Monday, December 30, 2019

Analysis Of Kahlo, My Favorite Artist Of All Times

For this assignment I decided to choose this piece of art work because Frida Kahlo is one of my favorite artists of all times. Her art work always spoke to me in many ways. Through her paintings she is letting us feel and acknowledge her experience’s and struggles. While visiting the museum one of my favorite parts was being able to see most of her famous paintings face to face. Being able to see those paintings so close made me admired her work even more. B) In this painting the artist uses the element of line continuously. As we look closer into the artwork we see a variety of lines such as actual and implied lines, Horizontal, vertical and diagonal lines. The lines that are most noticeable are the horizontal, vertical and diagonal lines. Vertical lines mainly come from the different buildings in this painting, buildings such as skyscrapers and churches. Both horizontal and vertical lines are connecting each symbolic symbol in the painting, as this painting mainly consists of different images put together to represent culture, politics and Identity. C) Shapes are flat. If you take a shape and give it three dimensions, it has volume. A three dimensional form has volume. VOLUME can be stimulated in a two-dimensional work such as paintings. In Frida’s painting My Dress Hangs there, we see both three and two dimensional volumes. A perfect example of three- dimensional volume is the image of the Washington monument. The Washington monument is in the center-top of theShow MoreRelatedFilm Analysis : Frida Kahlo s Art1813 Words   |  8 Pagestrue self. This pure expression inspired my own work in many ways. My desire became to create something with duality, as many of her pieces have, and which expressed my sense of self as purely as possible. There were a few challenges I faced, but overall, using Frida Kahlo as inspiration showed me how art connects the conscious to the primary world. The reason I chose Frida Kahlo as inspiration was because of her ability to create herself in a way other artists do not. Kahlo’s art has always been aRead MoreFrida Kahlos Self Portraits1042 Words   |  5 PagesI choose one of Frida Kahlo’s self-portraits â€Å"The broken column†, without any doubt, one of my favorites. The Mexican artist Frida Kahlo was born in Mexico City on Saturday 6th July 1907 and died in the house in the background of this photograph, aged 47, just one week after her birthday, on Tuesday 13th July 1954. For a long time the details of Frida Kahlo’s life and work were generally not well known. They have recently become prominent mainly through the work of the Mexican art historian Hayden

Sunday, December 22, 2019

Summary Of Death Of A Salesman - 3982 Words

Ahmad Maruf â€Å"American Literature and Corporate Culture† Professor Ritzenberg Final Paper Looking for Someone To Blame in the Mirror Arthur Miller s play â€Å"Death of a Salesman† tells the story of a salesman confronting failure in the success-driven society of America and shows the tragic trajectory that eventually leads to his suicide. It addresses a broken family, loss of identity, and a salesman s inability to accept change within himself and society. On the other hand, based on the memoir written by Jordan Belfort, Martin Scorsese’s movie â€Å"Wolf of Wall Street† features Jordan Belfort, the drug-addicted stockbroker who makes millions defrauding investors, laundering money, and manipulating the market. What makes the movie a crucial and troubling document of the present is not so much Jordan s business plan—he tells us repetitively that it s too complicated and uninteresting to explain—as his approach to life. The success of such a sensationalist movie that archives the rise of a reckless, morally questionable, and self-made man reflects a tension of modern American cul ture, making us question traditional values of a good life. It is obvious that both protagonists lead an unhappy, deeply troubled, and broken family life, lacking strong family support system and stability. This is particularly problematic because we often picture the traditional family not only as the socio-economic unit but also as the cradle of human values, nurturing the human spiritShow MoreRelatedDeath of a Salesman Summary + American Dream5929 Words   |  24 PagesAct 1, Scene 1 Miller begins his play with a bedtime dialogue between Willy and his wife, Linda.   Willy, an aging salesman, has just  returned  late from a business  trip.   Linda is very concerned, asking her husband if he had a  car accident.   Willy tiredly explains that indeed he did have a close call with his  car, veering off the road on two  occasionswhile enjoying the scenery.   Though at first Linda thinks that its a problem with the vehicle, eventually she attributes Willys driving problems toRead MoreWilly from Death of a Salesman by Arthur Miller: Abandoned and Flawed798 Words   |  4 Pages The dramatic play Death of a Salesman, composed by Arthur Miller in 1949 portrays the hours leading up to Willy Loman’s death. Willy is a sixty-year-old salesman living in Brooklyn New York with his wife Linda and after thirty-five years working as a traveling salesman he feels defeated by his lack of success and difficult family life. As a salesman, Willy Loman focuses more on personality and being well liked by everyone than actual skills. When he returns early from a business trip it is apparentRead MoreAnalytical Exposition in Response to Literature: Death of a Salesman and The Great Gatsby 976 Words   |  4 PagesThe two texts that this essay will compare and contrast are the novel The Great Gatsby by Scott Fitzgerald and the play Death of a Salesman, written by Arthur Miller. Both works are based around the central topic of ‘the American Dream’ and the unceremonious death of it. However, the journeys that the protagonists take to meet their tragic ends are very different though the motives involved are accused murder and adultery. This essay’s aim is to determine whether the novel or the play best is moreRead MoreAnalysis Of Death Of A Salesman By Arthur Miller1270 Words   |  6 PagesDeath of a Salesman, by Arthur Miller 1245 Words 5 Pages Death of A Salesman, written by Arthur Miller, is a play based on the turmoil within an average American family. Miller wrote Death of A Salesman easily showcasing the elements of drama. I was easily able to follow the plot, identify with his characters, and picture the setting. The main theme of the plot seemed to be Willy reaching for the American Dream. Financial success, business success, outwardly perfect family, revered by your peersRead MoreWilly Loman, the Modern Hero in Arthur Millers Death of a Salesman1739 Words   |  7 Pagestragic hero a common world of mischance.† When analyzing Arthur Miller’s â€Å"Tragedy of the Common Man†, it is easy to see the differentiation between the modern hero and the classic Greek hero. In the first paragraph of his essay, Arthur Miller, in summary, states that the overriding view in tragedies is that commonplace citizens’ lives are so ordinary that they do not seem tragic (Miller 1833). However, Miller disagrees with that point of view, stating in his second paragraph, â€Å"I believe that the commonRead More Death of a Salesman, by Arthur Miller Essay1241 Words   |  5 Pages Death of A Salesman, written by Arthur Miller, is a play based on the turmoil within an average American family. Miller wrote Death of A Salesman easily showcasing the elements of drama. I was easily able to follow the plot, identify with his characters, and picture the setting. The main theme of the plot seemed to be Willy reaching for the American Dream. Financial success, business success, outwardly perfect family, revered by your peers, and in general respected by all. EarlyRead MoreLiterary Analysis: Death of a Salesman Essay1705 Words   |  7 Pagesyou end up worth more dead than alive, (Miller, 98). This quote was spoken by the main character of the Arthur Miller play Death of a Salesman: Willy Loman. This tragedy takes place in Connecticut during the late 1940s. It is the story of a salesman, Willy Loman, and his family’s struggles with the American Dream, betrayal, and abandonment. Willy Loman is a failing salesman recently demoted to commission and unable to pay his bills. He is married to a woman by the name of Linda and has two sonsRead MoreEffectiveness Of Redefining Failure By Julia Baird1263 Words   |  6 PagesRedefining Failure, it is important to note the effectiveness the article has, because of the way the author constr ucts the article. As the author begins her introduction she makes sure to grab her audience with an illustration from the novel, â€Å"Death of Salesman†. She presents her argument by saying that the novel was written 60 years ago. Stating, that because of the difference in society, failure is now viewed completely different than it was before. Furthermore, she explains that the main characterRead MoreComparative Essay; Things Fall Apart1664 Words   |  7 PagesFather-Son Relationships The parent-child relationship plays a large role in various literary works. The novel Things Fall Apart by Chinua Achebe and the play Death of a Salesman by Arthur Miller, both explore the dynamic of many parent-child relationships. Death of a Salesman regarded the troubling relationship that Willy Loman, an unsuccessful Salesman, had with his two children Biff and Happy. Similarly, in Things Fall Apart it described the life of a man named Okonkwo who had much controversy when itRead MoreDeath Of A Salesman By Arthur Miller1216 Words   |  5 PagesArthur Miller’s 1949 creation, Death of a Salesman, is adapted for the small screen by German director Volker Schlà ¶ndorff. This 1985 made-for-television film stars Dustin Hoffman as protagonist William â€Å"Willy† Loman. Kate Reid, John Malkovich, and Stephen Lang round out the Loman family in the roles of Linda, Biff, and Harold Happy, respectively. The film closely follows Miller’s original work as it tells the story of Willy, an overworked and underappreciated salesman, losing his grip on reality and

