Wednesday, October 30, 2019

Dyslexia Essay Example | Topics and Well Written Essays - 3500 words

Dyslexia - Essay Example orld Federation of Neurology’: â€Å"Specific developmental dyslexia is a disorder manifested by difficulty learning to read despite conventional instruction, adequate intelligence, and adequate socio-cultural opportunity. It is dependent upon fundamental cognitive disabilities that are frequently of constitutional origin.† (Ariniello, 1999). Through this proposal it is hoped to analyze the learning disabilities of children such as reading, writing and spelling errors such as, mirror writing, back forward writing and so on. It is hoped to identify the link between these abilities (Alexander, & Slinger-Constant, 2004). That is how specific learning disabilities have an impact on other factors such as social factors, psychological factors or environmental factors and so on. Reading and learning are the two factors that decide the success of a child during his school career. Initially he learns to read. After that he reads to learn (Griffiths, & Snowling, 2002). As such reading is of paramount importance in the educational process. Unfortunately poor reading skills, and as a result poor learning skills, have become a stark reality for a disturbing number of children. The Institute for Global Education and Service Learning states that 40% of American children have difficulty reading or learning to read, and as many as three- quarters of pupils who are poor readers in third grade will remain poor readers in high school. The word "dyslexia" is frequently used to refer to the child who has an average or above average IQ and is reading 1 1/2 grades or more below grade level and whose reading problem is accompanied by the signs such as: Reversals of letters (Carrol, & Iles, 2006). That is children with dyslexia frequently confuse letters like b and d, either when reading or when writing, or they sometimes read (or write) words like "rat" for "tar," or "won" for "now." The primacy and immediacy of a priori and a posteriori implications of dyslexia among school children

Monday, October 28, 2019

RISK ASSESSMENT on the Department of the Army IT Systems Essay Example for Free

RISK ASSESSMENT on the Department of the Army IT Systems Essay 1.Introduction 1.1 Purpose This risk assessment was to identify threats and vulnerabilities related to the Department of the Army (DoA) Information Technology (IT) systems. It will be utilized to identify vulnerabilities in the Computer Network Defense (CND) Capabilities and mitigation plans related to DoA’s IT systems. It was realized that this was a potential high-risk system as noted by the Department of Defense (DoD) Chief Information Officer (CIO). (DoD, 2012) 1.2 Scope This risk assessment applies to all DoA Non-secured Internet Protocol Router Network (NIPRNET) and Secured Internet Protocol Router Network (SIPRNET) for Regular Army and Reserve Components. This is a major system that is used by millions of Soldiers, contractors and DA civilians worldwide. The DoA’s IT system is comprised of Army Global Network Operations and Security Center (A-GNOSC) which is responsible for the Army’s day-to-day Tier 2 CND Service Provider. The research methods will present both quantitative and qualitative data which will identify hazards and vulnerabilities to include International-Transnational Terrorism and Domestic Terrorism and present an assessment of the potential risks from them. Information will be collected mainly from DoD’s and DA’s websites. SYSTEM CHARACTERIZATION The DoD uses DODI 8510.01, DoD Information Assurance Certification and Accreditation Process (DIACAP), as the process for implementing Certification and Accreditation (CA) within their information system. The Information Assurance (IA) Controls, or security measures that must be implemented on a system, as stated in the DODI 8500.2, Information Assurance (IA) Implementation. The control selection relies on the Mission Assurance Categories (MAC) and Confidentiality Levels (CL). Information Systems (IS) will be allotted a MAC level which shows the importance of the information which is used to determine the IA controls for integrity and availability regarding DODI 8500.2 and will be decided by the DoD or Army by the DIACAP  team (Information Assurance, 2009) MISSION ASSURANCE CATEGORY MAC IIs a high integrity, high availability for DoD ISs handling information that is determined to be vital to the operational readiness or mission effectiveness of deployed and contingency forces in terms of both content and timeliness. The consequence of loss of integrity or availability is unacceptable and could include the immediate and sustained loss of mission effectiveness. MAC IIIs a high integrity, medium availability for DoD ISs handling information that is important to the support of deployed and contingency forces. The consequence of loss of integrity is unacceptable. Loss of availability is difficult to deal with and can only be tolerated for a short time. MAC IIIIs a basic integrity, basic availability for DoD ISs handling information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short- term. The consequences of loss of integrity or availability can be tolerated or overcome witho ut significant impacts on mission effectiveness or operational readiness. CONFIDENTIALITY LEVELAll ISs will be assigned a confidentiality level based on the classification or sensitivity of the information processed. The confidentiality level is used to establish acceptable access factors and to determine the DODI 8500.2 IA Controls applicable to the information system. DOD has defined the following three confidentiality levels: 1.ClassifiedInformation designated top secret, secret or confidential in accordance with Executive Order 12356. 2.SensitiveInformation the loss, or unauthorized access to or modification of could adversely affect the national interest or conduct of Federal programs, or Privacy Act information. Includes, but is not limited to For Official Use Only (FOUO), Privacy data, unclassified controlled nuclear information, and unclassified technical data. 3.PublicInformation has been reviewed and approved for public release. Note. Mission Assurance Categories table is taken from Information Assurance. (2009) Applications (not an inclusive list): Anti-Spyware General –V4R1, 3 Dec 09, Application Services –V1R1, 17 Jan 06  Application Security Development V3R1, 10 May 10 CITRIX Xen App, V1R1, 23 Jul 09 ESX Server -V1R1, 22 Apr 08 Database –V8R1, 19 Sep 07 Desktop Applications General –V4R1, 3 Dec 09 Directory Services –V1R1, 24 Aug 07 ERP –V1R1, 7 Dec 06 ESM –V1R1, 5 Jun 06 HBSS STIG –V2R5, 22 Feb 10 IM –V1R2, 15 Feb 08 InTFOT-V1R1, 2 Oct 09 ISA Server 2006 OWA STIG, V1R1 5 Feb 10 McAfee Antivirus –V4R1 –3 Dec 09 Microsoft Exchange 2003 –V1R1, 6 Aug 09 MicrosoftIE6 –V4R1, 3 Dec 09 MicrosoftIE7 –V4R1, 3 Dec 09 MicrosoftIE8 –V1R1, 26 Apr 10 Microsoft Office 2003 –V4R1, 3 Dec 09 Microsoft Office 2007 –V4R1, 3 Dec 09 Mozilla Firefox –V4R1, 3 Dec 09 Symantec Antivirus –V4R1, 3 Dec 09 SunRay4 Thin Client –V1R1 –26 Mar 09 VTC STIG –V1R1 –08 Jan 08 Web Server –V6R1, 11 Dec 06. DISA STIG. (2012) THREAT IDENTIFICATION Data from the DoD shows a 20% rise in attacks against its information systems from 43,880 to 54,640 between 2007 to 2008. â€Å"Each of these penetrations involves a series of actions that do not differ substantially whether the intruder is acting on behalf of a terrorist group, a foreign government, a corporation, or is acting as individual. The severe intrusions into cyber systems involve penetrating system security, navigating and mapping the cyber system, targeting the nodes that control the system and contain the most critical data, and often, extracting the data.