Wednesday, July 31, 2019

Does Heavy Metal Cause Teen Violence?

Heavy metal has had a bad beat since the dawn of the genre onto the music scene. Slipknot, Ozzy Osborn, Marilyn Manson, Judas Priest, and Slayer are just some of the household names on the metal scene to have come under fire for supposedly inciting suicide, and in some cases murder. It’s a fire that the media has been more than happy to stoke, quick to insinuate links between the brutal lyrics and acts of violence.To quote Twisted Sister front man Dee Snider, â€Å"Every time a serial killer, mass murderer, Satanists, or any â€Å"evil† person in our society†¦ anytime the media’s found out that they’ve listened to heavy metal music it has been blown up as the reason for why this person is doing the things that they do† (Dunn). And he couldn’t be more right. As in the case of Marilyn Manson and the Columbine shootings, the media is more than happy to stoke the flames of controversy, even if the evidence points to the contrary. Violence ha s been around a lot longer than we have,† says Corey Taylor, lead vocalist and lyricist for the band Slipknot. Though violence and heavy metal seem to be intimately intertwined there is a difference between seeing and doing. â€Å"I have listened to enough metal for me to essentially be a serial killer,† says James McMahon from UK music magazine NME, â€Å"But there's something in me that says no, that's not what I believe life is about. Serial killers existed before Slayer, you know.I'm a big fan of horror movies but Hostel, Saw, those torture-porn films, I find myself repulsed†¦ metal is pantomime comparatively. † As one young Norwegian metal fan told the UK's Guardian newspaper, â€Å"It's all fantasy†¦ none of this is real†¦ you can't take this seriously†¦ it's just like a movie. † According to Sam Dunn, anthropologist and director of â€Å"Metal: A Headbanger's Journey†, â€Å"People look at heavy metal and label it for all sorts of things because we need easy answers to complex questions.I think that it's easy to target a heavy metal band for inciting violence or making kids turn to a cult than it is to actually look at real problems in the real world† (Dunn). So what REALLY causes violent acts amongst teens? According to William Fleeman author of â€Å"Managing Teen Anger and Violence,† teen violence is a growing problem in the United States and many of the underlying causes have nothing to do with musical preference. For instance, Fleeman states that abuse of drugs and/or alcohol contributes to teen violence.Violence among teens often stems from actions taken while intoxicated as well as crimes committed to obtain drug and/or alcohol. Another possibility is teens afflicted with mental issues. Metal health issues and conditions often show an inclination for violent behavior. Fleeman also states that teens living in unstable environments in which parents are neglectful and/or abusive ten d to act out violently due to first hand exposure to violence and/or neglect.And as in most cases some teens are motivated to participate in reckless and violent behavior as a result of peer pressure. They feel the need to fit in do to whatever reason and as such act out to look â€Å"cool†. Also, and this is possibly the most surprising reason of all, many teens that tend to do poor scholastically are more likely to behave violently in and outside of school. They feel undermined, even â€Å"stupid† and as such tend to act out as a way to gain acknowledgment (Fleeman).While Fleeman’s research depicts teen violence to be at an all-time high research done by the FBI from 1990 through 2007 has shown that rates of serious violence amongst youths under the age 18 has plunged by 49%, including unprecedented declines in murder (down 66%), rape (down 52%), robbery (down 32%), and serious assault (down 28%) (FBI). Furthermore, large-scale surveys such as Monitoring the F uture and The American Freshman have found students today reporting higher levels of happiness, optimism, leadership interest, and volunteerism and lower rates of smoking, drinking, depression, dropout, and materialism.And if that’s not enough to blow you away, the youngest teens showed the biggest improvements. So what causes teen violence? Is the media to blame? Is it drugs, metal health issues, neglect, peer pressure, or even bad grades? There may never be a satisfactory answer, but as far as metal is concerned, sociologist Donna Gaines had this to say, â€Å"For young people, it’s a place to belong where you can experience other possibilities and transcend everyday life in a very glorious way†¦ Is heavy metal a sacrament? For some people, it is.If it keeps kids alive, if it gives them hope, if it gives them a place to belong, if it gives them a sense of transcendence, then I believe it’s a spiritual force. I believe it’s a pipeline to God† (Dunn). And according to Dunn, â€Å"You either feel it, or you don’t. † Works Cited 1)Dunn, Sam, dir. Metal: A Headbanger's Journey. Writ. Scot McFadyen. Warner Bros. Entertainment, 2006. DVD. August 27 2012. 2)Fleeman, William. Managing Teen Anger and Violence: A Pathways to Peace Program. Impact Publications, 2008. Web. 3)U. S. government & U. S. Department of Justice, Stats and Services, www. fbi. gov

Advanced system analysis

Many questions have been asked regarding what exactly systems engineering is and what the roles of systems engineers are. The questions mainly asked are if systems engineers perform general works or whether they specialize in specific tasks.The question of whether system engineering is the overall process of managing a project or a life cycle of roles such as program verification and validation. It is even worth to either define the system engineering process as an attitude or a discipline. This research will entirely look at the many definitions of systems engineering and the roles that are played by the system engineers.The research will mention eleven roles that are executed by system engineers and some of these roles will be described as life cycle rules while others will be described as project management roles and others will fall on either group. The paper will also try to distinguish the roles played by system engineers from those played by subsystem engineers.The Role of a S ystem Engineer at the System levelMany companies have system engineering departments and the department’s main role is to check the product delivered to the customers.Engineers who work on the subsystems (elements that combine to form the whole system) are not always referred as system engineers but are referred with names according to the subsystem they work on; for example a software engineer will work on developing the software subsystem of the whole system, a Hardware engineer deals with the hardware subsystem of the whole system.Requirements owner roleThis role requires the system engineer to translate the customer needs into a set of well structured requirements which aid in the development of the whole system and the subsystems. The requirements should capture the external interfaces and ensure that the functional architecture of the needs is captured as well (Roger1985).The role of the subsystem engineer at this point is to assess the impact of the requirements to the system as a whole and its subsystem and decide which requirements should be modified.Subsystem specifications creation and maintenance is the other role that is handled by the subsystem engineer with various factors playing a major role in the formality of determining the requirements required. The factors include the degree of the customer needs, the company’s culture and the size of the project. Large projects mainly involve intense communications processes with formal processes (Roger 1985).System designing roleAt this role the system engineer will create the high level system architecture and then select the its major components. The system designer (Subsystem engineer) then investigates the possible ways of developing the system from pieces he possesses.He then compares those ways with the system requirements to ensure that the system’s functionality captures all the requirements stated in the previous stage.The system designer fine tunes the design and also desc ribes in detail the needs of the other lower subsystems. And finally he confirms if the subsystems can meet the specifications available or if it is possible to develop them.Mainly the role of system engineers at this stage will be to focus on the architecture, high level design, integration and verification of the subsystem. The lower level development of the subsystem will be the role of the system designer (Matty1997).The system design role comes after the requirement engineer has come up with the requirements and the functional structure. The two tasks work together in the selection of the subsystems and the explanation of the subsystem requirements.System analysis role  System analysts (subsystem engineers) at this stage try to confirm if the system designed meets the system requirements stated. The things to be analyzed will be system throughput and output, memory usage, and the system response.The work of the system engineer is to model the complex parts of the system to in vestigate if they are able to work well and interface them with the outside world. Modeling will also assist the system engineers to understand the operations of the system.The system engineers carry out such modeling with various powerful simulation tools. The type of project will determine the extent of analysis to be carried out with complex and risky projects requiring higher levels of analysis.Validation and verification roleSo as to ensure that the developed system meets the stated requirements, validation and verification engineers develop a verification program and sometimes the system engineers also come up with the test plans and procedures and determine what’s supposed to happen during an event.Verification and validation engineers are responsible for answering such questions and should also be able to predict behaviour of the events in advance.Verification and Validation engineers are also able to fully understand the system design so that they are able to respond to any anomalies that may occur and incases of emergencies are aware of the experts to call (Fisher1992).The role of the verifications and validations depends on the organizational structure; in some organizations a system test group performs these roles while in others the roles are performed by both a group of system engineers and the system test group.Logistics and Operations (LO) Role.System engineers at this face will demonstrate to the customer of how the system will operate. They are also asked questions by the customers regarding the operation of the system, and will also settle any anomalies that will arise. Logistics engineers are to aid the design and development stage by bringing maintenance and logistics concerns to these stages (Roger1985).On the other hand logistics and operations engineers who at this stage are the subsystem engineers will be responsible for determining the logical operations of the system so as to ascertain if the system will satisfy the requiremen ts that were stated.They are supposed to understand the design and the operational aspects of the system and have clues on the instructions to be given to users on how to operate the system. All these operations are entrusted to the Logistics and operations engineers since they are responsible for developing a user’s manual (Webster 1994).

Tuesday, July 30, 2019

Women in Psychology Mary Calkins

What does it take to be number one? As we know everyone loves a winner. Most people if they were asked who the fastest man in the world was? They would correctly answer with the name Usain Bolt. Nobody remembers number two right? However, let us imagine Mr. Bolt being told that he could compete in track and field but he could not officially win any medal because he was Jamaican. Sounds far-fetched today and against our values and everything we stand for in the 21st century? Well in the 1800s, things were very different especially for women and Mary Calkins was no exception. Mary Calkins not only made countless contributions to the field of psychology, her perseverance changed many perceptions resulting in her indirectly becoming a champion for women’s rights and equality. In this assignment, we will examine Mrs. Calkin’s background, theoretical perspectives and the integral role she played in the field of psychology. Mary Calkins, the oldest of five children was born to Wolcott and Charlotte Calkins on March 30, 1863, in Hartford, Connecticut. Her parents placed a great emphasis on education so in addition to elementary school, she took private lessons so she could learn German. After graduating high school Mary enrolled in Smith College in 1882, but took a hiatus her junior year in 1884, due to the untimely death of her sister and her mother being gravely ill. Mary did not make waste of this time. While at home she decided to learn Greek which was pivotal to her journey in the field of psychology. After Mary finally earned her degrees in Classics and Philosophy, she took a trip to Europe with family and had already decided when she returned that she would be a teacher and as well as tutor students in the Greek Language. However, her plans changed when she was offered the opportunity to teach Greek, at Wellesley, College, one of the few higher learning educational institutions for women in the country. At Wellesley, she taught not only Greek, but philosophy and psychology as well. This ultimately resulting in the university creating a new position for her in the experimental psychology department, although she had no credentialed training in psychology. This was crucial because many schools back then did not even admit women as students much less allow them to hold such a prestigious osition. For Mary to be successful, she knew she would have to further her education and learn more about psychology. Her ambition led her to enroll in two psychology seminars, one being at Clark University and the taught by Edmund C. Sanford and was taught by William James at Harvard University. Initially she was denied entry into Harvard because she was a woman. However, she had the president of Wellesley and her father both write letters on her behalf and was accepted. In 1891, her determination began paying dividends as she was able to set up a psychological laboratory at Wellesley and added scientific psychology to the program of study. From 1892 to 1895, she attended Harvard University. This is where she received some of the greatest resistance to everything she was trying to accomplish. Men and society during this time did not believe that women were fit for any job unless it was something that assisted a man i. e. doctor-nurse, boss-secretary, and homemaker. While Mary was allowed to attend Harvard, it was not without conditions. She could take classes and test, but in the University’s eyes she would be considered as guest. Undeterred and ready for the challenge, Mary enrolled in William James seminar on psychology; all the other students who happened to be men dropped the course in protest. What they believed is that if they did this the professor would boot her from the program because he would not want to lose his other students. Instead Professor James taught her individually and became her mentor. She also studied in the psychological laboratory at Harvard. She did all this while remaining a professor at Wellesley College herself. Mary completed all the required work and passed all her exams to earn a Ph. D. However, she was not awarded one due to the fact the she was a woman and women were not allowed to officially register at Harvard back then. She was later offered a Ph. D. , by Radcliffe College which was the female equivalent of Harvard, but she turned it down, believing that she done all of her work at Harvard, so it should be Harvard that awards her Ph. D. In 1898 is when Mary became a full time professor at Wellesley College focusing on philosophy and psychology publishing a slew of articles. When ten leading psychologists in the field of psychology were asked to rate their contemporaries by the measure of their work, Mary Calkins was listed 12 out of 50. Mary Calkins has given much to the field of psychology. For example there were only twelve colleges that had psychological laboratories in the entire United States and she created one. In her laboratory she had fifty four students dissect sheep brains and carry out studies on sensation, space perception, memory and reaction time. All of which are things that are used today by other scientists and different medical communities. For example, we are always hearing that drunk driving skews your space perception, sensation, memory and reaction time. One has to think this is not a coincidence that her work contributed to their findings. It was the first at a woman’s college and she did this with a mere $200. From 1891-1892 at the behest of G. Stanley Hall who has the editor of the American Journal of Psychology, her articles were normally studies and experiment by her and her studies that included everything from children’s emotions, moral consciousness, drawings, psychological anesthetics, and dreams. From her research in dreams she discovered there was a close relationship between her patient’s dreams and what happens in real life. Her work would not be appreciated during its early stages by most scholars as they were on board with Freudian thought process on dreams. Later this same community would dismiss Freud’s method and make Calkins research integral to dream researching. Through all of her research while pursuing her doctorate one of her most significant things she have to psychology was the Paired Technique. This technique is explained is putting to paired numbers in different colors on cards and flashing them to see what the subject could remember. What she found was bright colors were retained better as well as a new memorization method. It later became a standard means for human learning and remnants of it are still used today by psychologists. Of all of Mary Calkins contributions to psychology, she was most interested in self-psychology and ignited the brainstorm over this that caused many to take up research on the subject. She even published an autobiography in 1930, where her goal was to get psychologists to become self-psychologists. In 1900, she even wrote and published a paper expressing her belief that psychology is a science of the self. This was immediately followed by criticism from other academics. Mary Calkins was never afraid of a challenge and answered those criticisms in work that followed and in her presidential address at the American Psychological Association meeting in 1905. For all that she tried to do in self psychology, unfortunately Dr. Kohut, Dr. Honess, and Dr. Yardley failed to credit to give her any credit in this arena. During her career Mary was really busy evidenced by her writing 67 articles on psychology and 37 in philosophy. She also wrote and had 4 books on psychology published. Mary Calkins exemplary work preceded her and resulted in her being the first woman named president of the American Psychological Association and the American Philosophical Association. What Mary Calkins was able to accomplish in her day and age was simply amazing. She had to overcome numerous obstacles that would have made any other person give up and pursue a different profession. She worked and went to school, dealt with sexism and static thinking, in terms of a womens’ place in society. I say to Mary Calkins you are a winner and we remember you. Not only for your contributions that you have to the respective field of psychology, but the barriers that you broke down so that other women were allowed to be more easily accepted and respected. From my research on Mary Calkins I learned that a group of Harvard alumni petitioned for her to be awarded her doctorate in 1930, but they were denied. I think that it would be fitting if this cause was taken up once again today. For everything Mary Calkins has meant to the field of psychology it is the least we could do to honor all of the blood, sweat, and tears that she put into her work.

Monday, July 29, 2019

The illiad of homer, translated by richard lattimore Essay

The illiad of homer, translated by richard lattimore - Essay Example He refers to the priest as an old man and warns him never to loiter again in his compound in claim of his daughter. â€Å"Let me not find thee ,old man at the hollow barks, either now loitering, or hereafter returning, lest the staff and fillet of the god avail thee not† (Homer & Buckley 1). Agamemnon curses the priest and wishes him doom. He condemns the priest and even goes ahead to tell him he is not worthy scepter god’s protection. Agamemnon swears not to release the maiden till old age, and even at that time, he adamantly swears to take her in his Argive home for her to make his couch. The standoff between Agamemnon and the priest has worked to bring out the character of Agamemnon; as a ruthless and cunning person who won’t allow anything to stand his way towards his personal interests. It is however out of these characteristics that Agamemnon gains his popularity. It is funny how people get determined to acquire wealth. Hector is no exceptional. He proposes to end the war by a duel between Menelaus, the loved of Mars, and Paris, who is a woman-follower and seducer according to Hector. â€Å"The lyre and the gifts of Aphrodite would not be of use to you, and your combed hair and beauty, when you mingle in the dust† (Schein 54). The victor of th e war is to be awarded the beauty Hellen, the fairest of Priam’s daughters, and all her wealth (Leaf 135). Hector portrays Paris as an enemy of the people. He despises him as a useless person who did not even deserve to be born. In Hector’s eyes, Paris is a coward, a scandal, and scorn to all those who set their eyes on him. â€Å"There is no strength in your heart and there is not any valor.† (Schein 45). The family has not been left behind in the contribution of a certain behavior of the characters in the Illiad of homer. A good example is the family of Chryses, a priest who offers ransom to Agamemnon for the

Sunday, July 28, 2019

Operators of southampton port ABP Lab Report Example | Topics and Well Written Essays - 2250 words

Operators of southampton port ABP - Lab Report Example (Atkins, August 2011)Southampton port also handles a wide variety of dry bulk like cement, fertiliser, wheat and glass with around 1.7 million tonnes being transported in 2009. UK which is dependent on oil imports receives a large chunk of oil through the Esso and BP oil terminals at Fawley and Hamble. Although these are located close to the Southampton port, it does not fall under the ABP jurisdiction. Estimates suggest that around 28 million tonnes of oil products is handled every year. (Atkins, August 2011)The Port of Southampton has therefore become an important player in the government’s scheme of things not only because it generates such large revenues but also because it generates significant avenues for employment thus boosting the social sector. The Marchwood Sea Mounting is a Defence facility located in proximity to the Southampton port having both road and rail connectivity. (Atkins, August 2011)Apart from this it also has a significant draught of around 15m which is quite capable of handling cargo and container ships. To sustain the growth of the Southampton port one would need to expand its area of operations and this defence facility c ould provide an ideal foil for its expansion. There is however a host of factors that affects the setting up of a vehicle or container terminal. Converting a defence port that would handle limited amount of cargo and transport into a container terminal would require a significant amount of initial capital investment and one would need to study the pros and cons to ascertain the economic viability of this venture. Some of these external factors are as follows 1. With the increase in competition among hub ports and the tendency of carriers to introduce large vessels of the range of 8000 TEU, it has become essential for ports to expand its wharf capacity to cater to these ships. Malacca-Max range of ships of capacity 18000 TEU and large container ships (ULCS) of capacity 12500 TEU would