Saturday, December 14, 2019

Globalization and Perception on War Free Essays

string(36) " different uses of ICTs in warfare\." Globalization and International Organizations Assignment Submitted By A. S. M. We will write a custom essay sample on Globalization and Perception on War or any similar topic only for you Order Now Iqbal Bahar Rana. ID # 103-0007-085 MPPG Programme, North South University Date: 14. 11. 2011 Do you think the advent of information revolution has changed the way war is perceived by the West? If so, what are the implications of such changes for poorly-governed countries of the world? Introduction: The German philosopher Hegel held that revolutions are the locomotive of history. According to his theory, every social, political, and economic system builds up tensions and contradictions over time. Eventually these explode in revolution. One cannot create a revolution in the way that an architect designs a building. Nor is it possible to control revolutions like a conductor leads an orchestra. Revolutions are much too big and complex for that. Those who live in revolutionary times can only make a thousand small decisions and hope that they move history forward in the desired direction. Around the world today we see the growing sophistication and rapid international diffusion of powerful new information technologies, the mergers of huge communication empires, strategic alliances across borders, and the doubling of power and the halving of the price of computing every 18 months (Moore’s Law). The Information Revolution, ethno-political conflicts, globalization — each of these three mega-trends is individually important for all nations’ future; together, they are redefining the global context within which governments and citizens must make daily decisions in the years to come. Thus, their intersection should constitute a central concern of scholars, policy makers, and citizens. In an era of globalization, national security has a different meaning. Nation-states no longer have a monopoly on the means of coercion. Even if nuclear weapons had a deterrent value during the Cold War, today they have none as the causes of insecurity, more often than not, are economic collapse and internecine conflict, and not external aggression. The information age has revolutionized the instrument of soft power and the opportunities to apply them. The ability of a nation to project the appeal of its ideas, ideology, culture, economic model, and social and political institutions and to take advantage of its international business and telecommunications networks will leverage soft power. In simple terms, the information revolution is increasing inter-connectedness and escalating the pace of change in nearly every dimension of life. This, in turn, shapes the evolution of armed conflict. Whether in economics, politics, or war-fighting, those who are able to grasp the magnitude of this will be the best prepared to deal with it. The use of Information and Communication Technologies (ICTs) in warfare scenarios has been of central interest to governments, intelligence agencies, computer scientists and security experts for the past two decades (Arquilla and Ronfeldt 1997; Campen and Dearth 1998; Singer 2009). . ICTs gave rise to the latest revolution in military affairs (RMA) by providing new tools and processes of waging war – like network-centric warfare (NCW), and integrated command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR). This RMA concerns in the premise of military forces, as they have to deal with â€Å"the 5th dimension of warfare, information, in addition to land, sea, air and space†. Classical Perception of War: Clausewitz is under significant challenge. It is clearly alive and well in the military colleges of Western states but outside these corridors other philosophies are in the ascendancy. A debate continues to rage over the extent to which Clausewitzean thinking is still relevant to today’s wars. From today’s vantage point, several developments have eroded the appeal and power of the political philosophy of war. First, the concept of the battlefield, so central to the way in which Clausewitz understood warfare, has dissolved. The 9/11 attacks, for instance, demonstrated that today’s battlegrounds might be Western (or other) cities while the US-led ‘War on Terror’ – now rebranded as the ‘long war’ – conceives of the battlefield as literally spanning the entire globe. In the future, however, battles are unlikely to be confined to planet Earth as the US in particular will be forced to militarize space in an effort to protect the satellites upon which its communication and information systems depend (Hirst 2002). Second, as the speeches of both Osama bin Laden and US President George W. Bush make clear, the leadership cadres on both sides of the ‘War on Terror’ have often rejected political narratives of warfare. Instead, they have adopted eschatological philosophies in their respective rallying cries for a global jihad and a just war against evildoers where ideology played a significant role in waging war. A third problem for advocates of the political philosophy and one which Clausewitz obviously never encountered is war involving information technology. Information technology brings the Finally, when confronted by ‘revolutionary’ wars which cry out for counterrevolutionary responses, Clausewitz’s injunction to destroy the military forces of the adversary is problematic not just because such ‘military forces’ are often indistinguishable from the local populace but also because one can never be sure they have been eliminated ‘unless one is ready to destroy a large portion of the population’ (Rapoport 1968: 53; see also Chapter 26, this volume). As we have seen, it is fair to say, however, that the political philosophy has been the most prominent in the traditionally Anglo-American-dominated field of security studies (on the ethnocentric tendencies of security studies see Booth 1979, Barkawi and Laffey 2006). All that can be said in general terms is that whatever approach to understanding warfare one chooses to adopt will have consequences, leading the analysis in certain directions and forsaking others. Within International Relations and security studies warfare has commonly been defined in ways that highlight its cultural, legal and political dimensions. Information Revolution and information Warfare: ICTs are used in several combat activities, from cyber attacks to the deployment of robotic weapons and the management of communications among the fighting units. Such a wide spectrum of uses makes it difficult to identify the peculiarities of this phenomenon. Help in respect to this will come from considering in more detail the different uses of ICTs in warfare. You read "Globalization and Perception on War" in category "Papers" An attack on the information system called smurf attack is an implementation of distributed denial of service (DDoS) attacks. A DDoS is a cyber attack whose aim is to disrupt the functionality of a computer, a network or a website. This form of attack was deployed in 2007 against institutional Estonian websites, and more recently similar attacks have been launched to block the Internet communication in Burma during the 2010 elections. The use of robotic weapons in the battlefield is another way to use ICTs in warfare. It is a growing phenomenon, coming to widespread public notice with US army, which deployed 150 robotic weapons in Iraq’s war in 2004, culminating in 12,000 robots by 2008. Nowadays, several armies around the world are developing and using tele-operated robotic weapons, they have been deployed in Iraq and Afghanistan, and more sophisticated machines are being used at the borders between Israel and Palestine in the so-called ‘automatic kill zone’. These robots are trusted to detect the presence of potential enemies and to mediate the action of the human soldiers and hence to fire on potential enemy’s targets when these are within the range patrolled by the robots. Several armies also invested their resources to deploy unmanned vehicles, like the MQ-1 predators, which have then been used to hit ground targets, and to develop unmanned combat air vehicles, which are designed to deliver weapons and can potentially act autonomously, like the EADS Barracuda, and the Northrop Grumman X-47B. One of the latest kinds of robotic weapon – SGR-A1 – has been deployed by South Korea to patrol the border with North Korea. This robot has low-light camera and pattern recognition software to distinguish humans from animals or other objects. It also has a color camera, which can locate a target up to 500 meters, and if necessary, can fire its built-in machine gun. Up until now, robotic weapons were tele-operated by militaries sitting miles away from the combat zone. Human were kept in the loop and were the ones who decided whether to shoot the target and to maneuver the robot on the battlefield. The case of SGR-A1 constitutes quite a novelty, as it has an automatic mode, in which it can open fire on the given target without waiting for the human soldier to validate the operation. Finally, the management of communication among the units of an army has been revolutionized radically by the use of ICTs. Communication is a very important aspect of warfare. It concerns the analysis of the enemy’s resources and strategy and the definition of an army’s own tactics on the battlefield. NCW and C4ISR represent a major revolution in this respect. An example of such revolution is the use of iPhone and Android devices. Today, the US army is testing the use of these devices to access intelligence data, display videos made by drones flying over the battlefields, constantly update maps and information on tactics and strategy, and, generally speaking, gather all the necessary information to overwhelm the enemy. Changing Nature of Conflict: States have been resilient in the face of technological change, and despite the increasingly rapid diffusion of information, states still shape the political space within which information flows (Keohane and Nye 1998; Herrera 2004). Yet state power has been diminished too. States have lost much of their control over monetary and fiscal policies, which are often dictated by global markets (Castells 1996, pp. 245, 254). The rapid movement of currency in and out of countries by currency speculators can extract a devastating cost on countries that do not have large currency reserves. States no longer monopolize scientific research. The Internet allows a global scientific community to exchange information on topics that can be easily exploited by terrorist organizations (Castells 1996, p. 125). The Internet has made it impossible for states, dictatorships as well as democracies, to monopolize the truth (Castells 1996, pp. 384, 486-487). Nor can they monopolize strategic information (Keohane and Nye 1998) – the information that confers great advantage only if competitors do not possess it – because states no longer control encryption technologies. Most critically, IT has made the most technologically advanced and powerful societies by traditional indices the most vulnerable to attack. A distinguishing hallmark of the information age is the â€Å"network,† which exploits the accessibility and availability of information, and computational and communicative speed, to organize and disseminate knowledge cheaply and efficiently (Harknett 2003). The strength of the network lies in its degree of connectivity. Connectivity can increase prosperity and military effectiveness, but it also creates vulnerabilities. Information-intensive military organizations are more vulnerable to information warfare because they are more information-dependent, while an adversary need not be information-dependent to disrupt the information lifeline of high-tech forces. Information-dependent societies are also more vulnerable to the infiltration of computer networks, databases, and the media, and to physical as well as cyber attacks on the very linkages upon which modern societies rely to function: communication, financial transaction, transportation, and energy resource networks. The same forces that have weakened states have empowered non-states. The information revolution has diffused and redistributed power to traditionally weaker actors. Terrorists have access to encryption technologies which increase their anonymity and make it difficult for states to disrupt and dismantle their operations. (Zanini and Edwards 2001, pp. 37-8) Global markets and the Internet make it possible to hire criminals, read about the design and dissemination of weapons of mass destruction, and coordinate international money laundering to finance nefarious activities (Kugler and Frost, eds. 001; Castells 2000, pp. 172, 180-182). Terrorists can now communicate with wider audiences and with each other over greater distances, recruit new members, and diffuse and control their operations more widely and from afar. Non-state actors also have increasing access to offensive information warfare capabilities because of their relative cheapness, accessibility and commercial origins (US GAO 1 996; Office of the Under Secretary for Defense for Acquisition and Technology 1996). Globalization, and the information technologies that undergird it, suggest that a small, well-organized group may be able to create the same havoc that was once the purview of states and large organizations with substantial amounts of resources. The availability off-the-shelf commercial technologies benefits smaller states and non-state actors, to be sure, but only the wealthiest and most powerful states will be able to leverage information technology to launch a â€Å"revolution in military affairs. The ability to gather, sort, process, transfer, and disseminate information over a wide geographic area to produce dominant battle space awareness will be a capability reserved for the most powerful (Keohane and Nye 1998). In this respect, information technology continues trends already underway in the evolution of combat that have enhanced the military effectiveness of states. IT makes conventional combat more accurate, thereby improving the efficiency of high explosive attacks. On the other hand, IT also continues trends in warfare that circumvent traditional military forces and which work in favor of weaker states and non-states. Like strategic bombing and counter-value nuclear targeting, efforts to destroy or punish an adversary by bypassing destruction of his armed forces and directly attacking his society, predate the information technology age. Techniques of information warfare provide attackers with a broader array of tools and an ability to target more precisely and by non-lethal means the lifelines upon which advanced societies rely: power grids, phone systems, transportation networks, and airplane guidance systems. Information is not only a means to boost the effectiveness of lethal technologies, but opens up the possibility of non-lethal attacks that can incapacitate, defeat, deter or coerce an adversary, attacks that can be launched by individuals and private groups in addition to professional militaries. Warfare is no longer an activity exclusively the province of the state. Information is something that states, organized for success in the industrial age, do not have a comparative advantage in exploiting. John Arquilla and David Ronfeldt argue that the information revolution is strengthening the network form of organization over hierarchical forms, that non-state actors can organize into networks more easily than traditional hierarchical state actors, and that the master of the network will gain major advantages over hierarchies because hierarchies have a difficult time fighting networks. (Arquilla and Ronfeldt 2001, pp. 1, 15. ) States are run by large hierarchical organizations with clearly delineated structures and functions. By contrast, a more efficient organizational structure for the knowledge economy is the network of operatives, or â€Å"knowledge workers† not bound by geographic location. This is precisely the type of organizational structure being adopted by terrorist groups as they adapt to the information age. There is evidence that adaptation is quicker in flat hierarchies or matrix organizations than it is in the steep pyramidal hierarchies that run the modern nation-state; that flatter networks have a much shorter learning curve than do hierarchically networked organizations (Areieli 2003). The higher the hierarchy, the faster it operates if it is doing something it has already foreseen and thus for which it is prepared. If, on the other hand, a scenario requires the development of new processes that were not foreseen, the flatter organization is better at learning. Matrix organizations are more creative and innovative. According to Castells, the performance of a network depends on two fundamental attributes: â€Å"its connectedness that is its structural ability to facilitate noise-free communication between its components; its onsistency, that is the extent to which there is sharing of interests between the network’s goals and the goals of its components† (Castells 1996, p. 171). On both criteria, large state bureaucracies suffer serious disadvantages. Informal war: Informal war is armed conflict where at least one of the antagonists is a non-state entity such as an insurgent army or ethnic militia. It is the descendent of what became known as low intens ity conflict in the 1980s. Like today, future informal war will be based on some combination of ethnicity, race, regionalism, economics, personality, and ideology. Often ambitious and unscrupulous leaders will use ethnicity, race, and religion to mobilize support for what is essentially a quest for personal power. The objectives in informal war may be autonomy, separation, outright control of the state, a change of policy, control of resources, or, â€Å"justice† as defined by those who use force. Informal war will grow from the culture of violence which has spread around the world in past decades, flowing from endemic conflict, crime, the drug trade, the proliferation of weapons, and the trivialization of violence through popular culture. In many parts of the world, violence has become routine. Whole generations now see it as normal. In this setting, informal war will remain common, in part because of the declining effectiveness of states. Traditionally, governments could preserve internal order by rewarding regions or groups of society which supported the government, punishing those which did not, and, with wise leadership, preempting conflict and violence through economic development. In a globalized economy, the ability of governments to control and manipulate the economy is diminished, thus taking away one of their prime tools for quelling dissent and rewarding support. In regions where the state was inherently weak, many nations have large areas of territory beyond the control of the government. And, as political, economic, and military factors constrain traditional cross border invasion, proxy aggression has become a more attractive strategic option. Regimes unwilling to suffer the sanctions and opprobrium that results from invading one’s neighbors find that supporting the enemies of one’s neighbors is often overlooked. This is not likely to change in coming decades. Finally, the combination of globalization and the Cold War have fueled the growth of an international arms market at the same time that the international drug traffic and the coalescence of international criminal networks have provided sources of income for insurgents, terrorists, and militias. With enough money, anyone can equip a powerful military force. With a willingness to use crime, nearly anyone can generate enough money. Informal war is not only more common than in the past, but also more strategically significant. This is true, in part, because of the rarity of formal war but also because of interconnectedness. What Martin Libicki calls â€Å"the globalization of perception†Ã¢â‚¬â€the ability of people to know what is happening everywhere—means that obscure conflicts can become headline news. There are no backwaters any more. As suffering is broadcast around the world, calls mount for intervention of one sort or the other. Groups engaged in informal war use personal and technological interconnectedness to publicize their cause, building bridges with a web of organizations and institutions. The Zapatista movement in southern Mexico is a model for this process. The Zapatistas, in conjunction with a plethora of left-leaning Latin Americanists and human rights organizations, used of the Internet to build international support with web pages housed on servers at places like the University of California, Swarthmore, and the University of Texas. This electronic coalition-building was so sophisticated that a group of researchers from the RAND Corporation labeled it â€Å"social netwar. Undoubtedly, more organizations will follow this path, blending the expertise of traditional political movements with the cutting-edge advertising and marketing techniques that the information revolution has spawned. A defining feature of the information revolution is that perception matters as much as tangible things. This will certainly hold for informal warfare. Future strategists will find that crafting an â€Å"image assessment† or â€Å"perception map† of a conflict will be a central part of their planning. In failed states, informal war may be symmetric as militias, brigand bands, and warlord armies fight each other. At other times, it may be asymmetric as state militaries, perhaps with outside assistance, fight against insurgents, militias, brigands, or warlord armies. Future insurgents would need to perform the same functions of defense, support, and the pursuit of victory, but will find new ways to do so. In terms of defense, dispersion is likely to be strategic as well as tactical. There will be few sanctuaries for insurgent headquarters in an era of global linkages, pervasive sensor webs, nd standoff weapons, so astute insurgents will spread their command and control apparatus around the world. Information technology will make this feasible. Right wing anti-government theorists in the United States have already developed a concept they call â€Å"leaderless resistance† in which disassociated terrorists work toward a common goal and become aware of each other’s action s through media publicity. The information revolution will provide the opportunity for â€Å"virtual leadership† of insurgencies which do not choose the anarchical path of â€Å"leaderless resistance. The top leadership might never be in the same physical location. The organization itself is likely to be highly decentralized with specialized nodes for key functions like combat operations, terrorism, fund raising, intelligence, and political warfare. In many cases, insurgent networks will themselves be part of a broader global network unified by opposition to the existing political and economic order. Informal war in the coming decades will not represent a total break with its current variants. It will still entail hands on combat, with noncombatants as pawns and victims. Insurgents, militias, and other organizations which use it will seek ways to raise the costs of conflict for state forces. Gray Area War: As the Cold War ended defense analysts like Max G. Manwaring noted the rising danger from â€Å"gray area phenomena† that combined elements of traditional war-fighting with those of organized crime. Gray area war is likely to increase in strategic significance in the early decades of the 21st century. To an extent, this is a return to historical normalcy after the abnormality of the Cold War. Today, gray area threats are increasing in strategic significance. Information technology, with its tendency to disperse information, shift advantages to flexible, networked organizations, and facilitate the creation of alliances or coalitions, has made gray area enemies more dangerous than in the past. For small or weak countries, the challenge is particularly dire. Not only are their security forces and intelligence communities less proficient, but the potential impact of gray area threats is amplified by the need to attract outside capital. In this era of globalization and interconnectedness, prosperity and stability within a state are contingent on capital inflows. Except in nations that possess one of the very rare high-payoff natural resources like petroleum, capital inflows require stability and security. In places like Colombia, South Africa, Central Asia, and the Caucuses, foreign investment is diminished by criminal activity and the insecurity it spawns. This makes gray area threats a serious security challenge. Gray area war involves an enemy or a network of enemies that seeks primarily profit, but which has political overtones and a substantially greater capability for strategic planning and the conduct of armed conflict than traditional criminal groups. Like future insurgents, future networked gray area enemies may have nodes that are purely political, some political elements that use informal war, and other components that are purely criminal. This greatly complicates the task of security forces that must deal with them. Because gray area enemies fall in between the realm of national security and law enforcement, the security forces that confront them must also be a â€Å"gray† blend of the military and the police. Like the military, security forces must have substantial fire power (both traditional and informational), and the ability to approach problems. But these security forces also must have characteristics of law enforcement, working within legal procedures and respecting legal rights. Even though the objective will be monetary rather than purely political, violence will be goal-oriented. Astrategic gray area war will consist primarily of turf battles between armed gangs or militias. It may be related to refugee movements, ethnic conflict, ecological degradation, or struggles for political power (as in Jamaica in the 1990s, where political parties used street gangs to augment their influence). When astrategic gray area war is linked to struggles for political power, the armed forces (such as they are) will be serving as mercenaries only partially controlled by their paymasters, rather than armed units under the actual command of political authorities. Strategic Information warfare: Formal, informal, and gray area war are all logical extensions of existing types. Technology, though, could force or allow more radical change in the conduct of armed conflict. For instance, information may become an actual weapon rather than simply a tool that supports traditional kinetic weapons. Future war may see attacks via computer viruses, worms, logic bombs, and trojan horses rather than bullets, bombs, and missiles. This is simply the latest version of an idea with recent antecedents in military history. Today strategic information warfare remains simply a concept or theory. The technology to wage it does not exist. Even if it did, strategists cannot be certain strategic information warfare would have the intended psychological effect. Would the destruction of a state’s infrastructure truly cause psychological collapse? Would the failure of banking, commercial, and transportation systems crush the will of a people or steel it? But until infrastructure warfare is proven ineffective, states and non-state actors which have the capacity to attempt it probably will, doing so because it appears potentially effective and less risky than other forms of armed conflict. Future infrastructure war could take two forms. In one version, strategic information attacks would be used to prepare for or support conventional military operations to weaken an enemy’s ability to mobilize or deploy force. The second possible form would be â€Å"stand alone† strategic information warfare. This might take the form of a sustained campaign designed for decisive victory or, more likely, as a series of raids designed to punish or coerce an enemy But should cyber-attacks, whether as part of strategic information warfare or as terrorism, become common, the traditional advantage large and rich states hold in armed conflict might erode. Cyber-attacks require much less expensive equipment than traditional ones. The necessary skills exist in the civilian information technology world. One of the things that made nation-states the most effective organizations for waging industrial age war was the expense of troops, equipment and supplies. Conventional industrial-age war was expensive and wasteful. Only organizations that could mobilize large amounts of money flesh, and material could succeed at it. But if it becomes possible to wage war using a handful of computers with internet connections, a vast array of organizations may choose to join the fray. Non-state organizations could be as effective as states. Private entities might be able to match state armed forces. While substantial movement is underway on the defense of national information infrastructure, offensive information warfare is more controversial. Following the 1999 air campaign against Serbia, there were reports that the United States had used offensive information warfare and thus â€Å"triggered a super-weapon that catapulted the country into a military era that could forever alter the ways of war and the march of history. According to this story, the U. S. military targeted Serbia’s command and control network and telephone system. The Future Battlefield: The information revolution is transforming warfare. No longer will massive dug-in Armies, armadas and Air Forces fight bloody attritional battles. Instead, small highly mobile forces, armed with real time information from satellites and terrestrially deployed battlefield sensors, will strike with lighteni ng speed at unexpected locations. On the battlefield of the future, enemy forces will be, located, tracked and targetted almost instantaneously through the use of: * Sensors and their fusion with a view to presenting an integrated highly reliable intelligence picture in real time. * Surveillance devices that unceasingly seek and shadow the enemy. * Data-links and computer-generated battle picture, task tables and â€Å"maps that change scale and overlay differing types of information in response to voice requests. † * Automated fire control, with first round kill probabilities approaching near certainty. Simulation, visualization and virtually in planning, and testing concepts and weapon effectiveness. This would balance out the need for large forces to overwhelm the opponent physically. Control function will be decentralized and shared at all levels of command. Combat will be in tandem to intelligence gathering. Non-lethal, soft-kill electronic weapons will assume as much importance as highly lethal, hard-kil l weapons. Intelligent command posts and paperless headquarters will be the form. A Commander will be of a different breed-priding more in his lap-top than his baton. He will be his own staff officer. Changing Perception of War and its implications on poorly governed country: The idea that weak states can compromise security — most obviously by providing havens for terrorists but also by incubating organized crime, spurring waves of migrants, and undermining global efforts to control environmental threats and disease — is no longer much contested. –Washington Post, June 9. 2004 A majority of states in the contemporary security environment can be classified as weak. These states exhibit a limited ability to control their own territories because, in part, they do not have a monopoly on the use of force within their borders. They also struggle to provide security or deliver major services to large segments of their populations. These vulnerabilities generate security predicaments that propel weak regimes—both democratic and authoritarian—to act in opportunistic ways. Because they lack conventional capabilities, out of necessity, weak states will have to be opportunistic in their use of the limited instruments they have available for security and survival. The threat of information warfare should be understood within a broad vision of global power that is based on an up-dated version of Mao Zedong’s theory of the ‘Three Worlds’. Just as Mao believed that the world was divided into three tiers of states, with the superpowers at the top, the developed states in the middle and the developing states at the bottom, in the information age is also supposed to be three types of state. At the top of the pile is the ‘information hegemony state’, asserting its control by dominating the telecommunications infrastructure, software development, and by reaping profits from the use of information and the Internet. After this comes the ‘information sovereign state’, exemplified by those European states that have accumulated sufficient know-how to exert independent control over their information resources and derive profits from them, and to protect themselves from information hegemony. At the bottom of the pile are the ‘information colonial and semi-colonial states’, which have no choice but to accept the information that is forced on them by other states. They are thus left vulnerable to exploitation because they lack the means to protect themselves from hegemonic power. In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. The significance of asymmetric warfare, in both civilian and military realms become such an important subject for study to provide answers to key questions, such as how weaker opponents apply asymmetric techniques against the Western world, and shows how the West military superiority can be seriously undermined by asymmetric threats. Conclusion: It is said that nothing is permanent except change. This is particularly true in the information age. It is important to understand the nature of the new world information order in order to be effective in foreign policy initiatives and to conduct the international relations. The information revolution throws up various contradictory phenomena. It includes the strengthening of the forces of anarchy and control. The revolution empowers individuals and elites. It breaks down hierarchies and creates new power structures. It offers more choices and too many choices, greater insight and more fog. It reduces the risk to soldiers in warfare and vastly increases the cost of conflict. It can lead to supremacy of the possessors of information technologies while it leads to vulnerabilities to the same possessors from weaker nations. It cedes some state authority to markets, to transnational entities and to non-state actors and as a result produces political forces calling for the strengthening of the state. However, a mere look at some of the manifestations of the arrival of information technology in international relations, clearly brings out how the nature and exercise of power have been permanently altered. Benjamin Barber describes a world that is both coming together and falling apart in his book Jihad Against McWorld. He describes a world where the nation state is losing its influence and where the world is returning to tribalism, regionalism, and the ethnocentric warfare that characterized much of the earlier human history. This problem is most apparent in the developing world where we continue to see the spread of disease, continuing humanitarian crisis, political and economic instability, and ethnic, tribal, civil, and drug related war. There are several themes that are consistent across these global futures. The first is conflict. The negative effects of globalization will continue to promote regionalism, tribalism, and conflict in the developing world. Secondly, nations with uncontrollable population growth, a scarcity of natural resources, and poor government systems will fail to benefit from globalization regardless of its effects on the rest of the world. Thirdly, technology will continue to be exploited to benefit developed nations and illicit criminal/terrorist networks, and will have little affect on the developing world. In all scenarios the power of the state will weaken and the power of the non-state networked actor will continue to expand with the help of the tools of globalization. References: Paul D. Williams. (2008). War. In: Paul D. Williams Security Studies: An Introduction. New York: Routledge. p151-p171. Akshay Joshi. (2010). The Information Revolution and National Power:Political Aspects-II. Available: www. idsa. org. Last accessed 13rd November 2011. Alvin and Heidi Toffler, War and Anti-War: Survival at the Dawn of the 21st Century, Boston: Little, Brown and Company, 1993. Robert O. Keohane and Joseph S. Nye, Jr. , â€Å"Power and Interdependence in the Information Age,† Foreign Affairs, Vol. 77, No. 5, September/October 1998. Steven Metz. (2010). ARMED CONFLICT IN THE 21st CENTURY:. Strategic Studies Institute. 01 (1), 65-119. Arquilla, J. (1998). Can information warfare ever be just? Ethics and Information Technology, 1(3), 203-212. Floridi, L. (2009). The information Society and Its Philosophy. The Information Society, 25(3), 153-158. Steven, Doglous, 2002. Information Warfare: a Philosophical Perspective. 1. London: University of Hertfordshire. Robert O. Keohane and Joseph S. Nye, Jr.. (1998). Power and Interdependence in the Information Age. Foreign Affairs. v. 77 (5), 1-10 David J. Rothkopf, â€Å"Cyberpolitik: The Changing Nature of Power in the Information Age†, Journal of International Affairs, Spring 1998, p. 27. Akshay Joshi, â€Å"The Information Revolution and National Power: Political Aspects-I†, Strategic Analysis, August 1999. Jessica Mathews, â€Å"Powershift†, Foreign Affairs, January/February 1997, pp. 50-55. Carl von Clausewitz, On War, edited and translated by Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1976). The seminal discussion of the political philosophy of war. Emily O. Goldman and Leo J. Blanken, 2011, THE ECONOMIC FOUNDATIONS OF MILITARY POWER, California, University of California-Davis How to cite Globalization and Perception on War, Papers

