Monday, September 30, 2019

Characterization of Tom in “The Great Gatsby” Essay

In the first three chapters of The Great Gatsby by F.Scott Fitzgerald, he characterized Tom Buchanan as violently aggressive in order to show the kind of man that had turned out from the Ivy League school and have contributed to two different social classes. For example, in the first chapter of the book, Nick introduces us couple of characters as well as Tom Buchanan and he says the following â€Å"Now he was a sturdy straw-haired man of thirty with a rather hard mouth and a supercilious manner. Two shining arrogant eyes had established dominance over his face and gave him the appearance of always leaning aggressively forward† (pg.7). We are told that Tom has a hard mouth and arrogant eyes. He is said to be always leaning forward aggressively, making up for the unmanly clothes he’s wearing at the time and very muscular with a â€Å"cruel† body. Nick describes Tom looking aggressive just by his looks without any further detail of how he acted aggressively. As a graduate from a prestigious school, Tom would be expected to be more characterized as a good, pleasant character when describing an educated man, however Tom was the opposite and Fitzgerald does this to show that the characteristic of a man does not depend on the school they had attended and graduated from. Furthermore, in chapter 2 it is proven that Tom is violent â€Å"Sometime toward midnight Tom Buchanan and Mrs. Wilson stood face to face, discussing in impassioned voices weather Mrs. Wilson had any right to mention Daisy’s name†¦I’ll say it whenever I want to! Daisy! Dai- Making a short deft movement, Tom Buchanan broke her nose with his open hand† (pg.37). At their little gathering party, Tom there breaks his lover, Myrtles, nose just because Myrtle had not stopped chanting Daisy’s name even if she had been warned by Tom before. Tom expresses his aggressiveness when he becomes violent when Myrtle does not stop. Fitzgerald is showing that not all man graduating from Ivy League school such as (Yale, Oxford, and Princeton) are all well-mannered, with a good characteristic as one would think.

Sunday, September 29, 2019

Operation Bluestar Essay

The topic of â€Å"Operation Bluestar† is a very controversial issue because of where the Operation took place and all the events that occured. Operation Bluestar, was the code name given by the Indian government. It was an operation to evict Sant Jarnail Singh Bhindranwale and his followers from the Golden Temple. The Golden Temple is one of the most sacred places of worship for the Sikh community. It is also one of the oldest Sikh temples around. The Golden Temple is known has the Harmandir Sahib, and is located in the city of Amritsar. Many questions arise to why something like this would happen in the first place. Bhindranwale was a Sikh fundamentalist. He was a leader of the Damdami Taksaal. The Damdami Taksaal is a Sikh religious intuition and it was founded by the tenth Sikh Guru. Bhindranwale directed the campaign of terrorism in Punjab. He was associated with the movement of an independent Sikh state. The state would have been known has â€Å"Khalistan†, but there was very little support of it in Punjab by Sikhs. Bhindranwale had been a problem for a couple of years before Operation Bluestar. He and his followers had been murdering and intimidating moderate Sikhs and Hindus. They increased the pressure on Indira Gandhi to do something about it. By this point Bhindranwale and his close followers transformed the Akal Takht, his headquarters within the Golden Temple. He had changed it to an armory and a sanctuary for terrorists, and from here he conducted his campaign. This is when Operation Bluestar comes into play. Indra Gandhi has initiated the attack on May 31, 1984 on the Golden Temple. The Golden Temple is located in the city of Amritsar and it is a sacred place of worship for the Sikh religion. Gandhi waited six months before finally ordering the army to get Bhindranwale and his followers out. Many say that Ghandi waited six month in order to build a positive public opinion about it, because it would have sparked a lot more negativity than it already did. Five days before the army entered the Golden Temple, 48 people were killed. The only way now that Gandhi could get Bhindranwale out was to use force, so she sent in the army in to the Golden Temple. The army was not prepared, because there were a lot more extremists than expected, they were also armed far better than intelligence reported. The extremists had responded to the army’s first initial call for surrender with machine guns. The operation turned into a bloody 3-day siege. 576 people were killed, 83 of them being soldiers from official count, but unofficial counts suggest that estimate to be as high as 1,000. The Operation left many scars, approximately 1,000 army members were involved and a casualty rate of one-third of four officers. Bhindranwale was found dead in the basement of the Akal Takht, along with the leader of the Sikh Student Federation, and a sacked major general of Indian Army who had reportedly trained Sikh terrorists. Gandhi had also sent the Indian army into Punjab on June 2nd, 1984, to surround thirty-eight Sikh temples that had believed to been harboring Sikh militants under the command of Bhindranwale. Throughout the sate of Punjab, Akali leaders were placed under arrest. The generals in charge of Operation Bluestar consisted of 4 Sikhs and 2 of another cast. Their involvement did little to reduce the sense of humiliation and the anger among nearly all the Sikhs. The Golden Temple also suffered damage, the Temple is also known as the Harmandir Sahib. Both the terrorists and the army had destroyed it. The terrorists used it for gun placements and army had attacked it. The Akhal Takht suffered the most serious damage and the precious Golden Temple Library was set on fire. Almost all Sikhs were outraged by all the destruction that was caused to the Temple. The main question that everyone has is why did Bhindranwale choose to hide in the Golden Temple with his militants and weapons, when he could have went anywhere else. It is because he thought he would be safe their. He never thought that the Indian Government would attack him their because it is a sacred place of worship for all Sikhs. Also a government cannot allow armed militants to enter and attack a holy place. Bhindranwale thought of it in both ways, if they attack he would have an advantage as well. By having the government attacking a holy place many people would be outraged such as the Sikhs, the Sikhs and other people would then be against the Indian Government because of what they did. That is exactly what happened, the government attacked and that sparked the anger between all Sikhs, no matter what they thought of Bhindranwale and his battle for â€Å"independence† that he wanted. By hiding in the Golden Temple and having the army attack, it really helped Bhindranwa le get his message out to the people. The attacks made the news world wide, and he became famous and people started to know what he was fighting for. Another reason of him hiding there was that many civilians were in the Golden Temple and that made him believe that the Indian Government would not attack, because that would kill innocent people. But the Indian Government did just that. The government, while being successful in killing Bhindranwale, took the lives of many innocent men, women, and y children. Bhindranwale, while knowing that many civilians would be in the area that could be harassed and killed, he still chose to stay their. That might have been intentionally done, or he might not have known that. But it ended up being deadly for the civilians. Bhindranwale’s actions caused a lot of damage to the Golden Temple, by converting into a battlefield with a lot of bloodshed of innocent people. But this was all done because of his cause of creating Khalistan. Many may inquire why the Indian Government finally decided to attack the Golden Temple a holy place of worship, after a six-month period of not doing anything. Many people believe that the Indian Government did wrong by attacking the Golden Temple, but you have to analyze both sides before coming to a proper conclusion. The Government was wrong at attacking at a holy place but they had to because Bhindranwale would not surrender himself. The army had asked him to surrender, however Bhindranwale refused to and in turn he started firing back at the army. The Army had no choice, so they fired back and this is how the innocent victims were killed along wit the Golden Temple being destroyed by all the gunfire. The Indian Government were not the only ones to destroy it, although many may think that Bhindranwale had his own machine guns at the temple and he was also a big contributor to the destruction of it. Had he had surrendered then, the many people that were killed would not have been and the Golden Temple would not have been damaged in any way. The Sikhs would also have not been angered. One thin that makes the Indian Government seem really bad is the fact that they decided to attack the Golden Temple in the same week as the Sikh religious day known as the martyrdom of Guru Arjan Dev. Guru Arjan dev was the one who completed the Golden Temple. It was founded by the fourth Guru of the Sikhs, Guru Ramdas. The Indian Government knew that thousands of Sikhs would gather. This is one of the reasons of such a high casualties rate of Sikhs. A direct connection of it being the Indian army’s fault cannot be made because both Bhindranwale and Indian Government made mistakes. One side cannot be blamed for it all. The people affected by the whole Bluestar Operation were the many of the Sikhs and Hindus as well. Many Sikhs and Hindus died because of the Operation taking place. The Sikhs died directly because it and the Hindus died because the Sikhs were angered. The Indian Police targeted many Sikhs after the Bluestar Operation, if they seemed to have any ties with Bhindranwale or believed in what he was standing for they would be killed or harassed. Many Sikhs became martyrs and held off the Indian army for as long as they possibly could. A total of about 250 men had kept the army out of the Golden Temple. The army consisted of over 250,000 troops. The army had entered the Temple after six days of the Sikhs stopping them from entering. They started killing innocent Sikhs who came to visit the Temple to celebrate the religious day. When the army came to know that only 250 stopping any army of troops, they were angered and humiliated. The Sikhs in the temple were lined up and shot at point blank range. They ranged from the eldest of people to the adults and the children, no one was spared. What really hurt the Sikhs was that their sacred artifacts and library was burned. Also literature written by the Sikhs Gurus was also not found after the attacks. It has been said that the army had taken it, but they state that it had been destroyed during the attack. The city of Amritsar had been destroyed. Many visitors visiting from other countries around the world had been arrested or killed. Sikh shops were robed and houses had been burned. Hindus also had a role in the killing of the Sikhs. Groups of Hindus went to Sikh households and burned the Sikhs alive. They also raped the Sikh women and violated pregnant women. The Sikhs that were being targeted were young males ranging from 4 to 40 years of age. The Indian Government had feared that the younger Sikh males would rebel and that by killing them would diminish the young Sikh community and the Sikh population would not flourish. They hoped that maybe the Sikh community would disappear and no longer be a problem for them. The main reason why many of the Sikhs were going through this was because Hindus wanted to destroy Sikhism. When Sikhs in other places found out about the attack that occurred in Amritsar, they rebelled. The Sikhs killed many Hindus that were in high rank. The Indian Government then noticed this movement by the Sikhs and quickly acted on it. They began arresting Sikhs and killing them. Over 40,000 Sikhs were in jail with being charged. Before the Bluestar Operation Sikhs and Hindus were killing each other. When a Hindu would kill a Sikh, the police would do nothing about it, but when a Sikh killed a Hindu the Police would arrest and punish them. After all had happened to the Sikhs they still stuck together and rebelled to take over the Golden Temple that was theirs. They were successful in doing so. Bibliography Kundu, A â€Å"The Indian Armed Forces’ Sikh and Non-Sikh Officers’ Opinions of Operation Blue Star.† Pacific Affairs, Vol. 67, No. 1 (Spring, 1994), 46-69. www.jstor.com Hardgraven, L.R. â€Å"India in 1984: Confrontation, Assassination, and Succession.† Asian Survey, Vol. 25, No. 2, A Survey of Asia in 1984: Part II (Feb., 1985),131-144. www.jstor.com Major, A. â€Å"From Moderates to Secessionists: A Who’s Who of the Punjab Crisis.† Pacific Affairs, Vol. 60, No. 1 (Spring, 1987), 42-58. www.jstor.com Mahmood, C.K. â€Å"Sikh Rebellion and the Hindu Concept of Order.† Asian Survey, Vol. 29, No. 3 (Mar., 1989), 326-340. www.jstor.com Fair, Christine. â€Å"Fighting in the Inner Sanctum: Counterinsurgency Operations in the Golden Temple:† Conference Papers – International Studies Association (2007 Annual Meeting 2007): 1.Academic Search Premier. http://web.ebscohost.com/ehost/search?vid=1&hid=7&sid=d188ab48-80c0-42db-99ab-6df66e12e9c0%40sessionmgr11 Nijhawan, M. â€Å"From Divine Bliss to Ardent Passion: Exploring Sikh Religious Aesthetics through the â€Å"DhÄ DÄ «Ã¢â‚¬  Genre.† History of Religions, Vol. 42, No. 4

