Sunday, December 29, 2019

The Conflict Of The Congo - 1460 Words

In the year 1876, King Leopold II of Belgium began to display an interest in the civilization mission in Africa. The documents on European Imperialism provide evidence for how the individuals in the Congo are being exploited for European benefit, under the profit-making aim of King Leopold II. European brutality in the Congo was the logical result of the European desire to implement ‘proper’ civilization in the Congo, albeit through a lack of cultural understanding and compassion towards the people of Congo. First, the document â€Å"Selections from the 1885 Berlin Act (Treaty)† was an outline to the European people that King Leopold II had good intentions for his mission in the Congo. However, it depicted the contradiction of what his true intentions were and what had actually occurred. King Leopold outlined six Declarations for what he desired to change for the Congo. Leopold stated, for instance, his desire to create a change in the freedom of trade for th e people of the Congo, as well the creation of â€Å"a Declaration relative to the slave trade, and the operations by sea or land which furnish slaves to that trade.† These Declarations relate to the thesis of how the Europeans were directed in a way to think it was logical to create a change in the significant issues in the Congo. The Europeans were lead to believe these six Declarations would benefit the civilization of the Congo, by doing no harm. In actual fact. Leopold fails to point out how he intends to followShow MoreRelatedThe Conflict Of The Democratic Republic Of Congo1410 Words   |  6 PagesWomen’s Position in Chaos: The Violence in Congo Problem Statement The Democratic Republic of Congo (DRC) has continuously experienced increasingly brutal cases of violence against the female gender (Peterman, Palemo, Bredenkamp, 2011). As Peterman et al. (2011) continue to state, this gender based violence against women in the Congo is mainly characterized by widespread sexual violence, Female Genital Mutilation (FGM), gang rape, and the abduction of women for sexual slavery purposes among severalRead MoreEssay on The Conflict of the Republic of the Congo1655 Words   |  7 PagesThe conflict in the Republic of Congo can generally be attributed to a lack of democracy. The lack of democracy has developed an unfair supply of resources and corruption amongst government officials. Corruption in government slows the economic growth for all societies. The government is weak, and the judicial system is vulnerable against large political interference. Political conflict and the damage of social and economic structure have destroyed the economy. Corrupti on among government officialsRead MoreEssay on Conflict, Disarray, and War in Democratic Republic of Congo913 Words   |  4 Pagesviolent mass conflict between two or more armed forces or actors in warfare. The Democratic Republic of Congo (DRC), previously known as Zaire gained independence from Belgium in 1960 and immediately descended into a state of conflict and disarray. It is a vast country, covering territory about the size of Western Europe and include a wide variety of geographic regions. However, the war is ravaging the land in one of the most complex African conflicts. The Democratic Republic of Congo is currentlyRead More Preventing the export of conflict diamonds in the Democratic Republic of the Congo4642 Words   |  19 PagesPreventing the export of conflict diamonds in the Democratic Republic of the Congo The Democratic Republic of Congo (DRC) has large reserves of cobalt, gold, gems, copper, timber, and uranium. However, the most valuable resource that the DRC possess is its large reserve of diamonds. Diamonds essentially serve as a pillar to the DRC’s struggling economy. Plagued by civil unrest, the DRC is desperately trying to stabilize its economy. Their efforts have been met with stiff resistance due toRead MoreThe Democratic Republic Of Congo1340 Words   |  6 Pagesthe Democratic Republic of Congo (DRC), the diamond mining industry is being exploited by rebels who are using the diamonds as ‘conflict diamonds’. These diamonds are being used to illegally buy arms used towards the civil war and other conflict in the DRC. Since the rebels have control of the diamond industry with conflict diamonds, they affect the DRC’s economy and the livelihood of the people who have no choice to work for the rebels. Because of the constant conflict since independ ence of the DRCRead MoreEssay about Democratic Republic of Congo Holocaust922 Words   |  4 Pages The Democratic Republic of Congo (DRC) Holocaust was the bloodiest war fought. This was due to the death toll, possibly larger than that of the Holocaust. Between 1998 and 2007, there were a total of 5.4 million people dead. The number of those deaths has definitely gone up over the years (Heaton 1). Genocide is very vital because of the people being slaughtered and giving their lives away in order to support their political stance. Everyone, whether it is through war or poverty, suffers from thisRead MoreTantalum: A Valuable Ore Essay1010 Words   |  5 Pagesin economic importance (Bleischwitz et al. 2012: 21). Thus, social, political and environmental issues and considerations should be addressed seriously and not be overlooked. Coltan Mining in the DRC Coltan mining in the Democratic Republic of Congo (DRC) is generally done through artisanal and small-scale mining because of its specific geological conditions making its deposits too small and thus, not suitable for larger scale industrial mining (Bleischwitz et al. 2012: 21). The country is veryRead MoreThe Conflict Between The Rwandan And Tutsi Ethnic Conflict1193 Words   |  5 Pagesinto much conflict since the 1990s. As the Germans and the Belgians colonized Rwanda, the favoritism of the colonizers created great ethnic divides within the country. These partitions ultimately became so profound that a violent genocide took place, turning countrymen against each other. The Congo was a nearby place for the violence between the Hutu and Tutsi to continue, while also becoming an important economic factor to the wealth of other nations. The colonization, genocide, and conflicts in theRead More Civil War in Congo Essay1690 Words   |  7 Pagesnbsp;nbsp;nbsp;nbsp;nbsp;The recent Ci vil War in Congo has been a bloody flight, causing more then 3.3 million deaths in just 4 short years.1 Various rebel and ethnic groups have have been involved in the violence, fighting over Congos rich natural resources or engaged in a bitter ethnic war. With so many opposing factions, it has made reaching a solution difficult. While a rough peace treaty has been established, sporadic fighting pops up in the country everyday. The people of Congo are being pushed farther intoRead MoreInternational Law On Sexual Violence1573 Words   |  7 PagesInternational Law on Sexual Violence in Congo Roody Mossimi Dr. Bruce Stanley Politics of International Law INR 6210 15th December 2015 Richmond the American international University in London This essay will discuss about the problems within international law which revolves around sexual violence and using the Democratic Republic of Congo as a case study. In addition, the essay will explain about who is accountable, how to obtain witnesses and provide recommendations

Saturday, December 21, 2019

Forms of Industrial Organziation - 1432 Words

Forms of Industrial Organization Economists group industries into four distinct market structures: monopoly, oligopoly, monopolistic competition, and competitive market. These four market models differ in several respects: the number of firms in the industry, whether those firms produce a standardized product or try to differentiate their products from those of other firms, and how easy or how difficult it is for firms to enter the industry (McConnell Brue, 2004). This paper further defines each market structure and provides an example of a company representing each market structure. Monopoly A monopoly exists when a specific individual or an enterprise has sufficient control over a particular product or service to†¦show more content†¦Either entry to or exit from monopolistically competitive industries is quite easy† (McConnell Brue, 2004, p. 413). Nike running shoes are an example of monopolistic competition where Nike states that their Dynamic Ride adapts to every stride for customized support and excellent cushioning of a runner’s foot (Nike, Inc., 2010). Nike is clearly distinguishing its running shoe designs from those of competitors. According to the Campaign for Labor Rights, the cost to manufacture a pair of Nike shoes is about $3.50 while retailing for over $100 (Glenn, 2004). Nike’s competitors such as Adidas, Mizuno, and Saucony also retail many running shoe models for over $100. Nike employs competition-based pricing as their shoes are priced within 10% of competitor’s. Competitive Market A competitive market is essential to preserve constancy and profit in business where there are like businesses. By having a competitive market it permits businesses to modify items and prices dependent on the needs of the consumers, competition and profit and sales of a business. Examples of competitive businesses are the fuel, vehicle, food chains, technology and office supply chains and cable. Walmart is an example of a competitive market because of the huge number ofShow MoreRelatedThe Social Justice Issue Of Globalization839 Words   |  4 Pagesroles of globalization. This has in turn created a more competitive economic climate. Extensive form of globalisation comes from export trade, which results from advantage based on natural resources and low-wage labor. This control and injustice of poverty should not be accepted. As we enter the Digital age, some two billion people still do not have access to electricity, the basic technology of the industrial age. This inequality of electricity, a basic need for some, not even a choice for those inRead MoreManagement History2328 Words   |  10 PagesManagement History Modern managers use many of the practices, principles, and techniques developed from earlier concepts and experiences. The Industrial Revolution brought about the emergence of large-scale business and its need for professional managers. Early military and church organizations provided the leadership models. In 1975, Raymond E. Miles wrote Theories of Management: Implications for Organizational Behavior and Development published by McGraw Hill Text. In it, he popularized a

