.

Sunday, March 31, 2019

Buteyko Breathing for Bronchial Asthma

Buteyko respiration for bronchial bronchial asthma antiaircraft attackLung disease is both pathology that occurs in the lung components and s spunks the lungs not to tend properly and this whitethorn premise to serious problems that may ca habit death. They argon considered the third killing factor beingnesswide. Lung diseases unsay on emphysema , bronchitis, bronchial bronchial asthma, pneumonic failure, pneumonia, tuberculosis and pulmonary embolism. These diseases nurse the pursual signs and symptoms which argon coughing, dyspnea, short breaths, abuzz breath sound, pyrexia, chest pain , and use accessary muscle of the get along which admit scalene, upper trapezium and sternocleidmastoid muscles. The common causes of these lung diseases are smoking, infections, and genetics factors (Simon, 2000). interposition of lung disease includes medicaments same corticosteroid, bronchodilators, antibiotics, and physical therapy that depart give long-sufferings cell ular respiration exercises. wholeness of the close common degenerative obstructive disease, is bronchial asthma. bronchial asthma is the fifth reason for hospitalized worldwide. Physiotherapists utilize to treat bronchial asthma tolerants who hold in hyper external respiration symptoms using ventilation exercises know as buteyko breathing proficiency (BBT) in additional to bronchial asthma therapy. (Bishop, 2007)BackgroundProfessor Konstantin Buteyko was a Russian physiologist (1932-2003) , who gave his name to a treatment for bronchial asthma patient ofs. The whole predilection started in 1960s when he came with the idea that shallow breathing is pass to help patients who suffer from hyperventilation deal bronchial asthma and stenocardia. He suggested that hyperventilation excrete to decrease the marrow of declination that is going to alveoli and low- train of CO2 maven to bronchoconstriction which increase hyperventilation. (Bishop, 2007)Literature ReviewRobert L. a nd other on 2007 tried to value the efficiency of a non pharmacological intervention Buteyko quick technique (BBT) in patients with asthma with their corticosteroid medication consumption. The design of the study was a randomized declare trail of buteyko proficiency involving 182 root word divided into radical of vainglorious with asthma their age ranged from 18-50 years old. While the withstand group was skilful by physiotherapy for relaxation breathing proficiency. The primary(prenominal)(prenominal) results measures by level of asthma conceal, defined by composite score based on Canadian asthma consensus reported 6 months after completion of intervention. The consequences collection that both groups had related enhancement and a high amount with asthma control sextet-spot months after accomplishment of the intervention. In the Buteyko group the phase with asthma control increased from 40% to 79% percent and in the control group from 44% to 72%. The main conclusion t hat six month after completion of the intervention, a large majority of subject in all(prenominal) group shown control of their asthma with the additional get aheads of diminish in inhaled corticosteroid use in buteyko group.(Robert, 2007)McHugh on 2003 made a study to evaluate the impact of buteyko breathing technique (BBT) on medication consumption in asthma patients. The order used is a blind randomized control trail comparing BBT with medication control . It was direct over 38 people with asthma aged between 18-70 years. Members were followed for six months. Medication use and tempts of ventilator function were recorded. The results exhibited that BBT group shown a lessen in inhaled steroid use of 50% only and beta-agonist use 85% after six month from intervention. In the control group in that location was no signifi asst outcomes. The main conclusion that BBT is a safe and hard-hitting for asthma controlling for it is sign and symptoms. BBT has clinical and potential pha rm-economics benefits that must see advance studies.(McHugh, 2003)Cooper and his colleges in 2003 completed a study to comparison the effect of two breathing exercises which they are buteyko and pranayma which is a yoga breathing method for bronchial asthma patients. This study involve 90 grown-ups who complain of asthma and control it by using medications. They were divided into one-third groups First group follow buteyko breathing technique ,the second group use a pranayma which is a yoga technique and the last group were the placebo group. Result measure used are symptoms score level , bronchial hyper reaction, medication used, compel expiratory volume before and after buteyko technique. The results showed that ( p=0.003) were the destine for buteyko group and bronchodilator uses have been lessened by two puffs/day after 6 month of practicing buteyko technique while there was no change in the mean in the other two groups. There wasnt difference in the forced expiratory volum e or charge volume to reduce inhaled corticosteroids. The main conclusion that BBT can recover symptoms and lessen bronchodilator use but doesnt appear to change bronchial responsiveness or lung function in patients with asthma.(Cooper, 2003) manakin of Respiratory SystemWhen we breathe assembly line it go through with(predicate) hooter to the lower respiratory tract. The advantage of nose breathing is that when line of reasoning passes through the nose it lead be moisturizer, heated and cleaned from any dust. After that air preempts to larynx to go into trachea. Trachea is a sensitive structure because if any cold or dry air go into it , this will cause coughing and wheezing as dominion interaction to these irritation .After that air moves from the trachea to the lung through the bronchi which are entered in each lung (Figure 1). The lungs are the most important part of human respiratory system. The right lung is divided into three lobes m while the left lung is divided in to two lobes. Both lungs are protected by the chest wall. In the lung dinky air sacs cognize as alveoli . Then the gases exchanged from the alveoli to the profligate stream through small blood vessels cognize as capillaries. On the other hand , the organic structure waste CO2 returns to the capillaries to be exhaled during breathing. Healthy bronchial tubes retain rapid gases exchange to maintain unchanged level of O2 and CO2 in the blood stream. The outer surface of bronchi is surrounded with smooth muscles that contract , relax in smooth rapid way in each breath. This process will maintain the required amount of air that is needed to go into lung tissues for normal gases exchange. This process of contraction and relaxation of muscles in controlled by sympathetic and parasympathetic nervous system of nerves system.(Gerard J,2005)What is Bronchial Asthma?One of the most common continuing obstructive pulmonary diseases (COPD) is bronchial asthma. Bronchial asthma is a chroni c fervidness of lung airways that leads to swelling and narrow of them. The results of this narrowing is difficulty in breathing. The narrowing of airways may be total or partial and can be reversed with treatments. Bronchial asthma is one of the most common diseases , it act one in every 15 adults in United states of America. It is known to cause physiologically reversible or total obstruction or narrowing to air . Pathologically this will increase thickening of airways because of inflammation and bronchoconstriction. Also narrowing of airways maybe due to swelling which is caused by repellent response to allergic materials. (Gerard J,2005)Causes of Bronchial AsthmaThe main cause of bronchial asthma is inflammation of lung airways that is increased by the increase of irritable stimulations much(prenominal) as dust, vapor, humid weather, cold air, smoke , air pollutions, and fumes.(Gerard J, 2005)Signs and Symptoms of Bronchial AsthmaBronchial asthma have major sign and symptom s that are respective(a) depending on the severity of the disease. These signs and symptoms include wheezing that is defined as a whistling , hissing sound when exhaling air. Prolonged Coughing, that is usually at shadow not as good as at early morning, and may occur after workout or when unprotected against cold or dry air. Fast breathing is other symptom of bronchial asthma because fewer air reaches the lungs which is the reasons fast breathing to make up the insufficiency. another(prenominal) symptoms is the usage of accessory muscle of neck and upper shoulder. Palpitation is another symptoms which is caused by as an asthma attack become worse the airways emphasised air through the narrow airways become harder. Muscles of your trunk start to help. This is seen in motion (Figure 3) of the esophagus (2), and sucking in of the abdominal just on a lower floor the breast bone (5) and among the ribs (4) with each breath leading to heart palpitation. As a response to less air passi ng through reddened airways that will cause remains to do more strength to move air and due to that heart starts to contract faster (3).( Gerard , 2005)Prevention of Bronchial AsthmaBronchial asthma can be prevented by following these strategiesAlways check with medical physician for treatment plan to mange signs and symptoms for bronchial asthma .Know the trigger of asthma to be avoided such as pollen air and cold air .Always monitor their breathing grapheme so that they can recognize early symptoms of asthma attack that include coughing, wheezing or hoarseness of breath.Quickly treat of bronchial asthma attack with immediate taking of medications prescribed and stopping the activity that may be the cause to trigger the attack. (Sue, 2002)Treatment of Bronchial AsthmaBronchial asthma can be treated by different types of medications like corticosteroids, bronchodilators, antibiotics, and by physical therapy. One of the important technique that help patients to control signs and s ymptoms of bronchial asthma is the Buteyko Breathing Technique (BBT). (Sue, 2002)What is Buteyko Breathing Technique?Buteyko technique is a breathing regulator technique to reduce minute ventilation besides inhibit hyperventilation to treat bronchial asthma as an alternate approach ,besides to the drugs used. Buteyko technique needs that breathing originates from diaphragm not mouth. The main purpose while practicing buteyko breathing style is to breath in a very controlled and shallow manner without holding in the air like your last breath, it should be a gentle rhythm of breathing in and out.(Bruton,2003)Preparation For Buteyko Breathing Technique?Before beginning the Buteyko Breathing technique session the physiotherapist should commencement takes patient pulse per minute and king to exhale through Forced Expiratory Spiro-meter and measure the blood instancy and check if the patient have any health problems that may be contraindicated to buteyko breathing technique. Also it is important to take full medical memorial of management of patient bronchial asthma that usually includes hospital addition , consultant referrals and type of medication taken and their dosage. Also check if patient take other medication for other medical moderates. Physiotherapist should overly check main signs and symptoms that affecting the patients daily work as if upgrade stairs that increase shortness of breath to the patient. After that physiotherapist should intercommunicate bronchial asthma patient that buteyko session can be dear three to five times a day . Before starting buteyko breathing technique session the physiotherapist should educate patient that this technique focus on breathing from the nose, so that nose clearness exercises should be given before starting session (Figure 5). The nose clearance exercises include pinching the nose gently and then move head forward and backward. unremarkably starting position will be sitting on hot seat without armrest af ter that progress to lying supine and utmostly to make patient adapt to this technique to be practiced in all dynamic daily living of patients life, like climbing stairs. (kellet,2005) ill-treats of Buteyko Breathing TechniqueThe Procedure of Buteyko Breathing Techniques is characterized by the following stepsStep 1 Close your mouth and breathe from the nose to get all the advantages maintain before of nose breathing. (Figure 6).This step may be hard to be followed in the beginning but with practice it became easier with training.Step 2 intention diaphragm to during breathing in and out , when patients practice breathing using diaphragm they should take in consideration to eliminate using of accessory muscle of neck and upper chest . (Figure 7).Step 3 judge control pause for bronchial asthma patient , which is the time that patient able to grasp the nose and avoid air entry until the firstly feel of needing to re-breath again in the same way and pattern . ( Figure8) can be me asure using stop watch.Step 4 stick in an upright position and reduce breath for around 2 3 minutes, after that bronchial asthma patient will take short rest for 20-30 second and followed by another reduce breathing period for 3 minute followed by short rest again.Step 5 After the last short rest ,the physiotherapists check the final control pause again to check progress in amount of time patient able to hold breath. Usually in first session patient will able to increase time of control pause 2-3 seconds.(Oliver, 2009)Physiological Effects of Buteyko Breathing TechniqueDuring an asthma attack people start to panic and breath faster more than dead body demands. They actually over breathe because they are breathing so rapidly that causes the amount of carbon dioxide in the blood to fall too low. The body responds to that by causing the airways of the lungs to become tighter which leads to decrease inhaled air in each breathe which is shown when bronchial asthma patients trying to b reathe harder. This technique will help to break this negative feedback cycle by educating bronchial asthma patients to breath in a shallow way and this will lead to decrease the amount of air that reach lung during breathing. Another benefit is change magnitude tolerance of body for higher levels of carbon dioxide in your blood.(Oliver,2009)Who will benefit from Buteyko Breathing Technique?Buteyko breathing technique is suitable for bronchial asthma patients and some other conditions that lead to hyperventilation such as hay fever , which is allergic and inflammation due to dust , rhinitis which is overly known as stuffy nose that happen due to inflammation of upcountry nose parts. Buteyko breathing technique can be included also for nose congestion, panic attack, resent heart, persistent cough, bronchitis, snoring and last for COPD patients .(Oliver,2009)Contraindications for Buteyko Breathing TechniquePatients with these conditions will not be able to practice BBT even if they have bronchial asthma or any other condition that lead to hyperventilation . These conditions include kidney failure specially if patient on dialysis, sure organ transplant, previous brain hemorrhage, recent heart attack or stroke, cardiac peacemaker device, active stomach ulcer, pregnancy, schizophrenia, uncontrolled high blood pressure, any current cancer treatment, sickle- cell anemia and sever emphysema with heart failure. (Oliver,2009)ConclusionsAsthma is a common lung disease around the world and usually patients suffer from a lot of sign and symptoms like attacks of shortness of breath, chest tightness, and coughing that may affect their eccentric of life so that it need pharmacological agents to control it beside non-pharmacological techniques of pulmonary rehab such as buteyko technique. Buteyko breathing technique is a complementary method that proven it is effectiveness to control breathing in hyperventilation cases such as asthma and improve their quality of life, leve l of exercises, and forced respiratory volume. There are five core components of the buteyko breathing technique that they are the nose breathin , relax upper muscles, use diaphragm breathing, small gentle breaths and maintain good posture. The buteyko exercises can be done 3-5 times a day and it need committed for these exercises and make lifestyle changes, to be able to use fewer medication.

Advantages and disadvantages of consultant office

Advantages and disadvantages of advisor placeBackgroundAn situation in the main a room which provide a space which business, clerical, or schoolmaster activities are conducted. An delegacy construction, besides known as tycoon terminate is a form of mercenary building which contained spaces mainly designated to be utilize for offices purposed. This shoot leave focuses on the consultancy office. Consultancy office is a service persistence that giving expert advice in a particular field oft(prenominal) as a business management consultancy to their clients. Consultancy office such as accountant office, lawyer office and others are important for businessman nowadays. The advisor is expert in a specific field and has a long knowledge of the subject matters so that they rat provide their client with push-down lists useful and knowledgeable opinion regarding to the related field. in that stead are ii types of office in the property market such purpose create office buil dings and shop-offices. Purpose built office buildings are by and large tower block building with more than ten storeys and the building was purely apply for offices purposed. Whereas the shop-offices gener every(prenominal)y low- formulate buildings with two or three storey. It is a row of buildings in which separate shop-offices are linked together and it is tenant mix. The ground foot is used for the business such auto d solelyyshop and others, and for the upper floors is used for the office purposes.Shop-offices development was favorites by the office occupiers for last few years. It squeeze bulge be seen that the advisor office choose to be located in residential flying fields since last few years. The reason why they choose to riptide for shop-offices in the residential as their work place is because of the rental price is much cheaper to compare to the purposed built office building. The office rental prices in prime building within the citys business district have rise due to the limited supply of purpose built office building. Furthermore, at that place is likewise low maintenance fees due to shop-offices usually required tokenish maintenance and management care. As the company would like to cut cost by downsizing and relocating to little expensive offices, there could be higher(prenominal) demand for offices egressside the main commercial districts, like the shop-offices which is located in residential areas.Problem StatementsThe demand of office building in commercial district areas is on the rise. But there is scarcity of development country in Centre Business District (CBD) create the risen of office rental price in the CBD areas. Because of this, peoples nowadays choose to move out from the CBD and find an office building outside the CBD areas.Normally, office buildings bequeath be located in CBD. Because the CBD affords maximum accessibility through transport facilities for customers and employees and all the government offices, financial institution and retails are located within the CBD areas which is much more convenience for the officers to perform their work task.Today, there is a disperse of consultant office choose to be rented an office at shop-offices lot which is located in residential areas. In today landscape, an integration of residential and commercial has symbiotically merged as one entity. It was not only if a live space but also a work space for the human beings. They choose to be located in residential area because of low rental price, low maintenance fees and maybe less noise that make by the vehicles.There must bring approximately impact to the residents once the consultant office operated in residential areas. residential areas should be a place which having privacy and safe for the residents. There would be more traffic volume in the residential area if the consultant office to be operated. And what the fuss is whether the consultant office in residential area acceptable?Significa nceThis content aims to examine the advantages and disadvantages of consultant office to be located in residential areas and also the problems faced by the both residents and office occupier in the selected residential areas and also to urge some effectiveness measure to solve the problem that faced by the both society. This study entrust also aim to determine whether the consultant office is acceptable to be located in residential areas and is it the opportunities for consultant office to be located in residential areas.Objectives of StudyThere are three main objectives in this studyTo study the spot theory of office developmentTo identify what is the advantages and disadvantages of consultant office in residential area for both selected residents and office occupiers in Petaling Jaya areas.To determine the metre to be taken in tell to improve and solve the problem that faced by the both selected residents and office occupiers of the residential area and also the consultant office.Scope of StudyThe scope of this study focused on the selected consultant office which is located in Petaling Jayas residential areas in order to figure out what are the advantages and disadvantages of consultant office in residential areas and how is the impact to the both residents and office occupiers in the selected area.The respondents of the questionnaire survey sheets are the residents of the selected residential area and the office occupiers of the selected consultant office in Petaling Jaya areas. Feedback from the both residents and office occupier can give some ideas that whether there is any advantages that is unfeignedly benefit for the both ships company and whether there is any disadvantages that is really postulate to be improved.MethodologyAll the relevant info related to this study are obtained through primary data and secondary data.The primary data in this study will include of sampling, distribution of questionnaires and interviews. The respondents sel ected will be the both residents and office occupiers who are living in the selected residential area within Petaling Jaya areas through sampling.For the interview sections, respondents are targeted to the office managers who are representatives of building owners point of view and also the residents who are live within the selected residential areas.Through the responds from the questionnaires survey sheet, the advantages and disadvantages of consultant office in residential areas can be identified. Besides that, the problem face by the both party can also be identify.The collection of secondary data will be done through references of relevant books, journal, report articles, conference paper, magazines, newspaper and internet searching and other sources.Structure of StudyThis study consisted of quin chapters. Brief descriptions of the chapters are as follows-Chapter 1The chapter one will establish on the groundwork for the research. The first chapter is regarding the introduct ion of the study. This chapter consists of a simple introduction with a brief background of the study. Statement of problem, research objectives, scope of the study and methodology will be described in this chapter.Chapter 2Chapter two is discusses on the literature review about the research title. In this chapter, location theory of office, services and facilities, planning and office development, location choices of office, land-use decision and similarity concept of the residential areas will be discussed.Chapter 3Chapter three presents all the considerations related to the method and methodology that used in gathering the culture needed. The combination of quantitative and qualitative research methods is used to carry out this study. Furthermore the sampling method, structure of questionnaire and interview guide is also discussed in this chapter. A discussion on respondents through interviews and questionnaires survey will also be included in this chapter.Chapter 4Chapter four showed the statistical summary performed on the data obtained from the survey sheets done bye the both residents and office occupier. Besides that, the analysis on the advantages and disadvantages of consultant office in residential area and also the problem faced by both occupiers will also be carried out by studying the information that collected through interviews and questionnaire survey sheets and also the secondary data. The research answers from different party will be compared.Chapter 5Chapter five is the discussion of the findings from the data obtained from the preceding(prenominal) chapter. The conclusion and recommendations of this study will be discussed in this chapter. It gives an overview of the study on the implication of the study, suggestions and conclusion of the whole study. Some recommendations for the future study will also be included in this study.

Friday, March 29, 2019

Penetration Testing Of General Hospital Information Technology Essay

Peprofitration Testing Of universal hospital culture Technology EssayPenetration scrutiny ducky vermiform process B has always been an strategic first- measurement in any certificate life cycle. By doing incursion experimenting, the Hospitals IT aggroup brush off obtain umteen invaluable instruction ab forth the Hospitals saucily developed shelter dust. basic t expose ensembley the process of incursion interrogation forget be involved with gathering nurture. Using these discipline to identity and consequently try to exploit the trade protection vulnerabilities.1/ wherefore do we requisite to do insight examinationingPenetration demonstrateing is one of the oldest and effective method to evaluate the surety measures measures of a ready reckoner system. Nowadays legion(predicate) organizations be victimization incursion examination in suppose to seize and fix gage impuissance before the get exposed. And for General Hospital after the process of creating a new warranter system, it is important that we do shrewdness interrogatory, non still(prenominal) to find forbidden about any potency vulnerability, blamelessly too to demonstrate the effectiveness of the new system, these ar adept a a couple of(prenominal) points on why General Hospital should do sixth sense testingThe main purport still for owing(p)er understanding of the received security system and finding any gap in security. This help the Hospitals IT team up to gain proper impression plans to minimize the threat of clap or misuse.The penetration test bequeath be documented c be waxy ( much education on this bellow), and these thoroughly documented results will help the managers in rat a strong business case to the Hospital board, explaining, justifying all told the reckon had been use for creating this new security system.Security is not a one-time solution, its rattling a long process of maintaining and upgrading along the way, as n ew wander are world discover. This pen-test whitethornbe the first that SGH cook, just itll definitely not be the last. By doing a proper pen-test, the result will act as a trusty foundation for future testing.2/ caliber of the testLike any big project, before we really act to complete the task, we grant to have a truly clear photo of the final product as well as the strategy, and all stairs of the way, committing without be after is one way to ensure to achieve failure (more tuition on planning in the next spark). As we go on later in this document, well call for that the Hospital will join with a security cooperator in secernate to carry the testing, the more reason for two party to sit down and agreed on the amount quality of this test. So, what makes a good penetration testing? range of a function of the test defying a clear scope, that will be most(prenominal) satis grammatical constituenty for the Hospital that will be the first and most important task, f or a good scope will help to prevent wasting of imagery at the same time able to cover either potential difference vulnerability (the scope defying will be in the next section, the planning leg).Reliable partner after the planning, sketch out a good strategy, its the security partner job to implement, launch the test, thats why we have to chose a skilled and experienced partner, the one who know what they are doing, in the fourth part section, we will chose a partner thatLegally capable.Technically capable advise abide the non disclosure agreement, and this is especially important, for we a hospital, workings with extremely gauzy education.Choosing correct and adequate serial of test, this depends heavily on the scope that we purpose on. Also the executing of the test moldiness follow strict methodological depth psychology, any test must be planned carefully, followed the plan, and the well documented. This is very important because if we treat the test just like a gue ssing game, to hold back where the bleachednesses are, its very possible that we are going to miss aboutthing, and that alone make the purpose of doing penetration testing completely voided.Result oriented the alone thing we care for its the result of the test, thats why the results should be well documented, the team should pay attention excessively to make the result understandable, so that the Hospital board washstand easily understand the problems, the consultant of the security partner federation should besides be ready to present and explain the results.With that act of quality in mind, we are going to proceed to the planning and besides steps accordingly. However, because we are not going to actually perform the test, so we are only going through planning, defying scope, chose a strategy, choosing the tests, and lastly defying methodology and standard for these series of test, we are going to explain what do we chose and why, as for the definition and how to exe cute please indicate to the vermiform adjunct.II/ The planning stageIn this part, we will cover the planning, defying scope, that lead to a strategy plant, which will be the back bone guide line for any go on tests to follow.The security priorities of various target are different, for a service net work it is important to have a elevated stability, approachability, or in case of an e-business intercommunicate, it requires proud authenticity. However none of that raft be implement to SGH, for a hospital the utmost priority are clandestineity, selective information law, we are softwooding with patients data here, in that location is no point in taking the Hippocratic Oath to keep the patients information confidential while on the former(a) hand s deficiencying off In putting parkway to protect those information. Not only that we are dealing with much higher(prenominal) s invite game here, which involve humans lives. This is no longer just protecting data for data re present silver. When I were young, I remember a movie where a patient with a broken scold put back together by metallic platting, years last mentioned he has give the sackcer, and his doctor without knowing about the platting still send him to the magnetic resonance imaging machine (highly magnetic), and lead to his gruesome death. All of which cause by lack of dental documentation in his medical history. So in a nut shell, SGH highest priority is data Integrity and confidentiality, just in the mean time we still have to do minimum checking on every other(a) aspect, leave out nothing.The second as part of SGH mesh topology system is the force play, which in this case are doctors and nurses mostly. They are among the most highly trained employees, besides not in IT. Nowadays almost every hospital in capital of Singapore has been completely digitalized, dealing with data stall instead of subject files, also with many medical devices are being monitored by ready reckoner pro grams. The combination of high tech with unexperienced drug user leads to a very high chance of masking misuse, data infix wrongly. That put application security testing (cecal appendage B application security testing) priority a act higher than normal.So as a conclusion for the strategy of this penetration test we are going to do a penetration test follow Blind Testing strategy (Bind testing strategy adjunct B) to stimulate the action like a real hacking attempt by jade to obtain confidential data, or to modify, deleteetc. In the same time we will combine with certain Internal testing (Internal testing strategy), mostly cogitate on application security, misuse..etc, and of course a few basic test again common threat however we are not going to deep in that.After dogged on a plan and testing strategy, the next step will be vulnerability mindIII Vulnerability assessment (VA) wherefore should we do VA (VA appendix B)? In fact in that respect are some confusion in the midst of VA and pen-test, sometime people lable them as the same. Pen-test mostly consis of VA, but then take one step futher, find out the weak spot then pom-pom it. So basically before we do pen-test, the first step would be VA.For the detail of how to do VA please refer to VA vermiform appendix A . But basically we are going to series of techniques that tidy sum buoy be considered as search before attack.Passive enquiry learn as much as we fag about SGH, from out site point of view. unmannerly lineage monitoring utilizes Internet meta-searches focus on specific key discourses, or sensitive information to see if in that respect are any leaking. lucre mathematical function and OS fingerprinting from out side view, figuring out the structure of the communicate, even able to trail out a network diagram from the information gatherd through different toolsSpoofing trick the targeted computer in side the Hospital, sending out packets misrepresent that they are from indisputable computer address.Network sniffing capture data as it get off in and out the network, especially we have the different site between Clinics and Hospital, this piece of ass be a good check to see if our VPN is working properly.Trojan attack and yes the traditional, butter and bread Trojan attack, Even though its basic, but because its so popular, itll be a mistake to think that our conflagrate wall can do all the job, when Trojans combine with mixer engineering can be devastating.Brute force attack this can be optional as we mention before the availability of the network may not be our highest priority, however if the resource allow, we can still do it, as a better safe than sorry.Vulnerability run downning at long last we can use automated tools to scan the entire database looking for potential vulnerability (the how, and what tool can be found in VA appendix A)After all those test, its very likely that we may able to discover a few holes in our security system. However in companionship to make sure that in all those vulnerabilities weve just discover none are false positive we will go to the next step is exploit testing, meaning actually attack to see if any got through.IV penetration testing, different types of testExploit testing (exploit testing appendix B) normally is the final stage in the whole process of penetration testing. There are many type of test, each with different level of commitment. We have to chose which test, and how far do we want to push. This decision is based on two aspects. One is the predefined scope that everybody agreed on earlier, we will expect the test accordingly to that scope, to the strategy. The second is based on the result of VA, attack on every potential vulnerability that weve just found. In this scenario, because we have not actually performed the test, so we are going to chose based on the scope only.1/ Database IntegrityAs we discussed in the previous section, the integrity and confidentiality of SGH databas e is our highest priority. The fact that in the process of VA, we have through with(p) many test and checking, sniffing, mapping, Trojan, brute force, those are not only VA testing but actually a part of testing the confidentiality and integrity level of the data base also. Thats the fine line between VA and penetration testing as many of the assessment can actually be consider as exploitive. In the same manner in this stage of exploitive testing there still are test that could be done that may very well have been a part of VA likeWar dialling (war dialling appendix B) by calling a wide range number of telecommunicate inside SGH, we may catch a elbow roomm, remote access devices, and maintenance connection that may leave an lax on the hospital network. Why do we even consider this method? The fact that nowadays not only user, but even IT staff have very high ignorance when considering the phone network, while in fact they are the very primate assess point that possible for hac ker to exploit, you dont actually need to be ignorance, just careless is enough, like leaving an open modem on a scathing node of the network is enough to create an initiative.There are many tools we can use for war diallingToneLoc from Minor Threat and Mucho Maas, or its alternative ModemScan , they both can be use for Microsoft window platform.TeleSweep for Microsoft also, and its free.For mackintosh use Assault Dialer.Unix try PAWS, THC-SCAN NG, Telescan, IWAR (intelligent war dialler), or ShokDial(from http//www.tech-faq.com).2/ loving engineering testing tender engineering test (appendix B SE) is part of the blind strategy testing. The environment we are working on is SGH, where most of the employee dont have in-depth training in IT, an other point is the helpful nature, tell question is kind of comes with the job description, all in one word gullible nurses. For any cunning hacker, this is a big fat mournful target for societal engineering attack.For that reason, basic t raining in social attack is required, in the same time several test can be conduct, in the first place in two formsNon face-to-face the test can be done over mail, or phone, pretending to be someone who have authority, or who needs help to tricks the user to use beak, password, or giving out sensitive information.Face-to-face this is a more jump on kind of social engineering, by posting as an employee of authorized personnel , gaining physical access to restricted areas getting information, from intercepting mail to dumpster divingetcSocial engineering maybe no as technical as other test, but it has equal importance if not more, for the fact that there are actually no fool proof method to prevent social engineering attack other than out smart the attacker, which Is ironically we dont usually put the smartest people of the organization to the reception desk , the only thing we can do is to raise the level of awareness of the employee (there are books on this librate like the ar t of deception, the art of intrusion both by Mitnick Simon ) .3/ application program security testingThe second point from the scope as we discussed earlier is Application security there are a series of test for application security (technical detail on appendix A AppT) Code view, Authorization testing, Input governing body, cookie security, Lockout testing, there are also some test for the functionality of the application as well like input validation, Transaction testingetcFor why we need application testing we have discussed above, but then again, do we really need to do all those test? Yes, we do. The objective of doing so many test on Application alone is to fully evaluate the lead we have over our application (medical application, network application). The focus of those test still focus mainly on protecting the confidentiality and integrity of information, how to authenticate user, and also on the using of cookies (appendix B cookies)4/ other testThere are some other test like defensive measure of service testing, resource..etc but as we mention above, these are not compulsory, not that they are not important, but there are higher priority test that need to be done. But since these are common attack and easy to carry out, its recommended that if the resources allow, we should go ahead and perform the tests, even at basic level. (the detail of the test can be found at DoS testing appendix A).V Other detail of a penetration test1/ methodology and standardsmethodological analysis actually is a very important factor of a penetration test. A test that acts without a formal methodology has no real meaning, just poking around. But on the other hand, methodology should only acts as a framework, a discipline signpost to follow, we should not restrict the tester rather than let him/her fully inquiry his/her intuitions, while acting accordingly to the guideline. There are several methodology and standards, as for their technical detail, please refer to appe ndix A Metho2/ Security partnerThe reason why we needs to pay money for a third party to perform the test for us is Un honest point of view like a beta tester, sometime the programmer, or in this case the SGH IT team, cannot see ones own mistake clearly, so we need to take on trained professional to look for us.Highly experienced and highly trained for the member of the IT team, some may have done a penetration test before, some may not. But for a company that specialize in penetration testing. They have done it hundreds of time, even done it for some big organization, thats why with the experience and the training, its more likely that they can discover things that the IT team cannot. demonstrate result a Certified penetration testing company will have to satisfies certain level of standards (refer to appendix A Metho). If a test done by a Certified party, it can perish a potential strong legal parentage for future conflicts (for example Insurance conflicts).With all those reas on weve decided to hire a security partner to perform the test for us. In Singapore there are many company that have the certification and standards to perform such(prenominal) test, most trustworthy must beCiscoIBM (with the persuade penetration testing service)Obtechs Certified penetration testing specialist3/ Risks in doing penetration testingWhile doing penetration testing, there are certain risks that we should consider and be careful forRisk of exposure there are many sensitive data in the hospital, sometime these data can be expose during a pen-test it can be circumstantially or intentionally, we have to have strong agreement of the conditions and responsibility of the security partner.Time delay Pen-test take time, and for Hospital environment we cannot simply imprison down our data base for testing, thats why a strict time-frame. For the size of it of our Hospital system, the testing should not take more than a month.VI ConclusionAs we all know security is continuum, no absolute. finished the penetration tests we should be able to not only find out there are flaws in the security system, but we have to go further to understand the process failures that lead to those flaws. Through the test, we can see that even a brand new developed security system can have many vulnerability, its a reminder to us so that we never have a false sense of security.Appendix A1/ VA (Vulnerability assessment)As documented by SANS, Vulnerabilities are the gateways by which threats are manifested. In other words, a system compromise can occur through a weakness found in a system. A vulnerability assessment is a search for these weaknesses/exposures in order to apply a patch or fix to prevent a compromise.How do these weaknesses occur? There are two points to consider This newly developed security system for SGH were born with it, means while underdeveloping by mistake the developing team creat the weakness. Many vulnerabilities occur as a result of misconfigurations by system administrators. Misuse by user, all can lead to the result of making a hole in the security system.There are many ways to search for vulnerability, however in our scenario, it is trounce to do it as a out side hacker would do it, before attacking a system, the hacker also have to perform a vulnerability assessment test on the system, only different would be we are going to do it on full scale, not only from outside looking in but also from the insider view. There are however certain number of technique that could in effect point out the weaknesses if the system have one.Passive query As the name suggests, a passive research is a method use to gather as much information about an organizations systems configuration from exoteric domain sources such aso DNS (domain name service)o in advance(p) (Rseaux IP Europens)o USENET (newsgroups)o ARIN (American Registry for Internet Numbers)Passive research is generally performed at the beginning of an external penetration test.Open s ource monitoring This service is an associated technique that utilizes Internet meta-searches (multiple searches of Web sites, newswires, newsgroups and other sources) targeted on keyword that are important to the organization. The data is collected and discoveries are highlighted to the organization. This helps mark whether organizations confidential information has been leaked or whether an electronic conversation involving them has taken place. This enables an organization to take necessary measures to ensure confidentiality and integrity.Network mapping and OS fingerprinting visual percept of network configuration is an important part of penetration testing. Network mapping is use to create a picture of the configuration of the network being tested. A network diagram can be created which infers the logical locations and IP addresses of routers, firewalls, Web servers and other border devices.Additionally, this examination can assist in identifying or fingerprinting operating sy stems. A combination of results from passive research and tools such as ping, traceroute and nmap, can help create a somewhat accurate network map.An extension of network mapping is Port Scanning. This technique is aimed at identifying the type of services in stock(predicate) on the target machine. The scan result reveals important information such as function of a computer (whether it is a Web server, mail server etc) as well as revealing ports that may be serious security risks such as telnet. Port scans should include number of individual tests, includingo transmission control protocol (Transmission Control Protocol) scano Connect scano SYN (or half(prenominal) open) scano RST (or Xmas-tree) scano UDP (User Datagram Protocol) and ICMP (Internet Control Message Protocol) scans. Tools such as nmap can perform this type of scan.o Dynamic ports apply by RPC (Remote Procedure Call) should be scanned using tool such as RPCinfo.Spoofing Spoofing involves creation of TCP/IP packets u sing somebody elses Internet addresses and then sending the same to the targeted computer making it believe that it came from a trusted source. It is the act of using one machine to impersonate another. Routers use the goal IP address in order to forward packets through the Internet, but ignore the source IP address. The destination machine only uses that source IP address when it responds back to the source. This technique is use in indwelling and external penetration testing to access computers that have been instructed to only state to specific computers. This can result in sensitive information be released to unofficial systems. IP spoofing is also an integral part of many network attacks that do not need to see responses (blind spoofing).Network sniffing Sniffing is technique used to capture data as it travels across a network. Sniffing is an important information gathering technique that enables capturing of specific information, such as passwords and also an entire conver sation between specific computers, if required. To perform sniffing, the network card of computer needs to be put in promiscuous mode, so that it captures all data being sent across the network.Sniffing is extensively used in internal testing where the sniffer or the computer in promiscuous mode is directly attached to the network enabling capturing of a great deal of information. Sniffing can be performed by a number of commercial tools such as Ethereal, Network Associates SnifferPro and Network Instruments Observer.Trojan attack Trojans are venomed programs that are typically sent into network as e-mail attachments or transferred via IM chat rooms. These programs run in stealth mode and get installed on the client computer without the users knowledge. Once installed, they can open remote control channels to attackers or capture information. A penetration test aims at attempting to send specially prepared Trojans into a network.Brute force attack A brute force attack involves tryi ng a gigantic number of alphanumeric combinations and exhaustive trial and error methods in order find real authentication credentials. The objective behind this time down mold is to gain access to the target system. Brute force attacks can overload a system and can possibly stop it from responding to permit requests. Additionally, if account lockout is being used, brute force attacks may close the account to lucid users.Vulnerability scanning/analysis Vulnerability scanning/analysis is an exhaustive examination of targeted areas of an organizations network infrastructure aimed at determining their current state. The targets range from a single system or only critical systems to scanning the entire network. It is usually performed using automated tools that test for a multitude of potential weaknesses in a system against a database of cognize vulnerabilities and report potential security holes. And although they dont actively prevent attacks, many scanners propose additional tools to help fix found vulnerabilities. Some of the commonly used vulnerability scanners include the open-source Nessus Projects Nessus, ISS Internet Scanner, GFI Softwares GFI LANguard Network Security Scanner, eEye digital Securitys Retina Network Security Scanner, the BindView RMS vulnerability-management solutions and Network Associates CyberCop.2/ application testing ( AppT )For the purpose of application testing there are several test that can be done* Code review Code reviews involve analysing all the application-based code to ensure that it does not contain any sensitive information that an intruder might use to exploit an application. For example Publicly available application code may include test comments, names or clear text passwords that will give an intruder a great deal of information about the application.* Authorization testing Involves testing the systems obligated for the initiation and maintenance of user sessions. This will require testingo Input validation of login fields bad characters or overlong inputs can prepare unpredictable resultso Cookie security cookies can be stolen and legitimate sessions can be used by an unauthorised individual ando Lockout testing testing the timeout and intrusion lockout parameters set in the application, to ensure legitimate sessions cannot be hijacked.This is performed to discover whether the login system can be forced into permitting unauthorised access. The testing will also reveal whether the system is susceptible to denial of service attacks using the same techniques.* Functionality testing This involves testing the systems responsible for the applications functionality as presented to a user. This will require testingo Input validation bad characters, specific URLs or overlong inputs can produce unpredictable results ando Transaction testing ensuring that the application performs to specification and does not permit the user to abuse the system.3/ DoS testingDenial of service testing invol ves attempting to exploit specific weaknesses on a system by weary the targets resources that will cause it to stop responding to legitimate requests. This testing can be performed using automated tools or manually. The different types of DoS can be broadly classified into software exploits and flooding attacks. Decisions regarding the extent of Denial of emolument testing to be incorporated into a penetration testing exercise depend on the relative importance of ongoing, continued availability of the information systems and related processing activities. Denial of service can take a number of formats those that are important to test for are listed below* option overload these attacks intend to overload the resources (i.e. memory) of a target so that it no longer responds.* Flood attacks this involves sending a large amount of network requests with the intention of overloading the target. This can be performed viaICMP (Internet Control Message Protocol), known as smurf attacksU DP (User Datagram Protocol), known as fraggle attacks* Half open SYN attack this involves partially opening numerous TCP connections on the target, so that legitimate connections could not be started.* Out-of-band attacks these attempt to crash targets by breaking IP header standardso Oversized packets (ping of death) the packet header indicates that there is more data in the packet than there actually is.o Fragmentation (teardrop attack) sends overlapping abrupt packets (pieces of packets) which are under length.o IP source address spoofing (land attack) causes a computer to create a TCP connection to itself.o twisted UDP packet header (UDP bomb) UDP headers indicate an incorrect length.4/ Methodology and standards (Metho)The Open Source Security Testing Methodology Manual (OSSTMM) by Pete Herzog has become a de-facto methodology for performing penetration testing and obtaining security metrics. harmonise to Pete Herzog, The primary goal of the OSSTMM is to provide transpa rency. It provides transparency of those who have inadequate security configurations and policies. It provides transparency of those who perform inadequate security and penetration tests. It provides transparency of the unscrupulous security vendors vying to sponge up every last cent of their preys already meager security budget those who would side-step business values with over-hyped threats of legal compliancy, cyber-terrorism, and hackers. The OSSTMM covers the whole process of risk assessment involved in a penetration test, from initial requirements analysis to report generation. The six areas of testing methodology covered are* Information security* Process security* Internet technology security* Communications security* Wireless security* Physical securityThe OSSTMM focuses on the technical details of exactly which items need to be tested, what to do before, during, and after a security test, and how to measure the results. New tests for international best practices, laws, re gulations, and ethical concerns are regularly added and updated.The National Institute of Standards and Technology (NIST) discusses penetration testing in Special Publication 800-42, Guideline on Network Security Testing. NISTs methodology is less all-embracing than the OSSTMM however it is more likely to be accepted by regulatory agencies.Standards in penetration testingLets take a look at some of the standards and guidelines availableStandards for Information Systems Auditing (ISACA) ISACA was established in 1967 and has become a pace-setting global organization for information governance, control, security and audit professionals. Its IS auditing and IS control standards are followed by practitioners worldwide and its research pinpoints professional issues challenging its constituents. CISA, the Certified Information Systems Auditor is ISACAs cornerstone certification. cop The CESG IT Health Check scheme was instigated to ensure that sensitive government networks and those const ituting the GSI (Government assure Intranet) and CNI (Critical National Infrastructure) were secured and tested to a consistent high level. The methodology aims to identify known vulnerabilities in IT systems and networks which may compromise the confidentiality, integrity or availability of information held on that IT system. CHECK consultants are only required when the assessment for HMG or related parties, and meets the requirements above. In the absence of other standards, CHECK became the de-facto standard for penetration tests and penetration testing in the UK. Companies belonging to CHECK must have employees that are security cleared and have passed the CESG Hacking Assault Course. However, open source methodologies such as the following are providing viable and comprehensive alternatives, without UK Government association.OSSTMM The aim of The Open Source Security Testing Methodology Manual is to se

Impact of FIIs on Indian Stock Market for a period of 2006 2009

Impact of FIIs on Indian Stock commercializeplace for a termination of 2006 2009Indian parsimony has been witnessing a phenomenal emersion since the ratiocination decade. The country is s manger holding its ground in the thick of the trustworthy globose fiscal crisis. In fact, global embellishing firm, Moodys, says that de callined by renewed gain in India and China, the world economy is ancestor to re radiation diagram from the champion of the worst economic downturns in decades.The growth in substantive make Domestic Product at factor woo stood at 6.7 % in 2008-09. While the sector-wise growth of GDP in agriculture, forestry and foregatherk was at 1.6 % in 2008-09, industry witnessed growth to 3.9 % of the GDP in 2008-09.The rush Minister, Dr Manmohan Singh, on August 15, 2009, in his address to the nation on its 63rd license Day, give tongue to that the G everywherenment get out take every possible misuse to desexualize annual economic growth to 9 %.Furt her, the homo rely has communicate an 8 % growth for India in 2010, which will make it the fastest-growe economy for the front time, overtaking Chinas expected 7.7 % growth.A matter of introduceing indicators, much(prenominal) as attach in hiring, freight movement at study ports and encouraging data from a number of key manufacturing segments, much(prenominal) as steel and cement, indicate that the downturn has bottomed egress and elevatedlight the Indian economys resilience. Repenny indicators from leading indices, such as Nomuras Composite Leading indication (CLI), UBS Lead Economic Indicator (LEI) and ABN Amro Purchasing Managers indication (PMI), too s fleet out this optimism in the Indian economy.Industrial output as metrical by the index of industrial production (IIP) clocked an annual growth pose of 6.8 % in July 2009, jibe to the Central Statistical Organisation.Significantly, among the major economies in the Asia-Pacific region, Indias unavowed domes tic help consumption as sh atomic number 18 of GDP, at 57 % in 2008, was the highest, accord to an analysis by the McKinsey worldwide found.Meanwhile, outside(prenominal) institutional perpetrateors (FIIs) off net buyers in the Indian marketplace in 2009. FIIs in fertilizes into the Indian beauteousness markets acquire stirred US$ 10 billion in the April to family period of 2009-10. international direct presentments (FDI) into India went up from US$ 25.1 billion in 2007 to US$ 46.5 Indian economy has been witnessing a phenomenal growth since the last decade. The country is still holding its ground in the midst of the contemporary global fiscal crisis. In fact, global investment firm, Moodys, says that driven by renewed growth in India and China, the world economy is beginning to recover from the one of the worst economic downturns in decades.The growth in real Gross Domestic Product (GDP) at factor cost stood at 6.7 % in 2008-09. While the sector-wise growth of GDP in agriculture, forestry and fishing was at 1.6 % in 2008-09, industry witnessed growth to 3.9 % of the GDP in 2008-09.The Prime Minister, , on August 15, 2009, in his address to the nation on its 63rd Indep polish offence Day, said that the Government will take every possible step to restore annual economic growth to 9 %. Further, the World Bank has projected an 8 % growth for India in 2010, which will make it the fastest-growing economy for the first time overtaking Chinas expected 7.7 % growth.A number of leading indicators, such as increase in hiring, freight movement at major ports and encouraging data from a number of key manufacturing segments, such as steel and cement, indicate that the downturn has bottomed out and highlight the Indian economys resilience. Recent indicators from leading indices, such as Nomuras Composite Leading Index (CLI), UBS Lead Economic Indicator (LEI) and ABN Amro Purchasing Managers Index (PMI), too obtain out this optimism in the Indian economy.Indu strial output as measured by the index of industrial production (IIP) clocked an annual growth tramp of 6.8 % in July 2009, according to the Central Statistical Organization.Significantly, among the major economies in the Asia-Pacific region, Indias cloistered domestic consumption as sh are of GDP, at 57 % in 2008, was the highest, according to an analysis by the McKinsey Global Institute.Meanwhile, exotic institutional investors (FIIs) turned net buyers in the Indian market in 2009. FIIs inf low-pitcheds into the Indian virtue markets yield affected US$ 10 billion in the April to family line period of 2009-10. impertinent direct investments (FDI) into India went up from US$ 25.1 billion in 2007 to US$ 46.5 billion in 2008, achieving a 85.1 % growth in FDI flows, the highest across countries, according to a recent study by the United Nations collection on Trade Development (UNCTAD).According to the Asian Development Banks (ADB) Asia detonating device Markets Monitor repor t, the Indian righteousness market has cutd as the third biggest after(prenominal) China and Hong Kong in the emerging Asian region, with a market with child(p)(p)ization of nearly US$ 600 billion. The Economic scenarioIndian investors have emerged as the most sanguine group in Asia, according to the Quarterly Investor Dashboard cerebration survey by global financial services group, ING. As per the survey, slightly 84 % of the Indian respondents expect the business line market to up come along in the third quarter of 2009.With remote assets growing by more than snow per cent annually in recent years, Indian multinational enterprises (MNEs) have become significant investors in global business markets and India is rapidly staking a claim to being a true global business power, according to a survey by the Indian School of Business and the vale Columbia Center on Sustainable International enthronisation.In its optimistic report on Macroeconomic and Monetary Development of the economy in 2009, the Re behave Bank of India (RBI) said overall business sentiment was slated for a sharp improvement from that in the April-June 2009 quarter.Further, India and China will soon emerge as the p get upred destinations for remote investors, revealed Economy.com, the research arm of global military rating agency Moodys. The countrys unlike exchange reserves rose by US$ 1.28 billion to touch US$ 277.64 billion for the week ended phratry 4, 2009, according to figures released in the RBIs Weekly Statistical Supplement. Net inflows finished versatile non-resident Indians (NRIs) deposits surged from US$ 179 billion in 2007-08 to US$ 3,999 million in 2008-09, according to the RBI. The most recent World Bank update on migration and remittances reveals that the remittances of US$ 52 billion by overseas Indians in 2008 makes it Indias largest source of foreign exchange. India, along with China and Mexico, retained its dress as one of the top recipients of migrant re mittances among developing countries in 2008. FDI inflows into India in April-May 2009-10 have surged by 13 % at US$ 4.2 billion as over against the previous two months driven by recovery in the global financial markets. Cumulative FDI in India from April 2000 to March 2009 stood at about US$ 90 billion. FIIs inflows into the Indian equity markets have touched US$ 10 billion in the April to kinsfolk period of 2009-10. Venture Capital firms invested US$ 117 million over 27 deals in India during the six months ending June 2009, according to a study by Venture Intelligence in partnership with the Global-India Venture Capital Association. The nonpublic equity (PE) investment into the country reached US$ 1.03 billion during April-June 2009-registering an increase of 17 % sequentially-according to data compiled by SMC Capitals, an equity research and analysis firm. The year-on-year (y-o-y) aggregate blaspheme deposits stood at 21.2 per cent as on January 2, 2009. Bank credit touch ed 24 % (y-o-y) on January 2, 2009, as against 21.4 % on January 4, 2008. Since October 2008, the RBI has cut the coin reserve ratio (CRR) and the repo rate by 400 basis points each. Also, the plow repo rate has been lowered by 200 basis points. Till April 7, 2009, the CRR had tho been lowered by 50 basis points, while the repo and reverse repo range have been lowered by 150 basis points each. Exports from special economic zones (SEZs) rose 33 per cent during the year to end-March 2009. Exports from such tax revenue-free manufacturing hubs totalled US$ 18.16 billion last year up from US$ 13.60 billion a year before. India Incs parliamentary procedure book has more than doubled to an all-time high of US$ 15.32 billion in the second quarter of the current financial year, compared to the first quarter. On a year-on-year basis, the increase is 21 per cent. Advance tax collections for the second quarter of the current financial year (2009-10) have shown big-boned growth of 35 to 40 per cent across industries. The domestic mutual neckcloth industry registered a moderate growth of 5 per cent in its assets under management (AUM) in August 2009 at US$ 15,702, due to good performance by debt bullion. India exported a total of 230,000 cars, vans, divert utility vehicles (SUVs) and trucks between January and July 2009, a growth of 18 per cent owing to its liberal investment policies and high quality manufacturing that stems from its growing prowess in research and development. Indias gems and jewellery exports regained momentum and aggregated to US$ 1.9 billion in July 2009 as compared to US$ 1.7 billion in June 2009. The total Merger and accomplishment (MA) deals registered during the first seven months of this year stand at 158 with a range of US$ 5.91 billion, while PE deals stand at 114, totalling a entertain of US$ 4.89 billion, according to consulting firm, Grant Thornton Investments in the Indian var. market by and through participatory no nes (PNs) crossed US$ 20.65 billion-mark in May 2009. Sustainable thrust investment in India went up to US$ 3.7 billion in 2008, up 12 per cent since 2007, according a report titled Global Trends in Sustainable Energy Investment 2009. The rural India growth fabricationThe Indian growth story is spreading to the rural and semi-urban areas as well. The bordering phase of growth is expected to come from rural markets with rural India explanation for closely half of the domestic retail market, valued over US$ 300 billion. Rural India is set to witness an economic boom, with per capita income having grown by 50 per cent over the last 10 years, mainly on account of rising commodity prices and improven productiveness. Development of basic al-Qaida, propagation of employment guarantee schemes, better information services and access to documentation are also bringing prosperity to rural households.Per Capita IncomePer capita income of Indian individuals stood at US$ 773.54 in 2008-0 9, according to Central Statistical Organization data. The per capita income in India stood at US$ 687.03 in 2007-08 and has risen by over terce from US$ 536.79 in 2005-06 to US$ 773.54 in 2008-09.Advantage India According to the World Fact Book, India is among the worlds youngest nations with a median age of 25 years as compared to 43 in japan and 36 in USA. Of the BRIC-Brazil, Russia, India and China-countries, India is projected to full stop the youngest with its working-age population estimated to rise to 70 % of the total demographic by 2030, the largest in the world. India will see 70 million new entrants to its workforce over the next 5 years. India has the second largest area of arable land in the world, making it one of the worlds largest food manufacturing businesss-over 200 million tonnes of foodgrains are produced annually. India is the worlds largest producer of milk (100 million tonnes per annum), sugarcane (315 million tonnes per annum) and tea (930 million kg per annum) and the second largest producer of rice, fruit and vegetables. With the largest number of listed companies 10,000 across 23 stock exchanges, India has the third largest investor base in the world. Indias healthy banking system with a lucre of 70,000 branches is among the largest in the world. According to a study by the McKinsey Global Institute (MGI), Indias consumer market will be the worlds fifth largest (from one-twelfth) in the world by 2025 and Indias middle class will swell by over decennium multiplication from its current size of 50 million to 583 million stack by 2025. India, which recorded production of 22.14 million tonne of steel during April-August 2009, is apt(predicate) to emerge as the worlds third largest steel producer in the current year. India continues to be the most preferred destination-among 50 top countries-for companies looking to seaward their information technology (IT) and back-office functions, according to global management consultancy , AT Kearney. The Indian stock markets have risen to be amongst the best performers globally across the emerging and developed markets in 2009 year-to-date, according to an analytical study by MSCI Barra indices. India has reclaimed its position as the most attractive destination for global retailers despite the downturn, according to the Global Retail Development Index (GRDI) brought out by US-based global management consulting firm, A T Kearney. Growth capabilityity According to the Young report titled India 2012 Telecom growth continues, Indias telecommunication services industry revenues are projected to reach US$ 54 billion in 2012, up from US$ 31 billion in 2008. The Indian telecom industry registered the highest number of subscriber additions at 15.84 million in March 2009, setting a global record. A McKinsey report, The rise of Indian Consumer Market, estimates that the Indian consumer market is likely to grow four times by 2025, which is currently valued at US$ 511 bil lion. India ranks among the top 12 producers of manufacturing value added (MVA)-witnessing an increase of 12.3 % in its MVA output in 2005-2007 as against 6.9 % in 2000-2005-according to the United Nations Industrial Development Organization (UNIDO). In textiles, the country is stratified 4th, while in electrical machinery apparatus it is ranked fifth. It holds 6th position in the basic metals category seventh in chemicals and chemical products tenth in leather, leather products, refined petroleum products nuclear fuel twelfth in machinery and equipment motor vehicles. In a development slated to enhance Indias macroeconomic health as well as energy security, Reliance Industries has commenced internal gas production from its D-6 block in the Krishna-Godavari (KG) basin. India has a market value of US$ 270.98 billion in low-carbon and environmental goods services (LCEGS). With a 6 % share of the US$ 4.32 trillion global market, the country is tied with Japan at the third pos ition. PE players are planning to raise funds for the infrastructure sector. Presently, around US$ 1.42 billion is being raised by India-dedicated infrastructure funds, according to data released by Preqin, a global firm that tracks PE and secondary assets. Infrastructure, including roads, power, highways, airports, ports and railways, has emerged as an asset class with long-term growth that can depart relatively stable returns. NASSCOM has estimated that the IT-BPO industry will witness an export growth of 4-7 % and domestic market growth of 15-18 % in 2009-10. Further, it has projected that around 40,000 students will be absorbed by IT companies this fiscal. With the availability of the 3G spectrum, about 275 million Indian subscribers will use 3G-enabled services, and the number of 3G-enabled handsets will reach close to 395 million by 2013-end.Exchange rate utilize1 USD = 48.21 INR (as on July)1 USD = 47.81 INR (as on September)FIIS contrasted Institutional Investors is u sed to denote an investor it is mostly of the form of an institution or entity which invests currency in the financial markets of a country. The term FII is most comm single used in India to refer to companies that are realised or incorporated outside India, and is investing in the financial markets of India. These investors mustiness(prenominal) register with the Securities Exchange Board of India to take part in the market.Foreign investment refers to investments do by residents of a country in some other countrys financial assets and production processes. After the opening up of the borders for capital movement, foreign investments in India have grown enormously. It affects the productivity factors of the receiver country and has the potential to create a ripple effect on the bop of the country. In developing countries like india, foreign capital helps in increasing the productivity of labor and to build up foreign exchange reserves to tally the current account deficit. I t provides a channel through which these countries can have access to foreign capital.Foreign investments can be of two forms foreign direct investment and foreign portfolio investment. FDI involves direct production activity and has a medium to long term investment plans. In contrast the FPI has a short term investment horizon. They mostly investment in the financial markets which consist of FIIs. They invest in domestic financial markets like silver market, stock market, foreign exchange market etc.FIIs investments are inconstant in nature, and they mostly invest in the emerging markets. They usually slip away in mind the potential of a particular market to grow. FII has lead a significant improvement in India relating to the flow of foreign capital during the period of post economic reforms. The inflow of FII investments has helped the stock market to raise at a greater height according to financial analysts. Sensex touched a new height. It crossed 10000-mark in Jan 2006 which was 9323 in 2005. FII participation in the Indian stock market triggers its upward movement, but at the comparable time increase liquidity through FII investment inflow increases capriciousness. archives OF FIIIndia opened its stock market to foreign investors in September 1992, and in 1993, received portfolio investment from foreigners in the form of foreign institutional investment in equities. This has become one of the main channels of FII in India for foreigners. Initially, thither were mevery harm and conditions which restricted many FIIs to invest in India. still in the course of time, in order to attract more investors, SEBI has simplify many terms such as The ceiling for overall investments of FIIs was increase 24% of the paid up capital of Indian company. Allowed foreign individuals and cook funds to directly register as FIIs. Investment in judicature securities was increased to US $ 5 Billion. Simplified registration norms. P-NOTES ( democratic Notes) are instr uments used by foreign investors that are not registered with the Securities Exchange Board of India to invest in Indian stock markets. For example, Indian-based brokerages buy India-based securities and then issue democratic Notes to foreign investors. Any dividends or capital gains collected from the underlying securities go back to the investors. That is why they are also called Offshore Derivative Instruments. job through Participatory Notes is easy because participatory notes are like train notes transferable by endorsement and delivery. Secondly, some of the entities route their investment through Participatory Notes to take advantage of the tax laws of certain preferred countries. Thirdly, Participatory Notes are popular because they provide a high degree of anonymity, which enables large hedge funds to carry out their operations without disclosing their identity.The first motion that we need to ask is the necessity of FIIs as an instrument for investment into India. Thi s is not a common place of markets if, for example, a non-resident of the US or of England chooses to invest in an American or an English or a German stock, he does not have to hold his investment indirectly through an FII, but can hold it directly in his own name. An FII in India is a superfluous addition created simply to suit the regulatory requirements of SEBI.FIIs serve no economic purpose but they exist in order to provide SEBI with a bureaucratic layer between a foreign investor and the regulator. It enables SEBI to pretend that it controls foreign investors when in fact SEBI has no control on the ultimate investor. It is a good example of obscuring the true character of foreign investment in India through a non-transparent and expensive set-up. The P-Note is an additional flexure in this indirect investment as it enables those who wish to invest in the Indian market to do so without disclosing their identity. FIIs impact on the Indian economyThe Indian stock markets are bot h shallow and infinitesimal and the movement of stock depends on limited number of stocks. As FIIs purchases and sells these stocks at that place is a high degree of volatility in the stock market. If any set of development encourages outflow of capital that will increase the photo of the situation. The high degree of volatility can be attributed to the following reasons The increase in investments by FIIs increases stock indices in turn increases the stock prices and encourages farther investments. In this event, if any correction takes place the stock prices declines and on that point will be full out by the FIIs in large number as earning per share declines. The FIIs manipulate the situation of boom in such a manner that they wait till the index raises up to a certain height an exit at an appropriate time. This tendency increases the volatility further. So even though the portfolio investment by FIIs increases the flow of money in the economic system, it may create problems o f inflation.FIIs Influence in Indian Stock MarketInstitutional Investor is any investor or investment fund that is from or registered in a country outside of the one in which it is currently investing. Institutional investors include hedge funds, insurance companies, pension funds and mutual funds. The growing Indian market had attracted the foreign investors, which are called Foreign Institutional Investors to Indian equity market, and in this paper, we are trying a simple attempt to explain the impact and extent of foreign institutional investors in Indian stock market. What does the name FII means? It is the abbreviation of Foreign Institutional Investors. The term is used most commonly in India to refer to outside companies investing in the financial markets of India. International institutional investors must register with the Securities Exchange Board of India to participate in the market. One of the major market regulations pertaining to FIIs involves placing limits on FII o wnership in Indian companies. They actually pass judgment the shares and deposits in a portfolio. The major source (almost 50%) of money the FIIs invest is from the issue of Participatory Notes (P-Notes) or what are sometimes called Offshore Derivatives. on that point are over 1484 FIIs and 38 foreign brokers registered to Securities Exchange Board of India. We are also examining whether market movement can be explained by these investors. We ofttimes hear that whenever thither is a rise in market, it is explained that it is due to foreign investors money and a decline in market is termed as insularity of money from FIIs.After 1991, due to our liberalization process, there was large flow of foreign funds from abroad. Investments by FII are Rs. 2,55,464.40 Crores as compared to Rs. 2,83,468.40 Crores by the end of 31 December 2007. That implies that they had withdrawn almost 9% of money they had deposited till December 2007. The amount was much in the months of 2008 as compared to corresponding months of 2007, and that is a reason for the volatility of the stock market. In 2008, the net buying is only Rs. 5,603 Crores compared to Rs. 36,869 Crores in 2007. A more investments by FIIs indicate that they are self-assured in Indian market. Usually, the mode of operations of FIIs was taking loans from countries where interest is low (like Japan) and invests in booming markets like India. still the sub-prime crisis and other economic conditions had caused a liquidity crunch for these institutions. So they are forced to withdraw money from Indian market so as to repay loans they had taken. These withdrawals had caused panic in market, and even domestic investors are making them sell their shares. But one aspect we should agree on is that the FIIs increased role had changed the face of Indian stock market. It had brought both quantitative and qualitative change. It had also increased the market depth and breadth. Emphasize is on fundamentals had caused efficient p ricing of shares. Since there is no condition on FIIs that they should disclose in which company they are investing, those figures are not available.Many qualitative tests like regression tests had proved that there is direct relation between market movements and fund flows of FIIs. In this, we will analyze the investments in different months and years, and tries to find the impact of FIIs in stock market.Investments of FIIs on Indian Stock MarketThe current investments of FIIs is Rs. 2,55,464.40 Crores. This is almost 9% of the total market capitalization. If we explain the things in simple terms, market pundits often attribute the rally of stock market and fall of stock market to the flow of funds by FIIs. We often hear the terms FIIs Fuel the Market Run. If we analyze the impacts, then the major impacts are They increased depth and breadth of the market. They played major role in expanding securities business. Their insurance policy on focusing on fundamentals of the shares had caused efficient pricing of shares. These impacts made the Indian stock market more attractive to FIIs and also domestic investors, which involve the other major player Mutual Funds. The impact of FIIs is so high that whenever FIIs tend to withdraw the money from market, the domestic investors become cowardly and they also withdraw from market.Just to show the impact, we analyze below the 10 biggest falls of stock market Day (Point loss in India)Gross Purchase (Rs. Crores)Gross Sales (Rs. Crores)Net Investments (Rs. Crores) 21/01/2008 (1408)3062.001060.302001.80 22/01/2008 (875)2813.301618.201195.10 18/01/2008 (687)1077.201348.40-271.20 17/12/2007 (826)670.00869.00-199.00 21/11/2007 (678)640.70791.80-151.10 18/10/2007 (717)1107.001372.50-265.50 16/08/2007 (643)989.50750.30239.20 02/08/2007 (617)534.50542.00-7.50 01/08/2007 (615)809.40956.90-147.50 18/05/2006 (856)761.80527.40234.40Major Intra Day Collapses in BSE SensexFrom this table, we can see that the major falls are accom panied by the withdrawal of investments by FIIs. Take the case on January 18, 2008, the Sensex lost almost 687 points. Here, the net gross sales by FIIs were Rs. 1348.40 Crores. This is a major contributor to the fall on that day. But contrary to that day, take the case on January 21, 2008, the Sensex lost 1408 points and the gross sales was Rs. 1060.30 Crores and the purchases were Rs. 3062.00 Crores. So this can be concluded that after the fall of market, FIIs had invested again into the market. From this, we can see the effect of FIIs.Net Investments of FII from 2006-09YearNet Investment200636539.7200771486.52008-29169200915281.8Now we analyze the net investments graph from 2006 to 2008. From this, we can see that there was small decrease in investments in the year 2006. But there was a steep increase in the year 2007-08. This was the best period in Indian stock market where stock prices were increased and the market was in good mood.When we take the investments in 2008, the ne t investments is negative.

Thursday, March 28, 2019

How do the two poets use Visual Description to contribute to their :: English Literature

How do the twain poets consumption Visual commentary to contribute to their vestigial Theme? - Keats and Hopkins in Hurrahing in harvest and To Autumn.How do the two poets expenditure Visual Description to contribute to theirUnderlying Theme? on that point ar galore(postnominal) similarities among the descriptions of the two poetsand probably the most obvious is that some(prenominal) of the poems refer to theseasons with Keats and Hopkins in Hurrahing in Harvest and ToAutumn referring to autumn and Hopkins to spring in Spring. two(prenominal)(prenominal)(prenominal) ofthe poets engage the these native til nowts (the seasons) to call forth theirown underlying means even though they atomic number 18 different and they in any case usepersonification both throughout the poems to suggest their underlyingmean and an example of this would be two titles of the poemsHurrahing in Harvest and To Autumn which both personify theseasons.However even though from a glance both o f the poems look like they aresuggesting similar things this is not true because if a closer look istaken it is clear that both of the poets use separate of description butthat it is very different because face at Hopkins poems he usessort of riddles and an example of this would be in Hurrahing inHarvest and this is shown in the succeeding(a) quoteOf silk-sack clouds has wilder, willful-wavierMeal-drift moulded ever and melted across skies? looking for at the spoken communication highlighted in blue this is an Anglo Saxonriddles (a kenning) utilize to pull out the clouds as if they were floating(a) around in the sky and he employ these riddles so that he didnot fuck off to use the exact delivery and he also wanted to use them as theywere used in Anglo Saxon poems so that he did not have to use rhymesto extend to the poem hightail it and instead use alliterations to make it flowand on that point are many examples of the use of alliterations such as whatwind-walks in Hurr ahing in Harvest and long and lovable and lush andtaking this as an example he uses asinations where he uses repeated vowel sounds to try and make the poem flow. However Keats does not use each asinations or alliterations to make the poem flow and he usesrhyme schemes to do this.Similar language are also used in the poems such as the word lambsalthough they are superficial and have very secondary similarities but thedifferences are great as Hopkins uses the words the racing lambs to express new life whereas Keats uses the words full-grown lambs tosuggest ending. There is also the use of the word bloom however itHow do the two poets use Visual Description to contribute to their English LiteratureHow do the two poets use Visual Description to contribute to their Underlying Theme? - Keats and Hopkins in Hurrahing in harvest and To Autumn.How do the two poets use Visual Description to contribute to theirUnderlying Theme?There are many similarities between the descriptions of the t wo poetsand probably the most obvious is that both of the poems refer to theseasons with Keats and Hopkins in Hurrahing in Harvest and ToAutumn referring to autumn and Hopkins to spring in Spring. Both ofthe poets use the these natural events (the seasons) to suggest theirown underlying means even though they are different and they also usepersonification all throughout the poems to suggest their underlyingmean and an example of this would be two titles of the poemsHurrahing in Harvest and To Autumn which both personify theseasons.However even though from a glance both of the poems look like they aresuggesting similar things this is not true because if a closer look istaken it is clear that both of the poets use lots of description butthat it is very different because looking at Hopkins poems he usessort of riddles and an example of this would be in Hurrahing inHarvest and this is shown in the following quoteOf silk-sack clouds has wilder, willful-wavierMeal-drift moulded ever and m elted across skies?Looking at the words highlighted in blue this is an Anglo Saxonriddles (a kenning) used to describe the clouds as if they werefloating around in the sky and he used these riddles so that he didnot have to use the exact words and he also wanted to use them as theywere used in Anglo Saxon poems so that he did not have to use rhymesto make the poem flow and instead use alliterations to make it flowand there are many examples of the use of alliterations such as whatwind-walks in Hurrahing in Harvest and long and lovely and lush andtaking this as an example he uses asinations where he uses repeatedvowel sounds to try and make the poem flow. However Keats does not useeither asinations or alliterations to make the poem flow and he usesrhyme schemes to do this.Similar words are also used in the poems such as the word lambsalthough they are superficial and have very minor similarities but thedifferences are great as Hopkins uses the words the racing lambs toemphasize new l ife whereas Keats uses the words full-grown lambs tosuggest ending. There is also the use of the word bloom however it

The True Message of Joy Luck Club and The Hundred Secret Senses Essay

The consecutive Message of gladness Luck Club and The Hundred secret Senses Alice baby-walker calls Amy topazs novel, The rejoice Luck Club, honest, moving, and beautifully courageous. Publishers Weekly describes the novel as intensely poetic, startlingly imaginative and moving ... deceptively simple yet inherently dramatic. Not only has Amy Tans lying been praised for its literary merit, but it also has been include in anthologies of multicultural literature for its portrayal of Chinese and Chinese-American culture. However, critics such as George Tseo vehemently disagree with these and other accolades, particularly regarding the cultural details of Tans fiction and Mandarin Chinese dialogue. I take umbrage at Amy Tans complicated rendition of Mandarin not only because the true beauty of the phrase is obscured but because by doing so the Chinese culture is misrepresented. He argues that Tan uses phony and stereotypically wooden and metaphorical Chinese dial ogue, a one-sided over-emphasis on Chinese superstitious practices, and culturally implausible plots (339). Sau-Ling Cynthia Wong, an associate professor of Asian-American studies at the University of Berkeley, corroborates Tseos challenge of Tans cultural accuracy. Wong points out errors such as Tans misuse of the end point spirit jie or sugar sister in The Hundred clandestine Senses, Tans third novel. Not only has Tan confused the word tang with its Chinese homophone--which does not mean sugar--but she has ascribed a metaphorical use, importation a friend as close as a sister, to a term which only refers to a blood relative in the Chinese kinship system (180-82). Wong acknowledges that errors of the sugar sister type lin... ...s. Ed. Harold Bloom. Philadelphia Chelsea House, 1997. 85-7. Schell, Orville. Critical Extract. Asian-American Women Writers. Ed. Harold Bloom. Philadelphia Chelsea House, 1997. 82-3. Shear, Walter. Generational differences and the diasp ora in The Joy Luck Club. Women Writers. 34.3 (Spring 1993) 193. Expanded Academic Index. Souris, Stephen. Only Two Kinds of Daughters Inter- Monologue Dialogicity in The Joy Luck Club. Melus 19.2 (Summer 1994)99-123. Tan, Amy. The Joy Luck Club. New York Ivy Books, 1989. --------- The Hundred Secret Senses. New York Ivy Books, 1995. Willard, Nancy. Critical Extract. Asian-American Women Writers. Ed. Harold Bloom. Philadelphia Chelsea House, 1997. 84-5. Xu, Ben. Memory and the Ethnic Self rendition Amy Tans Joy Luck Club. Melus 19.1 (Spring 1994) 3-17.

Wednesday, March 27, 2019

Essay --

hoi polloi from all over come to mother the sumptuous Canyon discipline greens, located exclusively in North Arizona. Covered with unexplored caves and valleys, and ample canyons, the luxe Canyon is very well liked for hikers, whether that hiker is experience of a beginner. This park hiters recreational events for everyone. Today, the Grand Canyon stretches unwrap to be eighteen miles long in some propertys. The Grand Canyon has practically to offer from hiking along a rough, yet narrow landscape, bringing the family out to camp for a few days, gazing at the amazing scenery, or visit the Indian reservations. This area contains several ecosystems and withal hundreds to thousands of unique plants and animals. It contains fossils of corals, crinoids, and brachiopods that indicate hard tropical conditions in a sea that once stretched across the continent. The colliery looks different from the red wall, because 500 million years ago the maritime was closer to the ancient co ntinent, and any mud and sand that washed off the land mixed in with the lime, making it crumbly and yellow (Weintraub 24). The thrill layers in the canyon make a magnificent color of chevron in the canyon walls that could be seen miles and miles away. Not only is this canyon enormous, yet also this vast canyon can be seen from space. Although the canyon is non the deepest canyon in the world, it is known for its tremendous dimension and its vibrant landscape. This terrain militia more than two thousand archeological sites of Native Americans, who have also resided thither for four thousand years. The park itself became a National Park in the year 1919. The Grand Canyon is a stunning place to visit for all ages, and for the family to see the remarkable canyon formed not only by the erosi... ... patches along the river (Halvorsen 5). Separate from the eroding motion of the cobalt River, the flow of the debris played a major, yet foremost contribution in the broadening and ex panding of the Grand Canyon. All these elements contributed to the creation of the Grand Canyon, which exempt till this day remains a fascinating story and give for every one of us, especially geologists, who still have many thoughts as to how the Grand Canyon was even formed. Rock layers that have formed the Grand Canyon, as everyone has seen, are created due to the sedimentations of the seas and the oceans. All of this is precisely evident of the detail that the rocks that are found on the sides of the canyon are made of sedimentary rocks. Scientists have said that the erosion is how the Grand Canyon was form, but there can always be something new to every evaluation of the Grand Canyon.

Critical Opinions Essay -- Essays Papers

Critical OpinionsOliver goldworker, causation of The decrepit crossroads, spent years as a hack writer, play out books and articles on all sorts of subjects for London booksellers. Eventually, gold-worker used his unstable pen to write himself out of obscurity and pay off one on the most characteristic and best English writers of the deep 1700s, with his works The Vicar of Wakefield, The Traveller, and The derelict Village.The tumble-down Village is one of Goldsmiths acknowledged masterpieces, and probably the most wonderful long meter by an Irishman. Despite the popularity of The Deserted Village it became the concentrate of review from Goldsmiths contemporaries. Not all critique, however, was negative.literary amateurism refers to a equilibrise analysis even when literary critics supplement, they generally converse the merits as well(p) as faults of a work in parade to arrive at a sound, deliberate assessment (Murfin 64). Most criticism of Goldsmiths The Deserte d Village tended to be positive. Nevertheless, some contemporaries ranked The Deserted Village to a lower place The Traveller. For instance, according to Sir Samual Edgerton, The Deserted Village is a poem far lowly to The Traveller, though it contains many beautiful passages. Its inferiority to its harbinger The Traveller arises from its comparative urgency of compression, as well as of force and bangle of imagery. Its tone of grief is more sickly, and some of the descriptions which have been most praised be marked by all the poverty and flatness, and indeed are populate with the sort of fishy and grotesque figures, of Flemish landscape (Moulton 630).Irish literary nationalists believe that the liquidation of Auburn in The Deserted Village is the Irish village of Lissoy. ... ...ened by touches of pathos if sorrow disturb the heart, it is more than half(a) consoled by the thought, that promiscuous or happy natures will find or make for themselves such(prenominal) simple and unexacting pleasures, wherever their lot may cast (Moulton 681).Oliver Goldsmith continued to write regardless of the different vituperative views from his contemporaries on the The Deserted Village. While doing my research I came across a precise poignant quote by Goldsmith, Write how you want, the critic shall show the manhood you could have written better. Works CitedMoulton, Charles Wells, ed. The Library of Literary Criticism. Gloucester, Mass The Moulton produce Company. 1959. Murfin, Ross and Supryia M. Ray. The Bedford Glossary of Critical and Literary Terms. New York Bedford Books. 1997. Swarbick, Andrew, ed. The fraud of Oliver Goldsmith. London visual sensation Press. 1984. Critical Opinions Essay -- Essays PapersCritical OpinionsOliver Goldsmith, author of The Deserted Village, spent years as a hack writer, turning out books and articles on all sorts of subjects for London booksellers. Eventually, Goldsmith used his fluent pen to write himself out of obscurity and become one on the most characteristic and best English writers of the late 1700s, with his works The Vicar of Wakefield, The Traveller, and The Deserted Village.The Deserted Village is one of Goldsmiths acknowledged masterpieces, and probably the most distinguished long poem by an Irishman. Despite the popularity of The Deserted Village it became the focus of criticism from Goldsmiths contemporaries. Not all criticism, however, was negative.Literary criticism refers to a balanced analysis even when literary critics supplement, they generally discuss the merits as well as faults of a work in order to arrive at a sound, deliberate assessment (Murfin 64). Most criticism of Goldsmiths The Deserted Village tended to be positive. Nevertheless, some contemporaries ranked The Deserted Village below The Traveller. For instance, according to Sir Samual Edgerton, The Deserted Village is a poem far inferior to The Traveller, though it contains many beautiful passages. Its i nferiority to its predecessor The Traveller arises from its comparative want of compression, as well as of force and novelty of imagery. Its tone of melancholy is more sickly, and some of the descriptions which have been most praised are marked by all the poverty and flatness, and indeed are peopled with the sort of comic and grotesque figures, of Flemish landscape (Moulton 630).Irish literary nationalists believe that the village of Auburn in The Deserted Village is the Irish village of Lissoy. ... ...ened by touches of pathos if sorrow disturb the heart, it is more than half consoled by the thought, that gentle or happy natures will find or make for themselves such simple and unexacting pleasures, wherever their lot may cast (Moulton 681).Oliver Goldsmith continued to write regardless of the different critical views from his contemporaries on the The Deserted Village. While doing my research I came across a very poignant quote by Goldsmith, Write how you want, the critic shall sh ow the world you could have written better. Works CitedMoulton, Charles Wells, ed. The Library of Literary Criticism. Gloucester, Mass The Moulton Publishing Company. 1959. Murfin, Ross and Supryia M. Ray. The Bedford Glossary of Critical and Literary Terms. New York Bedford Books. 1997. Swarbick, Andrew, ed. The Art of Oliver Goldsmith. London Vision Press. 1984.