† (Wortzel, 2009) â€Å"In February 2011, the Deputy Secretary of Defense said that more than 100 foreign intelligence agencies have tried to breach DOD computer networks and that one was successful in breaching networks containing classified information.2 Also, the President of the United States has identified this threat as one of the most serious national security challenges facing the nation.† (Dâ€⠄¢Agostino, 2011, pp. 1) VULNERABILITY IDENTIFICATION THREAT CapabilitySecurity Test ResultsAudit CommentsSeverity SW BaselineNo SW baselineThe DA does not have a documented software inventory. A failure of this control does not lead to an immediate risk. IA Impact AssessmentConfiguration Management Plan (CMP) is not completeThe certification team through document review, that DA does not have formal procedures for IA impact assessment.Failure to assess changes for IA impact could lead to changes being made to the environment that unknowingly  introduce vulnerabilities increasing the risk of compromise. Ports, Protocols, and ServicesOpen ports protocols and services (PPS)The certification team determined through interviews and device configuration reviews, that DA does not perform regular review of their open PPS.Unnecessary open PPS increase the risk of systems being compromised. CONTROL ANALYSIS Incident Handling, IA Training and Certification, Information Assurance Vulnerability Management (IAVM), IA Program Management, Public Key Infrastructure (PKI), Certification and Accreditation, Federal Information Security Management Act (FISMA), Wireless Security, Army Web Risk Content Management, Personally Identifiable Information (PII), Portable Electronic Devices (PED), Minimal Information Assurance Technical Requirements, Classified Systems Management and Physical Security and Environmental Controls (Information Assurance, 2009) LIKELIHOOD DETERMINATION THREATSTerrorist (mail bomb)Denial of ServiceUnauthorized Access 1. VulnerabilityUncontrolled accessUpgrading Firmware onlineUnattended computer while logged on 2. MitigationControlled access e.g. common access card, buzzerUpgrade from trusted source onlyLog off computer before leaving area 3. Threat Probability615 Threat Probability: Highest number equals highest probability Note. Threat Matrix is taken from DA Anti-Terrorism Plan (2012). (CH 5 DOD O 2000.12H) IMPACT ANAYLYSIS Criticality Assessment Matrix AssetImportanceEffectRecoverabilityMission FunctionalityTotal Servers 1097834 Routers875626 Highest score = most critical Lowest score = least critical RISK DETERMINATION ValueNumeric Rating Major Deficiency9-10 Significant Deficiency7-8 Moderate Deficiency5-6 Minor Deficiency3-4 Negligible Deficiency1-2 CONTROL RECOMMENDATIONS Move the IA Program out of Technical lanes and into Command lanes, clearly define functions for a Command IA Program, define Concept for the Command IA Team (technical and non-technical), develop a reporting methodology for the Command IA Program, develop and provide a Command IA Training Program, develop a Command IA Program Management Course (CIAPMC), develop a Risk Management Model for Information Protection (IP): IA/CND, establish an â€Å"Acceptable Risk Criteria† for the Command IA Program and transform the Army’s IA Policy Formulation Process. (DAIG IA, 2009) SUMMARY Risk Vulnerability/ThreatRisk LevelRecommended ControlsAction Priority Hardware baseline inventory is incomplete. This could lead to the introduction of unauthorized into the network and also makes it difficult to maintain an effective life cycle managementLowComplete current hardware baseline and continue to identify and document future assets.Low Configuration management is not complete and this could lead to changes being made to the environment that unknowingly introduce vulnerabilities. This should be assessed by an IA team before introduced to the network.LowFinalize the configuration management process and implement a plan to assess IA impact of change to the system.Low Open ports, protocols and services. Changes made to the open PPS will lead to exploits and/or data compromise.MediumEnsure that the change management process relating to PPS are developed and enforced.Medium REFERENCES Bendel, B. (2006). An Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP). Retrieved from http://www.xlr8technologies.com/CMS/admin/Assets/lunarline/pdfs/lunarline_dia cap_process1.pdf D’Agostino, D. (2011). Defense Department Cyber Efforts: More Detailed Guidance needed to Ensure Military ServicesDevelop Appropriate Cyberspace Capabilities. Retrieved from http://www.gao.gov/new.items/d11421.pdf DoD CIO. (2012). Department of Defense Instruction, Number 8582.01. Security of Unclassified DoD Information on Non-DoD Information Systems. Retrieved from http://www.dtic.mil/whs/directives/corres/pdf/858201p.pdf Hudson, J. (2009). Department of the Army Information Security Program. Retrieved from http://www.apd.army.mil/pdffiles/r380_5.pdf Stonebumer, G., Goguen, A. Feringa, A. (2002). Risk Management Guide for Information Technology Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/sp800-30.pdf Information Assurance. (2009). Retrieved from www.apd.army.mil/pdffiles/r25_2.pdf DIACAP (n.d.) – DoD 8500. Retrieved from http://www.securestate.com/Federal/Certification%20and%20%20Accreditation/Pages/DIACAP-D0D8500.aspx DISA STIG. (2012). Retrieved from http://iase.disa.mil/stigs/a-z.html DoD Anti-Terrorism Program. (2012). Retrieved from http://www.dtic.mil/whs/directives/corres/pdf/200012p.pdf Wilson, C. (2005). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Retrieved from http://www.history.navy.mil/library/online/computerattack.htm Wortzel, L. (2009). Preventing Terrorist Attacks, Countering Cyber Intrusions, and Protecting Privacy in Cyberspace. Retrieved from

