Friday, November 29, 2019

Zuni Indian Mythology Essay Example For Students

Zuni Indian Mythology Essay Hundreds of years ago the Zuni people created and told stories of humanand world creations, tales of love and lust, and just about anythingthat gave people an explanation for something they could notunderstand (Gaarder 25). They made up all these legends or mythsbefore there was anything called science. The stories came from theheart and soul of these native people. Legends are not just sillystories that were told for amusement they are like magic lenses, theyallow us to have a glimpse of social orders and the daily life of howthe Indians interpreted things long ago. One legend of the Zuni tribetells the tale of the sun and the moon and how these two heavenly bodiescame into being. The legend is called Coyote Steals the Sun and Moon.The story begins when an out of luck Coyote can never seem to killanything. He watches Eagle catch rabbit after rabbit with all theease. He decides to go to Eagle with a proposition. Coyote told Eaglethat they should hunt together, Eagle accepts, so they begin to hunt inpartnership. Still all Coyote catches is just a couple of grubs, whileEagle is far ahead with many rabbits. At the time the world was stilldark, the sun and moon had not been placed into the sky yet. So coyoteblamed his hunting problems on the fact that he could not see and eagleif he knew where they could find light. Eagle was not really sure, buthe figured it was somewhere on the west. So they set out to find it. They soon came to the Kachinas village, where the villagers were busilygoing all out in their sacred dances. The Kachinas invited Coyote andEagle to rest and have a bite to eat while they continued to dance. Eagle observed the people and could sense all the power they bestowedwithin. He began to wonder if they were the ones who had control of thelight. Coyote pointed to two boxes, a large one and a small one. Theynoticed that when the people wanted light they opened the lids of theboxes. In the smaller box was the moon, it contained little light. Inthe lar ger one was the sun and it gave off a lot of light. Coyote toldEagle that they should go and steal the big box. So when all theKachinas went home to sleep, Eagle put both the sun and the moon intoone box and flew off. After a while Coyote wanted to carry the boxthinking that Eagle might be hiding something from him. He pestered andpestered Eagle till he could not take it anymore and Eagle let him holdthe box. Coyote promised not to open the box, but after a while, hewanted to know what the light looked like. So he took a peek. All atonce the sun and the moon came escaping out of the box. The moon causedall the plants to shrivel up and turn brown. Then all the leaves felloff the trees and it became winter. As he was trying to catch the moon,the sun drifted away and all the fruits shriveled up in the cold. Eagleturned to see what was keeping Coyote. When he saw what Coyote had donehe scolded him and blamed him for the reason coldness came to theworld. If it were not for Coyotes curios ity and mischief making, wewould not have winter; we could enjoy summer all the time (Erdoes andOrtiz 142). We will write a custom essay on Zuni Indian Mythology specifically for you for only $16.38 $13.9/page .u9591f88ee6d9ae9012c38f0be51e66fd , .u9591f88ee6d9ae9012c38f0be51e66fd .postImageUrl , .u9591f88ee6d9ae9012c38f0be51e66fd .centered-text-area { min-height: 80px; position: relative; } .u9591f88ee6d9ae9012c38f0be51e66fd , .u9591f88ee6d9ae9012c38f0be51e66fd:hover , .u9591f88ee6d9ae9012c38f0be51e66fd:visited , .u9591f88ee6d9ae9012c38f0be51e66fd:active { border:0!important; } .u9591f88ee6d9ae9012c38f0be51e66fd .clearfix:after { content: ""; display: table; clear: both; } .u9591f88ee6d9ae9012c38f0be51e66fd { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u9591f88ee6d9ae9012c38f0be51e66fd:active , .u9591f88ee6d9ae9012c38f0be51e66fd:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u9591f88ee6d9ae9012c38f0be51e66fd .centered-text-area { width: 100%; position: relative ; } .u9591f88ee6d9ae9012c38f0be51e66fd .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u9591f88ee6d9ae9012c38f0be51e66fd .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u9591f88ee6d9ae9012c38f0be51e66fd .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u9591f88ee6d9ae9012c38f0be51e66fd:hover .ctaButton { background-color: #34495E!important; } .u9591f88ee6d9ae9012c38f0be51e66fd .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u9591f88ee6d9ae9012c38f0be51e66fd .u9591f88ee6d9ae9012c38f0be51e66fd-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u9591f88ee6d9ae9012c38f0be51e66fd:after { content: ""; display: block; clear: both; } READ: Stem Cell Debate Essay Order now In this Native American legend the sun and the moon represent the dayand night. Thus, they are metaphorically associated with summer andwinter.When Coyote releases the moon he brings death and desolationto the world. The sun, the father of light who begets all livingthings upon mother earth, the illuminator of the primordial darkness, islife giver as well as destroyer (Erdoes and Ortiz 127). By doing thishe completely disrupts the seasonal cycle by interfering with theheavenly process. At the time, to the Zuni, the Kachinas weredemi-gods. They regularly visited the pueblos and establishedelaborate rituals that included festive dances for the people(Erdoesand Ortiz 143). Yet, though the Eagle trusted the Coyote and showed theCoyote he did by allowing him to carry the boxes, even though he knewhow sneaky he was. But to the Coyote that was not enough, he wantedmore. In a way, he had to have the last word.