Saturday, September 28, 2019

The sports broadcasting industry analysis Research Paper

The sports broadcasting industry analysis - Research Paper Example For example, football broadcasting accounts for the largest share of revenue in European countries. Highly ranked channels are advantageous over local channels that depend on free provisions to air programs. The channels have a limit for airing programs, a process that influences the overall revenue for a broadcasting company (Humphreys & Dennis 4). Giving a company absolute rights to broadcast events leads to escalations in revenue. Broadcasters who transmit live programs earn much revenue as opposed to persons transmitting recorded programs (Vogel 3). Recorded programs act as backup for revenue especially when live transmission occurs during odd hours. The right to transmit programs live is determined by the contract issued by a broadcasting company. Broadcasting directs has several advantages over broadcasting via cable. Affiliate fees create monopoly in advertising because it gives cable channels the autonomy to increase revenues by charging their affiliates highly. Moreover, they deny other channels the opportunity to increase their customer base by monopolizing sports

Friday, September 27, 2019

Environmental scanning paper Essay Example | Topics and Well Written Essays - 1000 words

Environmental scanning paper - Essay Example ch corporate culture that has facilitated a certain way of dealing with the competitive environment that the corporation operates in (Kim and Yoffie, 2011). External factors to which the corporation is exposed are depicted by the existence of a very competitive culture with many retail outlets established nearly everywhere that it ventures. Since it operates on a global level, Wal-Mart has to cope with a highly diversified culture in every country that it sets up shop. To deal with the competitive nature of the market at the international platform has necessitated a marketing strategy that consists of a research and development to unlock the competitive advantage. A strong brand name at Wal-Mart has facilitated the entry of the retail chain store to set up shop easily in new markets. McDonalds is a multinational facing a greater level of diversity than a majority of the corporate world players. The human resource is a very important internal strength at McDonalds since the top management officials are specially trained at the Hamburger University in a move that ensures strategic management on all fronts. Diversity is particularly well managed at McDonalds across the diverse global market presence created at every corner of the world. The fact that the largest number of minority workers is employed at the corporation reveals the embrace to diversity that exists at McDonalds than in many other industries. Externally, the corporation feels it more important to handle the health of the consumers and the entire market with more direct caution due to the sensitivity that that the food industry has. Due to the high competition of the food industry, McDonalds needs to deal with the market pressure for sustainable operations. Firstly, the high consumer behavior and preferences attachments to the food products that consumers search in the market force the corporation to realign its product preparation, package and appeal. Secondly, there is need to assure the consumers

Thursday, September 26, 2019

Collective Bargaining Assignment Example | Topics and Well Written Essays - 1000 words

Collective Bargaining - Assignment Example Just like many cities in the United States of America Seattle was seeking to have the minimum wage for their worker increased to fifteen dollars per hour. Once the minimum wage is raised, then the local government would have an easier time supporting families that are not so stable as a result of their income. One might feel that such an increment would negatively affect the business owners but on the contrary the businesses would register higher profits due to increased productivity of their products. This is because once the employees’ salaries are increased then they would have been motivated and hence work more efficiently (White, 2014). Fast food workers and those in their support staged strikes outside their places of work and into the roads to protests what they felt was a violation of their rights since they worked but felt that their salaries did not match their work and the standard of living in Seattle. According to White (2014), another reason as to why there was a strike in Seattle was because people were losing their jobs yet a report indicated that the state had witnessed an increase in its income. The report that was published indicated that Seattle had gained over five thousand industry jobs yet over five hundred people had lost their jobs. In Seattle’s magazine it was stated that most of the restaurants had started closing don but one would argue that statement because a many restaurants had closed down in the past for different reasons. Both sides had their various opinions on the subject matter.

Wednesday, September 25, 2019

Music Essay Example | Topics and Well Written Essays - 1000 words - 6

Music - Essay Example The main genres of the 17th – 18th centuries’ music are cantata and oratorio. The importance of secular music increased: it sounded at courts, in the salons of the aristocracy, in public theaters (the first such theaters were founded in the 17th century). Opera takes shape as a new kind of musical art.   Ã‚  Ã‚   New genres also emerged in instrumental music. Primarily we can talk about an instrumental concerto. The violin, harpsichord, organ gradually turned into solo instruments. Music, composed for them, made ​​it possible to show not only the composers’ talent but also talent of the performing musicians. Virtuosity was valued most of all. It gradually became an end in itself for many musicians. The composers of the 17th -18th centuries usually composed not only music, but also skillfully played instruments and were involved in teaching activities. Welfare of musicians and composers largely depended on a specific customer. As a rule, every serious musician sought a place at court of a monarch or a wealthy aristocrat (many noblemen had their own orchestras or opera houses) or in a church. And the majority of composers easily combined church services with music-making for their secular patrons. Austria took the leading role in the development of musical culture in the 18th century. European opera, after two centuries of development, finally reached the pinnacle in the work of Viennese composers - Christoph Willibald Gluck (1714 - 1782) and Wolfgang Amedeo Mozart (1756 - 1791). Classical symphonic style and classical chamber music were created by an Austrian composer Joseph Haydn (1732-1809) and genius Mozart. When people talk about classical music (in the sense of a certain movement, along with the Romantic Movement, Impressionism, etc.), they primarily have in mind the Viennese classical school, represented by Gluck, Haydn, Mozart, and Beethoven in the 19th century. Creative works of Haydn and Mozart, sons of

Tuesday, September 24, 2019

Book Review Essay Example | Topics and Well Written Essays - 1000 words - 10

Book Review - Essay Example The author has described how the hormonal changes in different stages of woman’s life create different physical and behavioral changes in her and how these changes help her to cope with different roles that she plays at in her life. The book â€Å"The Female Brain† is a good book for understanding the difference in brain structure and hormones of women and men. However, the dramatic and the magazine like style of writing make the book lose the ‘depth’ of the subject matter. Hence, even though the book gives some meaningful and important facts about the female brain, the repetitive nature of the information makes the book lose its grip on the reader. After reading the whole book, the reader feels that the author had only few things to discuss about the female behavior and everything else was added just to increase the pages of the book. The essence of the book is the effort by the author to reveal that woman’s emotions, values, desires, decisions and the perception of reality are hugely influenced by the neurological effects caused by the hormones. The hormones that influence women’s brain and men’s brain are different and hence, their behavioral pattern, emotional pattern and thinking pattern are different. The author has discussed how the three major hormones of estrogen, dopamine and oxytocin influence woman’s mind and body to develop the ‘feminine’ qualities in her. The book reveals how estrogen is responsible for unique qualities like empathy and intuition in women. Women have a natural tendency to read emotions in body language, seek social interaction, trust others and remain loyal. According to the author, these qualities are unique to women because estrogen makes them seek social interaction and emotional bonding. The presence of the hormone oxytocin makes women tru st others easily. Hormone dopamine is responsible for craving of sex and love in women. On the other hand, as the

Monday, September 23, 2019

International business Essay Example | Topics and Well Written Essays - 500 words - 5

International business - Essay Example In fact, it is a rate at which currency of one country is exchanged for another. Generally, correspondences between currencies, exchange rate reflect correspondence between two national economies. That is why it is not surprising that exchange rate is sometimes called a temperature of a national economy. Generally, there are two types of exchange rate regime – fixed exchange rates and floating exchange rates. According to the fixed exchange rate regime, monetary authorities set some particular exchange rate, which does not change because of the market conditions. This opinion can be proved by the following words. â€Å"A set price will be determined against a major world currency (usually the U.S. dollar, but also other major currencies such as the euro, the yen or a basket of currencies). In order to maintain the local exchange rate, the central bank buys and sells its own currency on the foreign exchange market in return for the currency to which it is pegged† (Currency Exchange: Floating Rate Vs. Fixed Rate). Under the floating exchange rate regime, exchange rate of a particular currency is determined by the market forces. The exchange rate is set by relation between supply and demand for this currency. Central bank of a country cannot influence the market in order to affect the exchange rate. It is quite difficult to say which exchange rate is better. The final choice depends on the particular macroeconomic conditions, international conjuncture, instruments of macroeconomic policy, particular period of time, etc. Therefore, opinions of experts have been divided in this context. Generally different periods in history were characterized with the different exchange rate regimes. Under the gold standard the currencies of all the countries were linked to gold. It was a period of the fixed exchange rate regime – from 1870 to 1914. The regime was quite affective, but growing imbalances in international economy, lack of stocks of gold have ruined the

Sunday, September 22, 2019

Importance of Risk Assessment Research Paper Example | Topics and Well Written Essays - 1500 words

Importance of Risk Assessment - Research Paper Example Effective risk assessment is quite crucial to the success of every organization or business activity.Risk assessment requires consistently applying and defining an approach that is tailored to the organization. Any assessment activity begins with the outlay of a plan and scope considering objectives, timing, input, output and responsibility requirements (Wenyuan 21). These responsibilities are assigned to parties that can provide a meaningful perspective on relevant risks. In implementing these responsibilities, one requires input sources which are determined by the information available such as prior assessments, lessons learned and loss data. On the other hand, output requirements are determined based on specific requirements of sponsors and stakeholders. The execution of the assessment process is done once the planning and scoping have been determined. Â  There are several important steps required in carrying out a risk assessment.The first step involves the identification of relevant organization objectives. Identifying relevant objectives provides a basis for ascertaining the potential risks that may have an impact on the achievement of certain objectives. It further ensures relevance of consequential risk assessment and management plan to important organizational objectives. These objectives are usually defined as a number of organizational levels and it is necessary to comprehend how they are formulated. (Vose 12). Moreover, well-formulated objectives are analyzed by considering the weaknesses, opportunities, threats, and strengths.