Saturday, July 27, 2019

Fathers need to be as involved in their children's lives as mother are Essay

Fathers need to be as involved in their children's lives as mother are - Essay Example Fathers should be involved in their children’s lives just as much as their mothers are because fathers offer different skill sets than mothers, children receive a much improved childhood, and fathers good set a good example for their children. One reason why fathers need to play an equal role, in conjunction with their wives, in their children’s lives is that they have certain characteristics that cannot be replicated by mothers. In single-parent households, mothers are generally left to pick up the slack left behind by an absent father. That is not to say that a mother cannot fill the gap of a missing father, but each parent has specific roles that must be performed by them. While mothers are generally left to enforce the rules that children must live by, it is the responsibility of fathers to set these rules and then meter out the appropriate punishment if these rules happened to be broken. For a mother to perform all three of these actions is perhaps too much. Childr en would feel like they were getting singled out for nothing. It is for this reason that fathers often command more respect that mothers do. This is because children instinctively know that fathers are the ones in charge and that the buck stops with them. It is okay for fathers and mothers to have different positions on how to raise their children because each would have an idea on how to raise their kids. As the old cliche goes, â€Å"Two heads are better than one.† This is not to put mothers down; it’s just that fathers fill a place that can help to enhance a family’s relationship. Another reason why fathers must involve themselves in their children’s lives just as much as mothers is that the children are better for it. It is always reassuring for a child growing up to see two parents that are totally committed to each other. Children interpret this as both parents being devoted to the health and well-being of their offspring. This can continue on into other areas of a child’s life such as education and in social settings. Many studies show that children perform better when a father’s is interested in their schoolwork. In terms of a child’s social life, they are better able to make friendships and trust others if they have already experienced this in their family life. The final reason why fathers need to be involved in their children’s lives as much as mothers is that fathers are in a position to be a good example for their children. Fathers have life skills that they can teach to their children that mothers would have no idea about. The role of a father in his son’s life is extremely important. The way a father is involved in his son’s life affects not only how the son’s perceives his father but affects his behaviors later on in life. Fathers who are alcoholics and abusive husbands tend to have sons grow up to do the very same thing. On the other hand, a father who is a loving hus band and has found success in his life will likely have a son who is well-grounded and focused on his life goals. In another way, fathers can show a good example to their daughters too. Fathers who love and care about their daughters will likely find that they grow up to becoming successful young women. Fathers have a very important role to play in the lives of their children because they have always been thought of as the head of the household.

Friday, July 26, 2019

Leading change in Haworth Asia Pacific case study Assignment

Leading change in Haworth Asia Pacific case study - Assignment Example Finally the paper presents a guideline for Haworth Asia to manage the change journey in the near future. The guidelines present some standard tools and checklists that may help Frank Rexach in mapping an action plan for the future. 2. Case Summary and Key Issues 2.1 Introduction Haworth Asia is the second largest designer and manufacturer for contract office furniture and has recently started its second round of global expansion. The company wants to move towards a business model which works in a more integrative way. This will be a change from their present model in which sourcing and product development happens largely in isolation in different parts of the world. Thus the case was about a company which was a global organization and has to manage issues that are relevant to international marketing or international finance. The company also has to manage cross cultural management. 2.2 Office Furniture Industry Haworth is one of the four global leaders in the contract office furnitur e industry along with Steelcase, Herman Miller and Teknion. Haworth has been the most aggressive when it comes to global expansion, with presence in Europe, Australia and China. There are different strategies for global expansion and Haworth has been inclined towards acquisitions and others have been more inclined towards joint ventures. In joint ventures or agency relationships, these companies have to bear with agents or partners who try to push their own cheaper products to customers. Any corporation can adopt different methods to expand internationally. As was mentioned in the case Haworth has been able to choose its preferred mode expansion, partly because it was a private corporation. Normally a company starts with joint ventures or agency relations as it expands internationally. The tactics of Haworth, to expand with direct acquisitions, will be considered aggressive by most standards.   2.3  Ã‚   Haworth Asia Pacific Haworth is a private company which has worked to their advantage when it comes to global expansion. Their large competitors have to meet the near term expectations of financial markets, which can be a disadvantage during times of financial crisis (even though the crisis may be due to factors completely external to the furniture business, as in this case it was the dot com bubble burst). Haworth is a global organization since the product design and development takes place largely in USA and Europe, while the sourcing happens largely in Asia, and most of the clients are large multinationals. Haworth Asia pacific differs from Haworth operations in the USA, since Haworth Asia manages both manufacturing and client interaction. In USA, dealers manage the client interface. Haworth Asia was also considering targeting medium-priced segments since they have access to cheap labour and raw material. So when Haworth Asia Pacific decides to shift its head office from Hong Kong to Shanghai, they will be confronted with a unique challenge. For the fir st time in the history and culture of Haworth, the functions of manufacturing and marketing will be reporting to the same leaders. The conflicts and frictions that are usually between manufacturing and marketing in most industry can occur in Haworth Asia Pacific as well. They merit thorough consideration and analysis. 2.4  Ã‚   Market Analysis Haworth Asia was number two or three in all the markets, but in all the markets there

Choose from the list below Essay Example | Topics and Well Written Essays - 750 words

Choose from the list below - Essay Example Consequently, the dominance and prevalence of such cultural orthodoxy can lead towards an objection of censorship occurrence, even in instances when acts of censorship are justifiable for a common good. The assumption regarding the intrinsic and ‘untouchable’ value within the freedom of speech connotes a level of danger which promotes harm to a person and the society in general (Post, 65). The subsequent sections within this essay will present a well defined justification of censorship through elaborating on common good cases. Furthermore, the reasons presented will seek to offer compelling explanations that censorship is perfectly in tandem with the human precinct of freedom of expression. To this end, historical evidence will be adduced as support towards acts of censorship. Consequently, the reasons will allude into showing that, had extension of censorship been granted, then heinous wrongdoings and injustices would have been avoided. Reflections on Justifiable act of Censorship. The extensive control interventions employed by the British state during World War 2 offers a perfect example of a just act of censorship. Evidently, the Emergency Powers Act in 1939 was established so as to justify detentions of persons in the event that such detention would promote security defences of the British state. The statement within the act extended beyond Nazi sympathisers and consequently appeared culpable to abuse by the state. However, the motivation behind the act was to prevent sympathizers or activism of Nazism from demonstrating such acts and threatening the British sovereignty(Post, 32). The opponents of such acts of censorship may argue that a functioning democracy requires all dissenting voices to be heard. Moreover, the validity of such statements may be justified during war time that is aggressive, or in instances where defeat does not led to denial of sovereignty or freedom(Post, 33). However, these circumstances were not reflective of World War 2. Evidently, the British were engaged in a defensive war whereby an expansive territory of Europe was under the Nazis (Post, 43). Consequently, the function of democracies had been halted. Wartime censorship places its strength in its capacity of information blackout to the enemy, element of surprise in war tactics, as well as maintenance of morale in the home front. Consequently, the censorship act assisted the British country in avoiding the advances and infiltration of Nazi imperialism and essentially contributed towards the preservation of British democracy. In addition, the censorship was justifiable since it protected the vulnerable British citizens from persecution by the Nazi government. Another example of justifiable censorship is in relation to the censorship in revolutionary Cuba. Evidently, in trying to justify the censorship existing in Cuba, many critics will vehemently rush to use the intrinsic democratic right of freedom of speech in levelling scathing attacks agai nst the Cuban system. However, in defending the Cuban system of censorship it is equally valid to assess it legitimacy in protection the ideological doctrines of the Cuban society. To this end, an analysis of the practical achievements of such censorship is necessary. Through the drawing of parallels between the British situation during World War 2, it is evident that the Cuban censorship have been precipitated by threats from an external enemy. Following the Cuban revolution in 1961,

Thursday, July 25, 2019

Interview a woman or girl of a different generation Research Paper

Interview a woman or girl of a different generation - Research Paper Example People visit and settle in London for employment, business, health and education purposes. Keeping in view all these issues, I have conducted an interview of my colleague named Moona, a married working Egyptian Muslim lady of forty one years, who has been settled in the UK as immigrant for the last five years, and is leading a prosperous life in the vicinity of London city. The selection of the lady was made in order to compare and contrast the socio-cultural and religious beliefs as well as views and opinions on multiple issues with those followed and adopted by me. I am a young British university graduate of 23 years, and follow Christianity as my faith; I selected one of my colleagues for the interview. Since both Christianity and Islam seek inspiration from Abrahamic mythology, it was really wonderful to explore the commonalities and differences between the followers of these two religions. Being a professional social researcher, I assured confidentiality to the interviewee, whil e my communication with her. I had invited the interviewee in the restaurant at the bank of the romantic and calm Thames River in order to make the meeting remarkable and fantastic. I have named the interviewee as Moona in order to conceal her real identity. The interview was conducted in a highly friendly, amiable and pleasant environment, and the interviewee shared all her joys, sorrows and beliefs without any hesitation or hurdle. Though, I knew Moona for the last three years, yet we had never tried to explore very personal issues in past. However, during the interview, I found her as a highly sophisticated, well-mannered, well-groomed and polite lady. Here are the important findings of the interview: We had planned to meet at restaurant to give vent to our ideas and beliefs. At first, I paid my sincere thanks to her for sparing some moments from her precious time for the interview. Then I enquired her how did she feel about being a female both in the conservative Egyptian as wel l as the insecure ultra modern British society, as she belonged to the Muslim family of North Africa. She also thanked me for inviting her to dinner and discussion related to multiculturalism, which was also a topic of great interest for. She regarded being a woman as something pleasant and unpleasant equally. She admitted that Cairo was aptly regarded to be the Paris of Africa due to its modernity and being contiguous to Southern Europe, yet the girls underwent several restrictions in respect of moving freely in the male-dominating society. She informed me that there existed some proportion of conservative Christian and Muslim families in Egypt, which did not approve publically intermixing of boys and girls, and condemns and censures male-female joint sittings, studies and social interaction at large. They refuted European life style altogether, and declared it against their religious, social and cultural ideology. Hence, she had been brought up under several restrictions as soon a s she entered her teen-age, as she was not allowed to travel alone even to her school and to relatives and friends. Somehow, she also found life in London as very challenging for the woman folk, and insecurity often haunted women in all parts of England. I asked her whether ever had

