Thursday, January 23, 2020

LSD :: Hallucinogens Drugs Essays

LSD Lysergic Acid Diethyl amide (LSD) has been implicated in a variety of studies to determine its potential for influence on certain neural activities. To date, little that can be certified as concrete fact has been found, though a number of theories with considerable support exist. Although dopamine, epinephrine, and norepinephrine may be implicated in some LSD studies, serotonin seems to be the main focus of scientific inquiry with respect to LSD. Leicht (1996), postulates four theories concerning serotonin (5-HT) pre- and post- synaptic transmitter sites and the potential for LSD to affect these sites, in particular. All of these theories point to the synaptic neuronal dendrites and terminal buttons as the main suspects with regard to LSD and its particular target area on the neurons themselves. After considerable dialogue which analyses studies by Aghajanian and colleagues, Leicht came to the conclusion that the evidence points toward certain types of activities on particular pre- and post-synaptic serotonergic neurons. The theories are as follows: 1: LSD Pre-synaptically inhibits 5-HT neurons. 2: LSD Post-synaptically antagonizes 5-HT2 receptors. 3: LSD Post-synaptically partially agonizes 5-HT receptors. 4: LSD Post-synaptically agonizes 5-HT receptors. Neural clusters in the Raphe Nuclei, which spread out from there, mainly into the frontal and prefrontal cortices have been identified as serotonergic. They are also auto-reactive, and LSD appears to inhibit the spontaneous firing of the neurons at that site, when the drug is systemically administrated. 5-HT2 receptors have been identified as pH dependent, while LSD molecules have been identified as pH independent. 5-HT2 receptors are connected to a second messenger system (phosphatidyloniitol, or PI). PI turnover has been found to be affected by 5-HT2 in an antagonistic fashion, but is stimulated by 5-HT. LSD, in micrometric doses, can inhibit 1000 times that amount of 5-HT, which supports theory #2, as well as supporting, partially, theory #3; when LSD is administered in a variety of doses, it apparently acts as a partial agonist. Though LSD and 5-HT are highly compatible, 5-HT is more effective at the serotonin receptor site, but LSD can compete with it at the 5-HT2 site. The conclusion is, â€Å"†¦since 5-HT is a more potent agonist than LSD, the effects of LSD would appear antagonistic.â€Å" Finally, for theory #4, Leicht cites Dr. Glennon’s explanation of LSD’s relationship with post-synaptic 5-HT receptors.

Wednesday, January 15, 2020

Brand Update: Cadbury Dairy Milk For Shubh Aarambh Essay

Cadbury’s Dairy Milk has recently launched a new campaign † Shubh Aarambh† ( meaning Auspicious Beginning ). The campaign is the refined version of the earlier Payday campaign which evoked mixed response from the Ad analysts and consumers. The Shubh Aarambh campaign reinforces the occasion based positioning of Dairy Milk. The brand has been trying to position itself as a symbol of enjoyment and celebrations. Indians have the tradition of sharing sweets on auspicious occasions and also when one initiates a venture/activity. Whether the activity is small like writing an exam or huge like starting a company, sharing of sweets is an integral part of the event. The belief is that good things happen when one starts a venture on a positive note ( like sharing sweets). Dairy Milk very cleverly captured this tradition and incorporated into its brand story. The new campaign takes the brand to the center of this tradition linking Dairy Milk to Sweet and Auspicious Beginning. While the previous PayDay campaign was a narrow interpretation of the occasion based positioning , Shubh Aarambh has given the brand a broad playing ground. In my opinion, the brand has hit upon a really great Big Idea. The concept is very much Indian and offers huge opportunity for creatives to weave great stories for the brand. Watch the launch ad here : Shubh Aarambh The concept also gels with the brand’s tagline † Kuchch Meetha Ho Jaye â€Å". The launch campaign is targeted at younger generation and hence the brand added a little humor and twist into the campaign. Shubh Aarambh is a great idea for this great brand. It will be interesting to see how Dairy Milk milks this idea to the fullest.

Tuesday, January 7, 2020

Ch1 Comp Security - 2287 Words

Chapter 1: Introduction to Information Security TRUE/FALSE 1. An indirect attack involves a hacker using a personal computer to break into a system. ANS: F PTS: 1 REF: 3 2. The value of information comes from the characteristics it possesses. ANS: T PTS: 1 REF: 6 3. By balancing information security and access, a completely secure information system can be created. ANS: F PTS: 1 REF: 8 4. The security blueprint is a detailed version of the security framework. ANS: T PTS: 1 REF: 25 5. One of the basic tenets of security architectures is the spheres of security. ANS: F PTS: 1 REF: 30 MULTIPLE CHOICE 1. Which term describes a subject or object’s ability to use, manipulate, modify, or affect another†¦show more content†¦a.|linear|c.|graphical| b.|triangular|d.|semantic| ANS: C PTS: 1 REF: 8 9. Which individual interferes with or disrupts systems to protest the operations, policies, or actions of an organization or government agency? a.|Cyberterrorist|c.|Phreaker| b.|Packet monkey|d.|Hacktivist| ANS: D PTS: 1 REF: 11 10. Which individual is considered to be a script kiddie who uses automated tools to inundate a Web site with a barrage of network traffic, usually resulting in a denial of service? a.|Cyberterrorist|c.|Phreaker| b.|Packet monkey|d.|Hacktivist| ANS: B PTS: 1 REF: 12 11. Which threat is the most common intellectual property (IP) breach? a.|Software piracy|c.|Shoulder surfing| b.|Spoofing|d.|Password cracking| ANS: A PTS: 1 REF: 12 12. Which attack is used when a copy of the hash of the user’s password has been obtained? a.|Rainbow attack|c.|Dictionary attack| b.|Brute force attack|d.|Spoofing| ANS: A PTS: 1 REF: 13 13. Which e-mail attack occurs when an attacker routes large quantities of e-mail to the target system? a.|Buffer overflow|c.|Spam| b.|Mail bomb|d.|Timing attack| ANS: B PTS: 1 REF: 16 14. A(n) ____ is an application error that occurs when more data is sent to a buffer than it can handle. a.|timing attack|c.|dictionary attack| b.|application control list|d.|buffer overflow| ANS: D PTS: 1 REF: