Tuesday, October 29, 2019

Comparison Essay Example | Topics and Well Written Essays - 1000 words - 2

Comparison - Essay Example Similarities Irrespective of whether communication is in-person or electronic, it consists of some basic elements that ensure the transfer of information. Both in-person and electronic communication therefore follows an outline, with specific elements of the communication process. The first element is the piece of information to be transferred as it forms the basis of communication. Further, there must be a sender. This party has the piece of information and wishes to transfer it to another party. The sender then uses an encoding process to disseminate the message in a form that can be understood by the receiver. The encoded information is then transmitted from the sender’s location to the recipient’s location. Once the receiver gets the information in its encoded form, he or she decodes the message into an understanding that generates reaction to the received message. Such a reaction facilitates a response to the sender to complete the communication process. The commun ication process, whether in in-person or electronic is also subject to noise in the transmission channel that develops barriers between the sender and the receiver. Electronic communication also has variety of features that corresponds to those of the different types of in-person communication. This is because it incorporates a majority of characteristics of in person communication elements. ... Incorporated voice applications have also been developed to allow for electronic voice communication. An example is using ‘skype’. This approach corresponds to a number of voice based in-person communication approaches with particular similarity to telephone and mobile phone calls. In both cases, the sender disseminates information and receives an immediate response through a dual line oral communication. Similarly, application of audio visual devices to electronic communication has establish its similarity to the interactive face to face in-person communication in which parties to a communication both hear and see one another during a communication process. The similarity compares meeting based communication in face-to-face communication to video conferencing in electronic communication. Both of the approaches offer an interactive forum in which parties to the communication can be organized into a discussion forum. These features identify electronic communication as a c omprehensive approach that combines different features of in-person communication towards application of a multipurpose communication method that can fit into different applications. Electronic communication and in-person communication also share a similarity in their ability to promote teamwork among members of a group. Based on the common features in both methods of communication, they link group members towards interpersonal communication and even interactions. As a result, they both develop interpersonal bonds and understanding that facilitates cohesion. This leads to focus on goals and a resultant corporation towards building teamwork. The features and functionalities of in-person communication and electronic communication also identify a

Sunday, October 27, 2019

Theories of Kant for Company Ethics

Theories of Kant for Company Ethics Early growth in computer processing had little effect on jobs, But as year goes by artificial intelligent had evolve to a point where it is able to think like a human as more and more large amount of new skills were being captured. With these robots, automation or software it is possible to replace people who’s worked in manufacturing industry, service industry or even agriculture industry. Since the notable advancement in computing technology which moves from improved industrial robotics to automated translation service. Andrew McAfee believes that these transition had becoming the reasons behind the sluggish employment growth of the last 10 to 15 years as the rapid technological change has been destroying job faster than it is creating them. (Andrew McAfee, 2012) Therefore, a new argument had risen over the years among employer and employees whether should companies should be responsible for the unemployment caused by their information system. Hence several ethical point of view had been brought up to response to this issue where from ethical egoism point of view believes that companies should not responsible for unemployment as with the information system they are able to benefit from a long term profit therefore this is a morally right action. But Kantianism point of view will be discussed throughout this article to respond to this issue. Kantianism is a deontological ethical theory that concludes that the only good thing in the world that can be called good without qualification is a good will. (Michael J.Quinn, 2003) This bring us back to the issue where should companies be responsible for unemployment caused by their information system. From Kantianism perspective, companies should be responsible for unemployment as Kantianism theory had pointed out that when ones struggles between what ones’ want to do and what ones’ ought to do, what ones’ want to do is no longer important. Ones should only focus on what ones’ ought to do (Michael J.Quinn, 2003). Therefore, the discussion below will look into several categorical imperative formulation that were proposed by Kant to have an in depth view to determine whether companies should or should not be responsible for from Kantianism perspective. Categorical Imperative first formulation poses the basic conception of fairness and universalizability where there will be a consistent law that were tailored for everyone and not there cannot be one rule for me and another for everyone else. For examples, if a company starts to retrench employees that were caused by their information system and felt that it is ok for that company to retrench their employees by doing so companies will be denying and destroy the relationship between employees and employers where employees will lose trust in their employers as they might just get replaced anytime by Information System which leads them to lower productivity and the whole act of making them unemployed will be self-destructing. The desire for consistency will drives the first formulation where could companies retrench employee cause of their information system? Of course not, If every companies in the whole starts to implement information system and replacing their worker with it, it will cause an immense chaos to the world economy where 40% of low income manual labor will lose their jobs in United State and also shifting the bull’s eye onto the middle class workers where jobs like accountant might be replaced by software too. This would lead to severe loss of foundation income for their families where day to day expenses will be a huge problems for these families. (SHOULD ADD MORE IMPACT ONTO THE WHOLE SOCIETY LATER)Since if every company implements information system and causes unemployment, everyone would be unemployed which will disrupt the whole economy and lead the whole world to poverty all because of a personal interest. Therefore, it is wrong for a company to cause unemployment due to their implemented information system and company have to responsible for this issue that were caused by them solely for maximizing their profits. Categorical Imperative second formulation can be seen as the act in such a way that you always  treat humanity, whether in your own person or in the person of any other, never simply as a mean but always at the same time as an end. (Michael Rohlf, 2010). Therefore, portrait that rational agency is to be valued for its own sake â€Å"as an end† and that it is therefore illegitimate ever to treat a rational agent merely as a means to an end. Looking back to the case study provided, by implementing information system and causing unemployment, company had treated their employees as a mean to an end. The company sacrifices the job opportunity of their employees in order to achieve a lower cost for their product and higher productivity but at the cost of retrenching their workers. It was wrong for the company to retrench their employees as the company is treating their employees as a working machine rather than a rational agent with whom they could work with and try to collaborate machines with human instead of replacing all of the employees to solely automations. According to Kant there are two types of beings one being known as persons and other known as things.(H.J Paton, 1964) A person consist of infinite worth whereas things have a finite worth and can be bought or sold. In this case, company had treated their employees as a ‘things’ instead of a ‘person’ as company weighs them as a finite worth and retrench them in order to achieve company’s need which is to obtain a low cost production and being able to maximize shareholder’s wealth. Therefore, company is responsible for the unemployment cause by implementation of information system as according to categorical imperative second formulation, there should be moral exchanges between parties, as each parties treat each other not solely as an object of instrumental value alone but as objects of intrinsic value too. Thus, company should recognize their employees as au tonomous and rational human beings that are capable of willing freely and not upset or frustrate the freedom and autonomy of their employees by channeling forces or threats to retrench them just because their productivity is not on par as machines. Categorical Imperative third formulation stated that all maxims as proceeding from our own making of law ought to harmonize with a possible kingdom of end. In lay man’s term it means that in considering morality, we need to imagine ourselves making law in a Kingdom of people who are ends in themselves and should not act selfishly or be swayed by emotions which in our case company implementing information system in their organization. Whilst these automation could help in increasing the overall productivity, lowering down total product cost and also results in a higher earning does not mean that ones have to do it, instead company should integrate or implement partial machines that could help in increasing the overall productivity. In so doing, these company will make law for rational people where when we are torn between universal moral laws (retrenching employees without any proper reason will cause upsets to them which will demoralized them and ending their source of income) and particular desires produced in us (implementing machines to maximizes profit), you find a rational solutions to aid the problems (inter-cooperate human and machines together) which does achieve a particular desires and does falling towards either side. That said being able to look at several Kant’s point of view, we could conclude that Kant had several point of view where first formulation focuses on universalized rules where ones act only on that principle of action through which you can at the same time will that it should become a universal law where if rule is universalized, any companies that implemented information system will have to retrench their employees, employees loses their job and thus lowering the purchasing power which would results in more economy downturn. Therefore the rules is self-defeating and it company should be responsible for the unemployment caused by their information system. However, the second point of view focuses on looks into treating people as ends in themselves rather than means to ends. Therefore, company should not treat employees as a mean to end by retrenching them just because they had found a better substitute for them instead company should treat them as a rational people where coll aborating them into catching up with new skill sets to work on other fields. Lastly, Kant’s third formulation states that in everything ones do and every autonomous action ones makes, ones is required to picture himself/herself as a person writing the law for a new kingdom where everybody must treat everybody else as end in themselves which company have to find a rational principle of act to solve the issue between maximizing profit and unemployment where it will harmonize both parties. #Provide real world examples. References http://www.technologyreview.com/featuredstory/515926/how-technology-is-destroying-jobs/ http://plato.stanford.edu/entries/kant/ http://hercules.gcsu.edu/~hedmonds/lecture%20notes/kant%20lecture%20notes.htm http://theeconomiccollapseblog.com/archives/50-economic-numbers-from-2011-that-are-almost-too-crazy-to-believe https://financesonline.com/blue-collar-blues-are-we-losing-our-blue-collar-workers/ http://www2.fiu.edu/~harrisk/Notes/Ethics/KANT.htm Biblography http://thepietythatliesbetween.blogspot.com.au/2011/08/kantian-ethics-part-3-second.html http://www.theatlantic.com/business/archive/2013/06/this-is-the-way-blue-collar-america-ends/276554/ http://www.businessinsider.com.au/why-blue-collar-jobs-are-dissapearing-2012-1 http://usnews.nbcnews.com/_news/2011/12/15/9461848-dismal-prospects-1-in-2-americans-are-now-poor-or-low-income http://www.philosophypages.com/hy/5i.htm http://thepietythatliesbetween.blogspot.com.au/search?q=kantian+ethics http://www.rsrevision.com/Alevel/ethics/revision/kant_aspects_of_theory.pdf

Friday, October 25, 2019

Frogs :: essays research papers fc

Frogs are needed for everyday life. They are part of pond life. Each animal is important because even in the pond, there is a food chain. Frogs are amphibians, animals that spend half of their lives under water, and remainder on land. The first frog appeared in the early Jurassic period about 200 million years ago.   Ã‚  Ã‚  Ã‚  Ã‚  Frogs live on every continent except Antarctica, but tropical regions have the largest amount. Like all amphibians, frogs spend half their lives near water because they must return to the water to lay their eggs. Frogs live underwater mostly when the are growing up to be an adult frog and when they are laying their eggs. When they hatch under water they are tadpoles and the breath with gills and swim using a tail. As they mature they loose their tail and they develop to be able to breathe air. During an extensive period of heat, a drought, frogs can enter a period of damancy similar to hibernation called starvation. Most of the frogs live in tropical and semitropical regions, most species of frogs breed in the spring or in early summer. Although the different species my vary in size and color, mostly all frogs have basic body structure. They have large hind legs, short front legs and flat head and body with no neck.   Ã‚  Ã‚  Ã‚  Ã‚  Most frogs have teeth only on their upper jaw. Toads swallow their prey in one piece. To aid in the swallowing process, the frog’s eyes sink through the openings in the skull and force the food down its throat. Frogs eat insects, catching them with their long sticky tongue. They also eat small fish and worms. They also absorb concentrate to make them stronger, and toxins (poisonous substances) in their fatty tissues.   Ã‚  Ã‚  Ã‚  Ã‚  Since the 1980’s scientists have noted the decline of many frog species. People do not know for certain what has caused these declines. A possible factor is pollution, disease, habitat destruction, and acid rain. Another factor may be the thinning of the earth’s protective ozone layer, which allows more harmful ultraviolet radiation from the sun to reach the earth. Because frogs have thin, moist skin and an aquatic tadpole stage, they are easily affected by pollution and changes in the environment.

Thursday, October 24, 2019

Security on the Internet

The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, while still growing and evolving at a breakneck pace, is probably impossible. Deep infrastructure changes are needed, and once you have achieved a certain amount of size, the sheer inertia of the installed base may make it impossible to apply fixes. The challenges for the security industry are growing. With the electronic commerce spreading over the Internet, there are issues such as nonrepudiation to be solved. Financial institutions will have both technical concerns, such as the security of a credit card number or banking information, and legal concerns for holding individuals responsible for their actions such as their purchases or sales over the Internet. Issuance and management of encryption keys for millions of users will pose a new type of challenge. While some technologies have been developed, only an industry-wide effort and cooperation can minimize risks and ensure privacy for users, data confidentiality for the financial institutions, and nonrepudiation for electronic commerce. With the continuing growth in linking individuals and businesses over the Internet, some social issues are starting to surface. The society may take time in adapting to the new concept of transacting business over the Internet. Consumers may take time to trust the network and accept it as a substitute for transacting business in person. Another class of concerns relates to restricting access over the Internet. Preventing distribution of pornography and other objectionable material over the Internet has already been in the news. We can expect new social hurdles over time and hope the great benefits of the Internet will continue to override these hurdles through new technologies and legislations. The World Wide Web is the single largest, most ubiquitous source of information in the world, and it sprang up spontaneously. People use interactive Web pages to obtain stock quotes, receive tax information from the Internal Revenue Service, make appointments with a hairdresser, consult a pregnancy planner to determine ovulation dates, conduct election polls, register for a conference, search for old friends, and the list goes on. It is only natural that the Web’s functionality, popularity, and ubiquity have made it the seemingly ideal platform for conducting electronic commerce. People can now go online to buy CDs, clothing, concert tickets, and stocks. Several companies, such Digicash, Cybercash, and First Virtual, have sprung up to provide mechanisms for conducting business on the Web. The savings in cost and the convenience of shopping via the Web are incalculable. Whereas most successful computer systems result from careful, methodical planning, followed by hard work, the Web took on a life of its own from the very beginning. The introduction of a common protocol and a friendly graphical user interface was all that was needed to ignite the Internet explosion. The Web’s virtues are extolled without end, but its rapid growth and universal adoption have not been without cost. In particular, security was added as an afterthought. New capabilities were added ad hoc to satisfy the growing demand for features without carefully considering the impact on security. As general-purpose scripts were introduced on both the client and the server sides, the dangers of accidental and malicious abuse grew. It did not take long for the Web to move from the scientific community to the commercial world. At this point, the security threats became much more serious. The incentive for malicious attackers to exploit vulnerabilities in the underlying technologies is at an all-time high. This is indeed frightening when we consider what attackers of computer systems have accomplished when their only incentive was fun and boosting their egos. When business and profit are at stake, we cannot assume anything less than the most dedicated and resourceful attackers typing their utmost to steal, cheat, and perform malice against users of the Web. When people use their computers to surf the Web, they have many expectations. They expect to find all sorts of interesting information, they expect to have opportunities to shop and they expect to be bombarded with all sorts of ads. Even people who do not use the Web are in jeopardy of being impersonated on the Web. There are simple and advanced methods for ensuring browser security and protecting user privacy. The more simple techniques are user certification schemes, which rely on digital Ids. Netscape Communicator Navigator and Internet Explorer allow users to obtain and use personal certificates. Currently, the only company offering such certificates is Verisign, which offers digital Ids that consist of a certificate of a user’s identity, signed by Verisign. There are four classes of digital Ids, each represents a different level of assurance in the identify, and each comes at an increasingly higher cost. The assurance is determined by the effort that goes into identifying the person requesting the certificate. Class 1 Digital IDs, intended for casual Web browsing, provided users with an unambiguous name and e-mail address within Verisign’s domain. A Class 1 ID provides assurance to the server that the client is using an identity issued by Verisign but little guarantee about the actual person behind the ID. Class 2 Digital IDs require third party confirmation of name, address, and other personal information related to the user, and they are available only to residents of the United States and Canada. The information provided to Verisign is checked against a consumer database maintained by Equifax. To protect against insiders at Verisign issuing bogus digital IDs, a hardware device is used to generate the certificates. Class 3 Digital IDs are not available. The purpose is to bind an individual to an organization. Thus, a user in possession of such an ID could, theoretically, prove that he or she belongs to the organization that employs him or her. The idea behind Digital IDs is that they are entered into the browser and then are automatically sent when users connect to sites requiring personal certificates. Unfortunately, the only practical effect is to make impersonating users on the network only a little bit more difficult. Many Web sites require their users to register a name and a password. When users connect to these sites, their browser pops up an authentication window that asks for these two items. Usually, the browser than sends the name and password to the server that can allow retrieval of the remaining pages at the site. The authentication information can be protected from eavesdropping and replay by using the SSL protocol. As the number of sites requiring simple authentication grows, so does the number of passwords that each user must maintain. In fact, users are often required to have several different passwords for systems in their workplace, for personal accounts, for special accounts relating to payroll and vacation, and so on. It is not uncommon for users to have more than six sites they visit that require passwords. In the early days of networking, firewalls were intended less as security devices than as a means of preventing broken networking software or hardware from crashing wide-area networks. In those days, malformed packets or bogus routes frequently crashed systems and disrupted servers. Desperate network managers installed screening systems to reduce the damage that could happen if a subnet’s routing tables got confused or if a system’s Ethernet card malfunctioned. When companies began connecting to what is now the Internet, firewalls acted as a means of isolating networks to provide security as well as enforce an administrative boundary. Early hackers were not very sophisticated; neither were early firewalls. Today, firewalls are sold by many vendors and protect tens of thousands of sites. The products are a far cry from the first-generation firewalls, now including fancy graphical user interfaces, intrusion detection systems, and various forms of tamper-proof software. To operate, a firewall sits between the protected network and all external access points. To work effectively, firewalls have to guard all access points into the network’s perimeter otherwise, an attacker can simply go around the firewall and attack an undefended connection. The simple days of the firewalls ended when the Web exploded. Suddenly, instead of handling only a few simple services in an â€Å"us versus them manner†, firewalls now must be connected with complex data and protocols. Today’s firewall has to handle multimedia traffic level, attached downloadable programs (applets) and a host of other protocols plugged into Web browsers. This development has produced a basis conflict: The firewall is in the way of the things users want to do. A second problem has arisen as many sites want to host Web servers: Does the Web server go inside or outside of the firewall? Firewalls are both a blessing and a curse. Presumably, they help deflect attacks. They also complicate users’ lives, make Web server administrators’ jobs harder, rob network performance, add an extra point of failure, cost money, and make networks more complex to manage. Firewall technologies, like all other Internet technologies, are rapidly changing. There are two main types of firewalls, plus many variations. The main types of firewalls are proxy and network-layer. The idea of a proxy firewall is simple: Rather than have users log into a gateway host and then access the Internet from there, give them a set of restricted programs running on the gateway host and let them talk to those programs, which act as proxies on behalf of the user. The user never has a account or login on the firewall itself, and he or she can interact only with a tightly controlled restricted environment created by the firewall’s administrator. This approach greatly enhances the security of the firewall itself because it means that users do not have accounts or shell access to the operating system. Most UNIX bugs require that the attacker have a login on the system to exploit them. By throwing the users off the firewall, it becomes just a dedicated platform that does nothing except support a small set