Saturday, September 21, 2019

To whom it may concern Essay Example for Free

To whom it may concern Essay Early in my career, I was sure I was set for life. I was fresh out of school and one of the starting members of Pusan’s own terrestrial broadcasters. Having only two national broadcasters in Korea at that time, I was helping to start a cornerstone of entertainment. Unfortunately I realized 15 years down the road complacency held me back from my true potential. Traditional media has provided many open roads for me, and what I’ve learned and experienced along the way I am very proud of. Starting as an assistant producer, I was on set for 24 hour periods making sure the set was proper and everybody was where they needed to be. It was hell everyday at different locations, but of course at my young age I didn’t mind. This was a whole new world that I was going to be able to direct. Eventually working my way up, I made a name for myself producing and directing regional variety programs and documentaries. In a way I was directing business decisions of the company and impacting the region’s economy. This position allowed me to raise a family of three and become well known throughout the country. I believed in traditional media with the printed newspapers and linear channels on TV. It took spending a day off with my daughter for me to realize that my thoughts, or rather hopes, of traditional media is far from the direction it is headed. Sure TV and radio will always be utilized but how about the way we watch TV or listen to the radio? How are we going to receive information in the future? Korea is a hotbed for ‘New Media’ with the start of satellite and terrestrial DMB as well as IPTV/VOD services. Never did I imagine the day would come when we can watch TV shows on a 3-Screen service. Traditional form of broadcasting is what I know now. ‘New Media’ is what I need to know in order to evolve, adapt and survive. I decided to take action upon my complacency and go back to school. The media world around me is changing so rapidly, I really should be at the forefront instead of becoming a dinosaur. There are so many things I need to learn about ‘New Media’. Sure the technology has changed and the mediums used are different. I believe though it is the impact of ‘New Media’ on society and the economy that will have the biggest affect which will spread all over the world. What is the next step? What can we do with this new service? How can we shape people’s lifestyles and the way they are entertained? Taking a look at the direction media is headed, I believe interactivity is the key. People want to control what they watch and it all starts with controlling what is on the air or on the Internet. Digital media is allowing viewers at home to shoot, edit, and broadcast what is seen. The rise of You Tube and Yahoo Videos can testify to this. Then there is the â€Å"Real Time† factor. Information is easily accessible where I can get the information I need right now. It is easy to link back how this affects the economy now, but what about the future? What adaptations will be made to the existing technology and where will that lead us? For example, how popular will WiFi be? How will WiFi affect consumer purchasing? How will this in turn affect manufacturing and exporting of new technology? Hitting a little closer to home, I am very interested in learning about IPTV. In my mind, IPTV has limitless reach around the world unlike terrestrial and cable TV, and the cost is much cheaper than satellite. Currently there are three IPTV operators in Korea, all backed by conglomerate giants. Will they survive? If so, what path will they take to ensure dominant market presence? If not, what are the reasons they lost control of a multi-billion dollar market? I attended a seminar a couple years back called ‘Convergence through Divergence’. Here the speaker spoke about how the semiconductor was the start of the digital revolution. According to him, the semiconductor allowed the manufacturing of devices we use today such as the computer, LCD TVs, digital cameras, phones, etc. This allowed the rapid change in digital lifestyle which led me to think what will be the paradigm that shifts media industry? For example when the compact disc was introduced, it was seen as the next step in digitalizing music. Just like LPs and cassette tapes, CDs were sold with whole soundtracks. Who would have imagined back then that sales of CDs would drop 60% today? Because of digital revolution, the music industry will never be the same. The industry will have to come up with new ways to earn profit thus affecting the economy. The same with TV. I remember when only terrestrial TV available, viewer rating would constantly reach as high as 40% to 50% for hit shows. Now with so many outlets and choices for contents, a number one show will get only 20% to 30% of the audience share. Should we continue to lose the audience’s attention or should we adapt to the audience’s focus and utilize new methods to reach them? Obviously losing the audience will mean losing advertisement revenues, but what is the most effective way to retain and even gain more viewers? Sitting at my current position and filling my current role, no matter how diligently I work, will not produce the answer this question. Going back to my original revelation, how did my daughter make me realize I need to change my thought and adapt to changes brought about by the digital revolution? I couldn’t relate to my daughter and what she was saying. Of course people say this is because of a generation gap, but the curious side of me started questioning why she thought how she thought. Where and how was she learning her information and what was it teaching her? I realized her thinking was not incorrect, just not fit for my generation’s way of thinking. The way I watch the news is on TV, at 9pm. The way she gets her news is through DMB, or blogs. And she doesn’t have to wait until 9pm. This made me envision the next shift in media. Anticipating where media is shifting is not easy since the shift will be dependant on many variants of the market. Questions I must ask myself is what are the emerging markets? Does one market affect the direction media is headed or does media control the emergence of certain markets? What area should I focus on in order to fully understand and control the emerging media market? In Korea we talk about the success of CDMA digital phones. We use Japan’s implementation of TDMA in the beginning and the current shift to CDMA as an example of how our network was a risk worth taking. But people fail to talk about the success of GSM world-wide, and compared to GSM, our CDMA system is not so economically successful. I need to be able to make the right decisions in shaping the country’s path for mass media. Instead of thinking locally, I want to focus on globalization of the Korean television industry. I feel the best way to further my career path will be to attend school. Once in school I hope to learn the following topics: Where Media is headed Shifts in media- mobile, IPTV, DMB, Making new media more profitable How to Impact society and business with new media The most important step for me in shaping my future is choosing the right school. I realize where I attend will affect what I learn and my views on my chosen field. I highly anticipate that your scholastic academy can offer me a balanced blend of intellectual challenge as well as a peaceful yet energetic setting for me to continue my studies. I look forward to hearing good news from you and discovering my future in ‘New Media’ together. Thanks. Tel : +82 11 853 6896 E-mail : woo. [emailprotected] com.

Friday, September 20, 2019

Trade Unions And Disputes Management Essay

Trade Unions And Disputes Management Essay Trade unions can be defined as, Organization whose membership consists of workers and union leaders, and whose principal purposes are to negotiate wages and terms of working condition, regulate relations between employees and the employer, take collective action to enforce the terms of collective bargaining, raise demands on behalf of its members, and help settle their problems (Business Directory, 2009). Trade unions are generally classified as, company union that represents interests of only one firm and may not have any relation with the trade union movement; industrial union represents workers of several firms from the same industry; and craft union represents skilled workers in a particular field such as carpentry or welding (Business Dictionary, 2009). A working definition of Trade Unions was provided by Sydney and Beatrice Webb (History of Trade Unions, 1920) as a continuous association of wage earners for the purpose of maintaining or improving the conditions of their employment. In the view of the above, it can be stated that Trade unions help the employees by negotiating for better income and better conditions at workplace for them which is known as collective bargaining. The ACAS Code of Practice No2 Disclosure of Information to trade unions, which is based on collective bargaining, provides recommendation on good exercise (Employee Communications and Consultations, ACAS, 2005). They provide information and guidance to its members if they undergo a problem regarding the workplace. A set-up of health and safety representatives is also provided at the workplace by the trade union for both employers and employees. Trade unions are interested in promoting equal opportunities at work and providing consultation and support to their members on the legislation. They run campaigns to protect the rights of the employees and improve their quality of working lives. There are numerous other services which trade unions provides to its member apart from the ones stated a bove are education and training for a better future and security, financial aid and discounts, and welfare benefits (TUC, 2009). It has been witnessed in the past that there is a rise in the ratio of number of employers wanting to work with trade unions. TUC today published a report stating that both employers and employees benefit from partnership. Thus a well-built judgement will be analysed in details further which will highlight the fact that management likes to deal with their employees through unions rather than dealing with them on individual basis. Analysis of the Statement The employment law system at present is rooted with the roles that the trade unions perform with numerous actions. Advice is given in terms of redundancy, where in, employers need to involve the union in decision-making. The union tries to negotiate pay and conditions terms of employees with the employers and if situation goes out of hand they provide full support to its members in industrial action (Employment Law, 2009). Trade unions provide help to people at work undergoing problems like job loss, grievance, legal procedures and action. Trade unions provide consultation services to its members and employees have now begun to recognise trade unions as employers promote unionism. It has been seen from a TUC report that almost 32% of workplaces recruit people who recognise Trade Unions (TUC, 2009). In United Kingdom, a large number of industrial sectors and various types of jobs in different sectors which provides the workers support with multiple skills and job description are represented by the unions. UNITE, UNICENT, UK Steel Union are some examples of such unions. Thus the role played by trade union has become well recognized within the employment law system with the presence of a number of policies that leads into consultation with unions regarding issues faced by the management (Employment Law, 2009). It has also been noticed that places which recognise unions have better workplace environment and conditions then places which are non- unionised. There are health and safety representatives provided by the Union, who help the management to avoid losses from problems like sick leave, lost work and claim for compensation. Unions provide guidance and help to employers to help reduce the level of stress at work. Trade unions, treats its members as equals and protects the rights of people subjected to discrimination. Trade Union provides training sessions for promoting learning to its members. Training helps the workers involved in low- paid and less skilled jobs, as it helps in improving the skills of the labour force. Recently, trade unions have started providing more services to its members. These services attract more members as it satisfies their needs. Services like accident and sickness insurance cover, legal advice on personal issues, financial services and discounts, education a nd training (TUC, 2009). Effective communication and consultation should be provided by an organisation for which it has to be structured in an orderly way. Senior managers should take the initiative to draw up such policies and keep in mind to involve the employees. The places where Trade Unions are recognised, the employers must get their conformity before the policy is introduced. To enable members to participate fully in union affairs the Unions help the shop stewards and other officials get time off to maintain healthy relations with the employees as well as with the employers. The employers should be familiar with their duties and provide proper facilities. Trade unions further the interest of the workers in many ways, for instance by campaigning, lobbying governments (Employee Communications and Consultations, ACAS, 2005). Trade unions have recently started promoting a new concept which is known as learning at workplace. The Union Learning Representatives (ULR) are a group of union advocates who are trained in providing consultation to its members on learning needs and opportunities (GMB @ Work, 2009). The main aim of the ULRs is to encourage its members to improve their skills, improve the standards of training and development at workplace by counselling, identify the needs of its members, unions and the local authorities on issues related to learning and further discuss it with the employers for consideration to implement it. The ULRs have received recognition, as per the Employment Act 2002, according to which they have the legal right to get paid time off to perform their roles in a proper manner (Prospect: Union for Professionals, November 2009 and Union Learn: Functions and Rights. Sec 3). A rise in employer dealing with trade unions and not individual employees directly has been witnessed. There is a strong business case which will be analysed in more details. A TUC today report shows that companies which recognise Trade Unions perform better than other companies. TUC General Secretary, John Monks said This is the most authoritative research so far that shows that unions can be a boon to business. Partnership makes managers take their workforce with them. This is no burden on business but a secret to success. The above report states that the TUC had made an announcement that it would open an institute of Partnership. The trade union focussed on partnership, adding value to the union by union membership (in organisations like Unionlearn) and employment law. Unionlearn provides generic services, which can be used by individual unions for their training and learning (Unionlearn, 2009) The Workplace Employee Relations Survey shows that companies that recognise unions and high commitment personnel practices have a better financial performance and productivity than other companies in the same sector (PR Newswire, April 2000). There are other surveys which also conclude that the employers attitude towards unions have become less hostile (Poole et al., 2005). The goal of any organisation is to reap benefits. Employers work hand in hand with Trade Unions to gain profits, by establishing a working Partnership with them. The Employers benefit in a number of ways, when they establish partnership with Trade Unions. Dealing with the employees through Trade Unions is gainful as they are saved from going to the Tribunals with their claims. When Trade Unions are associated with the workforce, it leads to employee satisfaction. As they help their members by negotiating over Pay and other conditions with the management. Thus, in turn is beneficial for both employers and the employees. Trade Unions convey to the workers the agreed terms. The employers do not get involved which in turn, saves their time and they can concentrate on making more strategic decisions. Here, there would be no employer- employee conflict. The employers do not have to deal with large number of employees directly. Therefore, no individual negotiations would be required. The union health representatives work along with the employers to reduce stress at work. No industrial action would be taken by the union. All the trivial issues can be dealt directly by the union (Gennard and Judge, 2005). In 1998, the TUCs Organizing Academy was opened to train officers in the field of recruitment and organizing techniques and to assign them to priority recruitment campaigns recognized jointly by the TUC and member-unions. If the TUC is to maintain a plausible position as a respected representative of labour force, it is believed, it ought to invalidate the two-decade decline in union membership; and this, in turn, will require a reorientation of union activity towards new categories of worker in new sectors of employment (Heery, 1998). From the above report it can be stated that TUC trained employees and developed skilled workers, which in turn would help the employers to achieve the organizational goal. There are some negative impacts of trade unions as well. The employers cannot give performance related pay and cant remove the low skilled worker, if he is a member of the union as this would lead to strikes and disputes, which in turn would hamper the production. Sometimes the unions demand more than expected, which is again a problem for the employer. This is the ERA of change and globalization, during this period the employers would want to build good relations with the employees as they are their key resource, to achieve the organizational goals. So the employers must deal with the Trade Unions, as the changes can be made without any repercussions. Initiatives that directly involved employees and (significantly) sought to promote higher performance were tending to replace or supplement indirect means of communication like joint consultation. Gradually this process of two-way communication became known as employee voice. It appeals both to that seeking greater business efficiency and to those looking for employee rights (CIPD, 2009). As cited above it can be clearly stated that joint consultation included the managers and employee representatives, which included the trade union representative. Agreeing a constitution earlier helped in avoiding conflicts and misunderstandings and thus paved a way for positive business. I would end the debate by stating that there is a positive business case for employers dealing with their work force through unions. Partnership at work can help bring higher productivity, enhanced performance and flourishing changes to the organization. Whether it is a change in administration or adapting new techniques, dealing with workforce through trade unions has a positive impact in achieving organizational goals. There would be growth in industrial relations as communication and consultation becomes easier. For the employees, more opportunities would be provided for training and development which in turn leads to greater job security and all this leads to sustainability.