Thursday, December 5, 2019

Case Study of BUPA Insurance Company-Free-Samples for Students

Question: Discuss about the Case Study of Bupa Insurance Company. Answer: Background of the Organization Bupa is a leading healthcare organization that provides health and care services over Australia and New Zealand. The organization helps the members to lead a long, healthy and happy life. It offers both healthcare and insurance services for the customers to ensure good health of their family and wellness. The company has to follow a standard procedure for every activity whether it is enrolment of insurance policies or handling of insurance claims. In this report, the focus is particularly on describing the process of claims handling within the organization. A model is designed to illustrate on the flow of activities that is being followed by the company when a health insurance claim is lodged by customer. Textual description of the chosen process The process that has been chosen for this report in health insurance claim handling that depicts the process that is being followed by Bupa insurance to handle claim requests from customers. The process that has been undertaken in this particular study is one of the activities that is being carried out in the business operations of the company. This process helps the customers to live a long, healthy and happier lives with support of the company. The process of claims handling comprises of two cases that is the claim amount may or may not exceed the range covered by the insurance policy being enrolled by the customer. The claiming of the health insurance amount can be processed by the customer as per their requirement whether hospital treatment, health issues or accidental incident but the receivable amount depends on the value of the enrolled insurance policy. In the chosen process, first step is taken by the customer who files a claim request to the company against their insurance policy. It is assumed that the customer is a member and has an insurance policy enrolled within the company. Then the request is being passed onto the claims handler who is responsible for handling the claims processing within the company. The claims handler after receiving the claim request from the customer checks whether the policy is valid or not. Now, if the claims handler finds the policy to be valid then he/she will enter the data into system so that it can be processed further or else the claim will be reject as there is no valid policy as mentioned by the customer. After the data is being entered into the system, the claim request is being forwarded to the Assessor in the service centre for investigating the case. The Assessor handling the case will then check whether the claim being requested in under the policy coverage or not. If the assessor finds that the claim is being under coverage then he/she approves for preliminary estimate of the amount that can be given against the policy. The approved estimate may or may not exceed the range fixed for the insurance policy so if the estimate is found to exceed the range then the request is being passed onto the Assessor present in the Headquarter and if it does not exceeds the range then the claim request will be passed to the Senior Assessor. The Assessor present in headquarter is then requested to conduct an investigation on the case that has been put forward by the customer. After checking the requirements of the customer, the Headquarter assessor identifies whether the mentioned cause for claim is under the coverage of enrolled policy by the customer. If the Headquarter assessor finds that it is under coverage then he/she processes further to determine the actual expense and approves the case but forwards to the Senior Assessor to check the case for the claim request which is again connected indirectly with the Assessor in service centre remains as if the estimate does not exceeds the range. Now after verification of the claims case by Senior Assessor, data is being entered into the management system for processing of payment and the claims handler is being informed about the payment being processed. The claims handler then processes payment to the customer and at the time of payment processing the system has to perform two operations. The system after processing claim amount for the customer closes the case and files the claim being processed against the requested claim on behalf of the particular customer. Finally, the customer can fulfill the requirements with the claim amount being processed from the health insurance claim process. BPMN model of the chosen process Figure 1: BPMN model for Health Insurance Claim process (Source: Created by Author) Overview and explanation of assumptions The assumptions that has been considered for designing the business process model in context to the health insurance claim process are listed as below: The type of claim being made is one that can be lodged online, and does not require the policy holder to phone, mail in a claim, or visit a claim branch in order to lodge the claim. The health insurance claim is logged online by the policyholder prior to the claim being received by the Health Insurance Company (presumably via a support portal). The health insurance claim being lodged includes specific details about the claim including the claimants details, the practitioner they are claiming services for, and the item codes for the individual services they are claiming for. The health insurance claim contains photos or scanned copies of receipts for the health service as a verification method for the health insurance company. The conditions of the policy being valid (indicated in an early step in the process) also include the assumption that the policy has surpassed all waiting periods associated with type of claim being made against the policy. The health insurance claim being made is that of general dental, as to not need to differentiate the different types of claims being made and ways that they can be made. The health insurance company has a system that calculate the refund amount, and no manual intervention to calculate the amount needing to be refunded is needing to be made by the finance team. The system used by the health insurance company stores all previous claim requests that are able to be reassessed and reopened should the circumstances require it. Once the claim is finalized on the end of the insurance company, no intervention is needed by the claimant in order for the claim to be marked as closed. Bibliography de Oca, I. M. M., Snoeck, M., Reijers, H. A., Rodrguez-Morffi, A. (2015). A systematic literature review of studies on business process modeling quality.Information and Software Technology,58, 187-205. Harmon, P. (2015). The scope and evolution of business process management. InHandbook on business process management 1(pp. 37-80). Springer, Berlin, Heidelberg. Koschmider, A., Caporale, T., Fellmann, M., Lehner, J., Oberweis, A. (2015). Business process modeling support by depictive and descriptive diagrams.Enterprise modelling and information systems architectures. Li, Y., Cao, B., Xu, L., Yin, J., Deng, S., Yin, Y., Wu, Z. (2014). An efficient recommendation method for improving business process modeling.IEEE Transactions on Industrial Informatics,10(1), 502-513. Pinggera, J., Soffer, P., Fahland, D., Weidlich, M., Zugal, S., Weber, B., ... Mendling, J. (2015). Styles in business process modeling: an exploration and a model.Software Systems Modeling,14(3), 1055-1080. Rosa, M. L., Van Der Aalst, W. M., Dumas, M., Milani, F. P. (2017). Business process variability modeling: A survey.ACM Computing Surveys (CSUR),50(1), 2. Van Der Aalst, W. M., La Rosa, M., Santoro, F. M. (2016). Business process management. Welcome. (2018).Bupa - a global healthcare company. Retrieved 29 March 2018, from https://www.bupa.com/

Thursday, November 28, 2019

Ptang, yang, kipperbang Essay Example

Ptang, yang, kipperbang Paper Ptang, yang, kipperbang is a play written for television which focuses around the life of a teenage boy, named Alan Duckworth. Set after the war, the play gives the viewer or reader a well documented insight into teenage life at this point in time. The main character, Alan is not only a keen cricket fan like most boys his age, but has developed an infatuation for an attractive girl in his school. Although at first glance Alan seems to be like any other teenager, beneath this image is a boy who is healthily in touch with his feminine side. This leads to a play which not only adopts a successful comedy routine between Alan and his friends, but in the end, turns Alan into the unlikely hero of the play. The writer of the play, Jack Rosenthal ensures Ptang, yang, kipperbang sets itself from the crowd. He achieves this by using a certain dramatic device, which can only be labelled as genius. Rosenthal employs John Arlott, a famous sports commentator to provide play-by-play of the test cricket match, England against Australia to coincide with the events in Alans life. Its this commentary along with Rosenthals thought and preparation into the characters, which makes Ptang, yang, kipperbang such a joy to read and even more so to watch. The stage directions can not be ignored when reading the play, but naturally they go without acknowledgement. When watching the play, however they obtain a high degree of importance throughout the production, from Alans jerk in pain when he receives his punishment from the headmaster to Anns kiss on the cheek towards the end of the play, they all serve a purpose, some more than others. We will write a custom essay sample on Ptang, yang, kipperbang specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Ptang, yang, kipperbang specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Ptang, yang, kipperbang specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Its these stage directions which highlight the fact that Ptang, yang, kipperbang is in fact a play written for television and not for the stage. For one, the majority of the stage directions required for the play to be acted out to full effect demands a physically larger area than a stage. For example, Alans daily chores for his father, which were in fact an excuse for Alan to indulge himself in Anns presence. The scenarios used in the play also demonstrate that the play was written for television. This is evident in that there are so many scenarios in the play, I dont know where to start. From the school grounds where Alan talks to the caretaker, Tommy about cricket and life in general, to Anns house where as soon as Alans love object is out of view, he U-turns to arrive home. Upon review of the play, my favourite scene was undecided. There were so many that stuck out in my mind as memorable, such as the cross country P. E lesson, a classic example of the chemistry between Alan and his friends along with their comical antics. Alan is shocked and insulted when he discovers prostitutes refuse to kiss; (stops dead) They wont kiss? His friends reply by crudely remarking that its a price theyre willing to pay to employ a prostitute. Another scene which I find to be one of my favourites is one of the many Tommy and Miss Land conversations, the particular one I have in mind however is that of when Tommy is enlightened by Miss Land that she had a relationship with an American during the war. Miss Lands addition of virtually to the end of every sentence, along with Tommys irony makes the scene an asset to the play; One! One American! Virtually.. Old men and Yanks! Bloody old two-faced fogeys and randy Yanks! While me and my oppos are spilling blood and guts all over Africa and France and the sodding Rhineland! Both Tommy and Miss Land are lying to themselves in this scene. Miss Lands self deceit is visually obvious as her virtually spree suggests. Later in the play, Tommys claims of fighting valiantly in the war turn out to be false, he mentions in spite of Miss Land that he was fighting for Queen and country whilst she meddled with old men and foreigners. These two scenes, however entertaining, come in at a close fourth and third in my opinion. One of the two scenes that I have decided are joint for first place is Alans scene with the Headmaster, the comments between thrashes and the Headmasters demeanour throughout is what makes this scene primarily so entertaining. Alans physical response to his punishment, him avoiding contact with a seat for some time after, also adds to the value of this scene. I think Jack Rosenthal achieves such a level of humour from a place with the opposite emotional atmosphere (being the dreaded Headmasters office) by using this feeling of dread to his advantage. Instead of portraying the Headmaster as a stern and cold man, he shows that not only has he the strictness to be a Headmaster, but the unique blend of a sense of humour as well. Its this combination that makes the scene such joy to read. The other scene that makes up my personal top spot double is yet another example of the rib-tickling chemistry between Alan and his friends which explained earlier, is just one of several wild-cards Rosenthal uses to make Ptang, yang, kipperbang what it is, a successful comedy play written for television. The scene in question is the brilliant pontoon game parody staged in the boys lavatory. Alans half participation in the game, explaining the days earlier events, whilst his friends play with a trance-like attitude is entertaining on its own. As the scene goes on, Alan grows more impatient with his unimpressed companions. The game continues and his friends, still oblivious to Alans dilemmas and more to the game at hand, and in an ironic twist reveal they have lost patience with him. Sod off Quack-Quack. Youre getting on my nerves! (Turns his cards over) Pontoon. Match null and void. Ungentlemanly play from Quack-Quack. I had bloody pontoon! As Quack-Quack or Alan detaches from his friends, there are no signs of Alan even being present. Pontoon seems to be the popular topic of choice. In my opinion, Ptang, yang, kipperbang offers much more than meets the eye. One of the things I picked up from the play was its employment of comedy to put across certain points, for example, the daily after school pressing sessions. This demonstrates adolescent behaviour in a humorous and nai ve manner. This is a frequent occurrence throughout the play, which proves to be a success. The point made at the end by two workmen on Alans street, which primarily left me in a state of confusion as well as no doubt many others came in the form of the following; Hell be starting shaving next. Then spend the rest of his life trying to stop the bleeding. Although vague, I interpret the comments to be a forecast for later on in Alans life where as the workmen believe, despite his current desire to grow up will lead Alan to long for his days as a schoolboy again. This may be Jack Rosenthals way of presenting the stereotypical old mans clichi. The time you spend in school are the best days of your life.

Monday, November 25, 2019

Secure FTP Server in Chroot Jail Environment Essays

Secure FTP Server in Chroot Jail Environment Essays Secure FTP Server in Chroot Jail Environment Essay Secure FTP Server in Chroot Jail Environment Essay Often SFTP is confused with FTPS Well, they are different SFTP Part of SSH server FTPS Secure implementation of FTP server (yes, both use SSL encryption on the transport) WHAT IS JAILROOT/CHROOT? Evey process in *NIX systems has Process Context. This context contains the absolute path of the command that lead to creation of the process. e. g. $ ls The Process Context shall contain /bin/ls. It must be noticed that process has visibility till /. The hacker may somhow access all directories below / as they are in visibility. This is insecure. We decrease the visibility of process by creating altogether a separate directory called CHROOT or JAILROOT. For eg. if /dir1/dir2/chroot-dir is the JAILROOT directory in our configuration then the process run from login within this directory shall have no knowledge of anything above /dir1/dir2/chroot-dir/. For this process /dir1/dir2/chroot-dir/ is their / in the process context. CREATE USER WHO WILL BE ALLOWED TO LOGIN THROUGH SFTP sage ~]# useradd sftp-user Make sftp-server as login shell for that user. sage ~]# usermod -s /bin/false sftp-user CREATE JAILROOT DIRECTORY age ~]# mkdir /chroot-dir chown root. sftp-user /chroot-dir chmod 750 /chroot-dir MODIFY SSH SERVER CONFIGURATION TO ENABLE SFTP IN CHROOT sage ~]# vi /etc/ssh/sshd_config #Subsystem sftp /usr/libexec/sftp-server Subsystem sftp internal-sftp ChrootDirectory /chroot-dir ADD /usr/libexec/openssh/sftp-server AS A VALID LOGIN SHELL sage ~]# echo /usr/libexec/openssh/sftp-server gt;gt; /etc/shells sage ~]# /etc/init. d/sshd restart TEST SFTP bash~$ sftp [emailprotected] domain Connecting to hostname. domain [emailprotected] domains password: sftpgt; ls sftpgt; quit

Thursday, November 21, 2019

Explain the link between constitutions and justice in Aristotle's Essay

Explain the link between constitutions and justice in Aristotle's Politics - Essay Example It is through the social construction of justice that a constitution is then created to reflect those traditions, beliefs, and behaviours that define a nation. Swanson and Corbin (2009) suggest that the most important thing to do when discussing Aristotle’s work in political philosophy is to understand the context in which his theories were constructed. Aristotle was not merely observing and reporting on the politics within his world, but was examining the nature of politics through academic and analytical approaches. Swanson and Corbin (2009: 2) boil the discussions that Aristotle made down to a central theory that politics are based upon â€Å"the desire to live well†. This very simple desire from within the human experience has spawned a complicated set of boundaries within which life is structured. As Aristotle discovered, through these structures, the pursuit of a good life has developed, sometimes favoring one social group over another, but always in a struggle to find justice and fairness in an attempt to socially balance life. Swanson and Corbin (2009) combine the effects of both Platonic and Aristotelian philosophies in order to reveal one of the most important developments towards Western politics. ... Aristotle pointed out that justice within personal relationships was based upon the degree of obligation that one has to another person. As an example, to not help a brother is a much more severe violation of human interaction than to fail to help a friend or an acquaintance. Goodman and Talisse (2007: 58) state that â€Å"the core idea of justice for him is political. It involves citizens who live in some kind of relation of equality and is not a natural extension of other kinds of justice†. In approaching justice through reason and intellect, political justice is then achieved through an equality that is defined by citizenship. Goodman and Talisse (2007) compare the philosophies of Aristotle to those of Confucius. Confucius looked at the â€Å"benevolent rule of a sage king† (Goodman and Talisse (2007: 59) and did not explore the idea of a constitution. In these types of regimes, the rule of culture is supported over that of law. Aristotle, on the other hand, though a cknowledging the benefits of an aristocracy, believes that the practical approach is through a â€Å"constitution based on the rule of the middle class† (Goodman and Talisse 2007: 59). Blumenfeld (2003) discusses the nature of the constitution and the use of it in a general polity. The word constitution is defined as both referring to the middle class and to the polity. The middle class is the basis of justice and the foundational social group to a polity with a constitution. There are psychologies that surround each of the social classes within a society. Aristotle considered the rich classes to be violent and beyond the power of rule. Obedience is not in the

Wednesday, November 20, 2019

How best can transportation facilities be improved in Namibia,a Dissertation

How best can transportation facilities be improved in Namibia,a country of only 2million people - Dissertation Example The main objective of this study is to do a critical analysis of how a non performing transport sector affects the economy; understanding the challenges facing the different transport sectors by providing the necessary policy recommendations; outlining of other possible contributing factors; and, finally trying to find both long and short term solutions available to the sectors relative to the specific transportation challenges. There is not much research done in this area in the past which is the basic reason for my conducting this research. Background Namibia, then called South West Africa, became a German colony in the 1880’s. After the defeat of Germany in the First World War, the mandate to rule the territory was handed to South Africa, which by implication brought apartheid in Namibia. In 1990, Namibia gained its independence, after a brutal war of Independence from South Africa. Since independence, Namibia has been looking into increasing its exports in terms of its nat ural resources and products on the international front and it has advanced in this aspect. However, the biggest challenges hampering effectiveness of increased trade lies more towards the logistics aspect and the management of its respective SOEs. Namibia’s geographical position and transport infrastructure is such that it has become a transit country for Botswana, Zimbabwe and Zambia, which are its bordering and surrounding countries. These countries carry out export and import business across overseas countries through Namibian maritime transport. Other coastal countries and regions to which Namibia provides its transport facilities for business purposes include the region of Gauteng in South Africa; the Kunene and Cuando provinces in Angola; the Katanga province and Lubumbashi town in Congo. Due to this fact, these challenges are hampering the performance of the transport sector, and the fact that the services are spiraling down it does not really help the situation. Accor ding to Bernan (p.80), â€Å"Namibia considers the development of transit transport as contributing to the overall economic development of the country† and due to this fact, the government of Namibia has invested tremendously in the maintenance of its transit transport infrastructure. Currently, Namibian transport sector faces challenges related to the â€Å"expansion, modernization, upgrading and maintenance of road, rail, air and maritime transport facilities†, affirms the National Planning Commission, Namibia (2004, p.478). Bernan (p.81) suggests that the railway should be extended into Botswana all the way to South Africa because the railway infrastructure is still limited to only a few hundred kilometers near the border of Botswana somewhere between Walvis Bay and Gobabis. The major challenges that Namibian transit transport faces is financing and managing the infrastructure, and harmonization of vehicle dimensions, overload control, custom procedures and user cha rges for transit transport. Namibia transport is also expensive and one of the biggest challenges is that the resources of the country are not ample enough to finance transport facilities. This study aims to find solutions to these challenges which could help lead to the proper solution implementations requiring less national budget going wasted in struggling rather than using it for national development purposes since a revived economy is vital to the future of the country. Research

Monday, November 18, 2019

Ethics Awareness Inventory Analysis Essay Example | Topics and Well Written Essays - 250 words

Ethics Awareness Inventory Analysis - Essay Example Therefore, acting according to ones instincts is necessary and ethical (Lennick, D., & Kiel, F. 2005). I also believe inspiring individuals to improve their lives and grow is important compared to increasing business profits; through inhumane business practices like reshaping or traditional downsizing. Generally, I work with business ideas and policies which ensure equal opportunities and equal respect for all the employees in the family business. The knowledge I acquired during my study guide my thinking that business decisions are ethical only if they support the free choice of people, respect employee rights and supports creativity. In reference to obligation assessment, all businesses should comply with internationally proclaimed human rights. Besides, a sustainable business should not be complicit in the abuse of employee rights. In addition, the business is expected to maintain a good forward and backward linkages in the supply chain. These enhances the productivity of workers and result to profits (Lennick, D., & Kiel, F. 2005). However, my ethical viewpoint is not without any challenges especially when addressing ethical dilemmas in both personal settings and business. In most instances what I think is the appropriate approach is not applicable in the short-term choice. Hence, sustainability and conflict resolution at work place require a holistic approach to management of employee and employer relationships. Good business ethical practices embedded in business policies increase business