of proxies-it is no longer a general-purpose computing environment. The proxies, in turn, are carefully designed to be reliable and secure because they are the only real point of the system against which an attack can be launched. Proxy firewalls have evolved to the point where today they support a wide range of services and run on a number of different UNIX and Windows NT platforms. Many security experts believe that proxy firewall is more secure than other types of firewalls, largely because the first proxy firewalls were able to apply additional control on to the data traversing the proxy. The real reason for proxy firewalls was their ease of implementation, not their security properties. For security, it does not really matter where in the processing of data the security check is made; what’s more important is that it is made at all. Because they do not allow any direct communication between the protected network and outside world, proxy firewall inherently provide network address translation. Whenever an outside site gets a connection from the firewall’s proxy address, it in turn hides and translates the addresses of system behind the firewall. Prior to the invention of firewalls, routers were often pressed into service to provide security and network isolation. Many sites connecting to the Internet in the early days relied on ordinary routers to filter the types of traffic allowed into or out of the network. Routers operate on each packet as a unique event unrelated to previous packets, filtered on IP source, IP destination, IP port number, and a f few other basic data contained in the packet header. Filtering, strictly speaking, does not constitute a firewall because it does not have quite enough detailed control over data flow to permit building highly secure connections. The biggest problem with using filtering routers for security is the FTP protocol, which, as part of its specification, makes a callback connection in which the remote system initiates a connection to the client, over which data is transmitted. Cryptography is at the heart of computer and network security. The important cryptographic functions are encryption, decryption, one-way hashing, and digital signatures. Ciphers are divided into two categories, symmetric and asymmetric, or public-key systems. Symmetric ciphers are functions where the same key is used for encryption and decryption. Public-key systems can be used for encryption, but they are also useful for key agreement and digital signatures. Key-agreement protocols enable two parties to compute a secret key, even in the face of an eavesdropper. Symmetric ciphers are the most efficient way to encrypt data so that its confidentiality and integrity are preserved. That is, the data remains secret to those who do not posses the secret key, and modifications to the cipher text can be detected during decryption. Two of the most popular symmetric ciphers are the Data Encryption Standard (DES) and the International Data Encryption Algorithm (IDEA). The DES algorithm operates on blocks of 64 bits at a time using a key length of 56 bits. The 64 bits are permuted according to the value of the key, and so encryption with two keys that differently in one bit produces two completely different cipher texts. The most popular mode of DES is called Cipher Block Chaining (CBC) mode, where output from previous block are mixed with the plaintext of each block. The first block is mixed with the plaintext of each block. The block uses a special value called the Initialization Vector. Despite its size and rapid growth, the Web is still in its infancy. So is the software industry. We are just beginning to learn how to develop secure software, and we are beginning to understand that for our future, if it is to be online, we need to incorporate security into the basic underpinnings of everything we develop.

Wednesday, October 23, 2019

Great economic Depression And Of Mice And Men Essay

In 1929, the US entered a period of Great economic Depression from it only emerged with the onset of the Second War in 1939. During this period, there was long-term unemployment, so workers needed to go to California where there was still some short-term, poorly paid contract ranch works available. They were not educated therefore they had got no right and could be sacked at any time. They travelled from ranch to ranch to get jobs. This lifestyle forced ranch workers to keep moving and got no chance of making friend and keeping contact with their families. There was also a lot of competition, which put workers under pressure about whether they were good enough. They live isolated lives and are alienated from each other because are rivals. They are struggling to survive in a hostile world. All of these factors make all the characters lonely in ‘Of Mice and Men’. Between them, there are some characters who are very lonely because they are disadvantaged, Crooks, he’s black; Candy, because he is old; Curley, because he has more security than others; and his wife, as she is the only woman on the ranch. They are the victims of the strange society. In this essay I will be investigating the reasons why these characters are lonely in more depth by looking at each character more carefully. Crooks is probably the loneliest character in the book because he is very different from other ranch workers. He is old, disabled and the only black man in the book who lives in a racism society. As a result of this, he is isolated in his own room in the barn and is not allowed to go into or stay in the bunkhouse with the other ranch workers. Therefore he has no one to talk to. Though other workers knew that he reads a lot and has more knowledge and thinks deeper, they don’t listen to his opinions. ‘ If I say something, why it’s just a nigger saying it.’ P102 Instead they take advantage of his disability this is shown when they beat him up at Christmas. The racism society gives Crooks no chance of making friend. Crooks tries to get his own back for the way the white men treat him by keeping a distance between him and the other men. But obviously he recent the fact that he isn’t want in the bunkhouse. This makes it even harder to make friends. This is revealed by his words when Lennie comes to his room. ‘I ain’t wanted in the bunkhouse, and you ain’t wanted in my room.’ But gradually he is defeated by Lennie’s innocent smile and lets his guard down. This is because in his heart he knows that coping with loneliness is no good by reading books, he needed a friend to be near him and talk to him. ‘Suppose you didn’t have nobody †¦ A guy needs somebody -to be near him†¦ a guy goes nuts if he ain’t got nobody †¦ I tell you a guy gets too lonely and he gets sick.’ ‘A guy sets alone out here at night, maybe readin’ books or thinking or stuffs like that†¦If some guy was with me, he could tell me I was sleep. An’ then it would be all right. But I just don’t know.’ This quote from the same page of the book also shows you Crooks’ feelings of loneliness. When Lennie and Candy started to talk about the dream Crooks pointed out that this dream was shared by thousand of ranch workers but none of them ever succeed in reality but just for a moment he suspends his disbelief long enough to wish to share the dream, though he was immediately reminded his position by Curley’s wife words and shut by George’s anger as he doesn’t think that any white people would treat him decently. From the facts above, we could see the reasons of why Crooks are lonely. Candy is an old and disabled character in the book. He is quite similar to Crooks and is very lonely because he is different too. He lost his hand in an accident and was only kept on by the boss out of guilt. He has no relatives, no friends and his only comfort is his old dog, which keeps him company and reminds him of the days when he was young and whole. Candy is not interested in the things the other guys talk about. For instance: ‘I ain’t interest in nothing you was saying. A guy on a ranch don’t never listen nor he don’t ast no questions.’ But when his only comfort has gone– was shot by Carlson, he is totally alone and eagerly clutches at the idea of buying a farm with George and Lennie. This is shown below when George started to talk about the dream: ‘Old candy turned slowly over. His eyes were wide open. He watched George carefully.’ The reason for this change is, Candy himself is very similar to his dog, they both old and disabled, from the shooting of his old dog, Candy knows that when he can’t work any more he will be turned away from the ranch. He will have ‘I got hurt four years ago. They’ll can me purty soon, jus’ as soon as I can’t swamp out no bunk-houses they’ll put me on the county†¦ When they can me here I wish’t somebody’d shoot me. But they won’t do nothing like that.’ At this situation, Candy needs something to look forward to, so when he heard about the dream between George and Lennie he found that this is the thing he needed. But of course this all comes to nothing. As the inevitability of the fall of the dream, Candy would certainly be disappointed. The dream ends in a miserable way. ‘You and me can get that little place, can’t we, George? You an’ me can get that little place, can’t we, George†¦ Can’t we? Before George answered, candy dropped his head and looked down at the hay, he know. Then- it’s all off? †¦ And I’ll have fifty buck more.’ Candy’s words show that he realises that the end of Lennie means the end of the dream, without Lennie George hasn’t got the heart to go on. There are so many ‘ can’t we ‘ in his speech telling us he wants George to tell him he is wrong. But the reaction of George confirms this completely. The sadness is expressed in the bitter words he uttered to the body of Curley’s wife, whom he blames for spoiling the dream or more accurately, his hope of a future. ‘ You god damn tramp†¦ You done it, didn’t you? I s’pose you’re glad†¦ you lousy tart.’ Curley is the character who is described as a ‘wretch’ by John Steinbeck. It may be argued that he must be not lonely because he is the boss’s son and had been married for two weeks, has a family and a lot of thing that other ranch workers wanted to have. But actually he is very lonely. As he has more security (he was never worried about being fired), other ranch workers don’t mix with him so he has no one to talk to. The ‘macho’ male society makes him fell that if a guy doesn’t appear to be tough and strong, others will put something on him and laugh at him. It is even worse for him that he chooses the wrong way to earn respect-by fighting and be aggressive. But other workers know that he is a coward and despise him for the tension atmosphere he creates. ‘What does he got on his shoulder?’ George ‘You god damn punk, †¦ you tries to throw a scare into Slim, an’ you couldn’t make it stick. Slim threw a scare into you. You’re yella as a frog belly. I don’t care if you’re the best welter in the country. You come for me, an’ I’ll kick your God damn head off.’ He has no friends, to overcome his loneliness, he married a pretty young woman but has blindly chosen the wrong person whom totally inappropriate for the kind of life he leads. He forbids his wife to talk to other ranch workers, as he is scared that she may have an affair with one of the other men which makes her hate him and others more despise to him. Consequently, his feelings are all channelled into aggressive behaviour in order to deal with his loneliness but this leads to his feeling lonelier because the others don’t want to be with him. Curley’s wife is another character who is lonely. She is newly married, lives in a strange place, and does not seem to fit in on the ranch as being the only woman. She and Curley do not love each other; both of them try to overcome their own loneliness by the marriage. But unfortunately, both have chose the wrong person. She hates Curley because of his aggressive: ‘I don’t like Curley, he ain’t a nice fella.’ One point that needs to be mentioned here is that she is the only character who is never given a name in the book and is only referred to as ‘ Curley’s wife’. It appears that John Steinbeck passes a message from this that she is not seen as a person at all by other characters, but an object which Curley thinks he owns. ‘You gotta husban’. You got no call foolin’ around with other guys, causing trouble.’ ‘Why’n’t you tell her to stay the hell home where she belongs?’ Her situation is just like Crooks’; no one is sensitive about her feelings. This makes her feel angry with the men especially at Curley. ‘Whatta they think I am, anyways.’ ‘Seems like they ain’t none of them care how I gotta live.’ Further more, she has been forbidden by Curley to talk to anyone but him, as he doesn’t trust her. ‘I get lonely, you can talk to people, but I can’t talk to nobody but Curley. Else he gets mad. How’d you like not to talk to anybody?’ To counter this, she keeps approaching the ranch hands with the excuse that she is looking for Curley or something she lost. ‘Think I don’t like to talk to somebody ever’ once in a while? Think I like to sit in that house alla time?’ The only result is, the men regard her as a slut. But in her eyes, that is the way she is supposed to be. ‘Candy:’†¦ I think Curley’s married†¦ a tart.’ ‘Whit:’ Well, ain’t she a looloo?’ Curley’s aggressive behaviour leads others to avoid her and this further isolated her and she approaches the ranch hands more frequently therefore Curley becomes even more jealous and aggressive. This leads to her feeling lonelier. Finally her loneliness leads to her death as she makes a serious error of trying to overcome it by playing the tease with Lennie as she is pleased that Lennie beat Curley and impressed by his size and strength, but she didn’t realise the extent and danger of Lennie’s mental disability. George and Lennie are also caught in the trap of loneliness; this is because they are different as they have a strong friendship. They travelled together and trust each other and share a dream of owning a farm whereas other ranch workers travelled alone and had no strong relationships with others and have nothing to look forward to. George’s loneliness could be reflected by the words that he uses a lot of swearing and the fact that he needs the dream to keep him going. Just as candy has his dog for company, George has Lennie (who is often described in animal-like terms). Both companions died and George and candy are left completely alone. Lennie totally relies on George and couldn’t survive without George, but on the other hand, George somehow needs Lennie to overcome his own loneliness. It is revealed by Crooks’ words with great understanding he tells us of the importance of Lennie. ‘I don’t blame the guy you travel with for keeping you outa sight.’ ‘It’s just the talking. It just being with another guy. That’s all.’ Maybe it is just talking but this is an enough reason of keeping Lennie as company for George. In conclusion it is clear that all of the characters in ‘ Of Mice and Men’ are lonely. Their loneliness is the evitable result of the society, which is made by the Great Depression. Crooks, for instance is suffered deeply from the racism society. No one is trying to make friends with him before the visit of Lennie except Slim. Candy, Curley and his wife are the victims of the macho male society. They all have dreams but none of them realise them and get nothing at the end.