Monday, December 30, 2019

The Washington Metro Transit Authority - 1124 Words

It is against this segregated backdrop that many of the District’s transportation initiatives began. In its 2002 Transit Development Study, the Washington Metro Transit Authority (WMATA) cited several reasons for its focus on transit improvements. Among these reasons was the recognition that the District was growing but not equally in all areas (WMATA, 2002). Its list of â€Å"Promising Transit Routes† included routes extending from areas of traditionally higher-income per household and lower unemployment rates to areas of traditionally lower-income per household and higher unemployment rates. For example, 4 of the 5 routes involved routes to the Minnesota Avenue station from neighborhoods such as Georgetown and Woodley Park. NeighborhoodInfo DC, Urban Institute’s data aggregator, provides profile information for DC’s 39 neighborhood clusters and helps to put the variances of income and unemployment in perspective while also assisting with understanding the rationale behind the selection of these routes by WMATA. Table 1 shows percentages of Black and White residents in these areas and lists the average family income and unemployment rates of each neighborhood as measured by 2010 census data. Based on 2010 Census data. 39 neighborhood clusters made of three to five neighborhoods. Cluster Neighborhood Black Population (%) White Population (%) Average Family Income ($) Unemployment Rate (%) 4 Georgetown 3.7 81 272,850 3.7 15 Woodley Park 4.4 80 303,094 3.2 29 Minnesota AvenueShow MoreRelated Transit Oriented Development Essay1290 Words   |  6 PagesTransit Oriented Development Introduction Policy makers across the country are focusing on numerous ways to combat sprawl throughout the United States. New movements, such as new urbanism, have come to the forefront in this fight. This review is looking into a new concept in the fight on sprawl, called Transit-oriented development or TOD. Although this new tool to fight sprawl is rapidly becoming a popular method, it is still a new concept and needs to be studied further. This reviewRead MoreOffice Of Professional Responsibility And Inspections Essay823 Words   |  4 Pagessolving, immediate response or critical incidents. †¢ Investigate of allegations of Officer misconduct, use of force incidents, complaints, vehicle accidents and other areas when required. These investigations are subject to review by higher authorities and submitted to the Office of Professional Responsibility and Inspections (OPRI) for final review. Interview individuals who were placed into Police custody then by means of any reason sought medical attention inside of the District of ColumbiaRead MoreEducational Cost Essay862 Words   |  4 Pagessignificantly cheaper on campus than renting an apartment off campus, but transportation costs much less for students that live in dorms. Also, I feel like it would be better for me to live on campus, since I would be much closer to other people and authority in case of an emergency.   Ã‚  Ã‚   There are many different meal plan options at UW, and there are even specific meal plans that are designed for those that live in apartments. There are 6 levels to meal plans that are open to everybody, and then thereRead MoreProject Management Pl Reston Station1452 Words   |  6 PagesProject Management Plan - Reston Station Phase 1 Garage Project Description Reston Station Phase 1 Garage is the first of many new building projects in Reston to usher in the arrival of the Metro Rail Silver Line Expansion in early 2014. The Wiehle Avenue stop on the new route running from downtown Washington D.C to Dulles International Airport lies adjacent to the new Reston Station project being built by Comstock Partners Limited and Fairfax County Virginia (a public-private partnership). The projectRead MoreUnits Preparedness Training At The Mobilization Training Center1733 Words   |  7 Pages(SC) BN before relieving SD likewise would overlap by three months conducting pre-mobilization training. Following validation at Ft Bliss and upon arrival in Washington, DC, the Army houses Soldiers in town house apartments near metropolitan (metro) transportation stations. The convenience of billeting Soldiers within the vicinity of metro stations allows for transportation to and from each of the assigned missile batteries throughout the city. For starters, the price tag for quartering air defendersRead MoreThe Security Of Rail Transportation1609 Words   |  7 PagesThe security of rail transportation in the United States Rail Security falls into two categories, namely, passenger rail and freight rail. Passenger rail together with the mass transit is among the transportation subsector networks that provide numerous means of transportation from access points to end destinations connecting to other modes of transportation (Department of Homeland Security, 2007). While Freight railroads are key element of the nation’s transportation system that comprises of overRead MoreThe State Of Texas County1235 Words   |  5 Pagessingle-member precincts). The County Judge has no veto authority over the decisions of the Court; they have one vote along with the other Commissioners. In smaller counties, the County Judge also performs judicial functions, while in larger counties their role is limited to the Court. Elections are based on the political parties, Democrat, Republican, Independent and sometimes Libertarian. Counties do not have home rule authority because their authority is strictly limited by the State. Texas countiesRead MoreEssay about Cleaner Alternative Transportation1646 Words   |  7 Pagessix times more fuel efficient. Buses also use 8.7% less energy per passenger mile than a normal automobile (The Environmental Benefits of Riding Public Transit). These statistics are put into perspective considering how many automobiles are out on the road, and when these numbers are spread out within the span of even one year. Many public transit buses have also transitioned to electric or hybrid buses so they are a lot more fuel efficient while putting out less air pollution than the average carRead MoreA Brief Note On Robert Moses, Richard Ravitch And Othmar Hermann Ammann3916 Words   |  16 Pages offering ways to get to each of the three boroughs from any of the three boroughs. Robert Moses was the chairman of the Tri-borough Bridge Authority, which today is called MTA Bridges and Tunnels and is an affiliate agency of the Metropolitan Transportation Authority. The tolls on t he RFK Bridge bring in close to ten million dollars per year. The authority was then able to makes hundreds of millions of dollars by selling bonds. But instead of paying off the bonds, Moses decided to use the moneyRead MoreThe Endangered Species Act By Pete Mccloskey1767 Words   |  8 Pageswill prioritize subsidies and incentives to develop sustainable energy such as solar and wind. I will also support regulatory measures and incentives to conserve energy in buildings, homes, cars and other transportation, as well as funding for mass transit. Fracking / Fossil Fuels The shale revolution has provided a new source of natural gas and energy independence for the United States, but it must be carefully regulated to keep our nation’s water supply safe and clean. That’s why I am a firm supporter

Saturday, December 21, 2019

Prohibition and the American People Essay - 1040 Words

Prohibition and the American People Abraham Lincoln, arguably the greatest president in American history, is believed to have said, â€Å"Prohibition will work great injury to the cause of temperance. It is a species of intemperance within itself, for it goes beyond the bounds of reason in that it attempts to control a man’s appetite by legislation, and makes a crime out of things that are not crimes. A prohibition law strikes a blow at the very principles upon which our government was founded.† The temperance movement put pressure on government officials to make changes in the U.S., one of these changes was put into play by the 18th amendment. This amendment banned the making, sale, and transportation of alcohol illegal, but not†¦show more content†¦It was very simple to go out and get the necessary products to make alcohol. According to Erica Hanson (1999), â€Å"For those Americans who did not want to go to the effort of making their own liquor, an army of bootleggers, moonshiners, and r um runners were available to supply the nation with all the booze its citizens could drink† (p.29). In case neither of those options worked, a person could walk down the road to find a speakeasy to drink and break the law. Law enforcement was poorly organized to deal with the law breaking and crime. The Prohibition Bureau funds were nowhere near what they needed to be so there were not enough people hired to stop the many illegal operations. Many officials could be bought to keep their mouth shut and look the other way. The number of officers that actually busted law breakers was minimal. Law enforcement, on average, only took 5 percent of smuggled alcohol a year and one in twelve prohibition agents were fired for accepting a bribe. All in all, prohibition caused many problems for the U.S. to the point that we couldn’t handle the situation at hand. The opposing side of the argument on prohibition was very powerful and a force that wanted to keep the U.S. from falling into a hole they could not get out of. The â€Å"dry’s† or those for prohibition thought that prohibition would promote moral improvement and allow the U.S. to strive for perfection. To improve the morals of all, they believedShow MoreRelatedThe Prohibition During The 1920s1590 Words   |  7 PagesThe Prohibition during the 1920s has been widely scrutinized and is often used as an example today to show how banning a specific substance after it has been in wide circulation is a wasted effort. Many historians, economists, and Americans have analyzed the complications during the Prohibition and have culminated their thoughts to provide an accurate and in depth analysis of what caused the Prohibition to fail. Similarly, experts have presented data that shows just how drastically each year differedRead MoreThe Era of Prohibition1329 Words   |  6 Pa gesProhibition was a very interesting era that lasted from 1919 to 1933 (Ian Tyrell). It was a time where crime was at its highest. People where breaking the rules like never before. Drinking was a tradition Americans have been doing for many generations. Putting a ban on this substance seemed to many an injustice. They felt as if the government were taking their rights away. Prohibiting this drink may have caused things to go for worse. Alcohol has been socially acceptable for many years. It’s alwaysRead MoreProhibition Essay942 Words   |  4 PagesProhibition The years leading into the 1920s and the prohibition movement were marked with saloons, drunkenness, and a society of increasing alcohol consumption. Americas changing social habits brought on the passage of the Eighteenth amendment in 1919, placing a nation-wide ban on intoxicating liquors. This amendment was to prevent the production, sale, and use of alcoholic beverages. As the new law was established, the problem of enforcing Americans to obey the law was a great taskRead MoreEssay on The Introduction of Prohibition661 Words   |  3 PagesThe Introduction of Prohibition Prohibition was introduced in 1920 as part of an amendment to the Constitution of the USA. It was introduced for a variety of different reasons including a wartime concern for preserving grain for food rather than for brewing and distilling. There were also feelings against the German-Americans, who were responsible for brewing and distilling, at a time when America was at war against Germany which also let the Anti-Saloon league influenceRead MoreHow did the Prohibition Change the United States of America (USA)? And why was it a failure?1490 Words   |  6 PagesThe word Prohibition as stated in the World Book encyclopaedia refers to laws that are designed to prevent the drinking of alcoholic beverages. The enforcement of the Volstead Act in the United States of America (USA) saw the nationwide beginning of the prohibition on the 16th of January 1920. The Prohibition brought about a change in attitude for the people of the United States (USA). It caused an extreme rise in crime; encouraging everyday people to break the law and increased the amount ofRead MoreWhy Prohibition Didnt Work1612 Words   |  6 Pages Prohibition advocates did an impressive job of convincing the American public that alcohol was the root and cause of all their problems. Alcohol was the reason why families were destroyed, why women and children were beaten and why cheques never arrived ho me. Pro-prohibition posters were used to target men who knew they had a responsibility to look after their families. The news of prohibition also gave the chance for women to defend themselves and preach their rights since many felt thatRead MoreThe Alcohol Prohibition in the United Sates1849 Words   |  7 Pages On January 16, 1920 many Americans felt that their voices had finally been heard. Their hard fought war was over. They had finally sent John Barleycorn to the grave. They believed the United States could now escape poverty and families could prosper. On January 16, 1920 the 18th amendment went into effect. The 18th amendment was the prohibition of any intoxicating liquor. Many celebrated what they called the death of John Barleycorn, a fictional character representing alcohol. The future lookedRead More absolut Failure Essay1685 Words   |  7 PagesThe social changes during this period are reflected in the laws and regulations that were implemented. One of the most pr ominent examples of this was prohibition. The 18th Amendment to the Constitution, or the Volsted act as it is also know, was implemented to eliminate the use of alcohol in the United States. In doing this, the advocates of prohibition hoped to also eradicate the social problems associated with alcohol. â€Å"It was an attempt to promote Protestant middle-class culture as a means of imposingRead MoreProhibition in the United States909 Words   |  4 Pageshard day at work, you like to relax with a glass of wine, or maybe even bourbon. Without the ratification of the 21st Amendment, the people of the United States wouldn’t be able to enjoy any alcoholic beverages. The 18th Amendment to the U.S. Constitution was passed in 1919, outlawing the sale of alcoholic beverages and brining in the period known as Prohibition. At the time, the top Prohibitionist in Congress stated: â€Å"There is as much chance as repealing the Eighteenth Amendment as there is forRead MoreTaking a Lo ok at Prohibition937 Words   |  4 Pagesthe 18th amendment went into use in 1920. Prohibition in America between 1920 and 1933 was made a law to reduce crime and corruption, solve social issues, and improve the health of Americans. The effects of prohibition on Americans depended on the reduced amount of alcohol being drunk. For a while consumption levels of alcohol decreased but then soon increased after the long absence of alcohol. People that were not interested in alcohol before prohibition started to think of alcohol as a glamorous

Friday, December 13, 2019

Pre-Tensioning in Civil Engineering Free Essays

Introduction : The idea of pre tensioning has been around for centuries and has been applied to many forms, such as: wagon wheels, wooden barrels etc. In these cases heated metal is made to just fit an object. When the metal cools it contracts and induces prestress into the object thereby strengthening it. We will write a custom essay sample on Pre-Tensioning in Civil Engineering or any similar topic only for you Order Now The idea of pretensioned concrete has been around since the late 19th century, but its use was limited by the quality of materials available at the time. It wasn’t until the 1920s that materials of a suitable quality were available in sufficient quantity to allow pretensioned concrete to be used with confidence. The pioneers of this field were Freyssinet, Magnel and Hoyer. Description: In pre-tensioned concrete tensile elements such as cables, ribbons, or rods are clamped under calculated tensile stress (Stage 1). Concrete is cast around these elements and allowed to cure( Stage 2). When fully hardened the clamps are released and the stress is transferred within the rigid concrete (stage 3). As long as a load is applied within the design limit, the concrete structural element will never be subjected to tensile stress of sufficient force to cause failure. Pre-tensioning can be used in pre-cast as well as in cast-in-place construction. Most of the pre-tensioning construction techniques are patented although the basic principle used in all of them is common and is well known. Hard drawn steel wires which are indented or crimped are preferred for pre-tensioned elements because of their superior bond characteristics. Small diameter wires of 2 to 5 mm are mostly used in the form of strands comprising two, three or seven wires. High Strength Concrete mix: Pre-stressed concrete requires concrete which has a high compressive strength, with comparatively higher tensile strength. Low shrinkage, minimum creep characteristics and a high value of Young’s modulus are generally deemed necessary for concrete used for prestressed members. Uses: Common uses include Railway Sleepers, Communications Poles, Pretensioned Precast â€Å" Hollowcore† slabs, Pretensioned Precast Double T units –for very long spans, Pretensioned precast inverted T beams – for short-span bridges, Pretensioned precast PSC piles, Pretensioned precast portal frames. Alternatives: The alternative to pre-tensioning is post-tensioning. In a post-tensioned beam, the tendons are stressed and each end is anchored to the concrete section after the concrete has been cast and has attained sufficient strength to safely withstand the prestressing force. In the posttensioning method, tendons are encased in a duct or sheath or coated with grease or a bituminous material before placing them in the formwork to prevent them from becoming bonded to concrete. Advantages: Prestressed concrete has the following advantages 1. Since the technique of prestressing eliminates cracking of concrete under all stage of loading, the entire section of the structure takes part in resisting the external load. In contrast to this, in reinforced concrete, only the portion of the concrete above neutral axis is effective. 2. Since the concrete does not crack, the possibility of steel to rust and of concrete to deteriorate is minimized. 3. Absence of cracks results in higher capacity of the structure to bear reversal of stresses, impact, vibration and shock. 4. In prestressed concrete beams, dead loads are practically neutralized. The reactions required are therefore much smaller than required in reinforced concrete. The reduced dead load weight of the structure results in savings in the cost of foundations. The neutralization of dead load is of importance in large bridges. 5. The use of curved tendons and the pre-compression of concrete helps to resist shea r. 6. The quantity of steel required for prestressing is about 1/3 of that required for reinforced concrete, although the steel for the former should have high tensile strength. 7. In prestressed concrete, precast blocks and elements can be assumed and used as one unit. This saves in the cost of shuttering and centering for large structures. 9. Prestressed concrete can be used with advantage in all those structures where tension develops, such as tie and suspender of a bow string girder, railway sleepers, electric poles, etc. 10. Prestressed concrete beams usually have low deflection. How to cite Pre-Tensioning in Civil Engineering, Essay examples

Thursday, December 5, 2019

Greasy Lake Essay Symbolism Example For Students

Greasy Lake Essay Symbolism Greasy Lake While reading Greasy Lake by T. Coraghessan Boyle, the reader notices that the writing voice of Boyle is quite distinct.Boyles voice is distinct because he has a satirical way of writing stories about the everyday life of people.He focuses on the unusual people and their peculiar circumstances, which in Boyles case just adds to his already humorous stories.However, Boyle does not seem to concentrate on satire alone, he writes in a poetic fashion that allows the reader to enter the mind of the characters that he is writing about as well as feel the situations at hand. Boyles distinct way of writing satire is apparent in most of his stories.Boyle wrote an absolutely hysterical story called The New Moon Party.The story highlights a politician named George L. Thorkelsson who was re-elected to the position of Governor because he proposed to get the United States to build a new moon that was bigger and brighter than the existing one. When the new moon was finally built and in space, it was revealed to the public.Boyle writes:Something crazy was going on.The shoving had stopped as it had begun, but now, suddenly and inexplicably, the audience started to undress.Right before me, on the platform, in the seats reserved for foreign diplomats, out over the seething lawn, they were kicking off shoes, hoisting shirt fronts and brassieres, dropping cummerbunds and Jockey shorts.And then, incredibly, horribly, they began to clutch at one another in passion, began to stroke, fondle, and lick, humping in the grass, plunging into the bushes, running around like nym phs and satyrs at some mad Bacchanal.A senator Id known for forty years went by me in a dead run, pursuing the naked wife of the Bolivian ambassador; Miss Iowa disappeared behind the rhythmically heaving buttocks of the sour-faced clergyman . . . (Page 125). Just from looking at the sun reflecting off of the new moon, everyone was sparked with intense sexual desires that continuously intensified until everyone started to have sex in the open.Boyles satirical writing style is not only apparent in the comical situation, but also in his ability to describe the lust of the proper diplomats who are supposed to be the leaders for the moral majority and for clergymen who have sworn to celibacy as a testament to their faith.By having a priest making-love with a model, Boyle portrays the satirical side of his writing voice in the deepest sense by proposing an idea so absurd that its funny. Although hysterically funny, Boyle possesses the ability to write about a character in a way that makes the reader feel like they are actually experiencing the characters feelings and emotions.While reading the story Overcoat II, the reader begins to empathize for the main character, Akaky Akakievich.Akaky buys a very expensive new overcoat from the black market in order to fit in with his peers at work.Akakys peers constantly tease him for having a drab, old, cheap, and torn overcoat.While walking home late one night, Akaky is beaten and has his brand new jacket stolen.The new overcoat is his only chance of being accepted, so its loss is devasating for him.The coat is found by the police, but Akaky cant get it back because he purchased it from the black market.Boyle writes:From that moment on, Akakys life shifted gears, lurching into a rapid and inexorable downward spiral . . . The overcoat, of course, became property of the Soviet government.Akaky left the conference room in a daze he felt as if hed been squeezed like a blister, flattened like a fly.His coat was gone, yes that was bad enough.But everything he believed in, everything hed worked for, everything hed been taught from the day he took his first faltering steps and gurgled over a communal rattle that was gone too (Page 228). .u32e8e5c5afe0097579fc910a29789a73 , .u32e8e5c5afe0097579fc910a29789a73 .postImageUrl , .u32e8e5c5afe0097579fc910a29789a73 .centered-text-area { min-height: 80px; position: relative; } .u32e8e5c5afe0097579fc910a29789a73 , .u32e8e5c5afe0097579fc910a29789a73:hover , .u32e8e5c5afe0097579fc910a29789a73:visited , .u32e8e5c5afe0097579fc910a29789a73:active { border:0!important; } .u32e8e5c5afe0097579fc910a29789a73 .clearfix:after { content: ""; display: table; clear: both; } .u32e8e5c5afe0097579fc910a29789a73 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u32e8e5c5afe0097579fc910a29789a73:active , .u32e8e5c5afe0097579fc910a29789a73:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u32e8e5c5afe0097579fc910a29789a73 .centered-text-area { width: 100%; position: relative ; } .u32e8e5c5afe0097579fc910a29789a73 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u32e8e5c5afe0097579fc910a29789a73 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u32e8e5c5afe0097579fc910a29789a73 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u32e8e5c5afe0097579fc910a29789a73:hover .ctaButton { background-color: #34495E!important; } .u32e8e5c5afe0097579fc910a29789a73 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u32e8e5c5afe0097579fc910a29789a73 .u32e8e5c5afe0097579fc910a29789a73-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u32e8e5c5afe0097579fc910a29789a73:after { content: ""; display: block; clear: both; } READ: Internet Censorship Essay Research PaperJust from the way Boyle writes how Akaky feels like he has been squeezed like a blister, the reader is allowed to explore how it would feel to be squeezed in such a way.By imagining that something is pushing so tight around a body that it is forced to emotionally expose itself with a sudden gush of pain and emotion, Boyle creates a feeling of loss and heartache for the reader.In writing how Akaky felt like hed been flattened like a fly, Boyle compels the reader to get into Akakys heart and mind.To be flattened like a fly is to be brushed aside and discarded because of being an annoyance.Boyle describes Akakys heartache from the rejec tion in the simile about a fly being flattened.These similes are what allow Boyles readers to get into the heart and mind of the characters about which he is writing. In conclusion, T. Corraghessan Boyles writing voice is masterful and individualistic.Boyles comedic stories are packed with satire that lighten the mood of the book and provide a few good laughs to the reader.Although filled with burlesque, Boyles stories always leave the reader thinking, whether it is about alternate, deeper meanings of similes or about what the characters are really thinking or feeling.Even though the book is sometimes farfetched, there is never any lack of content.Boyle always provided an unusual twist of humor and reality that leaves the reader with a feeling of satisfaction.