Saturday, October 26, 2019

What Constitutes Good Usage :: Teaching Writing Education Essays

What Constitutes Good Usage The idea of good usage can be explored in many facets. Many writers such as Dowst, Sale, Thomas and Albutt have enlightened me to their own views on what constitutes good or bad usage. The thought never occurred to me that I too am guilty in many ways of improper use of the English language, including grammar, word use, tense, structure, the list could go on. But then again what is termed good use by me may not be good to another. To me, my own personal use of language is acceptable and could probably stand some improvement. However, without learning grammar, syntax, diction, etc., I never would have been able to get to where I am now today. According to Audre Lorde in Sister Outsider: Essays and Speeches, the American norm is à ¬white, thin, male, young, heterosexual, Christian and financially secure.à ® This seems to be the epitome of one who has à ¬good usageà ® of the English language. I donà ­t see it that way. Good usage begins early in life and is a never-ending process. The population of today is becoming more diverse as ethnic groupsà ­ population figures present and project into the near future. According to Cyndee Miller in Advertising Age, the Asian American population is the fastest growing ethnic group in the United States and is expected to reach around 15 million by early next century. To a good portion of this growing segment, English is not their first language. In fact, translating the English language into other languages loses a lot of à ¬formà ® rather than substance. Many languages do not have the same grammatical or structural form which makes it extremely difficult translating either way. So how can society judge what is good or bad use? Usage of English language has its purpose, to convey meaning and understanding to a certain audience. But how does that affect one who does not speak or understand the language? People still communicate in their own Native tongues and have so for many years. With the globalization of many companies today, communication is very critical. Without effective communication, markets of today would be limited as there would be no exports or imports, etc. The audience that receives the message communicated via English language plays a key factor in determining its à ¬properà ® usage. For example, when I go back and visit my relatives, ità ­s not important to use the à ¬officialà ® style for particular word use.