Wednesday, July 24, 2019

United Nations Global Compact and Global Reporting Initiative. Why Essay

United Nations Global Compact and Global Reporting Initiative. Why Corporate Social Responsibility Matters - Essay Example Investors in corporations are not held accountable for whatever wrong or right decisions the group as a whole would do, since their liability is limited to their investments. Thus, whether the corporation does more harm than good or not by the products that they sell, it can be sued by its own entity alone, but the owners and investors would not be affected under state laws. These corporations will continue to exist as long as the customers choose to patronize their products. But during the recent decades, there has been some changes happening to the structures of some corporations. Many start to fall if they didn’t give back to the people that help them get established. Also, doing harm just to gain profits becomes a bad norm, thus the creation of a system that would balance quality of life within owners and stakeholders of corporations as well as the people they serve. This method of doing business is called Corporate Social Responsibility, or CSR. By the definition of Kotler and Lee (2005), â€Å"corporate social responsibility (CSR) is a commitment to improve community well-being through discretionary business practices and contributions of corporate resources.†... By the definition of Kotler and Lee (2005), â€Å"corporate social responsibility (CSR) is a commitment to improve community well-being through discretionary business practices and contributions of corporate resources.† They mentioned â€Å"discretionary† since it would still be the choice of corporations as to whether they will voluntarily commit to implement CSR in their business or not. A related term to CSR would be CSI, or corporate social initiatives. These are major activities undertaken by corporations to support social causes and to fulfil commitment to CSR (ibid.). With such ideals, it is portrayed that CSR would not only benefit the corporations, but also the government, its people and the environment. In this report, two examples of large groups that promote CSR around the world would be presented. First is the United Nations Global Compact (UNGC) and second is the Global Reporting Initiative (GRI). Both groups believe that sustainability and development can be attained by having corporations to voluntarily have transparencies in their company regulations and business plans as well as the development of beneficiary communities through transactions that promote social empowerment. The United Nations Global Compact (UNGC) The United Nations Global Compact or UNGC was launched in July 2000. It is the largest voluntary corporate sustainability initiative in the world, with over 8,500 signatories in 135 countries. The primary goal of the UNGC is to advance two complementary objectives (UNGC, 2011): To mainstream the ten business principles in business activities around the world; and Catalyze actions in support of broader UN goals, including the Millennium Development Goals (MDG’s) By

Tuesday, July 23, 2019

Examine the nature of the distinctive managerial, organisational and Essay

Examine the nature of the distinctive managerial, organisational and developmental characteristics of small businesses vis-a-vis - Essay Example Coaching is more task-oriented whereas mentoring is driven by knowledge sharing meant in a spiritual context with the purpose of developing the personality of a learner. The understanding developed through the work of Garvey et al. (2008) is further strengthened through literary explanation provided by Robert Thurman, Meredith Belbin and Rosemary Ryan. Where Garvey et al. (2008) describes how the definitions of these two terms have evolved over centuries, other three authors explain their relevance to present life. According to Garvey et al. (2008), self-realization is a foundation of coaching and mentoring. The follower has to understand his/ her inner self and then interpret the meaning of knowledge provided to them. Furthermore, they believe that coaching and mentoring are rooted in our cultural norms and values. Like Bruner stated in Garvey et al. (2008), folk wisdom is distributed through interpretations of historical events that later on form our culture; this understanding of cultural norms is further strengthen through dialogues (p.11). In order to elaborate the historical background of coaching and mentoring, frequent references to the work of Plato, Homer, Socrates and Aristotle are given in Garvey et al. (2008). It is stated that frequent questioning and critical debates lead to emergences of true knowledge. Therefore, without questioning the pre-established norms, new ideas cannot be created. While defining their work, it was found that only Plato and Aristotle have used the word mentor for a figure known for disseminating knowledge. Later on, it has been added that Aristotle has introduced a differentiation between practical and theoretical knowledge. He further introduced the concept of productive work which defines creation of something new. Careful analysis of contemporary coaching techniques would reveal that these three concepts are used frequently in present coaching and mentoring. Further referencing to Homer indicated that the word mentor w as introduced into literature around three thousand years back. The word itself meant an advisor. However, Homer’s work has been highly shadowed by unnecessary criticism and relevance to gender issues without giving much attention to social norms. Garvey et al. (2008) further analyzed the literary work with reference to coaching and mentoring in 18th century. According to Fenelon, observing life events is itself a learning process that can provide positive as well as negative lessons. Presence of mentor helps in interpreting important lessons out of these events that helps in attaining better insight of life and virtues. The concept of experiential learning also stemmed out of Fenelon’s ideas of learning and development. The idea was extended by Rousseau in 18th century when he introduced the ideal class size for effective education. The present day concept of multiple students in one group headed by a single teacher was not accepted by Rousseau; in fact he emphasized on having a one-on-one interaction between the student and a teacher whereas the term teacher was replaced by mentor. Where mentor was considered as a figure of knowledge and wisdom, Louis Carccioli attached spiritual attributes to this personality. According to him, a mentor is someone who not only enriches the mind but also lights the heart. Hence, a therapeutic effect of mentoring was introduced by Caraccioli when he writes, â€Å"

Monday, July 22, 2019

Home Depot Essay Example for Free

Home Depot Essay Organizational talent is where the organization has the best of the best personnel in as its staff. This covers all the departments of the organization from subordinate staff, production staff as well as the technical staff. Having such a staff base can be advantageous to the organization in terms of efficiency and quality service delivery. The Home Depot Company is one such organization that has the very best personnel as members of its staff. According to Bullard (2010), there are a few basic tactics in which and organization can make maximum of use of its organizational talent and they are: Remove your Constant Underperformers: It is a waste of resources to pay an employee whose performance is not worthy talking about. Therefore in order to remain with employees who can perform, it is wise to get rid of the nonperformers. This is one strategy that the Home Depot uses to improve its service delivery. Bad apples: There are many obstacles that an organization encounters in the day to day running of its activities; therefore for there to be smooth running of the business, the organization should get rid of these internal and external obstacles. Hidden gems: Each organization has the â€Å"silent performer†. This is the employee who is never in the limelight but delivers the best services for the company. Discovering this employee and nurturing him through motivation is the best way that an organization can use to ensure that the organizations talent is maximized. High-quality outside hires: Short term outsourcing can be beneficial for the company especially in technical areas. The human resource department should always be on the look out for those potential employees who can add value to the business and hire them when need arises. The Home Depot as an international brand intends to use the following management techniques to gain a competitive advantage in the Do It Yourself industry (Hewitt, 2007). Performance Management: The performance management allows the company to evaluate the individual performance of its employees and as such it can able to tell which employee fits in which department and how to ensure they deliver the best service for the company. Compensation Management: Nothing can be more motivation an employee as being rewarded for good performance. The Home Depot Company is one such company that ensures that its best performers are recognized and rewarded. This gives them more moral to perform and deliver quality work for the company. Learning Management: Employee training forums help them to be able to learn about new production as well as sales and marketing and as such they can be able to diversify and produce more quality goods. The Home Depot intends to use this management feature to ensure that their staffs especially in the production sector are well trained and conversant with the latest market trends and designs. Social Networking: Social networking can also be referred to as team building, even thou this concept is not new at the Home Depot company, it seeks to improve it and come up with diverse methods of networking and team building. Discuss the Key Channels that Home Depot Developed for Recruiting Talent By recruiting talent, the Home Depot has been able to build the following key basic channels of organization management as well as customer relationship management. The Home Depot has been able to discover capabilities that can be used to determine the success of the customer experience as well as the customer relationship management (Hewitt, 2007). Some of the capabilities include the design and implementation of viable customer relationship management (CRM). This will be used to ensure that clients’ needs are well taken care of. Another key channel that the Home Depot developed by recruiting talent is that it has been able to determine the most productive channel for each department. This has ensured that the level of production in the organization is on steady upward progress in each and every department (Hewitt, 2007). The last key channel of development that the Home Depot develops by talent recruit is that it has been able to build a mutual relationship between itself and its various business partners and associates. This has helped it to ensure that there is smooth running of businesses it the various franchises that it operates in and outside America. Discuss the Critical Programs used by Home Depot to Keep Talent in their Pipeline  The Home Depot has put in place a few programs / strategies that are meant to ensure that the staff it hires are not tempted to jump ship and search for greener pastures but they stay committed to their work. For the new recruits, they are first guided on the various functions of the department they will assigned to, after which they are given a challenge to undertake (Hewitt, 2007). The talent will feel â€Å"empowered† by the challenge given to him / her and will strive to deliver the best, however the management is always on the standby to ensure that they are given any support that they may require. In addition to that, the skilled talents are allowed to try out a variety of roles before they can be advised on the best carrier choice to take. Finally the talents are given an opportunity to try out new innovations and ideas that they might have, by so doing the talents will feel appreciated and as such it will hard for them to leave the organization (Hewitt, 2007). Discuss Three Lessons Learned by Home Depot related to Talent Management. Some of the lessons that the Home Depot learned in relation to talent management are: Investing in talent, give programs time to work, listen and respond to naysayers. Listen and Respond to Naysayers: In every organization, there is always positive and negative criticism coming in from all quarters. The Home Depot has learnt to use the public relation skills by always giving a positive and promising feed back to any criticism that is raise against it. In so doing the company has been able to draw admirers from different regions of the world. Youth Investment: The youths can be used to determine the future of an organization, this is because of their willingness to work, learn and deliver. The youths are also innovative and filled with creative ideas. The Home Depot extensively invests in the youths in all sectors and departments. The youth are then given the responsibility of delivering quality serviced for the organization. Time: The rush by most organizations to have instant results is what makes the programs the implement fail, however when it comes to Home Depot, it has learnt to give time for the programs it implements to develop, mature before the results trickle in. y so doing, the company has been able to reap maximum inputs from the output it gives. Summation / Conclusion The Home Depot Company is a sure that with good planning and implementation, any business can grow into an empire in the shortest time possible. In addition to that investing in youth talent is another way for a company to expand rapidly. The Home Depot should spread its customer base to other untapped market like Africa where there is a lot of potential.

Sunday, July 21, 2019

Ipsec implementation

Ipsec implementation There are many methods to IP Security. In the Microsofts Windows 2003 the server version, there are many such techniques and tweaks which are useful to help provide a secure base to the system. The operating system is very good in protecting the system from attacks which may be active attacks or in some cases passive attacks. The procedures for IPSec are placed properly into the system which helps it tackle such attacks. This is possible by providing a secure packet filter for packet transport and also using cryptography. This technology is very in high use for communication types like host to host, router to router, gateway to gateway, site to site and also in virtual private networks. Some other places for successful implementation are secure servers. The IPSec comes as a basic Group Policy controlled by Dos Prompt commands and it also has user interface with custom programs installed. The implementation of IPSec involves these steps: Overview of IPSec Deployment Determining Our Internet Protocol Security targets Preparing a Internet Protocol Security Policy Implementation of the designed policies Overview of IPSec Deployment: There are many techniques such as usage of cryptography and authentication software to secure the communication in a network. The connection may be between two parties or between a group of users. Security is to make sure that the communication is not broken, the communication is not intervened and the data is not altered. The Internet Protocol Security has some features which help running a secure transmission. IPSec has set procedures which help achieve these ends. Today there are many companies and it is getting harder day by day to ensure the security of such humungous networks with a heavy workload on the networks. It is also very hard to track any attacks on the network in millions and millions of request. Using firewalls to protect a network did work for some days but it has proved to be impractical as it has no proper rules to detect intrusions or attacks. The advent of IPSec is a leap in computer and network security. This protocol has a wide spectrum of features which are strong enough to contain such high volume of network requests and also handle intrusions. The Internet Protocol for Security is not a versatile detection protocol. It is capable of managing most of the policies to grant or reject, block and negotiate the traffic in a network. This can also be permitted to a specific set of addresses or in some cases protocol and also a different policy to each port. It is recommended that we use ICF (Internet Connection Firewall) when we are in need of a firewall which is capable of providing a network interface for very big networks. This is because the internet protocol for Security has a very strict and a very stern strategy which is based on static filtering based on IP addresses. But this is it is totally different in the case of the Internet Connection Firewall. The ICF has policies which has a set of filter for all the addresses which are capable of being accessed. The Internet Protocol for Security can be used when the restriction is only to a particular set of addresses or the communication between a group of computers. There are many ways to use IPSec in a network but the best way is bye using a directory with all the domains and also a GP when needed. Some areas of interest when implementing IPSecurity: The decision of where we must secure computers and how on our network which can be done by running a group of systems in a directory which is also called as the Active Directory Organisational Units or OUs. The next step is to determine the strength of the policies we assign. Determining Our Internet Protocol Security targets: The first step in deploying IPSec on our server or the network can be done properly by deciding which set of systems are in dire need of security. There are surely some places on the network which are in a need of higher security than the other sections. It is for sure that IPSec is capable of providing optimal security but the problems starts when the network slows down due to the excessive data to be processed and also a large number of systems for IPSec to follow and maintain. In some cases, there are systems which are not upgraded to be able to support the IPSecurity. Determining Your IPsec Needs In beginning of the protocol design procedure, proper planning should be done to make sure that our current network environment available for use. It is always helpful to have a set of the network topology with all of its hardware and software components. This procedure is of high importance mainly in the designing procedure. IPSecurity is highly vulnerable to a network topology. There are many network topologies in which IPSec is not well suited. Preparing a Internet Protocol Security Policy: As said earlier, there are many network topologies which are not suitable to the default structure of the IPSec policies. There is a need to develop a custom IPSec set of policies well suited for the current network. Some organisations can run their network with a small set of policies. But in companies with a very huge network, there are many policies which are to be implemented properly and also a stringent structure is to be maintained. Steps below shows how IP Sec policies work. Designing IPsec Policies There might be some cases where the company or the organisation is interested in implementing a policy which sets a secure communication between two specified computers. This can be done by restricting all traffic and adding exceptions which relates to these two systems. This method can be done vice versa. A network can be setup with policies to allow all requests and block specific ports or computers. To implement such exceptions, a thorough analysis of the network is clearly needed. Computer roles: Security for Data Transmission: Security needs are different from each and every data packet transmitted. The security policies are also very different. There are many levels in this instance. When considering encryption, there are many types such as AES, DE5, RSA and many more. RSA is the best encryption software available presently. These programs can be used to secure files on transmission, on a network or even in the system. Operating System Computers: IPSecurity is a very unique technique used to implement security in a network. There are many operating systems which are not so advanced to implement IPSec. There is no support for IPSec. But there are many operating systems which are capable of running IPSec in transport mode. Some other cases, the policies are stored locally which makes it easier to decide as the implementation doesnt take long enough. In some cases, IPSec policies are implemented through the Group Policy. General IPSec Policy Settings General IPSec policy settings must be specified whether we want the policy to provide packet filtering or end-to-end networks. IPSec Rules IPSec rules determine which traffic is affected by an IPSec policy and which actions take place when that type of traffic is encountered. Table6.5 describes the contents of IPSec rules that two computers use to establish a secure, authenticated channel. Specifies a named list of filters. Each filter in the filter list specifies the types of traffic to which the filter action is applied. Filters can be defined to match specific IP protocols, source and destination TCP and UDP ports, and source and destination IP addresses. The filter list name might include the version number, the last update time, and the administrative owner. Each computer discards the filter list name during policy processing. Filter action Specifies whether a packet is permitted, blocked, or secured. If packets are to be secured, specifies how they are secured. A list of security methods specifies the security protocol, cryptographic algorithm, and session key regeneration frequency. Request Security Authentication methods One or more authentication methods, which are specified in order of preference. Available options are KerberosV5, certificate, or preshared key. Specifies whether to use tunnel mode and, if so, the tunnels endpoint. Specifies whether the rule applies to LAN connections, remote access connections, or both. Assigning IPSec Policies: As a domain administrator, we can configure IPSec policies to meet the security requirements of a user, group, application, domain, site, or global enterprise from a domain controller. IPSec policy can also be implemented in a non-Windows2000-based domain environment by using local IPSec policies. Deploying Our IPSec Solution: After scoping our needs, building IPSec policies, and determining our strategy for assigning the policies to specific OUs, test the IPSec policies in a lab environment and conduct a pilot project before rolling them out for production use. To ensure that IPSec policy functions as expected and provides the appropriate level of security, test specific IPSec policy configurations on clients and servers in a lab environment, and then conduct pilot or beta tests in a limited operational environment before conducting a full-scale deployment. A Cryptographic Evaluation of IPsec: Even with all the serious critisisms that we have on IPsec, it is probably the best IP security protocol available at the moment. We have looked at other, functionally similar, protocols in the past (including PPTP [SM98, SM99]) in much the same manner as we have looked at IPsec. None of these protocols come anywhere near their target, but the others manage to miss the mark by a wider margin than IPsec. This difference is less significant from a security point of view; there are no points for getting security nearly right. From a marketing point of view, this is important. IPsec is the current best practice, no matter how badly that reects on our ability to create a good security standard. Our main criticism of IPsec is its complexity. IPsec contains too many options and too much exibility; there are often several ways of doing the same or similar things. This is a typical committee efiect. Committees are notorious for adding features, options, and additional exibility to satisfy various factions within the committee. As we all know, this additional complexity and bloat is seriously detrimental to a normal (functional) standard. However, it has a devastating efiect on a security standard. It is instructive to compare this to the approach taken by NIST for the development of AES [NIST97a, NIST97b]. Instead of a committee, NIST organized a contest. Several small groups each created their own proposal, and the process is limited to picking one of them. At the time of writing there has been one stage of elimination, and any one of the five remaining candidates will make a much better standard than any committee could ever have made. The Complexity Trap: Securitys worst enemy is complexity. Complexity of IPsec In our opinion, IPsec is too complex to be secure. The design obviously tries to support many difierent situations with difierent options. We feel very strongly that the resulting system is well beyond the level of complexity that can be analysed or properly implemented with current methodologies. Thus, no IPsec system will achieve the goal of providing a high level of security. IPsec has two modes of operation: transport mode and tunnel mode. There are two protocols: AH and ESP. AH provides authentication, ESP provides authentication, encryption, or both. This creates a lot of extra complexity: two machines that wish to authenticate a packet can use a total of four difierent modes: transport/AH, tunnel/AH, transport/ESP with NULL encryption, and tunnel/ESP with NULL encryption. The difierences between these options, both in functionality and performance, are minor. The documentation also makes it clear that under some circumstances it is envisioned to use two protocols: AH for the authentication and ESP for the encryption. Modes As far as we can determine, the functionality of tunnel mode is a superset of the functionality of transport mode. (From a network point of view, one can view tunnel mode as a special case of transport mode, but from a security point of view this is not the case.) The only advantage that we can see to transport mode is that it results in a somewhat smaller bandwidth overhead. However, the tunnel mode could be extended in a straightforward way with a specialized header-compression scheme that we will explain shortly. This would achieve virtually the same performance as transport mode without introducing an entirely new mode. We therefore recommend that transport mode be eliminated. Recommendation 1 Eliminate transport mode. Without any documented rationale, we do not know why IPsec has two modes. In our opinion it would require a very compelling argument to introduce a second major mode of operation. The extra cost of a second mode (in terms of added complexity and resulting loss of security) is huge, and it certainly should not be introduced without clearly documented reasons. Eliminating transport mode also eliminates the need to separate the machines on the network into the two categories of hosts and security gateways. The main distinction seems to be that security gateways may not use transport mode; without transport mode the distinction is no longer necessary. Protocols The functionality provided by the two protocols overlaps somewhat. AH provides authentication of the payload and the packet header, while ESP provides authentication and confidentiality of the payload. In transport mode, AH provides a stronger authentication than ESP can provide, as it also authenticates the IP header fields. One of the standard modes of operation would seem to be to use both AH and ESP in transport mode. In tunnel mode, ESP provides the same level of authentication (as the payload includes the original IP header), and AH is typically not combined with ESP [KA98c, section 4.5]. (Implementations are not required to support nested tunnels that would allow ESP and AH to both be used in tunnel mode.) One can question why the IP header fields are being authenticated at all. The authentication of the payload proves that it came from someone who knows the proper authentication key. That by itself should provide adequate information. The IP header fields are only used to get the data to the recipient, and should not afiect the interpretation of the packet. There might be a very good reason why the IP header fields need to be authenticated, but until somebody provides that reason the rationale remains unclear to us. The AH protocol [KA98a] authenticates the IP headers of the loour layers. This is a clear violation of the modularization of the protocol stack. It creates all kind of problems, as some header fields change in transit. As a result, the AH protocol needs to be aware of all data formats used at loour layers so that these mutable fields can be avoided. This is a very ugly construction, and one that will create more problems when future extensions to the IP protocol are made that create new fields that the AH protocol is not aware of. Also, as some header fields are not authenticated, the receiving application still cannot rely on the entire packet. To fully understand the authentication provided by AH, an application needs to take into account the same complex IP header parsing rules that AH uses. The complex definition of the functionality that AH provides can easily lead to security-relevant errors. The tunnel/ESP authentication avoids this problem, but uses more bandwidth. The extra bandwidth requirement can be reduced by a simple specialized compression scheme: for some suitably chosen set of IP header fields X, a single bit in the ESP header indicates whether the X fields in the inner IP header are identical to the corresponding fields in the outer header.2 The fields in question are then removed to reduce the payload size. This compression should be applied after computing the authentication but before any encryption. The authentication is thus still computed on the entire original packet. The receiver reconstitutes the original packet using the outer header fields, and verifies the authentication. A suitable choice of the set of header fields X allows tunnel/ESP to achieve virtually the same low message expansion as transport/AH. We conclude that eliminating transport mode allows the elimination of the AH protocol as well, without loss of functionality. We therefore recommend that the AH protocol be eliminated. IPSEC methodology using different operating systems: IPSEC is a framework for security that operates at the Network Layer by extending the IP packet header. This gives it the ability to encrypt any higher layer protocol, including TCP and UDP sessions, so it offers the greatest flexibility of all the existing TCP/IP cryptosystems. While conceptually simple, setting up IPSEC is much more complex that installing SSH, for example. IPSEC also has the disadvantage of requiring operating system support, since most O/S kernels dont allow direct manipulation of IP headers. Linux IPSEC support (the FreeS/WAN project), for example, isnt included in the standard kernel distribution for this reason, and has to be applied as an add-on. Furthermore, putting the cryptography in the kernel isolates it from the application, making it more difficult to code crypto-aware software. Using SSL, for example, simply requires linking a library into the application and allows the application to easily query what certificates have been used to authenticate a client. IPSEC defines a Security Association (SA) as its primitive means of protecting IP packets. An SA is defined by the packets destination IP address and a 32-bit Security Parameter Index (SPI), that functions somewhat like a TCP or UDP port number. SAs can operate in transport mode, where the IPSEC data field begins with upper level packet headers (usually TCP, UDP, or ICMP), or in tunnel mode, where the IPSEC data field begins with an entirely new IP packet header, ala RFC 2003. Furthermore, SAs can be encapsulated within SAs, forming SA bundles, allowing layered IPSEC protection. For example, one SA might protect all traffic through a gateway, while another SA would protect all traffic to a particular host. The packets finally routed across the network would be encapsulated in an SA bundle consisting of both SAs. A common use of IPSEC is the construction of a Virtual Private Network (VPN), where multiple segments of a private network are linked over a public network using encrypted tunnels. This allows applications on the private network to communicate securely without any local cryptographic support, since the VPN routers perform the encryption and decryption. IPSEC is well suited for this environment, more so than tunneling PPP over SSL or SSH, since it operates directly on the IP packets and preserves a one-to-one correspondence between packets inside and outside the network. In the case of tunneling PPP over an encrypted TCP connection, any packet loss in the public network would trigger a TCP retransmission, stalling the link until the packet was delivered. In particular, running Voice Over IP (VoIP) traffic through a TCP/PPP tunnel would largely defeat the RTP protocol used for VoIP; IPSEC is better suited in this case. IPsec Development for Linux: In the Linux IPv4 IPsec world, a lot of people use FreeS/WAN projects implementation. It consists of an inkernel IPsec processing part, Key Exchange daemon Pluto and some utility commands/scripts. To run Pluto with small changes on our IPsec kernel implementation and reduce impact for user who use FreeS/WAN implementation, we have decided to keep compatibility with FreeS/WANs IPsec programming interface between kernel and userland. For this, we use the same PF KEY interface which FreeS/WAN project extended. In kernel IPsec packet processing part, we developed AH, ESP, SAD and SPD from scratch. PF KEY interface PF KEY(v2), which is described in RFC2367, is key management API mainly for IPsec. PF KEY is used for handling the IPsec Security Association Database. Additionally we have to handle the IPsec Security Policy Database, but there is no standard for the IPsec Security Policy management API. In FreeS/WAN implementation, PF KEY interface is extended to manage the IPsec Security Policy Database. Our kernel 2.4 IPsec implementation also uses the same PF KEY interface as FreeS/WANs one. It is important to be able to run the FreeS/WANs userland application (e.g., Pluto) with small changes. Encryption and Authentication algorithm We provide HMAC-SHA1 and HMAC-MD5 for authentication, NULL, DES-CBC, 3DES-CBS and AES for encryption. We thought encryption and authentication algorithm is not only used by IPsec and there are many algorithms so that we consider encryption and authentication algorithm and those interface should have good modularity. We adopted cipher modules which provided by CryptoAPI Project. Security Association and Security Policy SA and SP themselves dont depend substantially on the IP version. FreeS/WAN project architecture depends on their special virtual network interface for IPsec because it might focus on IPv4 tunnel mode (Their implementation also provides IPv4 transport mode). Their SA, SP, SAD and SPD also depend on their special virtual network interface. We considered and decided it was not suit to IPv6 because the IPv6 stack needed the neighbor discovery and the auto address configuration in its basic specification. If we had implemented IPv6 IPsec stack with their architecture, we had to implement those basic specification in their special virtual network interface. Therefore we implemented our own SAD and SPD in order to handle both IPv4 and IPv6. To improve the system performance, Each database will be locked by smallest granularity. And in many cases we use the read lock. SA and SP are managed by the reference counter to prevent used SA from removing by accident. IPsec Packet Processing Output There are various packet output paths from the IP(v4/6) layer to the network driver layer in Linux kernel networking stack (TCP, UDP/ICMP, and NDP[10] for IPv6). The packets which may be applied IPsec will go through these paths. We had to add IPsec functionality for these output paths, e.g, in IPv6 ip6 xmit() for TCP, ip6 build xmit() for UDP/ICMP and ndisc send ns()/ndisc send rs() for neighbor discovery packets. Output process is as follows): check IPsec SP lookup the IPsec SA by the IPsec SP apply IPsec processing to the packet output the packet to the network driver layer To reduce SA searhing time, we link the SP and the found SA after lookup from the first time. Input At input, there is only path for IP packets. We added IPsec processing part in ip6 input finish. Input process is as follows: receive the packet lookup the IPsec SA by SPI(which resides in AH/ESP header) check integrity and decrypt check IPsec Policy. IPsec Tunnel mode We are using IPv6-over-IPv6(and IPv4-over-IPv4) virtual tunnel device to implement IPsec tunnel mode. This implementation can avoid to duplication code of encapsulation/ decapsulation outer IP header compairing with having these code in the IPsec processing part itself. The virtual tunnel device is not different from the normal IP-over-IP virtual tunnel device in Linux. 4 IPsec implementation for kernel 2.6 The most important difference between ours and them is SAD/SPD part. They thought the whole SPD/SAD mechanic should be flow cache based lookup system shared by IPv4 and IPv6. One month later, they introduced the new network architecture called XFRM to Linux kernel 2.5. At first their developing code lacked IPv6 IPsec only for IPv4 IPsec. In order to suport IPv6 IPsec, we have implemented IPv6 IPsec code based on XFRM (and discarded our original code). PF KEY interface The PF KEY interface of Linux kernel 2.6(and 2.5) is compatible with KAME[3] PF KEY interface. We can use setkey command for configuring SA and SP and Racoon for IKE. Additionally we can add IPsec Policy each socket via Netlink3. They have suported only IPv4 in their first code, we have added IPv6 support. Security Association and Security Policy On the XFRM architecture, IPsec SP, which is represented as xfrm policy structure, will be bound to the routing flow cache (and IPsec policy will point IPsec SA bundle) and IPsec SA, which is represented as xfrm state structure, is included in destination cache, dst entry structure. The chaining destination cache means IPsec SA bundle. IPsec Packet Processing Output The output part of the XFRM architecture is placed between the IP layer and the network driver layer. In general, non IPsec packet will be passed to the network driver layer by a single destination output function, which is resolved routing lookup. But IPsec packet will be need to apply some IPsec processing (e.g., encryption, hash). XFRM functions make a chain of destination output functions (We call Stackable Destination, as shown in Figure3). Each function match each IPsec processing (AH, ESP and IPcomp[11]). To be more specific, in order to pass a packet to the network driver layer we have to do as follows. lookup routing table to decide output function by ip6 route output lookup IPsec Security Policy lookup IPsec Security Association(s) suitable for IPsec Security Policy and create destination chain to apply IPsec, pass a packet to the destination chain Input The input part of the XFRM architecture is simpler than output. The XFRM input function is handled as same as upper layer protocols like TCP, UDP, etc. In IPv6, IPsec headers are defined as IPv6 extension header but IPsec input functions are handled as an upper layer protocol handler. As the result of introducing IPv6 IPsec input processing in Linux. kernel, inconsistencies existed between IPsec headers and other IPv6 extension headers. In order to resolve this, we moved to the other IPv6 extension header handler functions to upper layer protocol handler. In detail, we registered IPsec header (both AH and ESP) handler functions with upper layer protocol handler array inet6 protos. Incoming IPsec packet processing flow is as follows: process IP packet from IP header in sequence process IPsec part (check integrity and decrypt) if founded check IPsec Security Policy pass IP packet next handler IPsec Tunnel mode Linux kernel 2.6 IPsec tunnel mode doesnt use the virtual tunnel device to create tunnel. The IPsec stack builds the outer IP header during IPsec processing by itself. IPSec Best practices Best practices IPSEC in transport mode has some serious advantages over other solutions. Compared to other technologies, IPSEC is built into to the Linux kernel. In other words there is nodaemonrunning in the background. Better yet, IPSEC does not require port-forwarding; some people elect to useSSH, stunnel, and other technologies that rely onport forwarding. With IPSEC, you simply have to run a program and its configuration file. After running it,encryptionbetween hosts is mandatory. Connections will be refused if the other connection does not have the appropriate keys. Groups of computers can share the same key, and it can even be done on a per-port setting (for example securing VNC, etc). Downsides? IPSEC in transport mode does have a couple draw backs. In transport mode you cannot have any dynamic setups where the IP addresses change from time to time. In other words, IPSEC is usually insufficient for workstation environments or dynamically assigned networks. Also, if you want to do a per-port setup the configuration becomes harder. Security Implications A very astute user can use IPSEC to bypass firewalls and other security measures. Since IPSEC uses cryptography, information is passed between machines in encrypted format. If the keys are not known, there is no practical way to decrypt the information (it is virtual impossible due to the sheer amount of time it would take). Machine-to-Machine IPSEC installations should be considered as Virtual Private Networks (VPNs) for security considerations. Please check with yoursystem administrator, business policies, and laws and regulations of your locality in order to establish whether or not to institute IPSEC. Requirements ipsec-tools package static IP addresses for each machine Configuration file The configuration file, /etc/setkey.conf, contains the information about the IPSECpolicy. Below is a sampleconfiguration policy(i.e. dont implement this policy because it is insecure). These lines are the actual keys and the encryption that will be used. The first block has the keys that will be used for authentication. In this case, it is the hmac-md5algorithm. The second block contains the keys that will be used for privacy, and the method of encryption. In the example, AES-CBC will be used, which is probably stronger than should be required; the key that we will be using is 194bits, meaning that it is good enough for US Government Secret and below classifications. The final block includes the actual policy. This is where you can put port numbers and even define whether it will be TCP orUDP. Generating the keys The more random the key, the better. Obviously, the example above is insufficient to secure a network. The following command will generate a random key. While running this command, youll need to wiggle the mouse to make it run faster. Or, if you are using a terminal use/dev/urandom instead. dd if=/dev/random count=16 bs=1| xxd -ps Depending on the size of the key that you want, adjust the count (16 will produce a 128 bit key, 24 will produce a 196 bit key, and 32 will produce a 512 bit key) The size of the key is important. If you really paranoid or just haveCPUcycles to