Monday, November 25, 2019

buy custom International Business Practices essay

buy custom International Business Practices essay Each country is often unique from other countries due to the nature of the standards observed in that particular country. In a similar fashion, international business practices are designed to create a unique environment that facilitates a country to engage in global business effectively and efficiently. Many multinational corporations target to expand their presence in the global market so as to increase their profitability. Although attempts have been made by various participants in the international business, particularly multinational corporations, to standardize international business practices, many countries have maintained their own practices. The nature of business practices undertaken by a country in relation to the international business depends on the economic environment in such a country. Nevertheless, the Word Trade Organization has been involved in the development of sound international business practices for all countries willing to engage in it. The desire by many c ountries to keep at par with the global economic trends has prompted them to consider international business practices seriously. A global company should ensure that its employees make their decisions in accordance to the fundamental principles associated with international business practices. In many multinational corporations, global business practices are aimed at communicating as well as reinforcing basic values to be observed by the members of the organization. Furthermore, companies engaged in international business may make their decisions based on the approaches preferred by the target customers such as the religious and cultural inclinations of the target market. The practices embraced by many multinational corporations are based upon critical survey and study of the target market and the prevailing contexts of certain countries. International business practices are generally made up of various categories for many countries (Grath, 2008). Various categories of international business practices include: taxation, trade organizations, exporting, commercial policies, and foreign investment. In each of the categories, there are distinct measures and practices that are meant to impose control and regulations for each member country. For instance, exporting has a broad range of activities ad regulations. Additionally, every country has a specific set of rules that govern export and import activities. Exporting has various important subs of important players in the exporting include: agents and distributors, import duties, import restrictions, and import documentation. Agents and distributors are important for the success of international business as they carry out business obligations on behalf of emigrant companies setting up operations in another country. As such, agents and distributors get legal authority from a country to carry out liaisons locally on behalf of firms abroad. On the other hand, countries may impose import restrictions in case of threats from certain imported products. Such restrictions may be in form of quotas, exorbitant import duties, moral persuasion as well as total burn on use of certain imported products (Kelly, 2008). A country may impose import duty on imported products or not. Moreover, the process of importing has to be done through presentation of valid documents such as commercial invoices by the sellers, certificate of inspection, packing list, and insurance policy as well as the bill of lading. Trade organizations, as a category of international business practice, comprise of individual corporations, companies owned by private individuals, and branches of certain business firms. The existence of corporations to be involved in international business is done after the required legislations are adhered to. Commercial codes on countries differ extensively and, therefore, a corporation needs to observe the legal requirements in its mother country so as to be legally registered to operate. Similarly, companies owned privately have to observe the required legislations on their formation and operation. On the other hand, branches for corporations abroad or within the country should be established through the required regulations of the law. Therefore, the formation and operation of various trade organizations in any country is based on the legal requirements of the country. The countrys international business practices take center stage in the formation and operation of trade organ izations. International business practices aalso encompass foreign investment and commercial policies. Each country embraces diverse commercial policies in relation to international business practices. In most cases, the central banks are involved in the setting up of commercial policies to govern and facilitate international business practices. For instance, the central banks are involved in the development of foreign currency exchange rates (Madigan, 2006). This is normally done through the maintenance of reserves of foreign currencies by the central bank to facilitate trade transactions for the people involved in trade activities. On the other hand, interest rates are set by the central banks of respective individual countries in relation to the nature of the countrys economy. Foreign investment in international business practices comprise of restrictions on investments as well as facilitation of investment processes. A country lays down certain restrictions to be observed by those interested in investing in the country. In most cases, the restrictions set by a country on foreign investment tend to be less stringent as compared to other forms of restrictions associated with business activities. In fact, foreign investors often enjoy a wide range of rights almost equally to the citizens of a country. This is especially so due to the level of significance foreign investment has on a countrys economy. Therefore, most countries often create incentives to encourage foreign investors. Taxation, as a category of international business practices, is subdivided into diverse sub-categories according to the nature of the firms involved. For instance, many countries have corporate taxes, treaty taxes as well as personal taxes. The countrys tax code is used in the calculation of the various types of taxes. From the foregoing, international business practices are generally the set of guidelines and regulations observed by individual countries in their involvement with other countries in international business. The practices are meant to create a serene environment that favors the thriving of international business so as to facilitate economic growth and development in the countries involved. By developing good international business practices, a country can reap massive benefits through its participation in international business. Buy custom International Business Practices essay

Friday, November 22, 2019

An Examining Of The Great Commission Religion Essay

An Examining Of The Great Commission Religion Essay â€Å"God authorized and commanded me to commission you: Go out and train everyone you meet, far and near, in this way of life, marking them by baptism in the threefold name: Father, Son, and Holy Spirit. Then instruct them in the practice of all I have commanded you. I’ll be with you as you do this, day after day, right up to the end of the age.† (Matt 28:18-20 The Message) â€Å"18 And Jesus came and spake unto them, saying, All power is given unto me in heaven and in earth. 19 Go ye therefore, and teach all nations, baptizing them in the name of the Father, and of the Son, and of the Holy Ghost:   20Teaching them to observe all things whatsoever I have commanded you: and, lo, I am with you alway, even unto the end of the world. Amen. â€Å"(Matt 28:18-20 KJV) Introduction The Gospel of Matthew ends Jesus meeting with His apostles in Galilee. This was a special meeting and would change the course of world history in many ways. The meeting was foretold by Jesus in Matthew 26:31-32 : â€Å"31 Then Jesus said to them, â€Å"You will all fall away because of me this night. For it is written, ‘I will strike the shepherd, and the sheep of the flock will be scattered.’ 32 But after I am raised up, hI will go before you to Galilee.† This meeting was announced both by an angel (Matt 28:78) and Jesus Himself (Matt28:10). It was a meeting filled with mixed emotions. Some had run away and others had denied Him before His death. Now He stood before them, alive. Their reaction was to bow down in worship (Matt 28:16-17) I was a meeting in which Jesus gave His disciples a command that we now refer to a the great commission. Someone once said that this was seen by many Christians as the great suggestion, but it is a command that lies at the heart of the Church and from which she operates. The command ends with the beautiful promise that He would always be with them. This is not something to be ignored, but to be a constant part of the C hurch’s functioning as well as that of every believer. I will be looking at what makes this commission so GREAT. I Great in its Authority To Jesus was given all authority. As the creator, He is the One who has the original right to do all things: â€Å"For by1 him all things were created, in heaven and on earth, visible and invisible, whether thrones or dominions or rulers or authorities-all things were created through him and for him. And is before all things, and in him all things hold together.† (Colossians 1:16-1) What higher authority than the creator Himself to issue such a command. As our Redeemer, this authority is even more pronounced: â€Å"who, though he was in the form of God, did not count equality with God a thing to be grasped, but made himself nothing, taking the form of a servant, being born in the likeness of men. And being found in human form, he humbled himself by becoming obedient to the point of death, even death on a cross. Therefore God has hig hly exalted him and bestowed on him the name that is above every name, so that at the name of Jesus every knee should bow, in heaven and on earth and under the earth, and every tongue confess that Jesus Christ is Lord, to the glory of God the Father.†(Philippians2:6-11)

Wednesday, November 20, 2019

Segmentation, targeting, and positioning of hotels Assignment

Segmentation, targeting, and positioning of hotels - Assignment Example Market segmentation therefore relies on the principle that individual customers have need for a variety of products or services (OUP). Any market segmentation endeavour initially needs the identification and selection of the most suitable variables on the basis of which the potential customers are grouped. The identified variables form the platform for the segmentation basis. Whether the market is targeted at consumers or if it is a business to business organization decides the selection of the appropriate variables which however cannot be consistent and be decided in a single stroke on the basis of an identified factor. Appropriate market segmentation therefore requires research and analysis by considering a range of data from different sources (OUP). After a proper market segmentation has been achieved, the next step is the targeting the identified market segment with the product line which the consumers need. Targeting is the focussing of attention on identified segments, directing resources in that direction and taking business decisions accordingly. There has to be an optimum relationship between the resources/capabilities against the attractiveness of an identified segment on the basis of which targeting strategy can either be differentiated, undifferentiated or concentrated (OUP). Targeting is therefore the selection of one or more of the marketing segments which the company intends and decides to enter. After the targeting strategy has been developed, the next step is the positioning of the product by creating marketing offers that serve the targeted customer in the best possible manner. This is achieved by establishing, highlighting and communicating the key factors and the distinctive advantages of a company’s pro duct in relation to the competition. The hotel industry is one of the largest hospitality industries in the world which has thrived due to the large scale movement of

Monday, November 18, 2019

Mental Damages Essay Example | Topics and Well Written Essays - 1000 words

Mental Damages - Essay Example First, the elements of negligence should be established. They are duty, breach, causation, damages. According to Caparo v. Dickman [1990] UKHL 2, if the harm that occurs is reasonably foreseeable, there is a degree of proximity between the tortfeasor and the victim, and if it would be just, reasonable and fair to impose liability, then the duty prong of the negligence analysis is satisfied. In this case the harm was reasonably foreseeable – Maria could foresee that something could go wrong if she defied orders, in that she might be incapacitated, which would leave the children essentially unattended. This is exactly the harm that happened, so this harm is reasonably foreseeable. Proximity is also established, in that the children were in Maria’s care.... Maria did not act as a reasonable person, as a reasonable person would have obeyed the rules set forth by the New Horizons regarding employees acting only with trained support staff. Therefore, breach is established. Causation is the next element. The court’s typically use the â€Å"but-for† test – would the damages have occurred but-for the tortfeasor’s actions? (Barnett v. Kensington & Chelsea NHS Trust [1968] 1 All ER 1068). In this case, the actions of Maria were the cause, because but-for her choosing to drive without supervised help, the damages would not have occurred, because there would have been a trained person to help the children on the bus. Damages are next – do Bonita and Ben have compensable damages? After all, they were physically unhurt, but apparently suffered some type of emotional damage from the incident. In this case, the court would look to the case of Page v. Smith [1995] UKHL 7. In Page, the plaintiff was physically unhurt in a minor traffic accident. However, he suffered other damages, which was that he had myalgic encephalomyelitis, and this disease recurred, although it was previous in remission. The court found that Page was a primary victim, which means that the primary victim must only show that personal injury would have been a foreseeable consequence of the tortfeasor’s actions. If this is established, that the victim was unhurt would not preclude the victim from collecting from some kind of nervous shock or psychiatric injury. Further, another case that establishes that primary victims may recover for nervous shock, if they are in danger of being injured, is Alcock v Chief Constable of South Yorkshire Police [1992] 1 AC 310. Therefore, even though the two

Saturday, November 16, 2019

Change Management in the Learning Organization Essay Example for Free

Change Management in the Learning Organization Essay In this paper I intend to discuss change management approaches that support the learning organization philosophy. The learning organization is defined as an organization that acquires knowledge and innovates fast enough to survive and thrive in a rapidly changing environment. Learning organizations (1) create a culture that encourages and supports continuous employee learning, critical thinking, and risk taking with new ideas, (2) allow mistakes, and value employee contributions, (3) learn from experience and experiment, and (4) disseminate the new knowledge throughout the organization for incorporation into day-to-day activities. On the other hand we have a process called change management which is defined as minimizing resistance to organizational change through involvement of key players and stakeholders. At my organization these two go hand in hand and it allows for us as a company to experience constant growth and development of our staff. Our employees are more willing to welcome change when we train them in the process. As businesses moves through the 21st century, they are becoming more dependent upon their managers to be change agents. These companies actually seek managers who can bring success to their organizations. Three of the characteristics we look for in our new managers are they must have the ability to stimulate change, excellent planning capabilities, and ethics. Over the years I have spent in management I have learned that success in  becoming a learning organization relies on a commitment to learning on the part of the organizations I have worked for and the willingness of the individuals involved to be receptive to the change process. As a manager, what we usually can change falls into basically three categories; people, structure, or technology. An efficient manager will make alterations in these areas in an attempt to facilitate change. With people the change involves adjusting attitudes, expectations, perceptions, and probably most importantly behavior. Coaching people to adjust in these areas will help employees within the organization to work together more effectively. Changing structure relates to the job design, specialization, hierarchy and any other structural variables. These usually need to be flexible and non-static in order to be adaptable to change. When dealing with technological change we are looking at modifying work processes and methods along with the introduction of new equipment. To me learning organizations support the change process just as much as change management supports the learning organization philosophy. I say that because every change calls for some sort of learning as the more comprehensive the change the more attention we have to place on learning for the individuals involved in the change. By utilizing the learning organizations philosophies companies including the one I work for are able to magnify the potential of its employees which keeps them growing. References www.businessdictionary.com www.morfconsulting.com Learning in action: a guide to putting the learning organization to work/ David A. Garvin

