Saturday, December 28, 2019

What Is Glacial Acetic Acid

Acetic acid (CH3COOH) is the common name for ethanoic acid. It is an organic chemical compound that has a distinctive pungent odor and sour flavor, recognizable as the scent and flavor of vinegar. Vinegar is about 3-9% acetic acid. How Glacial Acetic Acid Is Different Acetic acid that contains a very low amount of water (less than 1%) is called anhydrous (water-free) acetic acid or glacial acetic acid. The reason its called glacial is because it solidifies into solid acetic acid crystals just cooler than room temperature at 16.7  °C, which ice. Removing the water from acetic acid lowers its melting point by 0.2  °C. Glacial acetic acid may be prepared by dripping acetic acid solution over a stalactite of solid acetic acid (which could be considered to be frozen). Like a water glacier contains purified water, even if its floating in the salty sea, pure acetic acid sticks to the glacial acetic acid, while impurities run off with the liquid. Caution: Although acetic acid is considered a weak acid, safe enough to drink in vinegar, glacial acetic acid is corrosive and can injure skin on contact. More Acetic Acid Facts Acetic acid is one of the carboxylic acids. It is the second simplest carboxylic acid, after formic acid. The main uses of acetic acid are in vinegar and to make cellulose acetate and polyvinyl acetate. Acetic acid is used as a food additive (E260), where it is added for flavor and to regular acidity. Its an important reagent in chemistry, too. Worldwide, around 6.5 metric tons of acetic acid are used per year, of which approximately 1.5 metric tons per year are produced by recycling. Most acetic acid is prepared using petrochemical feedstock. Acetic Acid and Ethanoic Acid Naming The IUPAC name for the chemical is ethanoic acid, a name formed using the convention of dropping the final e in the alkane name of the longest carbon chain in the acid (ethane) and adding the -oic acid ending. Even though the formal name is ethanoic acid, most people refer to the chemical as acetic acid. In fact, the usual abbreviation for the reagent is AcOH, partly to avoid confusion with EtOH, a common abbreviation for ethanol. The common name acetic acid comes from the Latin word acetum, which means vinegar. Eskay Lim / EyeEm / Getty Images Acidity and Use as a Solvent Acetic acid has an acidic character because the hydrogen center in the carboxyl group (-COOH) separates via ionization to release a proton: CH3CO2H → CH3CO2−   H This makes acetic acid a monoprotic acid with a pKa value of 4.76 in aqueous solution. The concentration of the solution greatly affects the dissociation to form the hydrogen ion and the conjugate base, acetate (CH3COO−). At a concentration comparable to that in vinegar (1.0 M), the pH is around 2.4 and only around 0.4 percent of the acetic acid molecules are dissociated. However, in very dilute solutions, over 90 percent of the acid dissociates. Acetic acid is a versatile acidic solvent. As a solvent, acetic acid is a hydrophilic protic solvent, much like water or ethanol. Acetic acid dissolves both polar and nonpolar compounds and is miscible in both polar (water) and nonpolar (hexane, chloroform) solvents. However, acetic acid is not fully miscible with higher alkanes, such as octane. Importance in Biochemistry Acetic acid ionizes to form acetate at physiological pH. The acetyl group is essential to all life. Acetic acid bacteria (e.g., Acetobacter and Clostridium acetobutlicum) produce acetic acid. Fruits produce acetic acid as they ripen. In humans and other primates, acetic acid is a component of vaginal lubrication, where it acts as an antibacterial agent. When the acetyl group binds to coenzyme A, the holoenzyme is used in the metabolism of fats and carbohydrates. Acetic Acid in Medicine Acetic acid, even at 1 percent concentration, is an effective antiseptic, used to kill Enterococci, Streptococci, Staphylococci, and Pseudomonas. Dilute acetic acid may be used to control skin infections of antibiotic bacteria, particularly Pseudomonas. The injection of acetic acid into tumors has been a cancer treatment since the early 19th century. Application of dilute acetic acid is a safe and effective treatment for otitis externa. Acetic acid is also used as a quick cervical cancer screening test. Acetic acid swabbed onto the cervix turns white in one minute if cancer is present. References Barclay, John (1866). Injection of Acetic Acid in Cancer. Br Med J. 2 (305): 512.Fokom-Domgue, J.; Combescure, C.; Fokom-Defo, V.; Tebeu, P. M.; Vassilakos, P.; Kengne, A. P.; Petignat, P. (3 July 2015). Performance of alternative strategies for primary cervical cancer screening in sub-Saharan Africa: systematic review and meta-analysis of diagnostic test accuracy studies. BMJ (Clinical research ed.). 351: h3084.Madhusudhan, V. L. (8 April 2015). Efficacy of 1% acetic acid in the treatment of chronic wounds infected with Pseudomonas aeruginosa: prospective randomised controlled clinical trial.  International Wound Journal.  13: 1129–1136.