Friday, November 15, 2019

The Islam And Christian Holy War Religion Essay

The Islam And Christian Holy War Religion Essay For centuries Christians and Muslims have fiercely engaged in wars because they believed they will be rewarded by God for waging war in his name. In recent times we have become very familiar with the Jihad; as the media has covered this topic extensively after the September 11 attack that took place in the United States. This act of terror made the Islamic community a focal point of the media, which educated the populace on the violence of Islam or as they choose to call it Holy War. The truth is that, Islam is not the only religion that has committed violence in the name of God. Christianity also has its history of violence and Holy Wars, they were called the Crusades. The reasons for the Crusades were; to free fellow Christians from incursion and discrimination, Conquering lands in the possessed by other religions and fulfilling promises to partake in a crusade. Today we refer to Holy wars as Killing in Gods name, but war and religion have gone hand in hand for centuries. People go to battle after praying and making sacrifices to God, making them believe that God is on their side because they are fighting for his cause. An example is when Joshua destroyed the Anakites in the Bible. Involving God in such violent acts is not supposed to make a war holy. In the past few centuries, since the first crusades began to recapture the holy land from the Muslims Saracens, holy wars between these two religions have evolved along different paths. In the Christians context, we see a gradual decline in violence, the opposite is witnessed in Islam, and there have been a few recent cases of killing in the name of religion in Islam, the September 11 attack is one of the most serious in recent time. Islam is the fastest growing religion in the world and today it is amongst the religions with the highest amount of believers. The Jihad played a vital role in this rapid growth of Islam. Battles that were fought and won over a large geographical area, the captives were either converted by the sword or willingly changed to the religion of the army that conquered them. Fight in the cause of Allah those who fight you but do not transgress limitsAnd slay them wherever ye catch them. And turn them out from where they have turned you out; for persecution is worse than slaughter; but fight them not at the sacred Mosque unless they (first) fight you there; but if they fight you, slay them. Such is the reward of those who reject faith. But if they cease, Allah is oft-forgiving, most Merciful. And fight them on until there is no more persecution. And the religion becomes Allahs. But if they cease, let there be no hostility except to those who practice oppression (The Quran, Surah 2:190-193). The Quran is the holy book of Islam; the above quote is from the Quran it encourages the Holy war. Partly this explains the numerous battles the Muslims were involved in few centuries ago, fortunately in modern times the Jihad is no longer carried on a large scale as compared to the past but there are still some exceptional cases. The Hadith is another important book in Islam and it is second to the Quran. The Hadith contains the sayings and activities of the Prophet Muhammad and he encourages the Jihad, saying that anyone who dies fighting for Allah will be rewarded, by going to paradise. Many of these sayings have been interpreted in different ways and people have acted according to these interpretations which have lead to brutality and wars. Although in this modern age, with the help of globalization and westernization the frequency and scale of religious wars have declined over time. However, a small percentage of Muslims, the extremists and anti -western ones still dwell on the verses in the Quran that talk about war, conflict and violence. This is what has lead to terrorism and suicide bombings in recent times. In addition, the duty of all Muslims is to do the utmost against those who do not believe in Allah, this was meant for nearest enemies of Muslims but as more Foes arose with time, the statements supporting the Jihad were updated. The Muslims are acting according to what they read in their Holy books, most do not feel remorseful for whatever damage they have caused because they believe this are divine instructions of the holy book. Today we do not hesitate to link the word Jihad which means struggle in Arabic to Terrorism, especially after the September 11 attacks. Religious wars and violence happen in some other countries like Nigeria which is one of the most religious countries in the world. In Nigeria, Muslims and Christians clash frequently, fighting and rioting over one problem or the other, but yet the opposing religion knows very little about each others believes. Religious wars in Nigeria are fueled by ignorance, tribalism, poverty, politics and struggle for power. Another cou ntry that has experienced religious war this modern time is India; with a high population of Hindu, a small number of Muslims and a few Christians. Approximately hundred Christians were killed in a recent religious battles and another ten thousand left without a roofs over their head, telling us that religious wars may have reduced but still occurs in some societies. Furthermore, there are two forms of Jihad the greater and lesser Jihad. Internal Jihad or greater Jihad means the battle of believers to live their Muslim faith as the Quran instructs. This explanation is consequently, after a battle the prophet said We are finished with the lesser jihad; now we are starting the greater jihad. He explained to his followers that fighting against an outer enemy is the lesser jihad and fighting against ones self is the greater jihad. This means that the lesser Jihad will refer to the struggle against Unbelievers. (Heck) Muslims put in great effort to live the way Allah instructed them, the personal Jihad has to do with the teachings while the Jihad against unbelievers is the Practical. However, some scholars find the Quran teachings of morality and encouragement of violence very contradictory. Many historians believe that the true meaning of Lesser Jihad does not necessary encourage fighting and brutality but states that Muslim should take a stand for their religion only when Islam is threatened. The misinterpretation of the lesser jihad, as a cause or reason to fight and engage in violence and brutality does not make it holy. If Islam is not threatened and Muslims wage war against non-believers then this cannot be referred to as Lesser Jihad. Over the years various people have interpreted the Quran, their interpretations were influenced by the struggles that they were experiencing at that time. Factors such as oppression, depression, anger, suffering, hunger for power, hatred and other factors have influenced the interpreters perception of the scriptures. For instance, the Taliban strict and extreme version of Islam has even made other Muslim countries view the Ta liban with suspicion. Osama Bin Laden, the leader of the terrorist group Al Qaeda has quoted the Quran on several occasions to justify their violent actions on the west. Political leaders use religion to convince and justify their selfish desires. Using religion makes their argument convincing because they twist and interpreted the scriptures to serve the purpose and believers easily embrace them and believe it is just. Al Qaeda has used suicide bombing as tactics for attacks and the Quran forbids this. (Burk) The Crusades By large, Christianity is a religion that preaches peace but the record of killings and destruction in the past is contradictory to its teachings. In the past, wars were fought against those who opposed Christianity; the wars were fought primarily against Muslims. This is because the rise of lslam slowed down and threatened spread of Christianity. lslam under the rule of the Umayyad Caliphate spread from what is now Saudi Arabia in the Arabian Peninsula to Spain and parts of France. This made lslam a treat to Christianity and the Catholic Church, which was very powerful during the medieval times. The Church had enough political backing to crush anything or anyone that disobeys or treating the beliefs of the Church. Scholars and historians have argued about the cause or reason for the crusades. Some say that the crusades were crucial reaction by Christians to the domination of pilgrims in Muslim-controlled Jerusalem. Others argue that it was political imperialism disguised by religiou s piousness. Furthermore, others say that it was a social liberation for societies that were overburdened by landless nobles. Whatever the reason, it does not change the fact that a lot of lives and property were lost in the process. The first Crusades were organized by Pope Urban II in 1095. His main aim was to take Jerusalem from the hands of those he believed were non believers. Pope Urban II helped lay the foundation for many years of bitter and violent fighting between Christianity and other religions. The Crusades were triggered by popes at that time like Pope Urban ll and Pope Eugene III who called for the second crusade. The Popes felt that the crusades were particularly their duty and under their motivation, even if some of the expeditions sometimes got out of control. They believed the crusades were Gods work and that they were His instruments. Urban at Clermont used the following words: I speak to those who are present, I shall proclaim it to the absent, but it is Christ who commands. Moreover, if those who set out thither lose their lives on the journey, by land or sea, or in fighting against the heathen, their sins shall be remitted in that hour; this I grant through the power of God vested in me. The Pope organized the crusades, deciding the time, participants and also presents privileges to those that partook and threatened them with exile to all that do not realize their vow. (Dana) The crusades were used as a means of reclaiming the lost lands of Christians and acquiring more power for the Church. The age of the crusades was from 1905-1291 CE. In total, there were either eight or nine Crusades, depending on your view. Most historians consider the 9th Crusade to be part of the 8th. It was not only believers of other religions that suffered persecution, some Christians also suffered. Church theologians or leaders dealt with anybody who followed another religion or come up with rational thoughts that threatened Christian beliefs an example is the case of Galileo. Galileos teachings during the 17th century threatened the geocentric view of the universe. He said that the earth revolved around the sun. The church maintained that the earth was stationary and the sun and heavenly bodies revolved around it and this was an accepted fact. Thus were Galileos claims, labeled as the ranting of a heretic and he was confronted by the church leaders and told to recant his theory or face the consequences. The crusades also helped the Church and Popes acquire much wealth, with Crusaders freely giving to the Church before embarking on their journey. Crusaders were frequently taxed and this was handled by the Church. Consequently, the Popes became much more powerful, mainly because of their control over the appointment of the officials. (Dana) Heresy easily spread because of increasing mistrust of the Church, due to many reasons. For instance, all teachings in England, France and Germany had been carried out by the clerics and the crusaders discovered that they were continuously lied to. Others learnt that they misinformation, and began to doubt. The political crusades brought discredit and dishonor upon the Church and the Popes. Many men realized that they were being us ed and the Popes were using their power for worldly ends. In the thirteenth century it became more difficult to persuade men to take the Cross and fight.(Dana) In any case, there has been more recent violence attached to Christianity. Right after the civil war in the United States, the protestant-led white supremacist Ku Klux Klan members engaged in destruction of property, cross burning, beating, arson, murder rape and whipping against Jew, Catholics and African Americans and other social ethnic minorities. These are grave crimes exhibiting extreme violence and brutality. The mission of the Ku Klux Klan is to reestablish protestant Christian view in the United States. They believed that Jesus was the first Klansman. (Robert) They exhibited pure Christian radicalism. Similarly, the Arm of God (AOD) is an underground Christian terrorist organization active in the United States. This group has been involved in anti-abortion violence such as murder, property crimes and kidnapping. All these organization believe they are fighting for the morals of their religion and in the name of God. (Windle) Social Ramification Consequently, religious violence has lead to religious and ethnic profiling in society. The recent terrorist attacks have found to be rooted to religion and ethnicity thus causing countries to use profiling as a context for law enforcement and counter terrorism. Profiling can be defined as the use of racial, religious or ethnic stereotypes, rather than individual behavior, as a basis for making law enforcement and investigative decisions about who has been or may be involved in criminal activity. The global generalizations about a particular ethnic or religious groups propensity to commit a crime has made life difficult for people with certain ethnicity or religion. Society begins to look at such people as potential threats and this has negatively affects their daily lives at school, work and social interaction. Conclusion Finally, today religion is not considered an act of violence, Christians especially Catholics are not proud of the crusades that happened in the past. This point in history, are now looked upon as a dark period In Christianity. A group of Western Christians recently formed a body, their aim is to repair the damage caused by the crusades by apologizing to the other religions that were affected during that time. (Robin) But when have Christians demonstrated this love to Muslims or Jews? We have gone to them with swords and guns. We have gone to them with racism and hatred. We have gone to them with feelings of cultural superiority and economic domination. We have gone to them with colonialism and exploitation. We have even gone to them with the Gospel cloaked in arguments of superiority. Only a few have ever gone with the message of Calvary We must do more than carry the message; we must be the message. This kind of movement helps to show that Christians are not willing to carry out the crusade; no recent case has been heard. Todays Christians want to practice their religion without harming anybody. The same can be said for most Muslims, although some Muslims extremists are obsessed with fighting the west. As the study has shown religious violence was greatly influence my politics and selfishness desires of leaders. Over the course of time leaders have used religion as a tool and have twisted the word of God to suit their agenda and accomplish their desires. Without this influence, misinterpretation and deceit violence would have not been so wide spread in religion. Most religions preach God is of peace and we humans with our selfish ways have used religion as a way to control people and their beliefs. If we do not let our human imperfection influence the word of God and we follow the teaching of our scriptures diligently the world will be more peaceful. Ironically, our imperfection s are barely curable and even the greatest men fault. This is the paradox of life. Work Cited Baird-Windle, Patricia Bader, Eleanor J., (2001), Targets of Hatred: Anti-Abortion Terrorism, New York, St. Martins Press B.A Robins Christian apology for the Crusades: The Reconciliation Walk Religious Tolerance.org. 2005-NOV-04. Web. 3 April 2011 Dana C. The Popes and the Crusades Munro Proceedings of the American Philosophical Society Vol. 55, No. 5 (1916), pp. 348-356 JSTOR. Web. 3 April 2011 Josh Burek and James Norton A world-renowned scholar explains key points of Islam. Islamawareness.org. n.d. Web. 3 April 2011 Michael, Robert, and Philip Rosen. Dictionary of anti-Semitism from the earliest times to the present. Lanham, Maryland, USA: Scarecrow Press, 1997 p. 267. Paul Heck. Jihad Revisited The Journal of Religious Ethics Vol. 32, No. 1 (spring, 2004), pp. 95-128. JSTOR. Web 3 April 2011

Wednesday, November 13, 2019

Essay --

"I feel at home wherever I go" . This is what a person who's not place-bound would say . This is what a person whose love is not confined to family and friends, but is spread everywhere and to everyone would say. This is what a global citizen would say. It is surprising how someone can be away from home but still feel like at home. A global citizen has cultivated his/her abilities to achieve this in a couple of ways. Let me tell you how . A global citizen has realized that we are all interconnected no matter where we come from or what religion we follow. No matter what our race or nationality is we are all part of a larger process which is human life. A global citizen has become aware that everyone on this planet is a brother or sister. The global citizen has read a lot about different countries , has learned different languages,has been interested in what's going on across the oceans , has found a connection between his daily life and the lives of others who live far away. I take my hat off to a such person . One of the global citizen's characteristics that I admire most ,i... Essay -- "I feel at home wherever I go" . This is what a person who's not place-bound would say . This is what a person whose love is not confined to family and friends, but is spread everywhere and to everyone would say. This is what a global citizen would say. It is surprising how someone can be away from home but still feel like at home. A global citizen has cultivated his/her abilities to achieve this in a couple of ways. Let me tell you how . A global citizen has realized that we are all interconnected no matter where we come from or what religion we follow. No matter what our race or nationality is we are all part of a larger process which is human life. A global citizen has become aware that everyone on this planet is a brother or sister. The global citizen has read a lot about different countries , has learned different languages,has been interested in what's going on across the oceans , has found a connection between his daily life and the lives of others who live far away. I take my hat off to a such person . One of the global citizen's characteristics that I admire most ,i...