Thursday, October 31, 2019

Information Communication Technology in the developing countries Essay

Information Communication Technology in the developing countries - Essay Example This paper will discuss countries labeled "developing countries" in selected areas of the world, such as Ghana in Africa, Vietnam in Asia, Afghanistan in the Middle East, and Ecuador in Latin America and the way in which these countries are trying to develop their technology, economy, and society to meet the demands of a fast-growing global population. In trying to determine how to define a "developing" as opposed to a "developed" country, it is necessary to look at a country's economy and to research how that economy works. Most developing countries have always been dependent on agriculture, but the boundaries between developed and developing countries are apt to blur at present as a growing middle class in some developing countries have a life-style similar to the more wealthy countries. In the 21st century, information technology and the Internet have created a global economy that has spread throughout the world. In countries dependent on a local economy with exporting of goods their main source of income, it is evident that they are becoming more dependent on imports as the population moves away from agriculture. With more education and implementation of electronics and computers offering increased communication for the poorer countries, their economy is improving. However, the bottom line is rising prices in an improved econo my. and poverty remains for a percentage of the population who cannot afford the rising prices. This paper will study four different areas of the world in which a changing culture is very much affecting their economy-Ghana in Africa, Vietnam in Asia, Afghanistan in the Middle East, and Ecuador in Latin America. In addition, countries moving into a "developed" category, such as China and Mexico, will be evaluated, with a further discussion of previously labeled developing countries such as India, Philippines, Czech Republic, and Ireland, and finally the present economic difficulties being faced in developed or wealthy nations, such as the United States. By researching the technological, economical and social development of developing countries in terms of the improvements that are being brought about through ICT, the effectiveness of the electronic age for these areas can be determined. In addition, the effort to alleviate poverty, as the line between the wealthy and the poor widens, must be addressed. VIETNAM The latest "buzz word" to describe the goal of developing countries is "knowledge society." According to Nguyen & Johanson (2007, pp. 1-2): A knowledge society is assumed to have at least two important features: information and communications technologies (ICTs) and a critical mass of knowledge which forms the basis of a significant portion of a national society. Vietnam, presently labeled a developing country, could in time become a knowledge society, but changing traditional values have brought about tension and adjustment problems in this ancient culture. In a knowledge society, economic, social and cultural activities combine with government to foster learning. As noted by Nguyen and Johanson,

Tuesday, October 29, 2019

Facebook wastes time Essay Example for Free

Facebook wastes time Essay I believe that facebook is bad. In this essay I will tell that Facebook wastes time, occupies the hosts mind and is not, no matter what people say is not the same as actual social interaction. Facebook is not my friend and neither should it be yours, My first reason why facebook is not my friend is because that it wastes everybody time. Now my argument is just armed at facebook, but also the people who make facebook games, Zynga is a major corporation that owns any and all good facebook is games. Facebook itself almost makes you check it, making you wonder what your friends are up to, the idea of a public diary almost, something that anybody can contribute to, a encyclopaedia of a persons life if you will. You could spend minuets, an hour maybe hours at a time just staring at a page when you could be doing something more important, maths homework perhaps? My second argument is that it occupies the hosts mind and doesn’t let anything else in. What I mean by this is that facebook is what some people always think about, they think how many likes they get, what people say about them through private messages and most importantly for some people, how many friends they have. There has been a term for people like these, facebook aholics, people that are always on facebook or worse, people who always think about facebook. There are times that I know that people lose their social life for a virtual life, people stop planning meetings and instead plan them on facebook, the days of not too long ago of RSVP’ing is no lost as almost every event is through facebook and that’s how people respond to them. Free thinking is gone, it is no more, everything on the internet is a reblog, a reblog of a reblog, and all of this is shared through facebook, people think what they are told, and they are told though facebook, nothing new nothi ng original. My last argument is that instant messaging through facebook is not the same as actual social interaction, face to face. The chat system on facebook is the most used one on facebook, pages, walls, games are all good and everything, but what really makes facebook great is the chat system on it, or so we think. There are 26 letters on the keyboard, 10 numbers, 13 symbols, and yet unbelievably this does not make the same level of interaction as talking to someone. When was the last time a person came up to you in the street, someone you know, and they said Heezzz howssss you doings if you can tell me a time of when that happened I would suggest finding some new friends. While people may express themselves differently from behind a computer screen I still find no excuse for people to talk likez thiss it makes them seem like an even bigger idiot then they are. People cloud their identity, pretend to be something or someone they arent, and that makes the entire socialisation, well pointless . Those are just some reasons you shouldnt use facebook, facebook is horrible, nobody should use it, it wastes time, fills your mind with nothing but junk and is far more unhealthy socially then going out and talking. Facebook is not my friend, neither is it yours, take a stand, unfriend facebook.

Saturday, October 26, 2019

Effects Of Globalisation And Terrorism On Human Rights Politics Essay

Effects Of Globalisation And Terrorism On Human Rights Politics Essay Looking at the above topic one will say it is a straightforward question, but there is more to it than one may think. In this easy we will start by finding out what the two main key words are: Which are globalization and terrorism? Also, try to find out what each means. Globalization is the process in which government of different nations interact and integrate with each other, on the other we can say globalization is internationalization, liberalization, universalization and the westernization since it has been of far and has spreads so far and attracted so much attention. It is also classify as the growth of relations between people, from financial and investment market, which operate internationally, and within one network. However, globalization is usually recognized as being driven by a combination of economic, technological, sociocultural, political, and biological factors.  The term can also refer to the transnational circulation of ideas, languages, or  popular culture  through  acculturation (Nicholson 2nd Edition 2002). However the word terrorism is politically and emotionally charged and of difficulty of providing a precise definition, studies have found 1000 of definitions for terrorism and yet the concept cannot be agree on the right term with how terrorism can be define, since terrorism itself is very controversial and it is very important because, terrorism is an incredibly complex phenomenon due to the act of violence. Which when confronts government and international community with extremely painful dilemmas and notoriously difficult policy decisions have to be made (Wilkinson 2006). Terrorism can be briefly defined as a systematic use of murder, injury, and destruction or threat, to create a climate of terror. They often sought to avoid the indiscriminate terror against innocent civilian either on moral grounds or because they feared losing public support for their cause (Wilkinson 1993). In view of which is biggest threat to human right we cannot just conclude that terrorism or globalization is within trying to find out the impact of both. We shall consider the effect of globalization and it implication and the spread of it causes, as we stated that globalization is the internationalization, liberalization, universalization and the westernization as well as the growth of relation between people (Kofman and Youngs 2008). The spread of technological advances and dynamic entrepreneurship are the driving forces behind globalization, which has brought in it threat to human right. For their part, according to Marxist who regards capitalism as the engine of globalization and while other clam it have the primary cause in the knowledge structures and cultural politics (Scholte 2000). A further account of globalization as a threat to human right would combine elements from different approaches, resulting in multifaceted explanation which may prefer a more concise formula where the dynamic force of globalization are reduce to a single driving force. In other cases of globalization where other historical trend has be a major player; social relations involve complex interconnections that cannot be reduce since this has given terrorist the freedom to information and technology to help improve their network. The argument about the threat of globalization to human right can be elaborated as, The spread of rationalism as a dominant knowledge framework, certain turns in capitalist development, technological innovations in communications and data processing; and the construction of enabling regulatory framework which has contributed in differently in 40,30,20,and 7 percentages respectively and other factors take 3 per cent are the cause of globalization (Scholte 2000 pp 90). Globalization has occurred in part because of certain powerful patterns of social consciousness which has affected the human right race; nevertheless, globalization could not have occurred in the absence of the extensive innovations development in respect of transport, communications and data processing. However we cannot leave out industrialization which in general has figured more centrally in the transformation in the environmental problems, as other suggested the technological change has been the most prominent courses of globalization. To start with the normative of globalization that affect human right and in what ways and to what extent has contemporary globalization increased or decreased in relations to human safety and confidence. Absolute security is of course no longer available due to the inflation of technological advancement created by globalization no social order can remove all the uncertainty, destruction and death. In contrast, of contemporary globalization, which has been associated with the inflow of information, communication and data connectivity has made globalization being threat to human right and lack of freedom of moving without any fear (Scholte 2000). We will now look at another key word in the topic being discuss Terrorism in relations of being threat of human right, as defined earlier, the word Terrorism and Globalization share at least one thing in common which is the complexity of their definitions. However, terrorism can be characterized, first, by the use of violence. That violences are in many forms and more often and indiscriminately targets non-combatants, who are civilians with right to life. Reaching a consensus on what constitute the act of terrorism is very difficult; the legitimacy of terrorist means and methods is foremost reason for disagreement, some are of the view that terrorist acts are legitimate only if they in accordance of the just war tradition. Terrorism, however is one of the biggest threat to human right since it action are more often not supported and luck of objectives because their goals for change are based on radical ideas that do not have any widespread appeal. In order for terrorist group to influence change, terrorist must provoke drastic responses that acts of violence which will intend act as a catalyst for change and weaken their opponents, one example of these is the bombing in Madrid, Spain 2004, its influence on the outcome of the elections (Baylis , Smith , Owens 2008). The extent of social, culture, and political change brought about by globalization including the increasing interconnectedness and homogeneity in the international system, remain a subject of much disagreement and debate such that the disagreement, in true has influence the discussion of the extent to which level globalization has contributed to the rise of modern terrorism. However, there is little doubt that the technology growth has been associated with globalization and to this extent has improved the effectiveness of terrorist groups. The impact of terrorism on globalization and on human right has been very high and the AI Qaeda or The Base, received global recognition as a result of the attacks in New York and Washington on September 11, 2001. In closer look at the effect of the terrorist action of September 11, 2001 was brought about by the spread of globalization and it association with society becoming increasingly interconnected and terrorist have find it as a mains. We cannot say terrorism is a threat to human right without talking about the major areas where terrorist have operated more often, back to the example of 9/11 the main attack was from the Aviation industries and the reason why we should look at aviation security as an increased factor of globalization which is opening grounds for terrorist to operate from. On the other hand, one will say it is needed for development and growth of nations. There are lessons to be learnt from any form of airline hijacker (terrorist) since it is one of the biggest threats to lives and human right in general (Wilkinson 1993). The technological advances associated with globalization have improved the capabilities of terrorist group to plan and coordinate their operations before any information is link out. In particular technology have improved to the extent that terrorist now have the internet to use as a main to empower individual and cell with the ability to post tracts on the world wide web. Another form of empowerment for terrorist group brought about by globalization is the volume, range and sophistication of propaganda materials. Nowadays terrorist have the ability to build it own website like Tupac Amaru Revolutionary Movement. Once again technology associated with globalization can now enabled terrorist group to coordinate their attack in different part of the world at the same time, the attack on US embassies in Kenya and Tanzania in 1998. Globalization and its technological advancement has also seen the commercially availability of radios and handheld phones, which allowed terrorist cell to operate independently at a substantial distance. Terrorist groups have able to leverage technological development designed to shield identity from unauthorized commercial or private exploitation (Baylis, Smith, Owens 2008). Globalization has undoubtedly pose threat to human right but the threat of terrorism on human right can be counted as more, one can also argued that globalization has come with a lot of technological changes but as to if these changes were of any threat to human right is to be a question of the day, however terrorism could be classify as the biggest threat to human right. In the sense that whenever there is an act of terrorism or when terrorist attack it replication are massive and outrageous living the affected family with so much worries, so is the displacement of people and the fear and panic among other who were not directly affected. These are just the few ways terrorism poses a threat on human right.

Friday, October 25, 2019

Hepatitis A Essay -- essays research papers fc

Introduction: Hepatitis is caused by a virus that is targeted at the liver, one of your most important organs!! Specifically, it causes inflammation and injury to the liver. Hepatitis comes in many different forms, five to be exact. There is Hepatitis A, B, C, D & E. Hepatitis is caused mainly by viruses, all of which are set on shutting down your liver. I will be specifically concentrating on Hepatitis A in this report. Hepatitis A is also known as infectious Hepatitis, an extremely contagious viral infection that often effects young children and young adults, especially those in large groups. It has been known to break out in schools, summer camps and music festivals etc. Hepatitis A is also very common in developing nations. Outbreaks occur due to unsanitary conditions such as contamination of the food and water supply. The Liver: The liver is an organ which is located upper right part of your abdomen. It has one main function. This function is to clean out your blood. How this happens is from your inferior venacava, there is a group if veins called the mesenteric veins. They branch off and take dirty blood to your liver to be cleaned. Now, when the virus moves in and stops the liver from doing its job, just imagine all the toxins and unwanted waste and chemicals that build up in your body.!! Causes: Hepatitis A is transmitted almost always by the fecal oral route. It is spread by close personal contact with fecally contaminated water supplies, fruits and vegetables. Poor personal hygiene promotes spread of the virus as well which is why the incidence of Hepatitis is higher in developing nations, where poor sanitary conditions exist. It can also be transmitted by raw or partially cooked clams from contaminated water. Properties of the virus: The hepatitis A virus is a non - enveloped 27 nano meters in size, virus. It is characterized as a RNA based virus. Inactivation of viral activity can be achieved by heating to 100 Â °C for five minutes, and by contact with formaldehyde and chlorine or by ultraviolet irradiation. The virus is present in the liver, bile, stool and blood during the illness. Symptoms: The symptoms of viral hepatitis are not very pretty. Getting Hepatitis is not a fun experience. The first symptoms of Hepatitis A are mild and vague. They generally appear from about 2 weeks to 6 months after ex... ...me up with a new vaccine against Hepatitis A called Havrix. I know about this because last year, before my family and I went on a trip to India, we all got vaccinated against Hepatitis A with Havrix. None of the books from which I researched had any thing about Havrix because they were not that up to date. Prognosis: In most cases of infectious Hepatitis, previously healthy people fully recover with in 2 - 6 weeks. Patients in old age or people with serious underlying disorders such as heart failure, Anemia, diabetes, cancer etc. have a much longer recovery period and are more likely to develop a much worse case of the infection and have a poorer prognosis. However, the over all mortality rate of Hepatitis A is less than 1 percent. Bibliography: 1) Principles Of internal Medicine, Isselbacher, Adams, Braunwald, Petersdorf, Wilson, Mc Graw Hill 1978 2) Medical diagnosis & Treatment, Marcus A. Krupp, Milton J. Chatton, 1980 3) Principals and practice of medicine, Harvey, Johns, Mckusick, Owens, Ross, Appleton - Century - Crofts 1979. 4) Medical & health Encyclopedia, Sidney S. Schipper, Round the world books, 1988 5) World Book Encyclopedia, 1992

Wednesday, October 23, 2019

Bachelor Degree Essay

The need for competent bedside nurses has drastically increased and so will it continue in the future. The level of basic education that a nurse should have has always been an issue of debate and controversy. The ADN program is shorter and more concise which focuses on the clinical skills and is more tasks oriented. It lacks the theory and science behind nursing as a profession. ADN nurses usually have 2-3 years education and are focused to provide individualized care to their patients based on their diagnosis. The BSN program is a four-year degree, which is knowledge, theory and research based and the emphasis is on the entire picture of the field of nursing. The BSN nurse would use the researching and critical thinking background of her education to care for patients. Many do not realize there is a difference between the two. Both associate degree graduate and baccalaureate degree graduates take the same NCLEX board exam for licensing and enter the same job. Unlike associate-degree nursing programs where the nurses function primarily at the bedside in less complex patient care situations, the BSN program prepares the nurse to practice in all health care settings – critical care, outpatient care, public health, and mental health. The American Association of Colleges of Nursing has posted a detailed position statement (2000) and fact sheet (2010) on their websites endorsing the position that the minimum entry level requirement for nurses be a BSN degree. The BSN nurse is well-qualified to deliver care in private homes, outpatient centers, and neighborhood clinics where demand is fast expanding as hospitals focus increasingly on acute care and as health care moves beyond the hospital to more primary and preventive services throughout the community. At increasing numbers of hospitals nationwide, baccalaureate-prepared nurses are being utilized in ways that recognize their different educational preparation and competency from associate-degree nurses. In these differentiated practice models, BSN nurses not only provide more complex aspects of daily care and patient education, but also design and coordinate a comprehensive plan of nursing care for the entire length of a patient’s stay – from pre-admission to post-discharge – including supervising nurse’s aides and other unlicensed assistive personnel, designing discharge and teaching plans for patients, and collaborating with patients, physicians, family members, and other hospital departments and resource personnel. Evidence shows that nursing education level is a factor in patient safety and quality of care. As cited in the report When Care Becomes a Burden released by the Milbank Memorial Fund in 2001, two separate studies conducted in 1996 – one by the state of New York and one by the state of Texas – clearly show that significantly higher levels of medication errors and procedural violations are committed by nurses prepared at the associate degree and diploma levels as compared with the baccalaureate level. These findings are consistent with findings published in the July/August 2002 issue of Nurse Educator magazine that references studies conducted in Arizona, Colorado, Louisiana, Ohio and Tennessee that also found that nurses prepared at the associate degree and diploma levels make the majority of practice-related violations. AACN and other authorities believe that education has a strong impact on a nurse’s ability to practice, and that patients deserve the best educated nursing workforce possible. A growing body of research reinforces this belief and shows a connection between baccalaureate education and lower mortality rates. Baccalaureate nursing programs encompass all of the course work taught in associate degree and diploma programs plus a more in-depth treatment of the physical and social sciences, nursing research, public and community health, nursing management, and the humanities. The additional course work enhances the student’s professional development, prepares the new nurse for a broader scope of practice, and provides the nurse with a better understanding of the cultural, political, economic, and social issues that affect patients and influence health care delivery. Throughout the last decade, policymakers and practice leaders have recognized that education makes a difference. (http://www. aacn. nche. edu/media-relations/fact-sheets/impact-of-education. References http://www. aacn. nche. edu/media-relations/fact-sheets/impact-of-education. (n. d). The Impact of Education on Nursing Practice . Retrieved May 21, 2013, from http://www. aacn. nche. edu/media-relations/fact-sheets/impact-of-education.

Tuesday, October 22, 2019

Microscopic Examination essays

Microscopic Examination essays In this experiment, our aim is examining the microstructure of metals. By studying microscopic structures of metals, we determine which material fits best to a given application. We used the most common method, optical technique, to examine the microstructure. We used a small specimen cut from the metal to be examined. To be able to see the structure clearly, we first cleaned and polished the specimen. First we start polishing with emery paper no: 1 and some finer grades. One should be careful about the coarse abrasive particles and striations from them. Cleaning and rotating the specimen 90Â ° during the transfer can prevent these. The next step is polishing, yet washing the sample before polishing gives a more successful result. Finally, we polished the specimen on a rotating cloth covered with an effective abrasive like Al2O3-Water suspension. We kept polishing until we obtained a mirror like face. After we finished polishing, the crystalline structure of the specimen, any cracks, seams, non-metallic inclusions and inhomogenities, could be revealed. Before start etching we first applied mounting process. In this step we used a matched die set. We placed our sample into the die set in the way that the rough face of the specimen was the lower surface and the polished face looked upward. We filled the die cavity with Bakelite and then we transferred our die to a mounpress. Mounting not only protects our sample but also by making its base flat and stable helps us while we are examining the sample under the microscope. In etching process, depending upon chemical composition, energy content and grain orientation, we determine the grain boundaries and the presence of chemically different phases. To reveal these micro structural details of the polished mount we used an etchant like 1% Nital. We immersed the mount with the polished face upward in a small dish of etching solution. As soon as a bloom ap ...

Monday, October 21, 2019

Cavendish essays

Cavendish essays Margaret Cavendishs Blazing World is an embankment by the imagination upon human desire. Constrained by the physical limitations of this world, Cavendishs ambition and love of thought carry her to the farthest reaches of her own imagination and to the creation of a new world. A world governed by her romancical illusions of reality; a world where desire and fulfillment, are the only reality. In the introduction, Cavendish relates to the reader a reason for her fiction. Human nature, always full of desires and ambitions, has these desires equally opposed to by a force that often overcomes, reality. Cavendish writes, but as ambitious as ever any of my sex was, is, or can be; which makes, that though I cannot be Henry the Fifth, or Charles the Second, yet I endeavor to be Margaret the First; and although I have neither power, time nor occasion to conquer the world as Alexander and Caesar did; yet rather than not to be mistress of one, since Fortune and the Fates would give me none, I have made a world of my own: (BW, 124) Knowing full the limitations upon her, Cavendish seeks satisfaction for her ambition in her only escape, the imagination. Not desiring just happiness or meager comfort, she wants the world, and everything in it to conform to her will. The essence of her aspirations she summarizes when she is talking to the spirits about her desire for a world of her own; for I had rather die in the adventure of noble achievements, than live in obscure and sluggish security; (BW, 185) Rather than suppressing these inner desires, Cavendish did everything within her power to satisfy them. Not only living her fantasies out in her mind, she wrote them down for the entire world to know. Her ambition in life was only equaled by her courage to do or write whatever she wanted no matter what audiences she displeased. Criticized on all accords, her inner fire for glory and fam ...

Sunday, October 20, 2019

Free Essays on Caste System

The Indian caste system is over 3500 years old. Still today the values of the caste system are held strongly. It has kept a sense of order, and peace among the people. There are five different levels of the system: Brahman, Kshatriya, Shudra, and Harijans. Within each of these categories are sub castes or jatis. They all have their own place among each other and accept that it is the way to keep society from disintegrating to chaos. This system has worked well for Indian people, primarily the Hindu’s, and still has a major role in modern India. The Sanskrit word for caste is ‘varna’ meaning color. When the Aryans moved into northwest India and started the caste system it was originally a color classification. The purpose of the system was to distinguish between the Aryan invaders and the previous occupants. Eventually the origins of the caste system were forgotten and it became an accepted part of society. The original caste system consisted of the first four levels. Later, when the Aryans moved across India from their original position in the northwest, they conquered more people. To fit the newly conquered people into their way of society they created a new category. The new caste was placed below the Shudras, and was called the Untouchables. Hindu’s strongly value the caste system because it goes along with their beliefs of dharma and reincarnation. Dharma means virtue. The Hindu’s believe if they fulfill their duties on earth, they will be rewarded by being reincarnated, or reborn into a higher class. This is the reason they do not help lower class citizens. They feel as if it would be going against the natural order of things. At the top of the caste system is the Brahmin. They are the caste of priests, their job is to know and repeat the Hindu text, which is called Vedas. They belong to the dvija or twice-born category, which means they take part in a ceremony to initiate them selves into the Hindu religion and are... Free Essays on Caste System Free Essays on Caste System The Indian caste system is over 3500 years old. Still today the values of the caste system are held strongly. It has kept a sense of order, and peace among the people. There are five different levels of the system: Brahman, Kshatriya, Shudra, and Harijans. Within each of these categories are sub castes or jatis. They all have their own place among each other and accept that it is the way to keep society from disintegrating to chaos. This system has worked well for Indian people, primarily the Hindu’s, and still has a major role in modern India. The Sanskrit word for caste is ‘varna’ meaning color. When the Aryans moved into northwest India and started the caste system it was originally a color classification. The purpose of the system was to distinguish between the Aryan invaders and the previous occupants. Eventually the origins of the caste system were forgotten and it became an accepted part of society. The original caste system consisted of the first four levels. Later, when the Aryans moved across India from their original position in the northwest, they conquered more people. To fit the newly conquered people into their way of society they created a new category. The new caste was placed below the Shudras, and was called the Untouchables. Hindu’s strongly value the caste system because it goes along with their beliefs of dharma and reincarnation. Dharma means virtue. The Hindu’s believe if they fulfill their duties on earth, they will be rewarded by being reincarnated, or reborn into a higher class. This is the reason they do not help lower class citizens. They feel as if it would be going against the natural order of things. At the top of the caste system is the Brahmin. They are the caste of priests, their job is to know and repeat the Hindu text, which is called Vedas. They belong to the dvija or twice-born category, which means they take part in a ceremony to initiate them selves into the Hindu religion and are...

Saturday, October 19, 2019

Branding and Business Enterprises Assignment Example | Topics and Well Written Essays - 750 words - 4

Branding and Business Enterprises - Assignment Example The author of the paper states that the type of brand of an enterprise is usually formulated from who the business enterprise consist of, the expectations of what they expect to become in future and lastly the perception of society and the people have towards the entity. A business cannot at any single point have opposing qualities. For example, the business enterprise can be quite innovative in nature, producing high-cost goods and services as well as high quality of the products in question. In other words the fountain of a business’ brand is its logo, the enterprise’s website, its mode of packaging and lastly its materials of promotion should ingrate the enterprise’s logo and consequently pass the message of its brand. After talking to Dr. Jim Friedman, branding has more meaning than the usual notion we had in the past. He was not afraid to speak out his mind by shading light to very gray areas of business and marketing in general in the society. He does not a llow a person to stay in a comfort zone because one will not achieve much in such a place and hence result in failures in life. When relating with others, he remains true to himself and does not pretend to be someone he is not and encourages individuals to emulate that quality from him. Kailin has an idea and brings along a water bottle of water which contains words from a famous American poet, W. H. Auden, who is renowned for his poetic works and the love he has for poems. The words are that â€Å"Thousands have lived with love, not one without water.†

Friday, October 18, 2019

E-Commerce Systems Essay Example | Topics and Well Written Essays - 1000 words

E-Commerce Systems - Essay Example The direct financial service is advantageous in terms of efficiency in the achievement of needed services. This can be attributed to the fact that, a company or institution provides goal specific services. For example for a bank or a credit card company, one must be linked directly to the site of a specific company. Through the said system less complication can be met. For that matter, the clientele that can be attracted are those who know the discipline and are sure of what they need and want, and those who are not familiar with complicated online systems. For that matter, the said system of financial services can be considered advantageous to a wide variety of consumers. One disadvantage of the said system though is the danger of putting trust on a single entity as compared to the system with intermediaries which in the said case can be considered more secure (Carlon, Ryan and Weledniger, 2010). The financial services with intermediaries on the other hand can provide benefit such as the decrease in transaction costs due to the sharing of assets, goods and services of the different groups and companies that comprise one system. This structure also increases security based on the fact that risks that can be encountered are shared by the whole group. A disadvantage that can be cited though is the complex structure that can create certain problems in different transactions and financial services (Carlon, Ryan and Weledniger, 2010). Australian Government Treasury (1999) Financial Products, Service Provides and Markets – An Integrated Framework [online]. Available from: [Accessed 20 May 2010]. Carlon, M., Ryan, M. and Weledniger, R. (2010) The Five Golden Rules of Online Branding [online]. Available from Dynamic Logic, AdRelevance and 24/7 Media: [Accessed 20 May 2010]. Reverse auctions

Why was World War One a necessary war for the United States Essay

Why was World War One a necessary war for the United States - Essay Example According to the lecture notes, the WWI was inevitable because â€Å"it protested our trade and alliances as well as stopping a super power from taking over (Lecture notes, October 21, 2013).† Several factors contributed to the inception of WWI, whereby some of them were key and necessary for the USA to join besides protecting their interests in various regions globally as a super power. Germans were the central factors that prompted the inception of the war. Before the WWI, Germany employed diverse ways intended to enhance communism in the USA neighboring regions, which the latter felt there was a launched threat that entailed immediate action. Germany directly attacked USA allies using distractive communists’ movements during that time. USA during then could not stand seeing Germany taking over states where it had invested its interests. For instance, colossal amount of money that the state had parted with to ensure its allies succeeded in subduing their adversaries ( October 23, 2013). This prompted the USA to engage in WWI besides it being a strong anticommunist state that ensured the progress of democracy. This could have degraded the trustworthiness of the US military. According to Mooney, the American government had the obligation to fight and â€Å"†¦.make the world safe for democracy (Mooney, 83).† USA also had in mind how it had gave its allies colossal amount of money. The 2.3 billion cash was very vital for the communities that owed the USA. According to lecture notes, â€Å"allies war debt to American bankers. Ninety nine percent of the money load to Allies, if Allies lose the war, America would not get the money back (lecture notes October 23, 2013). Therefore, WWI could act as a stumbling block in enabling allies to repay what they got from US. According to Mooney, American investors worried they might lose the money loaned to Allies if the Central Powers won the war (Mooney, 80). Under this circumstance, the United Stat e of America found it vital in securing the amounts of money that the allies would release to them by engaging their adversary. The shipping business, which USA during then undertook was also a factor that prompted it to decide waging fierce battle against communists. The United States of America during then was increasingly gaining naval strength, hence trying its best to prevent the entry of some unwanted merchandise into the county, which were basically weapon and military items. They were also using the shipping activities to import and export food items within the country. These actions would hinder the supply of essential commodities to the United States. According to Senator George, â€Å"the enormous profits of munitions manufacturers† during then was to extent US market and other similar networks (Senator George, 4 April 1917).† On the contrary, Germans were trying to block the entry of boats into Britain. This moved the United States of America to wage war aga inst them, which was an apparent reason why the USA resolved to join the WWI in 1917. This is because Germans were interfering with USA’s economic progress as well as security system. Hence, Germans actions being a threat the policy of Franklin Delano, which was to protect security systems of United States of America. During the period of the WWI, there was a quest for power among the nations. Each nation wanted to be the controller in some extent. Therefore, USA being in a position of superpower supported other nations in different ways, which gave them enormous prestige. According to Thomas J. Fleming, US was supplying some of the big powers with ammunition approximating â€Å".40 percent of their war materiel†

MBA -International Business- Essay Example | Topics and Well Written Essays - 4000 words

MBA -International Business- - Essay Example Production can now be done within different nations as well as distant geographical regions by companies through the process of internationalization. This has probed the multinational corporations or individuals who intend to venture into the international trade to learn about international business. However, countries differ in institutional frameworks, social cultural as well as the political orientation. It is thus very important to learn and understand the different cultures, institutional frameworks as well as the political scope of the other countries for the sake of any beneficial interaction. They are critical determinants of the performance of the introduced business as wholesomely they form the business environment t in which the business will be operating. Differing perspectives within countries as regards to these institutional as structural set-ups would differently affect the business. The success of an industry within one country does not therefore automatically ascert ain success to the same business within another country. For instance, the United States and Brazil are nations that regularly interact in business relations. In the United States, the first impression matters a lot and is basic to the success of every business relationship. The Americans appreciate eye contacts and a firm handshake with business partners (Bowie, n.d p.1-12). In regard to understanding the intrigues surrounding the expansion of a manufacturing industry from the Western country into a member country to the BRIC block, we shall take an analysis case of a textile firm based in the U.S.A intending to expand her operations into Brazil. Brazil is a member country to the BRIC group together with the Russian republic, India as well as China (Pedro et al, 2012, p.4). This research intends to study the opportunities and challenges, associated with the cultural and political environment in Brazil and which are likely to affect a foreign textile industry there. We also intend t o study other appropriate business forms for the manufacturing plant. Lastly, we intend to survey the business environment in Brazil, through which we shall explore the opportunities available as well as the challenges that this manufacturing industry is likely to face while exploring the market within Brazil and thus have dependable conclusions and recommendations. Discussion: Administrative duties within Brazil are carried out in Brasils as it is where the elected federal officials reside, she is the 6th largest economy after she over did UK in 20111 (Lara, 2010, p.6). She has a population of approximately 180 million people with majority of the people living in urban centers. She has a modern economy with agriculture servicing about 9 percent, industry and manufacturing servicing about 37 percent and service industry servicing about 53 percent of the total GDP. Over a long time, her largest business partner has been the United States though greater trends are emerging with China and the middle-east countries taking shape in the international business scene with her. Between 1930s and 1960s Brazilian economy was dominated by import substituting industrialization. She has however, undergone through a great ideological reversal since then (Cardoso, 2009, p.5). She is now a major global participant within the global market with

Thursday, October 17, 2019

Factors That Have Shaped Bahamian Culture Essay

Factors That Have Shaped Bahamian Culture - Essay Example The essay "Factors That Have Shaped Bahamian Culture" discusses a number of factors that have shaped the Bahamian culture and identity since a large number of Haitian migration to the Bahamas at the end of the 18th century have been instrumental in constant tension between the Bahamians and Haitians. However, the Haitian retention of African based beliefs and customs, its music, folklore, and gambling habits, has had some effect on the Bahamas. Since 1967, there have been developments in music, dance, festivals, literature, painting crafts, and architectural preservation, which have helped define a Bahamian identity. The Department of Archives plays a dominant role in preserving the rich island architectural heritage and takes care of the antiquities, monuments, and museums. However, the lack of recognition by other Caribbean countries has been a great stumbling block for the nation to establish its own identity and many outsiders viewed the Bahamas as an offshoot of the United State s and a tourist Mecca with sun, sand, sea, and sex, and a society devoid of serious writers. Analysing the Bahamian culture one can understand that it is the Bahamian African culture that has shaped the Bahamian identity and that factors such as the tourism industry, the changed political scenario, and the oral tradition and newspapers have been instrumental in developing the Bahamian culture and identity. Yinna points out three elements that contributed to the formation of a ‘collective self-image’ among the Bahamians after 1973.

Internet Connections Essay Example | Topics and Well Written Essays - 500 words

Internet Connections - Essay Example A wireless router may extend signals to about 100 feet in all directions, but these can be interrupted by walls. However to obtain enough coverage a range repeater or extender can be utilized. Moreover, a wireless network adapter installation will be needed in each of the devices that need to be connected. Any device that uses the Bluetooth can also be connected easily to each other, inside a 10 meters range, and most computers, printers, cell phones, home entertainment systems, cell phones, printers, computers and other gadgets come with this technology already been installed. However, Bluetooth adapter helps if it’s not built in the computer (Mitchell, n.d). a) I will prefer my DBMS server to be installed on separate machine as if other internet connected machine (e.g. Web server) may get compromised my database would be safe from this attack (Martinez, n.d). b) Web server software allows a computer to host different websites via the domain name system (DNS). This system translates domain names that are people-friendly, such as "domain.com" into Internet protocol (IP) addresses that pertain to the server that actually stores the information. It also enables a single server to host multiple websites or applications, despite the fact that computers traditionally only have one IP. Email servers are a part of an overall message system (Squared, 2009). Hubs are utilized in networks that employ twisted-pair wiring to join devices. Hubs can be connected together to make larger networks. These are easy devices that direct information packets to every device linked to them. Switches, like hubs are connectivity spots in Ethernet network. Devices are connected to switches by twisted-pair wiring, each device having one cable. Switches receive data and forward it to only that port which is connected to the target device by learning the devices’ MAC address connected to it, and by

Wednesday, October 16, 2019

MBA -International Business- Essay Example | Topics and Well Written Essays - 4000 words

MBA -International Business- - Essay Example Production can now be done within different nations as well as distant geographical regions by companies through the process of internationalization. This has probed the multinational corporations or individuals who intend to venture into the international trade to learn about international business. However, countries differ in institutional frameworks, social cultural as well as the political orientation. It is thus very important to learn and understand the different cultures, institutional frameworks as well as the political scope of the other countries for the sake of any beneficial interaction. They are critical determinants of the performance of the introduced business as wholesomely they form the business environment t in which the business will be operating. Differing perspectives within countries as regards to these institutional as structural set-ups would differently affect the business. The success of an industry within one country does not therefore automatically ascert ain success to the same business within another country. For instance, the United States and Brazil are nations that regularly interact in business relations. In the United States, the first impression matters a lot and is basic to the success of every business relationship. The Americans appreciate eye contacts and a firm handshake with business partners (Bowie, n.d p.1-12). In regard to understanding the intrigues surrounding the expansion of a manufacturing industry from the Western country into a member country to the BRIC block, we shall take an analysis case of a textile firm based in the U.S.A intending to expand her operations into Brazil. Brazil is a member country to the BRIC group together with the Russian republic, India as well as China (Pedro et al, 2012, p.4). This research intends to study the opportunities and challenges, associated with the cultural and political environment in Brazil and which are likely to affect a foreign textile industry there. We also intend t o study other appropriate business forms for the manufacturing plant. Lastly, we intend to survey the business environment in Brazil, through which we shall explore the opportunities available as well as the challenges that this manufacturing industry is likely to face while exploring the market within Brazil and thus have dependable conclusions and recommendations. Discussion: Administrative duties within Brazil are carried out in Brasils as it is where the elected federal officials reside, she is the 6th largest economy after she over did UK in 20111 (Lara, 2010, p.6). She has a population of approximately 180 million people with majority of the people living in urban centers. She has a modern economy with agriculture servicing about 9 percent, industry and manufacturing servicing about 37 percent and service industry servicing about 53 percent of the total GDP. Over a long time, her largest business partner has been the United States though greater trends are emerging with China and the middle-east countries taking shape in the international business scene with her. Between 1930s and 1960s Brazilian economy was dominated by import substituting industrialization. She has however, undergone through a great ideological reversal since then (Cardoso, 2009, p.5). She is now a major global participant within the global market with

Tuesday, October 15, 2019

Internet Connections Essay Example | Topics and Well Written Essays - 500 words

Internet Connections - Essay Example A wireless router may extend signals to about 100 feet in all directions, but these can be interrupted by walls. However to obtain enough coverage a range repeater or extender can be utilized. Moreover, a wireless network adapter installation will be needed in each of the devices that need to be connected. Any device that uses the Bluetooth can also be connected easily to each other, inside a 10 meters range, and most computers, printers, cell phones, home entertainment systems, cell phones, printers, computers and other gadgets come with this technology already been installed. However, Bluetooth adapter helps if it’s not built in the computer (Mitchell, n.d). a) I will prefer my DBMS server to be installed on separate machine as if other internet connected machine (e.g. Web server) may get compromised my database would be safe from this attack (Martinez, n.d). b) Web server software allows a computer to host different websites via the domain name system (DNS). This system translates domain names that are people-friendly, such as "domain.com" into Internet protocol (IP) addresses that pertain to the server that actually stores the information. It also enables a single server to host multiple websites or applications, despite the fact that computers traditionally only have one IP. Email servers are a part of an overall message system (Squared, 2009). Hubs are utilized in networks that employ twisted-pair wiring to join devices. Hubs can be connected together to make larger networks. These are easy devices that direct information packets to every device linked to them. Switches, like hubs are connectivity spots in Ethernet network. Devices are connected to switches by twisted-pair wiring, each device having one cable. Switches receive data and forward it to only that port which is connected to the target device by learning the devices’ MAC address connected to it, and by

Promoting the Culture of Peace in the World Essay Example for Free

Promoting the Culture of Peace in the World Essay Introduction: No doubt, the world is a vast battle-field where almost every nation fights each other. Every nation has its own military equipments. What are these for? They are only for fighting other nations whenever a war breaks out. This only shows that the world is in a very dangerous situation now a day. Every day, every second, there is a possibility of outbreak of war, nuclear war as well as cold war. It means that there is a big threat in our every day life. Not only this, terrorists also make every corner of the globe insecure. It is disheartening that the old aged, innocent children and women are in this situation that they do not feel secured and safe. Who is responsible for this, is it the politicians, or the armies, or the bureaucrats? All of them including the selfish industrialists and rich people are responsible. Who would then step out to deal with this restlessness? We, the Youth would surely be the answer. Basic Elements: The basic important step to be taken by the youth is to protect and promote human rights. Human rights include our rights for living; in order to live, we need food, and in order to have food, we need to work to earn our daily living. Peaceful and happy life is the dream of everybody. If any one is lacking of peaceful life, he is automatically lacking of happiness, so that he may become desperate, depressed or disappointed in life. The desperate or disappointed persons are the most dangerous persons in the world. In the context of North East India where various terrorist groups are in active, one Minister in the region once said, The main cause of insurgency in the North East region is that the Centre neglected this remote area. This would be true to some extent that almost all the insurgent activities in North East India are demanding independence. Some of them are seeking for secure life which would be free from the threat of assimilation by other communities. The immediate cause of insurgency in the Lushai Hills (now Mizoram) was also Mautam Famine that Laldenga and friends felt that the Central Government of India was not taking a satisfactory action to relieve the victims of that famine, and then they rebelled against the Government of India and declared Independence in the year 1966. All these are related to Human Rights, since the people felt that the Government was not taking any step for the well being of its people, almost all of them supported the rebellious activities. From the above viewpoint, we may perceive that the main cause of insurgency and terrorism is human rights violation where the victims became conscious of their rights and then claimed the same consequently. In the context of the Middle East Crisis, one thing very clear is that almost all the terrorists in that area fight for freedom, not only for political freedom but also for religious freedom. Some Islamic terrorists fight for the supremacy of Islamism that would be free from Christian domination. In all the activities of the insurgents and the terrorists, the most important instruments are the youth of those respective communities. Supposed, all these youth who are in active in terrorism and insurgency had quitted their efforts for the same, obviously the activities of insurgency and terrorism would have been null and void and there would not be a big threat in our every day life. Nevertheless, these youth had firmly committed to fight for their community and to sacrifice their lives for the same. So, in order to promote peace culture, the youth are most concern. What to do: Since the important hand and leg of terrorists are youth among themselves, the responsibility of the youth today is very high that we need to step out to deal with this. Walt Disney said that the way to get started is to stop talking and to begin working, so that it is not enough to discuss and debate upon Promotion of Culture of Peace in the World, we have to step out. It is the duty of every intellectual and educated youth to win the heart of our brothers and sisters who are in active in terrorism. We need to negotiate them, whether or not they welcome, we need to approach them, we may fail at once, but we should not quit. Dr. APJ Abdul Kalam, the former President of India on the occasion of his visit to Mizoram University on 24th September 2005 said, â€Å"Where there is righteousness in the heart, there is Peace in the World†. This statement is truly acceptable because the righteous person would never harm the others, he would never hamper development of the world Peace and Prosperity. So that we, the youth have to keep this in mind, and let it remind us of our duty to counsel our fellow youth, whether they are terrorists or civilians. For promoting the culture of peace in the world, it is an urgent need to take the suggested steps mentioned below: †¢As mentioned above, the first important step would be creating awareness among the youth, common people. We should make our fellow youth aware of the urgent need to make an effort for promoting the culture of Peace in the world. We can organize awareness campaign and other various programmes related to it. We can make them aware of the same by writing articles and essays in the newspapers and magazines. †¢We can produce Television Programme and documentary films related to terrorism and the urgent need of stepping out in mission to stop terrorism. †¢We can have sincere conversation with our friends, families and so on. So that they can propagate this issue to various other persons. If we do so, it would be effective in promoting the culture of peace in the world. †¢To have peaceful life, one should have secure life. So, it is our duty to push the government of our respective country to provide for various schemes for the well being of its subjects. For instance, in the State of Mizoram, the common people are not satisfied enough by the developmental works carried out by the state government, so that the farmers are recently conscious of their rights, they revive and constitute an organization known as â€Å"Zoram Kuthnathawktu Pawl (ZKP)† that is strongly going on to drive the government to the right way. In the mean time, almost all the members felt frustrated and has become despair because of corruption, and then there is a big threat of bloody revolution. All these are the result of unsatisfactory governance, practice of corruption, negligence, so on and so forth. However, at the same time in Mizoram, the senior prominent citizens revived and recently constituted â€Å"Mizoram Democratic Movement (MDM)† which was also the outcome of famous television Talk Show entitled â€Å"Thalaite Hmathlir (Vision of the Youth) organized by the youth that inspire and motivate everybody who is willing to have good governance. These youth of Mizoram also recently constituted an organization called â€Å"Youth Movement for Mizoarm (YMM)† that brought about moral reformation and awareness on the urgent need of good governance. And it blows like a cyclone within the state of Mizoram. Many people supported this movement and it is now hoped that it would bring about peaceful revolution. This YMM has been taking active part in promoting peace and prosperity, and because of their movement, the threat for bloody revolution by the ZKP has also calmed down and these three organizations are planning to work in cooperation for peace and development. So, it is obvious from this instance that we, the youth would step out to create awareness, to motivate our fellow youth, to inspire our parents to stop practicing corruptions and any other unfair means for promoting the culture of peace in the world. †¢We should negotiate and counsel our fellow youth who are in Terrorist groups telling them that it is not the reason why God made us to terrorize the others. We should prevent instigation of the new generations by terrorism and insurgency. †¢We should also motivate religious leaders to feed their sheep spiritual and moral laws, to tell them the purpose of God in creating men, to propagate the essentiality of peace and harmony in living together, to love one another. †¢We should always remember Gandhiji’s â€Å"Ahimsa†. As mentioned in the beginning of this paper, Nissim Ezekiel, Indian poet urged the people of the world to follow Mahatma Gandhi and that is the right way to promote Peace and Non-Violence. Works cited: oRamdinmawia, James. Poet or Reader. Talk on All India Radio, Aizawl Station. oEzzekiel, Nissim. Very Indian Poem in Indian English. oLalrawnliana, Col. Mizoramin Zalenna a Sua Vol. 2. oKindyah, P.R. Mizo Freedom Fighters.

Monday, October 14, 2019

Overview of Different Web Structures

Overview of Different Web Structures Dark Internet, Dark net (File Sharing), Turbo10, Meta-Search Engine Mansi Iyengar (SCU ID: W1170603) This project is targeted for the researchers to gain insight into the different web structures. The primary focus being deep net and dark net. It also throws light on file sharing in dark net along with meta search engines used by them. This report is based on dark net, metasearch engines and file sharing mechanism. It has been categorized in the form of chapters. Each chapter gives us the below information Chapter 1 tells us about the different structures in the web Chapter 2 provides an overview of dark net and TOR Chapter 3 describes the file sharing mechanism in dark net and commonly used approaches Chapter 4 focuses on operation of meta search engine Chapter 5 talks about Turbo10 search engine for deep net The linkage of each web page is referred by websites structure. Consider for a website having high number of web pages. In such scenario, crawlers should have the ease to find the subpages. Figure 1: Web structure [1] Figure 1 portrays entire web structure that comprises of: Surface web Deep web Dark web Surface web The traditional internet we use for everyday life is the world wide web. Represented by www. Deep web Deep web provides the hidden part of the internet. Search engine do not index these. Thus deep web stands apart from the traditional web. Some components of deep web include email, online banking, on demand videos Dark web Dark web is different from above traditional web types. Dark net stands for a network accessed via specific software or configuration using protocol that are not standardized. For everyday life, we use regular search engines such as google. The exists websites that cannot be looked up on google. For such websites need a particular application in order to access. Such websites are known as dark web. Dark net comprises of decentralized computers that collaborate in tandem to send information from origin to the target. Some of the popular dark net are Limewire, Gnucleus. Users are members that share information. Hosts are the computers that help share the information. Dark web is also known as dark net or dark internet. For ease of understanding we can consider software named as Tor. Tor provides the functionality wherein the user cannot be identified on traditional websites. TOR Tor also provides sites that have hidden services. Basically the hidden or anonymous feature is leveraged to masquerade where server is situated. Tor makes it almost impossible to trace the members accessing website. Tor is not fool proof and comprises of some flaws. These pertain to security configuration. This gap can be used by officials to determine the real server location. The popularity of TOR is extremely high and hence most commonly used. Hence the focus on this example. Features of dark net However, dark nets provide additional facilities different from above. These may include collaborative effort of handling non-licensed software and content Content found on dark net On two fronts dark net facilitates anonymity member visiting website and also for website itself. Governments too use dark net. For example, in order to gain data bypassing and censorship, Tor provides that option Dark net too can be used by politicians. This is serves as a platform to mediate and take decision. Secrets are revealed by whistle blowers on certain sites so that they can avoid being traced. Webpages such as Strongbox help serve such purpose. This leads to establishment of websites that traditionally are not used. They can be used for anti-social purpose. For example, stolen credit card information, illegal currency, drugs and weapons are found here. Gambling activities too are provided. Illegal drugs and goods, part of commercial dark market are made popular by silk road and diabolic market. These are attacked by legal teams. Alternate hacking services are sold. These are at group level or individualistic level. This has led to cyber-crimes and counter cyber investigation. Government has started looking into these using tools procured from Procedia Computer Science journal. Denial of service attacks too have been made through Dark Web. [4] File Sharing File sharing involves the method of dividing or enabling digital media access such as audio files, video files, programs or eBooks. There are multiple ways to attain file sharing. Generally used approaches of storage, transmission include web url hyperlinked docs., p2p networks and centralized servers. [3] Figure 2 file sharing The above figure shows us how figure shows how file sharing can be achieved between access controlled digital systems like private, public and invited. P2P file sharing process Computers or nodes are connected with each other as part of P2P network. The members have the ability to share or download information immediately via the web. Figure 3 Peer to Peer network Above figure shows peer to peer network. Based on the model of self-server and client model, P2P is set up in general. for example, when the member connects to the P2P client and after initiating file download, he gets connected with other members downloading the information. In other words, others peers serve as file server. The initial member also acts as file server when another peer starts to download the file. Eventually this leads to augmenting of download speed. Some commonly used torrents for P2P are bittorrent and ÃŽÂ ¼Torrent. Other popular P2P networks being BearShare and LimeWire. [2] OnionShare Consider App called OnionShare that is available for multiple Operating Systems. This is a P2P program. Entire information from TOR anonymity network is sent through this file sharing program. consider regular file sharing system needs faith. Law regulators can tap into these. Tor helps bypass third party, there is direct sharing of file from one person to another via anonymous network Figure 4 OnionShare The above figure describes OnionShare process. After Tor instance is running, OnionShare will run. The beginning part is by starting a local web server that is viewable as tor hidden service, generating web link that cannot be guessed out. This web link is used to download the file. The web link is then provided to the recipient person via secure method the webserver is cancelled The moment the receipt downloads the file, Now the file becomes inaccessible to anyone. These is scope to expand this further by having a continuous running server in order to share with multiple recipients [5] BitTorrent File Sharing Process Background BitTorrent file sharing protocol for dark net. BitTorrent is a peer-to-peer file sharing protocol and the most popular one according to a report  by (2008). In the same report one can read that BitTorrent takes  up a substantial amount of all the internet traffic in the world, between 27 and 55 percent depending on geographical location. This makes BitTorrent not only the most used protocol for file sharing, but of all application layer protocols. As per Schulse and Mochalski , Bit Torrent is popular file sharing protocol. This is also used by Darknet. BitTorrent breaks data into parallel smaller chunks instead of single chunk, enhancing reliability and reducing vulnerability Approaches for bit torrent file sharing Provided below are two approaches for bit torrent file sharing: Torrent file approach TFigure 5 Torrent file sharing approach A torrent file is setup that has tracker, file contents. This file is smaller than original file. Seed is the uploader and leech is the downloader. Above figure describes the torrent file sharing approach. User first downloads the torrent. From torrent the set of peers is found. From the network, file pieces are exchanged. Files are treated instead of atomic blocks but as smaller chunks. Advantage is that the bandwidth is spread among peer as against just the seeds. The tracker for a torrent provides peers a peer list. In this manner, bit torrent communication takes place, which is the same process involved for seeders and leaches DTH approach There is a second approach that bypasses the tracker. This provides greater anonymity. This approach is performed without generating torrent file. For this purpose, bit torrent protocol ends up implementing DHT i.e. distributed hash table. Figure 6 DTH file sharing approach The above figure describes DTH file sharing approach. DHT provides a set of key, value saved in it. The working is similar to how has table works. Nodes have ability to detect noes based on the key. There is unique identification for each node. For this the communication utilized is User Datagram Protocol (UDP). The benefit is that there no centralized trackers. However, the track list is provided by peers that send peer list. Traditional torrent file has web link to a tracker. This step is by passed in second approach, wherein DHT web link is used. DHT network is entered into by the peer using the URL. From the entry node, it can search across other networks for files and peer connection for file sharing. [6] The results of other databases are combined in meta search engine. It takes up the concatenation of various results from various search engines and links then to various resources. [1] Virtual databases are generated from the mirrors of the physical database results of other search engines. These virtual databases are generated from the meta search engines. The searches are concentrated over certain criteria. [2] Background Searching the web with multiple search engines was the issue tackled by researchers. One of the outputs was meta search engine. Search Savvy was the first engine discovered and used by Daniel Dreilinger from Colorado State University. This engine looks over the results from 20 different directories and search engines at once. Meta search engine crawler discovered by Eric Selberg at Washington University. It used its own search engine syntax and searched over 6 search engines. Dogpile formed at University of Pittsburgh and Pennsylvania State University measured ranking and overlap of various search engines. This proved to have one of the best results. [3] Advantages More information and search coverage can be achieved by using meta search engines. This helps the user to get faster and accurate results.   The query of the user results is generated in unique ways by using the indexes which are aggregated by search engines. The input effort for a meta search engine and normal search engine are the same but the results retrieved are more. They also reduce the effort of users to type on various search engines to find file and resources. Disadvantages Translation of the query format or understanding the query forms can be an issue in the meta search engine. All the results sets of a query are not given to a user as the links generated from a meta search engine are limited. The links generated are limited. Promoted websites are given higher priority over other websites. It is probable that the user will get multiple results from the search engine. It may not be stream lined. This is especially an issue due to more coverage over the queried topic. The users find it difficult to use meta search. They might not be able to get any precise information. Operation The above figure describes the meta search operation. The search engine receives a query from the user. The key parts are as below: Broker:   The query needs a pre-processing as each search engine has a specific format of the data being fed in. As they depend on different operators and they do not share the same syntax. The output is a series of ordered set documents. Rank: the documents are raked post identifying the result pages and also in the order of the most relevant links. [4] The input query is passed to the search engines database. It creates a virtual database. This helps to combine data from various sources. Duplicates can be generated as various search-engines have different methods of indexing the data. This output data is then processed by the meta-search engine. The revised list is produced for the user. They would respond in the following ways. 1)   Access to the meta-search engine reference is provided which also includes the private access to the database system The changes made on the database system would be captured. 2) In a non-cooperative way, the access to the interface may or may not be provided. 3) Meta search engine is denied access to the search engine. Architecture of ranking Above figure describes the architecture of the meta search engine. It consists of the users query being sent to the meta search engine. It contacts the other search engines its connected to. They process the results and generate resources. These results are then preprocessed and then given back to the meta search engine as a response. This collective response is given to the user. Fusion Fusion is a process for data filtering. It helps to build up efficient results. Collection Fusion Unrelated data is indexed via search engines it is dealt by the Collection Fusion process which is also a distributed retrieval process. Ranking on the data is based on how probable is the data to give the required information to the user. It picks up the best resources and ranks it. The resources which are selected are combined in a list and given to the user. Data Fusion Figure 9: Data Fusion Architecture Above figure give the architectural reference of the Data Fusion. L0: The user information which the sensors and the sources process is given to the fusion algorithm L1: The machine process of converting L0 output and it feeds it to the L1 process L2 L3: The human process of manually marking the retrieved data as relevant or not L4: Resource management layer adds to the sources and the L2/L3 layer providing th necessary feedback L6: The mission management helps to add context to the user query. This is added to the resource management layer L5: Once all the processing through the layers is complete the data is given back to the user. This is fusion mechanism which relies on the common data sets which are retrieved by search engines. The initial ranks are combined into a list. The analysis of the actual ranks of the documents retrieved is calculated. The links of the documents with the highest relevancy score is selected. ComboSum is one of the techniques used to normalize the scores. The scores produced are incomparable as different search engines run on different algorithms. Examples of Meta-Search Engines DeepPeep Figure 10 DeepPeep Snippet Above figure is a snippet for DeepPeet. Public web pages are indexes and expanded by search engine. It does so by search through various public databases. Traditional search engines cannot index by DeepPeep. It also looks to find urls into deep web. IncyWincy Figure 11 Incywincy snippet Above image is Incywincy snippet. It uses many search engines, combines and filters the results. It crawlers more than 200 million pages. It uses its unique algorithm for relevance tests. CompletePlanet Figure 12 Complete Planet Above figure is snippet of Complete Planet. It indexes and crawlers many search engines and special databases which are not public. It is one of the  Ãƒâ€šÃ‚   main search engines of the deep web. Other Deep Web search engines include Intute, Infomine, Scirus, Turbo 10. The above figure is the Turbo 10 is a meta search engine snippet. It helps to engineer a universal reference for Deep Net. It refers to topic specific search engines. Google and Yahoo like crawler-based search engines do not use these files. Turbo 10 also lets you add more engines to the collection on which your search query is executed. [7] Pros The positive thing about turbo10 is that it has the ability to connect and maintain connection to online databases in bulk. This provides connecting to thousand engines in a fully automated capability which is scalable to further connect to another thousand. Turbo10 also finds content on deep net. Deep net encompasses multiple databases covering wide range of topics such as business, colleges, government teams. These are not accessible to traditional web engines and google. Traditional search engines are helpful for indexing static pages. Thus a rich experience is provided as we can tap into multiple databases across such a large range of domains, empowering the user. Turbo provides the option of having ten search engines to search from. Unlike other search engine like AskJeeves, that faces drawback of segregating information into different boxes, turbo streamlines the process by proving the result in weighted listing. This makes Turbo10 the ultimate search engine of search engine. Consider the fact that say four search engines are selected, turbo10 does the work of selecting additional six search engines as it deems as best fit. The result set would be based on either relevance or speed. The decision is independent of the search independent of search engine selected. The above reduction of search result occurs by usage of clusters in box on left-hand side. The benefit of having clusters a few time, desired result set is obtained quicker as against advanced searches or logical expression Turbo10 provides a new search paradigm. For a given page, there are ten result lists on a page. These have arrows. Thought this may also be unpopular, this generates hundred results for a given search. The average case being thirty to forty result set being provided as three or four pages are returned. . Google gives lots of options. Unlike Google, Turbo10 simply limits the search results and provides limited result set The main idea is that with Turbo 10, ability to choose search enigne is provided. Whereas say for a particular item through google, we need to keep searching and may find the same at pat a latter page say page forty How is the ability provided to select ten search engines? The task is completed via the web. A collection name is assigned to the ten search engines, mapped to your email. Capability Turbo10 has a vision to emerge as a leader for search engine Plan to use amazon based recommendation algorithms for personalized searching. This would include personalized profile search, providing bookmarking feature an ecosystem to be setup wherein the users profile would interact with other users. Additional browsing options would be generated for users. Revenue model would tap into sponsored web links. These would be flagged licensing of the product to corporates. Cons Tturbo10 faces the drawback of being highly cluttered. Google has lots of white spaces. The search results are not cramped up. Turbo10 is not visually appealing. It has purple colour screen that may not be appealing to all Many times the returned result set is cluttered. Sometimes the result set gets jumbled affecting result set. Additionally, there is no consideration for punctuation marks or logical expressions. Does not have ability to cache information. Due to high demand and expectation, knocked offline. Intense competition with google. The project is based on dark net ecosystem comprising of file sharing mechanisms and meta search engine. Dark net has continuously using evolving technology such as TOR, OnionShare. These help enable provide benefits of being anonymous protecting their identity. Similarly, the website to gets to preserve their anonymity. Dark net serves as a platform of communication to mediate, take decision and share information. These are used by different agencies including government and non-traditional activities such as whistleblowing. Products that are not listed in traditional websites too are available on such platforms. File Sharing approaches save bandwidth by helping sharing information efficiently. Easier to back up information. Fault tolerance is enhanced through decentralized approach part of peer to peer networking. Comparatively there is ease of maintenance over traditional files sharing system. Meta search engines help to get streamlined results from various search engines which helps to improve relevancy of searches. The benefits of dark net also include cross border payments, ensure complete privacy of sender and receiver. There is application in cryptocurrency, digital trading, eliminating middlemen. Set up of hassle free payments independent of weekend or holidays. Benefit of decentralization is control over your content that you want to share. Other advantages include establish net neutrality which means that internet can be used for all and not monopolized. Hence there is a large scope for expansion in dark net space and technology is playing a pivotal role in enhancing its adoption. [1] https://www.linkedin.com/pulse/internet-deep-web-dark-net-firas-saras [2] https://sysinfotools.com/blog/peer-to-peer-file-sharing/ [3] http://www.spiroprojects.com/blog/cat-view-more.php?blogname=What-is-file-sharing-system?id=262 [4] https://www.howtogeek.com/275875/what-is-the-dark-web/ [5] https://darkwebnews.com/anonymity/some-ways-to-share-files-anonymously/ [6] Johan Andersson Gabriel Ledung, Darknet file sharing application of a private peer-to-peer distributed file system concept [7] http://techdiction.blogspot.com/2007/01/turbo-10-search-deep-net.html URL  Ãƒâ€šÃ‚  Ãƒâ€šÃ‚   Uniform Resource Locator TORThe Onion Router UDPUser Datagram ProtocolDTHdistributed hash table WWWWorldwide web

Sunday, October 13, 2019

Physics of Snowmachining :: physics snowmobile snowmachine

Whether zipping along a winding trail, flying through the open flats, or powering up a steep hill snowmachines and the rider need to use physics to stay in control of the machine and themselves. The main compenents are the track, engine, skis and riding. Snowmachine tracks are essential to making a snowmachine move. Ever since snowmachines first originated in the late 50's designers have been finding ways to improve traction in a variety of conditions. Some of these conditions are driving on groomed trails, not groomed trails, overflow, and deep snow. The very first snowmachines had tracks with very bad traction. But you must realize that they weren't driving in the same conditions snowmachines of today can handle. Old machines were limited to readily used trails and very little powder. The tracks used on the old machines looked like the one shown in the picture below. The traction, the little raised bits of rubber, was minimal and the tracks weren't very economical either. The first attempts at making a track was using steel, which was too heavy, and rubber, which was to flexible and brittle at cold temperatures. Eventually manufacturers found the key ingredients. Kevlar tracks with imbedded nylon strands to reinforce and improve strength. A kevlar track is now the standard in today's snowmachines. Another key ingredient to the track is the paddles. Paddles are the pieces coming off of the track itself, a picture these paddles is shown below. This is what provides the traction for the snowmachine to move. In today's market these paddles come in sizes ranging from 1 inch to 3 inches. The saying "bigger is better" does not hold true for these paddles though. When the paddles get to big the rotating mass actually bogs the machine down and reduces performance. Polaris Industries have found, through the use of physics and other tests, that the most efficient paddle length is 2.4 inches. This length gives the most grip in deep snow while still being semi-economical on trails. Snowmachine engines come in two types, two-stroke and four-stroke. Two stroke engines are simpler, lighter, and cheaper to manufacture then four-stroke engines, "plus two-stroke engines also have the potential to pack about twice the power into the same space because there are twice as many power strokes per revolution than in four-strokes". There are other advantages two-stroke engines have which include not having valves which lowers weight and eases construction.

Saturday, October 12, 2019

The Great Gatsby :: Essays Papers

The Great Gatsby "There are only the pursued, the pursuing, the busy and the tired." This quote by author F. Scott Fitzgerald describes his life perfectly. Francis Scott Key Fitzgerald, author of The Great Gatsby, was born in St. Paul, Minnesota, on September 24, 1896. In June 1918 Fitzgerald was assigned to Camp Sheridan, near Montgomery, Alabama. There he fell in love with a southern belle, 18 year-old Zelda Sayre, the youngest daughter of an Alabama Supreme Court judge. The Fitzgeralds went to France in the spring of 1924 seeking quietness for his work. He wrote The Great Gatsby during the summer and fall in Valescure near St. Raphael, but the marriage was damaged by Zelda's involvement with a French naval aviator. The story begins when Nick Carraway, a young man from Minnesota, moves to New York in the summer of 1922 to learn about the bond business. He rents a house in the West Egg district of Long Island, a wealthy but unfashionable area home to the new rich, a group who have made their fo rtunes too early to establish social connections, and who only care about displaying their wealth. Nick's next-door neighbor on West Egg is a mysterious man named Jay Gatsby, who lives in a giant Gothic mansion and throws extravagant parties every Saturday night. As the summer progresses, Nick eventually receives an invitation to one of Gatsby's legendary parties. He encounters Jordan Baker at the party, and they meet Gatsby himself, a surprisingly young man with an English accent, has a remarkable smile, and calls everyone "old sport." Gatsby asks to speak to Jordan alone, and, through Jordan, Nick later learns more about his mysterious neighbor. Gatsby tells Jordan that he knew Daisy in Louisville in 1917 and is deeply in love with her. Various literary techniques are evident in this novel. First of all, symbols are an example of a literary technique. There are many symbols located through-out The Great Gatsby. For example, situated at the end of Daisy's East Egg dock and barely visible from Gatsby's West Egg lawn, the green light represents Gatsby's hopes and dreams for the future. Gatsby associates it with Daisy, and in Chapter One reaches toward it in the darkness as a guiding light to lead him to his goal. Because Gatsby's quest for Daisy is largely associated with the American dream, the green light stands also as a symbol of the American dream.

Friday, October 11, 2019

Improving Youth Roles in Poverty Reduction

IMPROVING YOUTH ROLES IN POVERTY ERADICATION Poverty is one of the biggest problems that is faced by almost every nation world wide, including Indonesia. It is a clinched problem that is influenced by various factor such as income rate, access to education, public health services, environmental issues, and another basic needs. Eradicating poverty has always been discussed in both regional and international meeting and conferences, yet there is no suitable approach can be found to fight against it.Indonesia, as a developing country in Asia, has more than thirty million people living under poverty line. Government has been trying to actuate many program that seemingly can reduce the number of poverty. It is essential to be perceived that poverty is not only individual problem, this is also considered as structural problem which means that it needs an integrated method and approach to handle it. Regarding this, government is not the only party that has responsibility to work on poverty eradication, it’s a must that the society be involved in.Talking about society participation in reducing poverty numbers, youth is the most potential element that has a role as the agent of changes that carries out social missions to better a country’s life. Young people need to play a key role in shaping the future of their nations and communities and yet they are often excluded from the decision making processes. They should be at the forefront of global change and innovation. Empowered, they can be key agents for development and peace. Youth has fresh, creative ideas and perspectives which can be very helpful in finding solutions to development problems.However, this is not going to run smoothly if young people has no concern about the future life of their country nor have any sense of belonging to the country which will be the obstacles to the government to succeed this approach. Attracting young people to actively and productively engaged in government program of empowerment is the prior task. This has to be started from a very early level of education, young people has to have a great empathy toward social issues. This feeling of empathy will bring them closer to concrete actions and efforts to fight against poverty.Youth can take a part in different ways, those are: 1) giving help in fundraising or charity event, this can help many lives to get better access to basic needs and provide them a better living standard, 2) conducting social projects related to poverty reduction, youth as social control can attempt many social projects in distinctive areas in order to help government works on society empowerment and address local development challenges in their communities, 3) contributing ideas and initiatives towards government policy, youth is the representative of the whole citizen can work together to find the best solution for fight against poverty and for sure build a strong relations between the state and society by collaborating with yo uth â€Å"champions† within government, 4) being a social entrepreneur, it is a sort of entrepreneur who runs a business whose profit is going to be allocated to the poor, 5) getting involved in youth organizations for change, this is kind of organizations which is being spread out around the globe, it helps young people develop their skills and awareness towards social and environmental issues and 6) advocacy, generally defined as an action for carrying out public interest, youth in advocacy can give important contribution in monitoring service provision at different levels.

Thursday, October 10, 2019

Alarming Literacy Concerns in US

Learning to read is like learning to drive a car. You take lessons and learn the mechanics of driving and rules of driving. Why do people put a major emphasis on learning to drive and such a minute one on learning to read? Illiteracy is growing at an alarming rate not only in the USA, but all over the globe. Illiteracy continues to be a critical problem, demanding enormous resources from local, state, and federal taxes. These resources should be spent more wisely so that we can cut back on some of our National Debt. Why does America have a reading problem? We are the most affluent and technologically advanced of all the industrial nations on earth. We have free public education for everyone to use, more money and resources dedicated to educating our children than any other nation on earth. According to the National Adult Literacy Survey, 42 million adult Americans cannot read; 50 million can recognize so few printed words they are limited to a 4th or 5th grade reading level; one out of every four teenagers drops out of high school, and those who graduate, one out of every four has the equivalent or less of an eighth grade education. The number of functional illiterate adults increases by an alarming two million people a year. If a child is not taught proper reading and meaning techniques before they pass the fourth grade they will be suppressed and forced to take some remedial course to help them cope with not being at the same level as the other children. There is an answer why children cannot read but it is a hard fact for many people in the education field to swallow. It requires these professionals, who have been engaged in a form of education malpractice for many years, to admit that the methods of teaching reading they have been teaching since the beginning have been all wrong. The method that most teachers teach is that children should memorize or guess at words by looking at pictures or have clues given to them. Learning this way is supposed to be more fun and meaningful, but apparently with the high rate of illiterate children is due impart to this method of teaching. Teaching children to read should be the most important objective educators have. Learning to read is a prerequisite for everything else in life that one will encounter. The English language contains about a half million words, but on average only 300 words make up people s everyday vocabulary. Where do the other 499,700 or more words go? Whether you know it or not, you are carrying the weight of all the illiterate people in the USA on your back. It has been approximated that the yearly cost in welfare unemployment compensation due to illiteracy is six billion dollars. Literacy Volunteers of America state, an additional 237 billion dollars a year in unrealized earnings is forfeited by persons who lack basic reading skills. Family involvement is a major key in unlocking a child's learning ability. If a child is read to on a regular basis, they will be ahead of the game before they start their long journey to read. With how technological our world is becoming, it is important that families place an extreme value on knowing their children can read fluently and understand what they have read. After parents do as much as they can to help their children get ahead start, the teachers can teach the rules of reading to our children. If we as a nation let this illiteracy problem keep going at the rate that its going now, there will not be anything left for future generations. Everyone will not be able to read or talk fluently. All of the manufacturing would halt because no one could read directions to build anything and the nation would be in total chaos. So do your part and help a child learn to read.

Wednesday, October 9, 2019

CEO Interview Report Essay Example | Topics and Well Written Essays - 2500 words

CEO Interview Report - Essay Example Pursuant to expectations, the interviewee validated aspects of the theories, but unexpectedly and quite importantly, other subjects and themes were explained by Mr, J from a more pragmatic perspective which made complete sense while being consistent with fundamental assertions of the theories. The interviewee qualified what is meant by being humble in the sense of Level 5 Leadership, how leaders should deal with being incomplete leaders without being ignorant leaders, and how luck should be anticipated not only in the positive but also in the negative direction (i.e., good as well as bad luck), so good luck should not be relied upon. The more important quotes from Mr. J were selected and incorporated into the interview report. The research resulted in a wealth of insight from a person whose practical experiences were reconciled with the themes in the article, in a manner that rendered the theories more understandable and their application more plausible in the practice of business. I ntroduction This interview report is the result of a one-hour face-to-face interview over Skype with Mr. Erik Junginger (henceforth Mr. J), the chief executive of a medium-sized sports and rubber shoe manufacturing firm. The idea to conduct the interview online was the interviewee’s own preference, which the interviewer agreed to. Mr J’s company, EBJ Footwear, Ltd., makes shoes on outsourced orders by larger brand-name shoe manufacturers who regularly outsource some of their less specialized product lines. There are approximately 1,000 employees, 80 per cent of whom are in the various stages of the manufacturing process, and the rest in the administrative, human resources, and marketing functions. The interview undertaken in this assignment intends to draw parallels between the story of the executive being interviewed (i.e., Mr. J), and the central themes discussed during the course, specifically from the material in Landing in the Executive Chair and HBR’s 10 M ust Reads on Leadership. The aim of the interview is to find if the case validates the central themes chosen, or if the case provides a new perspective on the same themes. The topics chosen were the self-perception as well as perception of the work force, of the executive’s leadership style, F2 Leadership, and luck in leadership (topics from Landing in the Executive Chair), and Level 5 Leadership, Crucibles of Leadership, and Incomplete Leadership (topics from HBR’s 10 Must Reads on Leadership). Self-Perception of Leadership Style When asked to describe his management style, Mr. J paused for a moment and after some introspection, replied that he felt his management style was somewhere in between the democratic and autocratic styles. He justified, ‘Since I lead a business with more than 1,000 rank and file workers mostly in a manufacturing environment, I am concerned that a show of too much liberality will convey the idea to the workers that they may slacken in th eir performance.† Mr. J explained that the nature of the job is one of precision. ‘If one section of one plant, say the section that makes the shoes’ uppers, does not deliver the proper quota or the right quality, then that means that the PVC injection section will not

Tuesday, October 8, 2019

Debate essay Example | Topics and Well Written Essays - 1500 words

Debate - Essay Example R. Bork, in his work, Inconvenient Lives, argues that taking the life of an individual deliberately has never been considered as a matter regarding meaningful indifference. Abortion has now been turned to be a constitutional right, and this clearly indicates the attitude towards life by the society is on a sinking ship. It is an indicator of radical individualism and a development in public immorality. Many abortion supporters fail to understand that taking the life of a fetus is killing a human being with a potential. It is often crucial to persist in moral respect despite the circumstances (Ashton 34). This reality brings about moral anguish, yet it’s a certainty that such acts are grave wrong. No arguments justify the killing of helpless humans, not even overpopulation. Abortion can never be smothered through the use of euphemism. All terms are inadequate to describe the ending of an individual’s rights. In this context, terms such as medical procedures and reproductive rights are most inadequate. Those who seek the right to commit abortion to prevent a future harm are no different to those who plan to sin on the basis that they will plan to seek redemption afterwards. There is no justification that corresponds to this. There is no necessary evil (Pell 320). The burdens that may accrue later in future does not justify taking the life of a person. Putting the child for adoption after birth could help solve the dilemma. Abortion can never serve as a technique for birth control. One can never kill for convenience purposes, or even contemplate in the creation of embryos to be destroyed in research or even consider removal of organs from living babies. That is crossing the lines by disregarding human life. Ellen Willis, in his work regarding Abortion Backlash reproduces a very scarifying police photo of a deceased woman botched of an