Thursday, September 19, 2019

Animal Rights in the Media Essay -- social issues

Animal Rights in the Media This essay will explore the moral and ethical issues raised by human superiority over animals, why we shouldn’t have any superiority, and how this subject is portrayed in a variety of different media. The world today is becoming less aware of the pain and suffering being inflicted on animals. As a result, animals are becoming even more and more downtrodden in society. Humans have, and continue to, treat animals as if they are property, as if we can own and therefore control their lives and what happens to them. This is immoral, animals are here for themselves, animals have their own lives, and they think, have feelings, feel pain, require love (from their own species), feel emotional hurt, have families, and everything else that humans do. To just simply say that non-human animals should have no rights because they’re â€Å"defective† is a mindless statement! People come to this â€Å"conclusion† because they come up with some mindless babble like, non-human animals can’t talk, drive cars or vote, therefore they have no non-tradable properties. Well answer me this; do non-human animals have the right to exist in their natural environment and express behaviours that matter to them? We withhold non-human animals the very basic rights, simply because they don’t resemble humans. Humans are speciest. Humans are callous, brutal and cold-blooded towards non-human animals; humans have no consideration for the feelings and suffering which they selfishly inflict on animals. When a human kills another human they are the disgrace of the country, the headlines in the news, and all they did was kill one human, one insignificant human life. Yet, no one seems to care that everyday billions upon billions of innocent animals are being sickeningly, nauseatingly, hideously, vilely, unanaesthetically murdered for meat. If you think the process of that cute cow in the field to the steak on your plate is all candy and roses, then here is an extract from a very informative article on the way in which an animal is killed to become meat, (something that humans have no nutritional requirement for!). â€Å"Death came in the form of a pneumatic nail gun that was placed against their heads and fired. The gun is designed so that the nail never completely leaves the gun, but simply is blown into the animal's head and then pulled out by the butcher as the animal co... ...or things as vain as make-up, yes that’s right, millions of whales are murdered to make useless cosmetics, vain and heartless! This book shows man in his most arrogant state, it shows that humans will stop at nothing, they don’t care if it involves the ruthless torture of non-human animals, as long as their profiting then they don’t care. So as all the sources show, humans are heartless and speciest. The way in which humans treat non-human animals needs drastic changing; we should not be exploiting them for any reason at all. There are not here to serve us, they are here for there own purposes. One final question for you to consider; â€Å"If possessing a higher degree of intelligence does not entitle one human to use another for his own ends, how can it entitle humans to exploit non-humans?† References Sewell, A. (1877) Black Beauty, United States of America: Nancy Springer Ø Smith, V. (1943) Musco – Blue Whale, Maryborough, Vic: Hedges & Bell Pty. Ltd Ø Andre (1996) Ø Gifford, D. (2001) â€Å"meat is murder†, URL: http://www.meat.org/ Ø Pyers, G & Gott, R. (1994) â€Å"Treated like animals†, The relationships between people and animals, Carlton, Vic: CIS publishers

Wednesday, September 18, 2019

dickinson and angelou Essay -- essays research papers

Emily Dickinson & Maya Angelou Essay Q. Analyse the presentation of human suffering in the poetry of Maya Angelou & Emily Dickinson. Many of Emily Dickinson’s poems touch on topics dealing with loss and human suffering. While loss and suffering is generally considered a sad or unfortunate thing, Dickinson uses this theme to explain and promote the positive aspects of absence. Throughout many of her poems, one can see clearly that see is an advocate of respecting and accepting the state of being without. Dickinson implies that through these types of losses, one can gain a richer and stronger appreciation for both success and belongings. Poems 2 and 1036 are two that capture the extent of Dickinson’s feelings on loss. By understanding and comparing these two works, it is easy to recognise that Dickinson believes that possessing neither material possessions nor the joy of success are the real keys to happiness. Poem 2 focuses on a battle that could be considered either literal in the sense of war, or more symbolic as it could act as the anthem for any type of loss or failure. Lines 1 and 2 of the poem explain that success or winning is most valued by those who never prevail. Dickinson is saying that loss creates the strongest appreciation for a win. The lines 3 and 4 state: To comprehend a nectar Requires sorest need. This implies that necessity is the only way in which to understand what you want. Next, in the second stanza, Dickinson uses words that...

Tuesday, September 17, 2019

Power Relationships in Hughess Father and Son and Lawrences The Prussian Officer :: Essays Papers

Power Relationships in Hughes's "Father and Son" and Lawrence's "The Prussian Officer" There are many similarities in plot and theme in Langston Hughes’ "Father and Son" and D. H. Lawrence’s "The Prussian Officer." While each story is told in a very different style, the general tone is similar in each. The focal point in each story is a relationship between one man in power, and another man who is a subordinate. The dominant man has generally benevolent feelings towards his subordinate, information which is related to the reader through an omniscient narrator. Due to societal influences, the man in power suppresses this emotion not only from others, but from himself. This suppression later erupts into violence. Colonel Tom ("Father and Son") feels affection for his illegitimate black son, whereas the Prussian officer ("The Prussian Officer") harbors a homoerotic attraction to his orderly. These feelings are socially unacceptable to the point that neither man is capable of admitting this attraction even to himself. A description of oppressive heat occurs i n both, increasing the feeling of futility of the younger man’s struggle. The characters seem locked into their situation, and just as the heat is unavoidable, so is the conflict. The feeling that the dominant male is hiding a secret from those around him is more explicitly stated in "Father and Son." From the very beginning, the narrator informs the reader that Bert is Colonel Tom’s son. "Today his youngest son was coming home†¦.Bert was coming home" (Hughes, "Father" 599). This occurs before the reader realizes that there is a problem in the relationship: that Bert is illegitimate and has a black mother. Additionally, Colonel Tom is hiding his interest, and even pride in this boy who is so similar to him in appearance: "‘He’s too damn much like me,’ the Colonel thought. ‘Quick as hell†¦.Well, anyway, he must be a smart darkie. Got my blood in him’" (Hughes, "Father" 601). On the other hand, in "The Prussian Officer," there is more of an implied denial of the feelings the officer is harboring for his orderly because the officer’s homoerotic attraction is never explicitly stated: "Gradually the officer h ad become aware of his servant’s young, vigorous, unconscious presence about him†¦.It was like a warm flame upon the older man’s tense, rigid body†¦.And this irritated the Prussian. He did not choose to be touched into life by his servant" (Lawrence, "Prussian" 3).

Evaluation of International Investment Location Essay

We are an International car components manufacturing company located in Australia. We are seeking for investment opportunities in the automotive sector in attractive international markets. For this purpose our syndicate has short listed two countries viz. China and India. This report provides detailed analysis of the two countries in terms of the political and economic environments in addition to the competitive factors in the automotive sector. Political factors Political environment in an economy has a very strong influence on the investment decisions in that country. There are various political factors which affect investment decision such as environmental regulations and protection, tax policies, international trade regulations and restrictions, contract enforcement law, consumer protection, employment laws, government organization and its attitude towards investment, competition regulation, safety regulations etc†¦ The following table shows a comparison between the political factors in between the two countries. (The ranking is given by â€Å"doingbusiness. org† which is a part of the World Bank group) Starting a business is relatively easier in India which requires 13 procedures to be completed and it takes around a month to complete these procedures. In China there are 14 procedures to be completed to start a new business which require 40 days. Dealing with construction permits is a difficult process in China. There are 37 processes to be completed to get the construction permits and it takes around 336 days to complete all those processes. However in India, there are only 20 processes that need to be completed which can be completed in around 224 days. Though employing workers in China is not as much a difficult affair today as compared to the situation in 2008, the condition in India is much better compared to China. Hiring is a very easy affair in India as compared to China however firing could be much difficult in the Indian environment as compared to the Chinese environment. Registering property in India is a difficult affair as compared to China. While China ranks 30th in terms of ease of registering property, India’s rank has dropped down to 114 in 2009 from 105 in 2008. Getting credit in India is relatively easier as compared to China. The â€Å"doingbusiness. org† ranking in the â€Å"protecting investors† category for China is more than double the ranking of India. This indicates that the protection of the interests of the investors is given much more importance in India than in China. The ease with which taxes could be paid in China has been improved a lot in 2009 as compared to 2008. However it has remained unaltered in India. The Chinese government encourages trading across borders and hence it is much easier to do international trading in China than in India. Enforcing contracts is a very difficult affair in India as compared to China. In India there are around 46 procedures to be completed and it takes around 180 days to complete all those procedures however in China there are only34 procedures which can be completed which could be done in a span of 18 days. Closing a business is a difficult affair in India as compared to China. It takes are around 10 years to close down a business in India as compared to a mere 1. 7 years in case of China. Given the rapid transformations in their economies, the Chinese and Indian governments are still trying to determine whether and how to differentiate between domestic and foreign enterprises and what types of policies to adopt for each category of firm. For example, China’s new enterprise income tax law eliminates the tax advantages that foreign enterprises historically enjoyed over domestic ones, and a new antimonopoly law may put fresh restrictions on acquisitions within China by foreign firms. Meanwhile in India, the government is often ruled by a coalition of widely disparate partners, populated by incumbents who almost always lose in the next election†¦ Economic instability is another concern. From early 2007 to early 2008, manufacturing costs in southern China, where many mul ¬tinationals have set up shop, have increased by as much as 40 percent. A rapid increase in the cost of raw materials and energy as well as new labor laws and environmental regulations are the chief reasons. India’s labor costs have thus far been relatively stable. (Gupta, Wang 2009) Thus there is political risk involved in both the countries. However many consider that the India’s soft attributes, such as a democratic government and a free press pose a lesser long term threat than China’s Hard aspects such as a communist government with a restricted freedom for the press. Both China and India are on the same path of globalization. Both the countries have liberalized their economies and opened the doors of their economies to foreign investments. While China was autarkic in its pre-reform period, India had a highly regulated economy with heavy restrictions on the private investments. However, the economic reforms have made China more capitalistic in nature and India has opened up its economy for private investors.

