Saturday, August 31, 2019
Augustine on creation and Aquinas on the existence of God Essay
In Augustineââ¬â¢s writing, The Confessions, he philosophically attempts to answer the problems that arise within religion, specifically in regards to Judeo Christian beliefs, pertaining to God, time, and creation. Augustine first addresses the belief that God created everything. He tries to provide a coherent explanation for his claim that Godââ¬â¢s ex-nihilo (ââ¬Å"out of nothingâ⬠) creation of the Earth is a sound statement, given that God created everything, and with it time. Thus, the notion of time never existed before its very point of creation. However, given that God created everything, and thus the universe, what was God doing before the universeââ¬â¢s creation that caused him to decide to create it or that it was now necessary as opposed to before. Furthermore, if God even had to make the decision whether or not the universeââ¬â¢s existence was necessary, making him arbitrary, wouldnââ¬â¢t that inherently falsify the claim that God is a perfect being (omnipotent, omniscient, and omnipresent) and thus is immutable. Augustine objects this claim by stating that God is eternal, in that he is timeless, and so exists outside the realm of time. He is therefore not bound (or defined) by any temporal concept. So, when faced with the problem of what God was doing before he created the universe, Augustine simply claims it is an illogical question. He justifies that if one accepts the belief that God is eternal and created everything, than one canââ¬â¢t logically ask what God was doing at a certain point before the creation of time itself, as it was not yet in existence. Augustine continues the debate on time, by calling its very existence into question. Augustine questions the commonly accepted notion of time by providing his theory of ââ¬Å"presentism,â⬠which basically reduces time into only the present tense. Augustine claims that when people talk in terms of the past, present, and future theyââ¬â¢re only really talking about various forms of the present. Augustine tries to explain the various complications that arise when trying to determine the duration of present time. It is difficult to compare two different measurements of time if each period of ââ¬Å"presentâ⬠time given can be reduced into a minute instance of time that quickly disappears. So, one cannot measure something that has happened, because once it is in the past, it no longer exists. Augustine accepts that their appears to be an irrational aspect of presentism, in that by accepting the present as the only form of time, one would then seemingly have to agree that it wouldnââ¬â¢t make sense to refer to any moment of time occurring in either the past or the future. Augustine rationalizes any reference to the past, by defining it as the minds ability to recall imprinted memories of images left in the mind through the medium of oneââ¬â¢s senses. Similarly, the foreseeing of future events is merely the act of prediction based off of things that were already present or previously seen (i.e. the assertion that the sun will rise tomorrow is only based on oneââ¬â¢s own previous experience of having already watched the sun rise). Augustine acknowledges the apparent existence of past and future events, and answers the discrepancy by providing alternate terms to use in place of the existing tenses, which are the present of past things, the present of present things, and the present of future things. Furthermore, he redefines the definitions of his terms to mean that the present of past things is memory, the present of present things is attention, and the present of future things is expectation. Augustine continues the problem of measuring time, by recognizing that it would be impossible to measure something, which is not yet real, travels through what doesnââ¬â¢t occupy space, only to become something that is no longer real. He first tries to use the notion that time can be measured in relation to a corporeal object, such as the sun (i.e. a day). Yet, this method is rejected, because if one were to change the time it takes for the sun to rotate the Earth, the time allotted to a day would still remain the same, even if the sun were to set multiple times within a ââ¬Å"daysâ⬠time frame. Thus, he states that if the motion of any corporeal object is one thing, but the standard in which we measure it is another, time can not based off of any movement of a corporeal object. He then replaces this method of measurement with the example of sound, explaining that because we can measure time based on our voice, surely we can measure any interval of time based off any beginning and end. However, he claims that when measuring any form of sound, we are only measuring the impression the sound left on the mind, and thus are only measuring the impression left, not the time itself. Augustine then deduces that time is only produced from memories of impressions. Thus, time is nothing more than a manmade phenomenon that exists only within the realm of the human mind. He explains that this phenomenon exists within the mind in three different forms of reality. The three realities of the mind are comprised of when the mind expects, attends, or remembers. In other words, that what the mind expects, passes by way of what it attends, into being what it remembers. Furthermore, it is only our attention that endures, through which what is still to be makes its way into the state of where it is no more. Therefore, our attention is continually present, as the future is being passed through the present and changes into the past. Augustine concludes that it is this ââ¬Å"tensionâ⬠or flow that constitutes time, in that time can only be understood in terms of a manmade psychological phenomenon. For Augustine, his philosophical conclusion that time doesnââ¬â¢t exist in any tangible way but is merely a product of the human mind, justifies the claim that Godââ¬â¢s existence is outside the realm of humanââ¬â¢s perception of time. Augustine expects that from the acceptance of this notion of time, Godââ¬â¢s exemption from time in no way means that he is deficient or more limited than humans in any aspect, but that conversely, he is more powerful. Aquinas Aquinas argues the problem of Godââ¬â¢s existence in three ways: First, he addresses whether or not the existence of God is self-evident, second, whether or not his existence can be demonstrated and, finally, whether or not God actually exists. In addressing the issue of whether or not Godââ¬â¢s existence is self-evident, Aquinas provides three objections in support of the argument. However, the objections are fundamentally flawed based on the premise that one can intellectually declare God doesnââ¬â¢t exist. However, in response, Aquinas counters this notion by redefining the ways in which something can be self-evident into two different categories. He says something can be self-evident in itself and not to us or both itself and us. Therefore, some concepts involving incorporeal substances can only be learned. Also, because God is His own existence, the proposition is no longer one that is self-evident. Thus, Godââ¬â¢s self-evident existence can only be proven through demonstrating the natural things known to us, such as his affects; or, it is simply a prima fascie presumption. Aquinas provides the objections to his assertion, which accepts the fact that not everyone defines happiness or God in the same ways, or that Primal Truths are self-evident. Aquinas then discusses whether or not Godââ¬â¢s existence can be proven by demonstration. He provides the objection that it canââ¬â¢t, on the fact that Godââ¬â¢s existence is based entirely on faith, and that His essence can only be defined in terms of what He is not. Lastly, that no cause can be demonstrated by an affect that isnââ¬â¢t proportional. Aquinas answers, saying that Godââ¬â¢s existence can be demonstrated in two ways. The first being through a priori methods, in which knowledge can be obtained without the need of experience, as seen with Anslemââ¬â¢s Ontological argument which proves the existence of God using a definition. The second way, which for Aquinas is the only legitimate way, is through a posteriori methods, in which any knowledge used must be gained through experience. Aquinas adheres to Aristotelian ideas, claiming that there is nothing in the intellect that didnââ¬â¢t once exist in the senses, and thus rejects that Godââ¬â¢s existence could be demonstrated through any means other than those acquired through experience. For Aquinas, every effect must be the result of an inherent cause. So, one can prove Godââ¬â¢s existence to be self-evident by demonstrating his existence based off the effects he produces. Aquinas continues by claiming that nothing prevents a man from understanding evidence demonstrated scientifically. Therefore, because God can be defined and proven in terms of his effects, we can conclude that Godââ¬â¢s existence can be demonstrated. In order to attack the objections to the next question of whether or not God exists, Aquinas provides the proof of Godââ¬â¢s existence with, The First Way, which is one of five. The First Way is the most visible and is based of the a posteriori argument of motion. Aquinas assumes that everyone can accept that within the world some things are in motion (as they can be observed), and that a thingââ¬â¢s motion has to have been caused by something other than itself. In other words, except something in motion already in a state of actuality, no motion can be converted from potentiality to actuality without the help of some outside source. Thus, Aquinas is influenced by the Aristotelian view of change, which is based of the assumption that a substance, defined as being a particular thing with a natural unity that persists yet changes in predictable ways, experiences two different forms of change: accidental and substantial. Accidental change occurs when a substance either loses an accidental form and gains another or gains a form without losing another (i.e. cutting oneââ¬â¢s hair). Substantial change is the result of something that turns into a whole new being (i.e. a caterpillar into a butterfly). Thus, something that is potentially something else canââ¬â¢t simultaneously be that thing in actuality at the same time. For instance water, which is actually a liquid but potentially ice, cannot change its form into being ice without something acting upon it. Furthermore, building upon Aristotleââ¬â¢s views of change, Aquinas asserts that the same rule governing change can also be applied to the argument of movement. Therefore, if in accordance with the same rule, something in motion cannot simultaneously be both the mover and moved, since something in motion must be put in motion by something other than itself. Thus, in order to find what caused the first movement to occur, one would need to trace the seminal causes of such movement back to, in effect, infinity. However, Aquinas claims itââ¬â¢s illogical to accept that the initial force could only be defined in relation to an infinite chain of causes. Consequently, the only sound conclusion would have to include the existence of a first mover, such as something along the lines of an unmoved mover. For Aquinas, the existence of an unmoved mover/unchanged changer proves the existence of a force that could only be God. Aquinas concludes that only God could be the force behind the existence of some unmoved mover, if motion is created in two different ways. The first is exemplified by the example of some ââ¬Å"Xâ⬠(i.e. a leg) moving some ââ¬Å"Yâ⬠(i.e. a ball). So, that in this first example, even though ââ¬Å"Xâ⬠causes the movement of ââ¬Å"Y,â⬠it also follows that ââ¬Å"Xâ⬠is moving too. Subsequently, Aquinas concludes that given the notion that any ââ¬Å"Xâ⬠which is able to cause ââ¬Å"Yâ⬠to move, while at the same time able to remain motionless, could only be the result of a being ââ¬Å"Xâ⬠equivalent to a much-elevated force that uniquely has to be God.
