Monday, September 30, 2019

Poem Play Story

House of Cards is a series that was produced by Beau Williamson and takes place in a present- day Washington D. C. Setting. The main character Frank underworld, Is a Democrat congressman from South Carolina's district, who creates a devious plan In order to get himself into a position of power. With the assistance of his wife, he is able to under mind and scheme against the President of the united States, by befriending him and other people of power through blackmail, scheming, and even murder. Frank Underworld used his power to influence electoral votes.He made deals and passed laws 2 not for economical growth but for his own personal endeavors. Frank wasn't always this way, he was very loyal to the president at one time. The president chose another congressman to become Vice President, knowing that Frank waited many years for the position. After the president assigned another person is when Frank became enraged, taking matters into his own hands. â€Å"A great man once said, every thing is about sex. Except sex. Sex is about power† Is one of his favorite quotes.I chose this lay not because I am Intrigued by politics, but because of all the deferent turns the plot has taken during the show. Life a Journey Is a poem that Is written by Noreen Carded. A few lines from her poem goes as follows † Now I'm in my sunset years. I've learned my lessons have no fear. I made mistakes along the way. Each time my conscience made me pay. Advice to youth if they allow. Life is precious live well now. † In this poem the Author discusses that in life we all make mistakes that we have to live with and that we should learn from them and move on.She also writes on how we should Just enjoy life. Chose this poem because a lot of my teen and early twenty years I spent not really enjoying life the way a teenager topically would. I am currently in process of changing that and just living one day at a time. The poem describes her as being young and making mistakes, and allowing it to bother her conscience Once growing older realizing there is much more to be enjoyed in life and telling younger people not to make the same mistakes she has. The short story I chose was of David from the Bible.Some of us may know the story of David, who was the small Sheppard that grew up and became king. When David was 3 just a boy, he had brothers that went off to war. The Philistines were hounding them, and blaspheming God. David ventured out to give his brothers food and noticed had faith in God. Knowing that God will protect him against a large man/giant like Goliath, he took five stones into his hand. One stone for Goliath and each of his four brothers. The Philistines all laughed at him, being such a small boy, challenging a giant.They all stood in disbelief after witnessing David taking Goliath Down with a single stone. I chose this story because it displays the true meaning of self confidence. The story of David is in the Bible 1 Samuel 17. Each of these pie ces have impacted me in some way whether it be life, my way of thinking or self confidence. House of Cards series has given me insight on what I would like to call the down side of politics. Even though this â€Å"show† is Just that, it really makes me wonder if politicians are really that corrupt, and whether their decision making really s for the greater good.Like Frank Underworld road to power is paved with hypocrisy, and casualties. † The poem that I chose gave me insight on how to enjoy the simplicity of life and how not to dwell on the mistakes I have made along the way, but rather to learn from them and keep living. Noreen Carded has wonderful themes and her poems are pleasant. Last but not least the story of David helps me to really understand the importance on believing in yourself, even more when you are doubted by others. I don't think of David as an underdog, but more so a confident being with skills.

Sunday, September 29, 2019

Research Paper on Renewable Energy Essay

Research Paper In March 2011, a 9.1 magnitude earthquake hit the pacific coast of Japan, generating up to 133ft tall tsunami waves, which obliterated everything up to 6 mi. inland. According to the NPA (National Police Agency) of Japan, 24, 656 people were affected by this catastrophe, which include the deceased, injured, and missing. The tsunami also affected three of the six nuclear reactors of the Fukushima Nuclear Power Plant causing leakage of radioactive material. Many workers and even civilians worked hard to contain the harmful material for it to stop contamination in other areas, but it already spread. A The Associated Press news writer states, â€Å"The massive amount of radioactive water is among the most pressing issues affecting the cleanup process, which is expected to take decades. There have been other leaks of contaminated water at the plant, and some of it is entering the sea.† Today, the radioactive material has spread out and covered almost all of the Pacific Ocean, harmi ng wild life and contaminating our food. Why do governments and corporations make and allow this technology to be used if it can contaminate our world and us? There are better and more beneficial sources for renewable energy other than nuclear power. Technology has advanced tremendously in the past hundred years. We have created massive destruction weapons, medical equipment, electronics, Internet, etc. I would consider renewable energy sources to fall into this list. Some renewable energy sources would be solar power, wind power, hydroelectricity, and nuclear power. There has been much debate between whether nuclear power should be considered a renewable energy source or not. Some people argue it shouldn’t since â€Å"it produces harmful waste byproducts and relies on extractive industries to procure fuel like uranium† (Kanter). Unlike nuclear power, other renewable energy sources, such as hydroelectricity, don’t radiate harmful material to our environment. Then there are others who argue it should be considered a renewable resource. New York Times journalist indicates, â€Å"pro-nuclear officials from countries including France have been trying to brand the technology as renewable, on the grounds that it p roduces little or no greenhouse gases† (Kanter). I personally do not consider nuclear power a renewable resource. The use of both nuclear and renewable  energy has expanded largely compared to what it was 50 years ago. Most countries like USA, France, and Russia use nuclear power to produce most of their electricity. Countries like Norway, Iceland, and Paraguay mostly use renewable energy sources to produce their electricity and they notice the great impact this technology does towards the reduction of CO2 in our atmosphere. 90% of Paraguay’s electricity is provided from the Itaipu dam. The dam removes 67.5 million tons of CO2 a year. Iceland’s electricity supply is 100% renewable energy and its sources are both geothermal and hydropower. There is so much geothermal capacity that there is discussion about whether or not an interconnector can be built into the UK grid. Norway’s top three sources of electricity are hydroelectric, geothermal, and wind sources. Norway serves the export market by selling their renewable energy to other countries since they only use 24% of 98% g enerating capacity. These are countries that are making a change in the environment. Solar power is being used very much today. Most of the housed in LA, California have some sort of solar panel. Houses are getting their own little renewable energy machine that saves the household money each month, since most don’t even pay electrical bills from excessive energy. When I found out about this, I told my stepfather we should research on getting solar panels for our house. The cost for solar panels varies from 3,000 – 5,000 for 12 panels. The cost of the panels plus the installation would be too much for most people; that’s why solar paneled houses are rarely seen. Trying to be eco-friendly isn’t cheap. People are recently realizing that we have been getting our planet contaminated all these years and that we have to do something about it now. Flyers, ads, and people are telling us we need to stop littering and recycle to clean and care for our planet. Those things do help, but I think there are worse things our planet is being exposed to than just trash. Nuclear power plants, that we created, are being used for energy all over the world and we are not thinking about the repercussions they might bring. We are gambling with our sensitive planet and our lives. What if something like Fukushima happens again, and even worse, what if it happens like in Chernobyl? Do we as the human race want to take that chance? What could this do to our health? The author of â€Å"Nuclear Power is Not the Answer† states, â€Å"no dose of radiation is safe, and all radiation is cumulative. Each dose received adds to the risk of developing  cancer or mutating genes in the reproductive cells† (Caldicott, 44). Caldicott also thinks, â€Å"80% of cancers that we see are caused by environmental factors, whereas only 20% are inherited† (Caldicott, 44). All governments and all corporations around the world need to put a stop to harmful material being created and exposed. It needs to be stopped not only for our plant, but also for our lives and health. We will destroy our planet if we keep creating things like nuclear power plants. Are we going to wait for an earthquake, hurricane, or even terrorist attack to happen for us to realize the negative effect nuclear power can cause? Some countries realize this and that is why they use 100% renewable energy from non-toxic sources and machinery like hydroelectricity, wind power, and solar power. Those harmful chemicals don’t just hurt our planet, but they hurt our health as well. We need to realize what we are doing wrong and put a stop to it, before it’s too late for everything. There are better and more beneficial sources for renewable energy other than nuclear power. Works Cited â€Å"Damage Situation and Police Countermeasures associated with 2011 Tohoku district.† Chart. National Police Agency of Japan. Emergency Disaster Countermeasures Headquarters, 2014. Web. 10 Apr. 2014. â€Å"Japan Nuclear Plant Suffers Worst Radioactive Water Leak.† The Associated Press (2013). CBC. Web. 10 Apr. 2014. Kanter, James. â€Å"Is Nuclear Power Renewable?† New York Times. New York Times, 9 Nov. 2003. Web. 10 Apr. 2014 Caldicott, Helen. Nuclear Power is Not the Answer. Melbourne: The New Press, 2006. Print.

Saturday, September 28, 2019

Kldjsl;fkjasd

You need talent, luck, and persistence. Pick any two if you want to be successful. Whether you are a basketball coach or player, you can reach your (realistic) goals and achieve a high level of success with Just two of those three. Don't believe me? Let's take a look†¦ Talent To some degree, what most people refer to as talent, Is nothing more than passion. If you love to do something†¦ you will do it every chance you can. And the more you do it, the better you get.Now obviously there are several uncontrollable factors that determine someone's ultimate talent and success on the basketball court (height, athleticism, etc. ), but in many instances, talent comes from non-stop, obsessive practice. I have never met a lethal shooter who didn't practice all of the time†¦ who dldnt shoot thousands and thousands of shots every single week. Being a talented shooter is 100% controllable. There is no debate that Kevin Durant was born with numerous physical gifts. But so are a lot of people.So how come KD Is an NBA All-Star and 3-tlme NBA leading scorer nd other 69†³ guys never get chance to play past college? Because KD has an unparalleled passion for basketball and he works on his craft every single day. The same can be said for Grelvls Vasquez of the New Orleans Hornets. I met Grelvls the day he got to the united States (from Venezuela) in 2005. He spoke very little English and weighed 150 lbs. Now he plays in the NBA. How is that possible? He made himself talented by working on his game every single day. Same goes for coaching.Who are some of the most talented coaches in college basketball? Coach K? Tom Izzo? Do you have any idea how much time and effort those guys have put into their coaching skill sets? They love the game of basketball and work relentlessly at becoming the best they can be. Talent is the ability to make the most of what you have with where you are. Luck Honestly, I don't believe in luck. I think unsuccessful people use luck as an e xcuse I believe luck is when preparation meets opportunity. I love the quote, â€Å"the harder you work, the luckier you get. There is so much truth to that statement. So that means, in rder to be lucky, you need to be well prepared when opportunity knocks. Do you even know how to prepare? Players, what do your daily workouts consist of? Do you Just Jack up 300 shots or do you take game shots, from game spots, at game speeds? Do you practice ball handling drills looking down at the ball or do you force yourself to look up (even though you may lose the ball initially)? Do you visualize a defender in front of you when making moves to the basket or do you Just do the drill?Do you have a solid strength & conditioning foundation or do you Just play pick-up? Equally important, are you a great teammate? Are you the type of player other players like to play with and coaches like to coach? Trust me†¦ you'll be a lot luckier if you are! Coaches, do you Just study the X's and O's or do y ou work on communication and leadership? Do you put all of your focus on your out-of-bounds plays or do you spend time learning how to most effectively communicate wltn every memoer 0T your program? Do you relnTorce great work habits with your players 365 days a year?Do you read, watch film, and network with other coaches? I realize many resources cost money†¦ camps, clinics, DVDs, and trainers, which can me a limiting factor for some. However there are numerous resources that don't (like this blog or my YouTube channel). Find them. Use them. If you want to be lucky, you need â€Å"to be in the right place at the right time. † Instead of waiting for that to happen, you need to make an effort to create real value in every place you go and every person you come in contact with. When opportunity knocks, will you be prepared to answer?Persistence This one is pretty obvious. Don't give up on anything you cant go a day without thinking about it. Never quit. Keep practicing. Ke ep working. Most people think they are persistent, but in reality, they give up after a couple of â€Å"no's† or a few minor failures. Be too stubborn to quit. Don't be so pigheaded you won't try to new approaches or make adjustments along the way†¦ Just don't quit. Ever. My twin sons, Luke ; Jack, are 2 h years old. They have an unyielding persistence. They don't stop until they get what they want! They are relentless and they don't take no for answer.While that has certainly caused me some grey hairs, I hope it is a quality they never out grow. If they apply the same persistence to the game of basketball as they do to wanting to be fed†¦ they will indeed be McDonalds All-Americans in 2028! Bottom line is this. If you want to be successful, on the court, or in anything in life.

Friday, September 27, 2019

CSR Essay Example | Topics and Well Written Essays - 1500 words

CSR - Essay Example 16-22). It is highly important for an organization maintain strong relationship with, customers, business clients, employees and several external stakeholders. Effective business operation sustainability and CSR activities can help an organization to maintain strong relationship with the stakeholders and several shareholders. The essay will support that the CSR reports of the organizations generally provide useful information on the environmental performance and corporate social performance by considering the example of Tesco Plc and several other firms by considering several accounting theories. Discussion Instrumental theories In this theory CSR is seen as a strategic tool so that it can achieve the economic activities of a company and can ultimately lead to wealth creation. According to the Friedman view, it is seen that the only responsibility of the business it has towards the society is maximisation of the profits of the shareholders while working within the legal and ethical f ramework of the company. This theory has long enjoyed the acceptance of the business across the world. Such concern for profits include taking into consideration the interest of all the stakeholders of an organisation. It is argued that in some conditions such satisfaction can increase the overall profit and hence result in maximising the shareholder value. It has been seen that there is a positive correlation between the social responsibility and the financial performance of the companies (Brennan and Merkl-Davies, 2013, pp. 109-132). Here there are three main groups of instrumental theories on the basis of the economic objective of the company. The first is the maximization of the shareholder value. The second is focusing on the strategic goal of achieving the competitive advantage. The third is the related to the cause-related marketing efforts of the company. British Petroleum understands this aspect much better. The policy statement of BP commits the company to its wide ranging business policies. The CSR report of the company illustrates way the company is meeting those commitments in a way which supports the profitability of the company. Hence by focussing on the Strong financial performance the company can invest the profits into their CSR activities (Deegan and Rankin, 1996, pp. 50-69). Political theories Political theory is an effective CSR accounting theory that used to focus on the interaction between the society and companies and their responsibilities towards the society. There are three divisions of this theory that are discussed below. Corporate Constitutionalism According to this concept the social responsibility of an organization generally arises depending upon the available social power of Organization. Coca Cola Company is one of the leading organizations. The organization implements several green strategies depending upon its social power. Effective water recycling strategy helps the organization to maintain is leading organization within global soft drink industry. Social Contract Theory Jean- Jacques Rousseau was the political economist who posited the social contract theory. According to him the individuals form a social contract with the state so that responsibility of citizens of the state is entrusted with the government. Thus the people are the source of the collective political sovereignty of the state. Thus the government was performing the functions of the common people after undergoing a

Thursday, September 26, 2019

Network security Essay Example | Topics and Well Written Essays - 750 words - 2

Network security - Essay Example This organization has helped the company reduce costs, respond better to organizational needs and customer base to orders, and procure services quickly. The current security setup is consistent with the context of the organization and the network type as people accessing the network include employees of the company who are trusted to use the network in an ethical and legal manner. It has emerged that company communications and data relating to component stock planning, distribution and support are mostly use the network. The idea compels the company to constantly advance to motivate sales performance. Although VAC supply chain data and company communication is in accordance with the network current size of the local area network, the company has expansion plans that focuses towards increasing the size of the supply chain to include outside suppliers and customers. More importantly, the company aspire to communicate with its customers using its computer network and a wide area network WAN. The issue gives national connectivity, which is essential for its business agenda. It is with this respect that the paper will analyze the current LAN security considerations applicable in the company and propose a new network security applicable for the WAN connectivity. The stages of security analysis for VAC, network security design, security implementation and security management transpires elaborately. The proposed solution is highly anticipated to provide sufficient security for a bigger VAC using Wide Area Network to facilitate better communication with its customers and suppliers. The important concern in LAN is security, which is mostly evident in WLAN where a large number of information travels across the air in the form of radio waves. Wireless networks subjects to intense security threats as compared to wired networks. Since they are the latest focus of

Bus Alice EEOC Board Essay Example | Topics and Well Written Essays - 250 words

Bus Alice EEOC Board - Essay Example The incident brought to a question whether the argument of making women separate themselves from men would work in the Park City Restaurant following the report of Ruby Tuesday of gross revenue of $1.25billion in the year 2013. Tighe observed this odd case and asked employers to avoid bringing the decision related to gender matters that is being applied by BFOQ. According to the author, the issue of gender discrimination is seen as uncouth barbaric behavior that should not be entertained in any society. He termed the act of gender discrimination as a ‘’Red Flag’’ (Allen Web). Allen gives reference using the press released by the EEOC’s San Francisco Regional Attorney William R. Tamayo, which talks negatively about cases related gender like that released by Ruby Tuesday’s about a job advertisement (Allen Web). Gender discrimination is a warning saga to most employers. Seattle Field Office Director by the name Nancy Sienko said that the company could have addressed any privacy concern that may come by providing separate accommodation entities for both male and females working in Park City. I am of the opinion that gender discrimination brings hatred amongst members of the society simply because others will see themselves better than others. All were against gender discrimination led by Ruby Tuesday. The Author went further not responding to a call for a comment about the incident that is now pending U.S. District Court after the District of Oregon attempts failed to meet the initial litigation through the EEOC conciliation process. The body i s now seeking financial damages on behalf of Herrera and

Wednesday, September 25, 2019

Management for Organizations Term Paper Example | Topics and Well Written Essays - 1250 words