Monday, September 16, 2019

Dispatches Paper Essay

As I read Dispatches by Michael Herr, there is an overwhelming sense of fear and horror. His dispatches are populated by soldiers called ‘grunts’, whose enemy was everywhere and nowhere. Their maps were blank; their names for the enemy, ‘Charlie’ or ‘VC’, told them nothing. How do you recognize them? They all wear black pajamas; they are all alien to us. They are everywhere. That’s where the paranoia began. Herr’s dispatches are disturbing because he writes from inside the nightmare, with all the tension and terror that turned these young men into killing machines. It is all the more frightening because, emptied of any concerns for justice, or ethics, or solidarity, they opened fire anywhere, everywhere. After all, who could know where or who the enemy was? Herr’s use of brutal imagery absorbed me into his savage surroundings. From the soldier who can’t stop drooling as a result of a particularly dreadful gun battle, to the scenes of the dead, American and Vietnamese, adult and infant, on battlefields and village streets. The characters are real people in a situation that most of them neither like nor understand. They are young men who invoke the same shortcomings we all have. They are professional soldiers and act that way despite their misgivings. They push past the boundaries of fear and into the realms of heroism or insanity or death. Everyone that he introduces is individual. There are no carbon copy soldiers here. They are funny or musical or religious or delusional. I felt as though I was being introduced to people I knew throughout the book. From time off in Saigon and Hong Kong to his time spent in a bunker during the siege of Khe Sanh, Herr covers every aspect of the war. He shows how so many soldiers were so drastically affected by the war. He describes the strange, fearful moments when at night the jungle suddenly goes silent. Herr tells tales of Marines throwing themselves on top of him with incoming fire, people he has only just met minutes or hours before that are risking their lives to protect his. This book is very descriptive and one of the best examples of this is this sentence, â€Å"Every fifth round was a tracer, and when Spooky was working, everything stopped while that solid stream of violent  red poured down out of the black sky.† In this sentence Herr is retelling the feelings felt by everyone as they watched the gunships flying overhead, unleashing the fury of gatling-guns that could fire thousands of rounds per minute. Not only does Herr convey the impact of such a sight; he does it in such a manner that a vivid image is formed in the reader’s mind. One of the more disturbing and insightful quotes in the book comes when a Marine at Khe Sanh learns that his wife is pregnant, but not with his child. Herr retells with this account, â€Å"†Oh don’t worry,† Orrin said. â€Å"There’s gonna be a death in my family. Just soon’s I git home.† And then he laughed. It was a terrible laugh, very quiet and intense, and it was the thing that made everyone who heard it believe Orrin.† This quote shows how badly some soldiers were transformed during the war. A man who used to be very peaceful and calm would now snap at the slightest provocation. He would now plan the death of his wife for cheating on him. With these examples I would definitely say that one of the strengths of this book is its vivid descriptions. The other strength of this book is probably how it covers the emotional and physical aspects of the war. Still it is difficult to reconcile Herr’s disregard for the grunts’ brutality and his apparent admiration that surfaces. Herr feeds on the death and carnage of the battlefield. It is difficult to grudge a person for their attachment to the most exciting times of their life. Herr’s is almost an addiction to the life of the thrill seeker, but as he frequently mentions, unlike the grunts, he could always take the next chopper back to an air-conditioned hotel room in Saigon, or leave altogether. (Not that an air-conditioned room in Saigon would be necessarily safer than Khe Sahn†¦) He describes Vietnam as a jumbled, confused, mess of a living hell. Herr also wrote the narration for â€Å"Apocalypse Now,† so what more do you need to know? It is crucial to understand that this book is not a political or military history of the war. Instead, Herr tried to portray the â€Å"experience† of what it was like to be in Vietnam; you won’t find a handy map and glossary in the back. (If you honestly don’t know what words like di di, zip, grunt, 16, and DMZ mean, I suggest you bone up on your history.) There are two major downfalls to this book: rambling and fiction. His writing style, disjointed and confused, makes the book a little hard to get used to. But when you do get used to it only then can you see that Herr is trying to give the reader an accurate account rather than a moral lecture. In terms of fiction the problem with writers is that they are writers. As such they are basically dishonest. This is not Vietnam as told by a soldier. This is Vietnam as told by a journalist who is â€Å"in-country† to the precise extent he cares to be and hotfoots it out of there when the going gets rough. In the beginning of the book Herr describes the horrors of night patrol by describing his own fear. He then informs the bewildered reader that this is a bit too much for him and therefore takes his journalistic eye somewhere else. The difference between a journalist and a soldier is that the soldier can’t leave when he feels like it and so he doesn’t have the luxury of drama. Unfortunately, most of this book is drama.

Sunday, September 15, 2019

Article Summary “Strategy as Simple Rules”

„Strategy as Simple Rulesâ€Å" by Kathleen Eisenhardt and Donald Sull A) Article Summary Basically the article describes how and why companies like Yahoo, AOL or Enron use simple rules in rapidly moving markets. In the past companies were able to apply complex strategies due to a simple business landscape and stable markets, but nowadays most markets are not stable any more. Markets are fast moving and so complex themselves that companies are forced to react and to simplify their strategies. Associated essay: The Proverbs of Administration Herbert Simon SummaryThe authors' central statement is that the traditional approach of staking out a defensible position misses the key to success in rapidly moving markets. That key is the ability to recognize and capitalize on fleeting opportunities. For dotcoms like Yahoo or AOL it's more important to pursue opportunities than to establish position or to leverage resources. As Kathleen Eisenhardt and Donald Sull analyzed dozens of companies in unpredictable markets, they have discovered that simple rules can be divided into five categories:How-To Rules show key features of how a process is executed. For example Enron focuses on the risk management process in its commodities trading business with two rules: 1) Each trade must be offset by another trade that allows the company to hedge its risk and 2) every trader must complete a daily profit-and-loss statement. Boundary Rules define a framework in which managers have to focus on the right opportunities and to sort out the ones which are outside the pale.Example: Cisco focuses on the acquisition process with three rules: 1) The target must have no more than 75 employees 2) 75% of those employees must be engineers and 3) the target must be within 50 miles of headquarters. Priority Rules rank the accepted opportunities. Intel for example focuses on the process of allocating manufacturing capacity with one rule based on a product's gross margin. Timing Rules synchronize managers with the pace of emerging opportunities and other parts of the company.Example: Nortel focuses on the product development process with two rules: 1) The team must know when the product has to be delivered to the key customer in order to win their business and 2) the product development cycle can be no longer than 18 months. Exit Rules tell managers when to pull out of former opportunities. One high tech company focuses on new business creation by pulling the plug on new initiatives that fa il to meet certain sales and profit goals within two years.Key processes: Each of these companies has zeroed in on one or two key processes that are critical success factors. They then set up a few simple rules to guide activity in these processes in a way that balances risk with the need to move quickly. Deciding if Simple Rules will Work for You: Most dotcom managers are faced with a vertiginous number of opportunities: partnerships, acquisitions, licensing deals, new products, new markets, new ideas, all with the potential to make or break the company.Simple Rules may be the right approach for your company to use in managing this creative chaos. B) Application The article was very interesting, it made my pensive and stimulated some new thinking. The most important thing for me – as I am a type of human being that likes complicated situations which need clever decisions to get an advantage over other competitors – was the warning about to try to apply complex strateg ies in rapidly moving markets. You'll probably work 100 hours a week if you complicate your strategy. Therefore I feel this article and t's theses as very helpful for my future career. But it is also very doubtful whether I can use this information from the outset. I think it's going to be very difficult. A lot of experience will be necessary, especially to know which opportunities should be taken and how the accepted opportunities should be ranked. Furthermore it is complicated to sort out â€Å"yesterday's opportunities† for a prospecting manager. It depends also on the industry the company belongs to. If you behold a company like Yahoo, it will be clear that applying simple rules is not the worst decision.But if you look at a traditional company like ExxonMobil, you'll see that opportunities are limited and you have to gain market share with a clever, thought-out strategy. Altogether I would say to know the three approaches and the five categories of simple rules is alread y a big advantage and one day I'll be certainly able to apply this information, especially as I am looking forward to work for a company which is part of a new business landscape. C) Opinion When I started to read and recognized company names like Yahoo, AOL or Enron, I knew this article was not the newest one.And although Yahoo is still a relatively successful company I am not quite sure whether they have always applied the right strategy. But the principle to use simple rules in a fast moving market probably is the right solution. And even I liked the article at all, I did not like the structure. Maybe because I read it on the internet and not in the Harvard Business Review Magazine, but for an article which supports a simple way of (business) life, it has a quite confusing structure. But OK, this does not bother me too much.After I had eventually printed it and had read it a second time, I was even more fascinated. Additionally I was enamoured of the caricature on the first page. It shows how complex the business landscape nowadays is and how difficult for a managers it is to find the right way between those many possibilities or to do the next step right without a signpost or somebody who can help you to capture an opportunity at the right time or to let the wrong opportunities go. In summary I think the article is full of thought provocative examples as well as being an easy read. I highly recommend it!

Saturday, September 14, 2019

Managers in the future Essay

I believe that planning will always be important to a manager. If the importance were to become more or less important, I would say that it is going to become more important. Planning is when an organization defines their goals, establishes strategies for achieving those goals, and developing plans to integrate and coordinate work activities (Robbins & Coulter, 2014). Planning is always needed because of the way things are constantly changing. An organization isn’t necessarily always changing, but the world is and then can affect an organization, so a company better be prepared. In the textbook, it says that managers should plan to provide direction, reduce uncertainty, minimizes waste and redundancy, and establishes the goals or standards used in controlling. This is extremely important in the planning process because it can help an organization in being successful. Providing directions in the planning process is very important because it helps build the foundation of how things will be done. Without directions, an organization would be a disaster because everyone would want to do things their own way causing confusion if people had to work together because there would be completely different methods. To me, providing directions is related to reducing the uncertainty in an organization. If there were uncertainties going on within the organization, then things probably would not happen due to confusion. Costs would be so high if planning wasn’t done to minimize waste and redundancy. If there is not a plan prepared on who was to do what, then an organization would be producing multiples of products causing the price spent on production and materials to be doubled. In plans, you want to have goals prepared. This gives people incentives to want to achieve a goal to succeed and possible advance in time. Standards are good to have so workers know what is expected of them. I have worked at a retirement for the last 5 years and an example of when my  managers use planning is when an expected storm is coming. The managers need to have a plan of what to do in case of a problem, such as a power outage. If there was no plan planned for a disaster like that, there would be serious issues do to the residents needing oxygen or motorized wheelchairs that need to be charged by a power source. This is a perfect example, in my opinion, of when planning really matters. References 1. Robbins, Stephen P., and Mary K. Coulter. â€Å"Chapter 4.† Management. 12th ed. Boston: Pearson, 2014. 220-225. Print.

Friday, September 13, 2019

The Many Sides of Odysseus throughout the Epic story of the Odyssey Essay

The Many Sides of Odysseus throughout the Epic story of the Odyssey - Essay Example In each and every adventure that befalls Odysseus we see various facets of his character and his wanderings are seen as stages in development of humanity as a whole. We learn about ourselves through Odysseus while realizing that each stage of our life is a learning exercise: we live as we learn. The Odyssey, a tale of Odysseus’ journey back home after long years at war is also the tale of his spiritual journey through his own soul. As Odysseus leaves Troy for home, he is the typical bloodthirsty warrior. He leaves Troy feeling almost immortal and this pride is what leads to his downfall. In the course of his journey, Odysseus undergoes a symbolic death and rebirth and in the end becomes an epic hero regaining power over his household and has restored order to his life. Upon his arrival in Ithaca, it is evident that he has become a wiser man- more humble and more respectful. Homer skillfully inter-relates adventures, feelings and experiences of his characters. The vivid description and expressive language make the reading understandable to any age and social group. Even though the story is mythical, filled with ghosts, monsters and giants, the main themes can be interrelated with today’s issues of scheming, cunning, struggle for survival, race New facets of Odysseus’ character are revealed through each of his adventures. After Odysseus and his men depart from Troy, they land in Ismara. After looting the city Odysseus wisely tells his men to board the ships quickly, but they pay no heed and the next morning, the crew is attacked by the Ciconians. Odysseus manages to escape with tears in his eyes for his lost crew. â€Å"But Odysseus, clutching his flaring sea-blue cape in both powerful hands, drew it over his head and buried his handsome face† He does not disclose his identity to the Ciconians showing that he is capable of thinking ahead of his opponent displaying his superior

Thursday, September 12, 2019

SEE BELOW Essay Example | Topics and Well Written Essays - 500 words

SEE BELOW - Essay Example evolutionary proposition since many thinkers have proposed that we would be better as a society and improve ourselves as human beings if there were no gods. Clearly a lot of violence and bloodshed in human history has been the result of devoted faith and confirmed adherence to certain viewpoints (the crusades come to mind as a good example). Yet at the same time, religion and the idea of god is a comforting thought to many people and simply overthrowing that idea is not an easy task nor could be done at the earliest convenience. It seems that the overthrow demanded and recommended by the noted authority has little to do with the will of god since a person’s freewill is not controlled by god in any way. Had Zeus been able to control the will of Prometheus, he would not have any need to chain him or imprison him in any way. With a simple snap of his fingers Zeus could have discovered anything he wanted. This shows that a person can revolt against god and the power of god would not extend to controlling his or her freewill. Clearly, there is no reconciliation between the will of Prometheus and the commands given by Zeus. Zeus as the character of god can hurt Prometheus, put him in chains, persuade him, send him messengers but can not get him to bend to his will unwillingly. Eventually, Zeus can even throw Prometheus into the abyss with a lightning bolt, yet he remains unable to control him the way he wanted to. Finally, the character of Prometheus is quite interesting since he appears to be defying Zeus for no apparent reason. It seems that the defiance is simply for the sake of defiance for he has nothing (for himself) to gain or lose by giving up the information demanded by Zeus. At the same time, he helps Io by giving her some good news about her future. Strangely enough, he seems completely unconcerned about his own future and his safety. The defiance exhibited by Prometheus is quite heroic and one can agree with his description of Zeus as a tyrant. However,

Wednesday, September 11, 2019

Why Scientific Management Has No Relevance Today Essay - 11

Why Scientific Management Has No Relevance Today - Essay Example The paper tells that scientific management is irrelevant in the current society because unlike in the past, workers are more intelligent today. This is because they know their values in the workplaces. Consequently, they consider any processes that seem to challenge their worth as self-deprecating. When scientific management was still relevant, employees were offered the fiscal rewards only. This is because workers valued economic rewards during that time. However, most organizations increase their productivity by controlling all factors in the  workplaces  as well as maintaining the social health and development of the workers in today’s organizations. Furthermore, this management approach is not applicable today because its principles are authoritarian. This is because they assumed that only managers were accountable for decision-making because organizations did not trust the employees’ competence in decision-making in the past. According to Taylor, the increase i n the organizations’ productivity relied on the divisions between the workers and experts or managers. Additionally, he also believed that managers should always direct the workers. This method negatively influences the workers’ motivation and satisfaction in the  workplaces. The modern organizations increase their productivity by involving all the organization’s participants including the employees in the decision-making process. This motivates the workers because it makes them feel worthy of the organization. Additionally, it makes them feel respected by the organizations. Such respected workers usually work to their highest potential because they become loyal to the organization. Moreover, the piece rate payment systems used in the scientific management is not effective today because organizations center on superiority rather than the capacity to increase the customers’ satisfaction and the organizations’ competency.

Tuesday, September 10, 2019

INTERVIEWS Essay Example | Topics and Well Written Essays - 500 words

INTERVIEWS - Essay Example However, some health educators are employed with a bachelor’s degree in health education or other fields like sociology, anthropology, and at least two years work experience in the field of health. Additionally, health educators are required to always continue learning in order to increase or maintain their professional skills. The health teachers who accept to become Certified Health Education Specialist (CHES) normally develop some pride and accomplishment according to the NCHEC. The CHES helps to discover ones skills and knowledge enabling the employers to identify the qualified personnel. To be in a health field, it is important to have several skills that can boost your work. It is important to have communication skills. This helps while presenting educational information to different groups of people. Secondly, it is necessary to consider leadership skills. Leadership skills are mainly needed while coordinating and directing your work or others. Additionally, for planning purpose, organizational skills are needed. According to my knowledge, there are very many responsibility and duties of a health teacher. Most health workers work at places such as community civic centers and high schools to educate people in health matters. For instance, they teach about the importance of adopting a healthy lifestyle, using the available health services and avoiding health emergencies from occurring frequently. Additionally, the main requirements needed of a health teacher are planning and directing health learning programs and lectures for companies, schools and community groups. The main task is to develop health goals with the students and help in promoting good health and varies ways of protecting or preventing diseases. Furthermore, the professionals are required to prepare and distribute educational materials on health matters. These matters may include: drug abuse and smoking, sexually

Monday, September 9, 2019

Ethical Reasoning Final Essay Example | Topics and Well Written Essays - 1500 words

Ethical Reasoning Final - Essay Example In conclusion, this author asserts that homosexual sex is not morally evil but is morally good. Corvino submission has, however, not gone unparalleled by opponents who feel that homosexuality is immoral. Obasola, Kehinde E., a professor in the Department of Religious Studies Olabisi Onabanjo University addresses this debate in his article titled â€Å"Ethical Perspective Of Homosexuality Among The African People.† His main argument against this practice is the abnormality that accompanies the act. For instance, human sexual bodies are developed for reproduction. Therefore, homosexuality is an acquired trait rather than innate. It is a distortion to the biological and psychological components of the body. This among several other reasons makes it to be morally unacceptable. In my forthcoming essay on this debate, I hold the opinion that opposes Corvino’s argument in favor of homosexuality. His arguing on the basis definition of unnatural does not hold water in so far as morality is concerned. Homosexuality is unnatural, and defies the sanctity of marriage, a natural institution designed for reproduction. It is therefore immoral. Corvino asserts that attributing homosexuality as unnatural stems from five basic interpretations of what is unnatural. In the very beginning, he objects the very idea of what is natural and its acceptance or likeableness in society. For instance, many lifestyle choices (housing, government, medicine, and even clothing) that are cherished by people at large are unnatural. On the other hand, some â€Å"natural† things are completely detested by society, such as, death, disease, and suffering. Subtly regarding â€Å"unnaturalness† as â€Å"rhetorical flourish,† Corvino challenges the very foundation of opposition (309). Corvino elaborates five different possible meanings of unnaturalness by

Sunday, September 8, 2019

Case Study Essay Example | Topics and Well Written Essays - 500 words - 41

Case Study - Essay Example The company’s four strategies – availability, affordability, acceptability, and activation – provide manufacturing flexibility that allows the broadening of the product portfolio while pursuing the most cost effective route to market for order taking and delivery to customers. Information technology is one of the key drivers to an efficient supply chain management. In 2005, the CCHBC invested heavily in technology applications by introducing a single largest and the most successful roll-out of SAP–based Advanced Planning Optimizer (APO). This has enabled CCHBC to optimize and coordinate operations within its whole network and across borders by consolidating the best practices on a single, standard enterprise platform. This platform facilitates alignment of supply chain and demand planning, which is effective for efficient sales and operation planning. Information technology has led to the creation of cost saving opportunities and leadership in the field of fast-selling goods. CCHBC can bring about integration in the supply chain by outsourcing some of its operations internally and externally. Internally, the company can outsource goods or services within its supply network. The company should be keen on the decision which goods or services it seeks to outsource for effective integration. In the process of business outsourcing, the company should seek to regulate the period of outsource because this can lead to the loss of in-house expertise. Externally, the company can seek to outsource globally. Most organizations seek this kind of business outsourcing because of the low costs and skills available internationally. Global outsourcing enables the purchasers to tap into technological expertise that may not be available in their native countries. It also creates a global process network amongst its suppliers, which, in turn, creates a pool of promising synergies to increase their

Saturday, September 7, 2019

WHY DO FOOLS (HUMANS) FALL IN LOVE Essay Example | Topics and Well Written Essays - 750 words

WHY DO FOOLS (HUMANS) FALL IN LOVE - Essay Example They have studied human’s brain and chemical reaction, emotional reactions and social interaction, values and morals which can influence the process of falling in love. They single out that people fall in love because of sexual attractiveness, idealization of an object of love, instinct, desire to give birth, appearance. (thesis) Based on personal experience and experience of other people (friends, movie heroes, literary characters), it is possible to say that falling in love is influenced by a set of reasons outside humans’ wish or control which lead to a strong positive affecting impact on emotions of a person. (thesis) The main causes of falling in love include sexual attractiveness, image of an ideal person, and desire to give birth (instinct). Sexual attractiveness is the major cause why people fall in love. It is not all about thrusting and ejaculating. In humans it gives rise to a complex package of feelings and thoughts that fools label love. Our brains have evolved to feel pleasure in sexual bonding and discomfort at separation. It is brought about by an even more elaborate than usual interplay of hormones. Scientists have a good idea of the substances associated with the various stages of falling in love, but it is not yet known precisely which brain areas each of them activates. The feelings of sexual euphoria associated with early stages of love. The drive to make love comes from testosterone. The image of an ideal person (appearance, personal qualities, values, etc) causes fools to fall ion love. The meaning of an ideal is different for every person, because it depends on their past experience. Since the sensory activity is washed away and only the construction is saved, the only knowledge that each of us has is what we construct within our own brains. Fools cannot know the world by inserting objects into their brains. In this case, love comes from

Poverty in the United States Essay Example for Free

Poverty in the United States Essay Poverty is a serious issue not only in third world countries but also here in the United States. Discussing the nature of poverty in the United States is important because through understanding we will find solutions. Gaining insights into the issue of poverty can be used to understand the complexity of the subject. Poverty has been defined as a state of deprivation of goods and services that essential to the maintenance of an adequate standard of living in a given society. Although the concept of poverty is considered relative, it cannot be denied that it magnifies the problem concerning inequality in a particular society (Levitan). The struggle of poverty impacts people’s day-to-day life. It is easy to hide some things in life but, poverty is not one of them. There are 633,782 homeless people in cities throughout the United States (St. Francis). Poor people have no place to live and are being exposed to nature’s elements, bacteria, and harmful illness can cause threat to the health of these individuals. The environment is being impacted as well, because there is nowhere to put waste or garbage other than on the ground. This is why it is important to gain insight and understand poverty so that we can help these people and the earth. When a person is living in poverty it is humiliating and weighs on an individual’s self-esteem as well as their families and is very difficult to overcome. Poverty is not always a choice, but it is a situation that can be prevented. If people everywhere take something from every book, article or essays that has been written and are willing to recognize and do something about it then it is a problem that can be fixed. There is not a perfect plan or a perfect solution to the poverty problem but, the aim is to decrease the number of individuals and families living in poverty drastically. There are many families living in poverty and there are an equal amount of thoughts and opinions on why people live in poverty such as drug and alcohol use, domestic violence and foreclosure just to name a few. Individuals have a difficult time taking care of themselves can you imagi ne having to try to provide for a family on next to nothing every day. Without a street address these families do not qualify to get welfare assistance such as food stamps, Medicaid, or housing assistance. Without housing assistance people are forced to stay in shelters and if they don’t make to a shelter by a certain  time they go without a warm place to sleep and without food that night. Some people wait in long lines all day for a spot at the shelter only to be turned away because there is just not enough space for everyone. A good way to alleviate or even eliminate this problem is to build more shelters or use some of the abandoned buildings in poverty stricken neighborhoods for the poor people to sleep in. Have stipulations in these shelters that individuals and their families are guaranteed more than one night as long as they abide by guidelines provided, kind of like a contract. So they are not just getting help they are in a sense helping their selves. Different situations have different solutions, there is a difference between a person living in poverty because you’re a war veteran and just having a hard time and living in poverty because you are and addict and everything you have is spent on drugs and alcohol. In these newly built or refurbished shelters with these stipulations, programs can be offered to help transition into a better way of living. Yes, then there is the issue of money and where will it come from. Nobody has money lying around just to give away so charity events, fundraisers, donations, volunteers and maybe even some help from government agencies would help. The children of these families living in poverty suffer most. Research shows that poverty in the first five years of a child’s life changes the life of a child compared to if they were to live in poverty later in life. This is because poverty is associated with poor nutrition; poor nutrition leads to lower intelligence, bad physical development, and poor immune systems. â€Å"Children deprived of proper nutrition during the most informative years score much lower on tests of vocabulary, reading comprehension, arithmetic, and general knowledge. The more severe the poverty a child faces, the lower his or her nutritional level is likely to be (BrownPollitt).† Many children that are labeled bad kids with behavioral problems are really just lacking nutritional value. A child that is hungry is more likely to act ou t and have greater difficulty focusing than a well fed child. There are government programs that offer assistance with nutrition such as W.I.C and Healthy Schools but the guidelines are very strict and fall short in making sure that every child living in poverty has adequate nutrition. So, this problem can be solved by changing the guidelines and making it easier for a family living in poverty to feed our future. People might say this is not my problem, I’m not living in poverty  so what does this have to do with me? Truth be told everyone is affected by poverty. As Dr. Martin Luther King Jr. said, â€Å"There is nothing more dangerous than to build a society, with a large segment of people in that society, who feel they have no stake in it; who feel they have nothing to lose. People, who have stake in their society, protect that society, but when they don’t have it, they unconsciously want to destroy it (Dr.MartinLutherKingJr.).† According to the history of our nation, the safety and equality of the people of our society relies on everyone individually and as a whole nation as one. If that’s the way the world is meant to be then why are people living in poverty treated so differently? Upper class doesn’t make you better than a person living in poverty, money doesn’t make you bad or good and the same goes for poverty. The founders of our nation fought hard for a country where everyone is treated as a person equally but, that is not the case when thousands of people still live in poverty every day. â€Å"Anybody that has ever spent a morning at the Department of Motor Vehicles or stood in the line at the Post Office should understand that simply because the government is handling the problem, doesn’t mean it’s being handled properly (St. Francis)†. The next time you see someone a little down and out stop to give them a minute and see if you can help them in any way, remember that poverty does not make them any less a human than you. I believe the proposed solutions will work because if its believable than its achievable and our system has proven in other situations to be reliable so let use it for the good of the people of our country that could use a hand up not a hand out. For people to be sick on the street, forced to sleep on cardboard or dirt, and have to beg other people to help them is not humane or the American way and should not be tolerated any longer. Works Cited BrownPollitt. Malnutrition, Poverty and Intellectual Development. Pollitt, L. Brown E. n.d. Dr.MartinLutherKingJr. Letter From Birmingham Jail. April 1963. Levitan, Sar A. Poverty In the Lexicon Universal Encyclopedia. 1990: pages 478-480 Vol. 15. St. Francis, Nancy. Homelessness in America 2013. 2013.