Friday, December 13, 2019

Selection, Hardware and Software Requirements of a PLC Free Essays

Understand the selection, hardware and software requirements of a PLC There are 3 types of PLC, unitary, modular and rack-mounted. A unitary PLC Is a stand alone unity, it has no room for expansion and works on Its own. They are useful for automating activities such as stress testing. We will write a custom essay sample on Selection, Hardware and Software Requirements of a PLC or any similar topic only for you Order Now For example the stress testing of a hoist, Instead of paying someone to manually control the hoists up and down movement leaving time In between each motion a PLC could be used Instead. It could be set up to perform a number of cycles of movement of the holst by the use of Ilmlt switches t the top and bottom of Its movement to detect when to change direction. The time to walt between movements can be set so that the motor doesn’t get strained. Other safety features could be added, for example, a set of sensors could be installed around the hoist to stop it’s movement if some one comes too close to it. It would also be easier to set the parameters of the test and change them easily for testing a different hoist or piece of equipment. It would have to keep its functionality to a small scale as it can’t be upgraded at all. A large variety of inputs and outputs could be sed as most PLCs support analogue and digital. This would mean you could have temperature sensors in use on the analogue and through-beam sensors on digital. It is likely that this type of PLC would be mounted somewhere near the object it is controlling, most likely to a nearby wall. A modular PLC allows for other modules to be connected to it increasing its functionality such as position sensing, stepper and servo motion control and packaging and press controls. Where it may have only had the ability to handle a certain amount of functions adding more increases this. The two or more connect ogether and act as if they still Just one. This would be useful for a company that uses a greater amount automation than the above company, perhaps for a conveyor belt system that is wanted to be upgraded in the future and with modularity more modules could be added to allow for the extension of the conveyor belt and the new Inputs and outputs that are required. For example a bottling company may only just fill bottles but not label them, they could extend the conveyor to allow for them to print and attach labels to the bottles as well which would require a lot more sensors o detect the location of the bottle and outputs for controlling the labelling machine. Individual parts of the PLC can also be swapped out such as the power supplies and CPU, Central Processing unit, handles the programming and Interpreted the Inputs/ outputs. A rack-mounted PLC is very similar to a modular PLC with the ablllty to upgrade and change different parts of it but they are on standard cards that slot into standard more can be fit into a cabinet due to their design to fit closely with similar units. They are most likely to be used on large assembly lines with a wide range of equipment in use simultaneously. They can be upgraded to allow the line to run better with more memory and faster CPU to better work with the large amount of things happening. The racks with the PLCs in are likely to be kept either in the factory control room or their own individual room specifically for them. Cost is the most important aspect to selecting the right PLC and the lowest cost PLC is the unitary because it is as it is. It can’t be modified in anyway they can get expensive though as the specifications increase. Next up is the modular PLC which can be quite large to allow it to be upgraded with more memory, faster CPU and greater power upply. The most expensive are the rack mounted PLCs. They are much smaller than the modular PLCs but still retain the ability to be upgraded allowing you to have more powerful PLCs in smaller space. A robotic arm inside a cell would need to perform the same task continuously and because of this a PLC could be used. Using a series of limit switches to control when the arm moves there wouldn’t be a problem because it would be able to stop before hitting any obstructions that may be in the way. For example a series of optical sensors would be able to detect when the item to be manufactured as entered the ell and is in the correct position for the arm which would allow the arm to pick it up and perform what it had been programmed to do. Be it to spray paint on it or to add something onto it, because those motions do not need to be dynamic a single program would be enough to manage it. The software requirements could be quite large depending on the complexity of the task and the robotic arm If there are a lot of joints on the arm that are controlled by motors then the program will need to control each one independently and add to the fact the movements required then it is quite complex set of instructions the arm requires because of this it will need a large amount of memory and a fast CPU to execute the commands quickly as it is likely that the manufacturing cell is required to get through a lot of items a day. This would most likely rule out the use of a unitary PLC because the cost would be too great for one with the required specifications. It is also likely that a large amount of robotic arms would be in use so a rack mounted system would be more space efficient, they do cost more than modular PLCs but keeping all the PLCs in cabinets near each other n a neat and organised manner can make it easier for any maintenance required on them. They would need to be near enough to a computer to program them and update software when necessary. The computer could be in a completely different room as a ethernet cable is used to load the new software into them but having one nearby would make it easier for any quick alterations to the software needed in the likely that the operator would use a proprietary piece of software to program the PLC with, if they were from Siemens they would be programmed in Ladder Logic. A PLC would be very useful for this type of activity because it is repetitive, the same item would be having the same thing done to it. A PLC controlled arm doesn’t need breaks, if set up properly, so it could take the place of a human and thus save money. A problem though is that the item that comes into the cell could have a defect on it that wouldn’t be noticed by the sensors in use so whatever the arm does may be done to something that needs to be scrapped. That is something a human worker would have noticed and would have thus saved money by not doing anything to it. The main benefit of having a PLC control it is that the Job is done autonomously and would be more cost effective than employing a human to do it but you lose out on the fact the human can see what they are doing and ensure that the item entering the cell is correct and make sure he does his Job completely before sending it out, if it was spraying they would be able to check the coat is even and well done by eye where you would not get that from a PLC. Stricter control further down the line would eliminate this though. Immediate costs would be expensive with a PLC solution, the obotic arms that are going to be controlled need to be bought, the PLCs need to be bought, mounted and wired, someone needs to write the software for them and then maintain their operation. That position would likely be a higher paid position than someone working on the assembly line. Those that do work on the assembly line do not have as high start up costs but the costs are continuous plus allowance for tools and equipment needed such as PPE. Which leads on to the potential cost each has. If a robotic arm breaks it could potentially lead to the whole line being stopped while it s repaired, both of which will cost time and money. If a worker was to not be wearing the required PPE or Just sustain an injury it could mean that the line has to stop although he would be quickly replaced to keep the line running. There is also a possibility that the person that was injured might file claims against the company that could lead to a large loss of money. The expansion of what the PLC controlled could be very costly as it would require new equipment and wiring which could mean that parts of production need to be shut down for it to be laid. How to cite Selection, Hardware and Software Requirements of a PLC, Papers

Thursday, December 5, 2019

Critically evaluate Erikson’s psychosocial stage theory of human development with particular reference to identity development during adolescence free essay sample

