Thursday, November 28, 2019

Steriods Informative Speech free essay sample

Today I would like to enlighten the class on what I’ve learned about Anabolic Steroids and the causes it has on our body. Introduction Attention material: According to Do Something. Org, Science Daily quotes that â€Å"A recent study found that 57%of high school steroid users said that they would risk shortening their life for increased performance†. Also according to Science Daily, Oregon Health amp; Science University states In 2003, seventh-grade girls were the fastest-growing group of steroid users, with more than seven percent using them. † The growth of steroids has been increasing to an extreme rate and we need to do something to decrease these numbers. Thesis Statement: Today I would like to enlighten the class on what I’ve learned about Anabolic Steroids and the causes it has on our body. Preview: First we will explain the history of steroids, second, how they are admitted in the body, and third, the overall effects of steroids in the human body. We will write a custom essay sample on Steriods Informative Speech or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Transitions: After hearing some surprising facts, we are going to go in depth to learn the history on how steroids began. Body I. The history of steroids can be traced from Ancient Greece but the true Steroid that is used to day was created in 1931. A. Ancient Greece was known to have used the first type of steroids back in the original Olympic games, which was to eat raw animal testicles. Although that might sounds gross and disgusting, technically it would be distinguished as Sports Doping in modern terms states. (Steroids. om/History-of-Steroids. php) B. When man truly wanted to create a performance enhancement, The Association Against Steroid Abuse states, â€Å"The 1930’s a German chemist, Adolf Butenandt started the manufacturing of testosterone marked the invention of anabolic androgenic steroids (AAS), as we know them today. † C. According to A. A. S. A, after the development of the anabolic steroids, the first official use for Anabolic Steroids â€Å"adapted a variety of purposes including the increase of aggression in Nazi soldiers to elite-levels athletes in 1950’s. Transitions: Now that we know about the history on steroids and where it began, lets transfer to how steroids are admitted into the body. II. There are numerous ways to take steroids such as the basic injection, orally and more complicated ways. A. The most common way steroids are admitted is through Intramuscular Injection. According to steroidabuse. com, Intramuscular Injection is â€Å"deep within the muscle, typically the buttocks† B. The next form of administration is Oral Administration. These are â€Å"available in tablet, capsule and liquid†¦requires an alteration to base molecule in order to survive passing through the liver. † (A. A. S. A) C. Another form of taking steroids is through Transdermal Administration. These steroids are available in creams, gels or patches. According to Steroids 101, â€Å"They are rubbed on directly as one would apply a lotion. This type of administration is generally used during hormone replacement therapy as it provides the most constant rate of release into bloodstream. † D. The last way of admitting steroids through your body is through Subcutaneous Injection. Association against steroid abuse describes it as â€Å"Human Growth Hormone and other related compounds being applied by injection under the skin. This requires pulling the skin away from the muscle and injecting in the pocket of air that is formed† Transitions: Since we now know the ways to take steroids, lets finally focus on the effects of steroids. III. The effects of steroids are quite common with every single user; they can differ though from men to women, both good and bad. A. According to Fitness For World, the positive effects steroids have in people is that after â€Å"a knee or shoulder injury, steroids are used in small quantities by physicians for treating some types of Anemia†¦Ã¢â‚¬  Another explain on why steroids are helpful is that it fights against AIDS. According to an article titled Effects of Steroids, it states that â€Å"It helps a person to gain weight for chronic nutritional deficiencies or AIDS wasting syndrome. B. With the use of Steroids for men, the effects can be quite scary. WebMD. om states â€Å"Men who take anabolic steroids may: Develop breasts, Get painful erections, Have their testicles shrink, and have decreased sperm count. C. According to Daniel J. DeNoon, A WebMD Health News writer, he states for woman the effects are â€Å" Growing excessive face and body hair, Have their voices deepen, Experience menstrual irregularities, and have reduced breast size. D. Common side effects for woman and men as stated in the article Health Effects of Steroids â€Å" For both sexes†¦Kidney stress/damage, High blood pressure, Hair loss, Cardiovascular diseases, Acne, Enlarged heart, and Tendon amp; ligament injuries. Conclusion Summary Statement: In short we now know the history behind steroids; the different types admissions of these drugs into the body, and the pros and cons of this drug both through men and woman. Concluding Remarks: Ultimately, you know that steroids are very attainable for men and women, young and old. So the next time you hear about an athlete getting kicked out of a sport because they were taking steroids, you know why. With all the information I have provided in this informative speech we have all learned a little more knowledge about steroids.

Sunday, November 24, 2019

French Revolution of 1789 - Timeline

French Revolution of 1789 - Timeline Our narrative history for this period begins here. 1789 January January 24: The Estates General is officially summoned; election details go out. Crucially, no one is really sure how it should be formed, leading to an argument over voting powers. January - May: The Third Estate politicises as cahiers are drawn up, political clubs form and discussion takes place both verbally and through pamphleteering. The middle class believe they have a voice and intend to use it. February February: Sieyes publishes What is the Third Estate? February - June: Elections to the Estates General. May May 5: The Estates General opens. There is still no decision on voting rights, and the third estate believe they should have more of a say. May 6: The Third Estate refuses to meet or verify their election as a separate chamber. June June 10: The Third Estate, now frequently called the Commons, gives an ultimatum to the other estates: join in a common verification or the Commons would go on alone. June 13: A few members of the First Estate (priests and clergy) join the Third. June 17: The National Assembly is proclaimed by the former Third Estate. June 20: The Tennis Court Oath taken; with the National Assemblys meeting place closed in preparation for a Royal Session, the deputies meet at a tennis court and swear not to disband until a constitution is established. June 23: The Royal Session opens; the King initially tells the estates to meet separately and introduces reforms; the deputies of the National Assembly ignore him. June 25: Members of the Second Estate begin to join the National Assembly. June 27: The king gives in and orders the three estates to unite as one; troops are called to the Paris area. Suddenly, there has been a constitutional revolution in France. Things would not stop here. July July 11: Necker is dismissed. July 12: Revolt begins in Paris, caused in part by Neckers dismissal and the fear of royal troops. July 14: The storming of the Bastille. Now the people of Paris, or the mob if you prefer, will start to direct the revolution and violence will result. July 15: Unable to rely on his army, the King gives in and orders troops to leave the Paris area. Louis does not want a civil war, when that might be all that would save his old powers. July 16: Necker is recalled. July - August: The Great Fear; mass panic across France as people fear a noble led backlash against their anti-feudal demonstrations. August August 4: Feudalism and privileges are abolished by the National Assembly in perhaps the most remarkable evening in Europes modern history. August 26: Declaration of the Rights of Man and the Citizen published. September September 11: The King is granted a suspensive veto. October October 5-6: Journee of 5-6 October: the King and the National Assembly move to Paris at the behest of a Parisian mob. November November 2: Church property is nationalised. December December 12: Assignats are created. 1790 February February 13: Monastic vows banned. February 26: France divided into 83 departments. April April 17: Assignats accepted as currency. May May 21: Paris is divided into sections. June June 19: Nobility is abolished. July July 12: The Civil Constitution of the Clergy, a complete restructuring of the church in France. July 14: Feast of the Federation, a celebration to mark one year since the fall of the Bastille. August August 16: Parlements are abolished and the judiciary reorganised. September September 4: Necker resigns. November November 27: The Oath of the Clergy passed; all ecclesiastical office holders must swear an oath to the constitution. 1791 January January 4: Last date for clergy to have sworn the oath; over half refuse. April April 2: Mirabeau dies. April 13: The Pope condemns the Civil Constitution. April 18: The King is prevented from leaving Paris to spend Easter at Saint-Cloud. May May: Avignon is occupied by French forces. May 16: Self-Denying Decree: National Assembly deputies cannot be elected to the Legislative Assembly. June June 14: Le Chapelier Law stopping workers associations and strikes. June 20: Flight to Varennes; the King and Queen attempt to flee France but only get as far as Varennes. June 24: Cordelier organises a petition stating that liberty and royalty cannot co-exist. July 16: The Constituent Assembly declares that the king was the victim of an abduction plot. July 17: Massacre at the Champs de Mars, when National Guard open fire on republican demonstrators. August August 14: Slave rebellion begins in Saint-Domingue. August 27: Declaration of Pillnitz: Austria and Prussia threaten to take action in support of the French king. September September 13: The King accepts the new constitution. September 14: King swears the oath of allegiance to the new constitution. September 30: The National Assembly is dissolved. October October 1: The Legislative Assembly convenes. October 20: Brissots first calls for war against the à ©migrà ©s. November November 9: Decree against the à ©migrà ©s; if they do not return they will be considered traitors. November 12: The King vetoes the à ©migrà ©s decree. November 29: Decree against refractory priests; they will be considered suspects unless they take a civic oath. December December 14: Louis XVI requests the Elector of Trier disperse à ©migrà ©s or face military action. December 19: The King vetoes the decree against refractory priests. Back to Index Page 1, 2, 3, 4, 5, 6

Thursday, November 21, 2019

Anthropology Essay Example | Topics and Well Written Essays - 500 words - 5

Anthropology - Essay Example The first theory of a land bridge between Siberia and Alaska has been around for awhile. If an individual places a map of the world on a table, the continents look like they can fit together. The earth’s crust and upper mantle have plates. These plates slide and move. The moving of these plates cause earthquakes and tsunamis. It also causes land to break apart. Another factor is the ice age. When the great meltdown occurred a land bridge could have been submerged. This land bridge, Beringia, would have connected Siberia and Alaska. If that connection was made, then it is possible that the Native Americans migrated from Siberia. After reaching North America the Native Americas would have migrated south. Another theory is the coastal migration. The Native Americans would have sailed in canoes from Siberia to Alaska. Then the Native Americans would have migrated south to South America. Both continents would be populated before Columbus arrived. This theory would depend on the migrants knowing about the route. The passage would have to be during the summer, or when ice chunks were not present. This is the least likely of the scenarios. The final scenario is migrants came across the giant ice sheet. If an ice age was in full force, migrants might go south for a warmer climate. The trail would have gone toward westward and southward. If the ice shelves were as scientist think, than the ice would have melted without a trace. All three theories depend on one same element†¦food. Prehistoric people hunted for food and warmth from the furs. If the herds of caribou, wooly mammoth, or whatever was around at the time left, the hunter would have gone to search for prey. In the northern parts of Siberia planting a garden to provide for food year round is not an option. The hunters would have had to follow the food. As the animals’ natural instinct led them south, the hunters would have followed. Not only would the hunters

Wednesday, November 20, 2019

Visual art exhibition in Hong Kong Research Proposal

Visual art exhibition in Hong Kong - Research Proposal Example The essay "Visual art exhibition in Hong Kong" discovers the Hong Kong's visual art exhibition. The Hong Kong government has recognized the significance of mega events in developing the tourism sector. It has established the Mega Events Fund (MEF) to host major arts, sports, and cultural events in the country. A three-dimensional painting visual art exhibition, as a mega event, can obtain better return on investment if it is launched in compliance with cultural and economic policies of the country. The expo should take advantages of advanced internet based technologies to provide a great watching experience to the audience. Above all, the event management team must ensure the strong cooperation of the Hong Kong government and global as well as national media to promote the event effectively. The planned expo, a three-dimensional painting visual art exhibition in Hong Kong, falls under the category of a mega event. The term mega event is used to describe high profile worldwide events like Olympic Games, FIFA World Cup, and expos. Although the term mega event has not been well defined, a big event is clearly distinct from a mega event. The number of participants is not only the criterion used to recognize a mega event. According to a study conducted by Harry H. Hiller, â€Å"a mega event is first of all of fixed duration and on a short term basis. The event has a high profile, there is a worldwide interest linked to the event and there is a sustainable and measurable economic outcome†.

Sunday, November 17, 2019

Leadership styles, behaviors and relevant situational factors. Maple Assignment

Leadership styles, behaviors and relevant situational factors. Maple Leaf Food - Assignment Example Maple Leaf Foods (stock market symbol TSX:MFI) is one of Canada’s major food processing companies. As its chief executive officer, McCain holds the strings that control the subordinates. With the strings, Michael McCain can instruct the employees to give their best to produce high quality products to the company’s current and prospective clients. Michael McCain is new in the company. Formerly, Michael McCain was one of the owners of the very popular McCain food products company, which is located in the heart of Canada. Consequently, Michael McCain brings with him many years of experience as one of the managers of his former family-owned company. His former company is also engage in the food processing business. 2. Description of leader’s context (main constituents and the various situation forces at play) Michael McCain heads the company that sells food products to the Canadian public. The company’s original name is Canada Packers. It was Canada’s producer of the biggest volume of food products. The company’s major food product is grounded on hogs. The company ships hog-based products to the United Kingdom. The company also sells cheese products. The company ventures into hog and poultry based food business products. Robert Kelley (1988) 2insists that all corporations sometimes succeed or fail, compete or crumble, on the basis of how they are being management, in the case of McCain, the subordinates can sit back, relax, and enjoy the leadership of McCain as he steers the Maple Leaf Management outside the August 2008 food poisoning crisis smoothly and effortlessly. In 2008, the company ordered the recall of many of its tainted products. The tainted products came from one of its food processing plants. Consequently, Maple Leaf Management ordered the closure of its c ulprit plant. The closure was necessary to bring back the company’s tarnished image. With the announcement of the guilty plant facility, Maple Leaf Management sought to retrieve its former glory of being the producer of one of the most popular and high selling food processing plants in Canada. On that fateful August 24, 2008 date, Maple Leaf Management ordered the closure of its failed Toronto, Canada Plant. The spoiled Maple Leaf Management products cause the deaths of five individuals. In addition more than 24 individuals were treated for eating the spoiled food. Because of the spoiled food consequences, the Government of Canada issued warnings to the public to temporarily avoid buying some of the Maple Leaf Management products. The warning was in place until the cloud of spoilage hovering over the skies of Canada’s communities, is resolved. The Canadian government agency, Public Health Agency of Canada, emphasized that the bacteria, Listeria strain, was the culprit. Many of the customers of Maple Leaf Management either died or were hospitalized for food poisoning in August of 2008. In response to the August 2008 bacteria outbreak where four persons died and many others suffered from food poisoning, Maple Leaf Management ordered the recall of all its products. The move is a good marketing strategy. The marketing strategy was to prioritize the safety of its current and prospective clients, the food customers. The outbreak was called Listeriosis.

