Thursday, October 31, 2019

Compare And Contrast The Ideas, Background, And Philosophies Of Essay

Compare And Contrast The Ideas, Background, And Philosophies Of Confucius And Buddha - Essay Example On subsequent rides, he encountered a deceased body and a sick one. It was at this point that he became aware of the suffering of humans. Even the wealthy, he realized, were unhappy and frustrated, with all men susceptible to disease and death from the disease. This led him to believe that there existed more in life than pleasures of a transitory nature. Becoming disturbed by all that he had seen, he left the palace, bidding his family farewell and leaving his possessions. He was penniless, as he wandered and made attempts at asceticism, which he later abandoned (Fowler 236). It was at this point that, upon deep reflection, he became convinced that he was the enlightened one, Buddha. Confucius, on the other hand, although, of noble birth, was born to a poor family. Born in the state of LU, his father passed away when he was young, leaving him under the care of a poor mother. He was in minor government service as an official during his youth, resigning the position later. Aged nineteen, he married Qi Quan, and he had a child by her at twenty, named Kong Li. Confucius then spent his next sixteen years as a teacher and his philosophy attracted quite a few disciples. The government of Lu granted him a high position when he was in his fifties, but court enemies brought about his dismissal after four years. Leaving the state, he became an itinerary teacher for thirteen years, before returning to Lu for the final 5 years. In his earlier life, he was reported to be a bookkeeper, clerk, cowherd, and a shepherd (Yao 190). ... This led him to believe that there existed more in life than pleasures of a transitory nature. Becoming disturbed by all that he had seen, he left the palace, bidding his family farewell and leaving his possessions. He was penniless, as he wandered and made attempts at asceticism, which he later abandoned (Fowler 236). It was at this point that, upon deep reflection, he became convinced that he was the enlightened one, Buddha. Confucius, on the other hand, although, of noble birth, was born to a poor family (Yao 190). Born in the state of LU, his father passed away when he was young, leaving him under the care of a poor mother. He was in minor government service as an official during his youth, resigning the position later. Aged nineteen, he married Qi Quan, and he had a child by her at twenty, named Kong Li. Confucius then spent his next sixteen years as a teacher and his philosophy attracted quite a few disciples. The government of Lu granted him a high position when he was in his fifties, but court enemies brought about his dismissal after four years. Leaving the state, he became an itinerary teacher for thirteen years, before returning to Lu for the final 5 years. In his earlier life, he was reported to been a bookkeeper, clerk, cowherd, and a shepherd (Yao 190). After his court dismissal, he embarked on a winding journey that covered Cai, Chen, Song, Wei, and other states in central and northeast China where he articulated political beliefs in their courts, which he did not see implemented. Both Buddha and Confucius challenged authority. Buddha had quite a different view to religion as compared to his native Hinduism (Fowler 240). He felt that Hinduism had begun to degenerate into superstition, magic, rituals, polytheism, and empty philosophical disputes and

Tuesday, October 29, 2019

Progress report on internet abuse and employee productivity case study Essay Example for Free

Progress report on internet abuse and employee productivity case study Essay The internet has able to improve business by increasing productivity because of improved information dissemination and decision-making, however employers are concerned by employees who use it for their personal and social needs during working hours which occurs because the workplace give them a sense of privacy. The monitoring of employee internet use has created tensions between employers, who monitor employee use to protect data leakage and check employee productivity, and employees, who feel a breach of trust whenever monitored, who suggest that casual internet use is not detrimental, and who have felt emotional and physical problems because of monitoring. The internet has had significant impact in the 1995 economic boom despite studies which show that this is only felt in the microeconomic level. A UN report has shown that American employees are less productive than their European and Asian counterparts because they cannot improve side-by-side with the effects of Moore’s Law. Organizations which have put in investments in technology improvements have not felt the supposed exponential increase in revenue and increase in market share because they have not reduced input resources such as the number of employees and that their employees have not increased in knowledge or productivity. It was suggested that to reduce productivity losses non-internet tasks should increase, productivity benchmark methods revised and incentives given to productive employees. IT was also suggested that to avoid employee-employer conflicts, the employer must give ample time for internet use, enforce a written internet and e-mail use policy, forge a company website that will help employees to finish tasks, and keep a friendly working atmosphere. The employees in turn must not use the internet often for personal use and enhance their productivity in line with the company’s premier interests. I have completed the entire research project and found out that employee and employer relations can be resolved following my proposed guidelines which I have made after preceding research from articles in magazines and books. I have found that employees regard monitoring as a beach of trust and had felt emotional tolls during monitoring by their bosses. Employers on the other hand only move to monitor to ensure the security of company data. I have found out that employee productivity has decreased with the increase in IT investments among companies. I have proposed guidelines and suggestions basing on my readings to decrease worker productivity losses. Work Completed I found this survey conducted by Mercer Management Consulting and have gathered that companies though they have invested much on improving technology to increase their business’ efficiency, have not yet felt the projected increase in sales. I have gathered from an article on The Economist that according to the joint research venture between MIT and U Penn the paradox that is the decrease of worker productivity despite increase in IT investments can be attributed to the factors they have laid out. This information I have placed under Technology vs. Productivity. After connecting ideas, and finding the real root of this paradox, I have now searched for references to build a suitable to-do list for employers and employees to resolve the worker productivity losses. I read a New York Times copy dated February 9, 2000, with an article saying that employers who give incentives to productive employees contributed to the increase in US productivity in the 2nd quarter of 1999. I have gathered form a copy of PC week that filtering and monitoring policies increased productivity of employees, from this idea I suggested in my research paper that employers must impose strict e-mail and internet use policy. Conclusion After so much consideration of facts, I have come up with a research paper that will explain the problems of employee productivity and internet abuse and guide employees and employers while joining forces to reduce productivity losses. Reference Gupta, Jatinder, and Sushil Sharma. â€Å"Improving Worker’s Productivity and Reducing Internet Abuse. † The Journal of Computer Information Systems 44. 2 (2004): 75-78.

