Monday, September 30, 2019

Unit Assignment

Theory of Vocational Types. This approach gives explicit attention to behavioral style or personality types as the major influence in career choice development. The following is a transcript of my interview with Mr.. Clubber: Question 1 . ) In what ways do you take into consideration the person's age, culture, and family structure when working with individuals in later life? Mr.. Clubber: Depending upon the age gap an individual's conversation will be guarded based on maturity or the lack thereof. In addition, their age will determine their likes and dislikes.An individual's culture and family structure shapes the moral fiber of their existence. Therefore, each conversation should be tailored based on age, and culture which drives the facilitators conversation with the individual. Question 2. ) What, if any, are the challenges you can identify when working with individuals through the later stages of their lives? Mr.. Clubber: The challenges that I encounter With individuals during t heir later years are: their mind instruct the body to do one thing however their physical abilities prevents the opportunity. This depresses the individual.Also, they are concerned as to if they have been a good father, mother or friend. Another question previously asked was: Have they completed everything that's required to prevent them from being a burden to their family? They tend to blame themselves for previous transgression and time lost during their youth. Lastly, they are sadden by frequent deaths. Question 3. ) What, if any, are the challenges you can identify when working with individuals who are coming to the end of their lives? Mr.. Clubber: Coming to grip that they will no longer be around to enjoy love ones. TheyOften wonder if they have done their very best and request validation. Some become bitter imagining what will happen to their personal items and the fear of the unknown. Question 4. ) How did you choose to make the career decision to work with this population? Mr.. Clubber: I chose this profession because I enjoy working with people. Death is also a part of living. Providing feedback and assistance during bereavement, although ifs very sad, gives me the opportunity to encourage those individuals that are encountering the inevitable. Question 5. ) What are some of the rewards that you can identify room working with this population? Mr..Clubber: The reward for working with this population is to provide encouragement and to prove that God is able to bring them out of any circumstance and bridge the gap between death and life. Question 6. ) Can you share career advice to new professionals thinking about working with this population? Mr.. Clubber: Never take anything personal. If you do not have a heart to serve, you should not become a part of the ministry. A minister's contribution should not be based on his knowledge or financial status but his willingness to extend himself to others. Question 7. What is the process that you use to assess f or elder abuse and neglect?Mr.. Clubber: I assess elder abuse by engaging conversation and listening to the elder. Hoover & Polios, 2014 suggest that elder mistreatment includes intentional or neglectful acts by a caregiver or trusted person that harm a vulnerable older person. And it can occur in a variety of settings. They go on to allude that one out of 10 older adults experience some form of abuse or neglect by a caregiver each year, and the incidence is expected to increase. In addition, the challenges of working with individuals in this stage of life includes guiding these individuals through the stages of grief affected by pending deaths.On the flip side, the reward is observing how the individual or families deal with this emotion and observing the different resiliency and/ or coping methods displayed by individuals and family members. Moreover, since prior research suggests that the opportunity for increased elder abuse is concluded; that family members should take an activ e interest into the treatment of family elders by care givers but more importantly, question and listen to our elders about their treatment. Furthermore, Mr..Clubber was able to share an additional insight during this interview in that death is a part of living and you haven't lived until you have experienced death; and death should be celebrated just as we celebrate the beginning of a new life. From a professional perspective, this interview demonstrated the importance of being familiar with the different stages individuals and families experience when faced with later stages of life including death. This in turn will position future mental health counselors to better guide themselves and clients when acing elder hood.Part 2: Connection to My Experiences From a family and personal perspective, we were raised to believe that dying is a small event that occurs at the end of life. It is a process that we must experience. This belief is rooted in our religious culture and belief that J esus Christ die for our sins and that death leads to the joining of God who has prepared an afterlife with him in heaven. My professional trade is a Radiology Technologist. And for twenty-five years, I have observed many families grieving after love ones die within the hospitals where was employed.Even though I felt empathy in those situations, nothing compared to the grief that was experienced by myself and family members when our oldest sister passed. It was especially difficult for myself since the donation of a kidney to her ten years earlier. During this time, I observed each family member grieve every process that has been covered in this course. However, also witnessed the matriarch of our family; my mother who had the resiliency in keeping our family together. When comparing death to other cultures such as Islam, a Muslim wife for instance, is only allowed to mourn ere husband for 4 months and 10 days.The Muslims are allowed to mourn anyone dying other than a spouse, for 3 d ays only. So when a woman loses her husband, no matter how painful the death is, the devout Muslim must say only â€Å"Nina Lila WA Nina Allah ration This means â€Å"to Allah we belong and to him is our return. â€Å". (How to Cope 2014) In contrast to western beliefs, there is no time table for how long individuals may mourn an individual's death Many themes are found across cultures and religions. One such pervasive theme was that beliefs about the soul of the deceased lead families to reform rituals and ceremonies that fostered a passage to God, the â€Å"light,† or another life.The stronger their beliefs, the more dedicated the family is in completing the rituals and ceremonies in the way dictated by their religion or culture. (Lobar & Youngest, Verboten 2006) Cultural knowledge will be useful in work as a counselor because it gives the future counselor an understanding that individuals are different and with that difference comes a different culture belief then your own. Therefore, different techniques may need to be utilized when working with clients. Unit Assignment Theory of Vocational Types. This approach gives explicit attention to behavioral style or personality types as the major influence in career choice development. The following is a transcript of my interview with Mr.. Clubber: Question 1 . ) In what ways do you take into consideration the person's age, culture, and family structure when working with individuals in later life? Mr.. Clubber: Depending upon the age gap an individual's conversation will be guarded based on maturity or the lack thereof. In addition, their age will determine their likes and dislikes.An individual's culture and family structure shapes the moral fiber of their existence. Therefore, each conversation should be tailored based on age, and culture which drives the facilitators conversation with the individual. Question 2. ) What, if any, are the challenges you can identify when working with individuals through the later stages of their lives? Mr.. Clubber: The challenges that I encounter With individuals during t heir later years are: their mind instruct the body to do one thing however their physical abilities prevents the opportunity. This depresses the individual.Also, they are concerned as to if they have been a good father, mother or friend. Another question previously asked was: Have they completed everything that's required to prevent them from being a burden to their family? They tend to blame themselves for previous transgression and time lost during their youth. Lastly, they are sadden by frequent deaths. Question 3. ) What, if any, are the challenges you can identify when working with individuals who are coming to the end of their lives? Mr.. Clubber: Coming to grip that they will no longer be around to enjoy love ones. TheyOften wonder if they have done their very best and request validation. Some become bitter imagining what will happen to their personal items and the fear of the unknown. Question 4. ) How did you choose to make the career decision to work with this population? Mr.. Clubber: I chose this profession because I enjoy working with people. Death is also a part of living. Providing feedback and assistance during bereavement, although ifs very sad, gives me the opportunity to encourage those individuals that are encountering the inevitable. Question 5. ) What are some of the rewards that you can identify room working with this population? Mr..Clubber: The reward for working with this population is to provide encouragement and to prove that God is able to bring them out of any circumstance and bridge the gap between death and life. Question 6. ) Can you share career advice to new professionals thinking about working with this population? Mr.. Clubber: Never take anything personal. If you do not have a heart to serve, you should not become a part of the ministry. A minister's contribution should not be based on his knowledge or financial status but his willingness to extend himself to others. Question 7. What is the process that you use to assess f or elder abuse and neglect?Mr.. Clubber: I assess elder abuse by engaging conversation and listening to the elder. Hoover & Polios, 2014 suggest that elder mistreatment includes intentional or neglectful acts by a caregiver or trusted person that harm a vulnerable older person. And it can occur in a variety of settings. They go on to allude that one out of 10 older adults experience some form of abuse or neglect by a caregiver each year, and the incidence is expected to increase. In addition, the challenges of working with individuals in this stage of life includes guiding these individuals through the stages of grief affected by pending deaths.On the flip side, the reward is observing how the individual or families deal with this emotion and observing the different resiliency and/ or coping methods displayed by individuals and family members. Moreover, since prior research suggests that the opportunity for increased elder abuse is concluded; that family members should take an activ e interest into the treatment of family elders by care givers but more importantly, question and listen to our elders about their treatment. Furthermore, Mr..Clubber was able to share an additional insight during this interview in that death is a part of living and you haven't lived until you have experienced death; and death should be celebrated just as we celebrate the beginning of a new life. From a professional perspective, this interview demonstrated the importance of being familiar with the different stages individuals and families experience when faced with later stages of life including death. This in turn will position future mental health counselors to better guide themselves and clients when acing elder hood.Part 2: Connection to My Experiences From a family and personal perspective, we were raised to believe that dying is a small event that occurs at the end of life. It is a process that we must experience. This belief is rooted in our religious culture and belief that J esus Christ die for our sins and that death leads to the joining of God who has prepared an afterlife with him in heaven. My professional trade is a Radiology Technologist. And for twenty-five years, I have observed many families grieving after love ones die within the hospitals where was employed.Even though I felt empathy in those situations, nothing compared to the grief that was experienced by myself and family members when our oldest sister passed. It was especially difficult for myself since the donation of a kidney to her ten years earlier. During this time, I observed each family member grieve every process that has been covered in this course. However, also witnessed the matriarch of our family; my mother who had the resiliency in keeping our family together. When comparing death to other cultures such as Islam, a Muslim wife for instance, is only allowed to mourn ere husband for 4 months and 10 days.The Muslims are allowed to mourn anyone dying other than a spouse, for 3 d ays only. So when a woman loses her husband, no matter how painful the death is, the devout Muslim must say only â€Å"Nina Lila WA Nina Allah ration This means â€Å"to Allah we belong and to him is our return. â€Å". (How to Cope 2014) In contrast to western beliefs, there is no time table for how long individuals may mourn an individual's death Many themes are found across cultures and religions. One such pervasive theme was that beliefs about the soul of the deceased lead families to reform rituals and ceremonies that fostered a passage to God, the â€Å"light,† or another life.The stronger their beliefs, the more dedicated the family is in completing the rituals and ceremonies in the way dictated by their religion or culture. (Lobar & Youngest, Verboten 2006) Cultural knowledge will be useful in work as a counselor because it gives the future counselor an understanding that individuals are different and with that difference comes a different culture belief then your own. Therefore, different techniques may need to be utilized when working with clients.