Friday, August 30, 2019
Timber 2013 Major Folio
Timber 2012/2013 Hsc major project folio Research Ergonomics How efficient will it be in a working environment? I have taken into consideration that I am a bit taller than other people, and after measuring all cabinets in my house they ranged from 900 mm to 950 mm and for me personally I considered them to be to small. Which is the reason I have chosen to make it to 1000mm. Design How did I come up with the design and why? Originally I started looking on the Internet and browsing through images but there were just so many options and I would not have known how to begin making them.During our theory lesson at school the teacher brought some magazines into the classroom, after reading through and getting some ideas I finally found a cabinet that captured my attention both because of the amazing look and the complexity of it, my design I very similar to the one that was in the magazine. I chose to make a cabinet as I noticed that one particular cabinet at my house is very bland and is s tarting to deteriorate due to its old age. Timber Selection What timber did I use and why?For the legs of my major project I have used Sydney Blue Gum as it is a hardwood timber that is more than capable of holding my job upright and also as I have used it before and have seen how it finishes. Glues What Glue/s have I used and why? Poly Vinyl Acetate (PVA) is the most common glue that I will be using as it is fast drying, dries clear, creates a strong bond between both timber surfaces and is easy to work with. Hardware What hardware has been used and why? Joints What joints have I used and why? Time Management PlanWeek| Monday| Tuesday| Wednesday| Friday| 1| Designing Project ââ¬â SketchingTheory| Designing Project ââ¬â Sketching Theory| Designing Project ââ¬â Adding DimensionsTheory| Selecting Timbers ââ¬â Bought Blue Gum timber for LegsTheory | 2| Cut out legs 45mm X 45mmEach 1000mm long| | Marked and cut first curve on front legs| Roughly sanded curves with drum s ander| 3| Marked and cut out second curve on front legs| Roughly sanded curves with drum sander| Problem ââ¬â One of the curves was out significantly, new leg had to be made. Cut out new leg and cut curve on one side| 4| Cut second curve on leg and sanded on drum sander| | Major Project Portfolio explained and examples shownTheory| Cut all legs to precisely 1000mm| 5| Began sanding legs with 80 grit sandpaper| Sanding legs with 80 grit sandpaper| Sanding legs with 80 grit sandpaper| Sanding legs with 80 grit sandpaper| 6| Sanding legs with 80 grit sandpaper| | | | 7| | | | | 8| | | | | 9| | | | | 10| | | | | Materials ListMaterial| Length (mm)| Width (mm)| Thickness (mm)| Estimated Cost| Cost| Sydney Blue Gum (Legs & Top)| 1200| 300| 45| $90| $137| Jarrah (Door Frames)| | | 15| $45| | Maple (Draw Fronts)| 800| 140| 20| $20| | MDF (Back)| 900| 480| 3| | | | | | | | | | | | | | | Statement of intent Throughout this year and next I intend on designing and constructing a modern wood en cupboard. It will consist of two drawers up the top of the job and two doors with glass panels in them below. My goal is to make it perfectly with minimal complications or problems.I plan to achieve this by following my original designs and if need be small alterations might be made to ensure the job is up to a suitable standard. For the legs and the top of my job I plan on using Sydney blue gum as in previous years I have used it and personally I think it has a nice colour and finishes well. For the framing of the doors I plan on using some Jarrah as I think it will mix well with the Sydney blue gum and provide an amazing contrast of colors. For the draw fronts I plan on using a lighter material such as maple because it adds another colour that I think will look good.I also plan on putting frosted glass panels to add some extra complexity to it. I decided to make this particular design, as I think it is a practical piece of work that if made properly would serve me well througho ut its life. Its main use will be for storing objects in the draws and bottles in the bottom compartment where the doors are. Throughout the process of making my project, I will be using various types of timber and tools to make up most of my job. I will also be using glue, nails and various joints to join all aspects of my job together.Classification of Timbers Sydney Blue Gum Hardwood or softwood ââ¬â Sydney blue gum is a hard wood Botanical Name ââ¬â Eucalyptus Saligna Origin ââ¬â Blue Gum is found along the NSW coastline from Batemans Bay to Southern Queensland Appearance ââ¬â The colour varies from soft pinks to dark pinks and dark reds Texture ââ¬â The texture of this timber is moderately coarse and even Grain ââ¬â The grain is straight or slightly interlocked in some cases Common uses ââ¬â Joinery, Furniture, Domestic, Floor Boards, and Commercial ConstructionJarrah Hardwood or Softwood ââ¬â Jarrah is a Hardwood Botanical Name ââ¬â Eucalypt us Marginata Origin ââ¬â Jarrah grows in the Southwest corner of Western Australia Appearance ââ¬â Heartwood varies from rich reds to deep browns; the Sapwood is a pale yellow colour Texture ââ¬â The texture is relatively even but coarse Grain ââ¬â The grain is generally straight but sometimes slightly interlocked producing a fiddle back figure Common Uses ââ¬â Wharf and bridge construction, railway sleepers, framing, flooring, and joinery
Thursday, August 29, 2019
Microsoft Case Study Example | Topics and Well Written Essays - 2500 words
Microsoft - Case Study Example Along with this Microsoft excel and Microsoft word are both consider as the leaders in their respective markets, and at that time both the Microsoft products took away the leadership from their leading products. Microsoft on the other hand also leads all the applications suite market along with its office system, because there were many other products that aimed at the business market. (Msters, 198, no page) The first ever product, which Microsoft created, was one of the versions of basic language for the very first computers known as Altair 8800. At that time Microsoft also continued to be a leader in the area of software development market along with its visual STUDIO NET and also MICROSOFT SQL. These both above-mentioned services are used in order to create much better known software, which also runs on the Windows operating system. Apart from this Microsoft are also considering as a target for anti-competitive practices, it is also consider as one of the most powerful and also most successful software companies ever formed. Furthermore there were many companies which have no doubt tried to bring this company down but they all failed. Because Microsoft is a company, which continues to further, expand in future. Microsoft known is one of the best companies in the field of information technology. Bill Gates the owner of Microsoft presented such types of information technology related products, which are proved very much advantageous for us. Different kinds of operating systems which are now used very much frequently are much more advantageous and beneficial for all of us. The operating systems invented by the Microsoft are such kind of the operating system, which provides deep insight knowledge for each and every customer or for those who use it frequently. (Msters, 198, no page) Microsoft has done really a great job; it has provided us much different kind of facilities with the help of which we can do various tasks in just a second. It's only because of it that now we are able to perform different kinds of duties and tasks very easily. MAIN BODY This part basically includes the inventions, which are done by Microsoft. Disk operating system, which is also known as DOS, was a perfect kind of operating system that helps a lot the company to find its first real success. It was only the disk operating system (DOS) with the help of which Microsoft gained a huge success, and this huge success made Microsoft one of the best worldwide company or organization. Later on during the transition of MS DOS to windows, Microsoft gained more and more success and this success allowed the company also to attain ground on the application software competitors. (Msters, 198, no page) Later on in 1993, Microsoft also released a windows known as windows NT 3.1, which is known as a business for an operating system along with this the windows 3.1 was also termed as an user interface but apart from this it was an entirely different and unique operating system. Microsoft is considered as an innovative and also a creative organization or a company, because behind the success of each and every company there is a special thing which is used in order to gain more and more suc
Wednesday, August 28, 2019
A narrowed aspect of National Park Essay Example | Topics and Well Written Essays - 750 words
A narrowed aspect of National Park - Essay Example Snowmobiling in the Yellowstone national park is disputable on a few fronts. Moderates are worried about how snowmobiles, and snowmobile outflows specifically, may affect natural life, air and water quality, commotion levels, and the pristine aesthetic of the Yellowstone wilderness. An alternate concern is for the well being impacts upon both snowmobile riders and park officers who are laid open to fumes and high clamor levels for huge measures of time. Supporters of snowmobiling point to different contemplations, for example, economic benefits to local communities and the importance of preserving access to public lands. Adding further, several individuals are of the view that more up to date innovations make cleaner, quieter snowmobiles that relieve the impacts of snowmobile use on air, water and commotion contamination. Quantitative research on this issue remains inadequate and numerous inquiries stay unanswered. There are 185 miles of cleared and paved roads especially constructed for snowmobile use in the Yellowstone National park, the vast majority of which are adjoining to streams, rivers and lakes. Considering the dissemination of pollutants in the snowpack and the impacts of poisons on oceanic creature, there is potential for surface water tainting from snowmelt spillover. For example, separation of polluted snowpack from water body, contaminant level versus weakening component and so on. Human recreational exercises have a major impact on aquatic resources directly and by through implication as well. Winter recreation influences aquatic organisms principally by aberrant affects because of contamination. Two-stroke motors can store contaminants on snow, prompting ground and surface water quality corruption, which along these lines may affect aquatic life. Protection of the aquatic resources of park, including the aquatic assets, and rebuilding of local species are essential administration objectives of the National Park Service.
Tuesday, August 27, 2019
Tesco in the Chinese Food Retail Market Dissertation
Tesco in the Chinese Food Retail Market - Dissertation Example Most importantly, I would like to take this opportunity to express my gratitude to my parents who offer me the greatest support and encouragement. Table of Contents Table of Contents 5 List of Tables 7 List of Figures 8 1.0 Introduction 9 1.2 Research Question 13 2.0 Literature Review 14 2.3.1 PEST 21 2.3.2 SWOT 26 2.3.3 The Five Forces 27 2.4 Sustainable competitive advantage 32 2.5 Factors influencing strategies for achieving a competitive advantage in China 35 3.0 Methodology 40 4.0 Result 51 4.1 Carrefour Supermarkets 54 Organisation Overview 54 Operations and Business Strategy 55 Domestic Competition 57 Competitive Advantage 58 4.2 Wal-Mart 58 Organisation Overview 58 Operations and Business Strategy 59 Domestic Competition 60 Competitive Advantage 60 5.0 Discussion 62 Organisation Overview 62 Operations and Business Strategy 63 Domestic Competition 65 Competitive Advantage 65 6.0 Conclusion 68 7.0 References 70 List of Tables Table 1. The amount of sales and the amount of chain stores of Carrefour in China Page 33 List of Figures Figure 1.0 Porter's Five Forces Model (Porter 2001). Page 20 1.0 Introduction China's admittance into the World Trade Organisation (WTO) in 2001 opened up the Chinese market to the rest of the world. From the end of 2004, the Chinese government began lifting restrictions on foreign retailers, which enabled retail operations that were 100% foreign owned to operate (LaSalle 2005, Chen 2006, Tao 2006). This opportunity was obviously seized upon by retailers like Tesco, Carrefour and Walmart who dominate the foreign-owned food retail market. The Chinese market is particularly attractive as it is not... Introduction Chinaââ¬â¢s admittance into the World Trade Organisation (WTO) in 2001 opened up the Chinese market to the rest of the world. From the end of 2004, the Chinese government began lifting restrictions on foreign retailers, which enabled retail operations that were 100% foreign owned to operate (LaSalle 2005, Chen 2006, Tao 2006). This opportunity was obviously seized upon by retailers like Tesco, Carrefour and Walmart who dominate the foreign-owned food retail market. The Chinese market is particularly attractive as it is not homogenous and encompasses numerous target markets which represent purchasing power for retailers. This is particularly true of the markets based in the urban areas, as it is reported that there is an income disparity between rural and urban customers. The urban per capita income is three times more than that of rural areas (LaSalle 2005, Chen 2006, Tao 2006), which presents profit to the food retailers. The opening up of the markets in China has also introduced competitive advantage to the Chinese market. Prior to 2004, foreign owned companies had to form joint ventures with Chinese companies and were limited to owning a 65% stake in the business (LaSalle 2005, Chen 2006, Tao 2006). They also had restrictions on the number of stores that could be opened in a geographical region, which gave the domestic retailers a competitive advantage. Domestic retailers had access to the entire Chinese market, and as a result they also had the monopoly on the knowledge.
Monday, August 26, 2019
Structure and Functions of the United Nations Organization Research Paper - 1
Structure and Functions of the United Nations Organization - Research Paper Example It also has an Economic and Social Council which has 54 members and an international court of justice consisting of fifteen judges. It has a Trusteeship council and a secretariat which are discussed subsequently. The United Nations through its five bodies is helping to maintain international politics in such a way that the whole world remains in peace and harmony. It is basically acting as a judge of politics so that countries do not fight or the populations of the countries do not suffer either financially or physically because of any threat. In order to develop a norm for all the countries, international laws are laid down by the United Nations which have to be followed by all the member countries. These international laws are regulated by treaties between the UN and the countries. These treaties are broad as they consider many aspects of the society such as human rights, refugees and border restrictions (United Nations 2010) Rwanda Genocide is cited to be one of the failures by the United Nations organization which shows that the UN has not been very successful in achieving its objectives. On the contrary, many other successful scenarios of UN can also be analyzed all over the world which shows that they have regulated international politics in such a way that many wars have been avoided. An example of Indo Pak can be cited here which was stopped with the help of UN intervention. It can clearly be seen that the UN Security Council after the genocide got more particular about warnings. It sought out its policies in such a way that future incidents occurring all over the world could be avoided. The policies which were taken by UN regarding the war on Afghanistan can be cited here which have served to be purposeful in decreasing the terrorism rate in the world. The UN Security Council urged all its member countries to follow the rules as laid down by Resolution 1267.
Sunday, August 25, 2019
Using examples of your choice critically examine how ideas about the Essay
Using examples of your choice critically examine how ideas about the nation or national identity have become an important part of contemporary culture and socie - Essay Example Britons constructed their identity in opposition to an ââ¬Å"otherâ⬠: Catholic France. Gender roles were central to this moderate Protestant national identity. By looking at eighteenth-century British writers such as Sir Walter Scott and by analyzing William Hogarths prints, it was clear how British identity was constructed as strong and ââ¬Å"masculineâ⬠while ââ¬Å"othersâ⬠especially the French, were described as weak and ââ¬Å"feminineâ⬠(Taylor, 2000: 63). National Identity as a Part of Contemporary Culture and Society: The diversity, the multitudinous cultural effects and the flexible symbols of the national produce an enormous cultural resource that is a seething mass of cultural elements. Culture, according to this conception, is constantly in the process of developing, of emerging out of the dynamism of popular culture and everyday life whereby people make and remake connections between the local and the national, between the national and the global, between the everyday and the extraordinary. However well established and institutionalised nations may become, they remain elusive, perpetually open to context, to elaboration and to imaginative reconstruction (Edensor, 2002: vi). There are several routes towards expressing identity that exist within this matrix, some branches of which wither, are renewed, and multiple connections which exist between cultural spheres according to Edensor (2002: 1) emerge. Despite the globalisation of economies, cultures and social processes, the scalar model of identity is believed to be primarily anchored in national space. Partly, then, the space in which culture and everyday life operates is indisputably the nation which is a social and cultural construct. Edensor: (2002: 3) states that the position of the state towards already existing cultures is complex, for certain cultures may be eradicated (especially in the case of ethnic or
Saturday, August 24, 2019
Stratigec Assignment Example | Topics and Well Written Essays - 2500 words
Stratigec - Assignment Example One of the many locations that Coca Cola has invested its resources in is in Japan, a country that accounts for close to 74% of the sales made in Asia. Having to locate a precise region and country that makes its products move of the shelves at a high rate will be essential for growth of the MNE. The ability to utilise strategies for the growth of the company indicates the benefits that influence the creation of new opportunities for the sake of the company. Answering this question will be quite essential in assisting upcoming MNEs to improve on their sales and revenues, while encouraging them to make good use of the resources available. To tackle this gap in the current literature, this essay will examine the literature present to date, and then look at an example of how Coca Cola manages to expand its services across the world, more so in Japan. An examination of the empirical evidence will also take place as well as an interpretation and discussion of the findings from the examination of Coca Cola and its internationalisation strategies. Multinational companies are the main drivers of globalisation and economic growth. These enterprises use their skills, strategies and resources to make the best out of what they have. The goal is to recreate the growing need for a space in the host country to ensure they capture the markets and make good use of the strategies they have readily placed near them (Arregle, Beamish & HÃ ©bert 2009: 89). They understand that the global cities in place will only benefit if there are outsiders who come and take good advantage of the skills and resources present to improve on their presence geographically and within the industry. The market share they acquire will always depend on how much they invest to acquire exclusive rights to develop their goals within the society (Dellestrand & Kappen 2012:
Friday, August 23, 2019
Professors question Essay Example | Topics and Well Written Essays - 250 words
Professors question - Essay Example Both North East Mexico and corresponding South Texas benefit from the energy boom from Eagle Ford Shale (DeBuys, 2011). Abundant energy has resulted to massive investment in the North East Mexico. Moreover, expansion of oil and gas production within Northern Mexico has resulted in increase in employment opportunities. North East Mexico depends on Texas in developing its underlying natural resources. Thus, many investors are positioning themselves in the North East Mexico to capitalize on the economic boom of Eagle Ford Shale within South Texas (DeBuys, 2011). Investments such as Infrastructure to accommodate the expected development, skilled workforce to fill the prevailing jobs created, the environmental effect of the expanded drilling, safety couple with security have been initiated within North East Mexico. Eagle Fordââ¬â¢s scale and swift of advancement has resulted to robust and comprehensive measure of the Northeast Mexico economic impact. Economic effect entail prosperous on employments, revenue and expenditure within the area. In summation, surge within Eagle Ford Shale drilling has resulted to sharp gains within the economic activity across the region. Nevertheless, billions of dollars that massive energy companies are committing to expand infrastructure for delivering hydrocarbons to the Texas Gulf Coast depicts that Northeast Mexico can anticipate robust production and
Examine the changing priorities of the United States in the Middle Essay
Examine the changing priorities of the United States in the Middle East - Essay Example Under hidden are the crude facts that are associated with the sole interests and benefits of United States of America. The region of Middle East holds its significance toward Americans because of its important different myths that are discussed below; The Population of Middle East is synonymous to that of Arab world, but to a limited extent as not all the countries are Arab, there are non Arabs as well in the Middle East. There are about 80% of the population that is Muslim, thus the Middle East basically comprise of the Muslim world countries. The Arab nations of Middle East are mostly rich in mineral oil. The countries like Saudi Arabia, Iraq, United Arab Emirates, Iran and Libya all are major oil producing countries. The role for war of terrorism by the Middle East; This has been in fact the greatest struggle that has been faced the members of these Middle East countries. It is not actually the war that has been imposed for these countries but in fact it is actually a problem of w rong perception-it is in fact the war against Islam rather than terrorism. There are many ways to misinterpret, mis-characterize or flatly misrepresent the various issues across the boundaries of the Middle East. The importance of Middle East towards America is not anything new to relate with the foreign policy of America. ... The various nationsââ¬â¢s related concerns of United States along with their levels of impacts have been discussed over here which will ultimately help us to conclude some information about the changing priorities of United States towards Middle East along with their national and international reasons. US and Egypt: The current crises that have flown through the Egyptian states have been of vast importance to the United States due to its wide levels of oil related concerns with the country. The disruption of the supplies of oil due to the raised protests ultimately resulted in the raising of the prices of the oil in the world market. This also resulted in the increased threats to the US citizen survival in Egypt as well as the journalists of US. This has really created a dilemma for the US nation to be highly volatile about changing its policies and concerns. Military advantages: The termination of the Husni Mubarak Era has also turned over the benefits of US from the long standin g middle-East Ally. The US had been reaping over these benefits from the last two decades, and it military forces were being fed for the annual income of $1 billion for the access to Seuz Canal. Now the situation has changed and among the various dimensions that are being predicted one is that now the Americans would have to pull their hands from the great amount that was already coming their way against Military friendship or support. It is seemingly that the Muslim Brotherhood group is going to occupy an important position in the country soon and therefore America is wondering to know that after this whether the Africans Ally will cut those hands which have fed their army for so many years. It is also unpredictable to guess any idea about the impacts for Israel as
Thursday, August 22, 2019
Aircraft Solutions Essay Example for Free