Management for Organizations - Term Paper Example No matter which segment of the industry this contact center provided services to, the fundamental principles of management never changed. Effectiveness and efficiency are the two governing principles. While the other five changed from one to other depending upon the nature of client and the objectives it set. For instance, if a government organization like the national sui gas company would like to take services of the contact center, the primary concern would be to take care of the orders and try to convince the customers in whichever way possible. This allowed the call centers agents and operators to get aggressive or sometimes even hang-up on customers that were not really converting into sales. As the government departments don’t really need to sell to be able to generate cash. They have different set of rules. On the other hand, when it’s the private companies, they need to be able to retain their customers and be able to develop a real presence with them, as they need to give them better services than the competition. Here are five elements and their implementation at the ABC Inc; Planning Whenever a task needs to be started, it starts with proper planning. Each goal is derived from a specific service response (Nelson, 2008). Like every other successful company ABC Inc. also undertakes planning very seriously as the whole progress depends upon this blue print (planning). For instance when a new client approaches the company to start providing services the top managers and the client representative sit together to figure out the details. The top managers ask almost every possible detail they can extract from the client so that they put in all factors in the planning process. This would involve the budget they have, their short term and long term goals, their priorities, their desired customer portfolio and their weekly milestones. This list is matched with the company’s current services, and the bargaining is done to make sure that eve ry detail is settled right at this planning phase. When this agreement is made then comes the internal planning of the company. An in house meeting is held where all the people from concerned department are gathered. The top manager gives a presentation about the new client and the respective project. This presentation is customized and is kept brief as the pre planning is done at the agreement time. This phase is scheduled for working forward from the briefings given by the top manager with the approval of the chairman and the president. Then the senior HR manager comes to give his part of the presentation to describe the plan. This part is extremely crucial as each task is broken down and assigned to the relevant person/department. Participants to the meeting are encouraged to ask questions, raise their concerns or even argue if they think there is a better alternative. Leading Leading comes after the panning is done. Without leading there is no following, and eventually there is no productivity. At ABC Inc. leadership is given paramount importance, as there have been many times when a project is very difficult, pays very low or is extremely difficult to run. However, when the effective leader like the VP or the floor manager steps in

Tuesday, September 24, 2019

Issues of Freedom and Power Essay Example | Topics and Well Written Essays - 1250 words

Issues of Freedom and Power - Essay Example Economic freedom- Knights of labor Knights of labor, a major labor union during the 1860 hold a significant role in the evolution of economic rights in the United States. The formation of Knights of labor was the first efforts in the national labor organization because it was among the first labor unions to rally its members behind a goal. Nonetheless, the Knights of labor were a secret union characterized with less political pressure on its members. Uriah Stevens was the founder of the Knights of Labor, with many of his followers being Irish immigrant who were mainly Catholics. As a labor union, the Knights of labors enrolled members in various states to champion for improved rights of workers. Formed at a time when the United States repressed freedom of expression, the Knights of Labor worked in secrecy often recruiting its members using oaths and rituals. The main thrust of Knights of labor was to advocate for better economic reforms in their industries. At a time, when most of the immigrant received little pay and poor working conditions, the Knight of Labor became the ultimate vehicle to push for meaningful economic reforms. While the Knights of Labor avoided using industrial action, some of its members in states like Chicago were ready to strike. In 1886, about 80,000 people marched through Chicago supporting an eight-hour work shift. The long working hours were one of the main reasons that prompted the demonstration by members of Knight of Labor. This ignited confrontations between the Knights of Labor and the police who wanted to maintain law and order. In a social perspective, the Knight of Labor represented a growing awareness of rights among the workers. For instance, the call for an eight-hour work shift displayed a growing interest in social welfare among the workers.ii Most important, the meeting and demonstration among the workers guild indicated that rising level of social empowerment among the workers. Largely, the Knight of Labor has achieved many social gains because of its transformation from a secret labor to expressing its interest in various cities. Knight of Labor also championed for an end to child labor, a phenomenon that had characterized the American Labor environment. The political manifestation of 1960 would be incomplete without mention Knight of labor. Within the Knight Labor, there were some groups with interest to take control of the union. After leading a series of strikes, the government sentenced Albert Parson to death. This event made Lucy Parson seek ways of saving men that the government had convicted for deaths during strike. After visiting Europe in 1888, Lucy returned back American expressing new optimism in labor movements as she addressed workers and pressurized the state to create more projects in order to employ people. Political freedom (Progressivism- muckrakers and reform) The political freedom in the United States is a product of struggles that defined and helped create meaningful political reforms. With growing interest for political reforms, a group of Journalist joined hands to highlight on the wrongs of government through the literary works, which they published in magazines such as The Saturday Evening post McClure’

Monday, September 23, 2019

Critical Success Factor Report Essay Example | Topics and Well Written Essays - 3000 words

Critical Success Factor Report - Essay Example Apart from that, the study will also analyze the macro environment (political, economic, social, and technological) of Great Britain. Important aspects such as communication strategy, pricing strategy and customer services strategy need to be designed carefully to sustain the competition in the market. This report will examine each of these strategies required for the bathroom manufacturing company. The next half of the report will offer a brief introduction of the company. John Lewis: A Brief Overview John Lewis can be referred to as a chain of departmental stores that operates throughout the United Kingdom (UK). It was established by John Lewis in the year 1864. Presently it is headquartered in London, United Kingdom. Initially the business started as single store operator, but during the year 1920 it established departmental store chain model through John Lewis Partnership (Davidmann, n.d). The partnership model emphasize on ownership of employee and their contribution as stakehol der to the departmental store chain. There are more than thirty eight thousand people working in the departmental store chain and each of them acts as a partner to the company (McCallion, 2010). The group has been ranked as one of the top five departmental store chains of Great Britain. This British departmental store chain has already opened thirty seven outlets and is planning to open few more within next 2 years. Customer Analysis John Lewis has established itself as premium departmental store chain in last 146 years. This departmental store has become a â€Å"cool† shopping destination for many people. Oxford outlet of the chain was founded in middle England in order to provide shopping solution to customers belonging to the central part of Britain. Marks & Spencer (M&S) is another favourite shopping destination for many people in Great Britain and is a strong competitor for John Lewis. Customers believe the ambience of the departmental store (John Lewis) chain is appeali ng and they like to spend more time in the outlet. Customers feel that lighting system of the stores is designed in such a way that it highlights each product separately. Any person entering the store can easily identify his/her favourite brand, thereby making the purchase decision easier. John Lewis has a customer base of people who like to shop for branded items. People belonging to higher income and middle income group are the major customers of the departmental store chain. Married couples and families also visit this departmental store chain to purchase different items. Customers prefer to shop for stylish items such as watch, designer clothes, bathroom items etc. Many customers perceive that after sales service is a critical factor behind the success story of any retail outlet. Employees working inside the stores are the greatest asset to the company. Employees own a percentage of shares in group’s business and they also earn a yearly bonus. Customer friendly behaviour and prompt after sales service made this British departmental store chain a preferred shopping spot for many customers. John Lewis also provides home delivery services for bulky items. Hence customers like to shop in this departmental store chain for aforementioned reasons. Ambience, customer service and availability of

Sunday, September 22, 2019

Fahrenheit 451 Essay Example for Free

Fahrenheit 451 Essay Mildred Montag is the prime example of a conformist in the dystopian society portrayed in Ray Bradburys book, Fahrenheit 451. She thinks in the simplistic manner that people like her are conditioned to, and shes married to a fireman, who plays the largely important role of burning books in this society. She spends her days watching the television screens in the parlor and her nights with Seashell Radios buzzing in her ears. At first glance, her life of all play and no work might seem relaxing and blissful. However, it eventually comes to mind that all of her bliss is derived from her use of technology in order to escape from reality. Even then, it will become apparent that Mildred is not actually blind to reality and that her happy disposition is fabricated. Mildreds behavior, considered to be normal in her society, is no different from that of a self-destructive addict in ours. Her favorite pastime is to sit in the parlor and spend time with what she claims to be her family, but is really just a bunch of characters from the programs she watches. A description of what was shown on the screen during one of the programs was as follows: Abruptly the room took off on a rocket flight into the clouds, it plunged into a lime-green sea where blue fish ate red and yellow fish. (pg. 94). Such colorful and spontaneous effects are much like what many people in our society claim to experience under the influence of hallucinogens, which coincidentally are the types of drugs that are notorious for having the ability to make a person lose all sense of reality. Mildred exhibits a sign of addiction when Guy, while he is sick in bed, asks her to lower the volume in the parlor, and she responds by leaving the room, [doing] nothing to the parlor and [coming] back. (pg. 49). This shows that she cares more about a piece of technology than about the welfare of her own husband. Likewise, in modern-day society, addictions tend to practically take over the entire lives of people who suffer from them, thus driving the addicts to sacrifice connections with their friends and families in order to satisfy their cravings for whatever it is that they are addicted to. It is also mentioned that Mildred occasionally likes to drive around at night, at dangerously high speeds just to feel a rush or a temporary high. Generally, people are believed to resort to such methods of addictive behavior when they feel that they are unable to enjoy a normal life. Reasonably enough, the reality that Mildred tries to escape is indeed dull, empty, and unenjoyable. She depends upon her addictions to help her fill up the void, as is depicted literally when she receives the endoscopic treatment after her overdose at the beginning of the book. As it says, Go on, anyway, shove the bore down, slush up the emptiness, if such a thing could be brought out in the throb of the suction snake. (pgs. 14-15). In this situation, the drugs serve as the technology she utilizes in an attempt to make a physical escape from the life she leads, and once the operators extract those drugs from her body, there is nothing left inside, save perhaps emptiness. The line mentioned could either be stating the fact that emptiness is intangible and cannot be taken out, or hinting that emptiness itself wasnt even there to be removed in the first place. On a similar note, Mildred overindulges in technology because her life would be utterly meaningless without it. As if it werent significant enough, the very fact that Mildred attempts suicide is a solid sign that she does not have anything she feels is worth living for. That being said, just from the knowledge that Mildred makes an effort to escape from reality, one can derive that she has to have a certain level of awareness as to the existence of what it is she tries so hard to separate herself from. She believes that by not acknowledging this awareness, she will be able to fully convince herself that her means of escape is her reality. For instance, when Guy tries to convince her that books may add meaning to their lives, she argues that books arent people and that her family is people. (pg. 73). However, when Guy asks her if her family loves her with all their heart and soul, (pg. 77) she is at a loss for words. Much like what happens when Clarisse asks Guy whether or not he is happy, this question forces Mildred to think strictly about what is real. It reminds her that deep down, she knows that her family consists of fictional characters who cannot harbor real emotions and thus, cannot requite her love for them. This is part of the awareness that she refuses to acknowledge, and she is stunned when Guys question catches her in her disguise. Unfortunately, she does not accept that she has a problem and proceeds to change the subject in response to his question. Towards the end of the book, when Mildred leaves the house as the firemen arrive to burn it, it can be inferred that technology does not have the effect on her that she desires, and that it cannot save her from her reality. One can recall that earlier in the story, an old woman chooses to stay in her house and burn along with her books, causing Guy to realize that books can help people to find in their lives a meaning that does not exist in his or Mildreds. Mildred does not stay to burn with the parlor that she makes such a big deal out of throughout the course of the book. In this way, she inadvertently proves that the parlor and the other forms of technology she attaches herself to, do not provide her life with any real meaning. Mildred is initially unhappy because she subconsciously wants her life to be meaningful, and it is not. She may not be aware of that specific problem, but there is no denying her awareness that something about her life makes her feel unsatisfied. Instead of acknowledging her problems and facing them head-on the way her husband deals with his, she tries to smother her negative emotions by resorting to physically and mentally unhealthy behavior in a futile attempt to run away from the reality which contains her problems. As her actions can only allow her to reach temporary highs and reality is something that will never disintegrate, it is impossible for her to achieve what she desires by means of the methods she uses. These problems merge to spiral her into a constant routine of highs and crashes; all the while, her initial problem never gets taken care of. As a result, she feels even more trapped in this seemingly endless cycle, and her efforts to make herself blind to reality only prolong her agony and make her even more unhappy in the long run.

Saturday, September 21, 2019

Role And Status Of Women In The Police

Role And Status Of Women In The Police Q. Its not blatant sexism, its more like a sexual undercurrent (Female Police Officer cited in Foster et al. 2005). From your reading of the broader research literature, how well does this statement describe police working culture? Review the implications of your answer for the role and status of women in the police. I do not wish them (women) to have power over men, but over themselves. Women have historically played the role of the protected not the protector. The police force is historically a male orientated domain. Policing was seen as a job allocated to tough, manful acts of crime-fighting and thief-taking. This lent itself to a male, macho culture in which women played no part. As aptly put by Malcolm Young, the opportunities for women are constrained by hierarchies of dominance in which the masculine view prioritizes. For this reason gender is a difficult concept in the masculine culture it creates. For the few women who did enter into this male club they were assigned to station duties as opposed to pounding the street. The initial idea of policing was strongly linked to masculinity, historically males were responsible for physical labour and protection of the family. Women have had to fight hard against this stereotype and it is an uphill struggle they seem still to be fighting today, h owever with the emergence of this discrimination brought forth by the Stephen Lawrence tragedy, policing has come under tight scrutiny. In order to fully examine whether there is discrimination towards women in the police force there needs to be a discussion on womens history, outlining any progress over the years, and experience in modern day policing. This will uncover the dominance of any discrimination and the steps taken to counter it. Before any such analysis can take place there must be analysis into what constitutes an undercurrent. Is it present if one officer said something weekly, should it be rather a group of officers and what is the frequency of this behaviour? conversely what is the definition of blatant sexism. Is it blatant if the comment is directed straight to a women about an issue solely related to women, quote about period. Also can this be said to be sexism as a concept or simply miss placed humour? Blatant is defined as, without any attempt at concealment; completely obvious. These two ideas are not easily categorised, they appear to have a fluid quality rather than definite perimeters. In order to understand these things as a concept there needs to be an examination of modern and past policing and the resulting experiences. Women being fully integrated into the police force is a recent development. Previously women police officers were a separate part of the police. Margaret Damer Dawson, an anti-white slavery campaigner, and Nina Boyle, a militant suffragette journalist founded the Women Police Service in 1914. This was made up of women volunteers and it was not until 1930, women police were fully attested and given limited powers of arrest. In 1969 the womens branch of officers was dissolved in anticipation of the Equal Pay Act. Despite this women police were still treated as a separate section of the service. Women were not completely integrated into the police force until 1973. This suggests any discrimination faced by women may not be direct as could be seen towards women in the army, where women are excluded from positions which require face-to-face combat with the enemy. There has been legislation put in place to help with this integration but despite the apparent willingness to treat women as eq uals there may still be an undercurrent of sexism throughout the force. The first step seen to integrate women in the UK was the Sex Discrimination Act 1975. This Act made it unlawful to discriminate against women, either directly or indirectly, in the field of employment. It seemed optimistic at best to think that one act of parliament could change a history of discrimination and ingrained ideas about gender. The male culture was not keen for radical change from their conservative origins. This prevalent masculine culture is shown from a quote taken after the legislation was passed from sergeant Sheena Thomas, before I was promoted, a senior officer told me that once I remembered I was a mere woman and not police officer, I would get on far better. A challenge to the male dominated structure was not welcome making application not openly enforced. The history of policing is important in discussing modern policing as it allows for a better understanding of society ideals, as Reiner said, An understanding of how police officers see the social world and the ir role in it cop culture is crucial to an analysis of what they do and their broad political function. In recent statistics a division between women and male officers is prominent in not only the amount of female officers but also in promotional positions. According to the official statistics dated 31st March 2009 across England and Wales, women are not a particularly well represented group in the police force. The number of full time officers reached 141,647, out of these 32.8% were female police officers. This illustrates how women are still a minority group in the police force however there is further data that may give more weight to a claim of sexism in police practice. Women, in the same year of statistical data, were also shown to be under represented in positions of authority in the police. Examples are as follows; Male Female Total percentage Chief superintendent 448 60 508 12% Superintendent 938 120 1,058 11% However at the lowest position there is a greater equality in distribution; Male Female Total percentage Constable 79,430 30,801 110,231 28% The difference in numbers between women and men in the powerful positions could relate to the lower numbers of women applying to the police force. The question has to be asked is why are so few women applying to the force? There could be many reasons why women do not apply to the force, the obvious issue which stands out when thinking about police work and the gender divide is the nature of the work. This is generally thought to be male orientated due to the notion of the physical aspect attached to the job and the danger involved in it. Womens bodies have become a way of defining their readiness for the job. The idea of women as weak creatures is reflected in the police force, mainly in regard to physical strength. This presumed weakness reflects both physical and mental readiness, for the crime fighting nature of the job. In reality however this stereotypical idea of what police work involves may not be representative of reality. Much of police work involves administration and petty crime prevention, it is not the fast pace, dangerous profession TV may imply. For this reason it is hard to see why any physical differences between male and females should make a real difference in the active duty of a p olice officer, self image of the police is that of crime-fighters and this is not just a distortion of what they do, it is virtually a collective delusion Another aspect that leads the police to a more male orientated idea is the offenders with which they deal. As the majority of crimes are committed by men the job lends itself to male officers. This is to do with matching strength, males are seen as the stronger of the two and viewed as better equipped to deal with male offenders. The above statistics show that women are under represented in the police force, but what of the distribution of males and females in positions of power, does the unequal distribution reflect the smaller numbers of women in the force or sexual discrimination? The ratio of men to women in the constable role almost parallels the percentage of the overall police force between women and men, at 28%. This cannot be said of the higher positions. For example the total number of superintendents is merely 11%. This percentage discrepancy between males and females in positions of authority does not match that of the lower ranks, making me more inclined to agree with Sandra and her opinion of womens promotional opportunities: once recruited, their road to the top is certainly a greasy pole'. Research which supports this claim is evident over the years. Kinsey (1985) took empirical evidence in Merseyside that showed 43% of officers under 30 on station duty (least prestigious job) were women. Coffey, Brown and Savage (1992) showed findings that women were under represented in many special departments and totally absent from others. Brown, Maidment and Bull (1992) researched deployment patterns of women police officers which showed that they gravitated towards low frequency labour intensive specialised tasks. An example given for such tasks was supporting rape victims. Anderson, Brown and Campbell said women officers are limited in the amount and type of experiences they are able to gain. This in turn affects their job satisfaction and may inhibit their promotion prospects. That fewer women than men achieve promotion in turn can reinforce male stereotype about womens abilities Research had shown that women feel undermined and undervalued by the predominantly male, heterosexual culture. They felt that their roles in the team were often restricted and that they had to work a great deal harder than their male counterparts to prove themselves. As one officer said, the only thing I can do is just put my head down, work hard and prove myself. Which is depressing, but its reality isnt it. The only way I can earn respect is to work harder than everybody else. This apparent sexual discrimination has not managed to escape the courts when in 1992 Alison Halford, who was the highest ranked serving female officer with the position of assistant chief constable, pursued a sexual discrimination case against Merseyside police Authority. This was a high profile case widely reported in the media about Alison not getting a promotion she felt she deserved after nine attempts to secure the job. The case resulted in a victory and subsequently encouraged other women to take action and in that same year a number of other cases were reported in the media. . However for some it was seen as a step backwards when one senior female police officer said, It has not improved the image of the police and for that reason I wonder whether it has not ultimately damaged the cause of equal opportunities. The case did not go unnoticed with three female duty Chief Constables being appointed by 1994 and the first women Chief Constable, Pauline Clare, who headed the Lancash ire Police Having analysed the recruitment of women into the police and some of the reasons why fewer women go on to join the force than men it leads us to discuss the experiences of women who become policewomen. The police are nested in society so it could be said the female role in society, reflects their role in the police. By this I refer to women not being allow to join the front line of the army or other protective stances society takes towards women. In the research by Wersch it was found that women were associated with suspect specialisms which was known as warm, fuzzy policing. This reflects the idea of protecting women from the harder crimes, which involved more danger, by limiting their roles within the force. So does this mean that roles in the police force are gendered or simply that women find this sort of work easier than their male counterparts? In a US study by Miller it was concluded that women find it not only more comfortable to deal with the image of social work, the touchy -feely type tasks it involved, but were also better at that particular type of job. However it appears that a general statement such as this is sweeping in its assumption that all women as a category find this work comfortable. Many women in the police force feel there is no choice being assigned duties based on their gender and however hard they tried to be just one of the boys all had to face questions about their role and status. The aforementioned need to be one of the boys has been researched as a coping mechanism in order to be treated on a equal footing as their male counter parts. Women feel pressure by the macho culture to either get on with the job given or take on the characteristics of their male counterparts, macho characteristics. Both this idea and that of promotional opportunities are seen in the writing on Malcolm Young, Women who do breach the boundary to penetrate this masculine world can only ever be partially successful and will often have to subsume male characteristics to achieve even limited social acceptability. This apparent adoption of masculine qualities make women who stay in the force, tolerated almost as honorary men. The idea was excellently summarised by Ehrlich-Martin (1980) by identifying strategies of POLICEwomen or policeWOMEN, the choice between fulfilling their traditional role associated with women in society or adopting the male culture. However even women who do not adop t these characteristics and instead opt for traditionally female posts have a hard time. A male officer described a female officers work in the schools liaison department, No cold Saturday nights working the town and lots of school holidays what does she do when the kids are off? (male PC 1994). Women appear to be at a disadvantage no matter what road they choose. Discrimination within the police force came to a head with the tragedy of Steven Lawrence sparking great debate about discrimination within society. Steven was a young black youth who was killed by a group of white youths. The police inquiry was said to be led by racial discrimination and initiated an inquiry. The Stephen Lawrence inquiry led to an exclusion of racial language in the force. For many this was reduced through risk of being disciplined rather than a change in attitude. It was said by a PC in site 7 that officers did not use racist language because it was too risky: Too many people are scared of not grassing you up. This would suggest that without changing attitude through education and understanding the once canteen culture will be driven under ground and felt in less overt forms of discrimination. This infamous inquiry led to a close scrutiny of the force and a home Officer research project entitled Assessing the impact of the Stephen Lawrence Inquiry . The main aim of which was to evaluate the impact of the inquiry, examining the changes it made and the relationships within the force. While it recognised progress made such as the recording, monitoring and responses to hate crime and the general excision of racist language from the police service, there was evidence that these developments were not employed uniformly across the force. The inquiry drew out, not only the structural dimensions of the police in relation to women, but also their treatment day to day through the observational nature of the research. Its clear that structurally the force is kinder to the male in terms of numbers and promotional opportunities but what of the day to day treatment women face. The Stephen Lawrence inquiry was said by many police officers to have removed the workplace banter with one officer saying, you cant have a laugh and a joke like you could However for many minority groups and women this was not a negative thing as they often found themselves on the end of such banter. One female officer stated she, developed quite a hard skin. The issue relating to the womens responses to the question, in my option, lies in the question itself. So what is this banter and does it in fact reflect a sexism undertone. This idea of humiliation was identified in Chaplins work by saying that with pre-existing social structures, defining women as domestic beings and men in the public sphere is enhanced in the police force creating social conflict and humiliation. Policewomen are often on the end of so called banter whi ch reflects their body or that of women around them. The body of women are discussed, measured and laughed at. It is ogled and lusted over, sneered at, ridiculed, drooled over and constrained into a repressed form. Women are seen as over sensitive creatures meaning women feel to complain about this banter between work colleagues would be to reaffirm the male suspicion. Evidence of this is shown in Malcolm Youngs research when he states that, In the 300 nicknames in my fieldname collection, those relating to women almost always symbolize size and ugliness or fasten onto an allegedly sexual potency. Much of the research on this subject agree that there is sexism in the police with the discussion centring around the degree of its prominence however this is not a completely accepted view. Criticism has been made of some literature based on their assumption that police sub-culture is the principal guide to action Waddington argues that this overlooks wider culture, which in turn makes police culture not an insular idea, but a reflection of stories, myths and anecdotes of their wider culture Although much of his other arguments appear unfounded this does strike a cord concerning what annotation the term brings up. Perhaps as Janet Chan said, police culture has become a convenient label for a range of negative values, attitudes and practice norms among officers. This term, by way of its implied expectations of behaviour, causes people who have had no experience with the police to become armchair critics, overlooking the honest, polite, non-violent, non-racist and non-sexist officers evidently in the force. Any marginalisation in the police appears to stem from societies traditional role of women. With the police being nested in society and many of the officers being working class males from lower class backgrounds it appears less of a blatant sexism and more of a lack of education and social upbringing. Sexism cannot be said to be blatant due to the progress of womens integration into the police force. However there is clearly some form of sexual undercurrent stemming from promotional opportunities available to female officers and the banter they experience in everyday work. With society changing there is a new perception as to a women and their place and abilities, so as to womens future in the police I would be inclined to look on it favourably recognising a better understanding in society as a whole. With the emergence of new police officers there will hopefully be a change in stereotypical views of women, through better education and understanding. Throughout this analysis women ha ve been seen as a category and not individuals, perhaps it is in this generalisation that the problem finds it routes, Because I am a woman, I must make unusual efforts to succeed. If I fail, no one will say, She doesnt have what it takes. They will say, Women dont have what it takes.

Friday, September 20, 2019

Concepts of Computer Networking

Concepts of Computer Networking CHAPTER 1: NETWORKING CONCEPTS NETWORKING BASICS: At its most elementary level, a computer network consists of two computers connected to each other by a cable that allows them to share data. All computer networking, no matter how sophisticated stems from that simple system. While the idea of connecting two computers by a cable may not seem extraordinary, inretrospect it has proven to be a major achievement in communications. Computer networking arose as an answer to the need to share data in a timely fashion. Personal computers are powerful tools that can process and manipulate large amounts of data quickly, but they do not allow users to share that data efficiently. Before networks, users needed either to print out documents or copy document files to a disk for others to edit or use them. If others made changes tothe document, there was no easy way to merge the changes. This was, and still is, known as working in a stand-alone environment. TYPES OF NETWORKS: Computer networks can be categorized in the following types. LOCAL AREA NETWORK (LAN): A local area network (LAN) supplies networking capability to a group of computers in close proximity to each other such as in an office building, a school, or a home. A LAN is useful for sharing resources like files, printers, games or other applications. A LAN in turn often connects to other LANs, and to the Internet . The most common type of local area network is an Ethernet LAN. The smallest home LAN can have exactly two computers; a large LAN can accommodate many thousands of computers. Many LANs are divided into logical groups called subnets. METROPOLITAN AREA NETWORK (MAN): MAN stands for metropolitan area network .It is a network of devices within an area of one to ten kilometers or with in a city. It may be a single network such as a cable television network or it may be a means of connecting a number of LANs into a larger network so that resources may be shared LAN to LAN as well as device to device. WIDE AREA NETWORK (WAN): A WAN stand for wide area network .It is spread through out the world. A WAN that is wholly owned and used by a single company is often referred to as an enterprise network. It can connect computers and other devices on opposite sides of the world. A WAN is made up of a number of interconnected LANs. Perhaps the ultimate WAN is the Internet. INTRANET: Anintranetis a privatecomputer networkthat usesInternet Protocoltechnologies to securely share any part of an organizations information or operational systems within that organization. The term is used in contrast tointernet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organizations internalwebsite, but may be a more extensive part of the organizations information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. EXTRANET: Anextranetis a private network that usesInternet protocols,networkconnectivity. An extranet can be viewed as part of a companysintranetthat is extended to users outside the company, usually via theInternet. It has also been described as a state of mind in which the Internet is perceived as a way to do business with a selected set of other companies (business-to-business, B2B), in isolation from all other Internet users. In contrast,business-to-consumer(B2C) models involve known servers of one or more companies, communicating with previously unknown consumer users. INTERNETWORK: An Internetwork is a collection of two or more LANs connected by WANs. Internworks are referred to interchangeably as data networks or simply networks. The most popular internetwork is the Internet which is open to public. COMPONENTS OF NETWORK: A data communication system has two main components:- HARDWARE COMPONENTS: Devices and media are the physical elements or hardware of the network Hradware is often the visible components of the network platform such as a laptop, a PC or swtich etc used to connect the devices. Ocassionally some components might not be so visible. DEVICES: Devices of the network can be of two types that are the end devices and the intermediary devices, we explain both the types:- END USER DEVICES: An end use device refers to a piece of equipment that is either the ousce or the destination of a message on a network. Network users usaully only see or touch an end device, which is most often a computer. Another can generic term for an end device that sends or receives messages is a host. E.g host and end devices are Printers, Computers, Scanners, Webcams etc. INTERMEDIARY DEVICES: Intermediary devices connect the indivisual hosts to the network or can connect multiple networks to form an internetwork. Intermediary devices are not all the same. Some work inside the LAN to perfom switching functions and others help route messages between networks. Example of intermediary devices are Switches, Hubs and Routers etc. NETWORK MEDIA: Communication across a network is carried on a medium. The medium provides the channel over which the message travels from source to destination. The three main types of media in use in a network are: COPPER: A twisted pair cable usually used as a medium inside a LAN environment. FIBEROPTICS: Made up of glass or plastic fibers in a vinyl coating usually used for long runs in a LAN and as a trunk. WIRELESS: It connects local users through air using electromagnetic waves. SOFTWARE COMPONENTS: Software components can be divided in to two parts, services and processes. SERVICES: A network service provide information in responce to a request. Services include many of the common netowrk applications people use every day, like e-mail hosting services and web hosting services. For an instance we can take example of YAHOO enterprise, they provide mail services as well as web services, there are a number of companies offering these kind of services. PROCESSES: Processes provide the funtionality that directs and moves the messages through the network. Processes are less obvious to us ut are critical to the opeation of networks. For example viewing a webpage invokes one network process, clicking on a hyperlink causes a web browser to communicate with a web server, in the same way many network processes can take place at the same time. NETWORK TOPOLOGIES: Topology of a network is the geometrical representation of the relationship of all the links and linking devices to one another. PHYSICAL TOPOLOGIES: There are four basic physical topologies possible mesh, star, bus, and ring. MESH TOPOLOGY: In a mesh topology every device has a dedicated point to point connection to every other device .A fully connected mesh network therefore has n(n-1)/2 physical channels to link n devices . STAR TOPOLOGY: In star topology each device has a dedicated point to point connection only to a central controller usually called a hub . The devices are not directly connected to each other .Unlike a mesh topology ,a star topology does not allow direct traffic between devices the controller acts as an exchange : if one device wants to send data to another it sends the data to the controller which then relays the data to the other connected device. BUS TOPOLOGY: A bus topology on the other hand is multi point one long cable acts as a back bone to link all the devices in a network nodes are connected to the bus cable by drop lines and taps a drop line is a connection running between the devices and the main cable a tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. RING TOPOLOGY: In a ring topology each device has a dedicated point to point connection only with the two devices on either side of it . A signal is passed along the ring in one direction from device to device until it reaches to its destination protocols. LOGICAL TOPOLOGIES: The Logical topology defines how the systems communicate across the physical topologies. There are two main types of logical topologies: SHARED MEDIA TOPOLOGY: In a shared media topology, all the systems have the ability to access the physical layout whenever they need it. The main advantage in a shared media topology is that the systems have unrestricted access to the physical media. Of course, the main disadvantage to this topology is collisions. If two systems send information out on the wire at the same time, the packets collide and kill both packets. Ethernet is an example of a shared media topology. TOKEN BASED TOPOLOGY: The token-based topology works by using a token to provide access to the physical media. In a token-based network, there is a token that travels around the network. When a system needs to send out packets, it grabs the token off of the wire, attaches it to the packets that are sent, and sends it back out on the wire. As the token travels around the network, each system examines the token. When the packets arrive at the destination systems, those systems copy the information off of the wire and the token continues its journey until it gets back to the sender. When the sender receives the token back, it pulls the token off of the wire and sends out a new empty token to be used by the next machine. PROTOCOLS: In information technology, a protocol (from the Greek protocollon, which was a leaf of paper glued to a manuscript volume, describing its contents) is the special set of rules that end points in a telecommunication connection use when they communicate. Protocols exist at several levels in a telecommunication connection. For example, there are protocols for the data interchange at the hardware device level and protocols for data interchange at the application program level. In the standard model known as Open Systems Interconnection (OSI), there are one or more protocols at each layer in the telecommunication exchange that both ends of the exchange must recognize and observe. Protocols are often described in an industry or international standard. NETWORK PROTOCOLS: For devices to communicate over the network, they must follow different protocols that perform the many tasks to be completed. The protocols define the following: The format of the message The way intermediary dvices share information about the path to the destination The method to handle update messages between intermediary devices The process to initiate and terminate communications between hosts INTERACTION OF PROTOCOLS: Interaction between protocols can be clearly understood by a simple example, the way that a web server and a web client interacts. HTTP defines the formatting and content of the requests and responses exchanged between the client and server. Both the client and server implements HTTP as part of the application. The HTTP protocol relies on other protocols to govern how the message are transported between the client and server. TCP is the transport protocol that divides the HTTP messages in to smaller pieces to be sent to the destination client, it is also responsible for controlling the size and rate at which messages are exchanged between the client and the server. Another protocol called IP is responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses and selecting the best path to the destination host. TECHNOLOGY INDEPENDENT PROTOCOLS: Protocols that guide the network data are not dependent on any specific technology to carry out the task. Protocols describe what must be done to communicate, not how the task is to be completed.This is the reason that enables different kind of devices such as telephones and computers to use the same network infrasturcture to communicate. PROTOCOLS AND REFRENCE MODELS: Networking professionals use two networking models to comminicate within the industry, they are protocol models and reference models. Both were created in the 1970s. A protocol model is a model that closely matches the structure of a particular protocol suite. The hierarhical set of related protocols in a suite typically represents all the functionality required to interface the human network with the data network. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols with in the protocol suite. A refrence model provides a common referecen for maintaining the consistency within alkl types ofn etwork protocols and services. The primary function of a refercen model is to aid in clearer understanding of the functions and process involved. The OPEN SYSTEMS INERCONNECTION (OSI) the most well known reference model. OSI MODEL: In 1978, the International Organization for Standardization (ISO) released a set of specifications that described network architecture for connecting dissimilar devices. The original document applied to systems that were open to each other because they could all use the same protocols and standards to exchange information. APPLICATION LAYER: The topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference models application layer on the receiving computer. PRESENTATION LAYER: The presentation layer, defines the format used to exchange data among networked computers. Think of it as the networks translator. When computers from dissimilar systems need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computers application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. SESSION LAYER: The session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network. TRANSPORT LAYER: The transport layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and discard it. NETWORK LAYER: The network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data. DATA LINK LAYER: The data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. The electrical representation of the data is known to this layer only. PHYSICAL LAYER: The bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The physical layer also carries the signals that transmit data generated by each of the higher layers. TCP/IP MODEL: The TCP/IP protocol does not exactly match the OSI reference model. Instead of seven layers, it uses only four. Commonly referred to as the Internet Protocol Suite, TCP/IP is broken into the following four layers: NETWORK ACCESS: Network access layer communicates directly with the network. It provides the interface between the network architecture (such as token ring, Ethernet) and the Internet layer. INTERNET: The Internet layer, corresponding to the network layer of the OSI reference model, uses several protocols for routing and delivering packets. Router are protocol dependent, they function at this layer of the model and are used to forward packets from one network or segment to another. Several protocols work within the Internet layer. TRANSPORT: The transport layer, corresponding to the transport layer of the OSI reference model, is responsible for establishing and maintaining end-to-end communication between two hosts. The transport layer provides acknowledgment of receipt, flow control, and sequencing of packets. It also handles retransmissions of packets. The transport layer can use either TCP or User Datagram Protocol (UDP) protocols depending on the requirements of the transmission. APPLICATION: Corresponding to the session, presentation, and application layers of the OSI reference model, the application layer connects applications to the network. It contains all the higher-level protocols. COMPARISON BETWEEN OSI MODEL AND TCP/IP MODEL: The OSI and TCP/IP reference models have much in common. Both are based on the concept of a stack of independent protocols. Also, the functionality of the layers is roughly similar. For example, in both models the layers up through and including the transport layer are there to provide an end-to-end, network-independent transport service to processes wishing to communicate. These layers form the transport provider. Again in both models, the layers above transport are application-oriented users of the transport service. The differece between OSI and TCP/IP model is that the Application layer of TCP/IP model operates at the upper three layers of OSI model, they are application layer, presentation layer and session layer, also the Network layer of TCP/IP model works at the lower two layers of OSI model that are, data link layer and physical layer. TCP/IP PROTOCOL The TCP/IP suite of protocols is the set of protocols used to communicate across the internet. It is also widely used on many organizational networks due to its flexibility and wide array of functionality provided. Microsoft who had originally developed their own set of protocols now is more widely using TCP/IP, at first for transport and now to support other services. SOME IMPORTANT TCP/IP PROTOCOLS: INTERNET PROTOCOLv4 (IP): Internet Protocol (IP) is a packet-switched protocol that performs addressing and route selection. As a packet is transmitted, this protocol appends a header to the packet so that it can be routed through the network using dynamic routing tables. IP is a connectionless protocol and sends packets without expecting the receiving host to acknowledge receipt. In addition, IP is responsible for packet assembly and disassembly as required by the physical and data-link layers of the OSI reference model. Each IP packet is made up of a source and a destination address, protocol identifier, checksum (a calculated value), and a TTL (which stands for time to live). The TTL tells each router on the network between the source and the destination how long the packet has to remain on the network. It works like a countdown counter or clock. As the packet passes through the router, the router deducts the larger of one unit (one second) or the time that the packet was queued for delivery. For example, if a packet has a TTL of 128, it can stay on the network for 128 seconds or 128 hops (each stop, or router, along the way), or any combination of the two. The purpose of the TTL is to prevent lost or damaged data packets (such as missing e-mail messages) from endlessly wandering the network. When the TTL counts down to zero, the packet is eliminated from the network. IPV4 HEADER: The key fields of the ipv4 are as follows:- SOURCE ADDRESS: Senders ip address DESTINATION ADDRESS : Receivers ip address TIME TO LIVE (TTL): Numeber of hops a packet must traverse before getting discarded. TYPE OF SERVICE (TOS): It is for a sending host to specify a preference for how the datagram would be handled as it makes its way through an internet. PROTOCOL: This field defines the protocol used in the data portion of the IP datagram. FLAG AND FRAGMENT: A three-bit field follows and is used to control or identify fragments VERSION: Protocol version. INTERNET HEADER LENGTH: The second field (4 bits) is the Internet Header Length (IHL) telling the number of 32-bitwordsin the header. PACKET LENGTH: This 16-bit field defines the entire datagram size, including header and data, in bytes. ADDRESS RESOLUTION PROTOCOL (ARP): Before an IP packet can be forwarded to another host, the hardware address of the receiving machine must be known. The ARP determines hardware addresses (MAC addresses) that correspond to an IP address. If ARP does not contain the address in its own cache, it broadcasts a request for the address. All hosts on the network process the request and, if they contain a map to that address, pass the address back to the requestor. The packet is then sent on its way, and the new information address is stored in the routers cache. HEADER: Some important fields of ARPs header are as follows:- HARDWARE TYPE: This field specifies the Link Layer protocol type PROTOCOL TYPE: This field specifies the upper layer protocol for which the ARP request is intended HARDWARE LENGTH: Length of a hardware address PROTOCOL LENGTH: Length (in octets) of alogical addressof the specified protocol OPERATION: Specifies the operation that the sender is performing SENDER HARDWARE ADDRESS: Hardware (MAC) address of the sender. SENDER PROTOCOL ADDRESS: Upper layer protocol address of the sender. TARGET PROTOCOL ADDRESS: Hardware address of the intended receiver. TARGET HARDWARE ADDRESS: Upper layer protocol address of the intended receiver. TRANSMISSION CONTROL (TCP): The TCP is responsible for the reliable transmission of data from one node to another. It is a connection-based protocol and establishes a connection (also known as a session, virtual circuit, or link), between two machines before any data is transferred. To establish a reliable connection, TCP uses what is known as a three-way handshake. This establishes the port number and beginning sequence numbers from both sides of the transmission. HEADER: Following are some important fields of TCP header: SOURCE PORT: Identifies the sending port. DESTINATION PORT: Identifies the receiving port. SEQUENCE NUMBER: This is the initial sequence number. ACKNOWLEDGEMENT NUMBER: A 32 bit acknowledgement number. DATA OFFSET: Specifies the size of the TCP header in 32-bit words. USER DATAGRAM PROTOCOL (UDP): A connectionless protocol, the UDP, is responsible for end-to-end transmission of data. Unlike TCP, however, UDP does not establish a connection. It attempts to send the data and to verify that the destination host actually receives the data. UDP is best used to send small amounts of data for which guaranteed delivery is not required. While UDP uses ports, they are different from TCP ports; therefore, they can use the same numbers without interference. HEADER: Some key headers of UDP are as follows: SOURCE PORT: This field identifies the sending port. DESITNATION PORT: This field indentifies the receiving port LENGTH: A 16-bit field that specifies the length in bytes of the entire datagram CHECKSUM: The 16-bitchecksumfield is used for error-checking of the headeranddata. NETWORK ADDRESSING: There are millions of computers in use on the web and billions of messages traversing networks at any given time, so prper addresing is essential to make sure that the sent messages arrives intact at the proper destination. Addressing of data happens in three different layers of the OSI model. The PDU at each layer adds address information for use by the peer layer at the destination. CHAPTER 2: ROUTING Fundamentals ROUTING: Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network, electronic data networks such as the Internet, and transportation networks. Our main concern will be routing in packet switched networks. In packet switching networks, routing directs packet forwarding, the transit of logically addressed packets from their source toward their ultimate destination through intermediate nodes; typically hardware devices called routers, bridges, gateways, firewalls, or switches. General-purpose computers with multiple network cards can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the routers memory, is very important for efficient routing. Most routing algorithms use only one network path at a time, but multipath routing techniques enable the use of multiple alternative paths. TYPES OF ROUTING: STATIC ROUTING: Static routing is manually adding routes to the routing table, routes through a data network are described by fixed paths (statically). These routes are usually entered into the router by the system administrator. An entire network can be configured using static routes, but this type of configuration is not fault tolerant. When there is a change in the network or a failure occurs between two statically defined nodes, traffic will not be rerouted. This means that anything that wishes to take an affected path will either have to wait for the failure to be repaired or the static route to be updated by the administrator before restarting its journey. Most requests will time out (ultimately failing) before these repairs can be made. There are, however, times when static routes make sense and can even improve the performance of a network. Some of these include stub networks and default routes. DYNAMIC ROUTING: Dynamic routing performs the same function as static routing except it is more robust. Static routing allows routing tables in specific routers to be set up in a static manner so network routes for packets are set. If a router on the route goes down the destination may become unreachable. Dynamic routing allows routing tables in routers to change as the possible routes change. Dynamic routing uses routing protocols for routing information automatically over the internertwork. STATIC VS DYNAMIC ROUTING: Before going further we need to examine the difference between static and dynamic routing. ROUTING PROTOCOLS: Before going in to the details of dynamic routing we must understand what are routing protocols. Routing protocols implement algorithms that tell routers the best paths through internetworks. Routing protocols provide the layer 3 network state update. In short, routing protocols route datagrams through a network. Routing is a layer 3 function, thus, routing and routed protocols are network-layer entities. Routing tables on the layer 3 router are populated by information from routing protocols. A routed protocol will enter an interface on a router, be placed in a memory buffer, then it will be forwarded out to an interface based on information in the routing table TYPES OF DYNAMIC ROUTING PROTOCOLS: Dynamic routing protocols can be divided in to the following broad catagories. CLASSFUL AND CLASSLESS ROUTING PROTOCOLS: CLASSFUL ROUTING PROTOCOLS: Classful routing protocols do not send subnet mask information in routing updates. This was at the time when network address were allocated on the basis of classes i.e A, B or C. These routing prtocols did not include subnet mask in routing update because the the network mask was determined by first octet of the network address. Classfull routing protocols can still be used in todays networks but they cannot be used in all situations because they do not include the subnet mask. Classfull routing protocols cannot be used where the network is subnetted using more then one subnet mask, in other words we can say that classfull routing protocols do not support variable-lenght subnet mask (VLSM). In the following figure the classfull version of the network support similar subnet masks i.e all /24. CLASSLESS ROUTING PROTOCOLS:

Thursday, September 19, 2019

The Role of Dreams in Cormac McCarthy’s All the Pretty Horses Essay exa

The Role of Dreams in Cormac McCarthy’s All the Pretty Horses Works Cited Missing Cormac McCarthy All the Pretty Horses depicts the American romanticized view of the west. John Grady, emerging from a dilapidated family ventures out on a journey in pursuit of his dream of the cowboy lifestyle. Through out the novel there is a constant tension between John Grady destiny or fate and the nature of his dreams. Dreams keep the dreamer from reality and because they are unreal, they paralyze the dreamer’s reality. Nonetheless, they motivate his journey through Mexico. The different roles that his dreams play depict the different characters that John Grady assumes: the Texas teenager, the lover, the prisoner and the man. John Grady’s dreams are as complex as his character. Without ambition or dream, life is purposeless. Naturally, John leaves the comfort of his home with the intention of discovering the purpose of his life which is mapped out in his dream. Through John Grady’s adventure McCarthy suggests the necessity for boys to leave the comfort of their homes in order to become men. Indeed, oriented by his dream of becoming a cowboy, John Grady experiences harsh realities, especially whilst imprisoned in the Mexican jail. Here is life is constantly under threat. Ultimately, John Grady kills his attacker. The act of killing symbolizes his transition to manhood. John Grady’s imprisonment infers that dreams have consequences that are not always pleasant. Although ambition provides the map for life, it does not eliminate the consequences of actions taken towards the achievement of that goal. Ambition, goal and fantasy are all an intricate part of his life that shapes his destiny. John Grady believes in a fixed destiny, he... ... become of them.† Staying true to his identity as an American, John Grady extends his â€Å"possibilities.† His hardships are not an â€Å"end† only misfortunes. Dreams are often thought of as unreal and as viable modes for escaping reality; however, for John Grady dreams are an extension of his reality. Dreams extend his life through different roles: dreams as ambition, as fantasies and as an unconscious act during sleep. His dreams enable the reader to understand John Grady character as his expresses openly his aspirations in his dreams. A person’s aspirations are frequently in conflict with their reality. Likewise dreams can be in conflict with ones destiny. Nonetheless, there is blurred difference between the nature of dreams and reality. The complexity of life transforms itself into our dreams, thus dreams enable the dreamer to re-evaluate life his or life destiny.

Wednesday, September 18, 2019

Weather Forecasting :: essays research papers

Weather Forecasting In researching this project I was amazed to find the many books on this topic. After going through much information and reading an enormous amount of writing on weather forecasting I can only come to one conclusion that when all is considered the best forecasters can only give an educated guess of what is in store for weather. Through the many means at their disposal, such as satellites, ships at the ocean, infrared, radio, and radar transmissions even with all of these techniques no prediction is 100% accurate. One question that I asked myself was "when was the first weather forecasting ever done?", I found out that in 1863 in Britain there was a united forecasting system headed by Captain Robert Fitzroy. Captain Fitzroy would send ships around Britain to warn people of storms and such. However, he was often wrong and criticized and therefor committed suicide. Since then there have been many other services, but the largest one currently is the National Weather Service. The National Weather Service gives predictions for all of the world through satellite imagery for all countries. Also in recent history many local television and radio stations have made private forecasts for small areas. Meteorologists are people who interpret the weather, the reason I don't say predict the weather is because even though all forecasters have the same information and data at their fingertips, the way that they interpret what is in front of them can be different. Meteorologists receive information from various sources, but their interpretation of the data determines the accuracy of their prediction. Someone might ask, "If forecasters have so much information on a particular area; how could they predict a flawed forecast ?" The answer to that question lies in the fact that any one of a number of weather conditions may ruin a forecast. A fast cold or hot front moving in, an unexpected flow from the ocean or a cold wind may change the whole days forecast. There are many different materials and devices used by local and government services to predict the weather. Some of these devices are, Radar which is actually sound waves, which bounce off clouds and give location of storms this way. Another such device is actually a variation of radar called "Doppler Radar" actually can give the exact location of a storm within a kilometer. However, Doppler Radar is not used so much for everyday forecasting, but for tornadoes and very large storms. The way Doppler Radar works is almost the same as regular radar with one advantage, it also can measure the speed of an object or storm, which makes its prime usage tornado watching.

Tuesday, September 17, 2019

Eisenhower, Cold War: DBQ Essay

Many results of the Cold War came that the American people feared in the aftermath of the Second World War according to Eisenhower in a press conference in 1954. The American public feared the Soviets for many reasons. On one hand the Soviets had nuclear technology and on the other their communist government frightened the American people as stated by John Foster Dulles. Because at this time China was becoming Communist as well The fear of the American public increased, however President Eisenhower addressed these fears with the safety of the American people in mind. Eisenhower made many of his decisions based on the input of others which made him a very popular president. Eisenhower’s plan for communism, as drastic as it was, became one of his administration’s most decisive and efficient policy. Eisenhower and his administration soon after the spread of communism developed a new policy. This policy was developed from Eisenhower’s new program called the New Look. Eisenhower’s new plan involved threat of using nuclear weapons as a form of containment. The policy of Eisenhower’s had potentially dangerous results however. In the case of an actual Communist action, the US would only be able to respond with nuclear war, or to devise a new plan. This also encouraged the Soviets to increase funding and time to their research, shown in a US News and World Report(1957). With Eisenhower’s New Look, the United States would be prepared for Communism of any form. When the American public became informed of Soviet nuclear technology rumors of another war became rampant. Eisenhower’s relief came with the FCDA insuring safety to the public if preparations were made. The relief of the FCDA came in the form of bomb shelters(sealed barricades to preserve life for an extended period of time from such an attack), displayed in Life Magazine(1955). Along with nuclear technology the American public feared the Soviets were more advanced due to their progress in the â€Å"Space Race.† To counter these Soviet actions the US put money in to the education for scientists and engineers according to a message from Eisenhower on education. Eisenhower’s administration was formed and managed on the basis that the fears of the American public after World War II would be dealt with and pacified. His administration was extremely efficient in proposing plans to calm the American people in a time of confusion and angst. Eisenhower’s  plans ranged from assaulting communism(at home and across seas) developing the Interstate System, mentioned in the Saturday Evening Post(1956). Eisenhower’s presidency was a time for the American people of security.

Monday, September 16, 2019

Organizational/Industrial Psychologist

Industrial/Organizational psychology refers to a branch of psychology concerned with offering solutions to challenges as well as problems facing the modern organizations. Industrial/ Organizational psychology refers to a branch of psychology which mainly concerns itself with offering solutions to challenges as well as problems facing individuals or workers at their workplace. The professionals in this field otherwise referred to as industrial/organizational psychologists are also involved in exploring complex issues concerned with employee productivity and performance (Yeung & Monsell, 2003). According to (Kuther, & Morgan, 2006), industrial / organization psychologists have a role of applying psychology in their work place with aim of solving the numerous personal or organizational problems of psychological nature. These may include issues such as retirements, losing jobs, transfers which involve relocating to hardship zones or even temporary separation from loved ones, change of careers as well as issues related to employee-employer relations. Industrial / organizational psychologists are concerned with issues aimed at bringing about job satisfaction for the employees through a better understanding of human behavior (Rubinstein, Meyer, & Evans, 2001). Additionally, industrial/ Organizational psychologists assist the employers in the selection process in order to ensure that, an organization only recruits the best in the market, by helping employees to adapt well to the workplace as well as helping employers to recruit the best, into the workplace. Industrial /organizational psychologists can be said to form a very important and crucial part of the organizational structure. Usually, industrial/organizational psychologists rely upon a number of tools and instruments to carry out their duties. Notably, industrial psychologists use special tests, surveys, as well as training programs in order to achieve their aims. Apart from working in companies and in the manufacturing industries, industrial/organizational psychologists offer their services in institutions such as universities where by they are primarily concerned with designing of training courses. Besides the above, organizational / industrial psychologists aid organizations to deal with pertinent issues which usually come up in organizations thus threatening the very existence of the same. Such may include challenges in the work place such as, discrimination, favorism, as well as poor relations or negative organizational culture. For one to qualify for the profession, it is mandatory that, one is a graduate, and besides that, a holder of a master or PhD degree. Depending on ones level of qualifications, remuneration slightly varies from organization to organization, but the profession can be termed as highly lucrative. For one to advance to a higher level for instance master or PhD, in most cases, an undergraduate training in a psychology major is necessary for one to be admitted into the course. This is mainly because organizational/industrial psychology profession mainly builds onto psychology courses as well as knowledge. Another useful skill needed in the profession is the knowledge of statistical and research methods. These are particularly important and relevant in that, industrial psychology as a profession dealing with organizational issues often requires the use of empirical studies to solve challenges at the work place. Usually most challenges do require the application of research methods or surveys in order to offer solution and answers to pressing questions (Rubinstein, Meyer, & Evans, 2001). As an organizational / industrial psychologist, one is also required to posses’ sound knowledge and skills in the use of computers. This is very necessary in that, interpretation of research data is best carried out with an aid of statistical software while at the same time most of the presentations done by the organizational/industrial psychologists as well as the preparations which precedes presentations requires sound computational skills. Over and above all, industrial/organizational psychology demands strong communication skills. The most surprising thing about an organizational /industrial psychology profession is the fact that it is possible for one to work in different organizations as well as companies. While there are hundreds of opportunities available for academicians in the field, more exist for non academicians who may involve practitioners and consultants. While academicians who are primarily professors are involved in teaching in universities or colleges, the non-academicians organizational psychologists usually research and work for private companies, government departments and other organizations where their services may be required (Yeung, & Monsell, 2003). The most surprising element for the organization/industrial pspcychology is the fact that, professionals in the field are rarely supervised and the level of autonomy involved is quite amazing. The other surprising thing about the profession is the fact that, the very high qualifications required before one can be enrolled for the course epically in the graduate schools. Finally, it is worthy noting that, the profession requires commitment and however lucrative it may seem, it requires high discipline and commitment for one to be successful.