases derived from him. Some of the fundamentals of the teachings attributed to Gautama Buddha are: The Four Noble Truths: that suffering is an ingrained part of existence; that the origin of suffering is craving for sensuality, acquisition of identity, and annihilation; that suffering can be ended; and that following the Noble Eightfold Path is the means to accomplish this; The Noble Eightfold Path: right view, right intention, right speech, right action, right livelihood, right effort, right mindfulness, and right concentration; Dependent origination: the mind creates suffering as a natural product of a complex process; Rejection of the infallibility of accepted scripture: Teachings should not be accepted unless they are borne out by our experience and are praised by the wise. See the Kalama Sutta for details; Anicca (Sanskrit: anitya): That all things that come to be have an end; Dukkha (Sanskrit: duá ¸ ¥kha): That nothing which comes to be is ultimately satisfying; AnattÄ  (Sanskrit: anÄ tman): That nothing in the realm of experience can really be said to be I or mine; NibbÄ na (Sanskrit: NirvÄ na): It is possible for sentient beings to realize a dimension of awareness which is totally unconstructed and peaceful, and end all suffering due to the minds interaction with the conditioned world. However, in some Mahayana schools, these points have come to be regarded as more or less subsidiary. There is disagreement amongst various schools of Buddhism over more complex aspects of what the Buddha is believed to have taught, and also over some of the disciplinary rules for monks. According to tradition, the Buddha emphasized ethics and correct understanding. He questioned everyday notions of divinity and salvation. He stated that there is no intermediary between mankind and the divine; distant gods are subjected to karma themselves in decaying heavens; and the Buddha is only a guide and teacher for beings who must tread the path of NirvÄ Ã¡ ¹â€¡a (PÄ li: NibbÄ na) themselves to attain the spiritual awakening called bodhi and understand reality. The Buddhist system of insight and meditation practice is not claimed to have been divinely revealed, but to spring from an understanding of the true nature of the mind, which must be discovered by treading the path guided by the Buddhas teachings. Other religions Buddha depicted as the 9th Avatar of god Vishnu in a traditional Hindu representation Main article: Gautama Buddha in world religions In Hinduism, Gautama is regarded as one of the ten avatars of God Vishnu.[note 6] The Buddha is also regarded as a prophet by the Ahmadiyyas[62][63][64] and a Manifestation of God in the Bahà ¡Ãƒ ­ faith.[65] Some early Chinese Taoist-Buddhists thought the Buddha to be a reincarnation of Lao Tzu.[66] The Christian Saint Josaphat is based on the life of the Buddha. The name comes from the Sanskrit Bodhisatva via Arabic BÃ… «dhasaf and Georgian Iodasaph.[67] The only story in which St. Josaphat appears, Barlaam and Josaphat, is based on the life of the Buddha.[68] Josaphat was included in earlier editions of the Roman Martyrology (feast day 27 November) — though not in the Roman Missal — and in the Eastern Orthodox Church liturgical calendar (26 August). 2. Annabhau Sathe Despite lack of formal education, Sathe wrote in Marathi 35 novels, one among which was Fakira (1959). Fakira, which is currently in its 19th edition, received a state government award in 1961. There are 15 collections of Sathes short stories. A large number of his short stories have been translated into many Indian and as many as 27 non-Indian languages. Besides novels and short stories, Sathe wrote a play, a travelogue on Russia, 12 screenplays, and 10 ballads powade(Marahti). Sathe wrote directly from his experiences in life, and his novels celebrate the fighting spirit in their characters who work against all odds in life. Early life Annabhau Sathe was born in the village of Wategaon near Sangli in a family belonging to the Dalit [[Mang [Hindu] (caste)|Mang]] community. (The community has been identified by the Indian government as a SCscheduled caste.) Poverty had prevented Sathe from obtaining formal education. His brother Shankarbhau recounts in his biography of Sathe, titled Majhe Bhau Annabhau, that the family members worked as laborers at the site of Kalyan tunnel when it was being constructed. Writings Lok Rajya, a Maharashtra state government fortnightly, published on 1 November 1993, a special commemorative issue concerning Sathe. The state government also issued in 1998 a collection of his works under the title Lokshahir Annabhau Sathe Nivadak Sahitya.Amartya shinde and Aditya Shinde,Nerul Navi Mumbai 706 also having good information regarding Annabhau Sathe and his relations with Famous Film Actor Balraj Sahani. Other achievements To generate social awareness, he organized stage performances of powade and tamasha, ethnic dances chiefly performed by women, which are popular in rural Maharashtra. He produced 14 tamasha shows. In the late 1940s, the then Home Minister of the Bombay state government Morarji Desai had banned tamasha shows, but Sathe courageously defied the ban by renaming them as lokanatya. People in Maharashtra conferred the epithet lok shahir on Sathe. On the issue of a postage stamp of Anna Bhau Sathe at Chembur, Mumbai minister Pramod Mahajan called Anna as a saint of Maharashtra. Sathe was an important mobilizer in the Samyukta Maharashtra movement. He used the medium of powade to great effect in that movement. Sathe was attracted to communism and had visited USSR. He was a founder member of the Lal Bawta Kalapathak of the Communist Party in Maharashtra. Sathe lived a life of destitution. After spending 22 years in a Ghatkopar (west), chirag nagar slum, Sathe moved to a modest house in Goregaon which the state government provided him in 1968, one year before he died. External links http://www.manase.org/maharashtra.php?mid=68smid=23pmid=8id=800 Authority control VIAF: 13245460 {{Persondata | NAME = Sathe, Annabhau | ALTERNATIVE NAMES = | SHORT DESCRIPTION = Indian writer | DATE OF BIRTH = August 1, 1920 | PLACE OF BIRTH = | DATE OF DEATH = July 18, 1969Tukaram alias Annabhau Sathe was born in the village of Wategaon near Sangli in a family belonging to the Dalit Matang community. on 1st August 1920 (The community has been identified by the Indian government as a scheduled caste.) There are 15 collections of Sathes short stories. A large number of his short stories have been translated into many Indian and as many as 27 non-Indian languages. Besides novels and short stories, Sathe wrote a play, a travelogue on Russia, 12 screenplays, and 10 ballads powade(Marahti). Sathe wrote directly from his experiences in life, and his novels celebrate the fighting spirit in their characters who work against all odds in life. Lok Rajya, a Maharashtra state government fortnightly, published on November 1, 1993, a special commemorative issue concerning Sathe. The state government also issued in 1998 a collection of his works under the title Lokshahir Annabhau Sathe Nivadak Sahitya. Other achievements Sathe worked among the poor. To generate social awareness, he organized stage performances of powade and tamasha, ethnic dances chiefly performed by women, which are popular in rural Maharashtra. He produced 14 tamashashows. In the late 1940s, the then Home Minister of the Bombay state government Morarji Desai had banned tamasha shows, but Sathe courageously defied the ban by renaming them as lokanatya. People in Maharashtra conferred the epithet lok shahir on Sathe. on the Occasion of Postage stamp of Anna Bhau Sathe at Chembur,Mumbai Honrable minister Mr.Pramod Mahajan, called Ann as A saint of Maharashtra. Sathe was an important mobilizer in the Samyukta Maharashtra movement. He used the medium of powade to great effect in that movement. on the same occasion he sung a Chakkad as Mazi Maina Gavavar Rahili Mazya Jiwachi hottiya Kahili-edited by Prof. Balaji Shinde and Amartya shinde,Nerul Navi Mumbai-706 Sathe was attracted to communism and had visited USSR. He was a founder member of the Lal Bawta Kalapathak of the Communist Party in Maharashtra. Also Annabhu sathe was the member of Matang Samaj Kaminty at Satara and Sagli Personal life Sathe lived a life of destitution. After spending 22 years in a Ghatkopar (west) chirag nagar slum, Sathe moved to a modest house in Goregaon which the state government provided him in 1968, one year before he died. Honors Many cultural organizations and roads in Maharashtra have been named after Sathe. Shahir Bapu Pawar (Solapur, Contact no 8805500620) have written song on Annabhau Sathes life release Adio cassettes CDs also Death-11th July 1969 | PLACE OF DEATH = }}

Sunday, October 13, 2019

Telecommunications And Network Management Information Technology Essay

Telecommunications And Network Management Information Technology Essay Managing the resources like Information Technology, Telecommunications and Network Management is same as like building a home. The more work you take part and the more work you have to be finished. The people who are destroying cannot fix the works of plumbing and electrical works. So you should go for contractor to direct, watch and manage the whole project. The above condition is same for the IT Organizations. So, the Organization must have a contractor or supervisor to manage all its management functions within it. The contractors or supervisors to manage the network management functions within Organization are FCAPS and ITIL (Information Technology Management). This paper mainly explains about the frameworks or models FCAPS and ITIL, their Life cycles and also their reliable services and also explained briefly about the TMN Model. The Fault, Configuration, Accounting, Performance and Security managements are commonly known as FCAPS. FCAPS is a model but not a product and it is developed by the International Telecommunications Union (ITU) and FCAPS is migrating its managements from reactive state to proactive state. And also explains detailed description about Information Technology Infrastructure Library (ITIL) and their reliable services. ITIL provided services for the IT organisations to meet their business requirement needs and goals and it has set of best practices for managing IT Service Management. IT plays very important role in the organizations business processes. ITIL put the organisations business process goals in a place and providing measurement process for those goals. However there are lot of confusions in the IT Organizations about these frameworks (FCAPS and ITIL). Some of the professional think that they are alternate approaches to reach the same goal. But some other professionals think that they are mutually exclusive. There are lot more confusions and comparisons about these frameworks. But now many of the IT Organizations are adopting ITIL because of greater flexibilities of their services. Keywords: FCAPS, ITIL, ITIL Services and Information Technology Service Management (ITSM), TMN, ITU. Introduction: The network management is used to maintain the large number of networks, and those are often in the areas such as telecommunications and computers. The network management is mainly executes the functions such as security, deployment, monitoring, controlling, allocating, coordination and planning. Why Network Management Models? The network management is very complicate to implement. So, in order to work the total network management perfectly we are breaking down network functions into the smaller chunks. By implementing these smaller chunks we can get the total management of the networks. For implementing all the network management functions we are using the network models. Those are TMN (Telecommunications Management Network) FCAPS (Fault, Configuration, Accounting, Performance, Security Management) ITIL (Information Technology Infrastructure Library) All these models mainly involved in the business management in IT (Information Technology) organization and providing reliable or robust information infrastructure services to it is a main criteria of the network models. Many multinational companies considering these network models in top 10 position but they are not giving top position. But the interesting thing is that some of the companies are not giving priority for these network Models for their business management. So, by this effect the companies are providing their services to customers below 20% and also the delivered products also not working more than 3 years. So the companies need to follow the Network Models for providing robust and reliable services to the clients and employees. FCAPS Model is running efficiently with TMN layer but more is needed from this or extra version of this model. And below explained more details about the network models. TMN (Telecommunications Management Network) Model: TMN is Telecommunication Management Network. The standard model was first developed by ITU-T (International Telecommunication Union- Telecommunications) in the year of 1993 and was updated in the year 1996. ITU-T recommended this model as a framework where service providers provide their services to deliver to the networks. It has provided layered architecture for different levels of abstraction. The layered architecture as below BML-Business Management Layer SML-Service Management Layer NML-Network Management Layer EML-Element Management Layer The above layered architecture is the TMN logical layered architecture. By using this layered model architecture we can understand clearly how the IT Services depend on the network layers for their business needs and for better performance. FCAPS (Fault, Configuration, Accounting, Performance, Security) Model: FCAPS was developed by the ITU-T in addition to the TMN layered architecture in the year of 1997. FCAPS is a model but not a product. The ITU-T initially developed this model for assisting how to manage telecommunication networks. It was also an ISO (International Organization for Standardization) model for the network management. The FCAPS framework is also called as Open System Interconnect (OSI) Network Management Model for network management implementations. This works based on TMN Layer and performs their functionality at each and every stage of TMN architecture layer. FCAPS Management: The Standard Model FCAPS management depends on OSI (Open System Interconnect). The OSI specifies five key areas which are under the FCAPS model. Those are Fault Management, Configuration Management, Accounting Management, Performance Management, and Security Management. F-Fault Management C- Configuration Management A- Accounting Management P- Performance Management S- Security Management Fault Management (F): In this functional area it is used as analysis of alarms and faults in the network. The network has ability to identify and isolate problems and providing information to appropriate person whom to deal with the problems. In this the network is always in a running status and the downtime is minimized. The Fault management is the well known area of the network management. More Functionalities of Fault Management are: Fault detection, clear correction, fault correction, network recovery, fault isolation, alarm handling, alarm filtering, alarm generation, diagnostic test, error logging, error handling and error statistics. EX: CiscoWorks LMS (LAN Management Solution) Device Fault Manager (DFM). CiscoWorks LMS (LAN Management Solution) Device Centre for troubleshooting. Configuration Management (C): In the configuration management functional area the network is controlled and monitored and maintaining the status of the networks. Installing new components against the old components and maintained carefully by managing, recording and performing. In this area the main operations are routing tables, Service set identifier assignment, IP addressing scheme and maintain the information on the devices. One of the most important things a network manager can maintain a good network health by managing the device configurations. More functionalities of Configuration Management are: Resource initialization, network provisioning, auto discovery, backup and restore, resource shut down, change management, pre-provisioning, inventory management, copy configuration, remote configuration, job initiation and automated software distribution. EX: CiscoWorks LMS (LAN Management Solution) Resource Manager Essential (RME). LMS Campus Manager. LMS Cisco View. Accounting Management (A): The accounting management level is also called as allocation level. In this the network manager gathers the user usage statistics and allocation of costs associated with the bills per time and providing services by the devices. One more privilege of accounting management is that allows actions of users and better use of available resources. More functionalities of accounting management are: supporting for different modes of accounting, audits, set quotes for usage, tracking the service, cost of the service, accounting limit, combine cost for more devices, fraud reporting. EX: Cisco Access Control Server (ACS) combined with LMS (LAN Management Solution) and NCM (Network Configuration Management). Performance Management (P): The performance of the networks depends upon the quality of networks and system statistics (Configurations). For better performance, the network collects the data, maintaining the proper utilization of data, free from errors, maintaining the response time when the data is tracked and finally availability of data. Performance management is as simple as monitoring CPU and also as complex as end to end application monitoring. More functionalities of Performance Management are: consistent performance level, performance data generation, and problem reporting, performance data collection, and static collection, performance data analysis, capacity planning and examining historical logs. EX: CiscoWorks LMS (LAN Management Solution) Internet Performance Monitor (IPM). LMS: Device Fault Manager (DFM). Security Management (S): The Security Management functional area defines the process and procedures for network security by protecting the network from hackers and unauthorised users. We should have to hide the information to the unknown users possibly. The network administrator can control individual user what he can do and what he cannot do with the system. More functionalities of Security Management are: resource access, data privacy, access logs, enable NE functions, user access rights checking, security alarm for event reporting, takes care of security, security audit trail log and security related information distribution. EX: Cisco Access Control Server (ACS). LMS depends on the Secure Sockets Layer (SSL), Simple Network Management Protocol (SNMP) and other security Audits. Where does FCAPS fit? All the managements under the FCAPS are applicable to manage the applications. But managing the application is not same that managing a network. The applications have a set of problems that are affected by the network. EX: VoIP Management using FCAPS FCAPS model is applicable for the life cycle of VoIP / IPT (Voice over Internet Protocol / information Protocol Telephony). But dont think this model is only applicable for the VoIP. VoIP is a application but not a network. This is also applicable in four stages of IT project life cycle. Those are planning, designing, deployment and in operational. FCAPS on other IT Services: For all key factors of FCAPS framework has provided extended functionalities. The extended functionalities of FCAPS also called as ITEF (Information Technology Extended Framework). The functionalities provided in the FCAPS are developed independent of operating system and any application type. Those functionalities can work in any operating system, any applications types and support for different types of IT services. The extended functionalities for FCAPS on IT services are like a tree view structure so the consumer easily navigate to detailed level if he needed. The structure of FCAPS functionalities are given below. The extended functionalities provided by the FCAPS are used in different types of organizations particularly for the IT Services. The IT service document mainly describes the category of coverage and individual services described in the IT management. EX: Change Management in Configuration Management: The change management is the extended functionality under the configuration management. It is for the authorizing, recording, monitoring and reporting all the services to the Open System environment. The primary responsibilities provided in the change management system are Auditable mechanism for handling all changes within the integrated management system. Review process for all authorising changes. Process for all changes tested and validated. Creating a mechanism for review change for not authorised from the change management process. ITSM (Information Technology Service Model): The IT Service Model is providing very important roles for the ITEF (Information Technology Extended Framework). The main structure of IT Service Model as below Fault Management | Backup Recovery | Disaster Recovery | User data restoration | Policy Chargeback Service Levels | Procedures Escalation Service Request This ITSM (Information Technology Service Model) can be implemented in all the platforms to create the Service Level descriptions and to create SLAs (Service Level Agreements) between the IT resource provider organizations and the end-user consumer organizations. The below example explains the sample Service Level Description of IT Service user data backup can be used as a guideline and should be modified and compatible to local data centre policies and conventions. Service Name: User data backup Schedule of the Service: Maintenance Window Task. Service Levels: Mission Critical Level: The user data will be stored in the central management backup system where data will be stored in daily based services. So, we can get the data backup from the central management system. They will be charge you for getting the user data to back. Charge for backup data in Mission Critical level The cost will be 1000$ + 8$ per 100 GB capacity of data per one month. Business Critical Level: In the business critical level the user data will be stored in to the central management backup system on weekly basis and daily incremental services. The cost will be quite less when compared to the mission critical level. Charge for backup data in Business critical level The cost will be 500Â £ + 60$ per 100GB capacity of data per a one month. Business Support Level: In the business support level the user data will be store in to the local attached file system on weekly basis and daily incremental basis. The cost will be very low compared to the mission critical and business critical levels. Charge for backup data in Business Support level The cost will be 200$ + 40$ per 100GB capacity of data per a one month. Applying ITIL (Information Technology Infrastructure Library): While FCAPS is a great model to defining and understanding of the Network Management objectives, and another framework come in for giving best services for network management with the alignment of current IT organization structure and expands to the FCAPS framework Model. That is ITIL (Information Technology Infrastructure Library). The Central Computer and Telecommunications Agency (CCTA) from United Kingdom created the ITIL in the year of 1978 to grown up the Information Technology to meet the business needs and goals. This is developed by the experienced and talented people in the UK and by the practitioners in worldwide. The IBM Company is using the ITIL libraries for the best practices and then the official versions of the ITIL beginning to release. The latest version is ITIL v3 which was released in the year of 2007. This ITIL is customizable framework for giving quality services and avoiding some faults in the current Information Technology. The ITIL can be used for better IT Service independent of type and size of the organization, multinational or Region Company, centralised or decentralised IT provision, an IT company with only one employee. The ITIL (IT Infrastructure Library) has seven steps to implement. Those are Service Support, Service Delivery, and Planning to implement Service Management, Information and Communication Technology Infrastructure Management, Application Management, Security Management and the business prospective. The main component of ITSM (Information Technology Service Management) is divided into following different sections. Those are ITIL Service Delivery ITIL Service Support ITIL Security Management ITIL Information Communications Technology (ICT) Infrastructure Management ITIL Application Management ITIL Software Asset Management The Business Prospective. ITIL Service Delivery: The Service Delivery is the key factor in providing the services over the network and should be able to deliver consistently. And it is also used for managing the IT Services and involvement of number of IT Service management practices agreed between the service provider and the customer. Service Delivery has 5 disciplines. Those are Service Level Management Capacity Management Continuity Management Availability Management IT Financial Management The Service Level Management is mainly concentrates on the monitoring and identification of IT services provided in the SLAs (Service Level Agreements). It is also used to provide arrangements with the external service suppliers and the internal service providers in the form of an OLAs (Operational Level Agreements). Responsibility of Service Level Management is to take care of agreed IT services to supply to the appropriate persons or organizations within the time management. The Capacity Management is defending the cost effective and the best IT services by helping the organizations in order to match their business needs. The activities of Capacity Management are Workload Management, Capacity Planning, Resource Management, Performance Management, Modelling, Demand Managements and Application Size. The Continuity Management is supports the proactive measurement of IT Service. It easily identifies the error before get to process so that makes the IT Service can in continuous way. The Responsibility of Continuity Management is performing the risk management to identify threats, assets for each IT Service and also able to give options of the recovering the IT Service. The Availability Management is targets the industries or organizations should check out the availability of IT Services with low cost to run the organization in a perfect way. The activity of the Availability Management is mainly concentrates on reliability, Serviceability, Resilience, Security and maintainability of the IT Services. The Finance Management is ensuring that the infrastructure of the IT Organization is cost effective. We used to calculating the cost of the IT services often so that we can estimate the cost of the IT services in the organization. We can recover the costs by providing the customer services to the customers. ITIL Service Support: ITIL Service Support is the most typical Network Operation Centre (NOC) in all organizations. This is mainly concentrates on applications those are required by the end users. The operations are troubleshooting, supporting new applications over the network and help desk. The best practice of those Service Delivery disciplines that is used to enable the IT services to work effectively. ITIL Service Support has 6 disciplines. Those are Configuration Management Incident Management Problem Management Change Management Service / Help Desk Release Management. In the above disciplines the Problem Management identifying the applications which have some faults and giving troubleshooting speciality of those applications to run perfectly and also solves performance problems in the environment. To solve the problems in the network environment by troubleshooting you will be having good understanding of networks and their configurations are required. We can get those configurations by using another discipline using configuration management for this we have to refer configuration management database. The change management is involves with the both problem management and configuration management. If the management has made problems with the infrastructure so definitely there will be changes with the configuration then some problem raised with the configuration. The service will be help full in implementing other factors like PC to client PC installations and implementation and designing of networks and some other duties. The total 11 ITIL disciplines are used for reducing the costs, to work operations effectively, and for better alignment of IT and business needs and goals. ITIL Security Management: The most important key role for the network management is the security. The external hackers or threats access data through firewalls and based on access permissions. We can gain the security by using proper configuration of network rights and permissions to the users that make the unauthorised users cannot access the data from end users. ITIL Infrastructure Management: The Infrastructure Management is concentrates on installations and configurations of network designs in the organizations. Generally in the big organizations the designing and troubleshooting of networks are treated as separate entity than the installation equipment. So that is the reason for IT organizations required accurate configurations. ITIL Application Management: The application management is mainly concentrated on whether the application is able to configure and design to implement in the organization environment or not. Some applications are giving late signals and not providing some other links in it. So this maintains the proper application providing suitable services delivered to the end users. ITIL Software Asset Management: The ITIL Software Asset Management is essential for every organization. This is mainly deals with the installation steps for software, their license periods and also giving some partial configuration of that particular software. It gives so much information before going to install software and also providing in how many instances a software can install in a drive. This is essential for a big or small organization to run IT operations. So, this is very important for the network management. In the version ITIL v2 only two developed modules of Service support for IT Services and Service Delivery of IT Services are included. But in the next and the latest version ITIL v3 has included lot of modules which will help to increase the efficiency of IT Services and their business needs. Even though it has included lot of services to increase the IT standards to the top level but some disadvantages are there to decrease the services. Comparisons of FCAPS and ITIL frameworks: If we understand both FCPAS and ITIL frameworks that are overlapped with some concepts while addressing. In both the frameworks, they have completed their stages which are not associated with the specific instance. Initially the FCAPS model is mainly concentrates on the different types of management levels with the help of TMN layered network model. But another important framework ITIL is mainly concentrates on the IT Organization to run efficiently with the help of their suitable services. There are lot of advantages and inconsiderable disadvantages in both of the frameworks. Still the professionals have confusion about what to start? And which framework is suitable for their organization? Now International Organizations are adopting the ITIL frameworks within the organization for great success of their services and much more savings of money while operating it. Why ITIL and Why not FCAPS: Initially all the international organizations using the FCAPS model and later on it was dominated and get down by the latest model that is ITIL. Now every Organization looking to implement the new things within the money management, and they have observed that ITIL is the better option to reduce their expenses when compared to FCAPS model. So, this is one of the key successes of ITIL. One more factor supports the ITIL, ITIL is used to manage and organize different IT deportments of problems at a time with one comprehensive volume. Where as in FCAPS we have consider the deportment separately and recovered from the problems. Another factor that let down the FCAPS service is that in the traditional environment of FCAPS model is a wired network with clear description of hierarchical architecture with deterministic behaviour of end points. Unlike WLANs (Wireless Local Area Networks), there are some factors effecting the wired network environment. But on the other side wireless networks which rules the world and many factors effect on it. By using wireless based networks they can change dynamically IP (Internet Protocol) address, location and status of their connectivity. But the dynamic nature of Clients connectivity is not a fault there is no client specific management in the FCAPS. FCAPS is a useful tool and this can be used in the traditional environment but cannot be used in the wireless related networks. Another beef of FCAPS that will tells you if there is a problem raised in the services of network management but it wont tell the address of the problem, how to repair it and how to resolve complex situation at the same time. ITIL has gained the tremendous success when it was executed in different organisations under different circumstances in different parts of the world. Even though ITIL has lot of advantages for IT Management but there are some inconsiderable disadvantages that are raised by the IT professionals. ITIL is comprehensive to implement the IT Management. The publications of ITIL are also saying that it is not holistic to implement IT. Another disadvantage raised by the IT Professionals that is even though ITIL is mostly accepted by the IT Managers for business needs this led to skip some of the pragmatic solutions for their business needs and this is unacceptable. The FCAPS model can handle fault and configuration management perfectly but the organizations depend on other tools to implement security related issues. The ITIL deals total managements including security clearly. Conclusion: NMRU is Network Management R Us is prestigious company in the UK. All Network Management companies must follow the network management models like TMN, FCAPS and ITIL for better performance, security, identifying and solving future network problems. The company currently NMRU using the FCAPS model and this model usually layered with TMN. There are new features arrived in the UK Public Sector and now wanted to migrate to the Information Technology Infrastructure Library (ITIL).