Aircraft Solutions Essay SecurityAircraft Solutions Security and Policy Assessment Table of Contents Executive Summary1 Company Overview1 Security Vulnerabilities1 Decentralized Anti Virus1 Access Control List Policy3 Recommended Solutions6 Bitdefender6 AlgoSec Security Management Suite7 Impact on Business Processes7 Budget8 Summary8 References9 Executive Summary As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours. Company Overview Aircraft Solutions operates within California in two separate physical locations in San Diego and Santa Ana. Working within both commercial and defense industries, their products are used globally. Aircraft Solutions is overtly technical in nature utilizing Business Process Management (BPM) for end to end processes that interacts with customers, vendors, and suppliers. BPM also fills a critical role of internal communications for IT to ensure customer needs are being fulfilled precisely as they have been ordered. Security Vulnerabilities Decentralized Anti Virus In reviewing the software utilized by Aircraft Solutions, it is stated that security is handled by anti-virus software that is independently operated for all workstations and servers. This seems to be a continuation of the host centric theme as evidenced by host based IDS. Whereas host based IDS can be seen as a more viable alternative to network based IDS, the same cannot be said for anti-virus software in this scenario. Given that the company operates two individual physical locations that run the gamut from design to production, it can be assumed that their employee pool is not small despite actual numbers not being mentioned. With these numbers, it is quite unlikely that all employees are maintaining their due diligence in ensuring that they are properly updating their anti-virus applications and operating them in such a manner that they are being used efficiently. The primary weakness of this policy is that the end user is responsible for its upkeep. It is reasonable to assume that someone working in a loading dock may not have the same level of computer aptitude as an engineer and would be more likely to cause a break in security by allowing a virus into their computer and threaten the network (Department of Homeland Security, 2012). As security is only as strong as the weakest link, this opens the proverbial floodgates of illicit access to the company network. This is problematic in that official statistics gathered in 2012 estimated that the United States ranks third in the world with 50. 1% of all unique users detecting threats from a virus (Kaspersky Security Bulletin, 2012). The most common virus credited with 75. 01% of all online attacks with 712,999,644 instances are malicious URLs (Kaspersky Security Bulletin, 2012) that can infect a computer without the user even realizing what has occurred. Not even anti-virus software will keep a user completely safe as it is reported that 32% of all users have been infected with a virus despite such protection measures (Zorz, 2010). Once infected, viruses can either cause extreme lag with the network, slowly gather information to be used against the company or sold to anyone willing to purchase it, or even cause damage to physical components used in the business (Weinberger, 2012). There are many other nefarious effects of an infected computer within a network that can cripple productivity and cut into the revenue generating capacity of the company. When you take into consideration that a slower network will cause a decrease in company production and will not reduce the cost of daily operations in terms of equipment, utilities or workforce then you must look at the financial ramifications of such an event. The creation and dissemination of viruses has become big business that will grow exponentially as it has moved from the stereotypical basements of hackers into the realm of organized crime and legitimized aspects of armed services for many nations the world around (Fisher, 2012). It is reported that worldwide, viruses have stolen approximately $1. 6 trillion (CMP Media Inc. , 2013) from the global economy. Access Control List Rule policy Security policy at Aircraft Solutions dictates that all firewall and router access control rules pertaining to packet flow be evaluated on a bi yearly basis. Network infrastructure documentation for the company lists one firewall and two routers that are currently in operation that fall within these parameters. Within the San Diego headquarters, all of these devices act as a bulwark against any unwanted intrusion from the Internet at large. Documentation also details there are contractors and suppliers along with customers to contend with regarding external access to the network through these devices. Looking at the internal physical topology it is seen that there is a single router providing packet control for all traffic between the Defense Division in Santa Anna and the rest of the company consisting of Human Resources, Accounting, Direct Computer Numerical Control, Sales and Marketing, IT, and information from the database. Conversely, this same router would also have to act the single point of control between all internal departments at San Diego as it is the only piece of equipment that possesses layer three functionality before passing the firewall. Given these relationships this demonstrates these three devices, particularly the router connecting Santa Anna and San Diego, require extremely detailed and expansive routing rules to effectively run the business. Departmental access list rules could for the most part remain static and not require a great deal of attention once implemented as IP schemas would be established ahead of time for each department. Issues begin to arise when you take into account that over the course of two years, multiple projects will most likely be spun up, numerous unique circumstances, and growth of the network will create a myriad of antiquated access control rules that will represent gaping holes in security that can allow unauthorized access to sensitive company materials and intellectual property. This would also lead to a lack of documentation of access control rules so that there would be no manner in which to simply reference which rules were in place and for what reason. Each annual security review will then sideline the IT department as it analyzes the access control list rules and begins to path them out to their respective devices. At this point, ownership of the device would have to be established, the purpose of that device, and then verifying if access was still warranted. Disagreements at this juncture would result in managerial oversight as department heads would then have to present their cases for and against access. Obviously, this would draw management, especially that of IT, into contracted deliberation that would distract from day to day business. A lack of an overall firewall policy, a bi yearly evaluation of access control list rules, and the previously mentioned issue of non centralized anti-virus software creates a very dangerous environment for data security. A port that is opened for user access is a window into the companys network that can ultimately be exploited. The more ports that are left open, the greater the opportunity for intrusion. This same lack of a detailed firewall policy also entails that these multiple holes in security can vary in scope since there is not a set control in place to reign in the extent of the security exception being asked (Hogg, 2011). These open ports make the company susceptible to port scanning as outside entities search for network soft spots that can be exploited to gain entry. These scans occur with such constant frequency that they are referred to as Internet background radiation (Notenboom, 2008). Given these factors it is a foregone conclusion that there will inevitably be a breach of the network as a result. Such an event would result in loss of intellectual property, decrease of production, and repeated incidents would create a devastating loss of trust in the eyes of customers. An ancillary security risk is derived from the time and energy spent by IT during each manual review of all access control listings in the firewall and routers. It is feasible that each rule will take an average of an hour to complete if all goes smoothly with tracing the routed path from beginning to end, complying with internal ticket work, verifying the device, and accepting a reason for the route to be in existence. More time would be expended by both engineering staff and then management if there was a dispute as to if a rule should be left in place or not. In terms of just the basic work to go through all the established rules that will accumulate over the course of 2 years, a conservative estimate of 25 requests for new rules per week (based on personal experience within a mid-sized company) would yield a total of 2600 new lines to be analyzed. Assuming approximately a third of these rules could be associated together as projects are increased or decreased, that leaves roughly 866 lines that translates into as many employee hours that will be occupied for this task over the course of 108 days. A team of five in the IT department would require just over 21 full working days to effectively handle this task at a cost of $2,898. 75 to have entry level Network Engineers (Salary. com, 2013) dedicated to the task . If a quarter of these rules are disputed, then the company will pay out another $9,964. 70 (Salary. com, 2013) of lost productivity as the IT manager has to contend with other managers to mediate the need for the rules. It is likely that this endeavor would constitute a major departmental project at the end of the 2 years instead of being worked on throughout the duration. During this time, other work will be assigned to secondary status and put projects and perhaps updates that could be critical in risk of being done on time as all energy and focus resides on the access evaluation. Recommended Solutions Bitdefender To effectively control antivirus from a central source that will push updates to all network devices, demand all equipment connecting has antivirus and allow for mobile devices to be used without issue, Bitdefender small business pack would be the ideal choice. Given that this application suite will provide service to all Windows OSs from XP to Windows 8 along with Macintosh and Linux support [ (Squidoo. com, 2012) ], it is perfect for allowing outside vendors who may not conform strictly to the Windows platform adopted by Aircraft Solutions. Support for the product is offered by email, and phone coupled with configuration assistance free of charge. As it was not definitely declared how many employees are with Aircraft Solutions, there is a pricing scale of $449. 95 per year for 20 computers and 20 mobile devices [ (Bitdefender, 2012) ]. AlgoSec Security Management Suite In terms of Access Control List management on the firewalls, industry reviews would recommend a single piece of software, Algosec Security Management Suite. With this application, all a user is required to do is simply enter in the IP of the device wanting entry to the network as well as the IP of the device is wishes to access. Algosec will then compute the path from source to destination, provide a listing of all firewalls in the path, and then list out what changes would need to be made to firewall configuration. With a click of a button, it would even implement these changes thereby freeing an inordinate amount of time on the part of IT staff and management [ (AlgoSec, 2012) ]. Cost of the application is approximately $10,000 [ (AlgoSec, 2013) ] which also include support of the product and updates. Impact on Business Processes Implementation pains felt as both Bitdefender and AlgoSec are introduced will be minimal at best. In each instance, less work will be required of employees as they are no longer responsible for their own antivirus and the process by which firewall flows are drafted and put into configuration will be dramatically increased. The point of contention that might make itself known will be at the onset of these applications being installed as they will require some new policy changes. At first, there will most likely be an uptick in questions asked of IT as employees want to know what is required of them with Bitdefender antivirus. It will also require new policy on the part of IT in terms of management of the application as well as procedures for pushing updates into the network. AlgoSec will be almost entirely without incident as it will create a process by which a request is put in for access and instead of being delayed as the path is verified, it can move directly into managerial oversight for approval. Budget Product| Features| Cost| Bitdefender| Centralized AV updatesScalable user supportInternal firewallIntuitive GUIApplication supportInstallation assistance| $449. 95 per year per set of 20 computers/20 mobile devices| AlgoSec| Firewall path operation automationFirewall configuration change automationNegates access control rule auditsProduct support and updates| $10,000 (approximate quote)| Summary Without changes made to IT policy, requests upon the IT department for access to the network and the bi yearly audit of existing rules will eventually grind all departmental progress to a complete stop for months at a time. Automation in this arena as well as a universal standard for antivirus are dire in maintaining a secure network with the necessary resources to make changes as needed. In the face of company growth, if automation is not embraced, then it will become necessary to increase the IT staff by at least 50% within the next 2 years to simply maintain the status quo. Assuming an employee pool of 100, an investment in Bitdefender and Algosec at this time will cost $12,249. 75, with reoccurring annual fees of $2,249. 75. Such an amount if a far cry from an extensive uptick in staff. The end result will be a far more efficient IT department that will be able to accomplish more sustentative work with existing staff at hand. References AlgoSec. (2012, january). AlgoSec Security Management Suite. Retrieved February 18, 2013, from Algosec. com: http://www. algosec. com/en/products/products_overview AlgoSec. (2013, January). How to Buy. Retrieved February 18, 2013, from algosec.