Friday, December 20, 2019

Essay about Sapphos vs. Petrarch on the Body - 1293 Words

D.P.L. Professor M.H. The Divine Body Humans are wired for sex. Physical interaction is possibly the most intuitive emotion we have as a species. Sex and body image are absurdly prominent in today’s culture, and have been since the beginning of written history. Sexuality is only a surface desire though. What lies beneath the surface is where a person’s true beauty rests. The poets Sappho and Petrarch are two very early writers that often focused on the human body, sexuality, and desire but in different ways. Sappho’s body of work is a reaction and praise to the exterior beauty of many individuals. Petrarch’s sonnets are a repeated effort to unearth the root of divine beauty. Sappho’s poems were more direct and in a relatable way.†¦show more content†¦She is playing with that feeling of tension in the chest that people tend to have in matters of deep-seated emotions. It is common to read Sappho and notice emphasis on the body in her descriptions of both grief and bliss. Later in her life, Sappho uses the same analogy of her heart to describe herself as an old woman, â€Å"My heart’s grown heavy, my knees will not support me, that once on a time were fleet for the dance as fawns.† It seems that her heart never grew lighter from her younger years, or even grew into a more intense pain. Having access to so many of her works allows scholars to observe a development in the character Sappho. Her subject matter turns from delight in others, slowly to dismay in their absence. What does not seem to change much is her approach of the subject matter. She still materializes her emotions in the form of the physical body in her later poems. Petrarch deals with his bodily desires in a different manner. His most famous series of poems are more or less descriptions of a woman Petrarch had much love for and how she made him feel. This collection is known as the ‘Canzoniere’. Petrarch’s sonnets focus more on the emotional si de of his desires, while still using his body as a reference for the reader. In a selection from one of his sonnets, Petrarch writes, â€Å"Love found me all disarmed and found the way / was clear to reach my heart down through the eyes / which have become the halls and doors of tears†

Wednesday, December 11, 2019

Paper Issues - Mobile Ecommerce free essay sample

S30057544 Christopher Navarro Atarama S30057544 Christopher Navarro Atarama Mobile E-Commerce ITECH 3212 E-commerce 2 Assignment 1 Mobile E-Commerce ITECH 3212 E-commerce 2 Assignment 1 Table of Contents 1Abstract2 2Introduction2 3Definitions2 4Mobile E-commerce infrastructure3 5Privacy issues4 6Security issues4 7Mobile Client Device Technologies and Issues5 8Mobile devices applications issues6 9Bibliography7 * Abstract The following report is a document made with the intention of accomplishes the first assignment of E-Commerce 2 course of the University of Ballarat at IIBIT Sydney. The aim of this report is give a general overview about Mobile E-Commerce or M-Commerce and its different issues in the actuality. Introduction Day by day, new technologies come up bringing new ways of communication and interconnection, using the great network: Internet. This network, in addition, opens a wide door of electronic business opportunities known as E-Commerce (Roehl-Anderson, 2010). In the actuality, and with the development of new technologies in mobile devices area, make electronic commerce is more accessible, fast and mobile (Antovski Gusev, 2009). This new E-business model is known as Mobile E-commerce or M-Ecommerce. According with Antovski Gusev (2009), M-Commerce is defined as any transaction with monetary value that is conducted via a mobile telecommunications network. M-Commerce like Ecommerce can be B2B (business to business), P2P (person to person) or B2C (business to customer) oriented. The framework divides into couple sub areas based on user’s distribution criterion. Mobile Ecommerce addresses electronic commerce via mobile devices, where the consumer is not in physical or eye contact with the goods that are being purchased. Definitions Mobile Devices: Also referred to as handheld devices, are generally poket-sized devices with computing capabilities (including smartphones, PDAs, etc. ). These devices generally offer robust functionality without the restriction associated with heavier, tethered equipped (Harris, 2010). E-commerce: E-commerce (electronic commerce or EC) is the buying and selling of goods and services on the Internet, especially the World Wide Web. In practice, this term and a newer term,  e-business, are often used interchangeably. For online retail selling, the term  e-tailing  is sometimes used (Harris, 2010). Smartphone: A cellular telephone with built-in applications and Internet access. Smartphones provide digital voice service as well as text messaging, e-mail, Web browsing, still and video cameras, MP3 player, video viewing and often video calling. In addition to their built-in functions, smartphones can run myriad applications, turning the once single-minded cellphone into a mobile computer. Mobile E-commerce infrastructure The mobile e-commerce evolution is being fuelled by the same forces that enabled ecommerce by PC users (Buccafurri, 2010). According with Antovski Gusev (2009), there has been considerable investment in mobile e-commerce by banks, hardware providers, cellular operators, and content providers that is leading mobile consumers to eventually have the same satisfactory experience, in terms of content and variety, that they have come to appreciate from their PC Several banking projects are underway to fund the payment architecture needed to address the mobile consumer. MasterCard International announced in May, 2000 that it would launch a fund for start-ups and established companies dedicated to the development of new roducts and services involving smart cards, e-commerce and m-commerce that strategically supports MasterCard’s member institutions (Winter, 2010). Visa, likewise, announced it was teaming up with Cyberbills and Aether Systems to create an â€Å"anytime, anywhere bill payment service†. Credit Mutual, a French bank, is teaming up with MasterCard International and Europay Internationa l on an EMV-compliant mobile commerce pilot in France. Included in this global agreement are hardware providers France Telecom, Oberthur Card Systems, and Motorola. Other pilots are planned in Germany, Canada, Australia, Hong Kong, the UK and the US. Hardware companies are equally important stakeholders in the mobile commerce revolution (Buccafurri, 2010). Efforts are underway in developing standards and forming partnerships and consortiums between industry leaders to establish the platform for building the mobile commerce industry. Cellular handset manufacturers are leading this effort with developing next generation digital phones that will carry voice and data over new communications networks that will rival the wired market for transmission speeds and internet access. The big three; Ericsson, Nokia, and Motorola control over 50% of the handset market worldwide. They have formed an alliance called the Global M-commerce Standard. The objective of this alliance is to develop standards that will reduce the time to market for hardware, applications, and communications. Analysts predict that by 2003, there will be more cell phones that are capable of accessing the Internet than PCs. The ability of the cellular industry to quickly achieve worldwide standards like GSM, WAP (Wireless Application Protocol) and WAN (Wireless Application Network) has contributed to position they find themselves in leading the mobile commerce revolution. The consortium has wisely included operators and financial institutions into the mix to make sure the services will keep up with the technology (Australian Interactive Media Industry Association, 2009). Privacy issues Privacy issues have always been a key reason for potential online consumers to avoid E-Commerce (Jun Xu, 2010). In the early days of E-commerce, a significant fraction of consumers thought that credit cards could be snatched off the Internet. Solid encryption technologies have reduced most of those fears, and for the most part, new consumers dont orry about losing credit cards while online (Cruz-Cunha, 2010). However, there remains some very real privacy issues associated with conducting transactions electronically, which may be exacerbated with the capacity to undertake mobile transactions. These include unauthorized access to stored data, especially personal information and transaction history. Security issues According to Francesco Buccafurri (2010), securing m-comme rce may be even more difficult than protecting wired transaction. Constrained bandwidth and computing power, memory limitations, battery life and various network configurations all come into play, raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed. In the use of text messaging, a number of security issues have already been identified, and will extend to the use of m-commerce (Buccafurri, 2010). While a direct SMS message is relatively safe because it is encrypted for its transition from one mobile handset to the other, because of its store forward nature, messages are vulnerable to being corrupted. Like voice messages, SMS are stored on a server before being forwarded to the receiver. There is no mandatory encryption and access protection for storage. The only way to secure the entire transmission would be with end-to-end encryption. Messages exchanged between two service providers can also be violated in transit if the link between the two networks is not protected. If this information is payment details or authorities to make transactions, there is even more danger (Lee, 2009). The reliability of SMS messages is also in question. Unlike in Europe, where message delivery confirmation can be obtained by pressing a three-digit code, no confirmation is issued in Australia. The capacity to check and ensure that sent messages are received will be essential to build and maintain trust in the use of m-commerce. Mobile technologies manufacturers are developing improved security for applications with authentication and encryption technologies. However, there are two trade-offs for increased security, namely price and style (Cruz-Cunha, 2010). Mobile Client Device Technologies and Issues According to Antovski Gusev (2009), the interactivity devices or mobile client devices currently most important to mobile e-commerce are mobile telephones, handheld computers, laptop computers, and vehicle-mounted interfaces. Hybrid devices are now appearing, such as the crosses between mobile phones and handheld devices (sometimes called smartphones), but the question remains as to what form the devices will ultimately take, which is an important issue for mobile system developers. Usability will become more critical with handheld and phone devices, which differ from desktop and laptop computers in terms of their smaller screen sizes, less available memory, and limited input devices (Antovski Gusev, 2009). Many handheld devices are limited to a few lines of text, and do not have traditional keyboards. One usability issue is the need for organizations to determine how people can best use applications and access information through different devices. Mobile devices have forced developers to carefully revisit both operating systems and applications software on a variety of platforms (Jun Xu, 2010). Operating systems such as Microsoft’s Pocket PC and Palm’s PalmOS have been developed for handheld devices. Although this software meets some of the current needs, it has limited functionality. The creation of system software with increased functionality for devices with limited capabilities will be an ongoing challenge. Another important building block for this emerging infrastructure landscape may be the Wireless Application Protocol (WAP), which enables wireless devices such as mobile phones to access the Internet (Kr. Sharma, Sharma, Raj, 2011). Many WAP-enabled devices have already appeared, although there is doubt as to whether WAP will become a globally accepted standard, especially with the popularity of Japan’s i-mode. Developers ultimately face the