Saturday, May 23, 2020

Chinese Empress Si Ling-Chi Discovered How to Make Silk

About 2700-2640 B.C.E., the Chinese began making silk. According to Chinese tradition, the part-legendary emperor, Huang Di (alternately Wu-di or Huang Ti) invented the methods of raising silkworms and spinning silk thread. Huang Di, the Yellow Emperor, is also credited as the founder of the Chinese nation, creator of humanity, founder of religious Taoism, creator of writing, and inventor of the compass and the pottery wheel -- all foundations of culture in ancient China. The same tradition credits not Huang Di, but his wife Si Ling-Chi (also known as Xilingshi or Lei-tzu), with discovering silk-making itself, and also the weaving of silk thread into fabric. One legend claims that Xilingshi was in her garden when she picked some cocoons from a mulberry tree and accidentally dropped one into her hot tea. When she pulled it out, she found it unwound into one long filament. Then her husband built on this discovery, and developed methods for domesticating the silkworm and producing silk thread from the filaments -- processes that the Chinese were able to keep secret from the rest of the world for more than 2,000 years, creating a monopoly on silk fabric production. This monopoly led to a lucrative trade in silk fabric. The Silk Road is so named because it was the trading route from China to Rome, where silk cloth was one of the key trade items. Breaking the Silk Monopoly But another woman helped to break the silk monopoly. About 400 C.E., another Chinese princess, on her way to be married to a prince in India, is said to have smuggled some mulberry seeds and silkworm eggs in her headdress, allowing silk production in her new homeland. She wanted, the legend says, to have silk fabric easily available in her new land. It was then only a few more centuries until the secrets had been revealed to Byzantium, and in another century, silk production began in France, Spain, and Italy. In another legend, told by Procopius, monks smuggled Chinese silkworms to the Roman Empire. This broke the Chinese monopoly on silk production. Lady of the Silkworm For her discovery of the silk-making process, the earlier empress is known as  Xilingshi or  Si Ling-chi, or Lady of the Silkworm, and is often identified as a goddess of silk-making. The Facts The silkworm is a native to northern China.  It is the larva, or caterpillar, stage of a fuzzy moth (Bombyx). These caterpillars feed on mulberry leaves.  In spinning a cocoon to encase itself for its transformation, the silkworm exudes a thread from its mouth and winds this around its body.  Some of these cocoons are preserved by the silk growers to produce new eggs and new larva and thus more cocoons.  Most are boiled.  The process of boiling loosens the thread and kills the silkworm/moth.  The silk farmer unwinds the thread, often in a single very long piece of about 300 to about 800 meters or yards, and winds it onto a spool.  Then the silk thread is woven into a fabric, a warm and soft cloth.  The cloth takes dyes of many colors including bright hues.  The cloth is often woven with two or more threads twisted together for elasticity and strength. Archaeologists suggest that the Chinese were making silk cloth in the Longshan period, 3500 -  2000 BCE.

Monday, May 18, 2020

Art, Literature, and Music in 20th Century Free Essay Example, 750 words

Art, Literature, and Music in 20th Century Question I feel that the best example of a poet’s response to the devastation of war comes from Owen (1921) who wrote a poem titled Dulce et Decorum Est. The poem shows the horror of war and how useless a death can be if it is based on a lie that death which comes by fighting for one’s homeland is sweet. The First World War was death caused by mechanised warfare where machines and the number of bullets fired became more important than anything else. Owen’s poem is written from the viewpoint of a man who was involved in real battle and saw his friends die around him from gas warfare. The poem begins with a group of soldiers walking away from the battlefield who are attacked with chlorine gas. As try to quickly put on their gas masks, one of them is not quick enough and the poet sees him die a very horrible death (Owen, 1921). Owen writes blank verse with loose iambic pentameter which gives his poem the feel of being disjointed. We will write a custom essay sample on Art, Literature, and Music in 20th Century or any topic specifically for you Only $17.96 $11.86/pageorder now This is most evident in the ending of the poem where he describes the death of the soldier to the reader using imagery such as lungs filled with blood and lifeless bodies. In effect, Owen seems to suggest that the idea of dying for one’s country is nothing more than a lie told to children who seek glory in their lives. Question 2 Music was considered to be an essential part of civilization for hundreds of years and the music of various countries added to the cultural values held in a country. In America, music was also a part of the national economy as well as culture but at the beginning of the 20th century, record manufacturers often refused to acknowledge the music created by African Americans and ignored them as customers. Music was expected to represent racial characteristics and thus many people considered black music inferior to white music (Mlinarcik, 2004). This was racial inequality to an extreme since traditionally artists and artisans are supposed to be more accepting of differences than any other segment of society. However, despite all the negativity, black music producers and musicians consistently produced excellent output in various forms of music to show that they were indeed as capable as their white counterparts. This musical output helped in breaking social barriers and improving cultural education and thus helped the process of racial equality between blacks and whites. Jazz and blues remained popular amongst a wide cross-section of the population and artists such as Ethel Waters and Isabelle Washington showed how art has no boundaries of race or color (Mlinarcik, 2004). Undoubtedly, they and other artists like them remain the largely ‘unsung’ heroes for the struggle which led to eventual racial equality in the United States. Question 3 While the world may clearly remember individual writers such as Baldwin and Wright for their writings concerning the plight of a people who have been more or less sidelined by their nation, the names of female writers such as Gwendolyn Brooks often become obscure. Brooks was the first African American writer to win the Pulitzer Prize and worked hard for gender and race issues in postwar America during the civil rights era. Other African American female writers include Nikki Giovanni and Sonia Sanchez who also worked with civil rights groups to bring about a change to society (Wikipedia, 2007). In other arts, Marian Anderson who was born in Philadelphia born had to achieve recognition and fame in Europe before she was accepted as an artist in America. In 1939, at her first major American concert the Daughters of the American Revolution protested and did not allow her to perform in the nation’s capital at Constitution Hall. Seeing this reaction, Eleanor Roosevelt helped her perform at the Lincoln Memorial and Mrs. Roosevelt resigned from her membership with the Daughters of the American Revolution. The NAACP awarded the Spingran Medal to Marian Anderson in recognition of her achievements and her efforts in improving the race issues faced by other African American artists (LOC, 2007). Word Count: 731 Works Cited LOC (Library of Congress). 2007, ‘African American Odyssey’, LOC. gov, [Online] Available at: http: //memory. loc. gov/ammem/aaohtml/exhibit/aopart7b. html Mlinarcik, J. 2004, ‘The Great War and Modern America’, GMU. edu, [Online] Available at: http: //chnm. gmu. edu/courses/er/fall2004/hist120/archives/The%20Great%20War%20and%20Modern%20America. php Owen, W. 1921, ‘Dulce et Decorum Est’, Wikisource. org, [Online] Available at: http: //en. wikisource. org/wiki/Dulce_et_Decorum_est Wikipedia, 2007, ‘African American literature’, Wikipedia. org, [Online] Available at: http: //en. wikipedia. org/wiki/African_American_literature