Sunday, September 29, 2019

Newell Company: The Rubbermaid Opportunity Essay

In October 1998, Newell Company was considering a merger with Rubbermaid Incorporated to form a new company, Newell Rubbermaid Incorporated. The agreement would be through a tax-free exchange of shares valued at $5.8 billion. Newell had revenues of $3.7 billion in 1998 across three major product groupings: Hardware and Home Furnishings, Office Products, and Housewares. Rubbermaid is a renowned manufacturer of a wide range of plastic products ranging from children’s toys through housewares. Once the transaction is completed, Newell will begin he process of assimilating Rubbermaid’s operations through a process called â€Å"Newellization.† The companies expect that the merger will create synergy through the leveraging of Newell Rubbermaid brands. By 2000, these efforts are expected to produce increases over anticipated 1998 results of $300 to $350 million in operating income for the combined company. Reading the case analysis, there are many issues that I feel are concerning this merger and I feel that Newell should not process with this merger. First of all, this is a tough and alarming challenge to Newell’s capacity to integrate and strengthen acquisitions. How would Newell bring Rubbermaid into the newellization process since they have completely different products? Another question that comes to mind is how does Newell coordinate all its divisions and what changes will it have to make to create synergy with Rubbermaid? Does the newellization process fit for Rubbermaid? Lastly, are the risks acceptable for Newell to merge with Rubbermaid? Newell needs a very well thought out business plan and has to answer these questions before they proceed. There are advantages and disadvantages in this merger. I will start with the advantages. If this merger goes through, it will be a quantum step in Newell’s growth. The merger will be uniting two companies that are leaders in their industries. Through the merger, Newell will gain the international presence that Rubbermaid has. Both companies can create synergy within their divisions and Newell can expand their product line internationally. There  are certain products in Rubbermaid’s product line that Newell does not have. Another advantage the merger will create is increased operating income. Some disadvantages of the deal are that Newell would be exposed to a tough challenge to the company’s capacity to combine its acquisitions. One big disadvantage is the risk that is involved in the deal for Newell. Newell is a very respectable company, and a company whose customers are very satisfied. They are very successful with their acquisitions due to their exemplary newellization process. Rubbermaid currently has many problems with their company such as bad customer relations, their operations are not lean, increases competition has taken away market share, and their financial targets seem unrealistic. Newell needs to understand these problems and realize what they will have to deal with if they join with Rubbermaid. Doing my research I have come up with many more disadvantages than advantages toward this merger and that is why I feel that these companies should not merge. In today’s business world, companies change hands all the time through mergers and acquisitions. Most of the time, the security propositions of new ventures are disregarded. Company A may have the most secure network, but when they couple this network with Company B, you’re exposing your company to a whole new set of risks. The first step is that Newell needs to assess the business risk. Reputation loss is an issue, which Newell will be affected by. Rubbermaid has bad customer relations because it has angered its most important retail buyers with the heavy-handed way it has passed its rising costs. They have given their competitors a lot of shelf space. A big question mark comes to my mind is when I think about how Newell will bring Rubbermaid into the Newellization process. Newellization is described as a â€Å"well established profit improvement and productivity enhancement process that is applied to integrate newly acquired product lines.† The newellization process includes the centralization of key administrative functions including data processing, accounting, and EDI, and inauguration of Newell’s rigorous, multi-measure, divisional operating control system. Reading the case analysis, Rubbermaid is extremely incompetent in these areas. Their operations are one of their biggest problems. According to the  case, â€Å"although it excels in creativity, product quality, and merchandising, Rubbermaid is showing itself to be a laggard in more mundane areas such as modernizing machinery, eliminating unnecessary jobs, and making deliveries on time.† Looking at Rubbermaid and analyzing their problems, they have to tally the opposite qualities of companies that Newell has acquired in the past. Newell’s acquired companies were mature businesses with unrealized profit potential. Rubbermaid has had a mature business for quite a long time and I do not see any room for unrealized profit potential. They have a very big international presence and Newell will end up hurting themselves once they have to deal with Rubbermaid and their incompetence. I do not feel that the newellization process fits Rubbermaid because these are two companies that have been around for a while, and it is not like Rubbermaid is a start-up or a fairly recent company that can be changed around quickly and all of the sudden have lean operations, which newellization has proved it can do with previous acquisitions. Newell should stick to their business principle and do what they have done in the past, which is to acquire small to medium sized companies and integrate them into the newellization process and create an enormous amount of synergy. I always believe that one should do something that they know best or have experience in and not pursue a totally different market in which that have no experience in. In this case, Newell does not have any experience with acquiring a company that is worth billions. A merger example that recently occurred which has turned into a blunder is the AOL Time Warner merger. These were two totally different companies in different industries that thought they could merge and be a giant in the Internet and Media/Entertainment industry. The outcome of this merger is that the CEO’s of both companies are being laughed at in the business world. AOL Time Warner stock price is in the dump and the company is in real trouble. Newell can avoid all this by again looking at their previous acquisitions and seeing what type of companies they acquired, which were companies with unrealized profit potential and who had the ability to create synergy in a short amount of time with Newell’s existing divisions. In conclusion, the deal is attractive for Newell but is not worth the risk that is involved. The key to merger and acquisitions is to not jump on your first instinct and just merge or acquire a company that’s price looks cheap.  You have to determine what the company will look like in the future. Lack of foresight will cause a huge problem. Rising raw material costs along with Rubbermaid’s operational problems will impair the whole newellization process. Rubbermaid has very sour relationships with their clients and Newell will have an extremely difficult time fixing those relationships. If the two companies merge, only investors or individuals who follow business news will know that these two companies are one. The average customer will still know of Rubbermaid as Rubbermaid. I feel that Rubbermaid brings a lot of heavy baggage to the table and will hurt the smooth and exemplary business that Newell has attained.

Saturday, September 28, 2019

Berkely. Info in description Essay Example | Topics and Well Written Essays - 1500 words

Berkely. Info in description - Essay Example It is derived from two Greek words, phil and nous, which when translated to English means Lover of Mind. In this dialogue, Berkley, through Philonous, brings forth a strong argument against the theory of materialism and argues out his points in a way that shows how strongly he believes in immaterialism. According to Philonous, immaterialism proves and brings forth the erroneous nature of skepticism. This paper will be assessing the arguments that have been developed to oppose materialism and those that have been brought forth to support the theory of immaterialism and how it refutes skepticism. The paper will be assessing how successful the arguments that Berkley presents are in convincing the reader and the reasons for their success or failure. This dialogue is in three parts. In the first part of the dialogue, Hylas expresses his utter disdain of skepticism and points out to the opinion that he has heard Philonous to hold that there is no such thing as material substance in the wor ld; a skeptical opinion. However, according to Philonous, it is Hylas who is skeptical and he seeks to prove that to him. The two therefore begin to engage in a philosophical battle of wits. Philonous begins by questioning Hylas on heat as a secondary quality. He questions Hylas of how one can be able to experience pain or pleasure through heat if it is not perceived in the mind. Philonous gives a hypothetical situation to Hylas of putting his hand near a fire. According to Hylas, there is only one sensation that one can feel when they do this. But Philonous proves that to be contrary to reality. When the hand is put near the fire, there are two sensations that are perceived or experienced at the same time; pain, and heat. Through this argument, Philonous is able to convince Hylas that a particular sensation cannot exist in reality if it is not perceived by the mind. He also manages to convince him that heat and such sensations are not a real being. They are only existent if they ar e perceived by the mind. Philonous then proceeds to argue out about sound. Hylas believes that sound is a sensation that is created as a result of movement in the air particles. However, Philonousgoes ahead and shutters Hylas’ philosophical standing because no sensation can exist outside the mind. The mind is what enables a sensation to exist. Hylas eventually agrees that sound can have no real being without the mind, just like the sensation of heat.The next argument that Philonous presents is about colors. Hylas, in his philosophical stand believes that everything that is visible to the human eye has color that is present in it. This argument then develops to one that is based on the sense of sight. At the end of it all, Philonous gets to convince Hylas that color exists as a perception of what we see. This is because when an object is illuminated under different kinds of light, the color appearance seems to change. Therefore, the color of any object is not definite and it i s determined by one’s perception of sight. The argument on things as perceived by sight still continues beyond this point. The two argue about the size and extension. Philonous argues that everything in this world that has the privilege of sight, be it an animal, ant, or any other creature, perceives the sizes of things according to their sight. Philonous gives an example of a mite. A mite at its size is supposed to be able to see its own foot and things that are equal in size or lesser to it as bodies of some considerable dimension. However,

Friday, September 27, 2019

What Happened to the Mayan Civilization The Mistery of A Great Essay

What Happened to the Mayan Civilization The Mistery of A Great Civilization - Essay Example The most famous theories of the collapse of the Mayan civilization are as under however there is no consensus of opinion among the researchers: 1. The Disaster Theory: The researchers of Maya civilization believed that there was surely a catastrophic event which doomed the Mayans. The event may be an earthquake, an epidemic disease, flood or the volcanic eruption. Such a disastrous event can be the only explanation behind the immediate downfall of civilizations. It is reasonable that a large number of people can be killed or displaced only if a sudden hazard takes place. It can at once kill people and destroy cities. The theory is widely celebrated for the reason of the fall of the Mayan civilization (Thompson, p96). The theory matches with religious explanations of the causes of the falls of the nations. This theory as regards the Mayan civilization was however rejected because the history shows that Mayan civilization took about 200 years for its downfall; it was not sudden. Some o f the cities declined while many flourished for quite a reasonable part of the time. Had there been an earthquake, flood, disease or volcanic eruption, each and everything would have simultaneously been removed of the surface of the earth. As this was not the situation, the theory was rejected by a large faction of researchers. 2. The Warfare Theory: The Mayans were a peaceful civilization. But their later history reveals that they were a warring people always busy in wars among in between and against others. Their historical record tells of the fact that they always discovered newer methods of warfare. The stone-carvings deciphered recently openly tell that Mayans fought frequently among themselves. Cities went to battles quite often worth mentioning of which are Tikal, Copan and Dos Pilas. In 760 A.D, Dos Piloas was destroyed after ruthless invasion. The theory is quite an interesting and reasonable explanation of the causes of the downfall of the Mayan civilization. History has a lways told that mutual war-fares and misunderstandings have caused the nations to drown in the seas of obscurity. The researchers have only one query here; whether they fought enough to bring their downfall? This is quite reasonable that war brings with it human sufferings, financial crisis and collateral damage. They warred with each other and the cities of the Mayan civilization caught the fire of distrust and discontent sufficient enough to disbelieve them their culture (Miller, p18). 3. The Famine Theory: In the periods of history between 1000 B.C. and 300 A.D, the basic occupation of the Mayans remained the Agriculture. They practiced in it and earned their livelihood. Agriculture was so largely practiced that even small family-plots were not left uncultivated. Corns, beans and squash were their main plantations. On seas and riversides as well as in lakes, they carried out fishing for their food needs. With their advancement in many fields, the cities grew and their population increased. Their progress attracted people from other civilizations as well. They came and penetrated them. A moment came when their population grew to the extent their resources could not bear any more. The local production was far less than their required limits. They were however an advanced civilization and learnt to upgrade their resources. They improved their agricultural procedures and equipments. They improved their trade. However the penetration of the outsiders and the increase in local population were the issues which

Thursday, September 26, 2019

Entrepreneurship vs. Small Business Essay Example | Topics and Well Written Essays - 4750 words

Entrepreneurship vs. Small Business - Essay Example Researchers, Hofer and Bygrave (2003-4, Pg 6-7) suggests that entrepreneurs are the gap-fillers who given the supply and demand nature of market forces through their skills, perceive and take steps to correct market deficiencies. To encourage entrepreneurs to transform the market, they not only provide new goods and services, they also create more and newer jobs. The jobs increased not only in number but also in diversity - supermarkets have created the job of trolley collector; technology support desks are a by-product of computer technology; medical innovations have resulted in increased layers of new job classifications and descriptions. One hundred years ago, there was no perceived need for these services, nor was there any basis for exploring such a need. Kirby (2003, Pg 786) investigated in his book that by the beginning of 1980s, entrepreneurship was at finest, a likely hopeful ground of academic inquisition. Though, by the finale of that decade, owing chiefly to remarkable progress in its corpse of experimental information, entrepreneurship might assert to be a rightful ground of educational inquisition in every compliment apart from one: it requires a considerable hypothetical basis. A main confront in front of entrepreneurship examiners in the 1990s is to build up theories and models build on firm basics from the social sciences (Welsch, 2003, Pg 4-5). Wickham (2004) observe that subsequent to all, models and theories expect the result of operations. And it is not possible to operationalize an idea that cannot be defined, as an Entrepreneur a person who perceives a chance and makes an association to pursue it. Entrepreneurship vs. Small Business A lot of people make use of the terms "entrepreneur" and "small business possessor" simultaneously. At the same time as they might have a great deal in general, there are noteworthy dissimilarities between the entrepreneurial project and the small business. Jones-Evans Dylan and Carter Sara (2000, Pg 374-375) recommend that Entrepreneurial ventures vary from small businesses in following ways: 1. Quantity of wealth creation - rather than simply generating an income stream that replaces traditional employment, a successful entrepreneurial venture creates substantial wealth, characteristically in surplus of quite a few million dollars of turnover. 2. Pace of wealth construction - while a flourishing small business can produce numerous million dollars of revenue over a life span, entrepreneurial prosperity formation repeatedly is quick; for instance, within 5 years. 3. Risk - the danger of an entrepreneurial venture must be elevated; or else, with the inducement of certain profits several entrepreneurs would be following the thought and the opening no longer would survive. 4. Innovation - entrepreneurship repeatedly occupies considerable innovation further than what a small business may display. This innovation offers the venture the spirited benefit that fallout in capital creation. The innovation might be in the creation or service itself, or in the business procedures used to convey it. The Entrepreneurial Process Allow us start with the entrepreneurial procedure because this is at the core of the topic. Some of the vital characteristics of the entrepreneurial procedure are as follows Commenced by an act of human will. Takes place at the