Friday, November 15, 2019

Transaction Management And Concurrency Control Computer Science Essay

Transaction Management And Concurrency Control Computer Science Essay As more networks and databases are connected together, the importance of a solid database management system becomes apparent. Transaction and Concurrency Control, Recovery and Backup, and Security are major functions that should be examined when choosing the correct system. Databases which contain your companys valuable information must be properly protected, backed up, and secure from data loss and unauthorized access. In response to this requirement, both Oracle and Microsoft have implemented strong features into their database products. This paper compares the offerings of the two databases in terms of features, functionality, and ease of management. Table of Contents Introduction Overview a) SQL Server Overview b) Oracle Overview Transaction Management and Concurrency Control a) Overview of Transaction Management and Concurrency Control b) SQL Server TM and CC c) Oracle TM and CC d) Comparison Backup and Recovery a) Overview of Backup and Recovery b) SQL Server B and R c) Oracle B and R d) Comparison Security a) Overview b) SQL Server Security c) Oracle Security d) Comparison Conclusion Introduction This paper will provide a comparative review of three database management system functions: transaction and concurrency control, recovery and backup, and security, between Microsoft SQL Server and Oracle. The purpose is to enhance understanding of database functionality and, through comparison, provide insight into the commonalities and differences between two different systems. Overview of Database Management Systems Microsoft SQL Server is a relational database server, with its primary languages being T-SQL and ANSI SQL. ANSI SQL is the American National Standards Institute standardized SQL and is used as the base for several different SQL languages, including T-SQL. T-SQL is a proprietary extension that uses keywords for the various operations that can be performed, such as creating and altering database schemas, entering and editing data, and managing and monitoring the server. Any application that works through SQL Server will communicate via T-SQL statements. T-SQL has some differences/extensions to basic SQL, including local variables, control of flow language, changes to delete and update statements, and support functions for date and string processing, and mathematics. Version 1.0 of SQL Server was released in 1989 and originated in Sybase SQL Server. Microsoft later ended the co-licensing agreement with Sybase and went on to develop their own version of SQL Server. The latest version is SQL Server 2008, released on August 6, 2008, and includes many improvements to speed and functionality, which will be discussed in further detail below. Sample SQL Server Architecture Diagram 1 Oracle Database is a relational database management system produced by Oracle Corporation. Users can utilize the proprietary language extension to SQL, PL/SQL, or the object-oriented language Java to store and execute functions and stored procedures. Oracle V2 was first released in November 1979 and did not support transactions, but had basic query and join functionality. The latest version is Oracle Database 11g, released in 2007, and includes many enhancements to functionality, which will be discussed in further detail below. Sample Oracle 11g Architecture Diagram 2 Transaction Management and Concurrency Control Overview A transaction, a single logical unit of work, is an action or series of actions that are performed by a user or application which can access or change the database contents. A transaction results in database transformation from one consistent state to another, and can either result in success or failure. A failed transaction is aborted and the database restores to the previous consistent state. The Database Management System is responsible for making sure all updates related to the transaction are carried out, or that stability is maintained in the case of a failed transaction. Transactions have four basic properties: Atomicity, Consistency, Independence, and Durability (ACID). Atomicity means that it is a single unit of work. Consistency ensures that data is always held firmly together in a coherent state, even after a failed transaction or crash. Independence ensures that the effects of an incomplete transaction are contained and not visible to other transactions. Durability ensure s that successful transactions result in permanent changes to the state of the database. Concurrency control is the process of managing and controlling simultaneous database operations. This is required because actions from different users and operations must not interfere with functionality, or the database could be left in an inconsistent state. Potential problems that concurrency control can solve are lost updates, inconsistent analysis, and uncommitted dependencies. The two main concurrency control techniques are locking and timestamping.  [3]   SQL Server TM and CC SQL Server fulfills the ACID requirements by using transaction management, locking, and logging. An explicit transaction is created in SQL Server by using the BEGIN TRANSACTION and COMMIT TRANSACTION commands. ROLLBACK TRANSACTION rolls back a transaction to the beginning or another save point within the transaction. SAVE TRANSACTION sets a savepoint within the transaction by dividing the transaction into logical units that can be returned to if part of the transaction is conditionally cancelled. Locking ensures transactional integrity and database consistency. In SQL Server, locking is automatically implemented, and provides both optimistic and pessimistic concurrency controls. Optimistic concurrency control assumes that resource conflicts are unlikely but not impossible, and allows transactions to execute without locking resources. Pessimistic concurrency control locks resources for the duration of a transaction. SQL Server can lock the following resources: RIDs, keys, pages, extents, tables, and databases. It utilizes several lock modes, including shared, update, exclusive, intent, and schema locks. Shared locks allow for concurrent read operations that do not change or update data, such as a SELECT statement. Update locks prevent a common form of deadlock that occurs when multiple sessions are reading, locking, and potentially updating resources later. Exclusive locks are used for data modification operations, such as INSERT, UPDATE, or DELETE, and ensure that multiple up dates cant be made on the same resource at the same time. Intent locks are used to establish a lock hierarchy, and include intent shared, intent exclusive, and shared with intent exclusive locks. Schema locks are used when a schema dependent operation of a table is executed, and include schema modification and schema stability locks.  [4]   A deadlock occurs when two transactions have locks on separate objects and each user is waiting for a lock on the other object. SQL Server can set deadlock priority by scanning for sessions that are waiting for a lock request, and the SET DEADLOCK_PRIORITY command to customize deadlocking. The SETLOCK_TIMEOUT command can set the maximum time that a statement waits on a blocked resource, because the timeout period is not enforced by default.  [5]   Oracle TM and CC Oracle Database offers two isolation levels, providing developers with operational modes that preserve consistency and provide high performance. Statement level read consistency automatically provides read consistency to a query so that all the data the query sees comes from a single point in time when the query began. The query never sees any dirty data or changes made during query execution. Transaction level read consistency extends read consistency to all queries in a transaction. Oracle uses rollback segments, containing old values of data that have been changed by uncommitted or recently committed transactions, to provide consistent views and does not expose a query to phantoms. Oracle Real Application Clusters (RACs) use cache-to-cache block transfer to transfer read-consistent images of blocks between instances. It uses high speed, low latency interconnects to answer remote data block requests. Isolation levels provided by Oracle Database are read committed, serializable, and read-only. Users can choose the appropriate isolation levels for transactions depending on the type of application and workload, using these statements: SET TRANSACTION ISOLATION LEVEL READ COMMITTED; SET TRANSACTION ISOLATION LEVEL SERIALIZABLE; and SET TRANSACTION READ ONLY. The ALTER SESSION function can then be used to change isolation level for different transactions. Read committed is the default transaction isolation level. Each query executed by a transaction sees data committed before the query began. Oracle Database does not prevent other transactions from modifying the data read by a query, so that data can be changed by other transactions between two query executions. This can lead to non-repeatable reads and phantoms in cases where the transaction runs the same query twice. This isolation level is good for when few transactions are likely to conflict, and can provide higher potential throughput. Serializable transactions see only changes made at the beginning of the transaction, plus changes in the transaction itself through INSERT, UPDATE, and DELETE statements. These transactions do not experience non-repeatable reads or phantoms. This isolation level is suitable for large databases and short transactions that update few rows, when there is a low chance that two concurrent transactions will modify the same rows, or where long-running transactions are primarily read-only. A serializable transaction can modify a data row only if it can determine that prior changes were committed before the current transaction began. Oracle Database uses control information in the data block to indicate which rows have committed and uncommitted changes. The amount of history that is retained is determined by the INITRANS parameter of CREATE and ALTER TABLE. To avoid having insufficient recent history information, higher values can be set for INITRANS for tables that will have many transaction s updating the same blocks. If a serializable transaction fails with the CANNOT SERIALIZE ACCESS error, the application can either commit the work executed to that point, execute additional statements with ROLLBACK, or undo the entire transaction. Read-only transactions see only changes made at the time the transaction began and dont allow INSERT, UPDATE, or DELETE statements. Oracle Database uses locks to control simultaneous access to data resources. Low-level serialization mechanisms called latches are used to protect shared data structures in the System Global Area. Oracle automatically gets the necessary locks when executing SQL statements, using the lowest applicable level of restrictiveness to provide the highest possible data concurrency and data integrity. The user may also lock data manually. There are two modes of locking: exclusive and share lock modes. Exclusive lock mode prevents the associated resource from being shared, and is obtained to modify data. The first transaction to lock the data is the only one which can modify it until the lock is released. Share lock mode allows the associated resource to be shared, depending on the operations. Users reading data can hold share locks to prevent a writer access. Multiple transactions can have share locks on the same resource. All locks created by statements within a transaction last until the tr ansaction is completed or undone. Because row locks are acquired at the highest degree of restrictiveness, no lock conversion is needed or performed. Oracle automatically converts table lock restrictiveness from lower to higher as appropriate. Lock escalation is when multiple locks are held at one level of granularity, and a database raises the locks to a higher level of granularity. An example is converting many row locks into one table lock. Oracle Database never escalates locks, because this increases the chances of deadlocks. A deadlock occurs when two or more users are waiting on data locked by each other. This can prevent transactions from continuing to work. Oracle automatically detects deadlocks and solves them by rolling back one of the statements. User generated deadlocks can be avoided by locking tables in the same order for transactions accessing the same data. Oracle Database locks fall into three general categories: DML locks (data locks), DDL locks (dictionary locks), and Internal locks and latches. DML locks protect data (i.e. tables, rows). The purpose is to guarantee the integrity of data accessed by multiple users. Row locking is the finest granularity and has the best possible concurrency and throughput. A transaction always acquires an exclusive row lock for each individual row modified by INSERT, UPDATE, DELETE, and SELECT with the FOR UPDATE clause. If a transaction uses a row lock, it also uses a table lock for the corresponding table. Table locking is mainly used for concurrency control with DDL operations. Table locks are used when a table is modified by the INSERT, UPDATE, DELETE, SELECT with FOR UPDATE, and LOCK TABLE DML statements. These statements require table locks to reserve DML access to the table for the transaction and to prevent conflicting DDL operations. Table locks can be used at both table and subpartition level for partitioned tables. A table lock can be held in the following modes, from least to most restrictive: row share (RS), row exclusive (RX), s hare (S), share row exclusive (SRX), and exclusive (X). A row share table lock is the least restrictive, and has the highest degree of concurrency for a table. It indicates the transaction has locked rows in the table and intends to update them. It is specified by the statement LOCK TABLE IN ROW SHARE MODE. A row exclusive table lock is slightly more restrictive, and indicates the transaction holding the lock has made one or more updates to rows in the table or issued a SELECT FOR UPDATE statement. It is specified by LOCK TABLE IN ROW EXCLUSIVE MODE;. A share table lock is made automatically for a table specified by the statement LOCK TABLE IN SHARE MODE;. A share row exclusive lock is more restrictive and is made for a table specified by the statement LOCK TABLE IN SHARE ROW EXCLUSIVE MODE;. Exclusive table locks are the most restrictive and are specified by the statement LOCK TABLE IN EXCLUSIVE MODE;. DDL locks protect the structure of schema objects (i.e. table definitions). Internal locks and latches are automatic and protect internal data structures such as data files. Only individual schema objects that are modified or referenced are locked during DDL operations. The entire data dictionary is never locked. DDL locks have three categories: exclusive DDL locks, share DDL locks, and breakable parse locks. Exclusive and share DDL locks last until DDL statement execution and automatic commit is complete. Most DDL operations require exclusive DDL locks for a resource to prevent interference with other DDL operations that might reference the same object. If another DDL lock is already held, then the operation must wait until the other lock is released to proceed. DDL operations also create DML locks on the modified schema object. Some DDL operations require share DDL locks to allow data concurrency for similar DDL operations. A share DDL lock is created for the following statements: AUDIT, NOAUDIT, COMMENT, CREATE (OR REPLACE) VIEW/ PROCEDURE/ PACKAGE/ PACKAGE BODY/ FUNCTION/ TRIGGER, CREATE SYNONYM, and CREATE TABLE (if CLUSTER is not used). Breakable parse locks are acquired is created for a SQL statement and each schema object it references. A parse lock does not restrict any DDL operation and can be broken to allow conflicting DDL operations. It is created in the parse phase of SQL statement execution and held as long as the shared SQL area for the statement is in the shared pool. Latches and internal locks protect internal database and memory structures. Users cannot access them. Latches are simple, low-level serialization mechanisms to protect shared data structures in the system global area. The use of latches is dependent on the operating system. Internal locks are higher-level, more complex mechanisms and include dictionary cache locks, file and log management locks, and tablespace and rollback segment locks. Dictionary cache locks are very short and are on dictionary caches while the entries are being modified or used. They make sure that parsed statements dont have inconsistent object definitions. They can be shared or exclusive; shared last until the parse is finished and exclusive last until the DDL operation is finished. File and log management locks protect different files. They are held for a long time because they indicate the status of files. Tablespace and rollback segment files protect tablespaces and rollback segments. All instances must agree whether a tablespace is online or offline. Rollback segments are locked to make sure that only one instance can write to a segment.  [6]   Comparison Microsoft SQL Server is enabled to lock smaller amounts of data at a time, which is a big improvement. There is row-level locking, so now SQL Server locks only the rows that are actually being changed. However, SQL Server has no multi-version consistency model, which means that reads and writes can block each other to ensure data integrity. The difference with Oracle is that the database maintains a snapshot of the data, which prevents queries from hanging without performing dirty reads. Backup and Recovery Overview Database backup and recovery mechanisms ensure that organizations have prepared a copy of their data, or have the tools necessary to recover from a failure. A failure is a state where inconsistency prevents transactions from reaching the desired results. Some types of failures are transaction failure, system failure, media failure, and communications failure. Transaction failure may be caused by deadlocks, time-outs, protection violations, or system errors. Transaction failures can be solved with either a partial or total rollback, depending on the extent of the failure. System failures can be recovered with a restart, or rollback to the last consistent state. Restore/roll forward functions help with restoring the database after a media failure. SQL Server B and R SQL Server databases consist of two physical hard drive files, the MDF and LDF files. MDF files contain all of the data being stored. LDF files contain a record of every data change. Logging data changes make undo operations and backups possible. The log file is cleared, or truncated, after a certain amount of time, which is determined by the database recovery model. SQL Server can maintain multiple databases, with different recovery model settings. The recovery model can be either simple, full, or bulk-logged. With simple recovery, log files are not kept permanently, so when this setting is activated, a full backup must be done. Full backups restore all of the data and cannot be set to a specific time. The full recovery setting refers to a database with a transaction log file history. The log files keep track of every data change operation. The database will stop working if the log file runs out of space, so the auto grow function can be enabled. When running in full recovery, differential and transaction log backups become available. Differential backups copy all data changes since the last full backup. Every time a full backup is run, the differential backup is reset. Transaction log backups copy all data changes since the last full or transaction log backup. They are usually very small and fast. The disadvantage is the level of recovery; if any log backup is damaged or unusable, the data is not recoverable past the last good backup.  [7]   Oracle B and R Oracle databases can be backed up using export/import, cold or off-line backups, hot or on-line backups, or RMAN backups. Exports extract logical definitions and data from the database to a file. Cold or off-line backups shut down the database and backup all data, log, and control files. Hot or on-line backups set the tablespaces into backup mode and backup the files. The control files and archived redo log files must also be backed up. RMAN backups use the rman utility to backup the database. More than one of these methods can and should be used and tested to make sure the database is securely backed up. On-line backups can only be done when the system is open and the database is in ARCHIVELOG mode. Off-line backups are performed when the system is off-line; the database doesnt have to be in ARCHIVELOG mode. It is easier to restore from off-line backups because no recovery is required, but on-line backups are not as disruptive and dont require database downtime. Point-in-time recovery is available in ARCHIVELOG mode only.  [8]   Comparison Starting with version 10g, Oracle Database adopted the Automatic Storage Management (ASM) feature, which automates storage management after a certain point. The DBA allocates storage devices to a database instance and it automates the placement and storage of the files. SQL Server storage management must be done manually, using the Share and Store Management Console in SQL Server 2008, or must purchase a separate tool. Oracles Flash Recovery feature automates the management of all backup files. The Flash Recovery area is a unified storage location for all recovery related files in the Oracle database. The DBA can also change the storage configuration without having to take the database offline. SQL Server also provides the ability to manage backup files, using a backup wizard to manage the relevant files, but does not do it automatically. SQL Server 2008 introduced improvements in backup compression. With compression, less disk I/O and storage is required to keep backups online, resu lting in increased speed. Tradeoffs seem to be between SQL Servers speed and Oracles increased functionality. In Oracle, backups are fully self-contained, but in SQL Server the DBA must manually recreate the system database using the install CD. Oracle also uses the Data Recovery Advisor (DRA) tool to automatically diagnose data failures, show repair options, and execute repairs at the users request. Oracles Flashback technology allows for instant recovery of dropped tables and logical data corruptions. SQL Server provides for data recovery by rebuilding the transaction log, running repair to fix any corruptions, and ensure the logical integrity of data is not broken.  [9]   Security Overview Security is an important part of any organizations database management system. According to Dr. Osei-Brysons lecture notes, security breaches are typically categorized as unauthorized data observation, incorrect data modification, or data unavailability. Unauthorized data observation discloses confidential information to users without the proper permissions. Incorrect data modification can be either intentional or unintentional, but can be devastating to database consistency and can result in unreliable data. Unavailable data can be very costly to an organization, depending on how the data is used. Three requirements for a data security plan include secrecy and confidentiality, integrity, and availability. Secrecy and confidentiality protects data from being accessed by unauthorized parties. Database integrity is important to protect the data from incorrect or improper modification. Availability means preventing and minimizing the damage from unavailable data. Database management systems include some form of access control mechanism to make sure each user has access to only the data they require to perform their jobs. Users are granted certain authorizations by a security administrator to determine which actions can be performed on each object. The database administrator is responsible for account creation, assigning security levels, and granting/revoking privileges. SQL Server Security Security is an integral part of SQL Servers package, according to a recent White Paper commissioned by Microsoft.  [10]  Security features for Microsoft SQL Server 2008 include policy-based management to apply policies to database objects. These policies contain a collection of conditions that can be used to enforce business and security rules. Oracle Security Oracle 11g uses supports strong authentication through KPI, Kerberos, and Radius for all connections to the database except connections made as SYSDBA or SYSOPER. Tablespace encryption provides an alternative to transparent data encryption column encryption by enabling the encryption of the entire tablespace. This is best used with large amounts of data. The transparent data encryption master key can be stored in an external hardware security module for stronger security. 11g also provides increased password protection, secure file permissions, optional default audit settings, and controls on the network callouts from the database.  [11]   Comparison In SQL Server, transparent data encryption encrypts and decrypts data in the database engine and doesnt require more application programming. The functionality is included in SQL Server 2008, but requires a $10,000 per processor additional charge with Oracle Database 11g. SQL Server 2008 allows Extensible Key Management and Hardware Security Module vendors to register in SQL Server and provide management that is separated from the database. This separation of keys from the data provides an additional layer of defense. SQL Server 2008 also has auditing support through an Auditing object, which allows administrators to capture and log all database server activity. The National Vulnerability Database, provided by the National Institute of Science and Technology, reported over 250 security vulnerabilities with Oracle products over a four year period, and none with SQL Server. The report did not list the type and severity of the vulnerabilities, or which specific products were affected, but there seems to be a trend toward vulnerability. Microsoft Update is a fairly straightforward and easy to use patching solution for SQL Server. Computerworld called Oracles patch management system involved excruciating pain and two-thirds of Oracle DBAs dont apply security patches. Oracle seems to be behind in patch management at this time. SQL Server can also prevent highly privileged users from accessing sensitive data through use of the auditing object, assigning individual permissions, module signing, Policy-based management, and additional functionality. Oracle uses Database Vault to control privileged access, but costs 20k per processor. Conclusion The comparative review of Transaction Management and Concurrency, Recovery and Backup, and Security functions on Microsoft SQL Server and Oracle 11g database has shown that there are many similarities in the functionality between the two companies, but also key differences in database management philosophy. I learned that SQL Server seems to have the edge on speed and better security, but Oracle is making many advances in high level functionality and is starting to automate many features than in previous years. I was also able to improve my understanding of the DBMS functions by examining their practical application in separate systems.