Wednesday, August 21, 2019
Compare And Contrast Ipv4 And Ipv6
Compare And Contrast Ipv4 And Ipv6 Before we discuss about how the IP works at the network layer to provide connectionless, best effort service to the upper layers, we should understand what the role of IP is. To help us more understand about the question. Below are a few explanation of the important role in the question. The Internet Protocol (IP) IP is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP, while the connectionless service is provided by IP version 4. IP version 4 is just design with limited lower overhead to ensure it deliver speed. The Network Layer -It is the 3rd layer of the seven-layer OSI model of computer networking. The network layer responds to service requests from the transport layer and issues service requests to the data link layer. Upper layer The last 3 layers of the OSI model, Session, Presentation and Application layer are referred to the Upper layers. These layers are responsible for applications communicating between hosts. None of the upper layers know anything about networking or network addresses. Connectionless/Best effort Service communication between two network end-user in which a message can be sent from sender to receiver without knowing of the receiver. The Internetwork Protocol (IP) provides a best effort network layer service for connecting computers to form a computer network. Each computer is identified by one or more globally unique IP address. The network layer PDUs are known as either packets or datagram. Each packet carries the IP address of the sending computer and also the address of the intended recipient or recipients of the packet. Other management information is also carried. The IP network service transmits datagrams between intermediate nodes using IP routers. The routers themselves are simple; since no information is stored concerning the datagrams which are forwarded on a link. The most complex part of an IP router is concerned with determining the optimum link to use to reach each destination in a network. This process is known as routing. Although this process is computationally intensive, it is only performed at periodic intervals. An IP network normally uses a dynamic routing protocol to find alternate routes whenever a link becomes unavailable. This provides considerable robustness from the failure of either links or routers, but does not guarantee reliable delivery. Some applications are happy with this basic service and use a simple transport protocol known as the User Datagram Protocol (UDP) to access this best effort service. Internet Protocol provides in Version 4 (IPv4) is to ensure that the IP packet header is error-free through computation of a checksum at the routing nodes. This has the side-effect of discarding packets with bad headers on the spot, and cause the lost of data packet. The design of internet protocol is one of the reason cause connectionless services. It assumes that the network infrastructure is inherently unreliable at any single network element or transmission medium and that it is dynamic in terms of availability of links and nodes. Without any central monitoring or performance measurement facility exists that tracks or maintains the state of the network. So in order to easy the work, the intelligence in the network is purposely mostly located in the end nodes of each data transmission. Because of it, the network only can provide the best transmission and it was call the best-effort protocol. Advantages: They are stateless having no previously defined protocol. It is easily accessible. Fast deliver Speed Disadvantages: The lack of reliability allows any of the following fault events to occur: data corruption lost data packets duplicate arrival out-of-order packet delivery The primary goal of IP is to provide the basic algorithm for transfer of data to and from a network. In order to achieve this, it implements two functions: addressing and fragmentation. It provides a connectionless delivery service for the upper-layer protocols. This means that IP does not set up a session (a virtual link) between the transmitting station and the receiving station prior to submitting the data to the receiving station. It encapsulates the data handed to it and delivers it on a best-effort basis. IP does not inform the sender or receiver of the status of the packet; it merely attempts to deliver the packet and will not make up for the faults encountered in this attempt. This means that if the data link fails or incurs a recoverable error, the IP layer will not inform anyone. It tried to deliver (addressed) a message until failed. IP submits a properly formatted data packet to the destination station and does not expect a status response. Because IP is a connectionless protocol, IP may receive and deliver the data (data sent to the transport layer in the receiving station) in the wrong order from which it was sent, or it may duplicate the data. Again, it is up to the higher-layer protocols (layer 4 and above) to provide error recovery procedures. IP is part of the network delivery system. It accepts data and formats it for transmission to the data link layer. (Remember, the data link layer provides the access methods to transmit and receive data from the attached cable plant.) IP also retrieves data from the data link and presents it to the requesting upper layer (Naugle, 1999). Compare and contrast IPv4 and IPv6. Justify your answer. There are two version of the internet protocol are implemented in the network layer today, which is Internet Protocol version 4(IPv4) and Internet Protocol version 6(IPv6). Today, most the internet are still implement the IPv4 but some of the internet are already move to IPv6, which is the newest version of the internet protocol. He also said that the Internet Protocol version 5(IPv5) is for experimental purpose, not for deployment purpose (White, 2009, p.348). There are differences between the current of IPv4 and IPv6. The main difference between the IPv4 and IPv6 is the addressing of the IPv4 and IPv6 that provided. White (2009, p.348) elaborate that there have only 32-bit addresses that used by IPv4, which means only support until 32-bit of the IP address that provide by IPv4. Forouzan (2007, p.549) argues with White that the IPv4 is 32-bit address, which mean the IPv4 address are unique, means the address are only one and universally when the connection between the source and destination. Forouzan also stated that the two devices cannot have the same internet protocol (IP) addresses when the connections are established between the source and destination. For example, if the source or destination at the network layer has m connections to the Internet, it will require having m address. In IPv6, there have 128-bits long address that provided by IPv6 compare to IPv4, which consist of 32-bits address, means that the IPv6 address consist 4 times to IPv4 address! Another difference between the current of IPv4 and IPv6 is the notation of the address that shown by the IPv4 and IPv6. Currently, the IPv4 addresses are being show as 32 bits in binary notation, which is support 1 and 0 only. 1 is represent hostid and 0 is represent netid, and also computer only can understand the language which the human cannot understand. Each 8 bits are representing 1 octet, mean the 1 octet are consist of 1 byte. That why IPv4 are only support to 32-bit of address or 4-byte address. The following to show the example of the IPv4 address in binary notations: 01110101 10010101 00011101 00000010 In order to make the human can understand and read the binary notation, the internet are converted the binary-notation into decimal and separating the byte by using dot. The following to show the example of the IPv4 address in dotted-decimal notation: 117.149.29.2 Refer to the figure 1.0, it represent that both the binary notation and dotted-decimal notation of the IPv4 address. Because each octet are represent 8-bits, the range of each octet are 0 until 255(Forouzan, 2007, p.550). Figure 1.0 Dotted-decimal notation and binary notation for an IPv4 address (Source: http://www.comptechdoc.org/os/linux/manual4/ipdecimal.html). Similar to IPv6, the IP address in IPv6 also represent in binary notation. Only different is the IPv6 are using the hexadecimal colon notation to make the address understandable and readable. Refer to figure 1.1, 128-bit are being divided into 8 sections in the hexadecimal colon notation. Each section has 2 byte and each 2 byte is requiring 4 hexadecimal digits (Forouzan, 2007, p.567). Figure 1.1 IPv6 address in binary and hexadecimal colon notation (Source: http://www.slideshare.net/WayneJonesJnr/ch19-3361671) Another the different between the IPv4 and IPv6 is the IP datagram format that represent by the IPv4 and IPv6. In IPv4, there are 15 fields in the IPv4 packet header. Refer to the figure 1.3, it show that the number of the field, the format of the IPv4. The Version field contains the version of IP, which is version number of the IPv4 is number 4 and ensures the device send the packet through to the internet from source to destination implement the appropriate various field. The Intermediate Header Length (IHL) specifies the size of the packet header, which the multiples of 32-bit words. If the options require in the datagram, it will require filling the padding bytes with unusual multiple of 32 bit. The Type of Service (TOS) fields allow the process to determine the precedence, which is relative priority of the application data and preferred attributes associated the following path. The Total Length (TL) or Packet Length (PL) field will display the whole packet size, including byte of header and data (Halsall, 2005, p.322). The Flags field consist three control flags, which is reserved control flags, Dont Fragment control flags and More Fragment control flags. Two control frags, which are Dont Fragment control flags and More Fragment control flags, use to control the fragmentation (The TCP/IP Guide, 2005). The Time-to-Live (TTL) field is to indicate the maximum the packet can be transmitted through the Internet. When the packet passes through the router, the TTL will decrement the number of transit of the packet remaining by one hop. When the TTL become 0, the packet will be discarded by the router. The Protocol field is enables the Network layer to pass the data to the correct upper layer protocol. The Header Checksum field is to identify the error at packet header. It also applied to protect from packet corruption during the transmission of the network. The Source Address and Destination Address field is containing the address where the packets send or comes from (Halsall, 2005, p.324). There are 5 fields in the options fields, which is copied fields, option class fields, option number, option length and option data. An option field is make all fragments of fragmented packets will save into the option if the option is being set by 1. Option class is define as a common option category, which 0 is represent control option and 2 is represent debugging and measurement option. The 1 and 3 is for reservation(Wikipedia,2010). Figure 1.3 IPv4 datagram/packet format and header fields (TCP/IP Guide, 2005) In IPv6, there are only 9 fields in the IPv6 packet header, means that the IPv6 field has been simplified compare to the IPv4, contains 15 fields, as shown in figure 1.4. The Version field contains the version of IP, which is version number of the IPv6 is number 6 and ensures the device send the packet through to the internet from source to destination implement the appropriate various field (TCP/IP Guide, 2005). The Traffic Class field is similar function as TOS in IPv4, which is allow the process to determine the different priority of the application data and preferred attributes associated the following path (Akashah, 2006). The Flow Label field is provided the additional support datagram delivery and quality of service (QOS) features with creating a large field. The Payload Length field is does not like the TL field from the IPv4, which is display whole size of packet but only display the payload byte number. The length of the extension header would be counted if the extension header will be included, means including the Hop-by-Hop Option, Routing, Fragment, Encapsulating Security Payload (ESP), Authentication Header (AH) and Destination Option. The Next Header