Wednesday, September 25, 2019

Annotated Bibliography Essay Example | Topics and Well Written Essays - 1000 words - 2

Annotated Bibliography - Essay Example â€Å"Daddy,† according to the argument presented by Strangeways, is a political poem which portrays the holocaust and oppression in deeply subjective, personalised and emotive terms. Narbeshuber contends that critics have misinterpreted both Plath’s â€Å"Daddy and â€Å"Lady Lazarus† as journeys into the poet’s own tortured and troubled psyche. This is not true. â€Å"Daddy,† as with the other mentioned poem, constitutes a declaration of rebellion against the standardized and acceptable images of the female and her relationship with the men in her life. Society and culture have imposed certain behaviors on the female, all of which insist that she be submissive, beautiful and soft spoken. In â€Å"Daddy† Plath declares her rejection of these images and behaviors through outright rebellion. Therefore, this poem should not be read as one which reveals the poet’s own troubled psyche and weakness but as one which declares her strength and independence of societal images and stereotypes. Frye argues that Olsen’s short story is not only an exploration of the complexities of the mother-daughter relationship, as the majority of critics have maintained but, an exploration of the complexities of the mother’s own memories and psyche. In its exploration of the mother’s past, Frye establishes a correlation between the past and the present, illustrating the extent to which the latter is immediately influenced and determined by the former. Frye contends that the authenticity of this story and the extent to which the mother’s memories come across as true leads to the suspicion that this story is an examination of Olsen’s own self. Cox argues that the story exposes the emptiness which dominates the lives of teenagers and which causes them to lose their way, both in the literal and figurative senses of the word. As she contends, the title of the story is not just indicative of its primary theme but instructs readers to interpret the

Tuesday, September 24, 2019

Terminal Operations Assignment Example | Topics and Well Written Essays - 2500 words

Terminal Operations - Assignment Example The harbour has existed since the Roman times and has a number of extensive wharves and docks, on top of a cruise liner terminal. The harbour also has a terminal that serves ferries to connect Malta to Catania and Pozzallo in Sicily. The Marsamxett harbour is located west of Valletta and mainly hosts several yacht marinas. The harbour at Marsaxlokk which is the site upon which the Malta Freeport stands is on the south-east of Malta, and is the main cargo terminal in the republic (Bill, 2004). Also, there are two man-made harbours that are used to provide car and passenger ferry service connecting Marr Harbour on Gozo and irkewwa Harbour on Malta. Malta Freeport is among the most sophisticated terminal hubs in the world. The port has a well established feeder network connecting it to over 100 ports in the Black Sea and the Mediterranean ocean. The port has experienced remarkable growth since it was established and has attracted some of the most renowned international maritime players in the world courtesy of state-of-the-art facilities, proven track record and enviable geographical location (Bill, 2004). Port Authorities in Malta have increasingly appreciated the need for the construction of modern one million TEU container terminals in Malta in response to the need to improve efficiency, effectiveness, and capacity, and globalise terminal operations. The highly automated terminal is expected to use gantry cranes. The construction of the modern terminal will have great consequences for the strategic position of port as well as to its potential clients. Standard-sized containers are commonly used to cargo between different transportation modes such as trains, trucks and ships (Bill, 2004). A commonly used unit of cargo capacity used for describing container terminals and container ships is the teu or TEU, but is an inexact measure. One TEU (Twenty-foot Equivalent Unit) represents a cargo capacity of a shipping container 8 feet wide and 20 feet long without a standardized height. The container height can range from 4.25feet to 9.5feet but more commonly is 8.5feet The construction which is anticipated to offer world-class maritime services will be capable of handling one million teu annually with a potential for future expansion. Several Safety and security issues must be well addressed during the construction of the facility which must also be environmentally friendly (Felix, 2008). The high-level technological gantry equipment used at the terminal must be able to keep drivers, visitors and workers safe while expediting cargo movement using the newest and technologically advanced handling machines. The automated container handling system will make it possible for the management function to closely monitor activities taking place in the terminal through a central monitoring office. CONTAINER TERMINALS In the recent past, methodological approaches in container terminal operations have considerably changed with modern techniques of material handling being adopted (Hans, 2004). Yet another area where significant changes have been witnessed in information and communication as well as the security functions of the organization. Constructing of quay walls, fairways, and terminal areas must therefore be carefully done in line with the master plan which has several security and safety measures on top of complying with current regulations and providing room for future development (Felix, 2008). In

Monday, September 23, 2019

Bus law Essay Example | Topics and Well Written Essays - 250 words

Bus law - Essay Example Frank can only have an enforceable security interest if three conditions are fulfilled: the written agreement includes the value of the car that has been given as collateral, Eddie has rights over the car or has the ability to have rights over that car and also Eddie must have authenticated the security agreement with a description of the car or Frank is in control of the car. If the above three conditions have been included in the agreement, then Frank can say that he has security interests and this is enforceable by law, if not, then he has no security interests and just have to depend on Eddie to pay back the loan as per their agreement. If Frank has an enforceable security interest under the Uniform Commercial Code (UCC) article 9, then he can be granted perfection of the security agreement. This means that he can file a notice in the public office. This notice is for other creditors to be notified of the security interest Frank has in that car. In order for this notice to be enforceable, Frank has to provide Eddie’s name, description of the car and his name or the name of his representatives (if he has security interests already). This notice (also called a financial statement) is valid for a period of five years from the time it is filed, but that period can be extended (Sepinuck

Sunday, September 22, 2019

Argument as Inquiry Essay Example for Free

Argument as Inquiry Essay Sometimes the purpose of an argument is to generate truth, which will then resonate with an audience and be persuasive, but persuasion is the by-product and not the goal (Weeblog). As a society, the importance of communication and the never ending search for truth has motivated great scholars and thinkers alike to express their ideas and values in the form of an argument. As seen from the quote above, the form of an argument not only serves a purpose in generating truth, but also in understanding perspectives and as a mode of relaying information. Truth to most is a relative term. So then how is it possible to successfully argue a truth? The book, everythings an argument provides a clear answer to this paradox, the point of argument is to discover some version of the truth, using evidence and reasonsThe aim of persuasion is to change a point of view, or to move others from conviction to action. In other words, writers or speakers argue to find some truth; they persuade when they think they already know it (Lunsford 6). Therefore, the method of presenting an argument does not necessarily mean the presenter must convince his audience, but simply provide absolute facts. As this varies from culture to culture, the response to a well argued truth can be a simple, quiet acceptance, or a heated debate. Most importantly however, is that in presenting a truth, the speaker or writer is using this argument as a mode of inquiry not only towards those that experience his argument, but towards himself as well. These personal arguments can be seen in a deep meditation or in prayer, and can also be used in a personal decision making. As a result, this purpose for an argument not only helps the speaker to understand the truths and beliefs of others in the world around him, but also increasing his ability to question himself. Understanding perspectives is a very humbling and challenging way to argue. Carl Rogers, a successful psychotherapist who founded the Rogerian argument, achieved a method which is based on finding common ground and establishing trust among those who disagree about issues, and on approaching audiences in nonthreatening ways (Lunsford 6). For that reason, the success of the argument is founded not only in trust but also on the grounds of first understanding others perspectives and principles; encouraging the opponent to genuinely listen and learn from what is said. With a foundation of truth and understanding, an argument can be valued in its ability to provide convincing evidence and information. Philosopher Aristotle provides an elegant scheme for classifying the purposes of arguments, one based on issues of time past, future, and present (Lunsford 10), also known as forensic arguments. Many lawyers, politicians, and great speakers use evidence, policies, and facts from the past to support or justify their present argument. These arguments can focus not only on scientific, religious values, but on existing ethical and cultural differences as well. There are a variety of ways that different cultures handle legal systems, and thus various ways of presenting arguments. For instance, the Muslim religion and culture disparages and scorns women who refute or defy the authority of their husbands. Whereas the cultural ideals of American society encourage women to think for themselves, and challenge their husbands often times with arguments. The ability to understand different cultures can be found in their own method of argument. Additionally, using arguments from the past can serve as a fountain of information and truth, as well provide a solid foundation and validate future arguments. Works Cited Lunsford, Andrea A., John J. Ruszkiewicz, and Keith Walters. everthings an argument. 2nd ed. Boston: Bedford/St. Martins, 2001. Weeblog. Inquiry. 31 March 2003. http://theanswergrape.com/aweeblog/ archives/000971.html

Saturday, September 21, 2019

Planning Process Paper Essay Example for Free

Planning Process Paper Essay I will compare the planning process to my current workplace. Followed by what I believe would be more crucial and why I think that. Also, I will briefly go over why I do not believe organizations can over-plan during this process. The Basic: Planning Process Step #1: Situational Analysis—This step is where you would typically answer the question, â€Å"Where are we now? † (Amicaall). In my current workplace, the main focus in this step is to be sure that the customer is aware of the customer survey that lucky few may receive. Now, the goal is to be sure the ones who may receive this survey are honest when filling it out with the most accurate information. All survey’s are read and sent to the dealership the vehicle was serviced, or purchased. Therefore, any concern from the customer will highly be considered. We assure that ever individual that has an opportunity of receiving one of these important surveys is aware when delivering the vehicle after any services. So that if there is an issue with the service, that they please notify us before filling out the survey this way we are sure the customer is happy with all services. Also, so that the consumer will know how honesty we stand by our word of correcting and listening to their suggestions by making them happy right away. â€Å"Planners should gather, interpret, and summarize all information relevant to the planning issue in question. A through situational analysis studies past events, examines current conditions, and attempts to forecast future trends† (Bateman Snell, 2007). By us being sure that are customers are aware of the survey ahead of time, we are more than likely to get a better knowledge of where we may need to focus more on improving or attempting the consumer’s ideas. By doing so, we are more like to achieve reaching our goals. Step #2: Alternative Goals and Plans—â€Å"based on the situational analysis, the planning process should generate alternative goals that may be pursued in the future and the alternative plans that may be used to achieve those goals† (Bateman Snell, 2007). A lot of our goals set at work are not just to be sure that all customers are happy but also that they know if there’s something that has not instantly been put into effect that we are still in the process of doing so. It may be something that takes a little more financial effort as well as time. For example, a lot of customer have mentioned the would like if their vehicle was washed and vacuumed after every service. We state the following to the customer when this is brought to our attention, â€Å"As of now we are relocating to another facility, fortunately we will be in a bigger building that will also have a car wash available. But for now we have washed your windows and vacuumed the vehicle. We look forward to being able to serve you better. Step #3: Goal and Plan Evaluation—â€Å"next, managers will evaluate the advantages, disadvantages, and potential effects of each alternative goal and plan† (Bateman Snell, 2007). This is pretty simple; the goal and plan evaluation is discussed every morning within our manager meetings. Some of the ideas in plans they’ve discussed in meetings are the following: complimentary snacks, drinks, opening a Starbucks coffee station and mail ing/emailing great coupons, specials off of services, even possibly a parking garage. The managers gather together to see what is best benefiting the customers and if there are any new ideas that may be brought to their attention. One, manager even stated he over heard a customer state to another customer, â€Å"that it wouldn’t be a bad idea if they had wireless internet so that I could continue to work while my vehicle is being serviced, you would think they would be caught up with the technology no days. † If so what they plan on doing to implant them, are they realistic and attainable? While in the meeting they’ll discuss several ideas and examples of how to keep all eyes and ears open for any future goals and plans. Step #4: Goal and Plan Selection—â€Å"once managers have assessed the various goals and plans, they will select the one that’s most appropriate and feasible† (Bateman Snell, 2007). After everyone discussing and gathering information from consistent consumers the dealership has decided to select the following as plans for the future; parking garage, complimentary drinks, a Starbucks station that consists of snacks, breakfast and lunch sandwiches up for purchase. Until the Starbucks station has built their customers, we have coupon vouchers so that the customer may have their first Starbuck’s Drinks for free. As all these ideas come out the next step would be to be sure the news letter gets mailed and emailed out to all of our customers and consumers. The newsletters will state all goals and plans that have been selected for our future facility. Step #5: Implementation—â€Å"once managers have selected the goals and plans, they must implement the plans designed to achieve the goals† (Bateman Snell, 2007). Well, as of now the dealership has implemented a lot of the planned goals. By this I mean, we now have a Starbucks station filled with snacks and many different beverages. We also have put a refrigerator full of all types of sodas and water all complimentary for all customers and purchaser of Toyota Sales and Service. As for the Parking Garage and Car Wash they are both in the works, we have blue prints showing where the next facility will be built. Step #6: Monitor and Control—â€Å"although it is sometimes ignore, this step in the formal planning process is essential. Planning works in a cycle; it is an ongoing, repetitive process. (Bateman Snell, 2007). Now, the way the company monitors and tracks all the works in cycle is by asking all customers that look like they have purchased or used the vouchers if they enjoy having Starbucks. All mentioned it’s a great change and they all thanked the company for taking the time to listen to their ideas. The managers noticed that all surveys they were receiving had plenty comments about how the changes really benefit them. A lot commented on the wireless internet how covenant it was to have service performed on their vehicle and it didn’t even seem that they weren’t at work because they could still use their computer and complete work assignments. To management it seemed that they were on the right track, by listening to the customers they could make most of them happy and keep their business. By doing so it seems that they’re helping to provide a better workplace as well as a great setting for people to achieve personal as well as career goals. In conclusion, an organization can not be very successful if they do not stay within the basic planning process. As I’ve explained above every step is very important, though one I believe is most crucial and that is Step #! Situational Analysis. The reason why I feel this is most important is because if you analyze a situation incorrectly then you may be headed in the wrong direction as far as improving. The situation may not need any correction or improvement at the time, therefore the situation that needs most improvement may be overlooked. I don’t believe that any organization may over plan because the more effort put into planning the more correction or ideas m ay be created. This will prepare the organization for several different scenarios.

Friday, September 20, 2019

Interruption Interception Modification And Fabrication Attacks Computer Science Essay

