Wednesday, February 26, 2020
Codeine Research Paper Example | Topics and Well Written Essays - 750 words
Codeine - Research Paper Example f the ancient tool kit in medicine for its therapeutic effects, and hence euphemistically called as the ââ¬Å"plant of joy.â⬠Codeine has a number of medicinal uses besides as pain reliever, such as antitussive (to suppress coughing), anti-hypertensive (lower blood pressure), anti-anxiety, to help control diarrhea, delay premature labor contractions, as a sedative (helps in relaxation and sleeping), and for its hypnotic properties too. Its availability as an oral medication (as opposed to injectable medication) make it the widest prescription drug, with about 157 million written prescriptions annually and its sales reached approximately $3.3 billion in 2005 alone, and still continues to gain in popularity. However, identification of the chemical composition of codeine as a distinct compound is fairly recent; it was first identified in 1832 by the French chemist Pierre-Jean Robiquet which closely followed the first identification of morphine a few years earlier, back in 1806 by German pharmacist Friedrich Wilhelm Adam Serturner (Kane & Triggle, 2007, p. 10). Codeine is isomer of morphine, which means both have the same molecular components but are structured different hence it is known for its chemical name, 3-methylmorphine. It can be made or manufactured in the laboratory in commercial quantities from morphine, using a semi-synthetic process. Morphine is the most abundant alkaloid (the chemical compounds that contain basic nitrogen atoms) found in opium, at 8 to 17% by weight, and followed by codeine, at .07 to 5%. Codeine is the chemical precursor of most opioids (any compound that acts like morphine) such as oxycodone, hydrocodone, and tramadol. It is classified similar to opioids produced by human bodies like the endorphins and enkephalins (ibid. p. 13). Although it has many legitimate uses in medicine, codeine has a potential to be misused and abused as a ââ¬Å"recreationalâ⬠drug because of a ââ¬Å"highâ⬠feeling it generates among drug users; that feeling is
Monday, February 10, 2020
Sony Playstation Security Breach Essay Example | Topics and Well Written Essays - 2000 words
Sony Playstation Security Breach - Essay Example Only a single vulnerability is needed for hackers to exploit and put an entire database at risk. In order to avoid such vulnerabilities, database developers and application developers must dance to the same tune. Sonyââ¬â¢s data center in San Diego, CA was hacked into on April 19, 2011. The hackers had gained access of customersââ¬â¢ data through Sonyââ¬â¢s PlayStation Network servers. This attack on Sony is said to be the largest personal data heist in history with reports estimating that around 77 million Qriocity and PSN usersââ¬â¢ accounts and 24.5 million Sony Online Entertainment user accounts were affected. (Better Business Bureau, 2011). Strange activities had been detected by Sony Corporation on their network system. They noticed unauthorized access of the companyââ¬â¢s servers. A day after the attack, Sony decided to power down the affected systems and delayed restoration of the PSN services for users in the U.S until May 14. Users were later on required to change their usernames and passwords as an additional way of curbing further attacks. Since the attackers had exploited Sonyââ¬â¢s website via its URL, they were thus forced to disable the page temporarily because attackers exploited the URL of Sonyââ¬â¢s website (The Sydney Morning Herald, 2011). Unfortunately, this was not the last attack. A series of attacks on Sonyââ¬â¢s Online Entertainment services and the PSN were later on executed during the same period. These attacks were carried out on; Sony BMG Greece, Sony BMG Japan, So-Net ISP in Japan, and servers of Sony in Thailand (McMillan, 2011). It was estimated that the personal information of 77 million Qriocity and PSN users, and 24.5 million online entertainment users was stolen. The attackers rummaged through a wealth of information concerning the users and their attributes such as names of users, their addresses, email addresses, and birth dates. Attackers also approached the login information of users such as
Subscribe to:
Posts (Atom)