Erikson is a neo-Freudian, who chose not to criticise but to develop Freud’s ideas. Erikson extended many aspects of Freud’s ‘psychosexual stage theory’ within his ‘psychosocial stage theory’ (1975; 1968; 1963). Erikson suggested the ego as the driving force in personality development, unlike Freud who suggested this to be the id. There were originally eight universal stages of development in the psychosocial stage theory which span across an individual’s entire life; these eight stages later had a ninth stage added. Each stage in the psychosocial stage theory is marked with a crisis. Individuals must learn to balance both the positive and negative poles of the crises by understanding each as useful; thus allowing positive outcomes to suffice. These outcomes are often referred to as ‘virtues’. Although the ninth stage of Erikson’s theory sees all previous conflicts merge. The ninth stage also sees a reversal of crises, as the negative pole now takes dominance over the positive. Erikson’s psychosocial stages are an elaboration upon the three stages Freud proposed, which cease post-adolescence. According to Erikson failure to pass through any stage successfully in the psychosocial stage theory does not stop individuals entering into further stages. Overcoming these past failings can be achieved in future crisis resolution, according to Erikson. This is also a development upon Freud’s psychosexual stage theory, as Freud believed that failing to overcome a crisis resulted in an individual becoming fixated with the stage for the rest of their life. The stage of Erikson’s psychosocial stage theory which has received most theoretical and experimental interest is the fifth stage, ‘adolescence’; thus I will use this stage to provide a brief illustration of the acquisition of a virtue. This stage sees individuals coming from adolescence in to ‘young adulthood’ which is the sixth stage. The sixth stage has the conflict of ‘intimacy’ Vs ‘isolation’; with the possibility of achieving the virtue ‘love’; the sixth stage is worth noting here because it has important implications in Erikson’s beliefs about the formulation of identity. Marcia (1980) has hailed achievement status in the fifth stage as a hallmark for maturity in individuals. The virtue of ‘fidelity’ is the achievement in the fifth stage. This is achieved by balancing the positive pole ‘identity’ and the negative pole ‘identity confusion’; which Berzonsky, (1997); LaVoie, (1994) have shown to be viable constructs. Attempts to achieve closure of this crisis is attempted by individuals via serious experimentation, this is referred to by Erikson as ‘identity achievement’. However, closure can also be achieved by individuals without the need for experimentation, this is thought to occur a result of their caregivers smothering the; not allowing sufficient exploration, thus resulting in the individual achieving closure by simply accepting the identity offered to him/ her by their caregivers, Erikson termed this ‘foreclosure’. However, not all individuals achieve closure at this stage; in this instance an individual may be referred to as diffuse, or in a stage of moratorium (this is a state which refers to a temporary phase of development on the way to achieving identity). If a balanced resolution (good balance of the crisis poles) is achieved at this stage in the theory an individual is confident that the sameness and continuity they have gathered in the achievement of virtues in the four previous stages are all recognised by others. This results in the individual having fidelity to their future roles (i. e. careers, family). On the other hand, poor resolution (too much of either the positive or the negative crisis poles) achieved at this stage is considered to be maladaptive for an individual; fidelity to future roles will become either too strong or not strong enough. Cote (1996) has disputed Erikson’s and Marcia’s claims that the sameness and continuity in the adolescent stage is the distinguishing feature of a mature individual. Cote argued that a diffuse identity or even foreclosure status maybe more appropriate in certain socio-cultural contexts. A diffuse identity or a foreclosure status may even be seen as an adaptive mechanism for individuals living within a culture which is undergoing vast change and uncertainty. This therefore suggests that Erikson’s theory of balanced crisis within this stage may be culturally dependant and thus may not always be the best outcome for all individuals. Lifton (1993) has argued that the portrayed continuity and sameness of identity is founded in traditional cultures, which holds relationships with institutions and symbols (i. e. religion) as very important. These ties with institutions and symbols, according to Lifton, have not been apparent for the majority of the late twentieth century. There has been little research which has examined Erikson’s psychosocial stage theory as a whole. One study which has has also provided significant findings relating to the theory (Ochse Plug, 1986). It is worth noting that the eighth stage which holds the possibility of achievement of the virtue ‘integrity’ was omitted from the results of this study due to the lack of elderly participants in the research. Ochse Plug, conducted factor analysis research on their findings, the results of which showed identity to be an over riding factor throughout all of the stages. This suggests that there are multiple stages concerned with a possible identity crisis (in some form or another). This would be expected by Erikson’s theory as it explains that the driving force in personality development is the ego, thus identity is considered to be developing at each stage of the theory along with the ego’s acquisition of virtues. There are further findings from Ochse Plug’s study which support Erikson’s ideas of personality development; although, these findings can also been interpreted as highlighting possible flaws of the theory. An example of this can be identified as the findings show that past crisis poles are strongly interrelated, which would be expected by the theory as it predicts that each stage builds upon the achievements of previous stages. However, the crises poles which have not yet been approached by an individual have also been shown to be strongly interrelated with the other crises poles. This appears to indicate that contrary to Erikson’s theory all of the crises poles appear to be running in parallel even when they have not been passed or even approached by individuals. Further flaws in Erikson’s theory are identified as these strong inter-correlations between crisis poles were only found to be true for white European participants, and not black South African participants (Ochse Plug, 1986). This appears to demonstrate that the accumulation of past virtues having an influence on future crises’ is dependent on ethnicity. Ochse Plug also found that male participants showed a stronger autonomy, industry and initiative compared to female participants, which suggests that the theory is affected by gender roles. As Erikson proposes a universal theory of psychosocial development, these results suggest that the universality of the theory is hampered by both ethnicity, and gender. Erikson’s psychosocial theory’s problem with gender roles highlighted by Ochse Plug’s findings has been criticised, perhaps more critically, but definitely more extensively by feminists, who believe that the theory does not adequately account for the female processes of identity development (Gilligan, 1982). Hodgson Fischer, (1979) have also criticised Erikson for showing a lack of attention to sex differences in his formulation of the development of identity in his theory. Douvan Adelson (1966) have shown that identity development differs substantially between males and females. This study has shown how females develop their identity via interpersonal relationships; whereas it has shown how men develop their identities via preoccupations with solitary tasks. It has been shown that both of the masculine processes (agency) and the feminine processes (communion) are both very important in the development of human experience (Bakan, 1966). Thus in light of this evidence Erikson has received much criticism for neglecting ‘half’ of the human experience of development. Erikson has been seen to have neglected the relational processes of identity formulation (which is considered the feminine route to identity, Douvan Adelson) due to his emphasis on agentic issues such as separateness, (which is considered the masculine route to identity formulation, Douvan Adelson). Morgan Farber, (1982) have illustrated how Erikson’s theory describes how men attain their identity and later develop intimacy; and how women first need to develop intimacy to form their identity. Morgan Farber suggest that according to Erikson women rely on men to be able to form their identity; as without a man there can be no resolution at the intimacy stage because the women’s ‘inner-space’ remains unfulfilled and therefore leaves women with no subsequent identity formation. If, as these feminists believe, this is true, the conclusion that women do not develop their identities in the same order as men can be drawn. This has lead to a consensus in beliefs amongst feminists that the stages of identity and intimacy are encountered by women in either a reverse order to that of the order men encounter them, or are at least fused together and encountered by women as a single stage. Thus Gilligan (1982), to account for these sex differences in the order the stages are encountered, has called for a re-examination of Erikson’s epigenetic chart. These feminist attacks on Erikson’s theory can be classified into two major criticisms. Firstly, that his work is inherently sexist; and secondly, the sequence of stages on the epigenetic chart is inaccurate for describing the development of women’s identity, which has resulted in Gilligan calling for a reordering of the epigenetic chart. The first major criticism of Erikson’s work has been suggested on two fronts, firstly it is suggested that social systems (such as motherhood, and marriage) have been interpreted by Erikson as a means to debilitate women’s development of their own identities. However this criticism has been shown to be weak; as it has been highlighted that selective quotations have been taken out of context and misinterpreted during the formulation of these arguments, (Horst, 1995, p272-4). Secondly, it is suggested that anatomical differences between men and women have been a reason for women being unable to adequately develop their identity, free of male intervention and without social constraints. The latter critique has been shown to be more credible than the first. As, although Erikson does explain how women can occupy male roles in society; their anatomical differences still limit their freedom to act against their sex roles imposed by society, as well as biology. However it should be remembered when noting this criticism, that there is an ambiguous cut off point to be considered when deciding where anatomical differences should be emphasised and/ or ignored; it has been shown that underemphasising sex roles can be just as dangerous as overemphasising them (Hare-Mustin Marecek, 1990). The second critique, which has called for a re-examination of Erikson’s epigenetic chart; is considered to be lacking in sufficient evidence to consider alterations to the chart (Horst, 1995). It has been noted by Horst that amongst this barrage of criticisms, there are major misconceptions regarding the process of personality development, as described in Erikson’s theory amongst the critics who have this unrequited hope for a re-examination of the epigenetic chart. It appears apparent that the critics understand each stage of development as an acquisition by the ego of a personality quality, with the elimination of its opposite; however, this is not a correct conceptualisation of Erikson’s theory of psychosocial development. Erikson’s actual emphasis is focused on the importance of balance within each crisis, between both the positive and negative poles; with too much off either, the positive or the negative poles being maladaptive for development. Erikson also emphasises the importance of inter-correlations between previous crises on future crises. Thus Erikson does not depict that identity develops in the absence of intimacy, or vice versa, (as is the argument put forth by the feminists). Erikson on the other hand however describes how intimacy is also present in the process of identity development, and vice versa. Erikson explains that intimacy is developing and is identifiable simultaneously with identity development because individuals have to develop (amongst many other identity aspects), a sexual identity which is highly related to intimacy development. Therefore critics appear to miss interpret the key concept of balance in Erikson’s stages, as well as the fact the poles of each stage are interrelated to one another (Ochse Plug, 1986). It appears that Erikson’s theory, when understood with all of its complexity can explain female development to a more acceptable level than the feminist critiques wish to acknowledge or perhaps wish to accept. Another feminist who is concerned with the explanation of female identity development in Erikson’s theory has not jumped on the bandwagon by criticising Erikson’s theory, but has offered a new perspective to the problems listed by her fellow feminists so far. Josselson (1987), who, like other feminists believed that women’s identity is based upon connections and relationships; is critical of other feminists who (according to Josseson) have overlooked women’s identity development, through their persuit of unnecessary research tangents. She explains the need not to ask the question regarding females’ identity development of ‘whether’ females develop identities, as she urges feminists to ponder ‘how’ women form their identities. Josselson, conducted a longitudinal study concerned with women’s development, she used Marcia’s (1966) identity statuses to categorise the participants, although she did not (like previous researchers) simply attempt to fit women into the already existing (more masculine) categories; she instead redefined the categories to integrate women into them. The research shows two major findings, each relating to descriptions, which could help remove some of the misinterpretations of masculine and feminine routes to identity development. The first being that individuation does not need to only be described as separation, but can also be described in terms of â€Å"becoming different and maintaining connection at the same time† (Josselson, 1987, p171. ) The second being that the female’s journey status should not be defined as crisis between occupational goals alone, it should instead describe a crisis around, either occupational goals or relationship issues, this would therefore give them more choice and thus control in relation to their identity development. From her findings Josselson concluded that Erikson’s epigenetic chart need not be altered to integrate women into the theory, because a couple of terms may just need to be better defined and made slightly broader in scope to allow more feminine issues to be incorporated into them. The evidence provided has identified flaws of Erikson’s psychosocial developmental stages; with certain flaws being shown to be more viable than others. Both gender and ethical limitations have meant that the theory does not appear to be applicable as a universal theory. Further investigation of gender differences has lead to the theory being criticised by numerous researchers, in relation to its conceptualisation of how male and female identity is developed. Numerous researchers suggest that the theory holds a gender bias in its focus of agentic issues surrounding development; although findings from Josselson has suggested otherwise. Hamachek (1990) has also argued that of the many personality theories, Erikson’s psychosocial stages hold the most emphasis on the resolution of ‘female’ problems such as interpersonal issues of intimacy and feelings of isolation. As this argument would assume, evidence has suggested that Erikson’s epigenetic chart adequately accounts for both male and female development. Although there have also been criticisms of Erikson’s theory regarding the use of sexist overtones in both a social and anatomical way, the social issues appear to be overly limited themselves, thus holding no threat to Erikson’s theory. However, the anatomical differences have been shown to be a relatively stronger limitation of Erikson’s theory. Erikson’s revolutionary conceptualisation of personality development as a life long process has yet not lead to any advances in treatments, however it has been influential in the development of other theories concerned with personality, especially theories concerned with the ‘mid life crisis’, Levinson, (1978). There are still major concerns over the way in which the theory accounts for the clear differences in how males and females develop their identities, however there now appears to be feminists who are conforming to agreement that the theory can account for feminine issue of development, although these are still addressed to a lesser extent to that of male identity development. Clarification of the issues raised will require further examination of development in both males and females to allow for full drawn conclusions to be made regarding the theory’s gender differences relating to identity develpment. Reference List

Sunday, November 24, 2019

An Overview of the Top Awards and Honors for Economists

An Overview of the Top Awards and Honors for Economists Not surprisingly, the most prestigious award that a living economist can get is the Nobel Prize in Economics, awarded by the Royal Swedish Academy of Sciences. The Nobel Prize is, in a lot of ways, a lifetime achievement award, despite the fact that its often awarded to economists well before they retire. Since 2001, the prize itself has been 10 million Swedish kronor, which is equivalent to between $1 million and $2 million, depending on the exchange rate. The Nobel Prize can be split among multiple individuals, and prizes in economics have been shared by up to three people in a given year. (When a prize is shared, it is generally the case that the winners fields of study share a common theme.) Winners of the Nobel Prize are called Nobel Laureates, since in ancient Greece laurel wreaths were used as a sign of victory and honor. Technically speaking, the Nobel Prize in Economics is not a true Nobel Prize. The Nobel Prizes were established in 1895 by Alfred Nobel (upon his death) in the categories of physics, chemistry, literature, medicine and peace. The economics prize is actually named the Sveriges Riksbank Prize in Economic Sciences in Memory of Alfred Nobel and was established and endowed by Sveriges Riksbank, Swedens central bank, in 1968 on the banks 300th anniversary. This distinction is mostly irrelevant from a practical perspective, since the prize amounts and the nomination and selection processes are the same for the Economics prize as for the original Nobel Prizes. The first Nobel Prize in Economics was awarded in 1969 to the Dutch and Norwegian economists Jan Tinbergen and Ragnar Frisch. Many economists have been awarded since then. Only one woman, Elinor Ostrom in 2009, has won a Nobel Prize in Economics. The most prestigious prize awarded specifically to an American economist (or a least an economist working in the United States at the time) is the John Bates Clark Medal. The John Bates Clark Medal is awarded by the American Economic Association to whom it considers to be the most accomplished and/or promising economist under the age of forty. The first John Bates Clark Medal was awarded in 1947 to Paul Samuelson, and, whereas the medal used to be awarded every other year, it has been awarded in April of every year since 2009. Because of the age restriction and the prestigious nature of the award, its only natural that many economists who win the John Bates Clark Medal later go on to win the Nobel Prize in Economics. In fact, about 40 percent of John Bates Clark Medal winners have gone on to win the Nobel Prize, despite the fact that the first Nobel Prize in Economics wasnt awarded until 1969. (Paul Samuelson, the first John Bates Clark Medal recipient, won just the second Nobel Prize in Economics, awarded in 1970.) One other award that carries a lot of weight in the economics world is the MacArthur Fellowship, better known as a genius grant. This award is granted by the John D. and Catherine T. MacArthur Foundation, which announces generally between 20 and 30 recipients each year. 850 winners have been chosen between June 1981 and September 2011, and each winner receives a no-strings-attached fellowship of $500,000, paid out quarterly over a five-year period. The MacArthur Fellowship is unique in a number of ways. First, the nominating committee seeks out people in a wide variety of fields rather than focusing on a particular area of study or expertise. Second, the fellowship is awarded to individuals who exhibit a capacity to do creative and meaningful work and is thus an investment in future results rather than simply a reward for past achievement. Third, the nominating process is very secretive and winners are unaware that they are even under consideration until they receive a phone call telling them that theyve won. According to the foundation, over a dozen economists (or economics-related social scientists) have won MacArthur Fellowships, beginning with Michael Woodford in the inaugural year. Interestingly, six MacArthur Fellows (as of 2015) - Esther Duflo, Kevin Murphy, Matthew Rabin, Emmanuel Saez, Raj Chetty, and Roland Fryer- have also won the John Bates Clark Medal. Despite there being significant overlap among the recipients of these three awards, no economist has achieved the triple crown of economics yet.

Thursday, November 21, 2019

Reduction Plan on Vehicle Emission in Rural Areas Term Paper

Reduction Plan on Vehicle Emission in Rural Areas - Term Paper Example The way of doing business in almost all of the industries has experienced major shifts. The effects of globalization have made the world a smaller place to live in as the citizens today have a much wider reach. The effects of globalization have literally written-off the geographical borders of the national as well as international boundaries. Such factors have invariably increased competition. On the one hand, it is true that the competition has proved beneficial for the customers as it has reduced the price and time lag but on the other hand, globalization also has many ill-effects as it increases use of machines and equipment as well as vehicles. Such increase invariably has positive contributions toward the greatest challenge of the present world like global warming. The increased purchasing power of the people contributes toward the higher standard of living. Such standards call for greater use of vehicles. And there is no doubt that the United States is one of the most developed nations of the world. Such greater usage of vehicles is not only affecting the busy city and the urban areas but also the rural counterparts of the country. Located in the mid-western region of the United States of America, Iowa is no doubt one of the prominent states of the country. As per the census of the United States, the state mostly comprises of the urban population with the figure of more than 60% as of 2000. Also, the growth in the urban population is more as it has grown by around 8% in the period between 2000 to 2008 (Iowa Data Center, n.d.). It is often perceived that the state of Iowa that is located at the heartland of the United States has agriculture as one of the major occupations for its citizens but the fact is that the main sources of occupation include manufacturing, finance, biotechnology, and government services. It can be said that the state of Iowa has a diversified economy.  

Wednesday, November 20, 2019

Views on Stealing Africa Essay Example | Topics and Well Written Essays - 500 words

Views on Stealing Africa - Essay Example e is owned by Glencore International Plc, a public company listed in London and Hongkong, registered in Jersey and head quartered in Switzerland (Stealing Africa). The company has consistently evaded corporate tax in Zambia by claiming losses in business. This has been through artificial inflation of operational costs and even under valuing the mined copper. The copper is sold to Switzerland at below market price. Therefore, the company has managed to pay minimal taxes while reaping huge benefits. Despite Zambia having a third of the world’s copper supply, she is still among the poorest countries in the world. Between 60-70% of Zambians live on less than $1 a day and the unemployment rate is staggering 80%. The money from copper bypasses the needy Zambians and only helps Switzerland, home of the company. The situation obtaining here can only be described as catastrophic and dire. The organizations that are mentioned here are the ‘World Bank’ (WB) and the ‘International Monetary Fund’ (IMF). It was as because of the recommendations of the structural adjustment programme that the Zambian government embarked on privatization lending to sale of the mine to Glencore (Stealing Africa). What they did was simply a disservice to Zambian. Privatization opened the door for flow of cash out from Zambia. This being a private company its bottom line is profit and making money. Politics and business are intertwined hence frequent interactions. The government is responsible for the economic policies that will guide how trade and business is conducted. Business cannot thrive in a vacuum where there is no regulation or order (Stealing Africa). In the Zambian situation, the policy of privatization did not at all help the citizens. There is still abject poverty since unemployment rate is unbelievable. Why all this? It is because the fund for empowering the citizens is whisked away to the mother country. Even the tax paid is not low one since the product has been

Monday, November 18, 2019

Adverse Occurrence Root Cause Analysis Essay Example | Topics and Well Written Essays - 500 words

Adverse Occurrence Root Cause Analysis - Essay Example At the same time, it communicates the lessons learned from the problem solving activities (Decision Systems, 2012). REASON integrates the need to perform RCA on both sentinel events and the routine analysis of everyday counter-quality problems for ongoing activities. This cuts down on the amount of time needed for  scheduling, required number of personnel as well as training (Decision Systems, 2012). It does this by providing a scalable process that matches the analysis time and effort to the weight of the crisis. They are summarized as REASON  FrontLine  for small issues, REASON  Express  for significant issues, and REASON  Pro  for serious and sentinel event issues (Decision Systems, 2012). These steps are simplified further by a wizard that asks the attendant to name the problem, the causes, and a business process that will rectify it.   This will focus on describing what is seen happening. It will lay down the symptoms observed in the patient. The problem is defined factually including the qualitative and quantitative properties of the dangerous outcomes. It additionally includes detailing the nature, the degree, the locations, and the timings of the occurrence. This stage will avail proof of existence of the problem. It will also specify the period the problem has existed up to the final crisis, including the impact it has had on the patient. For each behavior, situation, action, or inaction it will be specified what should have been and how it differs from the actual one observed (Andersen & Fagerhaug, 2006). The best suited tool here is the CATWOE. It involves using different perspectives to view the same situation. In it are the customers (patients), the actors who implement the solutions, the transformation process which is affected, and the world’s view, the owner of the process and finally environmental limitations (Hardy, 2010). This stage examines the sequence of events that led to the problem, and

Friday, November 15, 2019

Principles of Infection Control in the Operating Department

Principles of Infection Control in the Operating Department Infection control is a vital part of everyday life in Operating theatre departments across the world. It is used to ensure patient and staff safety throughout surgical procedures and patients stay in a hospital. Key issues that effect many if not all trusts across the UK include Methicillin Resistant Staphylococcus Aureus (MRSA) which is found mainly on the skin and in nasal areas of patients. This bacterium has become immune to antibiotics over the years and creates big problems in hospitals all over the world (NHS, 2009). Another infection, which has swept through our hospitals, is Clostridium Difficile (C-Diff). This is a naturally present bacteria which people hold in their gut but when a patient is given antibiotics for another symptom it can multiply the C-Diff bacteria and cause symptoms such as diarrhoea and fever (NHS, 2008). There are many more infection control issues surrounding hospitals and private healthcare trusts across the world. This essay aims to outline good prac tice in preventing some of these infection control issues. There is a set of standard precautions to adhere to when carrying out any surgical procedure. This was originally recommended when a patient was known or to be suspected of being infected with blood pathogens Deane (2000:39). In operating departments today every surgical procedure follows these protocols to ensure the safety of staff and others who maybe exposed during a patients stay in hospital. It is also the responsibility of the Operating Department Practitioner (ODP) to adopt any Personal Protective Equipment (PPE) supplied by the trust to prevent contamination of any kind. Deane (2000:39) suggests regular handwashing is important to prevent spread of any resident germs and also to reduce the risk of transferring any germs to patients. Ventilation is also an important aspect of surgical procedures and how it effects infection control and the prevention of spreading airborne pathogens Gilmour (2005:87). In the majority of NHS trusts in the UK the operating department staff will commence an operating list with a cleaning procedure known as damp dusting before any patient enters the theatre. Damp dusting is the cleaning of flat surfaces (e.g. trolley tops, worksurfaces, anaesthetic machines, etc) to remove dust from the perioperative environment prior to the commencement of the operating list (Plumridge, 2008). This is to reduce the risk of infection whilst the patient is undergoing surgery. Standard precautions recommend the use of Personal Protective Equipment for all theatre staff including aprons, masks, gloves, gowns and eye protection (Gilmour, 2005:91). Each practitioner or healthcare worker will assess the risk of contamination and the appropriate PPE will be applied. This is to ensure safe practice for all theatre staff and to keep the team free from contamination. The control of substances hazardous to health (COSHH) regulations came into force in 1989 and requires employers to assess the risk to staff and patients alike being exposed to and handling substances hazardous to health including blood and bodily fluids (Deane, 2000:41). COSHH is maintained by performing regular audits and staff completing risk assessments when potential risks are noted. I also personally believe that Heat Moisture Exchanging Filter (HMEFs) are invaluable to NHS trusts across the UK. These are little devices that attach to the end of the Anaesthetic machine circuits just before the facemask. It works with the heat and moisture from the patients own respiration by changing anaesthetic vaporises from a vapour to a gas. It also heats the gas up so it does not give the patient any trauma going into the lungs cold. They also have a filter inside, which will not allow any sort of passage for bacteria or virus to get into the anaesthetic machine circuit. A new filter will be used for each new patient again avoiding cross contamination (see Appendix 1). The ventilation system inside operating theatres offers a change of air at least fifteen times an hour (Mardell, 2009:272). This prevents microbial contamination infecting vulnerable patients and also diluting expired Anaesthetic gases. The ventilation system works by pushing clean air downwards, which in turn pushes contaminated air away from the surgical field towards the sides of the operating theatre and out of the exhaust panels. There are two main types of ventilation used in operating theatres the first one I discussed which is called Plenum and is the more financially suitable to NHS trusts. The second main ventilation system used is called Laminar flow this system is mainly used in Orthopaedic procedures. The reason for this is because it can offer in excess of 300 air changes per hour therefore drastically reducing any airborne organisms, which can cause postoperative infection for the patient (Technology assessment team, 2001). The ventilation system also provides the heat ing for the theatre. (Mardell 2009:272) claims that there is no ideal temperature that will be correct as it will depend on the type of surgery taking place. When operating on babies or children the temperature will need to be higher than if operating on adults, this is due to children and babies not being able to maintain their core temperature as well as adults. The use of patient warming devices such as Bair huggers and Blood/Fluid warmers should allow the air temperature to be less of a consideration for the patient and allow staff to set the temperature accordingly. Along with the temperature controls most operating theatres will also have a wall mounted control panel which also allows staff to set the atmospheric humidity. The humidity should be set at no more than 60% but no less than 30% as this minimises the potential for bacterial growth and static electricity (Mardell, 2009:273). The surgical field has to be set up sterile and maintain sterility throughout the procedure. This is usually an invisible box approximately 1 metre square surrounding the operating table which consists of the patient, surgeon and scrub practitioner, and must contain as little equipment as possible to avoid de-sterilising anything or anyone in that area. The surgical field is maintained by people only entering when necessary and to announce to the surgical team when doing so to avoid accidental contamination (Beck, 2009). The sterile field is designed to reduce any risk of infection to a patient or to any staff member involved with the procedure. It is achieved by performing a number of safe practices: staff dress and preparation, patient preparation, utilisation of sterile equipment and theatre etiquette during surgery (Parker, 2004:108). Aseptic Non Touch Technique (ANTT) is a form of rigorous handwashing that frees your hands and arms from living pathogenic micro-organisms (Hart, 2007:43). This is a vital part in preparing for a surgical procedure for the safety of your patient. If any member of the surgical team have a poor asepsis technique this could result in a Healthcare Acquired Infection (HCAI) for the patient. Unfortunately nosocomial infections are not a thing of the past and still effect nearly all of our NHS trusts across the UK. (Heritage, 2006) quotes Hospitals are places where sick people go with the expectation that they will get better. Unfortunately, however, there is a risk that hospital patients may become infected because of their stay in hospital. (Nazarko, 2008) quotes Every two minutes a patient acquires a Healthcare Associated Infection (HCAI). Every two hours a patient dies because of a HCAI. These are very scary figures and should make healthcare workers more aware of regular handwashing be tween patients. You can achieve full asepsis by using sterile equipment and ensuring none of your sterile equipment or indeed yourself come into contact with anything non-sterile. Whilst it is impossible to sterilise your hands the surgical scrub serves to minimise the number of pathogens on your hands (Pirie, 2005). A normal hand wash is considered to be inadequate, as it does not remove enough micro-organisms from your skin. Scrubbing up on the other hand is considered to reduce the amount of micro-organisms on your skin dramatically. Scrubbing up is a longer process and is performed more intensively by going from the hands up to just below the elbow. The difference in the two procedures is simply that scrubbing up actively reduces more micro-organisms on your hands and arms than a normal hand washing procedure, which reduces the spread of infection to your patients (Collins Hampton, 2005). Other types of bacteria that are found in operating theatres are called Spores. These differ from normal forms of bacteria in a way that they are much harder to remove from surfaces as they have a hard shell protecting them. The original cell replicates its genetic material, and one copy of this becomes surrounded by a tough coating. The outer cell then disintegrates, releasing the spore which is now well protected against a variety of trauma, including extremes of heat and cold, radiation, and an absence of nutrients, water, or air (Darling, 2009). These can be an extreme problem in operating theatres as some types of spores are released into the air becoming airborne pathogens which can then travel and settle into surgical wounds causing infection in a patient (Wilson, 2006). Waste materials in operating departments are divided into two main categories. One is Domestic waste, which compromises of non-clinical waste, which has not been in direct contact with any blood or body fluids such as paper, equipment packaging and food remains. This waste is usually placed into a black bin liner and disposed of accordingly. The other is Clinical waste which covers all other waste products that has had direct patient contact such as drapes, surgical gowns, gloves and disposable equipment. Swabs should not go into a clinical waste bag until the end of the procedure when they have been checked and accounted for by the practitioner. This waste is usually placed into orange or yellow bin liners and disposed of by incineration. Sharps on the other hand go into there own special bin provided and must never be disposed of in a bin bag in case of an accidental sharps injury to anybody. Infection control is vital in maintaining patient and staff safety alike. It is the responsibility of healthcare professionals as individuals but also working together as a team to carry out the standard precautions set by their trust. Simple things like handwashing between patients and wiping down monitoring leads can hugely reduce the amount of hospital acquired infections for patients. Always check if the equipment you are using is disposable or reusable laryngoscope blades, laryngeal mask airways etc and after usage dispose of them accordingly. When commencing an operating list always carry out your standard precautions for every patient this will help protect you as a member of staff but more importantly it will keep a patient safe. When disposing of waste especially clinical waste ensure there are no tears in the bag and the bin liners have been zip tied at the top to avoid any spillages, which could result in somebody becoming contaminated with any blood or body fluids. Rememb er only to open the hatch at the end of the procedure avoiding any contaminated air being let into the theatre whilst the patient is still undergoing the procedure. This could result again in an infection to the surgical site and cause severe discomfort to the patient post operatively. So always remember the standard precautions are there to protect staff and patients alike. They should be abided by at all times and hopefully we can reduce the rate of infection control dramatically.

Wednesday, November 13, 2019

Business Ethics Essay -- Philosophy Morality Papers

Business Ethics Business ethics is a multifaceted field that cannot be defined with a single definition. This area addresses numerous issues, problems, and dilemmas within the management of businesses. It does this through numerous perspectives and methods. Of course, in order to present the complexities of business ethics, we must explore the types of issues that business professionals are confronted with all the time. Business ethics not only portray to humans, but also to how businesses treat the environment. My father stated to me that the enterprise in which he is engaged in, and the products or services that they market, should serve an inherently ethical purpose and that a companies primary ethical responsibilities are defined by the nature of their objectives and also of the relations when formulating their company's ethical standards. This usually requires statements of corporate responsibilities. Most of the codes describe the company's commitment toward certain groups rather than prescribing ethical conduct for specific situations. His responsibility is not only to our stockholders, but also to our clients, the other employees and their families, our local community residents, and all of society at large. Our profit comes about through our effort to promote the prosperity of the community as a whole. Does your company take advantage of clients, due to the fact that they have money? In some ways they do for the fact that we will quote a price to have the complete seal designed and manufactured to a client. The actual cost and materials it takes to make the seals is a lot less than they are charging. I mean that one rubber mold can make two seals and yet we charge them for one seal and then use the excess to make ... ...y's Americans have a belief that they have set for themselves and for the rest of the world a high example of individual freedom. Americans became a nation with the understanding that government action should not restrict the freedom of individuals to follow their own consciences. Employees are the first to know if something within an organization is not legally or ethically right. Unfortunately they are also the last to speak out about such problems. Know body wants to be a whistle blower on the very company that they are working for. Each corporation should provide an employee bill of rights as well as a system of appeals to guarantee these rights and as a condition of employment, workers at every level should be allowed to voice their concerns about the company's activities or policies. They should also be afforded a fair hearing in order to voice these concerns.

Sunday, November 10, 2019

History of Greenwich Village in Manhattan Essay

Greenwich Village’s history begins in the 16th century when its area was first settled by Native American tribes and then by the Dutch who called it New Amsterdam. In the 1660s, it was conquered by the British and its current name was first mentioned in 1713. In the late 18th century, the area known today as Washington Square Park was occupied by a Potters Field Cemetery, closed in 1826. During the outbreaks of yellow fever and cholera in early 19th century Manhattan, its citizens began to flee to Greenwich Village building new houses in the Federal style, shops, and banks. They built New York University in 1836 and made it an artistic and intellectual center. Buildings in the Greek Revival style appeared around Washington Square as well as the marble arch commemorating Washington’s inauguration as President that was built in 1892 (â€Å"Village History†). An unusual wooden house at 6 Weehawken Street is the only surviving example of 18th century oyster bars that were common in the Village at that time. That street also had many stables with apartments above them some of which can be still seen today. Residential houses whose ground floors were used for commercial purposes where more common, however. After the Civil War, Greenwich Village saw the erection of factories, warehouses, and other industrial buildings typical of the Industrial Revolution such as, for example, the Shepherd Warehouse at West Street or the Tower Warehouses at Greenwich Street. The late 19th century also saw the erection of beautiful maritime hotels (Great Eastern Hotel) and ecclesiastical buildings (Victorian Public School at West Street) (â€Å"The Far West Village and Greenwich Village Waterfront†). By the end of the 19th century, the wealthy citizens built new buildings north from the original settlement that was left to the newly arrived immigrants from Europe. In the early 20th century, Greenwich Village’s theaters and galleries attracted artists and writers, and new luxury apartment buildings appeared. In the middle of the 20th century, Greenwich Village began to look like it appears today and has not changed a lot since then. In the second half of the 20th century, many industrial buildings and warehouses were converted to residential buildings (Sass â€Å"History of Greenwich Village, Manhattan†).

Friday, November 8, 2019

United States prior to WWI essays

United States prior to WWI essays The United States in the beginning stages of the 20th century was very different compared to what it is today. Times were pretty rough around here due to recovery from the civil war. At this time living conditions were very different, along with way of life and the current technological state. Even though times were rough during the years following the Civil War, they were looking better. The years 1900-1916 were known as the progressive era. The U.S. wanted to better the country with reform in politics, technology, and morals. Times were looking up to the U.S. until troubles started to arise in Europe, thus causing WWI. The Untied States consisted of 48 different states on the continent of North America (http://kclibrary.nhmccd.edu/decade00.html). The area of the United States took up almost twenty degrees of middle latitude in width and crossed the North America from the Pacific Ocean to the Atlantic Ocean (Encyclopedia Britannica, 11th ed., S.v. United States). Between the decade 1900 and 1910 the U.S. population jumped from 76,000,000 to 91,972,266, which is a growth of about 21%. When it comes to geography the U.S. hit about every option you could have. They had plains, mountains, lakes, and dessert. If talking about climate it all depends on what region you live in. In the south winters are mild and summers were usually scorchers. In the north winters are frigid and summers are usually hot. When talking about major cities you would be surprised to know that the cities of the early 20th century are pretty much the same as they are now. In the north east region you have Chicago and New York. The south east region there is Washington D.C. and Miami, and on the west coast there would be San Francisco. The major population during these times was centered on the east coast because the west coast had not yet become popular. Soon enough it would though with the rising boom of the westward expansi...

Wednesday, November 6, 2019

Should English be Law essays

Should English be Law essays From the article Should English Be the Law Robert D. King disputes the controversial issue of linguistics in the U.S. Mr. Kings views on immigration and nationality will be analyzed. The pros and cons of a multi-linguistic country are discussed along with the negative effects on countries that currently operate under a multi-linguistic commonality. English as the official language is becoming more of an issue in modern day society. Since there was no need to legislate English as the official language, our constitution is silent in the issue (King, 239). The idea of English as the official language was first proposed in 1975 as an amendment to the Voting Rights Act of 1965 (King). In 1981 Senator S. I. Hayakawa introduced to the U.S. senate a constitutional amendment that not only would have made English the official language, but prohibited federal law as well as state law to require the use of the language (King, 240). The legislation was unpopular and did not pass through the 97th Congress. Mr. Hayakawas view were forgotten and in submission until 1986, when ten states passed official language initiatives. The votes were substantial enough to gain the attention of Congress. Many politicians as well as the American public opposed the idea at the time, but the question was still pertinent in the states. Is America threatened by the preservation of other languages, other than English (King 242)? Though a relatively new issue in the United States, the trouble of a multi-lingual society has been prevalent for years. Language has been known in many different societies to be the main cause of division among several world nations. After the first World War, it came to drawing the boundary lines for various countries and it was principally language that guided the draftsmans hand (King 244). Due to the language barrier, many of ...

Monday, November 4, 2019

Ethics and Society Essay Example | Topics and Well Written Essays - 1250 words

Ethics and Society - Essay Example It involves doing what you consider ethical in the society. In other words, ethical life involves doing the right thing as obliged by the society. The right and good are two different ideas that expound on moral values. These two ideas are very common in our society, and many people tend to interchange them in their communication as well as reference of some things in the society. However, the two are very distinct in what they mean. The idea of the right is related to something obligatory, something that one has to do or follow. In other words ‘right’ defines a moral duty. The idea of good, on the other hand, refers to whatever is desirable. It refers to whatever is worth doing in the society or something that is worth to have. In other words, ‘good’ enhances one’s life mainly when it is part of the life (Timmons, 2012). From the definitions, one can deduce that obligatory and the desirable are totally different things. For instance, pleasure that arise as a result of somebody’s success cannot be regarded as obligatory even though it is morally admirable. Observing social norms is regar ded as a right. Every person is obliged to follow the social norms of oneself society. The activities taking place in the world are a reflection of individual acts. Every person’s act contributes immensely to the way we perceive the world. In other words, the happenings in the world are the products of individual thoughts as well as decisions. My theory can be regarded as an ethical intuitionism because it expounds on the existence of moral beliefs that are determined through not only intuition, but also via intuitive awareness. According to my theory, it is the responsibility of an individual to determine the wrongness or rightness of the decision through referring to these moral beliefs and values. Ethical intuitionism is a value-based theory that is more act-centered that agent-centered (Padilla, 2012). This is evidenced by the responsibility an individual

Friday, November 1, 2019

Education. Business degree Research Paper Example | Topics and Well Written Essays - 2500 words

Education. Business degree - Research Paper Example Furthermore, the primary goal of education is to enable one make wise decisions through facilitating and boosting the reasoning of an individual. Moreover, in the current dynamic world education has been used as a tool of earning a living. On a similar theme, education has enabled individuals to specialise in the various diverse fields available in the market for example individuals who specialise in medicine are able to treat people and in turn have been able to earn revenue that serves to improve the living standards. On the other hand, another essential goal that education is purposed to serve is to improve the lives of individuals. Apparently, education has been able to facilitate further research in various fields for instance agriculture which has consequently, led to increase in food production while simultaneously observing quality standards of the yields. On that note, in the field of business education has served to improve the quality of service delivery through the innova tion of machines which improve the efficiency of the work. Furthermore, through education we are able to acknowledge the various business strategies and evaluate on the most appropriate one to employ in the various diverse businesses having different requirements. Moreover, education has also provided a means in which business structures can be comprehensively studied in a bid to expand the various business activities that exist in this dynamic world that is characterised with rapidly changing environment. However, in this paper we focus mainly on the higher education in the field of business. In addition to that, we are going to highlight some of the ways one can acquire a business degree, its advantages and its application to the current business endeavours. First and foremost, a business degree can acquire in a number of ways depending on the specific user needs. On a similar theme, the choice of the manner of study may vary with a number of factors, for instance the issue of geo graphical location of the individual with respect to the institution of learning. On that note, individuals who live far from the educational institution may consider studying online as way of acquiring a business degree. In addition to that, individuals who use this form of studying employ the use of computers; internet to acquire the required educational material for example books and other relevant literature and study online. On the contrary, another important factor that influences the manner in which one can acquire a business degree is the occupation of an individual. Apparently, individuals who have hectic schedules during the day may consider part time schooling as opposed full time since it may not interfere with the daily activities of an individual. In addition to that, this mode of studying entails evening classes and may take a longer period to acquire a business degree as compared to the full time mode of studying since in full time studying, an individual is subjecte d to longer studying hours as compared to the part time mode who may at time study during the weekends only. On the contrary, the duration of acquiring a business degree may vary depending on a number of factors for instance the mode of study of an individual. On the same note, individuals who use the full time mode of study may take a minimum of three years to attain a business degree. In addition to that, individuals who use the part time mode of studying may require a minimum of four to five years in order to achieve this important business degree. However, individuals using this form of studying may in other cases take longer to acquire this degree since some may decide to defer their studies in a bid to