Thursday, October 24, 2019

One Laptop Per Child Essay

1.Why are Microsoft, Intel, and other leading for profit companies interested in low-cost computers for the developing world? In 2005, Nicholas Negroponte, the founder of MIT’s Media Labs, announced the One Laptop per Child (OLPC) program at the World Economic Forum. The concept was simple and appealing. Innovate a $100 laptop and distribute it to children in the developing world. No one can argue the power of getting kids access to computers/internet, and hence, access to a virtually limitless store of information, connectivity to the world and educational software. And for a technology optimist like Negroponte, the payoffs were obvious. But as the OLPC program has found out over the years, there is more to the success of Information and Communications Technologies (ICTs) in Education, than just handing out computers to kids, and expect it to works its magic on its own. To begin with, the premises and approach of OLPC program as articulated by Negroponte are fundamentally flawed. OLPC stipulates that laptops be owned by children over the age of six rather than by schools. Efforts to reform curricula and assessment are viewed by the program as too slow or expensive, and teacher training as of limited value due to teacher absenteeism and incompetence, so laptop implementation must proceed without them. The program also believes that in the end, â€Å"the students will teach themselves on how to use the laptop. They’ll teach one another, and we have confidence in the kids’ ability to learn†. The other flaw in this program is that the poorest countries targeted by OLPC cannot afford laptop computers for all their children and would be better off building schools, training teachers, developing curricula, providing books and subsidizing attendance. No one ever understood Nicholas Negroponte’s position when it comes to the $100 Laptop/OLPC/XO. While the idea behind creating a super cheap, super durable useful computer for children in developing nations is good, Negroponte has always approached the idea as one where only he should be allowed to see that vision through. When other companies decided it might be a good idea and wanted to target that market themselves, Negroponte flipped out and started attacking them for trying to undermine his project. In order to explore One Laptop Per Child (OLPC) and its mission to improve education in developing countries, it is necessary to first understand the nature of living in these countries. The UN’s Universal Declaration of Human Rights establishes health, food, and education as basic human rights, but people living in developing countries are deprived of these seemingly simple and obvious necessities. Founder of OLPC and MIT professor Nicholas Negroponte firmly believes that education is the solution and that children are the world’s most precious natural resource. Combining these thoughts, he founded OLPC in 2005 as a response to the educational needs of children in developing countries. At the 2005 World Economic Forum, he presented that a $100 laptop in the hands of every child would empower them to learn from and to teach each other. As CTO of OLPC Mary Lou Jepsen said, the â€Å"laptop is a vehicle to transform education around the world.† In order to bring this idea to reality, OLPC set out to design a laptop that would fit in the context of the developing world. 2.Do you agree with Negroponte’s decision to partner with Microsoft? Yes, I think it is a good initiative because now that the XO laptop will be available in both Linux and Windows varieties and we can view it as an opportunity for OLPC to expand in a couple of ways. Moreover, now it will have a broader acceptance in the community and the other is to have more software and software developers available. The OLPC’s philosophy of openness is behind its decision to allow Microsoft software on the machines, but it would be hard for OLPC to say it was ‘open’ and then be closed to Microsoft. According to Negroponte, the XP announcement is the latest development in a long-running collaboration between the project and Microsoft. Microsoft was also interested in this project and was working to see if it could get Windows XP up and running on the OLPC devices. To make it work, Microsoft needed to get the operating system to boot from an SD card and to create drivers to work with OLPC’s unique features, such as its touchpad and e-book reader mode. Negroponte said the ability to run Windows is a must-have in some countries. For example, he said, Uruguay made it a requirement in its recent solicitation. Even in other countries where Windows is not required, Negroponte said compatibility with the Microsoft operating system still helps give the laptop credibility. Meanwhile, Negroponte stressed that he is not giving up on Linux and ultimately aims to deliver machines that can boot into either operating system. There’s no premeditated plan that one is going to dominate over the other because both is a very powerful option. Though, there is obviously cost issues, which is necessarily higher for Windows, because it requires more hardware than Linux. Language support is possible for any community in Linux, but in Windows it depends on the good will of Microsoft, or rather the bottom line market analysis results that Microsoft works from. But according to Negroponte, he was mainly concerned with putting as many laptops as possible in children’s hands. 3.Assess the thinking behind the â€Å"give one, get one† promotion. Do you think this is a good marketing tactic? Yes, it is a good marketing tactics but it also brought about some drawbacks with it which is inevitable. Since, OLPC initially stated that no consumer version of the XO laptop was planned. The project, however, later established a website to accept direct donations and ran a â€Å"Give 1 Get 1† (G1G1) offer starting on November 12, 2007. The offer was initially scheduled to run for only two weeks, but was extended until December 31, 2007 to meet demand. With a donation of $399 to the OLPC â€Å"Give 1 Get 1† program, donors received an XO-1 laptop of their own and OLPC sent another on their behalf to a child in a developing country. Shipments of â€Å"Get 1† laptops sent to donors were restricted to addresses within the United States, its territories, and Canada. Some 83,500 people participated in the program. Delivery of all of the G1G1 laptops was completed by April 19, 2008. Delays were blamed on order fulfillment and shipment issues both within OLPC and with the outside contractors hired to manage those aspects of the G1G1 program. According to Negroponte, the Give One, Get One project was both successful and not. It was a great success because there are 162,000 XO laptops gaining support for the project in the U.S. However, he still would like to see more sold. In order to make the project viable, Negroponte says they will need to sell about three million devices. The program also aims to lower the production cost of the laptop to the original target of $100. The OLPC program has the correct intentions, but a flawed philosophy and approach. Just deploying technology and expecting to work its magic is not the way to go. For the diffusion of the technology, it is crucial that we adopt to the local practices and constraints.

Wednesday, October 23, 2019

Hyundai Card

Definition of ‘Strategic’ Involved or being a part of consciously developed future planning by using design to achieve the organisation’s aim through visual, functional and conceptual integration of design to create its appropriate external and internal identities, products and service offerings and missions. HyundaiCard (HC), a Korean credit card company Even though HC was late for coming into credit card industries, they made a remarkable growth by design management integrating brand identity. Visual integration by design policy According to Borja de Mozota (2003), strong brand identity can be achieved by visual integration.As figure 1 below show, HC redesigned their logo and typeface based on the shape, ratio and angle of an actual credit card, perfectly reflecting HC’s identity (Total Active Media, 2004). With strong design policy supervised by ‘HC Design Lab’, the font is applied to all visual channels in the coherent manner for visual int egration (Total Active Media, 2004). This reflects philosophy and culture of HC to not only customers but also employees to make strong corporate identity. Figure 1: Typeface ‘You and I’ (Source: Total Active Media, online, 2004) 1 DM5554 Strategic Design Management Functional Integration by card designConsumers are seeking to express the image of themselves through purchasing a product or service that meets their self-expression and assertion of individuality (Cooper & Press, 1995). Similarly, they designed an integrated card hierarchy system according to user’s different needs. The credit cards are designed using alphabet, number and colour with their font (Song and Bang, 2006). Moreover, they applied different alphabets to card for different benefits (Song and Bang, 2006). For example, the ‘M’ card reflects ‘Multiple benefits’. Number system shows level of services (e. g. ‘M2’ contains more services than ‘M’, and ‘M3’ than ‘M2’).With colour, they defined premium level of cards (see figure 2). Regarding to card design, customers can understand this concept easily and feel credit cards desirable. By applying design strategy to convey consumers’ lifestyle into product and service, HC successfully fulfills consumers’ needs. Figure 2: Credit Card Hierarchy (Source: Unitas Brand, 2009) Conceptual integration by CSR Design can play important role in achieving CSR for company’s long-term strategic advantage (Koo and Cooper, 2011). As figure 3 below show, HC has been taking various activities for CSR by giving their design talent.For example, HC designed the ‘dreamlibrary' for children who have got cancer and leukemia, bus stations for public and ‘Super Concert’ for cultural & arts dispersion (Unitas Brand, 2009). These CSR activities create positive conceptual integration of brand images. 2 DM5554 Strategic Design Management Figu re 3: CSR activities (Source: Hyundaicardcapital. com, online, 2011) Conclusion Hyundai Card conducts design resources effectively, developing its external and internal identity, creating its product and service based on consumers’ need. It also enhance positive brand image by contributing to society.