field is to determine the first extension header of the next header in the datagram if the datagram contain the extension header. If the datagram contain only the main header and does not contain the extension headers, it will function as the IPv4 Protocol field. It also contain the same value, which the IPv6 version of the common protocol use though the new number. The Hop Limit (HL) field is similar function as TTL from the IPv4 field, which is remaining life of packet travel through the internet before discarded by the router while become 0. The purpose of the HL is preventing the packet infinite loop at internetwork. Before the packet send to the destination, the sending host will set the HL value. When the packets pass through the router, the router will decrease the HL value by 1 and until become 0, the packet will be discarded. The Source Address and Destination Address is similar function as the Source Address and Destination Address from the IPv4 field, which Source Address is contain the address where the packet are comes from. The Destination Address is contain the address that where the packet send to. Figure 1.4 IPv6 datagram/packet format and header fields (TCP/IP Guide, 2005) Section 2 Introduction of the chosen game. The three games that we choose is Peter Packet. Peter Packet is the education game represents the how the packets deliver through the internet. These games also represent how the packet can avoid from attacking virus and hackers. This game also can learn the lesson while the players play this game. How to play the chosen game? You may print screen the layout to support your reports. Here we have the instruction how to play the Peter Packet this game. This is Peter Packet. He is responsible to deliver the life packet through the internet. Figure 2.0 The screenshot is represent which difficulties you want to choose. Before you want to play this game, first you want to choose the difficulties of the game as show in figure 2.0. Figure 2.1 The screenshot is show which destination you want to choose After we choose the difficulties, then we choose which destination we want to proceed as shown in figure 2.1. This bar is show that the health status of the character.After we choose our destination we want, then we will show you the instruction how to play this game. Click the skip button to skip this section. The bar is show you that how many mission remaining you want to complete. Click the character if you want learn more about it. Press the back button if you want proceed to next section. Press the back button if you want back to previous section. Press the help button if you want to learn the tutorial again. Press the mute button if you want to silent or you want the sound. Figure 2.2 Speed up the character by using mouse right or press the right arrow Figure 2.2 is show that if you want speed up the character you must press the right arrow or move the mouse to your right. Figure 2.3 Slow down the character by pressing left arrow or move the mouse left The figure 2.3 is show that if you want to slow down the character, you must press the left arrow or moves the mouse to left. Get the encryption shields to protect from being caught Figure 2.4 Get the encryption shields that protect from caught by Hackers. Figure 2.4 shows that if you want get rid from the Hackers; you must to get the encryption shields to protect the character. Otherwise you will jump up by using up arrow or move up mouse to avoid being caught. Same as the virus, if you want to kill the virus, you must get the antivirus spray Figure 2.5 double click or pressing the up arrow twice if you want the character adds a flip. Figure 2.5 shows that if you jump not enough high, you can apply the flip for the character by pressing the arrow twice or double click. What are the benefits of playing this game to each of your groups member? Share your experiences and justifications. Leong Yun Siong The Benefit that I gain from playing this game is know how the internet play role important are, how the packet pass through the internet and the world started to emphasis the education, especially the women and the children from hardcore poor family and the personal hygiene. I also know how the router chooses the faster path of the network and also know how the electromagnet interference will interrupt the packet will cause the network congestion. I also know how the packet segmenting and reassembling. Phang Won Meng The Peter Packet is a funny game which contains a lot of useful information. By playing this game, we can understand there are many obstructers like hacker, Viruses and Route disruptions may occur when the packet are under the deliver. The game also provides and friendly user interface design with meaningful explanations and introduction to let player can learn more efficiency when playing the game. Inside the story of Peter Packet, Users can also find a lot of extra information like can learn information about social and environmental challenges in 3 countries that are Zimbabwe, Haiti and India in the developing world. Inside the story of Peter Packet, Users can also find a lot of extra information like that many people have died of AIDS and been exposed to HIV in Zimbabwe. Peter has the mission of helping to spread the word about this disease and get international aid. Players learn about the problems of lack access to clean drinking water in Haiti caused by years of environmental degradation from the harmful practice of intensive clear-cutting of trees, resulting in pollution and saltwater contamination. This useful information will help increase users knowledge and improve his moral.
Tuesday, August 20, 2019
Climate Change Impact On Marine Ecosystems Environmental Sciences Essay
Climate Change Impact On Marine Ecosystems Environmental Sciences Essay INTRODUCTION:- Extended periods of summers or winters, unusual rains, extreme droughts or floods and many more natural calamities that human started experiencing is depicting one phenomenon: Climate Change. Climate of any region refers to averaged weather over a period of 30 years or more and climate change refers to a significant and lasting change in the statistical distribution of weather patterns, over a period ranging from decades to million. According to IPCC, climate change refers to a change in the state of the climate that can be identified by changes in the mean and/or the variability of its properties and that persists for an extended period, typically decades or longer, this could be naturally or can be caused by the anthropogenic agents. However United Nations Framework Convention on Climate Change (UNFCCC) considers only those changes which are in addition to the natural climate variability observed over comparable time periods and are attributed directly or indirectly to human activi ty that alters the composition of the global atmosphere. Within the past 100 years global temperature has increased approximately 0.6 à °C, and is projected to rise by 2 to 4 à °C by the end of this century (IPCC 2007). This increase in earth surface temperature cause glaciers shrinkage, melting of ice, sea level rise, changes of large ocean currents, shifts in the rainfall, evaporation and runoff pattern and thus affecting regional weather system and considerably influencing human and other life forms. Carbon dioxide is considered to be the main causative force attributing to climate change along with other greenhouse gases like methane, nitrogen oxide etc., which induces the warming of earth surface. Climate change is the biggest global challenge before mankind and fisheries is one of the sector which seems to be under imminent threat as alteration in water flow, fluctuation in water temperature and alteration in water quality influences the metabolic rate which regulates the important activities like feeding, digestion, growth rate, maturation, breeding and survival of fish. According to Natural Resource Defence Council (NRDC) global warming lead to disappearance of Salmon and Trout as much as 18 to 38 per cent of their habitat by the year 2090. And India having a vast coast line (8129 kms) is highly vulnerable to effects brought about by climate change and the rise in sea level can cause an ecological disaster (UNEP, 1989). This articles deal with enlisting some of the major impacts climate change will have on marine fisheries. Impact on physical environments As the temperature is increasing, the oceans are warming, but with geographical differences and some decadal variability. Global average sea level has been rising since 1961, but the rate has been accelerated since 1993. Higher frequency and intensity climate processes, such as El Nià ±o-Southern Oscillation (ENSO), and decadal-scale regime shifts, are expected to continue, with possible increases in their intensity or/and frequency in coming decades. Warming is more intense in surface waters but is not exclusive to these, with the Atlantic showing particularly clear signs of deep warming. Changes in ocean salinity have been observed, with increasing in salinity in near-surface waters in the more evaporative regions near to equator, and high latitudes showing decreasing salinity due to greater precipitation, higher runoff, melting ice and advection. The oceans are also becoming more acidic, with likely negative consequences to many coral reef and calcium-bearing organisms. Although there are no clearly discernible net changes in ocean upwelling patterns, there are indications that their seasonality may be affected. It is very likely that over the short term (within a few years), there will be negative impacts on the physiology of fish in localities where temperature increases, through limiting oxygen transport. Impact on biological functions and fish stocks Although large regional differences exist, especially at regional scales, most models predict a slight decrease in primary production in the seas and oceans and many models predict composition shifts to smaller phytoplankton which are likely to lead to changes in food webs in general. Changes in fish distributions in response to climate variations have been observed, generally consisting of pole ward expansions of warmer-water species and pole ward contractions of colder-water species. Changes are likely to affect pelagic species more rapidly than other species groups. Some examples of responses to climate change by different marine species are discernible in the Indian seas. (1) Until 1985, almost the entire catch of Oil sardine and Indian mackerel was from the Malabar upwelling zone and the catch was either very low or there was no catch from latitudes north of 14 à °N. In the last two decades, however, the catches from latitude 14 à °N to 20 à °N are increasing which shows an e xtension of distributional boundary and a positive correlation was found between the catches and sea surface temperature (SST). (2) During 1970-2007, the catches of Catfish from southwest and southeast coasts decreased. On the other hand, the catches from the northwest and northeast coasts increased during the same period. It shows the strong negative correlation between catfish catch and SST along the two southern coasts and positive correlation between catch and SST along the northern coasts and hence a good example of shift in latitudinal distribution and abundance (3) During 1985-1989, only 2% of mackerel catch was from bottom trawlers, and the rest of the catch was contributed by pelagic gear such as drift gillnet where as in 2003-2010, 15% of mackerel catch is contributed by bottom trawlers along the Indian coast which shows a shift in the depth of occurrence of mackerels. The Indian trawlers operate at a depth ranging from 20m to 80m by employing high opening trawlers. As the surface waters are also warming up, it appears that the mackerel, being a tropical fish, has extended its vertical boundary to deeper waters. (4) data on the number of female spawners of threadfin breams Nemipterus japonicus and N. mesoprion collected every month off Chennai (south-east coast of India) from 1981 to 2010 indicated a trend in the shifting of spawning season from warmer (April September) to cooler months (October March) was discernible. Impact on fishers and fishermen communities Other than the direct impact of climate change on the present day human life, there are a lot of indirect impacts which adversely affects