Monday, May 11, 2020

Chronic Kidney Disease Diagnosis, Treatment, And Lifestyle

Chronic Kidney Disease: Diagnosis, Treatment, and Lifestyle Recommendations Janelle Giggey Nur6531 Walden University August 2, 2015 Chronic kidney disease (CKD) is a condition characterized by a gradual loss of kidney function over time (kidney.org, 2015). Renal failure is a complex and challenging health issue that demands the involvement of both specialists and primary care providers (Buttaro, Trybulski, Polgar, Bailey, Sandberg-Cook, 2013). In this paper I will discuss what chronic kidney disease is, how it is diagnosed, and what treatment options there are, as well as how potential patient factors can impact diagnosis and treatment of chronic kidney disease. Diagnosis Chronic kidney disease can start slowly and worsen over time. Patients with a history of diabetes and hypertension are especially susceptible. According to the CDC, approximately 1 of 3 adults with diabetes and 1 of 5 adults with high blood pressure has chronic kidney disease. In addition to diabetes and high blood pressure, other conditions that increase the risk of kidney disease include heart disease, obesity, older age, high cholesterol, and a family history of chronic kidney disease (cdc.gov, 2015). The clinical presentation of CKD is often subtle and can go unnoticed with physical symptoms alone in those with mild CKD. Buttaro et. al., (2013) explains that symptoms are uncommon in those with a GFR above 35%. Once GFR falls below 35%, a variety of metabolic, psychiatric, hematologic,Show MoreRelatedRisk For Developing Kidney Disease1591 Words   |  7 Pagescome to the conclusion that she is at increased risk for developing kidney disease. C.N is a 32 years-old African American female with a current medical diagnosis of Hydronephrosis, UTI, and Left Ureteral Constriction. Unfortunately she also has an extensive family history of kidney disease. Healthy People 2020 points out that genetic determinants have a large influence on the development and progression of Chronic Kidney Disease (CKD) and that although it is not possible to alter a person’s biologyRead MoreDiabetes Mellitus Type 2 Diabetes1628 Words   |  7 Pagesmellitus type 2, also know as type 2 Diabetes or noninsulin dependent diabetes, is a disease that effects the body systemically. Type 2 diabetes is a disorder in which cells become resistant to insulin and can no longer bind it properly to reduce blood sugar. The result of this is elevated glucose levels in the circulating blood that leads to endothelial injury in all regions of the body. Primary damages occur in the kidneys, cardiovascular, and digestive systems. According to â€Å"Annual Number of New CasesRead MoreChronic Kidney Disease : Diabetes And High Blood Pressure938 Words   |  4 Pages1. Disease Description: Chronic Kidney Disease affects more than 10% of adults in the United States, and more than 20 million individuals may have this illness (National Chronic Kidney Disease Fact Sheet, 2014). Moreover, there are 26 million Americans beyond 20 years old with this ailment, which incorporates more than 940,000 adults in Michigan (Kidney Disease, 2105). Notwithstanding this, a combined populace of more than 600 million individuals in developing countries that can’t manage the costRead MoreHypertension : Symptoms And Symptoms Of Hypertension1141 Words   |  5 Pagesadults age 60, who have no chronic kidney disease or diabetes, is a goal blood pressure below 150/90. For all other adults, including those with chronic kidney disease and diabetes, the goal blood pressure is less than 140/90. Hypertension is exceedingly common in the United States and can lead to heart attack, stroke, kidney disease, and eye disease. Given the importance of this condition, it is critical for patients to recognize its causes, diagnosis, and treatment. By the end of this articleRead MoreInfluence Of Risk Factors1538 Words   |  7 Pageson reducing NCDs. In many countries, the incidence and prevalence of chronic and NCDs has risen and this trend is expected to continue upward. The reason for this increase is the increased risk of these diseases in recent years. Lifestyle changes have increased the prevalence of some important risk factors - such as smoking, lack of physical activity, inappropriate diet, number of people with hypertension, cardiovascular diseases, and diabetes, which is a warning sign for increased mortalities andRead MoreType 2 Diabetes : A Growing Epidemic1775 Words   |  8 Pagestypes of chronic diseases can have major tolls on individuals and their families. According to Merriam Webster, chronic is described as â€Å"Continuing or occurring again and again for a long time†. For many Americans chronic and acute diseases are a reality. As stated by Medicine.net, an acute disease is â€Å"Of abrupt onset, about a disease. Acute often also connotes an illness that is of short duration, rapidly progressive, and in need of urgent care.† Chronic disease is defined as â€Å"A disease that persistsRead MoreA Brief Note On Diabetes And Diabetes Mellitus1428 Words   |  6 Pages 1. Problems, Issues or Disease Progress of Diabetes Mellitus Diabetes mellitus refers to a chronic human health condition characterized by prolonged high sugar level in the blood. A group of metabolic disorders like, seizures, lethargy, and jaundice among others, which occur when chemical reactions abnormally alter the normalcy of the body’s metabolic processes, causes this condition. Diabetes occurs mainly because of two issues; due to inadequate production of insulin by the pancreas, and dueRead MoreMaine Nephrology Associates, An 11 Physician Specialty Practice Essay1937 Words   |  8 PagesI am pleased to share with you my mock strategic plan for Maine Nephrology Associates, an 11 physician specialty practice that specializes in the treatment of kidney disease and hypertension. With contributions from the National Kidney Foundation, patients, providers and staff, Maine Nephrology was given the opportunity to influence the direction of the practice over the next several years. This strategic plan represents a true consensus of the stakeholders of Maine Nephrology Associates. In theRead MoreSymptoms and Treatment of Diabetes: A Case Study1674 Words   |  7 Pagesaffects glucose tolerance through the bodys inability to use its insulin or lack thereof. Diabetes affects the body in other ways. It damages the tiny blood vessels in the kidneys, eyes, or nervous s ystem. (Jacoby, Youngson, Marshall Cavendish Corporation.,  2005, p.  116) Damage in the vessels of the kidneys leads to kidney failure. Damage in the vessels of the nervous system lead to poor circulation and eventually, black appendages. Black appendages have little to no blood flow and must be amputatedRead MoreThe Problem Of Chronic Kidney Disease1490 Words   |  6 Pagesthe onslaught of chronic diseases that accompany the aging process. To combat this impending health care shift, health care is being transformed from the traditional hospital setting to more community based and long term, health care treatments/solutions. One of these diseases that plague older adults and impose a burden for the health care system is chronic kidney failure. Headley (2014), explains that chronic kidney disease (CKD) involves a progressive, irreversible loss of kidney function (p. 1107)

Wednesday, May 6, 2020

How Does Humor Use Humor - 1186 Words

For as long as I have been in school, there has been a negative stigma around laughing and making jokes in the classroom. As a potential psychology major, I am quite fascinated with why our brains work the way they do, and how they grow, develop, and learn. That is why I was so intrigued when research came out claiming that appropriate humor can be used as a tool in the classroom by alleviating anxiety, stress, and helping relate the content by using funny, real world examples. When an instructor successfully uses humor, the learning environment that is created can be a catalyst for success. Humor can alleviate anxiety, especially in second language classrooms. â€Å"First, Young (1991) argues that when students are asked to deliver their thoughts or idea in a foreign language in which they have limited competence, their performance can be very threatening to their self-image† (Deb 2). If you have taken a foreign language class, in which speaking in front of the class is required, you may have experienced the anxiety that comes along. â€Å"Will I slur my words, pronounce something wrong, or choke under the pressure and not say anything at all?† Are all thoughts that come into many second-language learners’ minds. When humor is utilized correctly and gets a positive reaction from students, such as smiling and laughing, it creates a light, non judgmental learning environment. In such environment, mistakes can be taken for what they are, instead of the person speaking thinking thatShow MoreRelatedGender, Gender And Gender Stereotypes1582 Words   |  7 Pagesstereotypes. These types of jokes seem to take center stage at any comedy performance or routine, and the audience loves it. Gender in association with humor brings up a great deal of questions. Do males and females see humor differently? Are there any similarities in the way the sexes view humor? And is there any truth to the thought that humans enjoy crass humor more than other types of jokes? These questions have been popping up in the scientific world, and researchers are trying to answer them. Even thoughRead MoreHumor And How Does It Affect Brand Imaging, Interpersonal Communication, And Overall Perceptions Of A Image Essay1221 Words   |  5 PagesSection One: Humor is an interesting and diverse topic, especially when applied to the subject of persuasion. How it affects brand imaging, interpersonal communication, and overall perceptions of persuaders. Humor is unique in the sense that it is highly subjective. This subjectivity makes it a very tricky tactic to use in either advertisements or interpersonal persuasion. Humor has a very fluid definition that can vary by culture, gender, age, and religion. This essay will look into the historyRead MoreThe Superiority Theory Of Humor917 Words   |  4 PagesThere are many ways that people use humor. It has been used both in positive and negative ways. The negative, or more aggressive, view of humor is â€Å"evident in ancient writings† and â€Å"in the merciless teasing that children inflict on one another.†, However, in modern times, humor is now commonly seen as a positive aspect and that the laughter that arises is the â€Å"expression [an] incongruity.† Because of thes e two conflicting view of humor, there have been multiple theories proposed to explain it. ThereRead MoreAnalysis Of Cyrano De Bergerac By Edmond Rostand1179 Words   |  5 PagesEdmond Rostand s Cyrano de Bergerac is considered to be a Chivalric Romance but it also contains humor throughout. The play uses comedy throughout all of the acts for a variety of reasons. Cyrano who is the main character of the play is also the largest comic influence. With Cyrano, we see him develop through comedy and learn more about his character with it, and it is not only used by Cyrano but also many other characters. Comedy is used in a variety of ways throughout Cyrano de Bergerac such asRead MoreThe Use of Humor in Richard Iii by Shakespeare1327 Words   |  6 PagesThe Use of Humor in Richard III There is no doubt that Shakespeare was the author of great pieces of literature during an interesting time period. Given the circumstances, he was indeed mastering his craft during a very tumultuous juncture in British history. When one reads Richard III, they don’t necessarily have to know a great deal about the War of Roses to understand that there is some serious strife going on. However, if the reader takes some time to understand this fascinating string ofRead MoreHumor And Its Effects On American Society946 Words   |  4 Pages Humor can be regarded as an enjoyable experience of a mismatch between what people expect and what people experience (Stambor 1). Charlie Chaplin once said, â€Å"Laughter is the tonic, the relief, the surcease for pain.† Is laughter a remedy for one s emotional well-being when encountering devastations and social injustice? The epitome test of this would be living in concentration camps where millions of people were enslaved during the Second World War. How can they survive mental and physical agonyRead MoreHow Humor Heals647 Words   |  3 PagesHow humor heals Introduction grabber: Charlie Chaplin once said, â€Å"To truly laugh, you must be able to take your pain and play with it.† credibility: Through lots of research and experience I have came up with this conclusion, and when I did a research on this, I discover it is true. why: Have you ever need to cheer up, combat fear, feel more comfortable, relax, reduces pain or reduce stress? Well I have the solution. central idea: Laughter can make a person feel better, it’s truly the best medicineRead MoreThe Lone Ranger and Tonto Fistfight in Heaven, by Sherman Alexie1475 Words   |  6 PagesHeaven, author Sherman Alexie uses humor to reflect the life on the Spokane Reservation. In â€Å"A Drug Called Tradition,† the story starts with a joke by having Thomas sit down inside a refrigerator in response to Junior’s comment as to why the refrigerator is empty. The Indians are having a party hosted by Thomas, who gets a lot of money from a corporation for leasing some of his land. Alexie’s three second selves, Victor, Junior, and Thomas, later go to the Benjamin Lake and use the drug that Victor bringsRead MoreNeat People Vs Sloppy People By Suzanne Britt And Batting Clean Up And Striking Out1361 Words   |  6 Pageshumorist and reporter, David Barry take a whole new look on the dreaded aspects of cleaning. Britt and Barry chose to utilize humor in order to convey to the audience that everyone has a different way of living. Britt expresses the different lifestyles of sloppy people to the notorious neat people. Oppositely, Barry compares gender roles in order to see the differences between how males and females view the definition of â€Å"clean†. Britt and Barry strengthen their humorous tone by employing exaggerationRead MoreAmusement in â€Å"The Ransom of Red Chief†.600 Words   |  3 PagesRansom of Red Chief†. Dictionary.com defines humor as a comic and absurd quality causing amusement. O.Henry adds amusement in the short historical fiction story, â€Å"The Ransom of Red Chief†. O.Henry adds humor to his story through the use of literary devices. O.Henry uses allusion, word play, and irony to create levity in his story. All of these create levity but one that especially creates levity is allusion. First, Allusion is good for creating humor because by using prior knowledge it helps to

Berlin Conference Free Essays

For three long months, 14 countries from Western Europe and the United States attended the Berlin Conference. This important conference is also known as Congo Conference or Berlin West Africa Conference. The countries that attended include Austria-Hungary, Belgium, Denmark, France, Germany, Great Britain, Italy, Netherlands, Portugal, Russia, Spain, Sweden-Norway, Turkey, and US. We will write a custom essay sample on Berlin Conference or any similar topic only for you Order Now Interesting enough, not a single country of Africa attended even though the conference was entirely about the division of land on the African continent. The major players at this conference were the great and mighty countries of France, Germany, Great Britain, and Portugal. This conference that started on November 15, 1884 and ended on February 26, 1885 was called for by Portugal and organized by Otto von Bismarck, chancellor of Germany and minister of Prussia. The original goal of this lengthy conference was to agree that the Congo River and Niger River mouths and basins are neutral and are open to free trade. Before the conference, 80% of Africa remained to be traditionally and locally ruled. The Europeans only controlled the coastal areas. This all changed because King Leopold II wanted glory for Portugal and organized a secret mission to form Congo Free State. King Leopold and other countries wanted to take advantage of its gold, timber, land, timber, and labor power. When France discovered King Leopold II’s scheme, she got mad which eventually resulted in this conference. The final result of this conference culminated in the General Act of BerlinConference. This document prohibited international slave trade, made Congo Free State a private property of Congo Society (although Leopold still uses it as his private property), permit free trade in Congo Basin and Lake Niassa, and allow free ship traffic on the Niger and Congo river. A new map of the African continent was created. It divided the vast continent into 50 geometric countries with no regards for cultural and linguistic boundaries of the native Africans. The only countries remaining free are Ethiopia and Liberia (US’s country to return slaves to their â€Å"homeland†. All in all, the Berlin Conference caused Africans to lose their autonomy and ushered in heightened colonial activity. How to cite Berlin Conference, Essay examples

Remote Control Software Essay Example For Students

Remote Control Software Essay Remote Control Software Used in a Local Area NetworkA Project Submitted to Fulfill the Requirements of CIS 5376 LAN IAt Tarleton State University System Center Central TexasRemote control software packages consist of tools for network administrators, helpdesk support personnel and end users. These packages let one PC (guest) connect to and remotely control another PC (host). Remote control software installs on both guest and host PCs. Guests can remotely control a hosts desktop, run programs, transfer files and redirect printing. For helpdesk staffers, we evaluated the robustness of the remote control features and the ability to chat with end users. For network administrators, who use remote control software to connect with NT servers and to troubleshoot problems without visiting the server room, we paid particularly close attention to security features. We compared CrossTec Corp.s NetOp Remote Control, Funk Softwares Proxy 3.02, LapLink.coms LapLink 2000, Stac Softwares ReachOut Ent erprise 8.42, Symantec Corp.s pcAnywhere and Netopias Timbuktu Pro 32. Our choice for the best remote control software went to NetOp for its ease of installation and full-featured configuration tools. Although the other products were also easy to install and configure, NetOps configuration wizards facilitated communication links, provided minimum levels of security, and established full-featured remote control sessions with a double click of the mouse. In addition, NetOp provided the most control over hosts and guests in a networked environment. pcAnywhere with LapLink provided the highest number of communication links between two PCs ranging from direct ports to Internet. LapLink 2000 won top honors in file transfer and NetOp edged out the competition in transferring screen displays and keyboard/ mouse controls. Funks Proxy had the best network installation routine. Cross Tec Corps NetOp for Windows version 6.58Funk Softwares Proxy version 3.0212Stac Softwares ReachOut Enterprise v ersion 8.4218Symantecs PcAnywhere version 1021Remote Control Software Used in a Local Area NetworkRemote control software can solve many of the problems that an administrator or user can encounter on a local area network. Using a remote-control program, one can access a PC remotely to exchange files between systems, run applications, take control of a client PC or server in order to troubleshoot a problem, and much more. Remote-control software is an application that you install on two PCs that permits one system (the guest) to connect with and control another (the host). Once youre connected, you can do just about anything as if you were sitting at the host PC. In addition, remote-control software lets you transfer files between PCs faster and more efficiently. The latest remote-control programs support a myriad of connection types including Internet connections, which are becoming increasingly important. The key advantage to Internet connections is that they let mobile users connect to a PC or server anywhere on the globe via an inexpensive local telephone call. So no matter where you are, you can always stay in touch. This paper is an effort to shed some light on six of the remote control software programs that are on the market today. We do not intend to be an expert source of information on remote control software. The goal is to present the information in a useful manner. Furthermore, it will attempt to address questions inherent to the capabilities of the software. For with the capabilities that this software possess comes a myriad of ethical and professional dilemmas. Our problem was to find six of the leading remote control software brands and discover as much as we could about their capabilities and limitations. We intended to compare the software and indicate which one we believed to be the best. A specific area of interest was with the problems that might arise from the capability to monitor workers activities and any features that the software may have to discourage clandestine activities. Find six of the leading remote control software packagesResearch the literature to find and present as much as possible about each software packages limitations and strengths. Compare the software packages and make an arbitrary decision as to which is the most capable. Identify and present the problems that may arise from having the capability to monitor workstation activities anywhere on the net. Most users associate remote-control software with telecommuting or day extending. Telecommuters typically use remote-control software to connect to an office PC over an analog phone line to exchange files and access productivity applications. However, there are many other uses for remote-control technology. For example, in a corporate setting, a help desk administrator can take over a client PC and show a worker how to accomplish a task or fix a problem. Network administrators use remote-control software to connect with a server or a workstation and troubleshoot a problem without making the long trek to the server room or the workstations location. . Furthermore, many major computer vendors put remote-control software on their PCs so that they can provide customer support remotely. The projects intent was to take all of these applications into account. In fact, during the research conducted, the authors determined that there are four basic roles of remote-control software. The Four Roles of Remote-Control SoftwareRemote-control software lets help-desk administrators troubleshoot problems without having to run throughout the building. Help-desk administrators look for strong remote-control performanceplus features such as tools for pushing the host software down to client PCs for easy installation, and the ability to launch the host module remotely. By using remote-control software, system administrators no longer need to be chained to their desks. A system administrator can monitor servers and correct problems at any time of the day from any location. One of the key features is the ability to monitor multiple hosts. Connecting over the Internet or dialing in to a company network, a telecommuter can take over a host system (usually, a desktop PC), as though sitting at a desk. Key features for these users include easy modem configuration, fast file transfers, wizards for scheduling unattended synchronization routines, and printer redirection. Many PC vendors such as Compaq and IBM bundle remote-control software with their products. If a customer encounters a problem, a support technician can take over the system