Sunday, October 27, 2019

A cellular network

A cellular network A cellular network is a radio network made of number of radio cells, each severed by fixed positioned based station. These cells stations cover several different areas and provide large radio coverage. In order for this to happen a variable number of portable transceivers can be used in any cell and moved through one cell during transmission. The use of multiple cells means that if the distributed transceivers are mobile and moving from one point to another point they should change also from cell to cell. This mechanism could be different according to the type of network and change of circumstances. In this case clear coordination between base station and mobile station is must in order to avoid communication interruption. The most common example of cellular Network is a cell or mobile phone, which is a portable telephone that could be dialled or receives calls through base station or transmitting tower. Radio waves transfer signal to and from mobile phone. The coverage area of service provider sometime is split into small cells in order to prevent signal losses and also a large number of active phones in the area. The range of signals could be different in cities and rural areas. All base stations are connected to mobile phone switches centre, which connect to a public telephone network or to another mobile company switch. As the mobile consumer moves from one cell area to another cell, the switch automatically commands the handset and a cell site with a stronger signal (reported by each handset) to switch to a new radio channel (frequency). When the handset responds through the new cell site, the exchange switches the connection to the new cell site. Modern cell phones networks use cell as radio frequencies are limited, shared resource, base stations and handsets change frequency and use low power transmitters in order that limited number of radio frequency can be used at the same time by many users with less interferences. To distinguish signals from a varieties of different transmitters, frequency division multiple access (FDMA) and code division multiple access (CDMA) has been developed. Advantage of cellular Network over other alternative solutions is: Increase capacity. Power usage reduced. Huge coverage area. Interference from other signals reduced. Reference paper 10 The evolution of the cellular Network started to flourish during the last years in which several different systems were developed; as a result we have first generation (1G), second generation (2G), third generation (3G) cellular networks and the trend is continuously increasing. The first generation (1G) was used from 1970-1980 and now is retired. In 1990 the second generation (2G) of Networks were launched such as Global System for Mobile communications (GSM), Personal Communications Service (PCS), and Integrated Digital Enhanced Network (IDEN) and so on. The second generation (2G) of networks replaced the (1G) and became very popular with digital processing, enabling wireless transmission of voice as well as data and have different Variety of new features such as a Push to Talk, Short Messaging service(SMS), caller ID, conference calling, voice mail, email messaging and so on. After the ongoing success of 2G, carriers to respond to the worldwide demand of the speed trend, they developed a robust interim generation of cellular Networks which is the 2.5G such as General Packet Radio Service (GPRS), Enhanced Data Rates for GSM Evolution (EDGE), High-Speed Circuit-Switched Data (HSCSD) and so on. This upgrade increase bandwidth needed to support a diverse variety of new applications including large email messages resourceful web browsing, navigation, basic multimedia faxing and different data at typical dialup speed. This generation of network become popular and supported many firm’s workers. Carriers continuously competing to add further enhancement to the new generation of Networks and from as a result we have the third generation (3G) with increased bandwidth to DSL with range of 144 Kbps to 2+Mbps are produced to provide support for more demanding multimedia applications such as video conferencing, voice over (VOIP), full motion video and streaming music to support television programs (satellite radio) and faster file downloads. GSM IT is standard mobile telephone system used across Europe and created in 1982. Global system for mobile communication (GSM) is one of the second generation (2G) of mobile Networks promoted by the GSM association, became the most popular standard mobile phone in the world with over 3 billion customers in more than 212 countries. GSM is a cellular Network and this means that mobile phones connect to it by searching for cells or nearest site. GSM has five different cell sites and its presents everywhere makes international roaming very common between phones operator; also allow mobile users to use their device in many parts of the world and change carriers without changing phones. On the other hand GSM benefits Network operators who have the possibility to choose equipment from any worldwide vendors using GSM. Features of GSM are: Low cost alternative to voice calls. Text messaging. Worldwide emergency telephone number (112/999), which connects international travellers to emergency service without knowing the local emergency service number. The GSM standard enhanced their services adding the general pocket radio service (GPRS), higher speed data transmission using enhanced data rates for GSM evolution (EDGE). GSM Network operates in a number of different frequency ranges with continuously enhanced full rate coder-decoder (CODEC). One of the key features of GSM is the SIM card or subscriber identity model, which contains the user’s subscription information and phone book. Finally the GSM system and service are governed by ETSI standard, which is a European telecommunication service institute. BTS BSC MSC GMSC VLR HLR Access Network MS BSS SMSS OMC EIR AUC OMSS ISDNPSTN GSM Sub Systems architecture GSM is a part of 2nd Generation systems. GSM’s purpose was to provide a circuit switched telephony service to mobile users. GSM uses Time Division Multiple Access. GSM has a different core network than 2.5 Generation and 3rd Generation infrastructure. The Synchronous Digital Hierarchy (SDH) or Synchronous Digital Network (SONET) standards provide a conventional transmission line in fixed connections as like from BSS to SMSS interfaces. Inside of the core network, Mobile Application Part signalling (MAP) is used. Functionality of Various Modules of the GSM System There are three subsystems in GSM network .These are: Base Station Subsystems (BSS) Switching and Management Subsystems (SMSS) Operation and Maintenance Subsystems (OMSS) Base Station Subsystems (BSS) In GSM networks, the access network plays a very important role to connect terminals to the network. The access network BSS is connected to the core network. The main purpose of BSS is to set the connection between a Mobile Station and the Base Station. The first component of a BSS network is the Base Transceiver Station (BTS), which is responsible from air interface and creating a bridge between the network and the Mobile Station (MS). The second component is the Base Station Controller (BSC), which is responsible from all the Base Transceiver Stations (BTS). Simply it is responsible to allocate and release channels at air interface. Base Station Subsystems are connected to SMSS and OMSS. Switching and Management Subsystems (SMSS) SMSS is divided into two components. These are Mobile Switching Centre (MSC) and Gateway Mobile Switching Centre (GMSC). MSC is responsible for all the base stations which are connected onto Mobile Switching Centre (MSC) over Base Station Controller (BSC). The GMSC is responsible from the external fixed network line. Whenever there is a phone call, it comes in or goes out from GMSC. All the incoming calls are directed to Home Location Register (HLR) to detect and look at the profile of subscriber in order to determine if the subscriber is able to make a phone call or not . If the call is accepted it goes to MSC, then from MSC the call goes into Visitor Location Register (VLR), VLR knows the location of mobile stations. Simply we can say that the VLR is responsible from the access network and also from MSC too. Operation and Maintenance Subsystems (OMSS) Operation and Maintenance Subsystems (OMSS) is mainly responsible for the security of the network. For example, if the phone is stolen or if the subscriber didn’t pay his bill. One of the important data bases in OMSS are Equipment Identity Register (EIR) and the Authentication Centre (AUC). Ref 11 wiki Universal mobile telecommunications system (UMTS) Universal mobile telecommunications system (UMTS) is one of the third generation (3G) mobile telecommunication technologies, which is also being designed in a (4G) technology. The name UMTS is introduced by ETSI and is usually used in Europe but adapt other names outside the continent, instructed by 3GPP and is a part of a global ITU IMT-2000 Standard. The most common form of UTMS Network uses Wideband Code Division Multiple Access (IMT direct spread) as the underlying air interface. The idea that lies behind the UMTS is to create a network component which is close to GSM/GPRS and also to be able to operate under this existing GSM/GPRS Network (GERAN). UMTS has an additional Access Network to GERAN. All the components in this new access network are totally different than the components in GERAN access network. As it is mentioned before UMTS can work with both Circuit Switch (2G) and Packet Switch domain (2.5G 3G), therefore there are two access networks. One of these is called Radio Access Network (GERAN) and the second one is called UMTS Terrestrial Access Network (UTRAN). Showing UTRAN infrastructure The GSM network is a circuit switched network, which means, that there are no IP, high data rate or multimedia messages. UTRAN is a packet switched network, where everything is based on IP address, high data rate and many other facilities are available. In GSM infrastructure, we have got a Mobile Station (MS), Base Transceiver Station (BTS) and Base Station Controller (BSC). But this infrastructure is totally different in UTRAN infrastructure. In UTRAN, there is user equipment (UE) which is the same as Mobile Station in GERAN/BSS. Another component is Node B (NB). The Node B is the base station as BTS and this Node B (NB) is controlled by Radio Network Controller (RNC). RNC is the same as BSC in GERAN/BSS. The main differences are higher data rates, enhanced security, new protocols and signalization for enhanced service factors. These are all provided by the new components in an access network of UTRAN/RNC. UMTS there are two core networks and two access networks. The advantage of UMTS is that it is very flexible. UMTS supports both circuit switch and Packet Switch Networks. One core network is designed for CS domain and the other one is designed for PS domain. Circuit switch is for the old generation mobiles but still in use. CS domain is not based on IP; we can simply say that CS domain is needed for GSM network. Packed switch domain is based on internet protocol (IP) and has different new protocol and signalling. PS domain enables high speed data rate as a result of this is that video messaging and all these other internet based and high speed data rates can be obtained. PS domain is needed for GPRS and UMTS. In UTRAN/RNS, user wants to make a call. In this case the user equipment (UE) searches for the nearest Node B and sets the connection. Once the connection is set the call is transferred from Node B (NB) to Radio Network Controller (RNC), From RNC the call goes to PS domain Core Network in GERAN/BSS. Mobile Station (MS) searches for the nearest Base Transceiver Station (BTS) and from here the MS is directed to BSC, if the call is IP based from BSC then the call will be directed to PS domain core network, if the call is not IP based than it goes to CS Domain core network. UMTS Block Architecture Iub – This interface happens between the Node B and RNC. RNC is using I-ub interface to control one or more Node B. The I-ub interface is standardized interface; there is also a signalling protocol which uses NBAP. Iur – This interface happens between the Radio Network Controllers (RNC). Iur helps the RNC to pass its information or data to another RNC. After this process, the user equipment is transferred to new RNC; the signalling protocol uses Radio Network Subscriber Application part (RNSAP). There are two Iu interface for both PS and CS core networks, one for Iu CS another one is for Iu PS. Iu CS This interface happens between UTRAN/RNS and the circuit switch core network domain. Iu-CS carries voice and signalling between UTRAN/RNS and PS domain core network. The signalling protocol is called RANAP. Iu PS This interface happens between UTRAN/RNS and the packet switch core network domain. This core network is designed for UMTS and GPRS. Iu–PS carries voice and signalling between UTRAN/RNS and PS domain core networks. The signalling protocol is RANAP.