the fisher which are as varied as the climate change themselves. Impacts would be felt through changes in capture, production and marketing costs, changes in sales prices, and possible increase in risks of damage or loss of infrastructure, fishing tools and housing. Fishery-dependent communities may also face increased vulnerability in terms of less stable livelihoods, decreases in availability or quality of fish for food, and safety risks due to fishing in harsher weather conditions and further from their landing sites. Within communities and households, existing gender issues related to differentiated access to resources and occupational change in markets, distribution and processing, where women currently play a significant role, may be heightened under conditions of stress and increased competition for resources and jobs stemming from climate c hange. Communities located in deltas, coral atolls and ice dominated coasts will also be particularly vulnerable to sea level rise and associated risks of flooding, saline intrusion and coastal erosion. Coastal communities and small island states without proper extreme weather adaptation programmes, in terms of infrastructure design, early warning systems and knowledge of appropriate behaviour, will also be at high risk. Salination of the agricultural fields due to seawater intrusion is negatively impacting the agriculture field, however this leads to taking aquaculture as major adaptive measure and thus adaptive role as an alternative livelihood, compensating for income and some aspects of food supply. Impact on Coral reef ecosystems Risks to coral reefs are not distributed equally. Three different time scales can be identified for climate change-related impacts to coral reef systems: years: increased temperature effects on coral bleaching; decades: increasing acidification and dissolution of carbonate structures of reefs; multidecades: weakening of structural integrity of reefs and increasing susceptibility to storms and erosion events. Increasing acidity (decreasing pH) is a significant and pervasive longer-term threat to coral reefs. Potential for coral reef systems to adapt to these environmental stresses is uncertain: symbiotic zooxanthellae may adapt to be more tolerant of high temperature whereas migration of corals to higher latitudes is unlikely. These declines in corals will have negative impacts on reef fish biodiversity along with the putting pressure on the integrity of the eco-system. Positive Impacts of climate change Some of the positive impacts includes Increased food conversion efficiencies growth rates due to warmer waters; Increased primary production would provide more food for filter-feeding invertebrates; Increased length of the growing season range expansions to pole wards due to decrease in ice; Sea level rise also has the potential to flood coastal land areas, mangrove and sea grass regions which may supply seed stock for aquaculture species. Shortened duration of larval cycles can also help in the availability of seeds. Potential adaptation measures in fisheries A wide range of adaptations is possible, either carried out in anticipation of future effects or in response to impacts once they have occurred. In general, responses to direct impacts of extreme events on fisheries infrastructure and communities are likely to be more effective if they are anticipatory, as part of long-term integrated management planning. However, preparation should be commensurate with risk, as excessive protective measures could themselves have negative social and economic impacts. Examples of potential adaptation measures in fisheries Impact of climate change on fisheries Potential adaptation measures Reduced yield Access higher value markets/ shifting targeted species. Increase effort or fishing power. Reduce costs to increase efficiency. Diversify livelihoods. Exit the fishery. Increased variability of yield Diversify livelihood. Design insurance schemes. Change in distribution of fisheries Migration of fishing effort/strategies and processing/distribution facilities. Reduced profitability Exit the fishery. Vulnerability of infrastructure and communities to flooding, sea level and surges Add new or improved physical defences. Managed retreat/accommodation. Rehabilitate infrastructure, design disaster response. Integrated coastal management. Set up early warning systems. Education. Increased dangers of fishing Set up weather warning system. Invest in improved vessel stability/safety/ communications. Influx of new fishers Support existing local management institutions, diversify livelihoods. Potential adaptation measures in post-harvest, distribution and markets Both capture fisheries and aquaculture feed into diverse and spatially extensive networks of supply and trade that connect production with consumers, adding significant value and generating important levels of employment. To some extent, this system can be used to provide an important mediation and buffering function to increasing variability in supply and source location, but direct impacts will also affect its ability to do so. A range of issues and adaptation measures can be considered. Table: Climate change-related impacts potential adaptation in post-harvest/distribution Impact on post harvest, distribution/markets Potential adaptation measures Reduced or more variable yields, supply timing Source products more widely, change species, add value, reduce losses Develop more flexible location strategies to access materials Improve communications and distribution systems Reduce costs to increase efficiency Diversify livelihoods Temperature, precipitation, other effects on post- harvest processes Change or improve processes and technologies Improve forecasting, information Vulnerability of infrastructure and communities to extreme events Add new or improved physical defences, accommodation to change Rehabilitate infrastructure, design disaster response Set up early warning systems, education Trade and market shocks Diversify markets and products Provide information services for anticipation of price or market shocks Management and institutional adaptations Ecosystem approaches to fisheries (EAF) and to aquaculture (EAA) that embed precautionary approach applications within integrated management (IM) across all sectors have the potential to increase ecosystem and community resilience and provide valuable frameworks for dealing with climate change. This would create flexible management systems and support decision-making under uncertainty. Where aquaculture could be used for adaptation in other sectors, planning would be required at appropriate system and management scales, such as watersheds, and estuaries. These approaches would serve to provide guidance in understanding and minimizing perverse incentives that lead to overcapacity, overfishing, excessive environmental impact and other harmful practices while, at the same time, defining positive incentives to meet sustainable development goals. Well defined sectoral performance criteria need to be set out to bring climate change threats, risks and potential adaptations within normal management practice. Public and private sector linkages and partnerships will be essential in developing efficient and effective responses. Market demands will be key mechanisms in supporting adaptation, and their impacts on equity among suppliers, intermediaries and consumers will need to be recognized and applied. Thus certification systems, including sustainability, organic, fair-trade and other criteria will need to be addressed more carefully in the context of climate change, and consider the potential for more vulnerable groups to take advantage of economic opportunity. Adaptation will need to contain strong mechanisms for equity, as increased competition may reduce access for poorer people and other vulnerable groups to production, employment and consumption. For the global issue of the climate change we can contribute through some of the goals which are given below: raising awareness of the impacts of climate change, to ensure that the special risks to the fishery sector are understood and used to plan national climate change responses, including setting of mitigation targets through mechanisms such as the Kyoto Protocol; reducing fuel subsidies granted to fishing fleets, to encourage energy efficiency and assist towards reducing overcapitalization in fisheries; supporting the use of static-gear pots, traps, longlines and gillnets, which uses less fuel than active gear such as trawls and seines and therefore emits less CO2; restoring mangroves and protecting coral reefs, which will contribute to CO2 absorption, coastal protection, fisheries and livelihoods; managing aquaculture to optimize carbon retention, reduce energy use and minimize impacts on mangroves and other important habitats; and Raising awareness through seafood campaigns, reducing food miles, and promoting corporate social responsibility in the commercial sector. promoting research on short- and medium-term climate change impacts to support the identification of vulnerability hot spots and the development of adaptation and mitigation strategies, including financing and risk reduction mechanisms aimed at enabling integrated and broader national planning; addressing other issues contributing to vulnerability of the sectors communities, such as access to markets and services, political representation and improved governance; and Engaging in long-term adaptation planning, including promotion of fisheries- and aquaculture related climate issues in Poverty Reduction Strategy Papers and National Adaptation Programs of Action, to address longer-term trends or potential large-scale shifts in resources or ecosystems.
Monday, August 19, 2019
THE DISCURSIVE DEFICIT :: Essays Papers
THE "DISCURSIVE DEFICIT" Moravcsik and the European Union ââ¬Å"Sidentropââ¬â¢s most fundamental errorââ¬âone he shares with many in the European debateââ¬âis his assumption that the EU is a nation-state in the making,â⬠Andrew Moravcsik writes in his ââ¬Å"Despotism In Brussels?â⬠However, Moravcsik makes the same error himself, if a bit more circuitously. In his articles ââ¬Å"Despotism In Brussels?â⬠, ââ¬Å"Federalism in the European Union: Rhetoric and Reality,â⬠and ââ¬Å"In Defense of the ââ¬ËDemocratic Deficitââ¬â¢: Reassessing Legitimacy in the European Union,â⬠Moravcsik denies the existence of a ââ¬Å"democratic deficitâ⬠within the European Union. His claim itself, however, is not legitimate: he attempts to legitimize to the European Union by granting it authority on the basis of state-based democratic standards while simultaneously denying that the EU is, in fact, a democratic entity similar to the modern state. ââ¬Å"The European Union lacks every characteristic that grants a modern European stateâ⬠¦its authority,â⬠Moravcsik states. Yet he asserts that ââ¬Å"constitutional checks and balances, indirect democratic control via national governments, and the increasing powers of the European Parliament are sufficient to assure that the EU policymaking is, in nearly all cases, clean, transparent, effective, and politically responsive to demands of European citizens.â⬠This assertion relies heavily on what is the most salient characteristic of authority in the ââ¬Å"modern European stateâ⬠ââ¬âthe democratic systemââ¬âto make any sense at all, and thus the contradiction in Moravcsikââ¬â¢s argument emerges. In order to examine the intricacies of this contradiction, we shall now analyze the three endemically democratic concepts that Moravcsik claims legitimize EU authority, his assertion that each is not part of a state structure as used by the EU, and his contradictory validation of these concepts by state-employed democratic principles. Constitutional checks and balances. Moravcsik claims that the presence and use of the Treaty of Rome as a ââ¬Å"stable, overarching structure of political authority in Europeâ⬠should dispel Euroskepticsââ¬â¢ fears about the development of a European ââ¬Å"superstate.â⬠He proceeds to assert that while a true Constitution does not (as yet) exist, a relatively firm ââ¬Å"de facto constitution for Europeâ⬠does indeed exist. That ââ¬Å"constitution,â⬠he claims, is characterized by ââ¬Å"a set of substantive fiscal, administrative, legal, and procedural constraints on EU policymakingâ⬠that serve to limit the EU in its policymaking power.