Interruption Interception Modification And Fabrication Attacks Computer Science Essay The communication has been playing an important role since the dawn of civilization. It has become an integral part of existence in the societies which are highly networked where we live in. A few types of communication types have been developed during the earlier stage of civilization which resulted in evolving many types of communications till today. The communication through the internet is the best examples of the latest communication types.There are different types of communications prevailing in our day to day life such as Radio communication, Mobile communication, Telephonic communication and Network communication. Each communication type has its own importance but the communication over a network has been mostly implemented in our life and has been evolved as the most powerful and highly developed communication methods. The network communication method has created a great impact on lives of humans. So as this method is gradually developing and being used by many individuals a nd organizations, such advance in the technology has resulted in the security issues such as threats or malicious attacks to the individuals and organizations. So there is a need to encounter these threats and attacks which resulted in the introduction and development of different mechanisms for providing different services and CRYPTOGRAPHY is one of the mechanisms which is mostly used in the network communication. TYPES OF SECURITY ATTACKS: There are different types of security attacks which affect the communication process in the network and they are as follows Interruption: This type of attack is due to the obstruction of any kind during the communication process between one or more systems. So the systems which are used become unusable after this attack by the unauthorized users which results in the wastage of systems. Interception: The phenomenon of confidentiality plays an important role in this type of attack. The data or message which is sent by the sender is intercepted by an unauthorized individual where the message will be changed to the different form or it will be used by the individual for his malicious process. So the confidentiality of the message is lost in this type of attack. Modification: As the name indicates the message which is sent by the sender is modified and sent to the destination by an unauthorized user. The integrity of the message is lost by this type of attack. The receiver cannot receive the exact message which is sent by the source which results in the poor performance of the network. Fabrication: In this type of attack a fake message is inserted into the network by an unauthorized user as if it is a valid user. This results in the loss of confidentiality, authenticity and integrity of the message. CRYPTOGRAPHY: DEFINITION: The word cryptography is the science of securing information by different techniques such as encryption and decryption. The word cryptography is derived from the Greek word Kryptos which means hidden and graphia means writing, so totally it means hidden writing. Cryptology and Cryptanalysis are closely related to Cryptography. Cryptanalysis is the process of breaking the ciphers and coded without using a key and whereas the cryptology is the combination of both cryptanalysis and cryptography. In the process of cryptography the data which is to be transmitted and received is enciphered by different keys so that it cannot be understand by the unauthorized users. But only the sender and receiver can be able to understand this data. HISTORY: The concept of cryptography was originated in 2000 B.C. in Egypt where the Egyptians practiced hieroglyphics where it is used to reveal the story of the dead people by decorating their tombs and this process was practiced in order to make them to see more ceremonial, majestic and noble but not to hide the message themselves. But later many encryption techniques have evolved for show into practical applications in order to hide the information from others. The history of cryptography was very interesting and many changes have been undergone through many centuries. During the ages of civilization the important issue was the maintenance of secrecy due to the different reasons by individuals or groups and this secrecy maintenance helps the individuals or groups to gain a competitive edge, the true intentions of each individual can be hidden and also the weakness can be reduced. The innovations or advance in the technology has resulted in the changes in cryptographic history. The process of cryptography has begun by sculpturing the message on wood or stone and then it is sent to the person who has to be received and it is deciphered to the original text by different process. But the development of cryptography has undergone many changes from carving the message on wood to the stream of binary codes. These streams of binary codes are transmitted over network wires, airwaves etc in the past but now these binary codes are sent in the form of 0s and 1s through internet cables or open airwaves. These packets are encrypted so that they are not disturbed by the unauthorized users. The Egyptians have started the process of cryptography by replacing the original message with the different message with the help of cipher and this process is known as substitution cipher where each letter in the message to be sent is replaces with the different letter so that unauthorized cannot understand. This message is again retransformed to the original form by the receiver. For e xample the sentence or message STAFFORDSHIRE UNIVERSITY (Plain text) is changed to TUBGGPSETIKSF VOJWFSTJUZ (Encrypted text or cipher text) where each letter is replaces with the preceding letter so that no one can understand. ANCIENT METHODS OF CRYPTOGRAPHY: During the ancient times there were different cryptographic methods which have been implemented for securing the data safely so that it cannot be accessed by an unauthorized user. So the different methods are as follows Hebrew cryptographic method: This is one of the ancient methods of cryptography where flipping of the alphabets takes place in such a way that the mapping of the each letter in the original alphabet and the flipped alphabet should not match each other that means the corresponding letter in the original alphabet should be different in the flipped alphabet and this method of encryption is known as atbash. ABCDEFGHIJKLMNOPQRSTUVWXYZ ZYXWVUTSRQPONMLKJIHGFEDCBA For example the encrypted form of the word Staffordshire University is hgzuuliwhsriv fmrevihrgb. Spartans method: This method of cryptography was implemented around 400 B.C. by the Spartans where they used to encrypt the message or information by using a sheet of papyrus and a wooden stick or rod. The message which is to be sent is written on the papyrus and it is wounded around the stick or rod and this information can be known by the receiver only when the message was wounded around the correct staff so that the letters would properly match. This process is known as scytale cipher and when the paper is removed from the stick or rod the message which was written on the paper was just found as the group of the random characters and this different pieces papyrus are sent to group of soldiers by Greek government with the help of carriers. After receiving the papyrus the soldiers then wound this papyrus around the stick or rod which is of equal diameter and length so that the letters which are random match with the letters with the second rod and the message which is sent can be kn own. The soldiers make use of this method for the information about the strategic moves and military directives. Julius Caesar method: This is also one of the ancient methods of cryptography where Caesar developed a method where the letters of the word are shifted by some number which is set. He developed this method because of his non trustiness on his messengers. So he used to shift the letters by the number 3 such as the letter A is replaced by letter D. So the one who knows the shift by 3 rule can only decipher the message. STUDENT (Plain message) VWXGHQW (encrypted message) CONCEPT: The main concept of cryptography is the process of securing the information by changing the original form of the text or message to the form which cannot be read by the unauthorized user. The message which is sent originally by the sender is known as plaintext which can be read by everyone and the encryption technique is applied to this plain text which results in the formation of cipher text or encrypted text which cannot be read by an unauthorized user. An encryption algorithm is used to convert the plain text into cipher text and again this cipher text is retransformed into plain text by decryption algorithm. This means that cryptography is the science which is used for protecting the message or information by providing different ways and process in order to convert the message or information which cannot be read by anyone. The data or message is converted in such a way that the No access of data for an unauthorized person Information present in the data frames is hidden Data authentication is formed The altering of the data is avoided The message originator cannot disown the data So the information which is transmitted on information and communication systems can be protected or secured by the technology known as cryptography. This technology is applied in many fields such as finance, personal data, military etc.This technology provides a means of authentication verification of the data so that the real culprit can be caught who interrupts the confidentiality and integrity of the data. DIFFERENT TERMS IN CRYPTOGRAPHY: Cryptography: The science of protecting the message or data by using different techniques is known as cryptography. Cryptosystem: The process of encryption and decryption comes under cryptosystem. Cryptanalysis: The process of converting the plaintext from the ciphertext without use of a key. Cryptology: It is the combined study of cryptography and cryptanalysis. Encipher: The act of converting the data which is cannot be readable by an unauthorized user. Decipher: The act of converting the data into readable format. Plain text: This is the original message or the initial message which is sent by the sender to the recipient. This also known as clear text or original text. Encryption: This is the process of converting the plaintext or original text into the text in order to cover the message which cannot be understood by any unauthorized users. Ciphertext: The text which is sent for encryption results in the form of text known as cipher text or encrypted text which cannot be read by unauthorized users. Decryption: This is the opposite of encryption where the encrypted text or cipher text is retained to its original form by using this technique. The conversion of cipher text to plain text takes place in this process. Hash algorithm: This is the algorithm which is used in the encryption technique for the conversion of large string to the fixed length string. This increases the speed of the process. Key: Key is the specified value which is used for encrypting the plaintext to produce the ciphertext.The value of the key will be very high. It is the series of bits and instructions which governs encryption and decryption Cipher: This is the algorithm which is used for the translation of the plaintext to the ciphertext which is the intermediate form GOALS OF CRYPTOGRAPHY: The main objective of the cryptography is to secure the information which is sent from the sender to the receiver so that it cannot be accessed by any unauthorized user and in order to maintain the security of this information cryptography has need to take care of some characteristics which are as follows Confidentiality: The phenomenon of confidentiality plays an important role in cryptography. Confidentiality is the method of securing the information or message such that it can only be accessed only by an authorized user who is proposed to read it. The confidentiality of the information loses its importance when it can be accessed by an unauthorized user. So when a message is sent from A to B, only B should be able to understand the message. Authentication: The phenomenon of authentication also plays a major role in cryptography. The identity of the sender who is sending the message is very important for the receiver. So this is the process of sending the identity proof of the sender to the receiver such that the receiver can be able to know the person who is sending the message. The main concept here is the assurance. Integrity: The integrity of the message has very much importance in cryptography. The message which is sent by the sender should be the same when it is received by the receiver. The message should not be altered or changed during the transmission process by any unauthorized users. So this is the method of making sure that the message which is sent is not altered or tampered during the transit. The contents which are present at the sender should reach the receiver with the same contents without any change. Non-repudiation: This is the method to make sure that the message which is sent is nor disowned. The s ender after sending the message should not declare that it has not sent the message .Once the message is sent by the sender then he is the originator of the data. He has no authority of denying of sending the data. So these are the characteristics of cryptography where all these elements are maintained and implemented during the process of transmission of data from sender to the receiver. CRYPTOGRAPHIC or ENCRYPTION TECHNIQUES: A key plays an importance role in the classification of the cryptographic techniques. The number of keys used decides the type of cryptographic techniques used. So the two important cryptographic techniques area s follows SINGLE OR SECRET KEY CRYPTOGRAPHY OR SYMMETRIC ENCRYPTION: The single key cryptography is one of the main cryptographic techniques where only a single key is used for encryption and decryption of the data or message. So only a single key is responsible for the process of encryption and decryption. This is also known as symmetric key or secret key or private key encryption. So the process of encrypting and decrypting the message or information or data with the help of a single key is known as single key cryptography. The same key which is used for encryption is also used for decryption. The important point of this type of cryptography is that the both transmitter and the receiver should accept on the same key. Symmetric cryptography or encryption between A and B: The process of single cryptography takes place between A and B by sending the message between them. The message which is to be sent by A should not be accessed by an unauthorized user and it should be able to read by only B. In order to make sure that only B has to read the message then a secret key is generated by A. So the secret key which is generated is used for the encryption of the message and this encrypted message is sent to B in the form of ciphertext.This process is known as encryption.Inorder to read the encrypted message by B there is a need of the secret key which is generated by A. So the secret key is transmitted by A to B by different means. The key can be sent to B directly in person by A but it depends on the distance between A and B which effects time. If the distance is more it takes more time and vice versa. The availability of B also plays an important role in sending the key. So as soon as the key is received by B then the decryption of the data takes place wit h the same key in order to retain its original form which is the plain text. So the secure transmission of data takes place between