Petrol Prices Have Seen A Shocking Hike Economics Essay

Petrol Prices Have Seen A Shocking Hike Economics Essay The petrol prices have seen a shocking hike of Rs.7.5 on the 23rd of May. The increase is the first since December, 2011. It went up to INR 78.16 per liter. The RBI was having a tough time coping with the rising inflation and this increase in petrol prices will make it very difficult for them to manage. The rise in price will also hit the common man who is trying very hard to make ends meet. The rate of inflation (annual), based on monthly WPI, stood at 7.23% for April (over April 2011) compared to 6.89% for the previous month The Petrol prices in the four major metros after the hike are as follows: Metro Before petrol hike After Petrol Hike Delhi 65.64 73.14 Mumbai 70.66 78.16 Kolkata 70.03 77.53 Chennai 69.55 77.05 The increase in fuel prices directly or indirectly affects all the major sectors of the country. It affects the transportation, textiles, auto, FMCG, manufacturing, agriculture sectors and so on.   The impact of the indirect effect is that the prices of daily basic commodities get affected and this increase in price of goods would gradually force people to spend more and save less. 58.4% of the Indian population belongs to the agricultural sector and their contribution to the total GDP is only about 18%. Such small amount of income being distributed over a large population have a huge impact on them as even a slightest fluctuation would make them poorer which will further the gap between the rich and the poor. The graph below shows the petrol price fluctuations over the past two decades. cid:[emailprotected] About 50% of the total Indian exports earnings is spent on buying petroleum, particularly, crude oil, this has a negative impact on the countrys overall economy. In the past five years, the amount of imports of the petroleum products is almost 40 per cent of the total exports of India in the last six years. For the year, 2011-12, it has been as high as 51.2 per cent. Such large quantities of imports will exert huge amount of pressure on Indias current account deficit. This increase in the crude oil imports is not just because of the increase in the price but also because of the increase in demand of fuel in the country. The amount of petroleum imports has increased from 82 million tons in 2002-03 to 164 million tons in 2010-11, thus increasing the import bills in terms of rupees by over 500 per cent between 2002-03 and 2010-11. These imports are one of the causes of the depleting foreign exchange reserves. In 2002-03, the percentage of petroleum imports with respect to the foreign exchange reserves were 23.18 and it went up to 34.80 per cent in 2010-11. This should be a major source of concern as a large chunk of the countrys foreign exchange earnings are spent on import of a single commodity. The  ownership of vehicles in India is growing at compound annual growth rate of 12%  for the two wheelers.71% of vehicles are two wheelers, and they run on petrol. Also the sale of two wheelers is around seven times more than the sales of car within the country. Two wheelers essentially provide mobility to the aspiring and the middle class. This gives us a fair idea about the huge amount of petro consumed by the people. India was the worlds fifth largest importer of oil. It imports more than 2.2 million bbl/d, i.e. around 70 percent of its consumption.  Its major imports come from the Middle East (34%), Saudi Arabia (18%) and Africa (22%). cid:[emailprotected] From the below table we can see that, the price of petrol has risen over the period of five years in different countries. Indias and the emerging economies like Russia and Chinas petrol price has grown over by 60% during the past 5 years while the developed economies have   only a max of 20% price growth over the past 5 years. Country and Currency 2007 2012 % increase India (INR) 48.38 78.57 62.4 USA (US$) 0.87 1.02 17.98 Russia (Ruble) 16.79 25.41 51.34 China (Yuan) 4.94 8.33 68.62 Japan (Yen) 136.7 149.4 9.29 Germany (Euro) 1.394 1.631 17 UK (Pound) 1.40197 1.68137 19.92 Both oil and petroleum products are scarce commodities. Therefore both demand and supply are less elastic. The demand-supply and other factors   like cartel, hoarding, supply shocks etc., the prices are   fluctuating (increasing) to such great levels causing demand pull, as well as cost push inflation. The inflated oil prices not only affect the poor people of the country but also rich people. But the impact is more significant on the poor people. Increase in the international oil price leads to a domestic inflation, which thereby decreases the foreign exchange reserves. The supply of the foreign currency reduces thus appreciating the value of the foreign currency and depreciating the local currency which in turn increases the prices of imports. It also deteriorates the balance of trade of the country. All these factors push a country into the poverty trap. International oil price hike affects both the public and the government. It brings in inflation and reduces the purchasing power of the people. It also affects the governments revenue and expenditure. Government being the biggest consumer, it has a negative effect on the real GDP, on the foreign exchange reserves; it increases the total foreign debt of the country and also further deteriorates the current account deficit of the country. With the increase in the fuel prices, the price of consumer products increases because oil is an essential component of the industrial and the manufacturing sectors, also petrol and diesel is used for the transportation of goods, thus creating an inflationary pressure. The government can take a few initiatives which can help in the long run. For e.g. there could be a fuel shift from petrol, diesel to Hybrid, CNG, non-motorized transport etc. Also we could undergo a modal shift i.e. from road freight transport to rail freight transport. The government can also make fuel more affordable by targeting more on subsidies and improving the already existing schemes. Also the vehicles fuel economy standards can be improved there by making it fuel efficient. People can take a few demand side management initiatives like car pooling etc.

Saturday, July 20, 2019

The Rime Of The Ancient Mariner - Original Writing :: Free Essays

The Rime Of The Ancient Mariner - Original Writing First, we set out from our homeland, Scotland. We sailed on southwards and were picked up by dreadful wind, we found ourselves being controlled by the wind and the sea. There was nothing we could do to stop it, it had driven us to the cold south, were mist, fog and treacherous seas all belong. Then from beneath the emerald green ice grabbed the sides of our ship, we were stationary, unable to move. It was quiet, then when we thought all was lost an albatross came and flew over our ship and it made the ice crack and we sailed north again so for many days we gave it food and played with the creature. Then one awful day when the sun was setting I got my crossbow and did shoot the albatross. The crew was so angry and cross with me that they cursed me saying how I dare to have shoot the albatross. From then on we lost our fortune and a great and terrible mist or fog came upon us but just few days later the mist was gone and the crew were telling me that it was a good thing to have killed the albatross. Then everything was getting bad we were running very low on water until just yesterday when it all was gone, oh the torture how there is water all around us but not a drop to drink. Soon our lips were baked black, our throats dry as a bone; surely we would all die soon. But then from out of nowhere a ship sailed towards us, but then I realised how could it be sailing when there was no wind? Then it came between us and the sun (which lay on the east side) then it struck us it was a GHOST SHIP! The sun was like it had been imprisoned. It neared and then I beheld two figures on the ship and these two figures were the only people on board. One was wearing a cloak and was like the most darkness I had

Friday, July 19, 2019

celilo falls :: essays research papers

Celilo Falls Celilo Falls named after the "Si-le-lah" tribe, was located about one hundred and two miles from Portland Oregon. Today Celilo falls no longer exists because the Dalles Dam was built March 10 1957; it was covered up by what is now Lake Celilo. Celilo Falls was a very important place for Native Americans nearby. Many tribes used the falls for fishing. Fishing platforms were built next to the water and men would spend much of their days catching salmon. Since the early 1800's, Native Americans fished the spring and fall salmon runs, the water's edge, and the shore of the Columbia River. Later, small cable cars built by fish buyers linked the shore to the islands. They used two types of dip nets: one was stationary, the other movable through the water. The dip nets attached to poles ranged from 15 to 25 feet in length. There were about 480 fishing stations around Celilo Falls. Fishers built wooden platforms out over the water catching salmon that weighed up to sixty pounds. The wood platforms were very wet and slippery so the men had to be really strong. The men tied themselves with ropes that they tied around their waists in the event that they fell in the river. During the Great Depression, whites began fishing at Celilo Falls. Indians protected their treaty-reserved stations and the white people had to leave. Soon Congress approved funding for The Dalles Dam, the dam would flood Celilo Falls and part of Celilo Village. The Celilo Fish Committee, The local fisherman protested the dam in formal resolutions and in testimony before Congress. But the dam was built anyway and they lost their place to fish. When the United States government drowned Celilo Falls, it compensated the tribes for flooding their fishing sites. But it didn’t, purchase their fishing rights. Those rights, as set forth in the 1855 treaties, were not affected when the government paid for tribal fishing sites, but the tribes' economy was destroyed. The Native Americans that lived in the area that was covered by Lake Celilo were relocated to reservations. When Celilo Falls was covered up, much more was lost than a historic spot.

eBay :: BTEC Business Marketing GCSE Coursework

eBay Founded in September 1995, eBay has become a powerful marketplace for the sale of goods and services by a passionate community of individuals and small businesses. eBay is an online auction house where anyone in the world can log and buy or sell goods through an auction. Today, the eBay community includes 18.9 million registered users, and is the number one most popular shopping site on the Internet when measured by total user minutes according to the Media Metrix September 2000 web report. eBay’s Mission eBay helps people trade practically anything on earth. eBay was founded with the belief that people are basically good. They believe that each of their customers, whether a buyer or a seller, is an individual who deserves to be treated with respect. eBay will continue to enhance the online trading experiences of all - collectors, hobbyists, dealers, small business, unique item seekers, bargain hunters, opportunistic sellers, and browsers. The growth of the eBay community comes from meeting and exceeding the expectations their customers. eBay’s Market In 2000, the eBay community transacted over $5 billion in annualized gross merchandise sales (value of goods traded on the eBay site). eBay is not just a place for collectibles, beanies and Pez dispensers. On any given day, there are millions of items listed on eBay across thousands of categories. People come to eBay to buy and sell everything from the practical, unique, and interesting - such as automobiles, jewelry, musical instruments, photographic equipment, computers, furniture, and sporting goods. With the recent acquisition of Half.com, eBay's community now benefits from a marketplace combining traditional auction style trading and fixed-price trading. eBay enables trade on a local, national and international basis. It features a variety of specialty sites, categories and services that aim to provide users with the necessary tools for efficient online trading. eBay International eBay is truly a global marketplace, where individuals worldwide are coming together to buy and sell from one another. It is not uncommon to hear about eBay users in Japan buying items from users in the U.S., or users in Australia buying from others in France. Users on eBay represent over 150 different countries. With eBay's vision and global business strategy, the company will continue to expand its service and brand abroad. Currently, eBay has country specific sites in the United Kingdom, Canada, France, Germany, Japan and Australia.

Thursday, July 18, 2019

Article Rebuttal Essay

For the past 17 months, shown on every television news channel across the United States. The case of George Zimmerman, and the shooting death of 17-year-old Trayvon Martin. Like every year, the media will take a case and publicly turn the story into a circus. The rebuttal article for this paper is a story written by Oliver Knox of Yahoo.com titled, â€Å"Obama: Trayvon Martin could have been me 35 years ago.† Further discussion will analyze the reliability, credibility, and validity of the data used by Oliver Knox, and identify any logical fallacies in the argument. The article is about President Barack Obama making his first public comments on the George Zimmerman acquittal. The president stated that many African Americans believe the outcome and aftermath of the trial would have been different if Trayvon Martin had been white. The president later stated that when he first heard about this story, his thoughts said this could have been his son (Obama, 2013). Then getting more personal by saying this could have been me 35 years ago (Obama, 2013). By using personal experiences, the president discussed his life as a young African American dealing with racism in the United States. I find that the reliability, credibility, and validity of this article and author Oliver Knox highly trusted, convincing, and believable. News articles written and posted by Yahoo.com reports a straightforward message to their audience. Reporting stories down the middle, never too left or right with the occasional bias author either for or against a particular topic. Keeping political views down to a minimal. This particular article matches other similar articles written on the same news story. Second, Oliver Knox wrote the story on the statements and words of the president as he addresses the American public. Third, the genuine author of this story is President Barack Obama himself, Oliver Knox just wrote his statement. The audience that the president focused on in his address is the African American people. Using his own personal experiences, the president can relate to the ongoing outrage of the African American  public. President Obama feels the pain and disappointments of the outcome of the case. Because of this story first came out 17 months ago, many logical fallacies surfaced about this case. First, the media leaned toward a killing of an innocent young 17-year-old boy, minding his own business. Then showing a photo of this boy at the age of 12. Then here comes George Zimmerman, looking for trouble and looking for a fight by picking on a young African American boy. Would the story stay the same if George Zimmerman was African American with the same outcome, the public will never know what happened that night. Meanwhile, the story set the tone for future stories about this case. Raising the question about race possess anything to do with the incident between George Zimmerman and Trayvon Martin. The logical fallacies of this article happened when President Obama expressed his concerns and personal experiences with the American people. This incident could easily be him 35 years ago as a young person dealing with racism in America. Concern that African Americans think that this case developed on race. A belief in the legal system would have a different outcome if Trayvon were white. Even after juror number B37 came out stating that race had no issue to the outcome of the case. Both the jury and legal experts stated that Zimmerman and Trayvon made poor judgment the night, which led to the death of Trayvon. Statements by the jury referring the only reason for Zimmerman’s acquittal because the way the â€Å"stand your ground† law is written. This article also provided some good highlighted points. The president encouraged his audience to support and encourage the young people of this country by helping them achieve and succeed in life. To be more influential and guide them on the right track. If the young people do not have the support from family, friends, neighbors, and the community, who will help them stay on the righteous path (Obama, 2013). This news article written by Oliver Knox and other journalists in this country, reporting the feelings and concerns addressed by this nation’s leader. Stating the issue of racism still lives in the lives of some American people. Relating to his own personal feelings on racism and demanding change to overcome these barriers. So the people, as a nation will never see another George Zimmerman and Trayvon Martin case again. References Knox, O. (2013). Obama: Trayvon Martin ‘could have been me 35 years ago’. Yahoo New.com. Retrieved from http://news.yahoo.com/-obama–trayvon-martin-%E2%80%98could-have-been-me-35-years-ago%E2%80%99–180734663.html Millstone, K. (2013). Obama: Trayvon Martin ‘could have been me’. MSN News. Retrieved from http://news.msn.com/us/obama-trayvon-martin-could-have-been-me