Friday, October 25, 2019

Raves :: essays research papers

We’ve all seen them before. Maybe at a bus stop, in our schools, or at the coffee shop. â€Å"They† look odd enough to frighten a circus clown, but for some reason, they always smile when you look their way. Perhaps it’s that their hair is the color of the sunset or that their pants look like they could house a small family. It could be that their headphones seem permanently glued to their ears and that they’re never afraid to groove on the sidewalk. Whatever the reason, you know that â€Å"they† are not quite normal. You may call them â€Å"freaks,† or â€Å"punks,† or simply â€Å"those crazy kids.† But if you did, you’d be misled for â€Å"they† are not you’re average young people, no, â€Å"they† are ravers. Before we go any further, I think I should first dispel some rumors and ease your mind of the negative thoughts that must be sweeping through it. What do you think of when you hear the word rave? Drugs? Hoodlum kids running amuck? Loud music that interferes with the whole community’s sleeping habits? Violence? The dictionary defines the word â€Å"rave† as a numerous amount of things, such as â€Å"an act or instance† or the verb â€Å"to talk with extreme enthusiasm,† but this is one case where Webster has got it all wrong. What is the true definition of a rave? In most cases, a rave is simply a dance party where guests experience a sense of camaraderie and elevated consciousness through the presence of music. This means there is an abundance of dance expression, interaction with other such ravers, and a positive mood change. And while there are sometimes drugs involved, there is absolutely no deliberate disturbance of the peace and zero tolerance for vio lence. But I’m getting ahead of myself. Let’s divulge into the history of this invigorating phenomenon. The exact origin of raves is unknown, though many say the gatherings are reminiscent of American Indian religious ceremonies, like pow-wows. The first modern raves are said to have occurred in English warehouses around 1987 and were focused around homosexual males. Since then, raves have grown more than anyone might think possible. With this growth has come evolution as well. Raves are now held in nearly almost city or town, whether it be heavily populated or in the middle of cornfields. Customarily, they are centered in abandoned warehouses decked out in black lights and strobes, but they have taken place on beaches, in caves, and virtually any other place with enough room for the 500-1500 person congregation.

Thursday, October 24, 2019

Network Based Intrusion Prevention System (Nips)

Network Based Intrusion Prevention System (NIPS) Definition: An intrusion prevention system sit in-line on the network and monitors the traffic, and when a suspicious event occurs it takes action based on certain prescribed rules. An IPS is an active and real time device, unlike an Intrusion detection system which is not inline and they are passive devices. Intrusion prevention systems are considered to be the evolution of intrusion detection system. Alternately, an Intrusion prevention system is usually a hardware device that is connected to the network.It function is to monitor the network for nay unwanted behavior and to prevent such behavior. A Network based Intrusion prevention system (NIPS) is used to monitor the network as well as protect the confidentiality, integrity and availability of a network. Its main functions include protecting the network from Threats such as Denial OF Service and unauthorized usage. Explanation: Network based intrusion Prevention system monitors the network for malicious activity or suspicious traffic by analyzing the protocol activity. NIPS once installed in a network it is used to create Physical security zones.This in essence makes the network intelligent and it and quickly discerns good traffic from bad traffic. In other words the NIPS becomes like a prison for hostile traffic such as Trojans, worms viruses and polymorphic threats. NIPS are manufactured using high speed Application Specific Integrated Circuits (ASICS) and network processors. A Network processor is different when compared to a micro processor. Network processors are used for high speed network traffic, since they are designed to execute tens of thousands of instructions and comparisons in parallel unlike a microprocessor which executes an instruction at a time.NIPS are considered to be extensions of the present Firewall technologies. Firewalls inspect only the first four layers of the OSI model of any packet of information flow. However, NIPS inspects all s even layers of the OSI model making it extremely difficult to hide anything in the last four layers of a packet. Majority of the network based Intrusion prevention Systems utilize one of the three detection methods they are as follows: †¢Signature based detection: Signatures are attack patterns which are predetermined and also preconfigured.This kind of detection method monitors the network traffic and compares with the preconfigured signatures so as to find a match. On successfully locating a match the NIPS take the next appropriate action. This type of detection fails to identify zero day error threats. However, it has proved to be very good against single packet attacks. †¢Anomaly based detection: This method of detection creates a baseline on average network conditions. Once a baseline has been created, the system intermittently samples network traffic on the basis of statistical analyses and compares the sample to the created baseline.If the activity is found to be ou tside the baseline parameters, the NIPS takes the necessary action. †¢Protocol State Analysis Detection: This type of detection method identifies deviations of protocol states by comparing observed events with predefined profiles. Comparison OF NIPS and HIPS: Network Based intrusion prevention System: †¢Monitors and analyzes all the network activities. †¢Easier to setup, understand and implement. †¢It proves to be better in detecting and preventing attacks or suspicious activities from the outside. †¢Less expensive. Near real-time response. Host based intrusion Prevention System: †¢Narrow in scope, watches only certain host activities. †¢Much more complex setup and understanding when compared to NIPS. †¢Better in detecting and preventing attacks from the inside. †¢More expensive than NIPS. Comparison OF NIPS and NIDS: Network Based Intrusion Prevention System: †¢Acts as a network gateway. †¢Stops and checks suspicious packets. à ¢â‚¬ ¢Prevents successful intrusions. †¢False positives are very bad. Network Based Intrusion Detection System: †¢Unlike NIPS, it only observes network traffic. NIDS logs suspicious activities and generates alerts. †¢Cannot stop an intruder, unlike NIPS. †¢False positives are not as big an issue when compared to network based intrusion prevention system. Summary: A Network based intrusion prevention system must meet the very basics necessities of networking. They are as follows: †¢Low latency: Less than 3ms, regardless of frame size, traffic mix, line rate or attack filter count. †¢Large session counts: Around 50,000 to 1,00,000 simultaneous sessions. †¢Multi-Gigabit Speeds: To support backbone traffic and protect against internal attack. High availability: Must automatically become a transparent switch should any internal element collapse. †¢Precision: Should neither block nor drop good traffic. Sources: http://www. cisco. com/web/about/cisco itatwork/security/csirt_network-based_intrusion_prevention_system. html http://en. wikipedia. org/wiki/Intrusion_prevention_system http://www. foursquareinnovations. co. uk/software_development_and_ebusiness_articles/intrusion_prevention_systems_5. html http://www. infosecwriters. com/text_resources/pdf/JCooper_NIPS. pdf