Friday, September 6, 2019

Diversity Among Individuals Essay Example for Free

Diversity Among Individuals Essay Diversity among individuals, as well as cultures, provides a challenge for nurses when it comes to delivering meaningful health promotion and illness prevention-based education. How do teaching principles, varied learning styles (for both the nurse and her patients), and teaching methodologies impact the quality of such education? How does understanding a patients view of health promotion and disease prevention guide you in teaching them? Provide an example. Education is impacted any time that the student (patient) does not understand what is being explained, so it is important for the instructor (nurse) to have multiple teaching styles and methodologies to ensure the information is clear and understood. Speaking with patients, while drawing pictures or diagrams, as well as giving them handouts to take home allows you to cover all but one type of learner. Understanding my patient’s view of health promotion and disease prevention helps guide me to what specific information the patient will need. For example, A 21 year old male who smokes tobacco and has multiple sex partners informs me that he has no desire to quit smoking and refuses you to discuss the matter with me. Attempting to educate this patient on quitting smoking will do harm than good. The patient will be frustrated and possibly angry at me for not respecting his feelings, this could possibly damage our nurse-patient relationship of trust and understanding. In this case I will respect the patient’s right to smoke and spend my time educating him on sexually transmitted diseases and the importance of safe sex. My 21 year old female tobacco smoker informs me that she would like to quit smoking but is having a hard time. In this situation I would speak with her about her difficulties quitting smoking, fears and anxieties. Provide information regarding medications that are available, programs and resources that are designed to help her, and other options like hypnosis and acupuncture. Understanding and being able to incorporate teaching principles, teaching methodologies, and learning styles are all very important in patient education and health promotion but it will do you little good if you do not have the patient’s buy in and willingness to change.

Thursday, September 5, 2019

Features of Transport Layer Security (TLS)

Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: Features of Transport Layer Security (TLS) Features of Transport Layer Security (TLS)   TRANSPORT LAYER SECURITY TLS is a successor to Secure Sockets Layer protocol. TLS provides secure communications on the Internet for such things as e-mail, Internet faxing, and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains significantly the same. It is good idea to keep in mind that TLS resides on the Application Layer of the OSI model. This will save you a lot of frustrations while debugging and troubleshooting encryption troubles connected to TLS.   TLS Features TLS is a generic application layer security protocol that runs over reliable transport. It provides a secure channel to application protocol clients. This channel has three primary security features: Authentication of the server. Confidentiality of the communication channel. Message integrity of the communication channel. Optionally TLS can also provide authentication of the client. In general, TLS authentication uses public key based digital signatures backed by certificates. Thus, the server authenticates either by decrypting a secret encrypted under his public key or by signing an ephemeral public key. The client authenticates by signing a random challenge. Server certificates typically contain the servers domain name. Client certificates can contain arbitrary identities.   The Handshake Protocols The TLS Handshake Protocol allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In a typical scenario, only the server is authenticated and its identity is ensured while the client remains unauthenticated. The mutual authentication of the servers requires public key deployment to clients. Provide security parameters to the record layer. A Client sends a ClientHello message specifying the highest TLS protocol version it supports, a random number, a list of suggested cipher suites and compression methods. The Server responds with a ServerHello, containing the chosen protocol version, a random number, cipher, and compression method from the choices offered by the client. The Server sends its Certificate (depending on the selected cipher, this may be omitted by the Server). The server may request a certificate from the client, so that the connection can be mutually authenticated, using a Certificate Request. The Server sends a ServerHelloDone message, indicating it is done with handshake negotiation. The Client responds with a ClientKeyExchange which may contain a PreMasterSecret, public key, or nothing. (Again, this depends on the selected cipher). The Handshake protocol provides a number of security functions. Such as Authentication, Encryption, Hash Algorithms  · Authentication A certificate is a digital form of identification that is usually issued by a certification authority (CA) and contains identification information, a validity period, a public key, a serial number, and the digital signature of the issuer. For authentication purposes, the Handshake Protocol uses an X.509 certificate to provide strong evidence to a second party that helps prove the identity of the party that holds the certificate and the corresponding private key.  · Encryption There are two main types of encryption: symmetric key (also known as Private Key) and asymmetric key (also known as public key. TLS/SSL uses symmetric key for bulk encryption and public key for authentication and key exchange.  · Hash Algorithms A hash is a one-way mapping of values to a smaller set of representative values, so that the size of the resulting hash is smaller than the original message and the hash is unique to the original data. A hash is similar to a fingerprint: a fingerprint is unique to the individual and is much smaller than the original person. Hashing is used to establish data integrity during transport. Two common hash algorithms are Message Digest5 (MD5) produce 128-bit hash value and Standard Hash Algorithm1 (SHA-1) produce 160-bit value.   The Change Cipher Spec The Change Cipher Spec Protocol signals a transition of the cipher suite to be used on the connection between the client and server. This protocol is composed of a single message which is encrypted and compressed with the current cipher suite. This message consists of a single byte with the value1. Message after this will be encrypted and compressed using the new cipher suite.   The Alert The Alert Protocol includes event-driven alert messages that can be sent from either party. the session is either ended or the recipient is given the choice of whether or not to end the session. Schannel SSP will only generate these alert messages at the request of the application.   The Record Layer/Protocol The TLS record protocol is a simple framing layer with record format as shown below: struct { ContentType type; ProtocolVersion version; uint16 length; opaque payload[length]; } TLSRecord; As with TLS, data is carried in records. In both protocols, records can only be processed when the entire record is available. The Record Layer might have four functions: It fragments the data coming from the application into manageable blocks (and reassemble incoming data to pass up to the application). Schannel SSP does not support fragmentation at the Record Layer. It compresses the data and decompresses incoming data. Schannel SSP does not support compression at the Record Layer. It applies a Message Authentication Code (MAC), or hash/digest, to the data and uses the MAC to verify incoming data. It encrypts the hashed data and decrypts incoming data.   Application Protocol TLS runs on application protocol such as HTTP, FTP, SMTP, NNTP, and XMPP and above a reliable transport protocol, TCP for example. While it can add security to any protocol that uses reliable connections (such as TCP), it is most commonly used with HTTP to form HTTPS. HTTPS is used to secure World Wide Web pages for applications such as electronic commerce and asset management. These applications use public key certificates to verify the identity of endpoints.   TSL/ SSL Security The client may use the CAs public key to validate the CAs digital signature on the server certificate. If the digital signature can be verified, the client accepts the server certificate as a valid certificate issued by a trusted CA. The client verifies that the issuing Certificate Authority (CA) is on its list of trusted Cas. The client checks the servers certificate validity period. The authentication process stops if the current date and time fall outside of the validity period.   IPSec IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices (peers), such as PIX Firewalls, Cisco routers, Cisco VPN 3000 Concentrators, Cisco VPN Clients, and other IPSec-compliant products. IPSec is not bound to any specific encryption or authentication algorithms, keying technology, or security algorithms. IPSec is a framework of open standards. Because it isnt bound to specific algorithms, IPSec allows newer and better algorithms to be implemented without patching the existing IPSec standards. IPSec provides data confidentiality, data integrity, and data origin authentication between participating peers at the IP layer. IPSec is used to secure a path between a pair of gateways, a pair of hosts, or a gateway and a host. Some of the standard algorithms are as follows: Data Encryption Standard (DES) algorithm—Used to encrypt and decrypt packet data. 3DES algorithm—effectively doubles encryption strength over 56-bit DES. Advanced Encryption Standard (AES)—a newer cipher algorithm designed to replace DES. Has a variable key length between 128 and 256 bits. Cisco is the first industry vendor to implement AES on all its VPN-capable platforms. Message Digest 5 (MD5) algorithm—Used to authenticate packet data. Secure Hash Algorithm 1 (SHA-1)—Used to authenticate packet data. Diffie-Hellman (DH)—a public-key cryptography protocol that allows two parties to establish a shared secret key used by encryption and hash algorithms (for example, DES and MD5) over an insecure communications channel. IPSec security services provide four critical functions: Confidentiality (encryption)—the sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication. If intercepted, the communications cannot be read. Data integrity—the receiver can verify that the data was transmitted through the Internet without being changed or altered in any way. Origin authentication—the receiver can authenticate the packets source, guaranteeing and certifying the source of the information. Anti-replay protection—Anti-replay protection verifies that each packet is unique, not duplicated. IPSec packets are protected by comparing the sequence number of the received packets and a sliding window on the destination host, or security gateway. Late and duplicate packets are dropped. v How IPSec works The goal of IPSec is to protect the desired data with the needed security services. IPSecs operation can be broken into five primary steps: Define interesting traffic—Traffic is deemed interesting when the VPN device recognizes that the traffic you want to send needs to be protected. IKE Phase 1—This basic set of security services protects all subsequent communications between the peers. IKE Phase 1 sets up a secure communications channel between peers. IKE Phase 2—IKE negotiates IPSec security association (SA) parameters and sets up matching IPSec SAs in the peers. These security parameters are used to protect data and messages exchanged between endpoints. Data transfer—Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. IPSec tunnel termination—IPSec SAs terminate through deletion or by timing out. TASK 1(b) IPSecs advantage over TLS: It has more plasticity on choosing the Authentication mechanisms (like the Pre Shared Key), and therefore makes it hard for the attacker to do man in the middle.TLS is based only on Public key and with tools, its possible to do man in the Middle breaking TLS. Going one step down the OSI stack, IP Security (IPSec) guarantees the data privacy and integrity of IP packets, regardless of how the application used the sockets. This means any application, as long as it uses IP to send data, will benefit from the underlying secure IP network. Nothing has to be rewritten or modified; it even is possible that users wont be aware their data is being processed through encrypting devices. This solution is the most transparent one for end users and the one most likely to be adopted in the future in the widest range of situations. The main drawback of IPSsec lies in its intrinsic infrastructural complexity, which demands several components to work properly. IPSec deployment must be planned and carri ed out by network administrators, and it is less likely to be adopted directly by end users. TLSs advantage over IPSec: The advantage of TLS over generic application-level security mechanisms is the application no longer has the burden of encrypting user data. Using a special socket and API, the communication is secured. The problem with TLS is an application wishing to exploit its functionality must be written explicitly in order to do so (see Resources). Existing applications, which constitute the majority of data producers on the Internet, cannot take advantage of the encryption facilities provided by TLS without being rewritten. Think of the common applications we use everyday: mail clients, web browsers on sites without HTTPS, IRC channels, peer-to-peer file sharing systems and so on. Also, most network services (such as mail relays, DNS servers, routing protocols) currently run over plain sockets, exchanging vital information as clear text and only seldomly adopting application-level counter-measures (mostly integrity checks, such as MD5 sums).   IGMP IGMP is a protocol used by IP hosts, and adjacent multicast network devices to identify their memberships. If they are part of the same multicast group they communicate with each other. ICMP communicates 1 to 1.IGMP communicates 1 to many.   Establish Multicast group We describe a distributed architecture for managing multicast addresses in the global Internet. A multicast address space partitioning scheme is proposed, based on the Unicast host address and a per-host address management entity. By noting that port numbers are an integral part of end-to-end multicast addressing we present a single, unified solution to the two problems of dynamic multicast address management and port resolution. We then present a framework for the evaluation of multicast address management schemes, and use it to compare our design with three approaches, as well as a random allocation strategy. The criteria used for the evaluation are blocking probability and consistency, address acquisition delay, the load on address management entities, robustness against failures, and processing and communications overhead. With the distributed scheme the probability of blocking for address acquisition is reduced by several orders of magnitude, to insignificant levels, while consi stency is maintained. At the same time, the address acquisition delay is reduced to a minimum by serving the request within the host itself. It is also shown that the scheme generates much less control traffic, is more robust against failures, and puts much less load on address management entities as compared with the other three schemes. The random allocation strategy is shown to be attractive primarily due to its simplicity, although it does have several drawbacks stemming from its lack of consistency (addresses may be allocated more than once) The Routing and Remote Access administrative tool is used to enable routing on a Windows 2000 server that is multihomed (has more than one network card). Windows 2000 professional cannot be a router. The Routing and Remote Access administrative tool or the route command line utility can be used to con a static router and add a routing table. A routing table is required for static routing. Dynamic routing does not require a routing table since the table is built by software. Dynamic routing does require additional protocols to be installed on the computer. When using the Routing and Remote Access tool, the following information is entered: Interface Specify the network card that the route applies to which is where the packets will come from. Destination Specify the network address that the packets are going to such as 192.168.1.0. Network Mask The subnet mask of the destination network. Gateway The IP address of the network card on the network that is cond to forward the packets such as 192.168.1.1. Metric The number of routers that packets must pass through to reach the intended network. If there are more than 1, the Gateway address will not match the network address of the destination network.   Dynamic Routing Windows 2000 Server supports Network Address Translation (NAT) and DHCP relay agent. Three Windows 2000 supported Dynamic routing protocols are: Routing Information Protocol (RIP) version 2 for IP Open Shortest Path First (OSPF) Internet Group Management Protocol (IGMP) version 2 with router or proxy support. The Routing and Remote Access tool is used to install, con, and monitor these protocols and routing functions. After any of these dynamic routing protocols are installed, they must be cond to use one or more routing interfaces.   Protocol Independent Multicast (PIM): This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occasionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group.   The Protocol Independent Multicast (PIM) architecture: maintains the traditional IP multicast service model of receiver-initiated membership; can be cond to adapt to different multicast group and network characteristics; is not dependent on a specific unicast routing protocol; uses soft-state mechanisms to adapt to underlying network conditions and group dynamics. The robustness, flexibility, and scaling properties of this architecture make it well suited to large heterogeneous inter-networks. This document describes an architecture for efficiently routing to multicast groups that may span wide-area (and inter-domain) internets. We refer to the approach as Protocol Independent Multicast (PIM) because it is not dependent on any particular unicast routing protocol. The most significant innovation in this architecture is the efficient support of sparse, wide area groups. This sparse mode (SM) of operation complements the traditional { dense-mode} approach to multicast routing for campus networks, as developed by Deering [2][3] and implemented previously in MOSPF and DVMRP [4][5]. These traditional dense mode multicast schemes were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. However, when group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets (in the case of DVMRP) or membership report information (in the case of MOSPF) are occas ionally sent over many links that do not lead to receivers or senders, respectively. The purpose of this work is to develop a multicast routing architecture that efficiently establishes distribution trees even when some or all members are sparsely distributed. Efficiency is evaluated in terms of the state, control message, and data packet overhead required across the entire network in order to deliver data packets to the members of the group. A user of an internet- connected pc, Adam; send an email message to another internet connected pc user beryl. 1. Outlinethe function of four internet host that would normally be involved be involved in this task. . : 1. Adams Computer : :2. Server of Adams Internet Service Provider : : 3. Server of Beryls Internet Service Provider: :4. Beryls Computer : . This program allows you to build and deal with a large mailing list, and to create modified messages from predefined templates while sending. It lets you define multiple independent SMTP server connections and will utilize the latest in multithreading technology, to send emails to you as fast as it is possible. You can use all the standard message formats like plain text, HTML or even create a rich content message in the Microsoft Outlook Express and export it into the program. The interface of the program is very simple and easy to learn nearly all functions can be performed using hotkeys on the keyboard. E-mail is a growing source of an enterprises records and needs to be treated as any written memo, letter or report has been treated. The information in e-mail has the potential to add to the enterprises knowledge assets, from interactions with the users or customers in the enterprise to interactions with colleagues overseas. 2. List the internet protocol which would be used in this task. Internet Protocol (IP) is packet-based protocol that allows dissimilar hosts to connect to each other for the purpose of delivering data across the resulting networks. Applications combine IP with a higher- level protocol called Transport Control Protocol (TCP), which establishes a virtual connection between a destination and a source. IP by itself is something like the postal system. It allows you to address a package and drop it in the system, but theres no direct link between you and the recipient. . : 1. HTTP : :2. IMAP(Version 4): : 3.SMTP : :4.POP (Version 3) : .   HTTP (Hyper-Text Transfer Protocol) is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. HTTP/1.0, as defined by RFC 1945 [6], improved the protocol by allowing messages to be in the format of MIME-like messages, containing meta information about the data transferred and modifiers on the request/response semantics.   IMAP4 (Internet Message Access Protocol) A mail protocol that provides management of received messages on a remote server. The user can review headers, create or delete folders/mailboxes and messages, and search contents remotely without downloading. It includes more functions than the similar POP protocol.   POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express. Its also built into the Netscape and Microsoft Internet Explorer browsers. POP3 is designed to delete mail on the server as soon as the user has downloaded it. However, some implementations allow users or an administrator to specify that mail be saved for some period of time. POP can be thought of as a store-and-forward service.   SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail. However, since it is limited in its ability to queue messages at the receiving end, it is usually used with one of two other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the most widely-used SMTP server for e-mail. A commercial package, Send mail, includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support. SMTP usually is implemented to operate over Internet port 25. An alternative to SMTP that is widely used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail. 3. Taking the case that the message include the text please find attached abstract and 1. as well as in MS-Word format and an attachment in jpeg, list format of the send mail messages. .. : 1. MIME : ..   MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). In 1991, Nathan Borenstein of Bellcore proposed to the IETF that SMTP be extended so that Internet (but mainly Web) clients and servers could recognize and handle other kinds of data than ASCII text. As a result, new file types were added to mail as a supported Internet Protocol file type. Servers insert the MIME header at the beginning of any Web transmission. Clients use this header to select an appropriate player application for the type of data the header indicates. Some of these players are built into the Web client or browser (for example, all browsers come with GIF and JPEG image players as well as the ability to handle HTML files). 4. How would received message differ the sent messages? The email address that receives messages sent from users who click  ¿Ã‚ ½reply ¿Ã‚ ½ in their email clients. Can differ from the  ¿Ã‚ ½from ¿Ã‚ ½address which can be an automated or unmonitored email address used only to send messages to a distribution list.  ¿Ã‚ ½Reply-to ¿Ã‚ ½ should always be a monitored address.   IPv4: Internet Protocol (Version 4) The Internet Protocol (IP) is a network-layer (Layer 3) protocol in the OSI model that contains addressing information and some control information to enable packets being routed in network. IP is the primary network-layer protocol in the TCP/IP protocol suite. Along with the Transmission Control Protocol (TCP), IP represents the heart of the Internet protocols. IP is equally well suited for both LAN and WAN communications. IP (Internet Protocol) has two primary responsibilities: providing connectionless, best-effort delivery of datagrams through a network; and providing fragmentation and reassembly of datagrams to support data links with different maximum-transmission unit (MTU) sizes. The IP addressing scheme is integral to the process of routing IP datagrams through an internetwork. Each IP address has specific components and follows a basic format. These IP addresses can be subdivided and used to create addresses for sub networks. Each computer (known as host) on a TCP/IP network is assigned a unique logical address (32-bit in IPv4) that is divided into two main parts: the network number and the host number. The network number identifies a network and must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the InterNIC and can itself assign address space as nece ssary. The host number identifies a host on a network and is assigned by the local network administrator.   IPv6 (IPng): Internet Protocol version 6 IPv6 is the new version of Internet Protocol (IP) based on IPv4, a network-layer (Layer 3) protocol that contains addressing information and some control information enabling packets to be routed in the network. There are two basic IP versions: IPv4 and IPv6. IPv6 is also called next generation IP or IPng. IPv4 and IPv6 are de-multiplexed at the media layer. For example, IPv6 packets are carried over Ethernet with the content type 86DD (hexadecimal) instead of IPv4s 0800. The IPv4 is described in separate documents. IPv6 increases the IP address size from 32 bits to 128 bits, to support more levels of addressing hierarchy, a much greater number of addressable nodes, and simpler auto-configuration of addresses. IPv6 addresses are expressed in hexadecimal format (base 16) which allows not only numerals (0-9) but a few characters as well (a-f). A sample ipv6 address looks like: 3ffe: ffff: 100:f101:210:a4ff:fee3:9566. Scalability of multicast addresses is introduced. A new type of address called an any cast address is also defined, to send a packet to any one of a group of nodes. Two major improvements in IPv6 vs. v4: * Improved support for extensions and options IPv6 options are placed in separate headers that are located between the IPv6 header and the transport layer header. Changes in the way IP header options are encoded to allow more efficient forwarding, less stringent limits on the length of options, and greater flexibility for introducing new options in the future.  · Flow labeling capability A new capability has been added to enable the labeling of packets belonging to particular traffic flows for which the sender requests special handling, such as non-default Quality of Service or real-time service.   Comparison between IPv6 with IPv4 Data structure of IPv6 has modified as follows: Header length field found in IPv4 is removed in IPv6. Type of Service field found in IPv4 has been replaced with Priority field in IPv6. Time to live field found in IPv4 has been replaced with Hop Limit in IPv6. Total Length field has been replaced with Payload Length field Protocol field has been replaced with Next Header field Source Address and Destination Address has been increased from 32-bits to 128-bits.   Major Similarities IPv6 with IPv4 Both protocols provide loopback addresses. IPv6 multicast achieves the same purpose that IPv4 broadcast does. Both allow the user to determine datagram size, and the maximum number of hops before termination. Both provide connectionless delivery service (datagrams routed independently). Both are best effort datagram delivery services.   Major Differences between IPv6 with IPv4 IPv6 host to IPv6 host routing via IPv4 network: Here, IPv6 over IPv4 tunneling is required to send a datagram. IPv6 packets are encapsulated within IPv4 packets, allowing travel over IPv4 routing infrastructures to reach an IPv6 host on the other side of the .IPv6 over IPv4 tunnel. The two different types of tunneling are automatic and cond. For a cond tunnel, the IPv6 to IPv4 mappings, at tunnel endpoints, have to be manually specified. Automatic tunneling eases tunneling, but nullifies the advantages of using the 128-bit address space. IPv6 host to IPv4 host and vice versa: The device that converts IPv6 packets to IPv4 packets (a dual IP stack/ dual stack router) allows a host to access both IPv4 and IPv6 resources for communication. A dual IP stack routes as well as converts between IPv4 and IPv6 datagrams ICMP: IPv6 enhances ICMP with ICMPv6. The messages are grouped as informational and error. An ICMPv6 message can contain much more information. The rules for message handling are stricter. ICMPv6 uses the Neighbor Discovery Protocol. New messages have been added also. Absence of ARP RARP: