Wednesday, October 30, 2019

Used Book Business Essay Example | Topics and Well Written Essays - 750 words

Used Book Business - Essay Example Location – Used book stores are best suited to be located in high traffic region. A store in the vicinity of a university or college will have added advantage. Shopping malls and popular hangouts are also preferred location for used book store. Proximity to new book store is also ideal. Manpower – A good number of people should be involved in the business to source, refer and negotiate the purchase of books from the initial owner to the prospective buyer. Over the counter sales has to be assigned only to book lovers who have an outgoing attitude, business aptitude and are personable. Training employees at various level of operation will enable them to handle the store in the absence of the owner. Promotion – It may be noted that used book buyer is usually not an in depth reader. Hence adequate marketing and promotional activities should be carried to bring in people to the store to browse through the used books. Design of the store – The used book store should have a clear show window with the arrangement of books in uncluttered style. Prospective buyers should be able to view the book and this is vital to attract passers by. Used book business can be started by selling the owner’s collection of books which forms the inventory on launch. The initial stocks can also include the books donated by relatives, friends and neighbors (How to Make It Big with a Used-Book Store). The short term objective of the store should be service oriented rather than aim to make huge profits. This earns reputation and future prospects for sale. The business should make sure to obtain positive feedbacks from customers and make courtesy communication to understand the pulse of the customers (Weber & Weber 2005 p.57). The next step is to search for prospective book sellers from whom books can be purchased at a low cost. Low cost books can also be gathered from goodwill stores, garage sales, church

Monday, October 28, 2019

Microbial Analysis of Soil Essay Example for Free

Microbial Analysis of Soil Essay Abstract: soil samples were collected fortnightly from area near Dahisar River, A river in suburb of Mumbai. laboratory analysis started from July 2010 to September 2010. Total bacterial and fungal count were estimated by standard spread plate isolation. Isolated bacteria were subject to colony characterization and were estimated by their morphological and biochemical characters. As being a monsoon the occurrence of variation of different species were high. The microorganisms isolated from the soil were of staphylococcus strain and were gram positive, aerobic, coccus shaped bacteria. The fungal species were also identified, of which Aspergillus and Penicillium were dominant, followed by mucur, as sub dominant .This project aims to find out the water and soil quality of River and as it is flowing through an industrial area, to find out if it is getting affected by the Industrial pollutants. Introduction: Soil is the region on the earth’s crust where geology and biology meet, the land surface that provides a home to plant animal and microbial life (Pelczar et al., 1993). Soil teems with microscopic life (bacteria, fungi, algae, protozoa and viruses) as well as macroscopic life such as earthworms, nematodes, mites, and insects, and also the root systems of plants. The numbers and kinds of micro- organisms present in soil depend on many environmental factors: amount and type of nutrients available, available moisture, degree of aeration, pH, temperature etc (Prescott et al., 1999). Soil bacteria and fungi play pivotal roles in various biochemical cycles and are responsible for the recycling of organic compounds (Wall and Virginia, 1999). Soil microorganisms also influence above- ground ecosystems by contributing to plant nutrition, plant health, soil structure and soil fertility (O’Donnell et al., 2001). Soil is generally a favorable habitat for the proliferation of microorganisms, with micro colonies, developing around soil particles. Numbers of micro organism . In soil habitats normally are much higher than those in fresh water or marine habitats (Atals and Bartha, 1998). Bacteria make up the most abundant group of micro- organisms in the soil (3.0 x 106 – 5.0 x 108) per gram of soil, followed by the actinomycetes (1.0 x 106 – 2.0 x 107), fungi (5.0 x 103 – 9.0 x 106), yeast (I.0 x 103 – 1.0 x 106), algae and protozoa (1.0 x 103- 5.0 x 105) and nematodes (50 – 200) counts per gram of soil are wide differences in the relative proportions of individual bacteria genera found in particular soils (Atals and Bartha, 1998). Soil fungi may occur as free-living organisms or in mycorrhizal association with plant roots. Fungi are found primarily in the top 10 cm of the soil and are rarely found below 30 cm. They are most abundant in well-aerated and acidic soils (Domsch et al., 1980). Most fungi in soil are opportunistic (zymogenous). They grow and carry out active metabolism when conditions are favorable which implies adequate moisture, adequate aeration and relatively high concentrations of utilizable substrates (Postage, 1994; Miyanoto et al., 2002). In this research we isolate culturable heterotrophic bacteria and fungi from different top soil samples MATERIALS AND METHODS Laboratory analysis Preparation of materials The materials needed for this experiment include; glass wares (conical flasks, bijou bottles, pipettes, petri-dishes) and they were washed with detergents. These glass wares were rinsed thoroughly with clean distilled portable water and left to air dry before sterilizing them in the autoclave at 15ââ€" ¦C for 1 hour. Also, the laboratory cabinets on which the work would be carried out was swabbed with cotton wool soaked in methylated spirit to sterilize it before any microbiological analysis was carried out to avoid the growth and isolation of other organisms not present in the samples. After sterilization, the plates were allowed to cool to about 45 degrees before they were used. Microbiological evaluation Ten (10) grams of the soil sample for microbiological evaluation was weighed into 9ml of sterile water. Preparation of serial dilution goes thus: 1ml of the original stocks solution was poured into 9ml sterile distilled water and mixed thoroughly to give 10-2 of the original sample and this was done for each sample and the bottles labeled according to date of collection Isolation and Enumeration of Micro-organisms. 1gram of the samples was homogenized in 9mls of distilled water to obtain a ratio of 1:9 and the second diluted of each sample was plated using the pour plate technique. Sterile molten nutrient agar (NA), potato dextrose agar (PDA), macconky’s agar,(MA) manitol salt agar (MSA) and deoxycholate astrate agar (DCA) were used{the potato dextrose agar (PDA) was acidified). These agars were then added and left to solidify undisturbed. These plates were incubated 37oC for 24hours (incubation was aerobic) and the procedure was repeated using 10-2 finally the number of colonies per plates were counted and recorded. The acidified PDA was incubated at 25C for 3-7 days for microbial growth. Total Bacterial counts (Cfu/g) The total bacteria count for each sample was determined with the pour plate techniques using nutrient agar. The plates were incubated between 24hours at 370C and all colonies appearing on the end of the incubation period were counted using digital unlimited colony counter and the counts were expressed in colony forming unit per gram {CFU/g} of the sample. Colonies of bacteria developing on the plates were observed, isolated and reisolated on a fresh media until pure culture was obtained. Preparation of Pure Culture It is necessary to isolate organisms in pure culture before studying and identifying them because a pure culture originates from one cell. Characteristics colonies from the original culture on the plates were picked with a sterile wire loop (using surface streaking method) and this loop was used to make streak of the colony on the surface of newly prepared sterile agar plates of NA,MA MSA. These streak will space out the inoculants and discrete colony of a particular specie of organism and then incubated at 35-37oC for 24hours to enhance microbial growth. Distinct colonies were re-inoculated on another fresh agar plates in order to obtain a pure culture. The isolates were picked with sterile loop and streaked into prepared agar slants, labeled and incubated for growth after which they were kept in the refrigerator for future use and identification. Identification of Isolates These isolated bacteria were identified using both morphological culture characteristics (i.e. the color, shape, elevation, capacity, consistency, edge) and biochemical test (i.e. citrate, oxidase, indole, sugar fermentation, test etc.)and the bacteria were identified based on the results obtained from the above mentioned biochemical characterization results and the procedures include. Grams Staining Techniques A drop of distilled water was placed on a clean glass slide. The inoculating wire loop was sterilized by flaming until it was red hot (this is to prevent the invasion of unwanted micro- organisms that might be inhabiting the wire loop) in the blue flame of a Bunsen burner. The loop was allowed to cool and the small portion of each colony of microorganisms to be gram stained was picked and smeared in the drop of water (distilled) on the glass slide and then spread into a thin smear along the slide. The smear was air dried and passed through the blue flame. The smear was stained with 1%crystal violet and left for 1minutes (60secs) and then washed with running distilled water it was then stained again with Lugols iodine for another 60secs and also washed with running distilled water. The slide was decolorized rapidly with 75% alcohol in order to present the organism from having the color of the primary reagent and it was washed immediately with distilled water. The slide finally was flooded with a counter stain safranine (a secondary stain) for 60secons and also washed off with distilled water and allow to air dry. The slide was covered with a cover slide and observed under the microscope using oil immersion x 100 objective lens with immersion oil. The gram reaction of the isolated arrangement and the shape of the cell were observed and recorded. Gram positive (+ve) bacterial were characterized by a purple color (i.e. the primary stain) while the gram negative (-ve) bacteria were characterized by red color (i.e. the secondary stain) .This procedure is actually used to ascertain the component of each organisms cell wall. Motility Motility was determined by hanging drop techniques. Using loop, a little part of the colony of the organisms were grown in peptone water for 18hours and then placed in the grease free slide and covered with a Vaseline bound cover slip and then observed under x100 objective lens. A motile organism is then seen moving in the drop of liquid. Identification Of Mold Isolates Mold isolated was identified using cultural and morphological characteristics and according to (Fawole and Oso, 2001), microscopic observation was carried out using lacto phenol blue stain. Procedure for Mold Staining A drop of lacto phenol blue stain was dropped on a clean grease free sterilized glass slide and after this a sterile inoculating wire loop was used to pick the mycelium unto the glass slide from the mold culture .The mycelium was spread evenly on the slide. Teasing was carried out to separate the mycelium in order to get a homogenous mixture and the mixture was then covered with cover slips gently and then allowed to stay for some seconds before observing under x40 under the microscope. The microscope examination of actively growing mold was on the basis of structures bearing spores, presence or absence of septate. BIOCHEMICAL TESTS Catalase Test Catalase test demonstrates the presence of catalase enzyme by aerobic microorganisms. Catalase is an enzyme that catalysis the release of oxygen from hydrogen peroxide (H2O2). To test for catalase, a drop of 3% hydrogen peroxide solution was added to a slide and the organism to be tested for catalase production is brought in contact with the hydrogen peroxide. The production of gas bubbles however indicates a positive reaction and this shows that catalase enzyme is produced.(FawoleOso, 2001) Oxidase test This was carried out by placing a clean filter paper on the working bench or petri dishes and 2-3 drops of freshly prepared oxidase reagent was added to the isolate using a sterile inoculating wire loop. After this, a few quantity of oxidase reagent was added and a purple coloration was observed within 10-15minutes which indicated that the organisms is oxidase positive and according to Olutiola et al, 1991, a positive reaction is dependent on the presence of cytochrome. This test is also useful for the separation of Neisseria in mixed culture and in differentiating Pseudomonas from enteric bacteria. Indole test Olutiola et al, 1991, describes the test as one which is important in the differentiation of colonies and it depends on the production of indole from tryptophan by the organism. An inoculating loop was used to inoculate the organism into a test tube containing decarboxylase medium becomes violet. An uninoculated test tube serves as a control (i.e. remained yellow) Sugar fermentation test The ability of the isolates to utilize certain sugar as energy source was tested. If the organism does ferment a particular sugar, acid will be produced and gas may be produced or not. Acid production is indicated by color change of the medium from red to yellow and acid presence could also be detectable with a ph. indicator in the medium while the production of gas is indicated by a void produced in a Durham tube. The fermentation medium was prepared by 0.1g of sodium chloride and 0.1g of fermentable sugar (glucose) in 10ml of distilled water. An amount of 9ml of the medium was pipette into a test tube containing Durham’s tubes in replicates. 5ml of phenol red indicator was immediately discharged into the test tubes. The test tubes containing medium were sterilized in an autoclave at 121 o for 15minutes.After sterilization, each isolate were incubated in glucose Medium. An uninoculated test tube was also incubated for glucose to serve as a control. The test was also carried out using maltose, lactose, galactose, manitol, sucrose, fructose and mannose.(Olutiolaet al., 1991) Discussion: The abundance of bacteria and fungi in this study were typical of environment with high species richness and functional diversity. Despite the fact that it is possible that a number of bacteria and fungi may be missed in this study, the isolates could be readily assigned dominant (e.g. Bacillus sp, Aspergillus sp) or transient/succession roles in the isolation of organisms form different seasons, which form the basis of this study. In additions to the implications of the determination of the number of microorganisms during soil sampling, one should consider the qualitative aspect of the preservation of important species and groups of microorganisms and of the changes in these biochemical characteristics resulting from the variations in these counts. Although the results of this study would not be considered to be exhaustive, as it was done within the limits of facilities available in the laboratory, an insight into the population dynamics and distribution of culturable aerobic bacteria and fungi diversity has been elucidated. This is without prejudice to the possible influence which a substantial proportion of bacteria and fungi that are not culturable in vitro could have on the overall picture of event. It would require more modern technology (nuclei acid probes) to obtain such detailed overview of microbial diversity. This should be a subject of extension of this investigation in future. Conclusion Through this project, if emphasis is made on public health, the observation and findings show striking predominance of Salmonella typhi. And E.coli. E.coli being an enterobacter cause dysentery and S.typhi poses a great risk of typhoid. Health inspector and municipal authorities should look into this matter for further investigation and if possible improvement Acknowledgement Investigators are grateful to the Principal Management of S.V.K.M’s Mithibai College for constant encouragement support. And head of department of zoology Prof. V.V. Dalvie for providing me opportunities and Prof. Radhika D’souza, under whose guidance the project was successfully completed References 1 .Atals RM, Bartha R (1998). Microbial Ecology: Fundamentals and Applications. 4th Edition. Benjamin Cummings Publishing Company Inc. Addison Wesley Longman Inc. pp. 300 – 350. 2. Miyanoto T, Igaraslic T, Takahashi K (2002). Lignin–degradation ability of litter decomposing basidomycetes from picea forest of Hokkaida Myco.sci. (41): 105 – 110. 3. Domsch KH, Gaws W, Anderson TH (1980). Compendium of soil fungi 4. O’ Donnell AG, Seasman M, Macrae A, Waite I, Davies JT (2001). Plants and Fertilizers as drivers of change in microbial community structure and function in soil. Plant Soil (232): 135 – 145. 5. Pelczar MJ, Chan ECS, krieg NR (1993). Microbiology: Concept and Application International edition McGraw-Hill, USA. Pp 281-324. 6. Wall DH, Virginia RA (1999). Controls on soil biodiversity insights from extreme environments. Appl. Soil Ecol. (13): 137–150. 7. Fawole and Oso, 2001

Saturday, October 26, 2019

Tokyo Correspondence Etiquette :: essays research papers fc

As an employee of ABC International, a variety of your business contacts are neither from America nor American; therefore, knowing when and how to deliver effective and well written business correspondences, will help you avoid communication blunders and image-damaging errors that often come with cross-cultural exchanges. In addition to the common sense etiquette that comes with using your manners and being a gentleman, use these tips on cultural differences that could impact how you communicate with business contacts in Tokyo, Japan. Addressing Your Business Contact Drop â€Å"Mister† or â€Å"Misses† and simply add â€Å"-sama† to the last name of your business contact in formal situations and correspondences. If you are uncertain about the pronunciation or spelling of your contacts name, ask for assistance. Introducing Yourself Use last names at all times and do not request that clients call or write to you by your first name. When introducing yourself, business cards are an essential part of introductions and you will not be taken seriously without them. Double-sided business cards in Japanese and English are a must because they show potential business contacts that you are serious, and that you understand and respect their culture. Writing Effectively Write in a polite, non-offensive and respectful manner. Do not ask a Japanese business contact a question that has been phrased negatively. Eliminate jargon and excessive information and reread your correspondences before sending them to ensure that your meaning and tone are clear. In Japan, correspondences are different -- longer letters are favored. Solving Issues or Problems Avoid confrontations by not getting too pushy in your correspondences. Instead, try to get a confirmed date when expecting to receive an answer. At times, it may be impossible to get a straight answer from your business contact, but more than likely you will eventually get to a situation where everyone agrees if you simply â€Å"go with the flow†. By being aware of cultural differences between Americans and Japanese, you will be able to demonstrate proper etiquette and respect for your business contacts at all times. Communicating and writing effective correspondences will show your willingness to increase your cultural knowledge and increase your clientele. Tokyo Correspondence Etiquette :: essays research papers fc As an employee of ABC International, a variety of your business contacts are neither from America nor American; therefore, knowing when and how to deliver effective and well written business correspondences, will help you avoid communication blunders and image-damaging errors that often come with cross-cultural exchanges. In addition to the common sense etiquette that comes with using your manners and being a gentleman, use these tips on cultural differences that could impact how you communicate with business contacts in Tokyo, Japan. Addressing Your Business Contact Drop â€Å"Mister† or â€Å"Misses† and simply add â€Å"-sama† to the last name of your business contact in formal situations and correspondences. If you are uncertain about the pronunciation or spelling of your contacts name, ask for assistance. Introducing Yourself Use last names at all times and do not request that clients call or write to you by your first name. When introducing yourself, business cards are an essential part of introductions and you will not be taken seriously without them. Double-sided business cards in Japanese and English are a must because they show potential business contacts that you are serious, and that you understand and respect their culture. Writing Effectively Write in a polite, non-offensive and respectful manner. Do not ask a Japanese business contact a question that has been phrased negatively. Eliminate jargon and excessive information and reread your correspondences before sending them to ensure that your meaning and tone are clear. In Japan, correspondences are different -- longer letters are favored. Solving Issues or Problems Avoid confrontations by not getting too pushy in your correspondences. Instead, try to get a confirmed date when expecting to receive an answer. At times, it may be impossible to get a straight answer from your business contact, but more than likely you will eventually get to a situation where everyone agrees if you simply â€Å"go with the flow†. By being aware of cultural differences between Americans and Japanese, you will be able to demonstrate proper etiquette and respect for your business contacts at all times. Communicating and writing effective correspondences will show your willingness to increase your cultural knowledge and increase your clientele.

Thursday, October 24, 2019

Passing: Debut Albums and Best Friend Essay

What is going to happen now that the deed is done? What is the future for Irene? Did she push her or did she just fall? Clare was supposed to be Irene’s best friend. How could she push her? Clare has been passing through and now was spending a lot of time with Irene and Brian. Irene has now started to think that Clare and Brian are together. This hurt Irene her husband with her best friend how could they do that to her. Now she is spending all her time trying to find a way to save her life and family. Clare is having fun keeping her husband from knowing that she is half black. Clare’s husband finds out and goes to the party that they are at, and Irene knows that if Clare gets freed from her husband. She will take Brain for sure. It all happened so fast Clare fell. Irene pushed her out the window. She didn’t think she just pushed. What is going to happen to Irene was she seen and will she get in trouble? Irene has been upset for a week before the party. Clare, Irene’s best friend, was spending a lot of time with Brian and she is still hiding the fact that she is half black from her over racist white husband. All he does it insult black people constantly. Clare was beautiful as Irene would say. Irene didn’t start to think there was anything wrong until a week ago. Irene was sure that Brain was mad at her. He had been is a bad mood all that last week. Then when Clare came over it was all good. This is what told Irene the truth she knew right then and there that Brian had been cheating on her with Clare. Irene was hurt but what could she do. How was she going to be able to keep Brian? What was going to be her next move? Irene was thinking a lot she was not sure what to do. She thought about telling Clare’s husband, but she didn’t know how to tell him. That wouldn’t work if Clare was free from John then what is holding her back from taking Brian away. No she couldn’t let that happen. She couldn’t lose Brian she just couldn’t. That night they were going to go to a party Irene didn’t really want to go she and Brian had just had a fight. She got ready to go. On the way up to the party Brian had Clare and Irene on his arms. It was bothering her the way they acted around each other. Clare was standing by the window when John started pounding on the door. All Irene could think was John found out. Irene couldn’t let her get freed. She just couldn’t let it  happen. She ran for Clare and grabbed her arm. Then it happen it was so fast Clare fell out the window. How did it happen? What will happen next? Did she push her? Did she fall? Irene was freaking out, knowing what she had done. Then she had a terrible thought. What if she is still alive? She would lose Brian for sure if she was alive. She was going to have to go down. â€Å"Should she put on her coat? Felise had rushed down without any wrap. So had all the others. So had Brian. Brian! He mustn’t take cold!†(pg.178) So she went down the stairs. When she got down there she went to Brian. She gave him his coat, but he rapped it around her. People were asking what happened. Someone asked Irene what she saw, did Clare get pushed by her husband. â€Å"You’re sure she fell? Her husband didn’t give her a shove or anything like that?†(pg.181) Irene’s answer was short and sweet. Irene told them that Clare just fell. She said no one pushed her. I bet that Irene was going crazy after that. Would they find out? All Irene wants was to be free of Clare and live happily with her husband. Now her life is unpredictable what’s next what going to happen to her family. It is mostly going to be like this. Now that Clare is died Irene and Brian will be happy again. For a while then Brian will get sad again and maybe he will want to leave Irene but won’t because of their kids. Jack will feel the loss for a while but then he will go back to his racist way he will leave and go home to his daughter and he will tell her that he hates her and that her mother was have black and a lot of other horrible things. He will try and kill her or he will send her away to a boarding school. He will never want to see her again. He will find a racist white women and marry her. Irene will be scared and looking over her shoulders her rest of her life. Always worrying if they found out. Irene will want to start over and forget. She will never get too thought she will have to ask Brian to let them move. Irene will want to leave or at least move to a different house. She will never want to think about Clare again. That won’t be possible because every party ever event she goes to she will think of what she has done to her best friend. She pushed her best friend out of a window after all she been though thou it still does not seem right and the biggest reminder of all is Brain.  Every time she looks at Brian she will remember that her cheated on her with her best friend. Irene will never get away from the fact. She killed Clare. She was the one that pushed her out that window! Irene went through a lot. I was still not right for her to push Clare out of the window though. Irene was cheated on with her best friend. Brian was always miserable when he was with her and then when he saw Clare his mood did a flip. Clare was beautiful and Irene was not there was no way else to get Brian. She couldn’t tell Clare’s husband he would have freed her and she would have taken Brian away. Then she would have been left with nothing at all. She had to keep Brian. So she pushed Clare out the window. That when her life changed she would never be the same. She would be worried all the time and unhappy. She would have never been happy again she had killed her best friend I know she was with her husband. It was still not right of her to push Clare out of a window. She did not deserve to die and for killing her Clare will suffer more then she has ever before. She will live the rest of her life with regret, and sorrow. She killed her best friend even if it was for the right reason. It was still wrong to kill her. Irene will never again have a happy family. She will always have the pain that she didn’t deserved in a way it was Clare’s last way of making her suffer.

Wednesday, October 23, 2019

Larry Ellison Essay

Lawrence Joseph â€Å"Larryâ€Å" Ellison is a co-finder of Oracle Corporation. It’s one of the world’s leading enterprise software company. As of 2012 he is considered one of the wealthiest men alive, with a net worth of $41 Billion. His Early Years Larry Ellison was born in Manhattan, New York City. His mother, Florence Spellman, was an un-married 19-year-old of Jewish women, and his father was an Italian American U.S. Air Force pilot. After Larry Ellison was born he was very sick with pneumonia at the nine months, his mother realized that she was unable to care for him anymore, and arranged for him to be adopted by her aunt and uncle in Chicago. Lillian Spellman Ellison and Louis Ellison adopted him when he was nine months old. Lillian was the second wife of Louis Ellison, an immigrant. Larry Ellison did not meet his biological mother again until he was 48. Ellison grew up in a two-bedroom apartment in Chicago’s South Shore middle-class Jewish neighborhood. Louis, his adoptive father, was an government employee who had made a small fortune in Chicago real estate, he lost it during the Great Depression. Larry was a very intelligent young man, he unfortunately had to leave because his adopted mother (his aunt) passed away . After her passing Ellison went to Northern California to attend University of Chicago. In 1964, he moved to Northern California permanently. His Career During the 1970s, Ellison worked for Ampex Corporation. Ellison was inspired by the paper written by Edgar F. Codd on database systems called â€Å"A Relational Model of Data for Large Shared Data Banks†. In 1977, he founded Software Development Laboratories. In 1979, the company was renamed Relational Software Inc. later it was named Oracle. In 1994, Informix took over Sybase and became Oracle’s most important rival. In April 1997, Informix announced a major decrease in their earnings; Phil White soon landed in jail, and Informix was again taken over by IBM in 2001. Also in 1997, Ellison was made a director of Apple Computer after Steve Jobs came back to the company. Ellison resigned in 2002. In April 2009, Oracle announced its intent to buy Sun Microsystems. On August 9, 2010, Ellison let Hewlett-Packard’s board go for firing CEO Mark Hurd .Ellison and Hurd are close personal friends. On September 6, Oracle hired Mark Hurd and made him Co-President. Ellison refused to take the CEO position. Ellison owns stakes in Salesforce.com, NetSuite, Quark Biotechnology Inc. and Astex Pharmaceuticals. On June 20, 2012 it was reported that Ellison had agreed to buy the 98 percent of the Hawaiian island of Lana’i. The price was reported to be between $500 million and $600 million

Tuesday, October 22, 2019

A Critical Analysis Of The Relationship Between Urban Conditions And Street Gangs In The United States, 1950 - 2010 The WritePass Journal

A Critical Analysis Of The Relationship Between Urban Conditions And Street Gangs In The United States, 1950 - 2010 INTRODUCTION A Critical Analysis Of The Relationship Between Urban Conditions And Street Gangs In The United States, 1950 2010 from: guardian.co.uk/world/feedarticle/9796446 Maxson, C.L., Whitlock, M.L., and Klein, M.W. 1998. Vulnerability to street gang membership: Implications for practice. Social Service Review, 72, pp. 70–91. Moffitt, T. 1993. Adolescence-limited and life-course-persistent antisocial behavior: A developmental taxonomy. Psychological Review, 100(4), pp. 674–701. Miller, W.B., 1974. American youth gangs: Past and present. In Current Perspectives on Criminal Behavior. New York, NY: Knopf, pp. 410–420. Miller, W. B., 1958. Lower class culture as generating milieu of gang delinquency. Journal of social issues 14, pp. 5–19. Mincie, J., 1999. Youth and Crime: A Critical Introduction. Sage publications. Schlossman, S., 1995. Delinquent Children: The Juvenile Reform school. In: Morris. N D. Rothman (eds), The Oxford History of the Prison, Spergel, I.A., 1995. The Youth Gang Problem. New York, NY: Oxford University Press. Sullivan, M.L., 1989. Getting Paid: Youth Crime and Work in the Inner City. Ithaca, NY: Cornell University Press. Thornberry, T.P., Krohn, M.D., Lizotte, A.J., and Chard-Wierschem, D. 1993. The role of juvenile gangs in facilitating delinquent behavior. Journal of Research in Crime and Delinquency, 30(1), pp. 55–87. Thrasher, F.M., 1927. The gang: a study of 1,313 gangs in Chicago. Chicago: university of Chicago press. Vigil, J.D. 1988. Barrio Gangs: Street Life and Identity in Southern California. Austin, TX: University of Texas Press. Wilson, W. J., 1987. The Truly Disadvantaged: The Inner City, the Underclass, and Public Policy. Chicago: University of Chicago Press.

Monday, October 21, 2019

Conflict Resolution essays

Conflict Resolution essays Throughout ones life, one establishes many relationships. Some are built upon, and become strong and unshakable, some are broken and left to dissolve. While some are paved slowly and with love, blossoming to become something wonderful, others are blown apart - the pieces scattered, never to be put back together again. Though these relationships vary, from professional to personal, they are all prone to encountering some form of conflict. John Dewey has designed a problem solving sequence with 6 (six) steps, listed and explained below, to facilitate resolution of these conflicts. Since the way one deals with conflict within the relationship will affect how the relationship progresses, it is vital that one posse all the necessary skills to resolve conflict in a way that brings satisfaction to everyone involved. Deweys steps provide a clear outline of exactly what needs to be addressed when dealing with conflict. This allows for effective time management and allows all parties to be on the same track or in synchronization about what has to be done. They also assure a fair and even discussion of the problem and allow all parties to play an active role in the finding of a solution. Often times, when one is in a conflict situation or in a position of having to deal with a problem, the parties involved are affected by the problem. These emotions, or the stress of either risking loss or profit, could cause the parties to have different views or perceptions of the problem. This step allows both parties to have the same definition of the problem and to be aware of the exact implications of this problem. Example: George, a co-owner of a small coffee shop has noticed that there are fewer customers coming in to his store. He is worried about his profit, and is reluctant to change anything about the store due to the cost. Max, the other owner, is more conce ...

Sunday, October 20, 2019

Common Academic Phrases to Use in Your Essay

Common Academic Phrases to Use in Your Essay Quality Essay Writing: Ten Scholarly Phrases to Employ while Writing Essays Easygoing and conversational expressions have no place in scholastic papers. Therell be no LOLs, no LMFAO, and positively no OMGs. In any case, did you know there is a mess of different expressions which probably wont be so evident or striking? Shouldnt something be said about those individuals that believe its alright to compose you in an article? This ought to be maintained a strategic distance from with a reasonable option being, maybe, one. Another precedent could be an understudy who befuddles be that as it may with even though. Did you know the distinction? We use notwithstanding toward the start of another sentence, with a comma after it. Then again, even though can be utilized toward the start or amidst a sentence, and it doesnt have a comma after that. In this way, to enable you to locate the correct dimension of custom in your expositions, we have assembled this rundown of 10 scholastic expressions you can use in your article composing. This is in no way, shape or forms a comprehensive rundown. However, these are only a couple of the scholarly expressions that can enhance your exposition composing abilities. 1.  Ã‚   Also; moreover; likewise†¦ The stream of your article is critical. This kind of scholarly expression is ideal for growing or adding to a point youve officially made without hindering or halting the stream by and large. 2.  Ã‚   Eventually; to simply put it†¦ Once more, these are fantastic scholastic expressions to enhance the coherence of your paper composing. For this situation, the above terms ought to be utilized to clarify a point youve effectively made in a somewhat extraordinary manner. Try not to utilize it to rehash yourself, but instead to expound on a specific point that needs further clarification. Or on the other hand to concisely round up what just preceded. 3.Consequently; on the other hand; despite what might be expected; then again†¦ Finding a consistent technique for presenting an elective viewpoint or hypothesis can be diligent work, yet these terms and expressions can enable you to present the opposite side of the contention. 4.  Ã‚   As indicated by X; X expressed that; alluding to the perspectives of X†¦ Presenting the perspectives of subject specialists is an urgent piece of article composing. Counting a statement that normally fits into your work can be a touch of battle, yet these scholastic expressions give an extraordinary path in. The key with statements is lucidity. Leave the peruser with no space for perplexity; it ought to be evident that a statement is a statement. Therefore, you may likewise prefer to summarize – ensure you credit the source, however. Hence, you may jump at the chance to state, As Einstein regularly repeated, the hypothesis of. instead of giving a sectioned direct statement. Also, it is essential to ensure that one references effectively as well when utilizing cites or summarizing another persons words. 5.  Ã‚   Just as; alongside; combined with Take care when utilizing these joining scholarly expressions, as they dont work similarly as the combination and with regards to the subject-action word assertion. Therefore, they do generally have a similar capacity and are fine when utilized sparingly. 6.  Ã‚   Initially, besides, thirdly†¦ In case youre attempting to structure a contention without your exposition getting to be dreary, this is a very powerful strategy for introducing the realities. Try not to be excessively unbending and feel you need to number each point, yet using this framework can be a decent method to get a contention off the ground. 7.  Ã‚   In perspective of; in light of†¦ These are the kinds of expressions you should use to add a stipulation to contention or recognize reservations. Either can be utilized when a bit of proof reveals new insight into a contention. 8.  Ã‚   For example; to give an outline of†¦ Scholastic articles that get good grades back up each point. Utilizing for instance each time will wind up dull for the author and the peruser, so here are two or three scholarly expressions you can use to state a similar thing. 9.  Ã‚   Powerful; convincing†¦ While finishing up your paper, words like these can enable you to outline your contention and clarify which parts you find generally persuading. 10.  Ã‚     This way; this recommends; evidently; the outcome is†¦ When youre clarifying the importance of the consequences of a bit of research, these expressions give the ideal lead up to your clarification.

Saturday, October 19, 2019

Where are you going, where are you from - Joyce Carol Oats Assignment

Where are you going, where are you from - Joyce Carol Oats - Assignment Example n the two of them, like her mother used to be the same was once and understands what she is going through, and that Connie somehow knows this and so there’s that different level of their relationship as well. Connie’s belief that her mother likes her more also suggests this. What’s more interesting though, and even a little bit disturbing, is the way that Connie reacts to Arnold Friend. Even the first time she saw him Connie was put a bit off center, and I immediately knew that he was going to play some sinister role in the story. I was not disappointed, and the scene where he comes to her house and talks to her, which is most of the story actually, gave me the chills. But at the same time Connie seems to expect things to turn out the way that they do, and there are some sentences in the story that make me wonder if that’s not actually the way she wants it to turn out. For instance, she goes out to the door and flirts with him, and even enjoys his attention, even though he has apparently been stalking her or worse and knows all sorts of things about her. His last name, â€Å"Friend,† makes him somehow seem even more evil than his speech when he talks. The way that he talks and the things that he says definitely play a big role in it, though, because he seems to be just saying things without any real understanding of what they mean beyond knowing that they are the sorts of things that a person like him should say. I almost wonder if he’s supposed to be Satan or something like that, but in the end he seems not quite as evil as that because the tone of the story doesn’t really make it sound like we’re supposed to hate him entirely. He is still a very creepy character, but the way he keeps his promises and doesn’t do anything extremely violent makes me wonder how creepy we’re supposed to find him. I think one of the main things Oates was trying for in this story is to show the confusion and the not always happy things that are involved in

Civil Committment of Sexual Offenders Essay Example | Topics and Well Written Essays - 1250 words

Civil Committment of Sexual Offenders - Essay Example Minnesota allows for civil commitment of sex offenders who have completed their jail terms, a provision that has been made in the Minnesota Commitment Act. The act reasons that civil commitment of sex offenders is a necessary measure to prevent dangerous sexual offences from occurring in the future (Barnickol, 2001). In California, civil commitment fro sex offenders is allowed under the Sexually Violent Predator Law. The provisions of the commitment law for sex offenders in California are the same as in Kansas and Minnesota. Other States that have adopted civil commitment laws for sex offenders who are deemed dangerous include: Washington, Missouri, Florida, Wisconsin, Massachusetts and Iowa (McCaffrey, 1994). One of the similarities that stand out in many of the sex offenders’ civil commitment laws in different states is the requirement that a criminal is likely to pose sexual offense danger to other people after he is released at the end of his jail term. The laws seek to ha ve violent sex predators who have some form of mental abnormality to be committed to involuntarily and indefinitely to appropriate facilities for treatment. The laws also require that such offenders must have completed their jail sentences. Although all the civil commitment laws in states that have adopted are largely similar, there are a few differences that exist. For instance, in the Texas legislation of civil commitment, a criminal is liable to commitment if he is found to have behavioral abnormality. This is different from the mental abnormality mentioned in other similar legislations (Prentky, Janus, and Barbaree, 2006). Different states have also taken different approaches in the management of civilly committed sexual offender populations. Florida for example, requires the offenders to be committed to be assessed by a qualified team so as to determine if they are sexually violent predators. The evaluation process is a civil proceeding after which those offenders found to meet the criteria are kept under watch at the Florida Civil Commitment Center together with other detainees who are still awaiting similar civil trials (McCaffrey, 1994). In Washington, evaluation of an offender’s state of mind is done by a Joint Forensic Unit whose members are forensic experts who deal specifically with risk evaluations related to sex offence. If the offender is fond to meet all the legal requirements for civil commitment, the King County Prosecutor’s Office or the Attorney General’s office then files a petition and a hearing is scheduled within 72 hours. If the superior court finds the offender to be a suitable candidate for a civil commitment trial, he is taken to the DSHS Special Commitment Center located on McNeil Island. During the trial, the jury or judge must determine without doubt that the offender is a sexually violent predator before he is transferred to a Secure Community Transition Facility (LaFond and Winick, 2003). Similar civil or c ourt hearings are scheduled for each offender who is regarded to have mental abnormality which makes him a danger to others in all the states where civil commitment for sexual predators has been legalized. After they are committed in specialized facilities, the sexual predators receive special treatment for a specified period to make them better members of society after which they are released to carry on with normal life. Costs vs. Benefits of Civil Commitment One of the benefits of civil

Friday, October 18, 2019

Extensive Review and Analysis of Nursing Leadership Assignment

Extensive Review and Analysis of Nursing Leadership - Assignment Example The management is boosted by effective control that is geared towards directing personnel to perform their task at the right time. In many cases, this type of leadership focuses on short-term planning. Since it involves short terms planning, they have to achieve their goals in the short terms, in order to structure other objectives. For instance, in implementing this leadership element in a long term facility, horizontal management has to be implemented. Though there is less reliance on this type of leadership, it is proving to be effective in management. In this transactional leadership, there is frequent restructuring and control of the personnel. For instance, in a long term facility, nurses have to be managed in ensuring all the queues in a facility are served. This is a short term goal that may be done on a daily basis. When the queues are seen to be in constant motion and receiving services, the management is in control. However, in instances where there are stagnant queues, it is admissible that the nurses are working at a slow pace. In such a case, many people might not get the services from the facility. In a long term facility, juniors and any other person below the leader should be obedient to the instructions. The leaders act as a formal authority designed to manage and control all the staff under the manager. As such, the people below the manager constantly obey any directive that is given. In a conservative explanation, the junior staff below the manager may be considered followers. The responsibility of creating directions, organizing responsibility, and making decisions is solely obligated to the top managers (Grossman and Valiga, 2005). For instance, nurses work under doctors in a... This paper stresses that The leaders are required to show others what should be done in certain situations. For instance, when there is a hygiene problem in a long term facility, a servant leader may come in handy. A leader that starts to clean a dirty environment while the other junior staff members are around instills some discipline. This will trigger their conscience to act appropriately. In the mean time, the junior staff members may find it hard to leave their leader to do some odd jobs. To avert the situation, they may follow suit in cleaning. In this scenario, the leader does more of a servant role than leading the people. There are various assumptions that are considered in this leadership, in reflection to long term facilities. The first assumption is that leadership is instilled through doing what a leader wants others to do. This report makes a conclusion that nursing is a vital subject in ensuring the world is healthy and stable. With diminishing quality of services in the nursing profession, people may not acquire the best from the profession. Therefore, it needs a structured leadership style that will ensure all the activities are done accordingly. For instance, in areas where they register large numbers of patients, the leadership style should ensure the nurses serve people with zeal. This will ensure all the people are served to utter optimum. Similarly, in areas where most of the work done is volunteer work, a servant leader would be appropriate. A leader who leads by example would encourage other people to do the same.

Religion, Feminism, and Environmentalism Research Paper - 1

Religion, Feminism, and Environmentalism - Research Paper Example Women who are both religious and in support of the efforts of the women’s movement have sought common ground in order to actively pursue ecological interests. In comparing Christian, Hindu, and Buddhist faiths in context with women’s movements, it is clear they are actively interested in both principles of equality and ecology where common ground can be found which unites these belief systems. Ecological feminism is a theory that combines feminist ideals and motivations with a concern with preserving the world through ecological perspectives. Warren and Cheney write that â€Å"Ecological feminism is a feminism which attempts to unite the demands of the women's movement with those of the ecological movement in order to bring about a world and worldview that are not based on socioeconomic and conceptual structures of domination†. The marriage of the women’s movement and ecological interests is not new and can be seen in many cultures, including in Brazil whe re the women’s movement and the landless people movement were grew together in order to support the concept of living off of the land in a communal and freedom based environment that was contextually absent of consumerist interests. This was done in order to support the weak and the marginalized in a meaningful and bountiful way.2 It may be that the problems within the environment are some of the most serious problems that are being faced in the 21st century as the economy and the act of working is based upon consumerism which often strips resources and fundamentally changes ecological systems both nonhuman and human.3 The idea of ecological feminist movements are often based upon practical solutions to social problems where in the shadow of patriarchy and male dominance, alternatives to participation in economies where there are disadvantaged women find ways in which to focus on less economically based roots of survival. Hindu The traditions of India were always based upon e cological principles in which sustainability was a driving force behind decision making in relationship to resources. Religious texts such as the Vedas and Puranas supported environmental ethics as well as the Advaita philosophy that â€Å"acquires a cosmic character as it considers all living beings to be God’s creation†4 This is the basis of Indian belief systems that place importance on reverence for the Earth. However, industrialization and the formation of larger cities as centers of employment have led to deforestation and he disruption of what had been carefully attended ecologies, specifically affecting women who depend more on the natural world for their sustenance and methods of earning a living. The development of environmental movements have allowed women a common cause that does not run contrary to other cultural belief systems, but allows them to assert themselves into the public discourse. The extremes of poverty sometimes prevent women in India to becom e activists, but it galvanizes others.5 In India, the issues of ecology and sustainability are integral to the needs of many women who are struggling with extremes of poverty that is heightened by destruction of resources that would have otherwise supported them. As in most nations, women in India are among the poorest demographic, with urbanization pushing women into the workforce at a higher rate of 19.5%, which leaves them in marginalized social positions in low paying jobs.6 The issue of ecological irresponsibility affects these women directly as their tradition and culture is irrevocably changed, the sustainability of the ecology is

Thursday, October 17, 2019

Cultural Dimensional Model of Hofstede and Mintzberg Essay

Cultural Dimensional Model of Hofstede and Mintzberg - Essay Example Individualism. This dimension deals with the amount of interdependence that a society values among its members. Observably, individualism in the context of the US is relatively higher and scores 91 while China scores 20. This implies that people in the US are more concerned about themselves and the family members. On the other hand, China is categorized as a collectivist society where people place importance on group efforts (The Hofstede Centre, â€Å"Cultural Tools†). Masculinity. This dimension reveals the degree of value placed by the people on achievement and success. Correspondingly, Chinese society can be found to be driven by achievement success and competition. Accordingly, it ranks 66 with respect to the dimension of Masculinity. On the contrary, the US, although not represents a feminist society but it ranks 62, which is slightly lower as compared to China (The Hofstede Centre, â€Å"Cultural Tools†). Uncertainty Avoidance. China ranks 30 in terms of uncertainty avoidance, which implies that the people in China are more enthusiastic and like to conduct activities that are governed by low regulations. On the other hand, the US ranks 46, which is comparatively higher than China. This implies that the people in the US are more inclined towards revealing risk-avoiding behavior than the people in China (The Hofstede Centre, â€Å"Cultural Tools†). Pragmatism. In terms of pragmatism, Chinese as compared to American culture is very pragmatic and people in China are more dependent on the situation, context and changing scenario. According, the US ranked 26 while China scores 87 on the scale of pragmatism (The Hofstede Centre, â€Å"Cultural Tools†). Indulgence.  

ACADEMIC WRITING TASK Essay Example | Topics and Well Written Essays - 500 words

ACADEMIC WRITING TASK - Essay Example I personally agree that in a diversified nursing environment, respecting individuality and welcoming new comers from various origins are paramount in achieving stability and standardized effective nursing care to a diversified patient population. Increased tolerance of diversity in ethnicity, gender, and backgrounds of the new generation nurses had been a significant factor that answered the dilemma of nursing shortage for the past years. According to Suhr (2009, pp.21-22), the shortage of nurses has led to increase the number of foreign skilled nurses in the workforce, whilst the nursing education rendered a significant number of male and advance in age new graduate nurses. Thus, we are encouraged to be more tolerant in matters of cultural differences and few flaws in English language in the working arena, whilst nurse educators need to adjust in their teaching and motivation skills to the new set of students. Suhr added that the new genre of graduate nurses should be welcomed for they are multi-talented and diverse, especially those who are second-degree holders whose professional maturity holds a promising performance in the working environment. Foreign-educated nurses have been considered important in lifting the nursing shortage in many western nations. The National Foundation for American Policy (2007, p.2) presented the rate of foreign-educated registered nurses in the workforce of the following countries: New Zealand-23%, United Kingdom-8%, Ireland-8%, Canada-6%, and United States-3.7%. In the U.S., the call for embracing diversity in nursing and nursing education was heightened after realizing the pattern of change in this environment. These changes include an increase to 10.7% (as of 2009) registered nurses in the workforce from minority backgrounds, a significant surge in the number of men in the workforce from 5.8% in 1980 to 273.2% in 2004, and pursuit for baccalaureate and higher degrees in nursing education among minority groups were

Wednesday, October 16, 2019

Cultural Dimensional Model of Hofstede and Mintzberg Essay

Cultural Dimensional Model of Hofstede and Mintzberg - Essay Example Individualism. This dimension deals with the amount of interdependence that a society values among its members. Observably, individualism in the context of the US is relatively higher and scores 91 while China scores 20. This implies that people in the US are more concerned about themselves and the family members. On the other hand, China is categorized as a collectivist society where people place importance on group efforts (The Hofstede Centre, â€Å"Cultural Tools†). Masculinity. This dimension reveals the degree of value placed by the people on achievement and success. Correspondingly, Chinese society can be found to be driven by achievement success and competition. Accordingly, it ranks 66 with respect to the dimension of Masculinity. On the contrary, the US, although not represents a feminist society but it ranks 62, which is slightly lower as compared to China (The Hofstede Centre, â€Å"Cultural Tools†). Uncertainty Avoidance. China ranks 30 in terms of uncertainty avoidance, which implies that the people in China are more enthusiastic and like to conduct activities that are governed by low regulations. On the other hand, the US ranks 46, which is comparatively higher than China. This implies that the people in the US are more inclined towards revealing risk-avoiding behavior than the people in China (The Hofstede Centre, â€Å"Cultural Tools†). Pragmatism. In terms of pragmatism, Chinese as compared to American culture is very pragmatic and people in China are more dependent on the situation, context and changing scenario. According, the US ranked 26 while China scores 87 on the scale of pragmatism (The Hofstede Centre, â€Å"Cultural Tools†). Indulgence.  

Tuesday, October 15, 2019

Realistic Fiction Genre Study Essay Example | Topics and Well Written Essays - 2000 words

Realistic Fiction Genre Study - Essay Example Realistic Fictions are stories that children of all ages will enjoy, since they help such children to understand the human relationships, thus preparing them for a life in the future, since they will have already understood the human problems (O'Connor, 2010). This makes them understand themselves better, as well as understanding the human potential in them. Through reading Realistic Fiction stories, children are presented with a mirror to see the world, allowing them to understand the complexities that exist in our world, while also preparing them psychologically for things to come. The essence of reading Realistic Fiction stories is not only to help children see the world in a clear view and prepare them for the future, but also to present an opportunity for such children to choose what they would want to be, based on the characters presented by the stories (Galda, Cullinan & Sipe, 2009). While the children are reading these stories, they engage directly with their favorite charact ers, closely observing how they dealt with the real world hardships and struggles. This shapes the children’s personality and attitudes towards life, since children can see themselves doing the same things. Therefore, Realistic Fiction Genre helps children to understand different people, places and cultures, giving them an opportunity to understand the world beyond what they see every day, while helping children to discover what they want to become in future. While selecting the books for my genre study, I embarked on defining the criteria to be used to come up with books that truly fit in the Realistic Fiction Genre. The criteria was assessing the books on the basis of evaluating whether they present every day realities that are essential in helping children understand the world. Additionally, the books were selected based on their ability to present characters that are realistic and credible, presenting opportunities that enlarge the readers thinking perspective, and presen ting topics and discussions that seems real and consequently believable. Through selecting books that qualify such criteria, the aims of Realistic Fiction Genre are satisfied, making the books appropriate and meaningful for reading by children. The first book I selected was The Adventures of Tom Sawyer by Twain, Mark. This novel is about a mischievous and very adventurous boy called Tom Sawyer, who was living along the Mississippi River, in the St. Petersburg, Missouri (Twain, 1990). Tom is an ill-behaved boy, who engages in fights at school, consequently dirtying his clothes and arriving home a total mess. As a punishment for his misbehavior, he is required to whitewash a fence, which he is apparently not willing to do. Therefore, he applies his cunningness to trick his friend into doing it, with a promise of granting him some treasure in form of tickets to a Bible memorizing contest, where one would end up with a Bible as a prize. Despite being cunning and lazy, Tom is also immora l and dishonest. He happens to fall in love with a new girl who had recently arrived in town, Becky Thatcher, and asks her to kiss him, as a sign of engagement. Becky reluctantly agrees to kiss him, only to realize the dishonesty of Tom later on, when she discovers that she had been previously engaged to a different girl, Amy. Consequently, he is rejected by Becky and reverts to his mischievous life, this time in the company of Huckleberry, who was a son of a famous town drunkard. In their adventure to a grave to try out some cure, they witnessed a

Monday, October 14, 2019

The articles of confederation and the constitution Essay Example for Free

The articles of confederation and the constitution Essay Abstract The simple difference between the Articles of Confederation and US Constitution is that the articles were not strong enough to hold our young nation together. The articles operated the US as separate states. Under the articles, it was very difficult to pass laws since the requirement of 9 out of the 13 states approval was needed for ratification. The Articles created a loose confederation of sovereign states and a weak central government, leaving most of the power with the state governments. The need for a stronger Federal government soon became apparent and eventually led to the Constitutional Convention in 1787. The members of the Constitutional Convention signed the United States Constitution on September 17, 1787 in Philadelphia, Pennsylvania. The Constitutional Convention convened in response to dissatisfaction with the Articles of Confederation and the need for a strong centralized government. After four months of secret debate and many compromises, the proposed Constitution was submitted to the states for approval. Although the vote was close in some states, the Constitution was eventually ratified and the new Federal government came into existence in 1789. Articles of Confederation and Constitution There were many differences between the Articles of Confederation and the Constitution. At the end of the American Revolution the free states needed some sort of control that would generate to a unified country. Issues arose such as: How should power be divided between local and national governments? How should laws be made, and by whom? Who should be authorized to govern those laws? How could the government be designed to protect the unalienable individual rights? Their first attempt at solving this issue was the Articles of Confederation, which was a failure for the most part, but not completely. After the failure of the articles, the state delegates tried to revise the articles, but instead, constructed the Constitution. There were so many changes made and very little remained the same. The Articles of Confederation were approved by Congress on November 15, 1777  and ratified by the states on March 1, 1781. It was a modest attempt by a new country to unite itself and form a national government. The Articles set up a Confederation that gave most of the power to the states. Many problems arose and so a new Constitution was written in 1787 in Independence Hall. The new Constitution called for a much more unified government with a lot more power. One of the key differences between the Constitution and the Articles of Confederation is in the way that they set up the Legislature. The thirteen states formed a Confederation referred to as the league of friendship in order to find a solution for common problems such as foreign affairs. The Articles of Confederation was the nations first Constitution. The articles created a loose Confederation of independent states that gave limited powers to the central government. Under the Articles each state could send between 2 and 7 delegates to Congress. In the Constitution each state was allowed 2 members in the Senate and 1 representative per 30,000 people (this number has now increased greatly) in the House of Representatives. The states with bigger populations wanted representation to be based solely off of population. The states with smaller populations wanted there to be a fixed number of representatives per state, each state would have one vote in the house of Congress, no matter the size of the population. Under the articles, there wasnt a strong independent executive, it established as a unicameral legislature, which it refers to as a Congress. The Constitution on the other hand establishes a bicameral legislature with an upper house, the Senate, and a lower house, the House of Representatives. In the articles, There wasnt any judicial branch but Congress had the authority to arbitrate disputes between states. Congress was responsible for conducting foreign affairs, declaring war or peace, maintaining an army and navy and a variety of other lesser functions. But the articles denied Congress the power to collect taxes, regulate interstate commerce and enforce laws. Because of this, the central government had to request donations from the states to finance its operations and raise armed forces.  The states attempted to limit the power of the national government because they feared that it would become a monarchy. In an effort to limit the power of the national government, Congress created one without enough power to govern effectively, which led to serious national and international problems. George Washington called for a convention in late May 1787; in order speak about the nations political and economical problems and revise the Articles. Delegates from eleven out of the thirteen states attended this convention. They decided on a government consisting of three branches: legislative (Congress), executive (the President), and judicial (Supreme Court). These branches were under the checks-and-balances in order to maintain balance in powers and to prevent tyranny in the country. The Great Compromise solved the issue that arose between the delegates that believed the separation of powers into three different branches would ensure that the United States would not become another monarchy. The Great Compromise resolved the representation issue by forming the two houses that we have today by using the idea of a two-house legislature in order to satisfy both sides. It proposed a legislature in which each state would be represented by two senators (Senate) and another legislature that would be distributed based on the state population (House of Representatives). Voting in Congress was different in the Articles and the Constitution. Under the Articles of Confederation, each state received 1 vote regardless of how many representatives it had. While in contrast to the constitution where in one house, the Senate, every state is represented equally regardless of population. In the lower house, the House of Representatives each state receives one representative for a set number of people. This meant that people could now be represented on a more personal level through the House of Representatives. This satisfied all of the states and helped resolve one of the greatest conflicts while writing the Constitution. Also, in the Three-Fifths clause, delegates agreed that each slave would be counted as three-fifths of a person when determining the population and thus the number of representatives in the House of each state. One of the main weaknesses under the Articles of Confederation was its  incapability to regulate trade and levy taxes. The states controlled all of their cash flows. Sometimes, the states were in debt because of tariff wars that they would engage in with one another. Because of these debts, the states refused to give the national government the money it needed. Hence, the government could not pay off the debts it had gained during the revolution, including paying soldiers who had fought in the war and citizens who had provided supplies to the cause. Congress could not pass needed measures because they lacked the nine-state majority required to become laws and couldnt amend articles because unanimous consent of the all states was required. The states largely ignored Congress, which was powerless to enforce cooperation, and it was therefore unable to carry out its duties. The national government could not force the states to adhere to the terms of the Treaty of Paris of 1783 ending the American Revolution. Foreign countries saw lack of unity in states. Because of the lack of income the national government collected, the new nation was unable to defend its borders from British and Spanish abuse because it could not pay for an army when the states would not contribute the necessary funds. The country would not get rich as a whole because states controlled all interstate commerce. States coined their own money and regulated its supply, so values of currency varied from state to state. Under the Constitution, Congress had the right to levy taxes and regulate commerce. The delegates b_elieved that a strong central government was a threat to American liberties and rights. Usually they were states rights advocates, backcountry farmers, poor farmers, the ill-educated and illiterate, debtors, and paper-money advocates; the low-income classes of society_ had an easier time outlining presidential powers. Although some delegates had extreme opinions-Alexander Hamilton proposed a legitimate monarchy headed by an American king-most agreed that a new executive or president was needed to give the country the strong leadership that it had lacked under the Articles. The primary aim of the Constitution was to create a strong elected government that was responsive to the will of the people, although there is some controversy over this. Many of the Founding Fathers believed that the new  government needed to be insulated from the will of the people; hence the design of such features as the Electoral College or the election of Senators by the state legislatures. The concept of self-government did not originate with the Americans; indeed, a measure of self-government existed in the United Kingdom at the time. But the degree to which the Constitution committed the United States to rule by the people was unique, even revolutionary, in comparison with other governments around the world. In addition to dividing the executive departments into four, the Judiciary Act of 1789 was created. The Judiciary Act of 1789 is a law that created the Supreme Court, thirteen district courts and three circuit courts. This act gave the Supreme Court the right to review state laws and state court decisions to determine whether an act or law is constitutional or not. Laws, acts, civil liberties were protected by the act as well. The delegates wanted to build a government for the people. On the opposing side, there were the Federalists. Federalists were supporters of the Constitution that desired a strong central government. Federalists felt that the Articles of Confederation were weak and ineffective. They felt that National government would protect the rights of the people. Over two hundred suggestions were submitted to Congress in order to protect American citizen rights, but only 10 were chosen. These 10 suggestions became the first ten amendments, known as our Bill Of Rights. The Articles of Confederation are a major part of the USs roots. Some of the ideas and theories from the Articles were strong and did try to better the US but they werent applied the strong enough. Ideas such as the Bill of Rights derived from the Articles. When I think back to how great the Constitution has worked it truly amazes me. It has lasted for over two centuries and continues to help our government function today. The US was able to build upon the mistakes of the Confederations first government. Living by the phrase united we stand and divided we fall the US has been able to build a strong government for its people, making changes as time goes by. References Comparing the Articles and the Constitution The U.S. Constitution Online USConstitution.net. _Comparing the Articles and the Constitution The U.S. Constitution Online USConstitution.net_. Web. 22 Sept. 2014. Feldmeth, Greg D. Articles of Confederation vs. the Constitution. _Articles of Confederation vs. the Constitution_. 31 Mar. 1998. Web. 28 Sept. 2014. Journals of the Continental Congress THE ARTICLES OF CONFEDERATION, WITH AMENDMENTS :: :: :: APRILOCTOBER, 1777. _Journals of the Continental Congress THE ARTICLES OF CONFEDERATION, WITH AMENDMENTS :: :: :: APRILOCTOBER, 1777_. Web. 20 Sept. 2014. S. Doc. 108-17 Constitution of the United States of America: Analysis, and Interpretation 2002 Edition. _S. Doc. 108-17 Constitution of the United States of America: Analysis, and Interpretation 2002 Edition_. 28 Jan. 2002. Web. 23 Sept. 2014. Welcome to OurDocuments.gov. _Welcome to OurDocuments.gov_. National Archives Education Staff. The Constitution: Evolution of a Government. Santa Barbara: ABC-CLIO, Inc., 2001. Web. 22 Sept. 2014.

Sunday, October 13, 2019

Mesos and Kubernetes : A Comparative Analysis

Mesos and Kubernetes : A Comparative Analysis Abstract Containers and application containerization have fast gained traction as the most promising aspects of Cloud Computing. A massive increase in the number and variety of applications has created a need for smooth integration between developer and live environments with quick service time. The amount of user data being handled by todays applications requires heavy computing resources which further require large clusters of hosts. Management of these large clusters is very challenging and containers provide a viable solution. Containers provide an operating system level virtualization for deploying and running applications in a distributed node topology, eliminating the need for configuration of a complete VM per application. Open source technologies like Docker have developed a method that provides better portability for containers. This paper presents a proposal for performance evaluation of two of the most widely used open source orchestration systems Kubernetes and Mesos for cloud native applications. We also provide a brief overview of the importance of choosing the right container orchestration tool to deploy and manage cloud-native applications. Keywords: Kubernetes, Mesos, Cloud native applications, Locust, GCE. With the fast spread of internet hegemony, the conventional and niche web applications are increasing in number. Deployment and maintenance of each of such applications requires a myriad of hardware and associated software designed to perform several generic activities. Rapid progress of cloud computing technologies have aided in decentralizing the implementations, leading to distributed systems. Docker technology provides containers for easy deployment and management of applications. Carefully managed by cluster management tools like Kubernetes and Mesos, replication, failovers, as well as APIs can automate integration and lead to a seamless deployment over clusters of host machines, thereby eliminating disruption of service caused by inherent downtime. Kubernetes: Kubernetes is an open source cluster manager project that integrates cluster management capabilities into a system of virtual machines. It is a lightweight, portable, modular, responsive and fault-tolerant orchestration tool that is written in Go and comes with built-in service discovery and replication utilities. Fig 1.1 shows the architecture and important concepts of Kubernetes. Fig 1 Kubernetes Architecture Important components of kubernetes are : Pods : Pod is the building block for schedul- ing, deployment, horizontal scaling and replication. It is a group of tightly coupled containers that are located on the same host and sharing the same IP address, ports, resources and the same localhost.[7] Kubelet is the agent that runs on the worker nodes that manages Pods, their containers, container images and the volumes if any. Replication Controllers : They control and monitor the number of running pods for a service, and provide fault tolerance.It is the high availability solution of Kubernetes. Kubectl : The command to control the kubernetes cluster once its running. Kubectl runs on the master node. Kubernetes has a policy driven scheduler (Kube-scheduler) which considers availability, performance and capacity constraints,quality of service requirements, and workload. kubernetes can also work with multiple schedulers. Users can add their own schedulers if other constraints are required.[7] Mesos: Apache Mesos is an open-source cluster manager, developed by Benjamin Hindman, Andy Konwinski, and Matei Zaharia at the University of California, Berkeley as a research project along with professor Ion Stoica. Its designed to scale to very large clusters involving hundreds or thousands of hosts such as hadoop tasks, cloud native applications, etc. It enables resource sharing in a fine-grained manner thus improving cluster utilization.To deploy and manage applications in large-scale clustered environments more efficiently, Mesos plays role between the application layer and the operating system and makes it easier. It can run many applications on a dynamically shared pool of nodes. The major components in a Mesos cluster are: Fig 2 Mesos Architecture [6] Mesos follows 2 level scheduling. Each framework asks Mesos for a certain amount of resources it requires, in response Mesos offers a set of resources. Framework scheduler evaluates the offered resources based on its own criteria and accepts or refuses.[7] Apache ZooKeeper acts as a central coordination service to achieve high availability. The design comprises multiple masters, where one is an active leader and ZooKeeper handles the leader election. For high availability setting, a minimum of 3 master nodes is needed. Marathon is a framework that is designed to launch long-running applications, and serves as a replacement for a traditional init system. It provides many features such as high availability, application health checks, node constraints, fault -tolerance and an easy to use web UI for long running application. Marathon Framework is composed of executor and scheduler. The UI of marathon provides an option to start, stop and scale the long running applications. Kubernetes and Mesos makes the process of setting up multiple virtual clusters simpler, allowing for stack management to shed unwanted layers of software which bog down systems. Using Kubernetes and Mesos for cluster management allows for high-level task monitoring, resource allocation and application scaling, whilst offering the control needed to ensure applications run smoothly. Setting up of either Mesos or Kubernetes on Windows means developers and organizations that work between Linux and Windows platforms may use their own tools without requiring heavy resource management. A. Container Orchestration tools and its importance: With the usage of containers, running cloud-native applications on physical or virtual infrastructure is made easy. Containers facilitate easier application management to dynamically adapt to the changing needs of service. It also enables seamless migration of application instances to different environments. Multiple containers need effective management utilities that manage the resources and enable running of containers on different environments, over multiple hosts. Orchestration tools manage applications of different complexities that are distributed for computing over cluster of machines. These tools abstract the cluster systems as a single entity for deployment of application and managing the resources. Orchestrations tools can handle configuration, scheduling and deploying of applications, along with maintenance and support for automatic failovers and scaling. Kubernetes acts primarily as a container orchestration tool whereas Mesos provides a platform to run orchestration frameworks like Marathon or Aurora to manage applications, which may or may not be containerized. Comparing the stand alone Kubernetes orchestration and Marathon with Mesos is effective in understanding the right choice for implementation. B. Proposed solution on Google Compute Engine: There are no synthetic benchmarks that exist to evaluate the performance of Kubernetes and Mesos. This paper aims at evaluating orchestration methods on Google Compute Engine (GCE) for hosted cluster installation and management. A single cluster in GCE for all purposes will have a master VM and four worker VMs. Setting a baseline comparison through a simple cloud application deployment . This is the first proposed benchmark which analyses user experience with minimal containers on Kubernetes cluster and Mesos . Having a Google Cloud Platform account and installing Google Cloud SDK is the first step for this. Cloud application is then deployed on the created cluster to compare their respective processes of deployment. Streaming Engine using Docker clusters on GCE to check the delivery speed , scheduling , and scalability of container orchestrations. This is also to test the feature of pods on Kubernetes where all containers in a pod have single networking point. Standalone analysis using existing tools to test performance and known limitations of both these systems. cAdvisor that collects data about running containers, Heapster which gives the basic resource utilization metrics on Kubernetes and marathon-lb tools on Mesos marathon. This paper aims to provide qualitative as well quantitative metrics to compare and contrast the working of Kubernetes and Mesos. The objective is to compile a substantive list of criteria analysing the performance of both the orchestration tools. The study intends to bring to light comparative results that hitherto do not exist in related literature and also to build upon the existing knowledge through the results of the experiments in this paper. Some of the comparative points are:Load balancing, Scalability, User experience . Kubernetes Mesos Distinctive features Offers a combination of pods which are controlled by replications controllers . IPC between pods systemv semaphores or posix shared memory . Do not support colocation of multiple containers on same mesos. Application distribution Supports master-worker nodes , where the applications are deployed on pods on worker nodes. Supports master-agent nodes , and applications are deployed on different agent nodes. Resource schedulers Has a policy driven scheduler (Kube-Scheduler) Has a 2 levels scheduling approach. Scalability Kubernetes 1.3 supports 2000 node clusters Mesos has been simulated to scale up to 50,000 nodes [9] Load Balancing Supports both internal and external load balancing.. Mesos DNS (rudimentary load balancer), Marathon-lb (haproxy based load balancer for Mesos marathon) Monitoring tools Heapster, cAdvisor and Google Cloud Monitoring .InfluxDB and Grafana as backend tools for visualization. Sysdig and Sysdig Cloud (full metrics and metadata support for Apache Mesos and Mesosphere Marathon framework) The implementation was done on Google cloud platform, using the Google Compute Engine (GCE). Under the scope of the account setup for implementation, following are the details of the resources available. For this implementation, two of the available 4 machines have been used. Resource Machine Names n1-standard-1 n1-standard-2 Virtual CPU 1 2 Memory (GB) 3.75 7.50 Max No of Persistent Disks (PD) 16 16 Max PD Size (TB) 64 64 A. Kubernetes ecosystem Kubernetes ecosystem is spread over two setups as shown below. Two Node Setup Four Node setup Master node VMs 1 1 CPU 1 1 Machine type N1-standard-1 N1-standard-1 Worker nodes VMs 1 3 CPU 2 each 2 each Machine type N1-standard-1 N1-standard-1 Table 3 Kubernetes ecosystem Production grade kubernetes is available open source and can be installed from its official page [10]. After the installation of kubernetes , start up script kube-up.sh can be used to spin up a cluster. A cluster consists of a single master instance and a set of worker nodes each of which is a Computer engine virtual machine.This process takes about ten minutes to bring up a cluster and once the cluster is running , IP addresses of all the nodes can be obtained from the computer engine. Cluster specifications can be specified using environment variables like NUM_NODES , MASTER_SIZE, NODE_SIZE or can also be specified in config_default.sh. kubectl is the command line interface for kubernetes clusters. It supports command types like create, apply, attach , config, get, describe, and delete and resource types like pods, deployment, and services. B. Mesos ecosystem Different approaches were used to implement a Mesos cluster system as per the available resources. The procedure followed for each implementation and the associated complexities are described briefly. The third implementation method, which was incorporated into this project, is described in detail. Single master Single Slave In the first method that was tried for setup, the system was formulated as a single node cluster consisting of zookeeper, marathon, a single master and a single agent processes. The images for these were pulled from the Docker hub, using Docker installed on the GCE shell. Four containers, one each for the process listed were started. The Mesos master UI was accessible through the browser on its designated IP address, at port 5050. Marathon UI was accessed through its external IP address at port 8080. This implementation posed two constraints for successful implementation. The set up used up all the available CPU and a multinode configuration could not be implemented. Further, a public Docker image poses trust issues for a system implementation. It was, therefore, decided to explore other options. Datacenter / Operating System (DC/OS) DCOS is a product of a company called Mesosphere which makes applications and solutions based on Apache Mesos. DCOS is designed as a distributed operating system with Apache Mesos serving as its kernel. The intent is to abstract the different functionalities of multiple machines so as to club them as a single computing resource. DCOS can offer container orchestration as it has Marathon scheduler built into its design at the backend. [11] Installation of DCOS on the Google Compute Engine requires the setting up of a primary bootstrap node on which the GCE scripts shall be run to create the cluster nodes. A yaml format installation file is to be run via Ansible playbook to create and configure the cluster nodes with DCOS running on them. Several environment variables have to be customized such as setting up RSA public/private key pairs that shall allow for a SSH based login into the cluster nodes. The team was unsuccessful in setting up a DCOS running cluster on GCE. The support community for DCOS is not very mature and the installation issues faced by the team could not be resolved. Exploring the services of DCOS has been included as one the future work possibilities in this paper as DCOS promises great potential in terms of effective container orchestration. Installing VMs on GCE In this method, Mesos ecosystem implementation is over 6 virtual machines, using four n1-standard-1 and two n1-standard-2 machine types. The system consists of 3 master nodes and 3 agents, with the Marathon and Zookeeper processes running on VMs 1, 2 and 3, as shown in the figure below. The VMs with two CPUs indicates n1-standard-2 machines. Fig 3 Mesos Implementation Diagram The following processes are run on each of these VMs to establish a self sufficient ecosystem. Marathon Marathon runs as a scheduling framework on Mesos and is deployed over VM1. Zookeeper Zookeeper is a process that manages which master process to run as active and which to keep as standby. Zookeeper processes are run on VM1, VM2 and VM3, to keep a backup zookeeper process running to facilitate automatic failover of a master process. Mesos Master Three mesos master processes are run, each in VM1, VM2 and VM3. The quorum associated with Zookeeper selects one of these three masters to be active and the rest to be standby. Mesos Agents Mesos Agents processes run on VM4, VM5 and VM6. Mesos agent on VM6 runs on an n1-standard-1 machine, as compared to agents on VMs 4 and 5. The Kubernetes and Mesos Cluster systems were set up as described in the implementation section. Each ecosystem was evaluated in different scenarios and the behaviour of the systems were analysed for each of the scenarios in terms of scalability, load balancing and failover capabilities. Kubernetes System: Creating and deploying the application on kubernetes is primarily carried out by the specifications on pod.yaml , deployment.yaml , and service.yaml files. pod.yaml deployment.yaml service.yaml Operations Group of containers tied together for networking Used to schedule the creation of pods and check their health. To expose the created deployment to the outside of clusters. arguments specified -docker image -shared volumes -CPU restrictions on single pod -LivenessProbe -ReadinessProbe -replicas : to ensure the minimum number of pods that needs to be running at all times. -loadbalancer -clusterIP Table 4 Kubernetes :application deployment components Kubernetes Scalability : Setup used for understanding scalability in kubernetes is described in the kubernetes ecosystem section. This process is aimed at gauging kubernetes scalability against the CPU resource utilization of clusters, auto scaling of pods , and API responsiveness. Web based WordPress application was chosen for this purpose. Scaling in kubernetes is achieved by horizontal auto scaling of pods .It dynamically adjusts the number of pods in deployment to meet the load/traffic. Horizontal Pod Autoscaler(HPA) can be created via the kubectl command kubectl autoscale deployment wordpress cpu-percent=14 min=1 -max=10 . This means that the horizontal autoscaler will increase and decrease the number of pods to maintain an average CPU utilization of 14% across all Pods. It also facilitates automatic failover of pods. Locust was used for creating load on WordPress application. Locust is an easy-to-use python based load testing tool which is used to find out how many concurrent users a system can handle . It swarms the web applications with a number of users which is specified by using the web UI. Once the application was hosted by kubernetes , load was initiated to its load balancer ingress IP using locust .The intention was to learn how the auto scalers react on the load as generated by locust. The results of the experiment can be better explained using the tabular format as below. The parameters like minimum and maximum number of pods , target CPU utilization were kept similar to both the setups. Number of requests in the table suggests the total number of users created by locust. Two node setup (Total 7 CPUs) Number of Pods 10 50 150 Target CPU 14 14 8 Max Number of requests 575 966 3158 Failure % 23% 23% 41% Table 5 Kubernetes: Scalability in two node system Four Node setup (Total 3 CPUs) Number of Pods 10 50 150 Target CPU 14 14 8 Max Number of requests 611 1433 7513 Failure % 24% 20% 2% Table 6 Kubernetes: Scalability in four node system Observations from the above tabulated results : The number of pods from 1-10 did not have any significant impact on the failure percentage . The significant difference in the results were spotted as the number of pods were increased. As number of requests increased , the increase in the number of pods was witnessed. And with the load going down pods were downsized automatically. Fig 4 Kubernetes pods in running and terminating states The failure percentage was drastically reduced between the two setups with high load and higher number of pods . The failure percentage is almost similar between the two setups with less load. Setup was benchmarked at 150 for maximum number of pods. It was observed that going beyond this value left many pods in pending state for longer than seven minutes. Starting a pod takes lesser than four seconds in other cases . More number of pods will be created when the target CPU percentage specified in the horizontal auto scaler command is less. CPU resource utilization of four node cluster is as shown below .This shows that the newly created pods were allocated equally across the worker nodes.The below graph is as seen from stackdriver utility. Fig 5 CPU usage of a Kubernetes cluster Fig 6 Load distribution over the worker nodes. Mesos System: Application scalability, in terms of Mesos using Marathon is represented as number of instances that are created and successfully run on the active agent nodes. Marathon provides an option to simulate application instances to be distributed over the agent nodes through the Scale option in the User Interface Dashboard. Applications are specified as JSON files, either through the Create Application option of the Marathon UI or through a JSON file in Git which is imported, built and deployed over Marathon for distribution and scheduling, through the use of continuous integration tool called Jenkins. Deploying an application: Mesos using Marathon forms an orchestration tool for managing application instances on the different active agent nodes. These nodes are managed by a master instance, which is effectively managed by the Zookeeper processes. Distribution of application instances on agent nodes depends on the resources allocated to each of the agents. For this implementation, we consider an application that is not CPU intensive. This application abstracts any data intensive application, that is based on a request response model. Following table summarizes the different scenarios simulated to test scalability of the application, each with the different configurations employed. Cluster configuration represents number of active agent nodes, as number of masters remain at 3. Sl No Cluster Configuration Effective CPUs available CPU Usage per instance (%) Memory usage per application instance (MB) Maximum instances scaled for the CPU available 1 2 Agents 4 10 32 40 2 3 Agents 5 10 32 50 3 2 Agents 4 2 10 200 4 3 Agents 5 2 10 250 Table 7: Scalability analysis with a Data Intensive application The tabulated results indicate the effective operation of Mesos cluster with Marathon scheduling framework, which suggest the easy scalable property of a Mesos cluster system. When there are more number of instances of application that need servicing, a mesos cluster starts new agent process and effectively distributes the application load over the running agents. Load Balancing Increase in number of application instances require more number of agent nodes running to service all the requests. However, the request handling is not efficient, if all of the requests are directed to a single agent. The workload is distributed effectively among all the agent nodes. For the scaling test scenarios described in the previous section, CPU usage was monitored using Google Stack Driver utility. The graph below shows CPU usage at different timelines. The rapid rise or fall of the usage attributes to the increasing/decreasing number of application instances that need servicing. Fig 7 CPU usage of a Mesos cluster with changes in application instances The distribution of workload on all the processes is tabulated, using the Stack Driver utility, as illustrated by the figure below. Fig 8 Load distribution over the six processes There is a significant workload over master node 3, as the marathon process utilizes the core of VM3, even though the process is run on VM1. Master nodes have least CPU usage, owing to the fact that the only operation performed by the nodes is distribution of application tasks over the agents. The agents are represented as three processes named mesos-slave-1, mesos-slave-2 and mesos-slave-3. The workload distributed on these appear even. However, the agent-3 runs only on a single core and it uses 22.9% of the total allocated core. This summarizes the effective load balancing that a Mesos system incorporates. Failover Mesos Cluster system runs additional master processes as standby to facilitate automatic failover of the system. In this experiment, as an initial condition, the quorum of Zookeepers elected Mesos-master-2 to be primary and Mesos-Master-1 and Mesos-Master-3 as secondary. Application deployment was initiated as per the previous procedure, using a JSON file through Marathon. The active tasks on Mesos-master-2 were checked at port 5050 of the master-2 external IP address to check the delegation of tasks to the active agent nodes. To test failover, the mesos-master-2 process was killed. It was observed that the presence of Zookeeper effectively switched the application deployments over the agents through mesos-master-1. The delegation of tasks to slave was now observed through the browser on the external IP address of mesos-master-1 at port 5050. With this project, the implementation and experimentation enabled a better understanding of the concepts related to orchestration, containerization, scalability and load balancing properties of a cluster based environment. This will ease the initial understanding of deployment and management of cloud native applications, and to better setup and environment that houses them. With the help of this documentation, along with the link provided through github, it would be easier to setup an orchestration environment, as the team has tried to collate the steps involved in implementing a cluster with orchestration tools. Through research and experimentation, the team was able to put together enough literature to understand, compare, contrast and conclude on various aspects of orchestration systems and understand the major difference between Kubernetes and Mesos based systems. Lack of resources for implementation of Mesos based systems, and equivocal distinction among the several example implementation required for a better compilation of materials, which was achieved through this project work. In a survey conducted by P Heidari et al [7] on some of the well known orchestration tools with a primary focus on QoS capabilities, the authors have concluded that not all of the solution tools provide a guaranteed healthy running replicas to effectively maintain the quality of service. They have cited that tools like Marathon and Fleet tend to go into a state of unprecedented wait due to the need for appropriate resources. There is a need of an elasticity e