Sunday, August 18, 2019
Diversifying Teaching Styles to Meet the Needs of All Learners Essay
Diversifying Teaching Styles to Meet the Needs of All Learners When researching about education, one often finds a great deal of literature and information about learning styles. Educators spend countless hours studying their students in order to find out how they learn best. All students have needs when it comes to how they learn and educators must be able to meet those needs in order to promote successful learning in their classrooms. This (paper/article) will focus on teaching strategies and how to vary them so that each learning style preference is addressed, therefore increasing the level of achievement of each student and making learning a successful outcome in the classroom. Strategies, or methods of instruction, include the ways in which the content/information is transformed into new learning for the students. The content can be transformed directly from the teacher to the student through lecture, demonstration, drill and questioning, or more indirectly where the teacher's role is to facilitate learning situations through grouping, discovery, inquiry, role-play and simulations (Freiberg, Driscoll, 1996). Wilen, Ishler, Hutchison, and Kindsvatter (2000) stress that building a positive, supportive learning environment is an important goal for all teachers who want their students to succeed in learning. To maintain student interest and achieve higher results, they encourage teachers to use a variety of methods. They suggest four strategies for "generating an academic climate" in the classroom (p. 30): 1) be task oriented and aware of time. Teachers often find themselves in a situation, which limits the amount of time they can spend on a certain topi c. Therefore, it is recommended that teachers try to rema... ..., A. (1996). Universal teaching strategies (2nd ed.). Needham Heights, MA: Allyn & Bacon. Hyman, R.T. (1974). Ways of teaching (2nd ed.). New York: J.B. Lippincott. Mastropieri, M. A., Scruggs, T. E. (1991). Teaching students ways to remember. Cambridge, MA: Brookline Books. Ornstein, A. C. (1995). Teaching theory into practice. Needham Heights, MA: Allyn & Bacon. Plauche-Parker, J. (1989). Instructional strategies for teaching the gifted. Needham Heights, MA; Allyn & Bacon, Inc. Tuckman, B. W. (1991). "Derivation and description of and interpersonal construct model of teaching to help student teachers self-actualize." Paper presented an annual meeting of the American Educational Research Association, Chicago. Wilen, W., Ishler, M., Hutchison, J., Kindsvatter, R. (2000). Dynamics of effective teaching (4th ed.). New York: Addison Wesley Longman Diversifying Teaching Styles to Meet the Needs of All Learners Essay Diversifying Teaching Styles to Meet the Needs of All Learners When researching about education, one often finds a great deal of literature and information about learning styles. Educators spend countless hours studying their students in order to find out how they learn best. All students have needs when it comes to how they learn and educators must be able to meet those needs in order to promote successful learning in their classrooms. This (paper/article) will focus on teaching strategies and how to vary them so that each learning style preference is addressed, therefore increasing the level of achievement of each student and making learning a successful outcome in the classroom. Strategies, or methods of instruction, include the ways in which the content/information is transformed into new learning for the students. The content can be transformed directly from the teacher to the student through lecture, demonstration, drill and questioning, or more indirectly where the teacher's role is to facilitate learning situations through grouping, discovery, inquiry, role-play and simulations (Freiberg, Driscoll, 1996). Wilen, Ishler, Hutchison, and Kindsvatter (2000) stress that building a positive, supportive learning environment is an important goal for all teachers who want their students to succeed in learning. To maintain student interest and achieve higher results, they encourage teachers to use a variety of methods. They suggest four strategies for "generating an academic climate" in the classroom (p. 30): 1) be task oriented and aware of time. Teachers often find themselves in a situation, which limits the amount of time they can spend on a certain topi c. Therefore, it is recommended that teachers try to rema... ..., A. (1996). Universal teaching strategies (2nd ed.). Needham Heights, MA: Allyn & Bacon. Hyman, R.T. (1974). Ways of teaching (2nd ed.). New York: J.B. Lippincott. Mastropieri, M. A., Scruggs, T. E. (1991). Teaching students ways to remember. Cambridge, MA: Brookline Books. Ornstein, A. C. (1995). Teaching theory into practice. Needham Heights, MA: Allyn & Bacon. Plauche-Parker, J. (1989). Instructional strategies for teaching the gifted. Needham Heights, MA; Allyn & Bacon, Inc. Tuckman, B. W. (1991). "Derivation and description of and interpersonal construct model of teaching to help student teachers self-actualize." Paper presented an annual meeting of the American Educational Research Association, Chicago. Wilen, W., Ishler, M., Hutchison, J., Kindsvatter, R. (2000). Dynamics of effective teaching (4th ed.). New York: Addison Wesley Longman
Sam Shepard Essay -- Biography Biographies Essays
Sam Shepard Sam Shepard is a contemporary American playwright and actor whose plays deal with modern social concerns. He was influenced by Beat Generation writers such as Allen Ginsberg who rebelled against a society of economic affluence and social conformity following World War II. Insatiable consumerism became a central trait of postwar life, "driven by the mass media, advertising, and generous loan terms" ("Sam Shepard"). From this atmosphere the Beat Writers came forward to declare their alienation from what they saw as the "creed of suburban conformity in favor of what Ginsberg called ââ¬Ëthe lost America of loveââ¬â¢" ("Sam Shepard"). It was from this generation of writers that Shepard was inspired to address the issues of alienation from society, loss of identity and the deterioration of the family structure. The themes explored by Shepard may be described as "the picture of America torn between the idealistic values and painful realities of a frontier paved over by a parking lot" ("Sam Shepard") . In other words, progress and change are destroying the collective values of America as the former replaces the latter. Having grown up in the 50ââ¬â¢s and 60ââ¬â¢s, a period of social metamorphosis, Shepard must have observed for himself that the apple-pie family of popular culture was far different from the changing face of societyââ¬â¢s real life family whose members struggle for identity and connection. As television presented an idealization of suburban family life, reality suggested otherwise. Shepard is known for his oblique story lines, slightly mysterious characters, and use of surreal elements with images of popular culture ("Sam Shepard"). The majority of his plays deal with the betrayal of the American dream, the search for ... ...iculate enough to compose his thoughts, and Austin does not have the adventurous spirit to survive in the desert. Therefore, they realize their identities are not found in each other. The characters in each of these plays grapple for identity and connection, which Shepard recognizes as true in modern American families. As they assert themselves, family tension is the result and the Brady Bunch dream is only that: a dream. Works Cited Gilman, Richard. Sam Shepard: Seven Plays. Introduction. New York: Bantam Books, 1981. xi-xxvii. "Sam Shepard." Microsoft Encarta Encyclopedia 99. Microsoft Corporation. 1993-1998. Shepard, Sam. Sam Shepard: Seven Plays. New York: Bantam Books, 1981. Williams, Megan. "Nowhere Man and the Twentieth-Century Cowboy: Images of Identity and American History in Sam Shepardââ¬â¢s True West." Modern Drama. 40 (Spring 1997): 57-73.
Saturday, August 17, 2019
Leninââ¬â¢s death in 1924 Essay
12 marker: Explain why; at the time of Leninââ¬â¢s death in 1924 there was no obvious successor to lead The USSR. Leninââ¬â¢s death came as a great shock to many Russians in 1924; he led the October Revolution in 1917 he was seen as father like role to Russians. He had built up a new government and allowed many of his fellow Bolsheviks roles positions in his new Soviet State, and these figures all thought that they have the power and influence to lead Russia. Lenin knew that he was ill and that he would not be able to keep on making key decisions and attending committee and politburo meetings. He felt that the people in his government saw this as an opportunity to try and assert their power and then after his death have a good chance of becoming the leader of The USSR. He wrote a testament, damning five of the people that held high authority in his new government: Trotsky, Stalin, Bukharin, Zinoviev and Kamenev. If this were to be circulated in the party it would mean that people lower down in the party would be questioning these people too, they might feel that these individuals had too much power. However, these were the leading communists and there did not seem to be any other Bolsheviks that were capable or ready to become a leader. Lenin called Trotsky ââ¬Ëexcessively self-assuredââ¬â¢ Lenin thought that Trotsky focused too much on himself and not enough on the Russian people. Lenin also called Stalin the other main contender for the role of leader ââ¬Ëtoo rudeââ¬â¢ and stated that he has been placed with too much power within the part as Secretary-General; this has made him quite arrogant. Lenin calls for Russians to remember that although Zinoviev and Kamenev are quite underestimated, that they were not loyal to the October Revolution and therefore not the most trustworthy or loyal. Lenin feels that Bukharin is very intelligent, and would be good at the administration aspect of leadership but not a good enough orator to be seen as a strong leader by the masses. This really set the cat among the pigeons; it showed that Lenin did not have confidence in one single successor, showing negative aspects of all of the possible candidates. Although this was suppressed by Kamenev and Zinoviev from being read at the 23rd party conference, Stalin had the most to lose if this had been read, being very critical of his personality and power. Ultimately, it showed that there was going to be a power struggle, and that there was no obvious successor. Leninââ¬â¢s Testament highlighted some major concerns of his, that there were five possible successors but none of them seemed obvious to go straight to the leadership position. Trotsky was seen as an alternative main candidate, he had a lot of support from the working class in the two main cities, Moscow and Petrograd. He was educated and a brilliant orator, moving crowds of people that came to visit him speak. However, he had many personal weaknesses, he was not liked by a lot of the main decision makers under Lenin, and he needed their support for a leadership position. He did not understand that Russia was an agricultural country and he had to think of the countryââ¬â¢s agriculture as much as its industry. Stalin had many important roles within the communist party, commissar for nationalities, workerââ¬â¢s and peasantââ¬â¢s inspectorate and more. Although he had a vast amount of power within the party he was not seen as being consistent, something a leader should be. Also, he had a tough relationship with Lenin before his death. Bukharin was seen as very clever, but not being Marxist enough, he had been appalled by the bloodshed of the civil war and supported the NEP that had allowed an emergence of a middle class, something the Revolution was against. Also Bukharin did not take any side in arguments within the party, showing Lenin that he maybe was not a committed communist. Zinoviev and Kamenev had not been loyal to the October Revolution in 1917; showing that they would not be the leader that Lenin wanted. Lenin thought that they buckled under pressure and for these two reasons did not allow them on the Russian bureau of Central Committee. These factors reinforce the uncertainty for the role of leader, there were candidates that seemed to be strong like Stalin or Trotsky but they had large weaknesses too. Although, there was a lot of room for possible criticism and backstabbing due to the contenders having weaknesses of their own, in 1921 the ban on factionalism introduced by Lenin stopped the formation of groups within his party and stopped criticism of decisions made within the party. It was a way of trying to make the party seem loyal and was basically a ban on free-speech: Meaning that the candidates would not be able to run for leader by highlighting weaknesses to the party or masses. The five candidates would not be able to campaign. Also, because Leninââ¬â¢s Testament was not published it did not allow the party to make a decision on the leadership, alongside the ban on factions meant that a candidate would just have to seem like a strong runner individually or resort to backstabbing. In conclusion, I believe that by not publishing Leninââ¬â¢s testament, this meant that his personal opinions were not voiced to the party, at the party conference, where hundreds of the most influential communists would have seen that all of the main five candidates had weaknesses and there was not one that Lenin felt was singly good enough to rule the party. He was possibly hinting to a collective government with a coalition between all five, mixing their positive aspects to make a great USSR. Although the ban on factions was important, the Testament would have voiced the weaknesses of the five people in the running for leadership coming straight from Lenin his conclusion would have gained influence from the party that was loyal to him. Therefore, I believe that by not publishing Leninââ¬â¢s testament meant that there was great uncertainty over the role of leader.
Subscribe to:
Posts (Atom)