Wednesday, October 30, 2019

In istructions Assignment Example | Topics and Well Written Essays - 500 words - 1

In istructions - Assignment Example The fallacy outlined in the video makes the audience to ask themselves if it is about greed or if it about the demand and the supply. Food production is not only due to greed portrayed by the producers. There are various industries where one can make many revenues and experience a less risk compared to agriculture. What the population need is the demand for cheap food where they are expensive or cheap during the production. After watching the movie, there is little likelihood for the audience to change their eating habits. This is because majority of audience believe that there is nothing wrong in eating meat. Rather they ought to buy organic meat and stop backing the fast food companies. They have always continued making organic burgers rather than one sold at McDonalds ("The Official Meatrix I."Â  n.d). I do agree with the response based on the authenticity of the website in creating awareness on the factory farms. The video failed in providing facts that supports the allegations outlined in the video. This poses questions on the validity of the information and outcomes depicted in the video. It is true that the information presented in the video, will bring forth questions between the researchers and those believing that the video’s theme is true. I fail to agree on the response on the rural living and rural farm. This is because there is not standard guideline governing the plan and setting of farm. It is true that most of the produce in groceries is not what is found on farms. This poses as one of the reasons of why I support the response. Just as stated in the response, I believe there are fallacies and agree with notion of how animals are treated before coming up with the products. Additionally, there was a misconception when the video stated those big and large farms are replacing the little one because of greed. It is common knowledge

Monday, October 28, 2019

Is3440 Project Part 1 Essay Example for Free

Is3440 Project Part 1 Essay First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure. Some examples of open source software that we might use are: Web Server Apache Web Filtering DansGuardian Network Firewall Turtle Firewall VPN Endian Firewall Community IDS/IPS Suricata Database MySQL File Server Samba SMTP Server hMailServer I would recommend that we use a Defense in Depth strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a de-militarized zone (DMZ). We need to have a network firewall between our DMZ and our internal network, bet ween the outside world and our internal network, and between our DMZ and the outside world. There should also be a local firewall enabled on each local machine. Also, since our physical servers will be hosted at a third party location, we must have VPN access to these servers to manage them. All private data will need to be encrypted, as well as all data transitions. To go along with the previously mentioned physical and software based security measures, we will also apply multiple policies to maintain this security. Acceptable Use  Policy This policy will describe how the companies IT assets should and can be used. As well as what is not acceptable to do on company assets. Password Policy This policy will explain what parameters a password must meet to be accepted. For example; a password must be at least 15 characters long have at least on capital letter, have at least one lower case letter, have at least one number, and have at least on symbol. Privacy Policy This policy describes what information must remain confidential. Training employees on the proper way to use (and how NOT to use) company assets is a major key to ensuring the CIA triad remains intact and our network secure. In this part of the executive summary, I am going to be explaining, and making recommendations on what the best options are for the open source software that is needed for the management of the First World Savings and Loan financial institutes various web and application servers. For each of the servers, I recomm end using the Red Hat Enterprise Linux operating system for a number of reasons. The main ones being that it is one of the most secure, Its backed by years of technical support, Its supported by a vast number of different hardware, and It is one of the most, if not the most, popular and used server OSs that one can get today. I would rather go with software that has been vigorously tested to its breaking point and still remains at the top tier of server software options thats readily available today, than one that has just come out with all of the bells and whistles. So on that note, lets get started on what I recommend to be the best of the best in terms of specific software and service needs. There are numerous great open source software solutions for database servers, like, H2, HyperSQL, MySQL, mysql, Oracle, and PostgreSQL, just to name a few. They all offer topnotch functionality, performance, scalability, and security. As far as which one is the best, I recommend PostgreSQL. PostgreSQL is an object-relational Database software solution that offers some of t he most feature rich options as compared to the bigger commercial manufacturers like Oracle, IBM, Sybase and Informix, and the best part of it, its free. Its also one of the first database software that was released, and it has a proven track record with over 23 years of active development. It was created back in 1989. The only other DB software that came out before it is Oracle, which was created back in 1979. Now PostgreSQL might not be the fastest, but It more than makes up for it with its functionality. It allows the use of two  different types of interfaces, a GUI (for those who like the point-click style) and a SQL. It works on most OSs like windows, Linux, Mac, Unix, etc. It has a vast array of services and tools that is included to streamline the administration of the Database. Here are just some examples; Full ACID (Atomicity, Consistency, Isolation, Durability) compliancy, commercial noncommercial support, triggers support, user defined data type support, stored procedure support, online backup, multiple index type input support, embedded access controls, encryption, etc. Here is a comparison of the top DB software available I got from the unbiased, data-driven comparison website; www.findthebest.com/database-management-sytems: - Specifications Product | MySQL | Oracle | PostgreSQL | Architecture | Relational Model | Relational Model | Object-relational Model | Software License | * GPL * PostgreSQL * Proprietary | * GPL * PostgreSQL * Proprietary | * GPL * PostgreSQL * Proprietary | Operating System | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | Demo? | | | | Interface | * GUI * SQL | * GUI * SQL | * GUI * SQL | Website | MySQL (mysql.com) | Oracle (oracle.com) | PostgreSQL (postgresql.org) | First Public Release Year | 1995 | 1979 | 1989 | Lastest Stable Version | 5.5.19 | 11g Release 2 | 9.1.3 | - -Price Price | $0 | $180 | $0 | Purchase Page | MySQL (https) | Oracle (https) | | - -General Features Features | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | Indexes | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | Database Capabilities | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | Partitioning | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | Access Control | * Audit * Brute-force Protection * Enterprise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | * Audit * Brute-force Protection * Enterprise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | * Audit * Brute-force Protection * Enterpr ise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | Tables and Views | * Materialized Views * Temporary Table | * Materialized Views * Temporary Table | * Materialized Views * Temporary Table | Other Objects | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | Support Features | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | - -Product Description Product Description | MySQL is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. MySQL is officially pronounced /maÉ ªÃ‹Å'É›skjuË Ã‹Ë†Ã‰â€ºl/ (My S-Q-L), but is often also pronounced /maÉ ªÃ‹Ë†siË kwÉ™l/ (My Sequel). It is named for original developer Michael Wideniuss daughter My. | Oracle Database 11g Release 2 provides the foundation for IT to successfully deliver more information with higher quality of service, reduce the risk of change within IT, and make more efficient use of their IT budgets. By deploying Oracle Database 11g Release 2 as their data management foundation, organizations can utilize the full power of the worlds leading database to:ï‚ · Reduce server costs by a factor of 5ï‚ · Reduce storage requirements by a factor of 12ï‚ · Improve mission critical systems performance by a factor of 10ï‚ · Increase DBA productivity by a factor of 2ï‚ · Eliminate idle redundancy i n the data center, andï‚ · Simplify their overall IT software portfolio. | PostgreSQL is a powerful, open source object-relational database system. It has more than 15 years of active development and a proven architecture that has earned it a strong reputation for reliability, data integrity, and correctness. It runs on all major operating systems, including Linux, UNIX (AIX, BSD, HP-UX, SGI IRIX, Mac OS X, Solaris, Tru64), and Windows. It is fully ACID compliant, has full support for foreign keys, joins, views, triggers, and stored procedures (in multiple languages). It includes most SQL:2008 data types, including INTEGER, NUMERIC, BOOLEAN, CHAR, VARCHAR, DATE, INTERVAL, and TIMESTAMP. It also supports storage of binary large objects, including pictures, sounds, or video. It has native programming interfaces for C/C++, Java, .Net, Perl, Python, Ruby, Tcl, ODBC, among others, and exceptional documentation. | - -Contact Information Contact Link | MySQL (mysql.com) | Oracle (oracle.com) | PostgreSQL (postgresql.org) | Phone | 1 (866) 221-0634 | 1 (800) 392-2999 | | - -Limits Max Blob/Clob Size | 4 GB | Unlimited | 1 GB (text, bytea) stored inline or 2 GB (stored in pg_largeobject) | Max CHAR Size | 64 KB (text) | 4000 B | 1 GB | Max Column Name Size | 64 | 30 | 63 | Max Columns per Row | 4096 | 1000 | 250-1600 depending on type | Max DATE Value | 9999 | 9999 | 5874897 | Max DB Size | Unlimited | Unlimited | Unlimited | Max NUMBER Size | 64 bits | 126 bits | Unlimited | Max Row Size | 64 KB | 8KB | 1.6 TB | Max Table Size | MyISAM storage limits: 256TB; Innodb storage limits: 64TB | 4 GB | 32 TB | Min DATE Value | 1000 | -4712 | -4713 | - -Data Types Type System | * Dynamic * Static | * Dynamic * Static | * Dynamic * Static | Integer | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | Floating Point | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | Decimal | * DECIMAL * NUMERIC | * DECIMAL * NUMERIC | * DECIMAL * NUMERIC | String | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | Binary | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLO B * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLOB * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLOB * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | Date/Time | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | Boolean | * BOOLEAN * Unknown | * BOOLEAN * Unknown | * BOOLEAN * Unknown | Other | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | I think its pretty obvious that the data speaks for itself. You cant get any better option unless you want to pay big money for these specific services. When it comes to deciding on which open source web server software to utilize, there are a lot of different options, such as, Apache, LightTPD, NGiNX, Boa, Cherokee, etc. The one that stands out the most is Apache. Apache is the most popular web server to date. It is the leading web server that is used most over all others including open source and non-open source options, such as, Microsofts IIS, Googles proprietary custom servers, NGiNX, AOL, IBM, etc. according to the website www.makeuseof.com. Here is a graph table I found (its a little dated) to give you an idea: Apache is the leader because of its functionality, performance, price (its free), stability, and security. It has top notch cross-plat forming capabilities so it can be used on numerous operating systems like, Microsofts Windows platform, Linux and UNIX based platforms, Macintosh platforms, BSD platforms, IBM platforms, HP platforms, etc. It can basically run on just about all OS platforms. This is ideal in todays ever evolving business needs and requirements. Some of the best features that an Apache web server offers are as follows: Basic access authentication digest access authentication, SSL/TLS HTTPS, virtual hosting, CGI, FCGI, SCGI, Java, SSI, ISAPI, runs in user space versus kernel space, Administration console, and IPv4 IPv6 addressing. Now these are just some of the feature sets that Apache uses. It helps that most, if not all, of these features are security based; which is most important when dealing with IT in any aspect of todays business world and society itself. There are a lot of different options when it comes to file servers. Some examples are, FileZilla, Samba,  HFS, TurnKey, Cerberus, VSFTPD, etc. As far as whats the best file server software options it boils down to the companys needs. I recommend using Samba or FileZilla for a number of reasons. Samba has over 20 years of development and FileZilla has over 10 years of development, They both offer amazing cross-plat forming capabilities on several different operating systems, They are both pretty easy to setup and administer, they both offer great security, and best of all they are free. This is extremely important for a modern business. Also the fact that they are free helps in cutting down company costs and drives up financial gains throughout the en tire company. Plus, Samba speaks natively with Microsoft Windows machines and these are typically what most end users use for their operating systems. Now for the open source SMTP server software I recommend using iRedMail. iRedMail offers two different options, iRedMail (which is free) iRedMailPro (which is a paid version for $299 per server per year) with amazing fully fledged features. The feature include: blazing fast deployment (less than 1 minute), easy to use, security and stability, mind-blowing productivity (uses a very little resources to run), top notch support, absolute control over data (all personal data is stored on companys hard disk versus some third party storage medium), supports virtualization and non-virtualization software (VMware, Xen, VirtualBox, KVM, OpenVZ, etc. with i386 and x86/x64/ amd64 compatibility), low maintenance, unlimited accounts, stores mail in openLDAP, MySQL, and PostgreSQL, Service and access restrictions, throttling, Anti-Spam Anti-Virus by default, Web mail, backup support, and security (forced password change policy for every 90 days, uses SSL/TLS connections for sending and receiving mail, etc.). The support offered for iRedMail is among the best and in the business world, this is a must. The LDAP server I recommend is Red Hat Directory Server because it offers some of the best features to date. Its also has some of the best support in the business. It has an amazing reputation as well. Here is a list of the features that it offers: cost-savings, tremendous scalability (Allows 4-way multimaster replication of data across the entire enterprise while providing centralized, consistent data, and allows extranet applications), enhanced security (provides centralized, fine-grained access controls, and utilizes strong certificate-based authentication encryption.), and amazing productivity (centralizes user identity and  applications for ease of access for administration), you can’t go wrong with using software from a national ly known and reputable company like Red Hat Linux. Each user will be put into groups; this will be done to control access to the file system. Each user on the network will have to meet the standards below. Having each user in groups will help manage them, and what they have access and are allowed to do on the server. Each user will have their own partitioned /home directory to reduce impact of the file system. No user should be without a group, any users without groups will only have access to only their home directory. The following is the password policy they will be using: User account Standard users: Restrict reuse of passwords to once per 18 months Set min day for password expire Set max day for password expire every 30 days Set password complexity to require 1 capital letter, 1 lower case letter, 1 number, 1 symbol and must be at least 15 characters long Enforce password policies Ensure all users do not have access to sudo, or su rights  Create groups for all users, and give them allow sups or admins to maintain rights to those groups, and allow them specific path use on sudo (only if needed). This will allow users to access the data they need to complete their jobs. Also with this password system in place, it will ensure they do not use simple passwords or recycle passwords too often. Super users: Rights to manage groups Specific path use of sudo Restrict reuse of passwords Set min day for password expire Set max day for password expire Set password complexity Enforce password policies These will help super users to manage groups and have access to the tools that they need. This also prevents the users from having too much access to the systems. This helps the admin manage groups by allowing them to move users into the correct group or give them access to specific files that they may need access to. Su will only be used by top level admins, and only if something is truly not working. Lower level admins will have sudo access to files they need to have access to. Users will only have read/write access to the files they need access to; the rest will be read only access. Kernel will be locked down and will need admin permission to access. Passwd file will not be accessible by anyone other than top level admins Firewall and iptables will only be accessible by top level admins and super users. Configuring our network in this manner and applying these user access control permissions will cost less money and add a greater level of security. Using this Defense in Depth strategy, we will have multiple layers of security that an attacker will have to penetrate to break the CIA triad.

Saturday, October 26, 2019

Cheating Essay -- Academic Cheating Cheater Essays

Cheating Cheating used to be considered an unmentionable sin. However, in this day and age, it has become more common and somewhat of a daily occurrence. Cheating is more widespread today than in the past. According to the article titled Education: The New Morality, cheating has not been an issue of values, but simply one of practicality. This shows that many view cheating as a mere occurrence and something that can often be skipped over. The reason cheating has become such a pervasive movement is because many students tend to rationalize their cheating behavior. A common rationalization that many students use is, â€Å" That’s the only way I’ll get anywhere in life.† Many students also tend to incorporate reasons, such as parental pressures, the aim to be the best, and the lack of time, with their dishonest behavior.   Ã‚  Ã‚  Ã‚  Ã‚  Since cheating has been a problem in our society, there have been many attempts to rid the world of this problem. Such attempts include creating an honor code, forms of punishment, and possibly a computer-integrated classroom. The terms by which an honor code are defined as are (taken from the article titled A Question of Honor), â€Å" something that defines ethical academic conduct with the expectation that students will monitor their peers, report violations, and mete out penalties.† An honor code needs to be created by the student body in order to be carried out successfully. By enforcing an honor code, there is a creation of trust within the atmosphere...

Thursday, October 24, 2019

What Makes Jack Welch an Effective Leader? Essay -- GCSE Business Mark

What Makes Jack Welch an Effective Leader? ---ideas from the article â€Å"Will Legacy Live On?† Before I talk about what makes Jack an effective leader, I want to explain briefly why I chose him as my study subject. Why do I like him? Jack Welch created a new model for business leaders everywhere. His genius leadership and management techniques are an example to anyone aspiring to a successful career. Why is he so famous? He became the youngest CEO and Chairman of one of America's biggest and most respected companies (General Electric) at age 44, and successfully rewrote the rules of what an incredibly profitable and successful company should be, and had fun in the process. What is leadership? To know what makes an effective leader, one must know what leadership is. According to our textbook, the definition of leadership is the ability to influence a group towards the achievement of goals. In this case, the group is General Electronic Corporation. For a big business empire like GE, obviously, the final goal is to make as much profit as it can to please its shareholders. Let’s see what the article describes about how Jack influences his team to achieve this goal: â€Å"Growing a company that was valued by the market at $13 billion when he took it over in 1981 to a behemoth worth more than $400 billion when he retired last year is what is called wealth creation – big time.† Without Jack, GE couldn’t have today’s accomplishment. What makes Jack be a leader? †¢ Personality According to the â€Å"trait theories of leadership† in the textbook, six traits have been identified as being consistently associated with leadership: 1) ambition and energy; 2) the desire to lead; 3) honesty and integrity; 4) self-confidence; ... ...world has become extremely fast and full of change. If the leader can’t adapt to changing conditions, it is very possible for his firm to be kicked out of the game. How can the firm change, though? The most effective way is to go through new ideas. Here, it reminders me Welch’s famous saying: "Change before you have to." †¢ Arts At last, I want to quote my favorite part in this article, which the following, Leadership is not a science. It’s not a recipe. It’s not the five rules about this or the six effective habits of that. It’s an art, and as Georges Braque wrote, the only thing that matters in art is the part that can’t be explained.† The only reason that I like this part is that I don’t need to apply any leadership theory here. My conclusion is that he is a very effective leader. If I were to become a successful CEO, I would follow his example.