and resolve the problem without having to ship the PC back and forth. Key features for these users include voice chat over data. All of the methods utilized in this research were arbitrary in nature. Furthermore, the authors tested none of the software. In a few cases, we made comparisons between software capabilities using the conclusions of third party research findings. The authors site any cases where comparisons come from outside sources. Selection of the vendor for evaluation was an arbitrary decision. We made the decision based on the authors knowledge of the vendor or the availability of information about the software. The six vendors that we chose to compare were:1.Cross Tec Corps NetOp for Windows version 6.5 2.Funk Softwares Proxy version 3.024.Stac Softwares ReachOutEnterprise version 8.425.Symantecs PcAnywhere version 10Three of the characteristics included in our comparisons, Platforms and Protocols Supported, Use as a Diagnostic Tool, and Security came from the requirements of the project. We selected the rest based on the authors perceptions of what the important areas for this type of software should be. 1.Platforms and Protocols Supported Network systems and protocols that the software supports. 2.Installation and Resources Required The installation of the program has to be simple and do most of the work for the installer. When similar operating systems are involved (Windows 9x, Windows NT), having the same installation procedure is a plus. We included the disk space and RAM space needed by the software in this characteristic. 3 Fatal familial insomnia EssayThe connection icon editor lets you create and edit ReachOut connection icons without running ReachOut itself. This is useful if you want to create icons to distribute with the ReachOut Setup program. A phone book conversion utility lets you update phone books (or connection icons) from earlier versions of ReachOut to the new connection icon format. You can convert from ReachOut from NT, ReachOut for 95, ReachOut for Windows DOS. The ReachOut FTP tools are standard FTP utilities that let you transfer files over the Internet. These programs are not part of a regular ReachOut installation but are included as separate item s on the CD-ROM. You can use them to copy files to or from any Internet site, even if ReachOut is not installed at the other end. ReachOut Enterprise 8.42 costs about $169. http://support.stac.com/technote/ROE/default.asp pcAnywheres installation wizard takes you through an effortless install that provides both guest and host functions in one package. The wizard recognized and utilized all Windows components. We were pleasantly surprised to find a live update utility at the end of the installation that offered to obtain the latest changes to pcAnywhere. The utility found our underlying network connection, accessed pcAnywheres FTP site, and refreshed our installation with updated files. However, it did not inform us of changes to our base installation taking up more than 30.8 MB. Administrators wont be cringing when it comes time to roll out this product on the network either. pcAnywhere has a custom-configuration utility for network installations. You simply pop in the corporate CD, which gives you a graphical utility to select and manage host and guest options for installationseven silent installations. This utility eliminates the need to master a script file for automatic installations. Both NetOp and ReachOut Enterprise require script files for automatic installations. With pcAnywhere, installing multiple users almost as easy as installing one user. o133MHz Pentium or higher processoro30 MB of available hard disk spaceWindows Millennium Edition and Windows NT4/98/95oPentium or higher processor150MHz (Pentium or higher processor for ME)o30 MB of available hard disk spaceConnect to a remote host PC and its desktop appears in a window on your remote PC. From there, you can launch applications and open files on the host PC just as if you were sitting in front of the computer itself. One of its best features its crisp, clutter free interface. Its four large toolbar icons let you designate your office PC as the host, so you can connect to it remotely or connect with and control another computer. These icons also let you set access options and (for Windows NT/2000 users only) build installation packages that add PcAnywhere to other systems. Although the default connection items allow for remote control sessions and add a minimum level of security, pcAnywhere really shines in the array of configuration tasks available from the Tools menu. A user-defined computer name can replace the default Windows computer name. The default video mode can be adjusted, color scale can be set from two to 16,797,216 colors, and cache file size can be manipulated. In addition, one can allow connections to multiple hosts and optimize the desktop for remote control using discreet selections. You solve user problems directly by remotely controlling their systems. OLE, automation allows VARs to integrate PcAnywhere functionality into custom solutions. Both IT groups and VARs will benefit from the new PcAnywhere Packager utility, which lets you produce customized installation sets to decrease installation size and enforce corporate security and access policies. One pcAnywhere has is that no longer has the integrated virus checking such as for instance, DOS and Windows 3.1. Therefore, if those operating systems are used, one should use the previous version, 9.2. Once pcAnywhere installs, a graphical utility an administrator can enforce network policies, distribute, and maintain applications. Note that the host administrator requires Microsoft Internet Explorer 4.01 or later. Windows integration is a good thing, but it should not be a constraint. Symantec should add other browsers to support host administration in the enterprise. You can link host and remote PCs within your organization over whatever connection you wish, including LAN, VPN, and dial-up, through a special code that prevents hackers from using other copies PcAnywhere to gain access. pcAnywhere also provides a mechanism for hosts to search LDAP directories for connection information. This functionality utilizes a Netscape Directory Server 4.0 or Novell NetWare 5x LDAP modules. PcAnywheres greatest downfall is that it still does not let you password-protect individual folders or files. You can limit access only by drivean all-or-nothing deal. Other than this minor glitch, the software gets rave reviews for security performance. It offers more security features than any other remote control application, outdoing itself in