A and B. PROBLEMS IN SYMMETRIC CRYPTOGRAPHY: The main problem in symmetric cryptography is with the key which are used to encrypt and decrypt the data or message. The key which is used here is not more secure.Inorder to transfer the message in the symmetric cryptography the sender should send the key along with the message through internet in the form of e-mail or through IRC services. So this type of transmission of keys is more insecure so that the data can be altered or tampered. The key can be transmitted physically but the distance between the sender and the receiver plays an important role and which is insecure. The process of transferring the key verbally through a phone line results in the leakage of the conversation to others. The sharing of the keys is also one of the problems in this type of cryptography. The other problems in this type of cryptography are key distribution and key management. This type of cryptography lacks in providing data integrity, non-repudiation and data authentication. Digital signatures canno t be created by symmetric cryptography. PUBLIC KEY CRYPTOGRAPHY OR ASYMMETRIC ENCRYPTION: The public key cryptography is also one of the main cryptographic techniques which is used for the secure transmission of data. Based on the security issues which are limited in secret key cryptography the public key cryptography has been evolved. This concept was introduced by Whitfield Diffie and Martin Hellman in 1975. The process where the encryption and decryption of the data or message takes place by two keys instead of a single key is the public key cryptography and this technique is known as asymmetric key encryption. As the name indicates asymmetric key encryption, one key is used for encrypting the data and the other key is used for decrypting the data. These two keys form a pair of keys and the combination of these two keys is known as key pair. The two keys which are used here are public key and secret key or private key. The public key can be liberally distributed to any one which is used for encryption and thus this is named as public key encryption. The other key which is the private key or secret key cannot be distributable to any one and is used for decryption. The secret key is private to any communicating part participating in the process. In this type of cryptography the message or data can be encrypted with only one key and decrypted with the other key where the key which is used for the encryption cannot be used for decryption. So the data or message which is encrypted by the public key should only be decrypted by the private key and vice versa that means the data which is encrypted by the private key should only be decrypted by the public key which results in asymmetric cryptography. Asymmetric cryptography or encryption between A and B: The asymmetric key encryption takes place between A and B by sending message or data between them. The message which is to be sent to b should not be accessed by any unauthorized user. So the decryption of the message should take place with the help of the private key by B. So B contains both the private key and the public key. The public key which is distributable is distributed to A and then A encrypts the message or data with the help of the public key which is sent by B. So the file which is encrypted by A is sent to B where the decryption of file takes place with the help of the private key. So the message or data cannot be accessed by any one because the private key is used for decryption which results in the secure transmission of data. SO the security of the data is more in the public key or asymmetric cryptography or encryption. The above process reveals that the only the public key is used for encryption and only the private key is used for the decryption of the data which reduces the unwanted access of data by an unauthorized users. The loss of data will be very low in this type of cryptography. The possibility of tampering or alteration of the data or message is very low in this type of encryption. The exchange of information or message is very secure in this process. As in the symmetric encryption the sharing of key is not necessary for the encryption or decryption because it uses different keys for different process. The public key is responsible for all the communications but the private key remains silent without any sharing. So each recipient has its key which is unique and this key is used to decrypt the data which is encrypted by its opposite part. PROBLEMS IN ASYMMETRIC CRYPTOGRAPHY: The major problem in this type of encryption is key lengths. The lengths of the keys which are used in public key encryption are very large of 1024 bits to 4094 bits. This results in the low speed of transmission of the data. The key lengths in symmetric cryptography are less from 40 bits to 256 bits which helps in the fast transmission of the data when compared to public key cryptography. So when compared to symmetric key cryptography the public key cryptography is most secure. The messages can be easily transmitted and can be secured in public key cryptography. The key distribution in the public key cryptography is the main asset for this type of encryption. The key management problem can be avoided in this encryption .the strong cryptography can be provided by the public key encryption which is the revolution in the technology. So public key cryptography has more benefits than private key encryption. CRYPTOGRAPHIC OR ENCRYPTION ALGORITHMS: The algorithm is the step to step procedure or the group of mathematical rules which are used for enciphering and deciphering the message or information or data. There are many algorithms which are used in the cryptography and they are known to everyone. So the different types of encryption algorithms are as follows SECRET KEY OR SYMMETRIC KEY ENCRYPTION ALGORITHMS: As the name indicates that in this type of encryption only a single key or a dedicated key is used for both encryption and decryption. The secret key algorithms which are used widely are as follows Data Encryption Standard (DES): Data Encryption algorithm is one of the secret key encryption algorithms which is the most widely used. The Data Encryption Standard specifies a FIPS approved cryptographic algorithms as required by FIPS140-1.The Data Encryption Standard (DES) algorithm has been developed by IBM in the year 1970s and the adaptation was made by National Institute of Standards and Technology (NIST).This is also specified in the ANSI X3.92 and X3.106 standards and also in the Federal FIPS 46 and 81 standards. The exportation of this algorithm is strictly restricted by the US government such that it could be used by the unauthorized people or government. Data Encryption Standard (DES) algorithm provides basic building block for the data protection. The DES is a block cipher which is of 64-bit block size which converts the 64-bit input into the 64-bit output by applying the 56-bit key to each 64-bit data. There are 72 quadrillion or more keys which are used for encryption. So for each message or the information a suitable key is selected from these possible keys and then the process of encryption and decryption takes place with the same key which is the private key or secret key. But due to the innovation in the technology this type of algorithm has proved insecure which resulted in the introduction of Triple-DES (3DES) ALGORITHM where the name itself indicates that the encryption is done three times which is more secure and uses a different key for each encryption. Controversies around DES: The Data Encryption Standard (DES) has been bounded by different controversies such as the key length which s used is used in this type of algorithm has been reduced from 128 bits to 64 bits which resulted in the compromise on security and the other one is the exportation of the algorithm to many countries. DES APPLICATIONS: The Data Encryption Standard (DES) Algorithm has many applications apart from encryption and authentication of data. So the different applications are as follows Data Storage and Mail Systems: The data which is stored in the computers can be protected by the process of encryption and authentication. The passwords which are created by the users in the computers are encrypted by the systems and are stored in the computer memory. The user when enters the password again for signing then the encryption of this password also takes place and this is compared with the other encrypted password and the access to the computer takes place when they both match otherwise the access is denied. The encryption of the password is done by Data Encryption Standard (DES) algorithm with the key which is equal to the password and the plaintext which is equal to the users identity. The files which are present in the computer can also be encrypted by Data Encryption Standard (DES) algorithm for the storage. The computers have a key notarization system which are integrated into them and are used to secure the files from unauthorized access, modifications etc.This Key notarization also helps in providing digital signature capability by using DES.DES gives the users the ability of exercising a group of commands for the purpose of key management, data encryption and authentication functions. The facilities execute notarization which on encryption seals a key or a password. The sealing of key or password takes place with the transmitter and receiver identities. So the receiver must provide the correct identity of the transmitter in order to decrypt the message. This technique of notarization is applied in ANSI standardX9.17 in order to protect against key substitutions which may lead to the compromise of the sensitive data. The secure mail can also be provided by DES .The conjunction of the mail system and the key notarization system helps in providing the secure mail. The header which contains the information which is necessary to decrypt and authenticate the mail file is appended automatically to the file which is transmitted to the receiver. So the decryption and authentication of the file takes place by the receiver in a near transparent manner. `Electronic Funds Transfer (Wholesale and Retail): This is one of the main applications of the Data Encryption Standard (DES) algorithm. The DES plays an important role in protecting the wholesale and retail electronic funds transfer messages. Different standards such as ANSI X9.9 and ANSI X9.19 have been developed Electronic Funds Transfer (EFT) messages. The efforts made by these communities have led to the formation of encryption standards (ANSI X9.23 Draft) and Key management (ANSI X9.17 ANSI X9.24 Draft) standards. The DES is applied in workstations, point of sale terminals, automated teller machines and host computers. The range of data which is protected by DES is of the range from 50$ to a multi-million-dollar transfer. The main criterion which helps the DES algorithm of its usage in the wide variety of EFT applications is the Flexibility. The standards which are developed for EFT application are being developed globally and so the process of encryption, authentication and k ey management have become global. The daily transfer of billions of dollars is done by the US government and the security of this transfer is taken by the Department of Treasury by initiating its policy on the authentication of EFT messages. The support of the Federal Reserve Bank is given to the Treasury in order to make the policy successful. The system which the treasury is considering uses hand-held tokens which contains DES key which are generated for the purpose of a particular individual. The authentication of the EFT message which contains the individuals identity is done by the key which is supplied by the token. The message which is authenticated is the electronic substitute for a signed paper document. Electronic Business Data Interchange: The very big companies have large part of the business transactions and these transactions should be automatic so that cost can be reduced and increases efficiency. So in order to achieve all these large companies are developing the process of automating business. The traditional method of business transactions which is paper based is replaced with the electronic means of transmission. The ANSI Accredited Standards Committee X12 is responsible for these communications by developing different formats. The transaction between the seller and buyer can be accessed by any unauthorized users. So there is a need for protecting the data from the modification and eavesdropping which is done by the process of cryptography or encryption technique. This technique is very effective in protecting the data from unwanted users. The data which is sent by the sender cannot be readable by anyone unless the receiver. Many DES standards have been developed for the pu rpose of the Electronic business data interchange. The standard ANSI X9.9 helps in protecting the data from the unnecessary modifications by the unauthorized user, the unauthorized disclosure can be prevented by the draft ANSI Standard X9.23.The techniques of ANSI Standard X9.17 used for the secure generation, distribution and the storage of DES keys. The above explained methods are implemented by General Motors and seven associated banks in order to protect their business transactions. ATTACKS ON DES: In addition to these different applications of DES it has some weaknesses which are as follows Brute Force Attack: The brute force attack is the simplest attack to decipher. The attack of brute force on the DES is due to the length of the key which is relatively small that is 56 bit and also computational power of the computers which is increasing daily. In the 19th century this type of attacks are not done by the hackers because the cost of the computers are relatively high and the hackers couldnt afford to buy it. But the innovation in the field of computing and technology made the hackers to easily buy the computers and try to hack. Now a days every computer is used for hacking. The powerful, Faster and cheaper techniques which are used by the hackers are Field Programmable Gate Array (FPGA) and Application -Specific Integrated Circuits (ASIC).The time taken to break the cipher is directly proportional to the key length in the brute force attack. In this type of attack the random generation of the keys takes place and these keys are applied on the ciphertext till the origin al key is generated. So the fake key decrypts the message in to its original form. So the main factor which is to be considered here is the key length. The longer the key length the higher is the security. In a n bit long key 2 to the power of n steps are required to break the cipher. So as long as the key length is going to increase then the secure data transmission takes place in the network communication. So in order to get the safe encryption the key lengthy should be long such as the 128 bits which results in the reliable means of encrypting the message. Differential Cryptanalysis Attack: This type of attack is found near the pairs of ciphertexts where the plaintext has some particular differences and these differences are analysed by this attack when the plaintext is propagating through several DES rounds when they are encrypted with the help of the same key. TRIPLE DATA ENCRYPTION STANDARD (3DES): Triple Data Encryption Standard (3DES) is also one of the encryption algorithms and it is the minor variation of Data Encryption Standard (DES).Triple-DES is adopted by ANSI as the X9.52 standard and also been proposed as a revision of FIPS 46, known as draft FIPS 46-3.This algorithm makes use of a 64-bit key which consists of 56 effective key bits and 8 parity bits. The block size for Triple-DES is 8 bytes and the encryption of the data is done in