Thursday, November 14, 2019

Samuel Beckett’s Waiting For Godot and The Theater of The Absurd Essay

With the appearance of Waiting for Godot at the Thà ©Ãƒ ¢tre de Babylone in Paris in 1953, the literary world was shaken by the arrival of a drama so different yet so thrilling that it gave rise to the "Theater of the Absurd". His contribution to this particular type of theater movement allows us to refer to him as the father of the genre. While other dramatists, such as Tom Stoppard, have also contributed to this genre, Beckett remains its single, most lofty figure. It is this type of theater that deals with the absurd aspects of life, to stress upon its native meaninglessness. It is the time and identity of characters that are usually vague or ambiguous in such plays from the theater of absurd. The plays are dreamy and impossible to implement in real life and the dialogues of such plays are irrational and make the play seem absurd because the whole structure of the play is in repetition. In this play, Samuel Beckett emphasizes upon human suffering. The play revolves primarily around Estragon and Vladimir who endlessly wait for something to help overcome their boredom and sins because they seek redemption as mentioned in the play. Godot can be assumed as one of the many wishes that Vladimir and Estragon wait for. Waiting for Godot is part of the ‘Theater of the Absurd’. This implies that it is meant to be irrational and pointless in nature since you do not have a proper moral and conclusion to the play, i.e., it is an open ended play. The readers and audiences can have many conclusions towards the end of the play. The concepts of drama, chronological plot, logical language, themes, and recognizable settings are features of drama that a play from the Theatre of Absurd does not have. We see how the characters of Vladimir and Estrago... ...s with their incoherent colloquy. And above than all, its theme is unexplained meaning that the play does not only have a single theme like adventure or action. â€Å"Waiting for Godot† is an absurd play for it is devoid of characterization and motivation. Though characters are present but are not recognizable for whatever they do and whatever they present is purposeless. Works Cited Beckett, Samuel. Waiting For Godot. 3rd ed. N.p.: CPI Group, 2006. Print. Vol. 1 of Samuel Beckett: The Complete Dramatic Works. 4 vols http://www.studymode.com/essays/The-Absurdity-In-Waiting-For-Godot-868180.html http://www.gradesaver.com/waiting-for-godot/study-guide/about/ http://www.gradesaver.com/waiting-for-godot/q-and-a/why-is-waiting-for-godot-despite-its-absurdity-a-popular-play-109391 http://elitnotes.blogspot.in/2012/07/absurdity-in-waiting-for-godot-waiting.html Samuel Beckett’s Waiting For Godot and The Theater of The Absurd Essay With the appearance of Waiting for Godot at the Thà ©Ãƒ ¢tre de Babylone in Paris in 1953, the literary world was shaken by the arrival of a drama so different yet so thrilling that it gave rise to the "Theater of the Absurd". His contribution to this particular type of theater movement allows us to refer to him as the father of the genre. While other dramatists, such as Tom Stoppard, have also contributed to this genre, Beckett remains its single, most lofty figure. It is this type of theater that deals with the absurd aspects of life, to stress upon its native meaninglessness. It is the time and identity of characters that are usually vague or ambiguous in such plays from the theater of absurd. The plays are dreamy and impossible to implement in real life and the dialogues of such plays are irrational and make the play seem absurd because the whole structure of the play is in repetition. In this play, Samuel Beckett emphasizes upon human suffering. The play revolves primarily around Estragon and Vladimir who endlessly wait for something to help overcome their boredom and sins because they seek redemption as mentioned in the play. Godot can be assumed as one of the many wishes that Vladimir and Estragon wait for. Waiting for Godot is part of the ‘Theater of the Absurd’. This implies that it is meant to be irrational and pointless in nature since you do not have a proper moral and conclusion to the play, i.e., it is an open ended play. The readers and audiences can have many conclusions towards the end of the play. The concepts of drama, chronological plot, logical language, themes, and recognizable settings are features of drama that a play from the Theatre of Absurd does not have. We see how the characters of Vladimir and Estrago... ...s with their incoherent colloquy. And above than all, its theme is unexplained meaning that the play does not only have a single theme like adventure or action. â€Å"Waiting for Godot† is an absurd play for it is devoid of characterization and motivation. Though characters are present but are not recognizable for whatever they do and whatever they present is purposeless. Works Cited Beckett, Samuel. Waiting For Godot. 3rd ed. N.p.: CPI Group, 2006. Print. Vol. 1 of Samuel Beckett: The Complete Dramatic Works. 4 vols http://www.studymode.com/essays/The-Absurdity-In-Waiting-For-Godot-868180.html http://www.gradesaver.com/waiting-for-godot/study-guide/about/ http://www.gradesaver.com/waiting-for-godot/q-and-a/why-is-waiting-for-godot-despite-its-absurdity-a-popular-play-109391 http://elitnotes.blogspot.in/2012/07/absurdity-in-waiting-for-godot-waiting.html

Monday, November 11, 2019

Hope

Live Lesson Topic: Skill Related Fitness Live Lesson Teacher: Mrs†¦ White Describe the task you completed collaboratively in a paragraph consisting of three or more sentences. The task my group and I completed collaboratively was we looked at Images which had different people with different expressions, and we all as a group went through each picture and discussed what was occurring In each picture according to each person's facial expression.We then all together voted on a picture that we wanted to use for the assignment, which was two girls standing on the left with one girl whispering something in the other girl's ear, and a girl to the far right standing alone looking sad. After we chose the image, Image B, we all created a caption describing what was going on in the Image. Part 2: Caption Creation Caption for the Image selected: Bullying is a major problem that is rising in schools all over the country. Part 3: Peer and Self-Evaluation Rate yourself and your team as a whole according to each of the performance criteria below. =Always 2=usually 1=Sometimes 0=Never Peer and Self-Evaluation Rating for You Rating for the Team Reasons for Ratings and Other Comments Showed respect for others' opinions 3 Everyone was very respectful to what others had to say. Completed assigned duties We Immediately answered all the questions Mrs†¦ White asked. Discussions 2 I was a little shy at first. Stayed on task Participated In If we ever went off task, it's because we were giving examples that were related to the Essen, which also served a bit as an ice-breaker.Offered relevant information I love how the team gave many personal examples to support what they were saying. Completed work adequately We worked very sufficiently I believe. Completed work on time (with no reminders) Mrs†¦ White had to only say the instructions once. Offered appropriate feedback when necessary We all offered positive feedback to each other. Part 4: Self-Reflection Respond to the fol lowing questions with at least two sentences for each. 1 What did you enjoy most about working with others on this lesson/task?I really enjoyed that everyone was very nice, supportive, and respectful to what others had to say. At first I was shy to participate, but the group's attitude was so positive and inviting that I eventually felt really comfortable participating in the discussions. 2 Do you feel others were happy with your participation in the lesson/task? Yes, I feel that overall we were all very welcoming for others to participate. I felt very happy when other group members were giving positive feedback when I was participating in the discussions, which helped me in confidence to participate even more. What will you do differently, if anything, in your next online collaboration opportunity? On my next online collaboration opportunity, I will try to answer more questions, because I knew the answers to most of the questions I was Just shy to answer. I will also try to collabo rate more with the other group members during the entire session. For instance, I'll try to give more feedback to the group members. Part 5: Live Lesson Chat Exchange Paste the chat conversation exchanged in your Live Lesson session below: You do not need to do this part 0 -Mrs†¦ White Hope Live Lesson Topic: Skill Related Fitness Live Lesson Teacher: Mrs†¦ White Describe the task you completed collaboratively in a paragraph consisting of three or more sentences. The task my group and I completed collaboratively was we looked at Images which had different people with different expressions, and we all as a group went through each picture and discussed what was occurring In each picture according to each person's facial expression.We then all together voted on a picture that we wanted to use for the assignment, which was two girls standing on the left with one girl whispering something in the other girl's ear, and a girl to the far right standing alone looking sad. After we chose the image, Image B, we all created a caption describing what was going on in the Image. Part 2: Caption Creation Caption for the Image selected: Bullying is a major problem that is rising in schools all over the country. Part 3: Peer and Self-Evaluation Rate yourself and your team as a whole according to each of the performance criteria below. =Always 2=usually 1=Sometimes 0=Never Peer and Self-Evaluation Rating for You Rating for the Team Reasons for Ratings and Other Comments Showed respect for others' opinions 3 Everyone was very respectful to what others had to say. Completed assigned duties We Immediately answered all the questions Mrs†¦ White asked. Discussions 2 I was a little shy at first. Stayed on task Participated In If we ever went off task, it's because we were giving examples that were related to the Essen, which also served a bit as an ice-breaker.Offered relevant information I love how the team gave many personal examples to support what they were saying. Completed work adequately We worked very sufficiently I believe. Completed work on time (with no reminders) Mrs†¦ White had to only say the instructions once. Offered appropriate feedback when necessary We all offered positive feedback to each other. Part 4: Self-Reflection Respond to the fol lowing questions with at least two sentences for each. 1 What did you enjoy most about working with others on this lesson/task?I really enjoyed that everyone was very nice, supportive, and respectful to what others had to say. At first I was shy to participate, but the group's attitude was so positive and inviting that I eventually felt really comfortable participating in the discussions. 2 Do you feel others were happy with your participation in the lesson/task? Yes, I feel that overall we were all very welcoming for others to participate. I felt very happy when other group members were giving positive feedback when I was participating in the discussions, which helped me in confidence to participate even more. What will you do differently, if anything, in your next online collaboration opportunity? On my next online collaboration opportunity, I will try to answer more questions, because I knew the answers to most of the questions I was Just shy to answer. I will also try to collabo rate more with the other group members during the entire session. For instance, I'll try to give more feedback to the group members. Part 5: Live Lesson Chat Exchange Paste the chat conversation exchanged in your Live Lesson session below: You do not need to do this part 0 -Mrs†¦ White

Saturday, November 9, 2019

Itgs Exam Questions and Full Mark Answers

ITGS Homework Area of impact- Science and the environment A) Identify two input devices that are required in order for Jules to interact with a real person. There is several input devices required in order for Jules to interact with a real person, these include a microphone, a web cam or digital camera, normal camera and speakers so the person can hear Jules. B) Describe the steps that Jules would take in order to follow the movement of the person talking to him. There are several steps that Joules would take to interact with a real person. . Jules could capture the initial image of any human being using its camera or webcam sensors to capture an image. 2. Jules would have to use facial recognitions software to determine the parts of the face to face tracked (reference points) or identify different parts of the face such as skin colour or your eyes. Laptops these days also have sensors built into them. 3. Record an initial position; of the face which is to be tracked/ set the positio n of the human in relation to the robots own position. 4. Recording of time lapse intervals 5.Capture images at new positions 6. Determine the location of the new position 7. If there is no movement, then no movement is detected and there is no adjustment. 8. Jules can adjust to the movement if there is one 9. Jules can now communicate with the human being 10. So this process can be repeated. C) Jules may have difficulty understanding a sentence in a conversation with a human, explain why this could happen. If a word that is said that is not in the language database of the robot the sentence that is said by the human will not be comprehended by the robot.Unusual grammar and sentence structure that is not programmed in Jules language database will cause difficulties. Jules may understand only one type of accent and may struggle to communicate if Jules communicates with someone with a different accent. Colloquial expression was used. Unclear speech due to unclear conversion of human s ound converted to digital sound files which cannot be matched will cause Jules to not understand the human being. Background noises can cause Jules to misinterpret human voices. Linguistic differences- Words may have different meanings depending on the context.D) Evaluate whether the organizers should go ahead with this decision to replace human umpires with robotic umpires such as tennis-umpire There are several positives and negatives of this. Positives include 1. The robot would consistently determine the outcome of each play, so human reaction is not present. So reviews won’t be needed. 2. Any robot will not ever get tires or struggle due to physical conditions. (Reactions of crowd, weather). 3. There is no chance that a robot will be biased towards another player, something that can be present when a human referee is officiating.So they don’t care who win. Robots are more likely to make the right calls first time so this will save time from reviews. 4. Another pos itive is that robots will not face pressures of the crowd when making a decision because they feel no pressure due to their lack of emotions. Negatives include. 1. Even though robots may be accurate, because of the quick movement of the ball, it may take time for the robot to make the decision; this will make games go a lot slower. 2. Players may block the view of the ball or other obstacles which the robot will find impossible to avoid. . There are ethical issues present as well because the robots can actually replace human umpires if several of them are present within a game. 4. Cost maintenance of robots are very high, example are a lot harder/ more expensive to maintain than human umpires. 5. Players and the crowed might react negatively to robot umpires as they have never been used before. 6. Robot umpires are not designed to argue with players so if any supporter or player disagrees with the ref even with their accuracy what happens then? 7.Robots will not be able to detect an y misconduct any player does during the match, something that humans are capable to do because robots do not understand human emotions. 8. Robots aren’t programmed to do the unexpected so anything that happens not regarding to tennis for example a fan interrupting the game by running onto the court, robots will not be able to do anything about or they might hurt the fan that runs onto the court. 9. If let’s say a player wasn’t ready for the ball, a human umpire could call a replay. This is something a Robot cannot interpret.

Thursday, November 7, 2019

Network Security Problems Analysis Essay

Network Security Problems Analysis Essay Network Intrusion Analysis Essay Example Network Intrusion Analysis Essay Example The problem of selection of reliable data sources for the process of digital forensics investigation is particularly relevant nowadays, with each type of computer-related crime relying on a specific set of such sources. In particular, in the case of network intrusion, user accounts, operation and intrusion detection systems, as well as the logs of Internet providers are the most useful sources of information. For malware installation, the investigators are likely to find the evidence that they require by analyzing system data, the storage of intrusion detection system, and the information provided by a virtual machine. Finally, in the case of insider file deletion, the investigation has to rely on hard disks and network storages as the primary sources of useful data. Common Network Security Problems Computer-related crimes are among the consequences of mass computerization of the society. The integration of modern information technologies in almost all areas of human activity has led to the fact that many traditional crimes (e.g. appropriation, theft, fraud, counterfeiting, etc.) are being committed with the help of computers. Crimes associated with the use of computer technology present a serious threat to any company or individual. In order to identify the offenders responsible for this damage, a special procedure called digital forensics investigation is conducted. On the contrary to the usual process that involves the gathering of evidence by questioning the witnesses, it relies on the information obtained from the digital sources. However, the quality and reliability of the gathered data may vary depending on the situation, which may affect the course of the investigation. As a result, the problem of selection of data sources for solving a computer-related crime becomes esp ecially relevant. Therefore, the following research focuses on identification of the most valuable data sources that can be used in different cases of computer-related crimes (network intrusion, malware installation, and insider file deletion). Additionally, it classifies them in terms of their usefulness to investigators. The network intrusion is the process of unauthorized access to the network that is mostly conducted with a malicious intent. The risks of such an activity are related to the devastating effects of the loss of time and money as a result of damage or theft of the important information and resources. The attackers can gain access to the network by exploiting vulnerabilities in software, hardware, or even attack by using such refined techniques as guessing other users’ logins and passwords. An attacker that gains access to the network becomes the source of the four following types of threats: Data theft; Identity theft; Data loss and data manipulation; Termination of service. In case of such an event, it is possible to distinguish several data sources that are of the most significant value for the digital forensics investigation. They include user accounts, the operation system itself, the intrusion detection system, and the records kept by the providers of web services. User Accounts The user accounts provide the most valuable information for the digital forensics investigation. In particular, the security measures of the majority of private networks involve the use of complex passwords that are to be changed regularly, the constant update of the list of registered users, and the limited amount of the incorrect attempts to enter the system. As a result, the possibility of the intrusion is lowered since it is impossible to log in to the network by using a fake account. Still, in case such an event has occurred, the audit of the existing user accounts may allow to identify the source of the intrusion, i.e., a particular account used by the attacker, thus narrowing the field of search. In turn, this information may provide investigators with hints regarding the ways of obtaining access to network, the timeline of the event, i.e., the time of logging in and out, the ways of misusing the account data, and so on. In other words, this data source defines the direction o f the entire process of investigation (Fichera Bolt, 2013). As a result, in terms of network intrusion, user accounts and the results of their audit are the most valuable of the listed sources of information. Operation System The information that is collected from the operation system, i.e., live system data, is also of high value for the digital forensics investigation. By reviewing it, it is possible to define the following details of the intrusion. First of all, the analysis of the system logs may provide the information on the password that the attacker used to access the network. In turn, this allows to define whether the user account was hacked or the password to it was simply stolen. Next, the analysis of system data may give insight into the nature of manipulations performed by the attacker within the network. In particular, the criminal may pursue specific goals by obtaining access to it. For example, in the case of a single event of data theft, the system logs are likely to contain the information on copying certain files. On the other hand, in case the offender’s primary goal was data manipulation or termination of the system (the events that usually require several intrusions), it is li kely that certain software will be altered or replaced to utilize the weaknesses of the system and simplify the consequent intrusions. For example, the attacker may replace the original application layer protocol with a modified one that allows remote access to the system, which means that the intrusions will be occurring on a regular basis (Casey, 2010). As a result, the information on the nature of manipulations within the system may help define the motives of the crime, thus simplifying the process of identification of the attacker. All these facts allow to rank the aspect of system data second in the list of the most valuable sources for the digital forensics investigation. Indeed, its analysis allows to discover the files and systems that were altered as a result of intrusion, as well as define the way used by the attacker to access the network. Intrusion Detection System Intrusion Detection System (IDS) is a hardware or software designed to detect the facts of unauthorized access to a computer system or network or their unauthorized management. IDS provides an additional level of security of computer systems by alerting the administrators of any abnormalities in the work of the network. The typical IDS includes a sensor subsystem for collecting the events related to the security of the protected system, analytical subsystem designed to detect attacks and suspicious activity on the basis of sensor data, and storage providing the accumulation of primary events and analysis. In most cases, the analysis preformed by IDS is based on the principle of signature matching: the system refers to the dictionary of the known attack signatures. In case any part of the attack pattern complies with the existing signature, the system makes an attempt to halt it and warns the administrator of a threat. However, in order to achieve the maximum efficiency of this method , it is necessary to replenish the dictionary of the signatures on a regular basis. At the same time, the attack patterns used by the offenders are becoming more sophisticated, meaning that even the newest signatures cannot guarantee complete protection of the network. In turn, this results in an increased amount of false alarms on the part of IDS (Casey, 2010). Still, the data from the storage of IDS, namely the alarms, can be useful for investigation, provided it is sorted. By filtering all the false alarms, it is possible to use the remaining information for the analysis of the less developed system logs and search for the clues on the nature of the attack. In particular, the use of IDS data makes it possible to obtain additional details about the connection used by the attacker and thus prevent the consequent attempts of intrusion. In some cases, it also allows to pinpoint the direction of the traffic, thus simplifying the process of identification of the attacker. However, such an analysis requires comprehensive knowledge of operation systems and hacking techniques, as well as the presence of logs of diagnostic tools. As a result, IDS can be placed on the third place in terms of its value to the digital forensics investigation of network intrusion: it provides useful information that may affect the course of investigation significantly, but its identification and isolation from the pool of unnecessary data requires great efforts on the part of investigators. The Records of the Providers of Web Services In order to organize and conduct their attacks on networks, the offenders must use web services (the Internet connection, messengers, etc.). As a result, by turning to the providers of these services, it is possible to acquire the information on the timeline of their use by the hackers at the time of event. Nevertheless, providers may collect such data as names and e-mail addresses of their clients as well as their payment information, e.g. data on credit cards and bank accounts. In the case of Internet providers, it is also possible to obtain IP addresses of the potential offenders at the time of the event, in case the dynamic IP is used. All this information can be employed to prove either involvement or non-involvement of the potential offenders in the act of network intrusion. However, each of the providers has a different policy regarding the consumers’ data collection, meaning that it is difficult to obtain consistent information in this way. Moreover, there is no guaran tee that the obtained information is reliable. As a result, the records of the providers of web services are ranked fourth and last in terms of their value to the digital forensics investigation. Malware Installation Malware is any software designed to gain unauthorized access to the resources of the computer or network. Currently, there are tens of thousands of such programs, with the new ones being created on a regular basis. Malware may cause serious damage to corporate networks, email systems, and web sites by using their different vulnerabilities. Its installation may result in the following negative effects: The interference to the processes of the infected system (the block of antivirus software and administrative functions of the operating system as well as the sabotage of the computer-controlled processes); The installation of another malicious software (either by downloading it from the network or unpacking another malicious program already contained within the file); Theft, fraud, extortion, and spying on the user (theft of accounts of various services and payment systems as well as key logging); Other illegal activities (an unauthorized access to the resources of the computer, the organization of DDoS-attacks, etc.) (Sikorski Honig, 2012). In the case of malware installation, such data sources as the operation system itself, IDS, and virtual machine are of the highest usefulness for the digital forensics investigation. Operation System The volatile data collected from the running operation system, specifically the one obtained at the time of malware installation, allows to conduct a search for hidden files that were integrated into the system by malware. In this regard, the alternate data streams present the highest value for investigators. Moreover, the analysis of such components of the system as drivers and applications as well as the executed services and processes may help identify the type of malware and its source (Sikorski Honig, 2012). The usefulness of this data becomes even higher in case investigators were able to discover the fact of malware installation before it was finished. The primary reason for that is the fact that they may collect and analyze the data on it without alerting the criminal. As a result, the process of identification of the offender is simplified. At the same time, the discovery of the fact of malware installation often requires a comprehensive analysis of the potentially infected system. As was mentioned before, new types of malware are being developed regularly, meaning that even the use of the most advanced diagnostic tools does not guarantee the absence of false alarms or critical failures, for example, the malware is not detected until it causes irreparable damage to the system (Casey, 2010). Nevertheless, all the above mentioned facts allow to consider the operating system as the most valuable source of information for the digital forensics investigation of the malware installation case. Intrusion Detection System As was mentioned before, IDS identifies and blocks threats, including malware, on the basis of signature matching principles. As a result, the data obtained from its storage may be used to identify the type of malware as well as the attack pattern used by the offender. Moreover, after obtaining the volatile data collected from the running operation system, it is possible to compare it with the existing signatures in the dictionary of IDS and define whether the installed malware has any specific features, for example, downloader, dropper, etc. (Sikorski Honig, 2012). In turn, this information may provide evidence on the goals of the attacker. At the same time, there is no guarantee that the log of IDS will be free of false alarms or that the system will detect the attempt to install malware. Moreover, comparing signatures and volatile data, the amount of information may be overwhelming, which may slow the process of investigation (Marshall, 2008). Considering the mentioned issues as well as the fact that IDS can be used to its full extent only after the analysis of the volatile system data, it is possible to rank it as the second useful source of information for the digital forensics investigation of the malware installation case. Virtual Machine In the case of malware installation, investigators often have to examine the principles of operation of the harmful software and determine the potential threat that it contains by using a virtual machine. It is a software and/or hardware system that emulates the hardware of a target platform and executes the programs for a target platform on the host platform. It can also virtualize a particular platform and create the environments that isolate programs and even operating systems from each other on its basis (Barrett Kipper, 2010). The virtual machine allows to examine the behavior of malware in different conditions and gives an opportunity to return to any stage of the malware installation process as well as change its pace. In turn, it may provide evidence on the type of files that the program tries to modify or delete, the information that it tries to collect as well as the final destination of the stolen data (Sikorski Honig, 2012). As a result, it may provide insight either in to the motives of the attacker or his location, thus speeding the process of investigation. At the same time, the virtual machine cannot always act as a perfect replica of an operating system. As a result, the likelihood of it being discovered by the attackers increases, meaning that they will take safety measures, thus slowing the process of investigation. Moreover, it may not always provide a sufficient environment for the analysis (Barrett Kipper, 2010). Considering all these facts, it is possible to rank it third in the list of the most useful data sources for the digital forensics investigation of the malware installation case. Insider File Deletion Insider file deletion is a threat that emanates from the people within the organization, such as its current and former employees, contractors, and business partners that have information on security practices within it as well as the data and computer systems. Insiders may have passwords that give them legal access to the system. Moreover, they are often familiar with the data and intellectual property of the organization as well as the methods used to protect them. As a result, they can circumvent the entire security system. Physical proximity to the data means that insiders do not need to break through the organizational network by passing the outer perimeter firewalls. Due to the fact that they often have a legitimate access to the information, the file deletion performed by the insiders is difficult to track and prevent (Probst et al., 2010). In this case, such data sources as hard disk drives and network storages are most useful for the digital forensics investigation. Hard Disk Drive Considering that the insider file deletion is usually aimed at non-volatile data, which is not deleted after the shutdown of the system, it is clear that the hard disk drive will be the primary target of the attackers. Despite the fact that the file has been removed completely, i.e., deleted from recycle.bin, only the information regarding its storage sector, path, and create/modify date is erased from the system drive. By using the forensic software, it is possible to recover it, thus nullifying the damage done by the insider and, which is most important, obtaining the evidence on the motives and time of the crime, namely by reviewing the contents of the target file and the time of the deletion (Marshall, 2008). At the same time, the recovery is possible only within a short period of time since the required file data can be overwritten by the system. Moreover, the insider may use specific software to overwrite the mentioned data immediately, meaning it cannot be recovered (Probst et al., 2010). Nevertheless, due to its nature of a primary target, a hard disk drive is the most useful data source for the digital forensics investigation. Network Storage The network storage can be used as a data source in case the deleted file was previously shared with other users. In general, the algorithm of its recovery is based on the search of previous versions of this file. The information obtained from it serves similar purposes. However, in case of network storage, the challenges faced by investigators are more significant due to the overwhelming amounts of information in comparison to that stored on the hard disk drive. Moreover, as in the previous case, the insiders may delete the file permanently or erase the parts of network storage that contain the corresponding information (Lillard et al., 2010). As a result, it ranks second in terms of usefulness to the digital forensics investigation. A significant variety of computer crimes presents a wide array of data sources that can be used during the process of investigation. The types of these sources as well as their usefulness vary depending on the nature of a crime. Still, it is possible to classify them in terms of their value for each specific case, which was demonstrated in the research. However, it should be noted that in most cases, the usefulness of the described data sources depends on the skills and equipment possessed by the investigation team. Moreover, in some cases, for example, the insider file deletion, the preventive measures taken by the attackers can render any of the available data sources useless. As a result, it is clear that the process of digital forensics investigation must be improved on a regular basis to follow the pace of development of the contemporary information technologies.

Monday, November 4, 2019

The ouster of Vikram Pandit, and what that means for big banks Research Paper

The ouster of Vikram Pandit, and what that means for big banks - Research Paper Example This paper will address Pandit’s ouster, and describe how this major event in Citigroup will influence the future operations of Citibank, as well as other banks in the same industry. Mr. Pandit took over as the bank’s CEO in 2007 when the bank was in a financial turmoil, but slightly recovered the profitability of the bank in 2010. Under Pandit’s management, much of Citi’s resources were devoted for future profitability. Expanding market to the developing countries was a prospective Pandit held (David, Suzanne, and Dan 1-2). The reasons offered for Pandit’s ouster emanate from struggles to recover from past financial crises at the bank. Mr. Pandit was forced to resign after the board of Directors at Citi bank felt that he managed the bank poorly. The board also claimed lack of appropriate communication from the CEO on vital business matters. During the tenure of Pandit, the shares of Citigroup fell by 89%, which resulted in a revolt by shareholders over his executive pay. The Federal Reserve also rejected Citigroup’s plan to purchase back stock. In addition, there was a $2.9 million write-down by Morgan Stanley, of a brokerage joint venture. All these unfortunate happenings can be numerically represented, but most probably point to poor judgment, rather than day-to-day oversight of specific business units (David 2). Michael Corbat, Pandit’s replacement, may not perform as Pandit, who was credited a well performer, who knew the positions of the bank inside out. Corbat’s strategic directions for future of the company are also still uncertain. Many challenges Corbat, as he will feel the pressure of impressing quickly, since the bank’s shareholders are now frustrated about the bank’s uncertainty. Citigroup investment bank is a potential victim of shrinkage. It is enormous, but with uneven revenue since the times of the financial crisis. This continued decline has to be addressed in order to gain stability again. Mr. Corbat will also have to deal with the â€Å"black box† reputation of the bank. Observations show that the bank’s disclosures are not as comprehensive as those of other banks are. In order to regain the confidence of investors, Corbat has to tackle this issue also. Consumers should expect to feel the difference between Citi managed by Pandit, and Citi managed by Michael Corbat, Pandit’s successor. This kind of transition at Citi may not positively influence on the financial health of the US banking industry, and the general US economy. This is because Citi is a bank that has been considered ‘important’ by the regulators, amid financial crisis. It is a troubled bank, and still struggles to gain stability. Pandit was a CEO that had set out to turn around the case of Citi bank, and ensure its total economic recovery. However, by firing such a dedicated CEO, Citi bank risks continued vulnerability to financial crises. The shareholde rs of Citi bank continue to be adversely affected by the bank’s prolonged stagnation in financial instability. However, more parties will feel the pinch of this as it will affect the whole banking industry as well as the national economy. Citi is in the process of repairing its balance sheet, it is then expected that it will cut down on customer lending, in a bid to save more. Its customers will not access

Saturday, November 2, 2019

The mechanical testing of a silk fibrion (SF) scaffold seeded with Essay

The mechanical testing of a silk fibrion (SF) scaffold seeded with MSCs in Colon Engineering - Essay Example TEC was spawned by the rats 100% with no regard to source of tissue, the initial occurrence of adult cells of engineered intestine or an engineered tissue. Architecture of TEC is same as acetyl cholinesterase, inherent actin staining on muscularis propria staining for actin identified in deoxynucleotidyl transferase-mediated deoxyuridine triphosphate-digoxigenin nick end labeling assay similar to native colon, lamina propria of a linear distribution, ganglion cells, S100-positive cells, and a terminal (Fonkalsrud 1999). By the use of cavity information specified in function of vitro dependable with advanced colonocytes, and an optimistic response of short circuit current to theophylline demonstrating integral transfer of ion. TEM exhibited regular architecture of micro part (Dayton 2000). Architecture of colon was retained in anastomosis with uncultured uptake of fluid visualization. The rats survived embedding and 100% of all them spawned TEC. Almost 60,000 OU was obtained from every pup colon of rat. This is an adjustable quantity as the surface area of tissue in every case may differ. For the reason that adult colons were very large, every rat colon of adult rat gave a result of a specimen of 800,000 (Meagher, 1998). These were inclusive of the ones spawning subordinate TEC and the ones embedded with adult tissue TEC. The TEC average size was 4cm by 5cm by 4 cm. There was absolutely no measure of TEC going below 3cm by 3cm by 2 cm, and the prevalent one was 6cm by 8cm by 7.5 cm. This is shown below TEC was paramount visible as a minor cyst with a lumen that was mucus-filled lumen the second week onwards (Shepherd 1990). Prior to that, there was no visible lumen recognized. Sequential growth took place the weeks after the second week. 9. Grikscheit TC, Ochoa ER, Ramsanahie A, et al 2001. Tissue engineered colon, characterization and comparison to native colon. Owen Wangensteen Surgical Forum Abstracts of the American College of Surgeons