previous versions. Mandatory passwords stop unauthorized users from accessing a PcAnywhere host, and authentication options now consist of FTP, HTTP, HTTPS, generic LDAP, ADS, NDS, Novell Bindery, and NT domains. You can use these new authentication options to verify the identity of the remote caller via Windows 2000s Active Directory, HTTPS, and Novell Directory Services. By doing that, it allows companies the option of choosing what method best suits its network setup. In addition, for additional protection, PcAnywhere creates a log of every file accessed, every application launched, and all of its own activities. PcAnywhere 10.0 includes an optimization wizard to help you accelerate user sessions. It suggests various ways that performance can be improved, such as reducing the number of colors on the hosts screen or removing active desktops, screen savers, and wallpaper. Surprisingly simple changes such as these can dramatically increase the speed of your remote control sessions. If fast downloading is of primary importance, this software finds, downloads, and uploads the files rapidly. The Goto, Tag, and directory history features let you quickly navigate directories on both machines. SpeedSend technology expedites file transfers by only sending the sections that have changed since the last time someone transferred the file. In addition, improved AutoTransfer technology makes it a breeze to transfer and synchronize files automatically. Its easier to move multiple files with PcAnywheres file-transfer utility than with the Windows Explorer because it provides a history of recently accessed directories in a small, drop-down menu under the toolbar. One click on any of the folders in the list immediately brings up that directory in the file-transfer window so that you can easily move files to another directory from your remote desktop to the remote PC. Through Netopias patented technologies, Timbuktu Pro is the only remote control software that supports inter-connectivity between Windows NT 4.0,Windows 9x,Windows 2000,and Mac OS. High Speed Communication: Timbuktu Pro 2000 works over Internet, LAN, WAN, dial up, DSL or RAS connections. Incorporating new remote control advancements Timbuktu Pro 2000 is supposed to be faster than ever. Timbuktu has an automated network installation that can be complicated by using scripts to refine installed features. Timbuktu requires:o20 MB hard disk space available for Win 9xo50 MB hard disk space available for Win NT/2000Computer support personnel who currently must run all over the building to correct problems can sit in one location, and either observe the end-user demonstrating the problem or take control of the end-users computer, correcting the problem remotely. You can add or delete missing or extraneous files from other computers without FTP, AppleShare, or File Sharing. Simultaneous multiple networking protocols are supported, so Macs on LocalTalk, NT servers on TCP/IP, and Windows 95 stations on Novell networks can all connect, observe, or control each other. With Timbuktu Pro 2000, you can now take advantage of new communication features such as voice over IP and a new chat feature, which will allow for high-speed text based communication for those of us without sound cards and speakers on our workstations. Unlike many of the other RC applications available for Windows only, Timbuktu Pro allows you to control an office PC from your home Mac or PC, and allows you to control a remote NT server as well. Through Netopias patented V-wedge and IntelliScreen technology, Timbuktu Pro is the only remote control software that supports inter-connectivity between Windows NT 4.0 3.51, Windows 2000, Windows 9x and 3.x, and Mac OS. Timbuktu Pros remote control technology is device independent and does not replace video drivers or load TSRs. This results in a higher performing, more stable, and less intrusive remote control solution. Timbuktu Pro now integrates directly with Windows NT security allowing administrators to leverage the security already deployed within their environment. Timbuktu Pro also provides separate user defined and administrator defined options to virtually guarantee the integrity of the enterprise Intranet. Timbuktu Pros ironclad security provides state-of the-art secure screen blanking, password encryption, user level defined privileges, password ageing, event logging, master password protection, and more. The attended access feature prompts users to ask for permission before attempting to control your computer or admission as a temporary guest. Timbuktu Pro 2000 integrates with NT Security lists to help ease password management and administration. NT 3.51 and NT 4.0 systems can employ secure screen blanking. This feature freezes the screen on the host system with the display of a Workstation Locked or Begin Login dialog box. No one can look at the screen of your server or workstation while you are away. In addition, if your dial-up connection to the server is severed, Timbuktu Pro automatically locks the NT system to prevent unauthorized access. With Timbuktu Pro 2000 you can access the hard drive of any remote machine and transfer to or from it. If you cannot find the file, let Timbuktu Pro 2000 find it for you with its file find feature built right into Timbuktu Pros exchange. Webmasters can directly control their Macintosh or NT web server from their office or home computer. Edit web pages on your computer at home or work and use Timbuktu Pros file transferring to put the new or edited pages in place. Checking the web server logs from home is simple, and setting up new users and other server maintenance chores can be performed from your home, office, or while youre on the road at a web conference. People who use desktop AFS and web authoring software on their PCs can extend this functionality to their home computer (i.e., by writing the web pages on the home machine and using Timbuktu Pros file transfer software to place the pages on your AFS-based network drive on the office computer.)Road warriors can connect to their office desktop systems for file retrieval, presentation creation, and working with colleagues on collaborative projects. Checking client/server databases from the road or checking LAN-based or protected e-mail is quick and easy from your l aptop. Timbuktu facilitates printing reports on the office laser printer from the road. FlashNotes pop-up messages can get your notes on your colleagues screens immediately, when waiting for them to check their e-mail will not do. You can send files to users without tying up the e-mail server at the office. http://www.netopia.com/software/products/tb2/enterprise/ NetOp scored well in this area. It supports all platforms except Macintosh or Windows Me. Funks Proxy software was deficient in the protocols and platforms supported. It would not operate on Macintosh, DOS or OS2 platform. As with NetOp, Laplink would not work on Macintosh platform but unlike NetOp it did work with Windows Me. ReachOut does not support OS2 or Macintosh platforms. PcAnywhere does not support the OS2 or Macintosh platforms. Timbuktu Pro is the only remote control software that supports inter-connectivity between Windows NT 4.0,Windows 9x,Windows 2000,Windows Me, OS2, and Mac OS. NetOp had one of the highest grades in this area for its capabilities to start operations without rebooting and the read me file that showed all installed files. In addition, you can install NetOp programs on targeted remote computers. Laplink is the only product that does not have an automated network installation. ReachOut conducts an automated network installation and there is a small memory footprint. PcAnywhere installation is quiet simple. It has an automated network install. The Only problem is that it uses too much memory space. Timbuktu has a automated network installation that can be complicated by using scripts to refine installed features. NetOps Help Desk feature, the ability to conduct audio and video chats, scripting utility and the file transfer interface, make NetOp the best in this area. Proxy seemed to have a good array of diagnostic tools but file transfer was slow and problems in deletion of files caused low score. Although Laplink is, slow in transferring screen displays and keyboard and mouse controls the software has very useful diagnostic capabilities. One of these is the ability to log all transactions. ReachOut offers a host of tools to make diagnostic activities easier and more effective. These include: simultaneous chat with remote operator, the zero admin host service, and remote control through a web browser to name a few. If there were not problems with the file transfer capabilities, it would have rated tops in this area. PcAnywhere really shines in the array of configuration tasks available and OLE, automation allows VARs to integrate PcAnywhere functionality into custom solutions. These factors and others combine to put pcAnywhere in a tie with NetOp for first in this area. Timbuktu has features similar to NetOp. By itself, NetOp has very good capabilities for interoperability. However, the Gateway module interacts with NetOp to provide an extremely high level of network interoperability. The only trouble is that it is a different program. In this category Proxy did not do well. It has no capabilities for working out of the windows environment. On top of this, the software has no enterprise wide user administration capabilities. Laplinks Link to Net and Internet Directory options help the interoperability scores. But the inability to perform NT network integration detracts from the score. ReachOut does well in this category but we think it fails to completely live up to its name Enterprise. With automated network installation, remote control through web browsers, NT network integration it is still a formidable tool. Use pcAnywhere in a variety of network and enterprise situations. It integrates well with NT and Timbuktu does extremely well in this area also. High speed connect ability, and the ability to deal with every type platform makes it the choice for this area. NetOp has some very good features. The ability to allow guests to have a default set of privileges or users receive individual privileges. Its only major drawback include the inability to centralize security and authentication administrationSecurity for Proxy seems to be adequate. We saw problems with the host having the capabilities to deny permission for the guest to take over the host. Laplinks security is adequate but not as extensive as the NetOp features. ReachOut has some of the same security features that pcAnywhere has but does not quite match its level of security. PcAnywheres greatest downfall is that it still does not let you password-protect individual folders or files. Even considering this it still outshines the competition in this area. NetOp has a full array of services that makes it one of the leading competitors in this area. We especially like the guest tool bar and the marker function. Proxy services are adequate but still do not compare with the other software. Laplink has a good amount of services but does not compare to NetOp. ReachOut had an impressive amount of services and came in second in this category. PcAnywheres has a full menu of services. It ties for second place in this area. Timbuktu has an impressive list of services also, but they seem to be geared to a remote user having access to the home offices services. In the area of costs the software packages ranged from $130 to $175 dollars with Laplink being the cheapest. When you take into account the price per seat costs, you get quite a different story. Table 1Costs of Software and LicensesOverall, our testing of remote control software revealed a field of well-matched players. The order in which they finished was:2.ReachOut and Timbuktu tied for 2d place with 60 points each 3.pcAnywhere came in 3d with 60 points5.Laplink brought up the rear with a total of 53 points. When we have the capabilities to monitor the activities of anyone on a network, the first problem that most American people think of is invasion of privacy. Morris, John. 1998. Remote control software: You cant get there from here. PC Magazine, 1 September, 58-70. Doherty, Sean. 2000. Remote Control Saves Steps. Network Computing PC Magazine Labs Report. Teleworking ReachOut Enterprise 8. http://www.zdnet.co.uk/pcmag/supp/2000/teleworking/49.htmlReachout Enterprise. Users Guide Supplement Version 8.42. http://www.zdnet.com/pcmag/features/remotecontrol/rev7.html Kawamoto, Wayne. New! Software.Stac ReachOut 7 vs. MicrocomCarbon Copy 32. http://www.zdnet.com/pccomp/sneakpeeks/snpk0697/remote.htmlBibliography:BibliographyMorris, John. 1998. Remote control software: You cant get there from here. PC Magazine, 1 September, 58-70. Doherty, Sean. 2000. Remote Control Saves Steps. Network Computing Magazine, 7 February, 35-48PC Magazine Labs Report. Teleworking ReachOut Enterprise 8. http://www.zdnet.co.uk/pcmag/supp/2000/teleworking/49.htmlReachout Enterprise. Users Guide Supplement Version 8.42. http://www.zdnet.com/pcmag/features/remotecontrol/rev7.html Kawamoto, Wayne. New! Software.Stac ReachOut 7 vs. MicrocomCarbon Copy 32. http://www.zdnet.com/pccomp/sneakpeeks/snpk0697/remote.html