Thursday, September 19, 2019

Social Injustice for African Americans in Toni Morrisons Novel, Jazz E

Social Injustice for African Americans in Toni Morrison's Novel, Jazz Jazz, a novel by Toni Morrison, explores many different aspects of African American life in the early part of the twentieth century. This novel tells a story of the difficulties faced by black families living in the United States. Toni Morrison describes in detail a few of the upsetting situations they had to face. She also subtly throughout the book places one or two lines that tell a tale of injustice. Jazz is a novel filled with many stories of inequality affecting the black community. One significant theme that is present throughout the story is the one of unequal rights for African Americans. One instance of social injustice is described in the very beginning of the novel when the reader first learns about Dorcas’ murder. The book explains that Alice knew she would get nowhere even if she chose to prosecute Joe, because lawyers could not help and cops would not help or even take a black on black crime seriously. Had Dorcas been a murdered white girl I am sure that Joe would have been thrown in jail t...

Wednesday, September 18, 2019

Edwin S. Porter :: essays research papers

Edwin S. Porter was both a film pioneer and director. He was a film pioneer because he made people come back to the theaters and start watching movies. His movies also were good because they told a story by editing the move. Being a director he made some of the greatest films in 1902 and 1903. In 1902 he directed The Life of an American Fireman and in 1903 The Great Train Robbery. With these two skills he was able to direct great films and use special camera shots not know of at that present time.   Ã‚  Ã‚  Ã‚  Ã‚  Porter was born on April 21st 1870 in Connellsville, Pennsylvania. There was not really any information on his parents but they did his parents first named him Edward. Since he was pudgy people use to call him Betty. There was really no information on why they called him Betty but I am sure it meant something. In 1893 he joined United States Navy and changed his name. He changed his name to Edwin Stanton instead of Edward Stanton. He changed it after Abraham Lincoln’s Secretary of War, Edwin M. Stanton before he went into the Navy. They did not go into any detail on why he did it but my guess is he did not like his name and changed it. In the resources that I found I could not find much information about the rest of his family. I could not even find any information on what he did in his early years. The earliest I could find was starting in 1893.   Ã‚  Ã‚  Ã‚  Ã‚   In 1895 he started to work for the Vitascope Marketing Company. He would use his talent of electrical engineering with the company. With Vitascope he was in the project of the first projected movie that was shown in New York. That date was April 23rd 1896. He used his skills in engineering at Edison’s Manufacturing Company’s Laboratory. He let Edison for a while and went to Eden Musee Theatre in New York where he an operator. He was in charge of getting the films and projecting them onto the screen. His duties also were kind of illegal because he took a lot of films and edited them together to make fifteen-minute films. He would also take some of Melies films and put them into the show, since he like some of Melies work. The films would range from historical Wars and news films.