Thursday, November 28, 2019

Cloud Computing Advantages and Challenges

Introduction Cloud computing can be described as a system that enables users to work on their computers, process data, and store information using remote servers, which are hosted on the internet rather than using local servers.Advertising We will write a custom term paper sample on Cloud Computing Advantages and Challenges specifically for you for only $16.05 $11/page Learn More Cloud computing is a very recent phenomenon that is coming out as the next big thing due to the convenience it offers the user (Bisong Rahman, 2011, p. 31). It allows users to work from a machine from anywhere around the globe with instant access to a database they have stored their information. At the same time, they are able to store whatever data they have generated without trouble. Cloud computing is solely dependent on the internet for storage and access of data. Thus, as Yan says, the availability of the internet is paramount for it to work (2010, p. 28). Internet use has so many challenges with some of them being directly transferable to the use of clouds. Even though all these advantages of cloud computing are significant, the study argues that several challenges with regard to cyber security afflict an organization deploying services of cloud service providers such as SaaS and PaaS. Cyber security Vulnerabilities and Threats Several vulnerabilities can be experienced while using the cloud facility. They include the following: Danger of losing information Coexistence of tenants Challenges Posed by Technological Dynamism Threats of Malicious Attacks Danger of Losing Information Cloud technology is fashioned in such a way that users of the facility are connected to a remote server form, which they access, use, and store information via the internet. Servers comprise physical equipment that can be stationed anywhere. Their connection to the internet is what makes them relevant to the cloud’s technology.Advertising Looking for term paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Such equipment though secure can be vulnerable to any form of risk that can lead to its destruction. The physical destruction of server equipment that holds the memory of the server can lead to permanent loss of all the information stored in there. Dangers like fire, theft, and other phenomenon that can affect the servers can lead to loss of information stored there by different users unless the service provider has a back up that has not been affected by the destruction. Whenever such a damage or destruction happens, the users of the system are the big losers. Coexistence of Tenants Cloud technology came about because of the need for users to have an easily accessible server without the need of an individual to own a server. This technology attracted the interest of different users who had varied uses for the facility as well as intentions. The mere fact that users are not aware of the security strength of the facility can make the facility vulnerable to misuse by users who might install malicious data that can affect the usability of the facility by other users as argued by Morsy, Grundy, and Muller (2010, p. 1). Whereas the security settings might be secure for other users, it might not be as secure for users who have sensitive information that might be of interest to other hackers. This threat can offer an easy opportunity for hackers to access sensitive information as long as they can crack. This form of exposure is a great insecurity to users who wish to have their information remaining confident as much as possible. Different users have varied amounts of data that they intend to bring to the system for different purposes. This amount can expose servers to an overload, which can lead to the collapse of the whole system thus denying users access to the cloud system.Advertising We will write a custom term paper sample on Cloud Computing Advan tages and Challenges specifically for you for only $16.05 $11/page Learn More Challenges Posed by Technological Dynamism The nature of technology is that it is dynamic and in a continuous state of evolution in that, every time, there is something new within the technological circles. This situation poses a threat to users of the system because it will keep them in a constant mode of having to understand how the system works every other time there is a change. Most affected in this case is the security system that is in place for securing the system. The biggest challenge to the security system is that it will always have to change with the continuous change in technology because an obsolete technology being used as security of the system is vulnerable to attacks by much more advanced software. Security systems are expensive to develop and maintain for them to be effective against threats. Therefore, constant changing of the systems for them to be up to date with the technological changes can be very expensive to the service providers. Failure by the service providers to keep an up-to-date security system can pose a very dangerous situation to the data and usage of the system because it will be facing high-risk possibilities of being hacked into by intruders (Bisong Rahman, 2011, p. 35). In case of such a lapse, the security of the system is not completely guaranteed. Threats of Malicious Attacks Cloud systems have become the most popular targets by hackers with malicious intentions who get attracted to it out of different reasons ranging from the need to steal to such reasons as curiosity usually.Advertising Looking for term paper on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The information technology system has made progress in the world by setting trends of what can be exciting to different users of the system. In so doing, it has bred users with different interests who tend to use the technology in ways that can be described as being professionally unethical. Hackers of systems have different reasons for doing it. In most cases, they tend to steal security codes of the systems so that they can have access to data that has been stored. This attempt can lead to loss of crucial information by users, which might have great implications in their social and economic lives. Bisong and Rahman (2011) postulate, â€Å"Moving to the cloud presents the enterprise a number of risks that include securing critical information like protection of intellectual property, trade secrets, and personally identifiable information that could fall into wrong hands† (p. 36). This argument is an indication that clouds hold highly prized data that can be of interest to un authorized parties. Probability of Occurrence The danger of losing information in case of destruction of servers used by clouds is real and can happen anytime thus leading to a complete loss of information by users off clouds. The probability of such an occurrence cannot be easily measured. It can be placed between medium and low depending on the cause of destruction. In the case of physical destruction of the servers by natural calamities, the risk should be low because the choice of location by the service providers usually puts such issues in consideration. The coexistence of tenants with different uses for the system on the same platform can offer a high threat of risk probabilities of an occurrence happening. This is simply because malicious users of the clouds are able to understand how it works. They may device ways of hacking into the system for their own selfish reasons. The challenge of using clouds by the user is that users are never aware of the security measures put in place by the administrators of the system. At the same time, the security of the information they have entrusted with clouds is beyond them because they lack control over it. This case therefore exposes the users of the system to vulnerabilities that the system might face from some of its own users who might be malicious. Clouds offer remote services to users as long as they meet certain conditions, which in most times are not stringent. Users of the system are at times anonymous. Their identity cannot be easily verified together with their location thus making use of a common platform by different users a high-risk probability of a threat occurring. The risk by challenges posed by technological dynamism can be placed as low because most of companies offering cloud services have invested a lot in human resources that are able to tackle the challenges of change. Experts and engineers who are the best brains in their field run the cloud technology. Due to the infancy nature of the tec hnology, a continuous work on bettering the system is being done. This effort has allowed providers to keep a close eye to the changes that happen in the technological arena with the view of infusing them with the system in use and hence a continuous upgrade of the system. The risk posed by technological changes might be medium or high depending on the cloud service delivery mode. There are three modes available so far: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The different modes determine users’ participation in securing their data. ‘Infrastructure as a Service’ is the most vulnerable compared to other modes. It is known to expose the user depending on the level of security measures put in place. The other two modes are safer compared to IaaS. Threats of malicious attacks on the clouds can be described as high due to concerted efforts by hackers to gain confidential information being held by clouds. Clou d technology has become attractive to hackers because of its ability to attract high-end users who seek their service thus making clouds vulnerable to attacks that may lead to loss of information by users. The different modes of service delivery as adopted by cloud technique makes this threat real due to the common platform it offers its users. Furthermore, information stored in clouds is vulnerable because the user might not know when intruders have hacked into it. Only the providers of the service might know. Depending on their choice, they can either inform the user or fail to do so. Threats of malicious attacks on the system are the biggest and most high-risk because of the platform the internet offers (Sara Fiaz, 2012, p. 1326). The internet offers the advantages of remoteness to access information. Therefore, hackers can pose as a threat from thousands of miles away and in the comfort of their homes. Policies and Procedures for Managing Risks The danger of losing information though physical damage of servers can be stemmed by the manufacturers of the equipment used by coming up with fireproof equipment in case of a fire, or generally equipment that cannot be easily damaged like black boxes used in aircrafts. Equipment modeled this way can offer guarantees of safety in case of destructive risks. Standards for housing and location of server equipment should be set. At the same time, server equipment should be decentralized to different places with backup facilities being made available. Service providers can manage the coexistence of tenants by setting standard security measures that have to be adhered to by all users. Users should provide the first line of security to their data against any form of hacking. The system should monitor activities of all users in order to stem the activities of hackers before they go too far. The security measures by cloud providers need to undergo a third-party assessment program to ensure that they meet the necessary stand ards (Andrei, 2009, p. 8). Coexistence of tenants should be managed at different levels with the service providers categorizing their users into the following segments: private cloud, public cloud, and hybrid cloud (Morsy, Grundy Muller, 2010, p. 2). This strategy will enable different tenant to access clouds at different levels without feeling jeopardized. The clouds system should operate as a dynamic venture that is in constant change. It should not be fixed on specific technology. Rather, it should operate on an interface that can allow easy migration to new technology without having to change the baseline of its operations. This strategy however should be in tandem with security features so that new gains do not compromise old gains. Cloud providers should have an up-to-date security system scanner that should scan all the data that comes through the system. This scanner will protect the data that users have stored from malicious damages of access by unauthorized parties. These scanners should be updated with the National Vulnerability Database that records all new forms of threats to the information technology (Sara Fiaz, 2012, p. 1325). By keeping away malicious attacks, the data in the system can be described as safe because these attacks are the most dangerous to information technology users. By setting standards hinged on the national standard, most of the attacks can be contained in time. Customer Satisfaction When policies are put in place to mitigate these vulnerabilities, cloud-computing seekers can develop confidence and hence increase their satisfaction with services in the event that policies help to reduce cyber security threats to which the services seekers are susceptible. Customer satisfaction will be achieved by implementing the foresaid steps and policies because they will guarantee the security of their information when it comes to using the clouds. The use of the internet is based on satisfactory security features because users tend t o avoid sites that they are not sure about. The same kind of trust is applicable here because the threats are the same and that the mode of usage is the same. The paper holds that the significance of cloud computing is akin to the need for reducing internal IT cost associated with the maintenance of software platforms coupled with the costs of purchasing new software. This effort is vital to meet the increased software demand in case expansion of the pool of employee base in a company especially when software comes with single user licenses. Reference List Andrei, T. (2009). Cloud Computing Challenges and Related Security Issues. Web. Bisong, A., Rahman, S. (2011). An Overview of the Security Concerns in Enterprise Cloud Computing. International Journal of Network Security Its Applications, 3(1), 30-45. Morsy, A., Grundy, J., Muller, I. (2010). Analysis of the Cloud Computing Security Problem. Proceedings of APSEC 2010 Cloud Workshop, Sydney Australia. Web. Sara, Q., Fiaz, K. (2 012). Cloud Computing: Network/Security Threats and Counter Measures. Interdisciplinary Journal of Contemporary Research in Business, 3(9), 1323-1329. Yan, H. (2010). On the Clouds: A New Way of Computing. Information Technology and  Libraries, 29(2), 87-92. This term paper on Cloud Computing Advantages and Challenges was written and submitted by user Brodie J. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Keep the Fire Burning

Keep the Fire Burning C. Hope Clark entered my life 11 years ago, just when I had made a 10-year commitment to improving my writing: entering more contests, applying for more grants and submitting more applications to publishers and for artist residencies. Hope sits on my desktop every day. When I need to remember that I am not alone in this writing struggle, feeling like bursting into tears after another rejection, I open the computer document titled HOPE and my world is transformed from despair into opportunity with one simple click.    Here I find every snippet of fodder that I have carefully cut and pasted from C. Hope Clarks weekly FundsforWriters email. After doing this for several years, this document was pretty messy. One day I reorganized it: Book Publishers, Magazines, Grants, Jobs, Artist-in-Residencies, Workshops/Classes and Wisdom; perhaps the most important section because it included tips for remaining sane while striving for success. Within each category bold, italics and underline were added. I reduced the font size down to 9 and narrowed the margins so I can get more opportunities on one page. And I have developed my own style of shorthand so that each opportunity can be reduced down to just two lines if at all possible. Why? Because I learned that once the document is over 25 pages long,   it felt too cumbersome to peruse for the next opportunity. Some weeks I only do one category for the week, but about once a month I save an afternoon (usually Friday while Im waiting for her newest email to arri ve) and I read through the entire document, slowly and carefully. I use text colors to make things pop visually and for the best opportunities I add highlighting. Now I have bold, italics, bold-italics, colored text, underlines, a variety of font styles and highlighting. Deadlines passed. Offerings had to be deleted. I added a Submissions category where entries are carefully documented: fee, date, title and word count for each entry. Then the Rejected category which included any comments offered and finally my favorite; a YES/Accepted category. This list began to grow as I began to understand that writing is not a goal; writing is a process. Every week I carefully cut and pasted anything that looked appealing re: publication or growth. I asked for opinions, joined a writers group and began to teach. And I always kept the HOPE file updated every week. I sat at my computer late on Fridays waiting for the email to arrive. I learned to keep that document on my desktop because it added more kindling to my inner burning desire to write. More than a decade has gone I take Hopes email very seriously. When it has been late arriving (seldom), dinner is delayed. It is that important. Hope encourages us to dream and she gives us innumerable reasons to never give up. Happy Writing! Laura Lee Perkinswww.LauraLeePerkinsAuthor.com spiritualquest@earthlink.net

Thursday, November 21, 2019

Environment Science Essay Example | Topics and Well Written Essays - 1250 words

Environment Science - Essay Example Another environmental issue is related to freeing the planet from the bad effects of carbon emissions by 2050 so that by 2100 carbon emissions are in required limits. A detailed energy system model has been developed to find the relation between the aims of 2050 and 2100. By using a computer simulation, future greenhouse gas emissions have been put on the test assuming there is no climate policy in practice. Implications of limiting emissions by 2050 have been analyzed on different levels. According to the study, current technologies won’t help in achieving the set targets for 2100. There are two options suggested: either reduce 20 percent below 2000 levels by mid-century to maintain the option for end-of-the-century or as per the rising needs of energy and land, the reduction should be 50 percent, which is unattainable with the given energy resources.According to the research team, more research needs to be made on technological feasibility for mid-and end-of-century emission deadlines to circumspect the issue.Science Daily has attracted the attention of its readers towards the South Asian monsoon the reason of which could be heat and moisture from the Himalayas. Basically, it is a climate issue on which the Harvard climate scientists have drawn attention. It is assumed that the Tibetan Plateau is the leading resource for generating heat resulting in the South Asian monsoon. The Harvard climate scientists believe that monsoon in the region is caused more due to the Himalayas and the adjoining mountains.

Wednesday, November 20, 2019

New Business Proposal Essay Example | Topics and Well Written Essays - 1000 words

New Business Proposal - Essay Example kit, 2011). The product is targeted towardsa customer base that has concern for the environment, and wants to contribute to its wellbeing by reducing their eco/foot print impact etc. The product is also expected to do well in the market because of its uniqueness and the fact that no online retailer has done this before. The detailed marketing strategy of the product has been discussed as follows: Product Strategy: The reusable and recycled bags are to be made of both recycled cotton and plastic materials. The brand awareness of ASOS will be relied upon as one of the key competitive advantages. Along with that, the good relationships of the ASOS brand with the suppliers and the high purchasing power that it has will also serve as a plus for the awareness and promotion of these bags. Another key aspect that would greatly benefit the product would be that of first mover advantage as up till now no online retailer has come up with this sort of idea. The bags will be made available to the markets of the UK and Ireland only. These bags would be large in size so as to serve for accommodating things for multiple purposes (posting, usage etc.) and they would have the ASOS logo on them. A specific percentage of the revenues generated would be granted to charities so as to better create an impact in terms of working towards the collective good of people and the overall society. The product is to be similar to Anya Hindermarch’s ‘I am not a plastic bag’ concept that encouraged people not to use plastic bags (Winterman, 2007) with a number of customized touches added to it. These would include a more stylish outlook, larger size that is to add to its value in terms of convenience, and finally, because of its outlook and size, these bags would be multipurpose serving the purposes of both shopping and delivering. The bag would also have specific customer number ID on it which would allow bag tracking/identification. The bag would be designed as such that i t would ensure maximum protection of the clothes etc. placed in it. The bags would say, â€Å"Yes I shop at ASOS because I carry their delivery envelope shopping bag†. Once, the product has established itself in the market, the producers can even go on to offer a variety in the colours and styles being offered and can eventually go on to offer customization options as well to grab all the more market share. Pricing: The pricing strategy has been decided to be cost based pricing in which the price is set in accordance to the production costs inculcating costs of goods and fixed assets plus a specific amount of profit margin (Allen, 2012). On that note, the price of the bags has been estimated to be in the bracket of about ?2.00 or 2.50 as a certain percentage of the revenues would also be going to some welfare cause or charity and hence that would also be kept under consideration while setting the final price. Place: The bag would be produced and supplied by a supplier with th e design accustomed to ASOS brand. Special trainings would be given to the logistics team in terms of identifying the bag, instructions on usage of the bag, dealing with lost or damaged bags (small charge, goodwill replacements) and in terms of teaching customers on how, why and where to use the bags. Promotion: The

Monday, November 18, 2019

Discuss the benefits , limitations and methodology of population Essay - 1

Discuss the benefits , limitations and methodology of population screening for breast cancer - Essay Example The subject of whether breast cancer screening is more harmful than helpful has fuelled controversy and debate from various quotas for almost, as long as, the technology to do it has been in existence. The dominant question is often; whether the benefits of the procedure outweigh the perceived negative effects that may result from the process. These harms include over diagnosis, where women are treated for cancer while it might not have been clinically manifested in their lifetimes; conversely, several benefits have been attributed to the screening prominently among them, prevention of death. The rationale used to justify screening is usually because it has been successful in detecting breast cancer in the screened population, especially in view of the increased rates of cancer in the last few years. Experts on the subject project that because of the mass tests, the risk will go down and the cancer rates eventually reduced due to early detection and that should be the confirmation of the importance of screening (Cancer Research UK, 2012). The primary focus of this paper will be an examination of the process and principles of screening for breast cancer in populations through histopathology, and then discuss the benefits and harms that are likely to result. Professionals in the health community share the belief that early cancer diagnosis translates into a better chance for mitigation, nonetheless, not everyone who has signs of cancer will benefit from the diagnosis since the cancer my regress without treatment. Thus, to ensure the potential benefits outweigh the harm, there must exist sufficient evidence from randomized tests or trials to indicate that a specific population will benefit from cancer screening, therefore certain principles must be followed before public screening is allowed. There must be significant burden of the disease in the

Friday, November 15, 2019

Climate Change Impact On Sub Saharan Africa Environmental Sciences Essay

Climate Change Impact On Sub Saharan Africa Environmental Sciences Essay The vulnerability to climate change is considered to be high in developing countries due to social, economic and environmental conditions that amplify susceptibility to negative impacts and contribute to low capacity to cope with and adapt to climate hazards. In addition, projected impacts of climate change generally are more adverse for low latitudes, where most developing countries are located, than for higher latitudes. The developing countries face many challenges poverty, a high disease burden, rapid population growth, food insecurity, and limited water access. Climate change is likely to drive the majority of the population into destitution, as assets are lost and resources are diverted to deal with emergencies, instead of being used for development. Historically, the earth has experienced periods of cooling and warming, with mean temperatures remaining relatively stable. These changes were due to the energy balance between land, sea and atmosphere. However, human activities s uch as burning fossil fuels and deforestation have contributed to the increase in greenhouse gases (GHG) in the atmosphere. These trap much of the heat that would otherwise escape from the earth, leading to a generally warmer world. An agricultural expansion seems unlikely and increases in agricultural productivity are needed in order to avoid additional people being forced into poverty and hunger (Cline 2007). Current climate hazards and the impacts of projected climate change threaten human development (African Development Bank et al, 2003). Climate is linked to all the Millennium Development Goals, but is most directly relevant to the goals to eradicate extreme poverty and hunger, reduce child mortality, combat disease, and ensure environmental sustainability (Martin-Hurtado et al, 2002). Agriculture, which is highly sensitive to climate and which is projected to be negatively impacted by climate change in much of the tropics and sub-tropics, is the direct or indirect source of livelihood for about two-thirds of the population of developing countries and is a substantial contributor to their national incomes. About 70% of the worlds poor live in rural areas. Management of climate hazards and climate change impacts in the agriculture sector and rural communities will be critical for success. Climate change threatens the basic elements of life for people around the world access to water, food, health, and use of land and the environment. The vulnerability of people to food insecurity, which accompanies poverty, is increased due to the degradation of the natural environment and the products (e.g. fruits, fish, water and range-fed livestock) and services (e.g. regulating climate) that it provides (Biggs et. al., 2004). Degradation is due to a number of trends including climate change, soil erosion, the conversion of ecosystems into croplands, overgrazing and urban expansion, among other factors (Biggs et. al., 2004). Climate change poses a serious threat to ecosystems in the developing countries in both the medium and long term. Increases in temperature will lead, not only to an increase in the frequency of extreme events, but also to severe degradation of biodiversity and the loss of water resources that are already scarce (Biggs et. al., 2004). Sub-Saharan Africa is the region most vulnerable to the impacts of change because of widespread poverty and low levels of technical development which limits adaptation capabilities. There is considerable evidence that climate change is already affecting Africas people and its environment to the greater extend than any other region of the world in terms of their livelihoods (Lindsay, et al 2009). The impacts of climate change are predicted to affect the livelihoods of most people in developing countries and most especially in Africa in many ways. By 2020, between 75 and 250 million people are predicted to be exposed to increased water stress due to climate change. By 2020, yields from rain-fed agriculture in some countries could be reduced by up to 50 percent, increasing food insecurity and hunger. By 2080, an increase of 5 to 8 percent of arid and semi-arid land in Africa is projected. Climate change is likely to affect the distribution patterns of infectious diseases; for example, there is likely to be an increase in mosquitoes which spread dengue and yellow fever. Sea levels are projected to rise by around 25cm by 2050; Africas coastal areas are already experiencing environmental problems including coastal erosion, flooding and subsidence. (Said Kolawole et al 2009). Alessandra Giannini, et al, 2008, reviews the evidence that connects drought and desertification in the Sahel with climate change past, present and future in the sub-region. Their study concludes that there is a correlation between the desertification and climate change in the Sahel region of Africa. The African Sahel provides the most dramatic example of multi-decadal climate variability that has been quantitatively and directly measured. Annual rainfall across this region fell by between 20 and 30 per cent between the decades leading up to political independence for the Sahelian nations (1930s to 1950s) and the decades since (1970s to 1990s). Lindsay, et al 2009, further throws more light on the impacts of climate change, drought and desertification and how they are closely interlinked, and most acutely experienced by populations whose livelihoods depend principally on natural resources. Their paper examines three interlinked drivers of adaptation; climate change, desertification and drought, assessing the extent to which international and national policy supports local adaptive strategies. 2. Problem Statement The unimpeded growth of greenhouse gas emissions is raising the earths temperature. The consequences include melting glaciers, more precipitation, more and more extreme weather events, and shifting seasons. The accelerating pace of climate change, combined with global population and income growth, threatens food security everywhere. Agriculture is extremely vulnerable to climate change. Higher temperatures eventually reduce yields of desirable crops while encouraging weed and pest proliferation. Changes in precipitation patterns increase the likelihood of short-run crop failures and long-run production declines. Although there will be gains in some crops in some regions of the world, the overall impacts of climate change on agriculture are expected to be negative, threatening global food security. Populations in the developing world, which are already vulnerable and food insecure, are likely to be the most seriously affected. In 2005, nearly half of the economically active population in developing countries-2.5 billion people-relied on agriculture for its livelihood. Today, 75 percent of the worlds poor live in rural areas. (Gerald C. et al 2009). Climate change issues require multiple stakeholders, global challenges and social sustainability issues. This is because there are varying debates on the causes, impacts of climate, adaptation and mitigation issues when identifying sustainable solutions on the topic. The presence of significant uncertainties has led researchers to emphasize the analysis of regional and national effects (Mendelsohn Dinar, 2004). The issue of climate change is without doubt important for developing countries with an agrarian economy and very difficult to apprehend easily as it is multi- faceted in approach. The topic is very complex, transnational in nature and integrated in perspective and approach. The linkage of social impact of climate change in the developing countries have not been well researched and most especially in connection with Sub Saharan Africa and non-Sub-Sahara Africa (NSSA) countries. Climate Change has several livelihood impacts in developing countries as it reduces yields, household incomes, health issues, environmental problems and the vulnerability of the disadvantages in rural communities. 3. Hypothesis The socio-economic impact of climate change is much more likely to affect Sub-Saharan Africa (SSA) than non-Sub-Sahara Africa (NSSA) countries and socio-economic dimension of adaptation respectively. 4. Overall Objective To undertake a comparative studies on the socio-economic impact of climate change and their socio- economic dimensions of adaptation in Sub-Saharan Africa (SSA) and non-Sub-Sahara Africa (NSSA) countries. 5. Empirical Research Questions 1. To review literature on the socio-economic impacts of climate change in the developing countries. 2. To identify the linkages between Sub-Saharan Africa (SSA) and non-Sub-Sahara Africa (NSSA) countries in terms of climate change socio-economic impacts. 3. To analyse the socio-economic dimensions of adaptation in these countries, taking into account, pro-poor adaptation, microfinance, safety net, new technologies, index insurance and livelihoods. 6. Theoretical and Conceptual Issues A substantial amount of research has been conducted on the potential effects of climate on agricultural productivity (Parry, 1990; Leemans Solomon, 1993). Some studies have used climate induced changes in crop yield to estimate potential global economic impacts (Kane et al., 1992), while others have examined the indirect impact on economic variables such as farm revenue and income (Lang, 2001; Molua, 2003). Schimmelpfennig et al. (1996) present a simple taxonomy that classifies the method of analysis as either structural (Adams et al., 1990, 1995, 1998) or spatial analogue (Darwin et al., 1999; Kurukulasuriya Ajwad, 2007). This study would employ some institutional economics theories and the sustainable livelihoods framework analysis in doing the comparative studies. 7. Methodology The study would make use of quantitative and qualitative reviews of literature from secondary sources and data already collected from the various regions and undertake the comparative review and analysis. The study would as well make use of participatory rural appraisal methods when visiting the field for data collection to get first hand information on the impacts of climate change and adaptation in the various regions. Quantitative analysis and econometrics methods would be applied in this study as well. Data analysis would as well be made with reference to the research problems and objectives. Data collected would be classified after the collection process and Statistical Package for the Social Science (SPSS) would be used to analyse all the data collected in the field.

Wednesday, November 13, 2019

Catcher In The Rye :: essays research papers

Catcher in the Rye... J.D. Salinger’s, The Catcher in the Rye, is one of the most well-known novels of the past fifty years. It’s a story about a kid named Hold Caulfield who experiences some interesting things and people. From having breakfast with a couple of nuns, to hooking up with a prostitute, to getting kicked out of school, Holden handles each situation the best way he can. Some of the people Holden meets, he likes, but the type of people Holden can’s stand are the ‘phonies.’ Holden met a lot of phonies in his lifetime. Holden lived in a dorm that was named after a phony, he heard a phony playing a piano, and he met his date’s phony friend. Holden went to a boarding school named Pencey Prep. There, Holden lived in the Ossenburger Memorial Wing which is the name for the new dorms. The hall was only for juniors and seniors. The dorms were named after this guy named Ossenburger who also went to Pencey a long time ago. After Ossenburger got out of Pencey, he made a lot of money in the undertaking business. After making a bundle of dough, Ossenburger gave some of it to Pencey and that’s why the new wing of the dorms are named after him. Then the next morning, Ossenburger gave a speech to the students of Pencey Prep about how he was never ashamed when he was in some kind of trouble or something that Ossenburger would get right down on his knees and pray to God. Ossenburger kept on rambling bout how you should always pray to God and to talk to God wherever you were. Ossenburger said think of him as your buddy. Holden got a kick out of his speech. Holden could â€Å"just see the big phony bastard... asking Jesus to send him a few more stiffs.† Holden next went to this night club called Ernie’s. Holden was going there for a few drinks. Even though it was so late, the club was jam-packed. Ernie, the piano player, was playing some tune that Holden couldn’t recognize. Ernie was putting all these high notes, show-offy ripples in the high notes, and a lot of other tricky stuff that Holden thought was dumb. The crowd was going crazy for Ernie though, clapping and all that. â€Å"Old Ernie turned around on his stool and gave this very phony, humble bow.† Holden thought Ernie’s snobbish attitude was so phony but Holden felt kind of sorry for Ernie. Holden doesn’t even think that Ernie knows when he’s playing the tunes right or not. The last phony Holden met was while