Sunday, April 26, 2020

Sharjah Higher University of Technology Project Management

Introduction/Background Sharjah Higher University of Technology (SHUT) is one of the 17 colleges that constitute the Higher Colleges of Technology (HCT) in the UAE. The institution operates as a public university in the UAE.Advertising We will write a custom case study sample on Sharjah Higher University of Technology’ Project Management specifically for you for only $16.05 $11/page Learn More The institution is divided into men and women’s colleges. The women’s college was founded in 1997 while the men’s college was founded in 1998. The institution provides Emiratis with an opportunity to achieve their professional and career goals. The university can be described as a ‘peoples’ institution that allows the Emiratis to access higher education. SHUT has attained remarkable growth over the past decade. For example, the number of full time students has increased from 3,000 to 5,000. SHUT intends to develop a dynamic learning environment that will enhance the students’ personal and academic success. The institution intends to impart sufficient knowledge and skills that will improve the students’ competitiveness in the labor market. The university will focus on the students’ communication skills, critical thinking, leadership, and technical skills. The university is also concerned with improving the students’ personal integrity. By focusing on these issues, the university will improve the competitiveness of the students in the labor market. Subsequently, they will fit in an environment that is increasingly becoming complex and globalised. Vision Organizational objectives SHUT is committed towards achieving the set organizational goals, which are projected to the student and the society in general. The institution intends to nurture a high level of long-term sustainability, economic, and social sustainability in the UAE. In the process of implementing the IT project, th e institution intends to achieve the following objectives. To enhance Emiratisation of the UAE’s workforce by offering high quality educational programs Enhance effective utilization of educational technologies in order to expand accessibility of education to Emirati students. The Business case Purpose of the business case Currently, the institution’s information technology infrastructure is poorly developed due to poor funding. The university’s director, Dr. Sarid, intends to transform the institution’s IT infrastructure by re-engineering the computer information systems. The institution intends to update its classroom technology with state of the art computers. Moreover, the students will be issued with iPads, which have the ability to undertake all academic requirements. Implementing the new technology will significantly improve the effectiveness with which the institution imparts knowledge to students in the UAE. The new information technology will improve the effectiveness with which students interact with each other hence promoting information sharing.Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, the success of the intended changes will depend on the effectiveness of the new technologies to work seamlessly with each other and allow for a smooth transition from the current systems. Failure to configure the new information technology successfully will culminate in low usability of the new technology. Moreover, substantial cost will be incurred in the process of implementing the new information technology (Nevitt and Fabozzi 64). Business case sponsor The business case will be sponsored by the UAE federal government in partnership with the institution’s ‘Learning by Doing Initiatives.’ Situational assessment and problem statement The UAE has experienced consistent growth in the education sector over the past decades. The growth has emanated from rising educational needs and increment in government initiatives directed to the education sector. In 2010, the UAE government allocated 22.5% of the national budget to education. A study conducted by Nevitt and Fabozzi (43) shows that the UAE graduates have not met the employers’ needs. The students lack the innovation and skills demanded by employers. The UAE government has recognized this gap and it has called the learning institutions in the country to establish first-rate education systems that will promote the development of vocational and scientific skills that align with the market needs. SHUT’s objective is to improve the information technology infrastructure within the institution. Implementing new technology will improve the institutions’ position amongst students in the UAE. The institution will become the ‘University of Choice’ amongst students in the UAE especially in Sharjah and the bord ering areas seeking post-secondary education. Currently, the university utilizes old information technology. The majority of the implemented technologies are ineffective as they are reaching the end of their lifecycle replacement period. Moreover, the functionality of the old technologies is limited. The university intends to replace the old technology by implementing multi-functional devices, which can print and scan documents. The new technology will improve the competitiveness of the institution in the UAE’s education sector. The university will be in a position to provide students with diverse, high quality, and career-oriented programs. SHUT intends to deal with the market gap by offering students programs that meet the students’ needs, the workforce requirement in the labor market, and the set international educational standards. This aspect will improve employability of its students.Advertising We will write a custom case study sample on Sharjah Higher Univ ersity of Technology’ Project Management specifically for you for only $16.05 $11/page Learn More Assumption and constraints Hallows argues, â€Å"Projects experience problems due to the existence of assumptions that turn out to be invalid or constraints that were never identified (104). The university assumes that the UAE government will sponsor the Information Technology project to its completion, which will improve the institution’s ability to meet the market demand. Moreover, the university’s management team assumes that the government will aid in the process of maintaining the new technology. Consequently, the life of the new computer systems implemented will be improved. Implementing change in organizations is usually characterized by incidences of resistance from different stakeholders such as the employees (Schwalbe 89). However, the institution’s management team assumes that the project will not experience resistance fro m staff. In addition, the director assumes that the IT department will provide the necessary support to aid in the implementation of the new computer technology. When implementing the project, it is imperative for the university’s management team to appreciate the existence of project constraints. The constraints refer to the boundaries or limits within which the project must be implemented (Kerzner 85). The following constraints will be experienced in implementing this project. Budgetary constraints – The UAE federal government will sponsor the implementation of the new computer technology in the university. The government has limited its sponsorship of the ‘Learning by Doing Initiative’ to the university to 10%. Some of the funds will be allocated to other initiatives such as improving engineering and science laboratories, work placement initiatives, and field trip. Consequently, the funds for the new computer technology will be limited. Delivery constr aints – Another major constraint to the project relates to time. The new computer technology systems must be installed by 30 June 2014 to allow sufficient training for the faculty. Resource constraint – currently, the university’s information technology department is understaffed. Moreover, the university’s staff members do not have adequate skills with regard to new information technologies. Consequently, the university might not have adequate support to aid in implementing the new technology. Identification and analysis of options Currently, the R203 class is installed with old computers, which are functional and have up-to-date software. However, the software is reaching the end of its replacement period. The university will incur a substantial cost by installing new computers in the classroom. Apart from installing the new computers, the university intends to utilize the budgetary allocation by the federal government in other projects such as improvi ng the engineering and science laboratories, work placement initiatives, and field trip. Subsequently, the amount allocated will be constrained. The university faces a number of options that it can consider as explained herein. Option 1: – upgrade the computers The existing computer technology in the institution has been replaced by more effective and functionally richer computer technology in the market. However, the university can decide to upgrade the old computers. The university will incur a lower cost by upgrading the computers compared to buying new computers.Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The process of upgrading the computers will entail focusing on the most important aspects. Consequently, the staff and students will be more efficient and effective in executing diverse tasks. Rose (46) asserts that upgrading the computer systems ensures that optimum configuration is undertaken, thus attaining the intended benefits. Therefore, the institution will know exactly what is installed in the computers. The university will also be in a position to resolve problems that might occur. However, upgrading the computers may pose a security threat to the institution’s computer system. The computers may be infected by bugs, which might affect the normal operation of the institutions. The firm will also incur substantial costs in training the staff on how to use the upgraded computers. Another risk relates to incompatibility of the installed software and hardware. Option 2- Install new computers The institution can also consider overhauling the entire computer system in class R203 by installing new computers. The university will accrue a number of benefits by installing new computers. First, new computers have a higher processing capacity compared to old computers. Therefore, the computer systems will be more effective, efficient, and productive. Buying new computers will culminate in the university staff being enriched on new computer skills. Despite the above benefits, installing new computers will consume a significant proportion of the university’s budget. Thus, the opportunity cost involved is higher. Moreover, some crucial information might be lost in the process of transferring data from the old to the new computer. Option 3- retain the status quo The university may also decide to do nothing and remain with the old computers. By taking into account this decision, the university will be in a position to utilize the budget allocation in other academic projects such as improving its engineering and science laboratories. This decision will pos e a major risk in the university’s effort to offer students high quality education. For example, the delivery of knowledge and skills to the students will be weakened, and thus, the attractiveness of the university to students the UAE and the entire GCC region will be diminished. Comparison of options The following is a summary of the comparison of options on a 5-point scale. A scale of 5 = high while 1= low. Criteria Option 1 Option 2 Option 3 Benefits; Government Students University Management 5 5 5 5 5 5 1 1 1 Costs; Direct Indirect Recurrent 5 4 4 5 2 2 1 1 5 Risks; Initial Mitigation cost Resulting risk 3 4 5 5 2 1 1 5 5 Shareholder impact 5 5 5 Stakeholder impact; Attainment of the respective objectives 3 5 1 Issues: Compatibility issues System failure Usability 3 5 4 1 1 5 1 5 1 Recommended option The university should consider option 2, viz. install new computers in the 30 workstations. Implementation strategy Project title: Implementation of 30 new computers in class R203 at SHUT University Project Target outcome/benefits The project is intended to improve the quality of education delivery at the University. The success of the project will be evaluated by assessing the number of student enrollment at the university and the level of compatibility amongst the students and the labor market demands. Outputs The project outputs will be assessed by evaluating whether each phase is successfully completed. Work plan Projects consume a substantial amount of time (Taylor 87). The project is expected to be completed by 1 July 2014, which entails a duration of 5 months. However, the project duration will be crashed to 4 months. The table below shows the project phases and the key milestones. Project phases and milestones Start time Finish date Milestone Evaluating the old computer systems to determine their suitability 5th Feb. 2014 1 2th Feb. 2014 Successful analysis of the old computer systems Creating backup for th e data in the old computers 15th Feb. 2014 30th Feb. 2014 Successful establishment of backup Identification and purchase of new computers 1st March 2014 15th March 2014 Delivery of the new computers to the university Removing the old computer systems 16th March 2014 7th April 2014 Successful removal of the new computers Installing the new computers 8th April 2014 29th April 2014 Successful installation of the new computers with the appropriate software and hardware Testing the functionality of the computers 1st May 2014 15th May 2014 Successful operation of the new computers Project budget The chart below illustrates the estimated cost of implementing new computer systems Work package Estimated cost [Amount in $] Market research on the new computers 5,000 Cost of establishing data backup 10,000 Purchasing new computers 300,000 Uninstalling the old computers 7,000 Installing and configuring the new computers 120,000 Testing the computers 8,000 Total estim ated cost 442,000 Other resources The success of the project will be determined by how well the computer systems are configured and implemented. Subsequently, the services of IT experts are necessary. The University will outsource the services of well-established IT consultancy firms in the UAE to undertake the installation of the computers. Project management framework Governance The chart below illustrates the projects’ governance structure. Quality Management The project manager will set and ensure that the project meets predetermined quality standards. Every phase of the project will be reviewed to ensure that the intended objectives are met. Organizational change management The project manager will ensure that the students and the University’s staff are well informed about the intended change on the computer systems. This will aid in minimizing resistance by the students and the employees. Project review After the completion of the project, the project manager will conduct a comprehensive review of the project to determine its suitability. The review process will also aid in identification of possible gaps, which should require improvement. Work Cited Kerzner, Harold. Project Management: A Systems Approach to Planning, Scheduling,  and Controlling, Hoboken: Wiley. Nevitt, Peter, and John Fabozzi. Project financing, London: Euro Money, 2000. Print. Rose, Kenneth. Project quality management: why, what and how, Florida: Ross Publication, 2005. Print. Schwalbe, Kimmel. Information technology project management, Boston: Cengage Learning, 2010. Print. Taylor, John. Project scheduling and cost control: planning, monitoring and controlling  the baseline, Ft. Lauderdale: Ross Publication, 2008. Print. This case study on Sharjah Higher University of Technology’ Project Management was written and submitted by user Sullivan Gould to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, March 18, 2020

Ancient greece essays

Ancient greece essays Ive just begun my journey home, however I cant wait to tell you all that Ive seen and done. As I crossed the Athenian plain, my eyes were drawn to the three hundred fifty foot summit of the mighty acropolis (Tozer 247). I must say that until I got into Athens itself I thought Id made a terrible mistake coming in the summer. Outside of the city it is oppressively hot and humid, however as I entered the city I began to feel the cool sea breezes (Garland 22). I walked through the town to see the craftsmen at work, such statues they make. Absolute perfection, every muscle clearly defined like Apollo himself (Birch). Many of the craftsmen had recently finished working on pieces for the Parthenon. They painstakingly depicted the myths and history of Athena as well as Athens. On the east pediment is the depiction of Athenas birth. On the west is the battle between Poseidon and Athena for control of Athens. The statue of Athena is an object of unparalleled beauty; her face, arms, and feet are veneered in ivory, her clothing thickly plated in gold, and her eyes inlaid with precious stones (Woodford 39). While the sculpture is the best Ive seen, I must mention the architecture of the building itself. The size is overwhelming, as it is one hundred one feet and four inches wide, two hundred twenty-eight feet and one inch long. There are eight columns on each end and seventeen across its sides. Each column is six feet and three inches i n diameter, thirty-four feet and three inches in height (Woodford 17). There is a well blended mix of doric as well as ionic elements (Pomeroy et al 275). The acropolis is a sight to behold, Athens truly is a great city. The agora is filled with many different shops. There are bankers tables, booksellers, wholesale merchants, you can get all the necessities here (Pomeroy et al 283). I was so hungry by this time I stopped and got some ...

Monday, March 2, 2020

Terrorism Throughout the History of the United States

Terrorism Throughout the History of the United States Terrorism in America, like America itself, is a product of the many populations, issues and conflicts that co-exist within the nation’s borders. The United States is nearly unique among nations for its ability to â€Å"contain multitudes† in relative harmony. On examination, a substantial amount of terrorism in American history is motivated by an extreme distrust of the American ideal of democracy, in which people of varied backgrounds can all claim loyalty to and the benefits of the American system. In other words, despite enormous variation in terrorism’s expression, domestic terrorism in the United States can often be explained as a violent claim over what or who is authentically American. This distrust has had various forms of expression by different groups, in different periods. Colonists Use Violence to Proclaim Independence Although the Boston Tea Party does not necessarily come to mind as an act of terrorism, the staged rebellion by colonists was meant to threaten the British into changing its policy of taxing colonist tea importers imports, while offering a tariff-free trade to its East India Tea Company. Putting the Boston Tea Party in the category of terrorism can be a useful exercise for comparing the goals and tactics of different national liberation groups, which is what the Americansonce upon a timewere. Post-Civil War Terrorism - Violent White Supremacy The first and arguably most entrenched terrorist in the United States is based in an ideology called white supremacy, which holds that white Protestant Christians are superior to other ethnicities and races and that public life should reflect this purported hierarchy. In the period before the Civil War, American social organization did, in fact, reflect a presumed white supremacy, since slavery was legal. It was only after the Civil War, when Congress and the Union military began to enforce equality between the races, that white supremacy emerged. The Ku Klux Klan grew out of this period, using a variety of means to terrorize and harm African-Americans and sympathetic whites. In 1871, they were outlawed by Congress as a terrorist group, but they have had several violent incarnations since then. The Ku Klux Klan is no longer outwardly violent, but it has many chapters and continues to spread a racist ideology today, often against immigrants. Communists and Anarchist Violence Erupts in the 1920s The Bolshevik revolution that created the Soviet Union in 1917 had a powerful effect on socialist-minded revolutionaries the world over, including in the United States. And the roaring twenties, a period of tremendous wealth building by American robber barons provided a useful background for agitators against inequality. Most of this agitation had nothing to do with terrorism - labor strikes were common, for example. But anarchist and communist violence expressed the extreme end of a mainstream rift running through American society. The resulting red scare expressed peoples terrible fear that a communist revolution could unfold on American soil. One of the first cases of terrorism to be investigated by the FBI was the 1920 bombing on Wall Street by suspected anarchists. A spate of unsolved bombings in 1920 also gave rise to the infamous Palmer Raids, a series of mass arrests of Americans of Russian and other origins. The 1920s were also a period of upsurge in KKK violence, carried o ut not only against African-Americans but also against Jews, Catholics, and immigrants. Domestic Terrorism Explodes in the 1960s-1970s The expansion of plane travel beyond an elite few in the 1950s and 1960s enabled hijacking - or skyjacking, as it was known then. In the United States, flights going to and from Cuba frequently hijacked, although not always motivated by a strong political intention. This was the era, in other parts of the world, of post-colonial national liberation movements. In Algeria, in the Middle East, in Cuba, guerrilla warfare was revolutionary chic as much as it was a serious tactic. Both the serious intention and the youthful fashion took hold in the United States. American youth opposed to what they viewed as American imperialism, fueled by the ideals of civil rights for blacks, women, gays, and others, and deeply opposed to the deepening entanglement in Vietnam, turned radical. And some turned violent. Some had a relatively coherent platform, such as the Black Panthers and the Weathermen, while others, like the Symbionese Liberation Army - which, famously, kidnapped heiress Patty Hearst - were more generally in favor of something vaguely revolutionary. Right-Wing Terrorism on the Rise in the 1980s The radicalism of the 1960s and 1970s was followed by the conservatism of the Reagan era, in mainstream America. Political violence  too  took a turn to the right. In the 1980s, white supremacist and neo-Nazi groups such as Aryan Nation saw a resurgence, often among working-class white males, who perceived themselves as displaced by women, African Americans, Jews, and immigrants who benefited from new civil rights legislation. Terrorism in the name of Christianity also surged in the 1980s and 1990s. Radical groups and individuals committed to violent action to stop abortion were among the most visible. Michael Bray, head of a group called the Army of God spent four years in prison for his abortion clinic bombings in the 1980s. In 1999, the most lethal act of domestic violence to date occurred when Timothy McVeigh bombed the Alfred P. Murrah building in  Oklahoma City, killing 168 people. McVeighs stated motivation - revenge against a federal government that he viewed as intrusive and oppressive, was an extreme version of more mainstream desire among many for a smaller government. Dean Harvey Hicks, a citizen angry over his taxes, for example, created the one-man terrorist group Up the IRS, Inc. and tried to bomb IRS locations. Global terrorism comes to America The September 11,  2001  attacks by  Al Qaeda  continue to dominate the story of terrorism in the United States in the 21st century. The attacks were the first major act of global terrorism in U.S. territory. It was the culminating event of a decade of rising extremist, militant religious sentiment in many quarters of the world.

Saturday, February 15, 2020

Social and Psychological Theories in the depiction of the Wannsee Essay

Social and Psychological Theories in the depiction of the Wannsee meeting in the film Conspiracy - Essay Example "Conspiracy" is a real eye-opener as it opens a whole new load of questions for the viewer. We already know that the Holocaust already happened, but what is really mind-boggling is how is became possible in the first place. How killing 11 million lives could just be a matter of logistics: how much would it cost How to dispose of the bodies And here, we see the machinations of the hands that turn the wheels, so to speak. Now we could try to form an understanding, an attempt to grasp the psychological ruminations of those involved, by explaining their actions through some knows social and psychological principles. For example, what makes it possible for individuals to carry out evil or genocide Whenever a group, with the majority in unison, is involved in a decision-making process, they "tend to stifle dissent because group harmony is the anticipated outcome" (Heffner). In the movie, the men were unanimous in declaring their hatred for Jews. The meeting is also dominated by Reinhard Heydrich, a charismatic man who knows how to manipulate his colleagues, and to stifle any arising objection. Wilhelm Kritzinger, who expressed doubts on the matter of extermination based on moral grounds was merely deprecated. The few men who tried to argue against extreme policies eventually give way to the more dominant consensus. "When we all agree, and are happy with that agreement, we typically do not want to hear opposing arguments" (Heffner). This phenomenon is called "group think" and many aspects of the conference, including the characters' behaviors display this. Here, the individual's mind takes a back seat and the "group mind" takes over. Meanwhile, the principle of Group Polarization happens when a group tends to takes an "extreme position". Fuelling each others' beliefs, they become so hyped-up by and convinced of their positions, that they end up hastily agreeing to an idea without considering other aspects of the debate (Heffner). An example of this happened when the talk of "relocation" to Madagascar turns to "extermination" or the "final solution" while the officials express their hate of and regard for sub-humanity of Jews. Aside from the Holocaust, some examples of "group think" taken to the extremes due to Group Polarization include "lynch mobs, actions of the Ku Klux Klan, discrimination among hate groups, and mass riots" (Heffner). Also, the Nazi officials do not look particularly menacing or murderous, but as a whole, they have managed to put a stamp to the death certificate of an entire race. Fundamentally, the decision theory, "a body of knowledge and related analytical techniques of different degrees o f formality designed to help a decision maker choose among a set of alternatives in light of their possible consequences" ("Decision Theory") which governs groups including that of the Wannsee meeting, is that of "group think" and Group Polarization. It could also be noted that the officers never used the words "killing" or "murder", merely "evacuation" in labor camps with harsh conditions designed for slow and eventual death, those who will survive will be "treated accordingly". This kind of masquerading serves to desensitize them of the reality of what they are actually doing.

Sunday, February 2, 2020

Tate Modern Case Study Essay Example | Topics and Well Written Essays - 2000 words

Tate Modern Case Study - Essay Example The initial plan for the Tate modern was abandoned for a design that was meant to be modern and have the ability to meet the needs of clients. Therefore, combined effort of design team and client was devised as appropriate approach to the building. Mace played a role of negotiating the project management, which was critical in providing buildability and detailed construction advice. Tate modern project incorporated three underground oil tank and live switch station among many others (Grubiak, 2008). The expansion of the Tate modern project was deemed important because previously the building used to be congested but with the new design, the building is spacious enough since it accommodates millions of people. The building creates a more welcoming environment with several facilities (Herzog and de Meuron, 2005). Some of the facilities found in the Tate modern include concourses, terraces and cafes as well as learning institutions among many others. The building is expected to allow de eper engagement among different people with different needs such as practice based learning, workshops, participation, private study, discussion and interpretation of art. Herzog and de Meuron (2005) argue that the Tate modern building plays a very important role in the economy since it hosts various business activities that generate a lot of income, which boost the economy of the city and the country. Besides, the revenue generated from tourists that visit the facility is a lot of money. Tate modern is therefore considered by very many people to be a typical example of both economic and social renewal in the world. According to Herzog and de Meuron (2005), turning the Bankside of a power station into a gallery of modern art was uncertain architecturally. The proposal to have Tate developed into its current state could not fit either traditionists or modernist thereby drawing reactions from both camps. The structure, which is the power station, was initially designed and built in a manner to keep people out but after giving it a modern architectural touch, Tate welcomes people, while retaining both its dignity and weight (Blyth and Worthington, 2010).

Friday, January 24, 2020

Baroque Mexican Music Concert Report Essays -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  The concert I attended was a recital of Mexican baroque choral music. There were 5 main pieces played, each one having its own unique style and function. The recital was held at University of South Carolina School of Music recital hall room 201 on Tuesday, March 22, 2005 at 6:00pm. The group that sang was the graduate vocal ensemble and was conducted by Daniel S. Clark. The group of singers did an excellent job capturing the music and it was very hard to notice any major mistakes. The concert in a whole was a very soothing to me because when I went there I was very hyper and tense, but as the pieces were being played out, I became very relaxed and sleepy. This concert was a little different because in the beginning, the conductor went through a lecture of the Mexican baroque period. After he went through all of the material, they sang 5 songs and left. It was very interesting to learn about the music as it was heard and I think this is a very effective way to tea ch people about music and let them learn through personal interaction. Most of the songs were sang mostly by the higher pitched singers so it made us very sleepy. I had to wake up my friend who came with me because he was snoring!   Ã‚  Ã‚  Ã‚  Ã‚  The first piece that was played was â€Å"Beatus Vir† with Brian Glosh as the cantor. A cantor is the person who leads a congregation in singing. At the end of the performance, the 2 cantors were given special recognition because of th...

Thursday, January 16, 2020

The Boy King’s Treasure

One of the most famous of all of the Egyptian kings or pharaohs in history is the boy king, Tutankhamen. Tutankhamen was not known for his accomplishments (even though he opened up religious tolerance which was absent during his father’s reign) or great building projects, but rather the artwork that came out of his burial chamber in the Valley of the Kings. His tomb is unique because most of the treasures and art was untouched and still intact. The treasure that was put in the tomb showed the wealth that would be buried with the pharaohs and kings, and how much wealth the ancient Egyptian culture has been lost to modern times due to tomb raiders. There are many symbols that show the religion of the ancient Egyptians within the tomb such as the hawk symbol for Horus. The detail that was also shown on the death mask, sculptures, and even the coffin is a true marvel of metal works. Tutankhamen was a king during the New Kingdom period of the 18th Dynasty. The death of both kings some two years later resulted in the accession of Tutankhaton, as Tutankhamun was then called, when he was about nine years old and married to Ankhesenpaaton, Meritaton’s younger sister. †[1] Tutankhaton was also known to have been disfigured and weak, but by the painting and statues of him you would never guess. Tutankhaton did not rule long over Egypt dying at the aged of nineteen. Tutankhaton unlike the kings of the past with the giant p yramids, he was buried with many other kings of his time in the Valley of the Kings. The Valley of the Kings is, â€Å"which is a rocky desert west of the Nile opposite Luxor,†[2] this took fewer resources and had more room for the kings to have their tombs put into. Figure 1. Egyptian, Thebes: Tomb of Tutankhamen: King Ay complete ritual of opening of mouth on King Tut represented as Osiris, Date 1580-1085 B. C, Luxor, Egypt, New Kingdom-Dynasty XVIII–1580-1085 BC The picture above was found inside of Tutankhamen’s tomb which shows Tutankhamen’s successor Ay, and Tutankhamen dressed as the god, Osiris. The idea of this is to show the religious aspect where the King hopes to be able to rise from the dead just like Osiris. The picture depicts also a ritual called the opening of the mouth. This was link to both birth and death on someone. Historians were able to connect that the opening of the mouth ritual through Tutankhamen’s tomb and the pyramid texts that the opening of the mouth ritual has been around since the Old Kingdom in Egypt. â€Å"Although flint pss-kfs are rare after the beginning of the First Dynasty, models of the implement, often made of other types of stone, are known from Old Kingdom tombs and continue to occur occasionally as late as the Eighteenth Dynasty. [3] This was a great discovery for the religious and belief system of ancient Egyptians. This picture also show that the Canon law which was used when Egyptians depicted people, which was used in the Old Kingdom was still in use during the New Kingdom during Tutankhamun. Showing that both the religious and art basics within Egypt has not changed much over the course of the hundreds of year that span from the Old Kingdom to the New Kingdom. Figure 2. Egyptian, Funerary Mask of Tutankhamen, Date 1333-1323 BCE, Luxor, Egypt, New Kingdom, Eighteenth Dynasty The funerary mask that was found inside the tomb of Tutankhamun is one of the most famous pieces of art to have been discovered in the tomb. The funerary mask shows the amount of wealth the kings and pharaohs gathered over time. The materials that were used within the mask are made of solid gold and other semi-precious stones. The demotions of the funerary mask are, â€Å"height 54. 0 cm, width 39. 0 cm, depth 49. 0 cm. †[4] The shape of the mask is believed to be a pretty good depiction of what Tutankhamun looked like when he was alive. The rather narrow eyes, fleshy lips, and shape of the nose and chin all agree with the features visible on his mummy. †[5] This mask would have been buried on King Tutankhamun in the coffins for there were three coffins that were stacked inside one another (kind of like the Russian nesting dolls). All the coffins also had the almost identical mask piece as the funerary mask. The coffins were also made with extreme care and precision, whi ch includes both wood work and metal work. Figure 3. Egyptian, Statuette of Tutankhamen on Papyrus Boat as Harpooner: Front 3/4: from Tomb of Tutankhamen, Date 1350 B. C, Luxor, Egypt, New Kingdom-Dynasty XVIII–1580-1085 BC This piece of art has shown the amount of treasure that the kings gather being that it wooden figure gilded in gold. But the think that is that through scientific data there believe that Tutankhamen was a disfigured and weak person so to show him as a harpooner does not come to mind. This could be to show that the king was not weak to the outside and even to have the king to have a strong body in the afterlife. This piece of art also shows the â€Å"Egyptian sculptor’s ability to represent realistically the poise of the human body in the course of movement. †[6] The rest of the statuette was left out was a hippopotamus of Seth which was what Tutankhamen was harpooning. It was left out for a simple reason that it may be dangerous to the king in burial place of the king in the afterlife. â€Å"This gilded wooden figure represents Tutankhamun as Horus throwing a harpoon at one of Seth’s hippopotami. †[7] The perception that the king was the embodiment of Horus was still around from the beginning of the Kingdoms. Thanks to the discovery of the boy king’s tomb historian are able to see religious aspect of the ancient Egyptians and the wealth that has been lost through history. With the art work you can also see the masterful work of metal work that Egyptians mastered over a long time of metal working. Historians can also see that the times during Tutankhamun’s rule that the Egyptian were still using the canon of proportions as the Old and Middle Kingdoms periods. The tomb of Tutankhamun was a view of the past that was lost to historian and Egyptologist which helps to link the past with dates further back and to the future of the Egyptians.