Wednesday, November 13, 2019

Mass Media Filling the Moral Void Essay -- Morals Ethics Television En

Mass Media Filling the Moral Void A walk down the streets of D.C. provides more than just exercise and scenery. It is a journey through the stages of Mass Media. The first newsstand one spots is full of every newspaper one could possibly want to read. A couple more steps down the sidewalk, and one can see the televisions flashing through the windows of ESPN Zone, and one is bombarded by the blaring sounds of radios from car stereos and stores alike. It is almost impossible to escape the claw of Mass Media, because there are very few places to which media influence does not extend. Through the beginning of Mass Media during the 1400’s to the present, television, radio and video games have become a large part of every child’s life. With media surrounding more than one’s immediate family, it is hard not to be influenced in everyday life. Experts continue to debate the influence that Mass Media has on the youth of this generation, and whether it is vital to growth or an impairment on a childâ €™s education. The first step when taking a look at Mass Media and its influences is to find out how clearly it can be defined. Mass Media are the mediums or channels through which images, information, and entertainment are sent. As defined by Professor Lawrence Grossberg of Communication Studies, Mass Media is exactly that: media generated from a single point to a large number of points or from a single source to an audience of many people (Grossberg 8). Media can best be explained as communication through television, radio, newspapers or the Internet. Since Mass Media is transported from a single source to multiple sources, it is hard to realize how each person will perceive it. Indeed, the sender of media has little or no contro... ...on, is a topic that will be continually discussed. In any case, no matter which kind of media it is, someone with always find it entertaining. Works Cited: Baker, Karen. "Kick the TV habit for a week." Times-Picayune. 22 Apr. 2004. Lexis Nexis. 13 Feb. 2005 <http://web.lexis-nexis.com>. Grossberg, Lawrence, Ellen Wartella, and D. Charles Whitney. Media Making: Mass Media In A Popular Culture. Thousand Oaks: SAGE Publications Inc., 1998. Guernsey, Lisa. "Tuning Into a Problem." The Washington Post. 9 Nov. 2004. Lexis Nexis. 14 Feb. 2005 <http://web.lexis-nexis.com>. Raymo, Chet. "Bach on the Wing." The Boston Globe. 3 Oct. 2004: 34. Lexis Nexis. 13 Feb. 2005 <http://web.lexis-nexis.com>. Scheibe, Cyndy. "Television in the Lives of Children." CRETv. 15 Feb. 2005. <http://www.ithaca.edu/CRETv>.

Sunday, November 10, 2019

Exploring the greek mythology through the ‘Odyssey’

Literary narratives such as the Greek and the Roman mythologies have played a great part on the development of societies around the world. Especially in the context of western civilization, the mythologies of the Greeks and the Romans significantly shaped the culture of this region. Aside from its culture, it also highly influenced its society in general. In fact, politics and religion are also explained in the light of the Greek and Roman mythologies. In this paper, it will explore on the Greek mythology through the myth on the ‘Odyssey’. More specifically, it will emphasize on its main character by the name of Odysseus or Ulysses. Through this character, this paper will be able to explain the role of myth on the changing cultural make-up of Greece. In particular, this myth will serve as an instrument in identifying the way Greeks perceive and use mythologies. Finally, this paper will also present the different key points of the myth. The Odyssey is an epic of Homer about the adventures of Odysseus. Specifically, this myth is considered as the sequel to the earliest well-known surviving work in Western literature which is the ‘Iliad’. In comparison to many sequels in the present era, the ‘Odyssey’ is considered to be distinct because of its originality and even stands as an independent work. (Napierkowski, 1998a) It has been said that its main character, Odysseus, has been a celebrated hero in the Greek mythology. Being the central character in the ‘Odyssey’, he is best known for is adventures during his ten-year journey home after the Trojan War. His journey to home on Ithaca took ten years because of the anger of the sea god Poseidon. During his journey and adventures, the hero went to many wondrous and dangerous places. Along the way, he lost all his companions and the treasure he had gotten from Troy Arriving home at last after an absence of 20 years, Odysseus had to defeat rivals trying to take possession of his wife and his kingdom. Then he had to prove his identity to his wife, Penelope. (Wickersham, 2000) The adventures of Odysseus are highlighted by his achievement of victory in various challenges or struggles. Among this is the encounter with the Ciconians, the Lotus-eaters, Polyphemus, Aeolus, the Laestrygonians, Circe, Journey to the underworld, the sirens, Scylla and Charybdis, the cattle of Helios as well as the Calypso and the Phaecians. More importantly, one can also add the difficulties he acquired upon his arrival in Ithaca due to the suitors of his wife, Penelope. Eventually, all of these trials were conquered by Odysseus. Therefore, he was dubbed as a hero. Moreover, the qualities he manifested during his trials were considered as the qualities of a real or true hero. Undoubtedly, the voyages and troubles encountered by Odysseus highlights the concept of heroism, loyalty, creativity and order. In addition, the ‘Odyssey’ is also famous for its use of symbolism as well as for the pace and variety of its action. With this, both the ‘Iliad’ and the ‘Odyssey’ set the standard by which epic poetry, if not all poetry of any kind, was judged in the past 1,500 years. More importantly, the story on the wanderings of Odysseus has remained a perennial favorite to the present day. (Napierkowski, 1998a) Basically, the appeal of the ‘Odyssey’ is derived from its nature as being able to present the Greek people as well as the way of life in ancient Greek society. In short, the story serves as an archetype to various societies and not just the Greek community. Particularly, the characters of Penelope and Odysseus serve as a role model to the multitude. Their way of life has been the idealized life of the many. Until today, the moral of the story has continuously been resonated to the people of any culture or ethnic group. Furthermore, the theme of human condition is the most important theme in the ‘Odyssey’. In the story, almost every aspect of humanity is depicted- good, bad, young, old, individuals and groups, the living and even the dead. Other themes also include love and loyalty, order and disorder, heroic craftiness, the nature of women, triumph over temptation, home, the epic journey, the God’s involvement, revenge, heroism and, creativity, imagination and deception. Â  (Napierkowski, 1998b) Indeed, the story of Odysseus made a great impact on the society of the Greek people. In fact, even in the present day, the story on the adventures of this great hero is still related to many people around the world. In the contemporary society, people have created a modern version of the ‘Odyssey’ through the aid of media technology. This is evident on the animated version of this story in order to cater the needs of the children or the young generation. REFERENCES Burns, M. (1996, May 1). The wanderings of the Odysseus: The story of ‘The Odyssey.’ The Horn Book Magazine. Â  72 (3). Napierkowski, Marie Rose. (Ed). (1998). Odyssey: Introduction. Epics for students. Vol.1. Detroit: Gale. (1998). Odyssey: Themes. Epics for Students. Vol. 1. Detroit: Gale, Wickersham, John M. (Ed). (2000). Odysseus. Myths and Legends of the World. Macmillan: Thomson Gale. Â  

Friday, November 8, 2019

GANGS Essays (1641 words) - Crime, Criminology, Urban Decay

GANGS Essays (1641 words) - Crime, Criminology, Urban Decay GANGS OVERVIEW OF GANGS Originally the word gang had no negative connotation. In Old English, gang simply referred to a "number of people who went around together-a group." Today a gang can be defined in four basic ways: ? an organized group with a leader ? a unified group that usually remains together during peaceful times as well as times of conflict ? a group whose members show unity through clothing, language ? a group whose activities are criminal or threatening to the larger society. Gangs are one of the results of poverty, discrimination and urban deterioration. Some experts believe that young people, undereducated and without access to good jobs, become frustrated with their lives and join gangs as an alternative to boredom, hopelessness and devastating poverty. Studies have attempted to determine why gangs plague some communities but there has been no definitive answer. As a result, people working to solve gang problems have great difficulty. They find the situation overwhelming, and the violence continues. EARLY GANGS IN UNITED STATES HISTORY No groups completely fitting the above description of gangs existed in America until the early 1800s, but from the beginning of the European settlement in America there was gang-like activity, especially when class distinctions came into being. Gang members tended to be from the poorer classes and tended to be from the same race or ethnic background. They banded together for protection, recreation or financial gain. THE 20TH CENTURY GANGS In the early 1900s the U.S. economy worsened, the population grew at a rapid pace, and the gap between the rich and poor widened. All across the nation gangs appeared where poor, hopeless people lived. The dawning of the 20th century also brought with it a widespread use of firearms. 1920s By mid 1920s there were 1313 gangs in Chicago and more than 25,000 members. Gang warfare in Chicago was widespread and fighting took place along ethnic, cultural and racial lines. Some gangs had no noticeable cultural, ethnic or national ties and consisted mostly of whites. Chicano Gangs The 1920s and 1930s saw the rise of Chicano (Mexican-American) gangs in Los Angeles. By the 1940s Chicano gangs established their place in Los Angeles-their zoot suits (a style of dress incorporating tapered pants, long wide- shoulder coats and broad-brimmed hats) had become a familiar sight. Fighting back against harassment of white residents and visiting soldiers during the so-called zoot suit riots in 1943 strengthened their cause. Post World War II After World War II gang membership: 1.became younger, 2.the nationality of the membership became largely non-white (though Italians, Irish and other white ethnic groups still made up a percentage), 3.drugs became a more publicized concern, 4.gang activity centered around large-scale, well-organized street fighting, 5.fire-arms were used more often, 6.the structure of organization became more rigid, 7.and society at large became concerned with gangs as a social problem and worked toward rehabilitation. Changes in Ethnic Populations The 1950s During the 1950s gang fighting rose to an all time high in cities like New York, Philadelphia, Boston, Chicago, Detroit, Los Angeles and Cleveland. Gang members were usually in their teens. Codes of dress (black leather jackets were popular) and mannerisms were an important means of identification. Body language said a lot about the nature of the gang. When a gang decided to become a fighting, or "bopping" gang, its members immediately took on a different way of walking. A rhythmic gait, characterized by the forward movement of the head with each step. Terms for fighting were: bopping, rumbling, jitterbugging. Gang members used guns, knives, and homemade weapons. Most common drugs-alcohol, marijuana, heroin. New York gangs fought along racial lines-African-American, white, Puerto Rican. Usually they fought over girls or turf. Turf could be anything from a few blocks to an entire neighborhood. Gang members believed it was essential to protect the honor of their girlfr! iends. And in the late 1950, girl gangs, with strong ties to boy gangs, began to form. Revenge was required by an inflexible code of gang loyalty. It was from such incidents that gangs drew their sense of pride, of "being somebody." In order to combat the rise of violence, organizations like the New York City Youth Board sent social workers into the slums to form relationships with the gangs. In some

Wednesday, November 6, 2019

Chinua Achebes Things Fall Apart Research Paper Example

Chinua Achebes Things Fall Apart Research Paper Example Chinua Achebes Things Fall Apart Paper Chinua Achebes Things Fall Apart Paper Essay Topic: Things Fall apart Things Fall Apart is a novel written by Chinua Achebe in 1958. The novel shows the life of a man named Okonkwo, a strong leader and local wrestling in Umuofia, one of a fictional group of nine villages in Nigeria, which is resident by the Igbo people.It describes his family and personal history, the customs and society of the Igbo, and the influence of British colonialism and Christian missionaries on the Igbo community during the late nineteenth century. In Things Fall Apart,the most shocking and heartrending as the execution of Ikemefuna, an event too dreadful to endure. The reason surrounding the event made the novel more interesting and invited our moral revulsion more intensely than the killing of the messenger. The death of Ikemefuna is a turning point in the novel. The guardianship of the boy was a mark of Okonkwos hard-won status and the highest point of his rise to power. The execution of Ikemefuna is the beginning of Okonkwos decline, for it initiates the series of catastrophes which ended in his death. The text states;That boy calls you father. Do not bear a hand in his death. Okonkwo was surprised and was about to say some things when the old man continued: Yes, Umuofia has decided to kill him. The Oracle of the Hills and Caves has pronounced it. They will take him there. But I want [you] to have nothing to do with it. He calls you father. (59-60). In defense of Okonkwos participation, Okonkwo has no choice but to comply with the monstrous decree of the gods; further, because Ikemefuna is already regarded as a sacrificial lamb, his death already a fait accompli, Okonkwo acts only as a messenger executing the decree of the gods. To stress Okonkwos place as a victim who deserves our sym pathy instead of our vilification Okonkwos killing of Ikemefuna is instinctive. No time was left for him to consider his actions. In other words, his killing of Ikemefuna was not premeditated. The immediate circumstances under whic

Sunday, November 3, 2019

Marketing Essay Example | Topics and Well Written Essays - 2500 words - 24

Marketing - Essay Example It is a sure fact that marketing has addressed those areas which were deemed as the grey ones in the past by the people who had business dealings, undertook high-level strategies, initiated one to one connections and so on (Kotler 2003). This paper will take a keen look on the basis of marketing coming about in full circle and that too for the betterment of the masses in meticulous. Marketing is defined as the art of selling products and/or services through the effective usage of persuasion, psychology and repetition. One must believe that marketing employs a number of practices which are regarded as its sub-fields namely advertising, sales promotion activities, personal selling, public relations (or publicity) and direct mailing to name a few. With the passage of time, the definition of marketing has changed as it has included a pre-manufacture tilt to its basis with regards to a product and/or service. Selling gets differentiated from marketing in the fact that selling is only done when a product is made available on the shelf within a retail outlet while marketing starts even when there is an idea or concept of the related product and thus the whole game starts as a result of this hype within the relevant audiences. Marketing aims to pinpoint the needs of the target consumers and addresses the same whilst meeting their very needs through the purchase of the product/service and its ultimate usage. If there is no selling of the product, there would be no association of the need with the target audience and hence marketing might not be needed at all. Thus marketing looks to solve the problems in which the consumers are tied up and even when there is no problem at all – just to satisfy one’s desires – they are asked to purchase a product/service so as to have a better standing within a particular social circle or society. In other words, this encompasses the basis of self-esteem needs if not

Friday, November 1, 2019

Knowledge Integration in Strategic Management Dissertation

Knowledge Integration in Strategic Management - Dissertation Example Knowledge Management has been discussed and described by several experts. Ron Young, CEO of Knowledge Associates International has defined knowledge management as, â€Å"the discipline of enabling individuals, teams and entire organizations to collectively and systematically create, share and apply knowledge, to better achieve their objectives†(Knowledge Management, 2009). knowledge management is a growing and established discipline and is used in many large organizations. According to Pentland (1995), as cited in Alavi and Leidner (2001), organizational knowledge creation involves developing new content or restoring existing content within the organization’s tacit and explicit knowledge. The start of the knowledge management was mainly in organizations in Northern Europe and North America. However, this concept has grown and has become an essential aspect for companies across the world. Researchers have noticed over the years that almost 75 – 80 percent of all l arge companies have a strong inclination and formal knowledge management programs. Knowledge Management is slowly becoming a major and crucial issue in companies. It is essential to understand that knowledge is a major economic challenge for companies in the future (Hewitt, 2000). For every innovative and successful organization, there is a high need for creating, capitalizing and sharing the Knowledge capital. It is essential to understand that knowledge management is a program that is more of a long-term effort, and includes a strong need for strategic commitment and involves and includes the analysis of the knowledge and capabilities and tools in the company. Business Driver: Since ages, there has been an extremely important and true saying, ‘Knowledge is Power’. Knowledge is the foundation for almost every activity in everyday life. McInerney (2002) believes that knowledge management allows companies to benefit from the knowledge that resides in an organization by using it to achieve the organization's mission. With the attention that is being provided to the products and services alone over the years, the most significant key to value creation has been missed out over the years.