Tuesday, October 22, 2019

No Medical Degree No Problem for These Five Healthcare Jobs

No Medical Degree No Problem for These Five Healthcare Jobs Healthcare is one of the world’s fastest growing industries, promising everything from high pay to job security to workers entering the field. According to statistics from the U.S. Bureau of Labor Statistics (BLS), total employment in occupations related to healthcare is expected to skyrocket by 11 percent - a total of 15.6 million jobs - in the decade between 2012 and 2022. Let’s countdown five of the most promising healthcare jobs that don’t require a medical degree. 5. Pharmacy TechniciansMinimal educational requirements - a high school diploma or its equivalent - and a growth rate of 20 percent over a 10-year period earn pharmacy technicians a spot on this list.Working alongside pharmacists in pharmacies, grocery stores, drug stores and hospitals, pharmacy technicians help pharmacists with the dispensation of prescription medications.Most pharmacy technicians learn through on-the-job training, although there are some secondary education programs. Some sta tes require that pharmacy techs complete a training program accredited by the American Society of Health System Pharmacists.4. Dispensing OpticiansWith a projected growth rate of 23 percent between 2012 and 2022, the number of jobs for workers in this field is predicted to rise by nearly 16,000 during that same period of time.Dispensing opticians work in stores that sell visual aids, including glasses, contact lenses and other optical goods. Based on prescriptions from optometrists and ophthalmologists, dispensing opticians are responsible for fitting eyeglasses and contact lenses, as well as assisting customers in deciding on the right products.The median annual salary for dispensing opticians is just over $22,300, although the top 10 percent may earn nearly $53,000. In addition to a high school diploma, on-the-job training is usually sufficient to obtain a position as a dispensing optician.3. Dental AssistantsA projected growth rate of 25 percent between 2012 and 2022 earns denta l assistants a spot on the list of fastest growing healthcare careers.Depending on where they work, dental assistants may be responsible for a wide range of tasks - from scheduling appointments to taking X-rays to providing patient care.While there’s no single path to becoming a dental assistant, some states do require graduation from an accredited program as well as the passing of a state exam. Additionally, many community colleges offer year-long certificate programs, as well as two-year programs which convey an associate’s degree. The typical dental assistant school curriculum include a mix of classroom, laboratory and clinical work.Dental assistants earn an average salary of $34,500, although top earners may bring home nearly $50,000.2. Diagnostic Medical Sonographers and Cardiovascular Technologists and Technicians, Including Vascular TechnologistsWith a job outlook projected at 39 percent, these imaging experts are expected to be in great demand in the coming ye ars.Largely employed in hospital settings, diagnostic medical sonographers and cardiovascular technologists and technicians are trained in the use of special equipment in order to create images and conduct tests used by physicians to diagnose medical conditions as well as to aid during surgical procedures.With an average pay of $60,350 per year, these professionals do require some formal education and qualifications, such as an associate’s degree and postsecondary certificate. Some diagnostic medical sonographers and cardiovascular technologists and technicians choose to pursue bachelor’s degree programs in sonography and in cardiovascular and vascular technology.1. Home Health AidesA projected growth rate of a staggering 48 percent between 2012 and 2022 earns home health aides the top spot on this list. Requiring less than a high school diploma and a short period of on-the-job training, home health aides can expect to enjoy unprecedented job security in the years ahea d.Working in a variety of settings, home health aides help people - from seniors to the disabled or cognitively impaired - who require assistance with basic daily activities.As more and more seniors make the choice to age in place, home health aides will become an increasingly vital part of the healthcare system. And while the current median salary is just under $21,000, the increased need for these workers is expected to drive pay upward.While doctors may be the first thing that comes to mind when you think of healthcare professions, there are plenty of other career paths for aspiring members of the healthcare industry. Each of these five professions offers extraordinary job security, along with educational and training requirements far less strenuous than the ones imposed upon doctors. The result? Unprecedented opportunities for people looking to get a foot in the door of the in-demand healthcare industry.

Monday, October 21, 2019

Muddy water blues essays

Muddy water blues essays The blues, a form of music originated by black Americans in the South, has been used throughout its history to express a lifestyle that spoke for many lower class American citizens who usually suffer from unfortunate circumstances. One man that sticks out in the history of the blues and who has had an influence like no other is McKinley Morganfield or more popularly known, Muddy Waters. Waters was born on April 4, 1915 to parents who were sharecroppers on a Southern plantation. When he was three his mother passed away and he was sent off to live with his grandmother, who was also a plantation worker. Waters grew up living a life of poverty in the Mississippi Delta region. Due to the unfortunate circumstances of being poor and having to rely on only his grandmother for support, Waters was compelled to work at a young age. When Waters was 13 and working as a farmhand he began to develop an interest in the regions music and storytelling traditions. By the time he was 14 he had already taught himself how to play the harmonica, which allowed for him to begin to express himself. When he was 17 he had learned how to play the guitar, which gave him and opportunity to combine his musical talents along with his passion While still working on plantations, Muddy Waters broke off from emulating his musical influences and began to develop his own style. During this period he began to play gigs at local joints, which allowed for him to be noticed. After he recorded his first album for the United States Library of Congress archives, Waters moved to Chicago, where he turned to playing electrically instead of acoustically due to the loudness of the nightclubs. This switch gave his music a new sound, which in turn changed his style from the traditional blues he was influenced by into a style of his own known as the urban electric sound of Chicago ...