issue of deciding which set of protocols to accept, or risk the potential problems of working with multiple standards and/or choosing to ignore some. Mobile devices applications issues Many of mobile devices applications are currently constrained by technology limitations and issues described previously. According Juhnyoung Lee (2009), there are two fundamental application issues that researchers and developers must address are what tasks do users want to do without regard for temporal or spatial constraints and how to provide support for these tasks through wireless applications. Mobile e-commerce payment systems can also benefit from wireless technology (Skeldon, 2011). One scenario involves a consumer not having to stand in line to make a purchase, but simply paying for an item though a wireless device. Final payments might even be billed to a telephone company. Bluetooth technology may enable a list of available services to be generated automatically on a device when a user walks close to a Bluetooth-equipped cash register. Wireless technology is well suited for bringing e-commerce to automobiles and other forms of transportation (Lee, 2009). Traffic advisory systems can warn of impending traffic jams. Cars will eventually be able to report potential problems to service centres themselves. The service centre might even make minor adjustments to the car online. Car-mounted devices will eventually allow regular Internet access, although safety issues of â€Å"browsing while driving† must be addressed. While most initial mobile commerce applications seem to be aimed at the business-to-consumer market, business-to-business and intranet applications are also appearing (Lee, 2009). Service technicians can be dynamically assigned new tasks and sent problem information while they are traveling. Sales people can go literally anywhere in the field and access product information and customer accounts, although the applications right now are still subject to the constraints of current wireless devices. Organizations must address the issue of designing complex, robust applications that work well within these current (and any foreseeable) device limitations. Flexibility can be integrated into designs to enable future functionality. Conclusions Mobile electronic commerce enables the consumer to be able to conduct their business while on the move. In today’s fast-paced society, people are always looking to do everything on the go and do not want to be slowed down. Also, as technology changes throughout the years, people are now looking for their mobile devices to perform more tasks than ever before. It seems logical for people to want access to the Internet through their mobile devices and to want to take care of their business through these devices. Through the origin of mobile electronic commerce, people are now able to conduct their business over the Internet without having to sit in front of their computer all day. This saves consumers time because they no longer have to be logged onto their personal computer at home or work. This allows consumers to be mobile and on the go. But, mobile electronic commerce has also helped the companies as well. Bibliography Antovski, L. , Gusev, M. (2009). M-Commerce Services. Retrieved August 09, 2011, from http://delab. csd. auth. gr/bci1/Balkan/15Antovski. pdf Australian Interactive Media Industry Association. (2009). Australian Mobile Phone lifestyle index. Buccafurri, F. (2010). E-Commerce and Web Technologies: 11th International Conference, EC-Web 2010, Bilbao, Spain, September 1-3, 2010, Proceedings. Springer. Cook, A. , Goette, T. (2009). Mobile Electronic Commerce: What Is It? Who Uses It? And Why Use It? . Communications of the IIMA . Cruz-Cunha, M. M. (2010). E-Business Issues, Challenges and Opportunities for SMEs: Driving Competitiveness. Idea Group Inc (IGI). Encyclopedia. (n. d. ). Retrieved August 10, 2011, from PCMag. com: http://www. pcmag. com/encyclopedia_term/0,2542,t=Smartphonei=51537,00. asp Harris, C. (2010, September). Ebook glossary. Retrieved August 10, 2011, from Library Journal: http://www. libraryjournal. com/lj/articlereview/886887-457/the_lj_ebook_glossary. html. csp Jun Xu, M. Q. (2010). E-business in the 21st century: realities, challenges and outlook. World Scientific. Kr. Sharma, R. , Sharma, R. , Raj, S. (2011). CONFRONTS AND ISSUES IN M-COMMERCE: A BUSINESS ON MOBILE AND NET APPROACH. International Journal of Information Technology and Knowledge Management. Lee, J. (2009). Data engineering issues in e-commerce and services: second international workshop, DEECS 2009, San Francisco, CA, USA, June 26, 2006 : proceedings. San Fransisco: Springer. Roehl-Anderson, J. M. (2010). IT Best Practices for Financial Managers. John Wiley and Sons. Skeldon, P. (2011). M-Commerce. Crimson Publishing, Limited. Winter, R. (2010). Global Perspectives on Design Science Research: 5th International Conference, DESRIST 2010, St. Gallen, Switzerland, June 4-5, 2010. Proceedings. Springer.

Wednesday, December 4, 2019

Antithesis Of Man Essay Example For Students

Antithesis Of Man Essay Identify characters who embody features of the antithesis of the Renaissance concept of the masculine ideal. What purposes do these characters serve in the plays? The Two Gentlemen of Verona deals with the debate over the relative merits of love and friendship between two young courtiers Valentine and Proteus. One of the great debates of the Renaissance was the discussion of whether the love of a woman was a sentiment more noble than the friendship that might exist between men. We also see the first instances of later female heroines in the qualities of Julia and Silvia. The plays starts with the two friends together, Valentine is getting ready to leave for the court of Milan, and is chastening his friend Proteus to accompany him, and leave Julia the girl he loves, and the dull life of home Than, living dully sluggardizd at home 1. 1. 7. Proteus being love struck is willing at this point to stay at home, and let his friend leave alone. Showing at this point that love does outweigh friendship. After Valentine leaves, Proteuss father is persuaded to make his son seek out his future away from home also. When we next catch up with Valentine he is in the court of Milan, and is trying to woe the Dukes daughter Silvia, who has been promised to Thurio who is a pompous, rich gentlemen, and like the rich snob of modern times will not get the ladys hand. On the other hand Valentine seems so immature and naÃÆ'Â ¯ve, in that the Dukes daughter Silvia, plays him for the fool that hes acting like. Speed the page to Valentine, has seen this, and when he tries to tell his master it is to complicated for the love struck hero to follow. What needs she, when she has made you write to yourself? Why, do you not perceive the jest? 2. 1. 152-154. When Proteus arrives in the court of Milan he encounters the now love sick Valentine, and after hearing the description of Silvia from his friend he instantly falls in love with the idea of her. This is where we see a friendship go astray and the power of love take hold. We see that Proteus is willing to give up a friendship with Valentine, so that he can fall in love with Silvia. This act may also show a subtle way in which Proteus feels that if he is no longer friends with Valentine he will not have to feel guilty about his feelings for Silvia. Methinks, my zeal to Valentine is cold; And that I love him not. 2. 4. 206-207 Valentine being none the wiser tells of his plan to elope with Silvia, and this enables Proteus to eliminate one of the competition. We see how much of a low life Proteus becomes when the Duke want to eliminate the memory of Valentine from Silvia head. Proteus is willing to completely destroy Valentines reputation in front of Silvia, so that he might look all the better. Proteus is now going to woe Silvia and use the fact that he is doing it for Thurio to openly make his case to Silvia. Unlike the scoundrel Proteus, Silvia is willing to stick by the man she loves, Valentine, and dismisses the advances of Proteus even after Proteus tells her Valentine is dead. I likewise hear that Valentine is dead. And so suppose I am, for in his grave assure thyself my love is buried. After this encounter Julia reenters the scene as a page to Proteus, which he uses to pursue Silvia. The final scenes has all the characters go into the forest Silvia to find Valentine, Proteus to pursue Silvia, and Julia to Pursue Proteus. .u1468ceceda5db164619d08d6a6cda0ac , .u1468ceceda5db164619d08d6a6cda0ac .postImageUrl , .u1468ceceda5db164619d08d6a6cda0ac .centered-text-area { min-height: 80px; position: relative; } .u1468ceceda5db164619d08d6a6cda0ac , .u1468ceceda5db164619d08d6a6cda0ac:hover , .u1468ceceda5db164619d08d6a6cda0ac:visited , .u1468ceceda5db164619d08d6a6cda0ac:active { border:0!important; } .u1468ceceda5db164619d08d6a6cda0ac .clearfix:after { content: ""; display: table; clear: both; } .u1468ceceda5db164619d08d6a6cda0ac { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u1468ceceda5db164619d08d6a6cda0ac:active , .u1468ceceda5db164619d08d6a6cda0ac:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u1468ceceda5db164619d08d6a6cda0ac .centered-text-area { width: 100%; position: relative ; } .u1468ceceda5db164619d08d6a6cda0ac .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u1468ceceda5db164619d08d6a6cda0ac .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u1468ceceda5db164619d08d6a6cda0ac .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u1468ceceda5db164619d08d6a6cda0ac:hover .ctaButton { background-color: #34495E!important; } .u1468ceceda5db164619d08d6a6cda0ac .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u1468ceceda5db164619d08d6a6cda0ac .u1468ceceda5db164619d08d6a6cda0ac-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u1468ceceda5db164619d08d6a6cda0ac:after { content: ""; display: block; clear: both; } READ: How Democratic Is The American Constitution EssayWhile on the forest path Silvia is captured by the outlaws that live their, and Proteus in turn rescues her, but not because he is a gentleman, but because of selfish interests. As Julia disguised as a page encounters Proteus and Silvia he is pursuing her harder than ever, and is even willing to force himself upon her. Ill force thee yield to my desire. 5. 4. 59 Valentine now steps in and Disowns Proteus as a friend. Proteus on the other hand like his name states is willing to change quickly back again, and become Valentines friend, and gives full repentance to Valentine who forgives him almost instantaneously. Valentine is now also willing to give up Silvia to Proteus All that was mine in Silvia, I give thee 5. 4. 88 If not for Julias actions next we dont know if Proteus would have taken Valentine up on his offer, but instead all is put right but the discovery of Julia under the pages clothing. The play concludes with Valentine challenging Thurio for Silvia and Thurio backing down, and this is where the Duke accepts Valentine as a gentleman able to marry Silvia, although at this time the duke being surrounded by Valentines outlaws did not have a lot of options. The two women in the end of the play are shown to be almost puppet like, and controlled by the will of the men around, and do not have a say in the outcome at all. The debate of love over friendship is placed back in a balance when Valentine says that they will all marry on the same day and live in the same place Our day of marriage shall be yours, one feast, one house, one mutual happiness. The play shows Proteus to be a false friend, a sly trickster, a liar, a coward, a slanderer and a ruffian, and this is the same person whom Valentine had described as having spent his youth in putting on an angel like perfection but in turn love drives this perfection out, and a devilish attitude in. Only the gentleman Valentine can put things back into order, which he does at the end, and love and friendship live together hand in hand.