Tuesday, October 22, 2019

Life of early man Essay

But these changes in early human’s life had taken a very long time. Through ‘Early Human’s Life’ educational series, we are trying to take some snapshots f efforts made by early humans to become civilized. Today, we live a better life in concrete fiats and facilitated with TV, Video, schools and colleges; have variety of nutritional foods, and better means of communication and transportation. But can you imagine a life without such facilities for us? A life where there is no big society, no house to live, no good food, no clothes to wear etc. How does It feel to listen? Yes, you are right. we are talking about the wild life. And this was the life of none other than our ancestors (Early man) who used to live in Jungle nd lived a very hard life. Life style and food of early humans: Early humans lived in Jungle and were afraid of bigger and stronger wild animals. t Of2 themselves behind the bushes. But it could provide them security from wild animals, rain, winter and sun heat. So, they started living in caves. As food and clothes is the basic necessity of humans, they started wrapping tree leaves and animal skin over their body to protect themselves from cold and heat. But they needed food also to live. They do not know how to grow crops in fields and finding food was not easy. In search of food, they had to go from one place to another. Earlier, they used to eat fruits from tree or roots of plants. Then they started hunting animals for food. Discovery of tools: In start, early man started killing small animals for food. But they could not kill large animals with their bare hands. So, they used sharp edged stones to kill animals. Probably, this was the first tool he had started using for his need. They kept on improving their tools with time and requirements. They found that if they tied a sharp stone to a long piece of wood, they could throw it to a wild animal at a longer istance and they did not require go near to kill it. This was the invention of a spear. Later, on they improved it by making with bones and started using tools not only for hunting but also for cutting, digging and sewing. Discovery of Fire: Early humans ate raw flesh as they did not know how to cook their food. They had seen broken out fire in Jungle severally, but did not know how to make it and how they could use it. Rather, they were afraid of it like animals. With time, they felt that they could use it for keeping themselves warm in winter. But making fire was really a big problem. So, they decided to keep Jungle fire burning and started to adding dry grass or leaves to it. But it was not a permanent solution. One day, they saw sparks coming out from rubbing stones who were rolling down from the hills or some other way and got idea to make fire by rubbing two stones. This was really a great discovery as now they were able to make fire whenever required. With time, they learnt other uses of fire too. They found that they can light up their caves and protect their family from cold and wild animals using fire. They also came to know that the roasted food is much softer than raw one and also tastier to eat and this was the beginning of cooked food. In this article, we discussed about hard life of early humans and their efforts to make it more comfortable. We explored the ways he invented tools, fire and searched better place to live in. In our next article, we shall discuss some more very interesting discoveries by early human and the expected ways he explored them. We shall also discuss his efforts to be more cultured and what make him social in behavior.