Tuesday, October 29, 2019

Org behavior Assignment Example | Topics and Well Written Essays - 500 words

Org behavior - Assignment Example They do this by managing costs, increasing costs or undertaking both. Essential product positioning, innovation, and targeting marketing can cause an increase in sales, while improving processes and controlling overhead expenses can reduce costs. Also, managers provide timely and effective revelation of information that is relevant to all the stakeholders. The revelation of this information highlights the organization’s respect towards their stakeholders. In addition, organizations set up code of ethics or rules and regulations for their employees and managers. These rules and regulations direct the way managers and organization’s employees handle and relate with other stakeholders (Brickley, Smith, Zimmerman, & Willett, 2000). Entrepreneurship creates value and satisfactory results for stakeholders by instigating innovative business ideas that promote future prosperity and wealth building in an organization. Moreover, entrepreneurship promotes the health and progress of an organization. It achieves this by creating fresh opportunities of business in all areas of the organization. On the other hand, entrepreneurship promotes innovation and increases profits of an organization. Lack of entrepreneurial action may make an organization not to get to its maximum capability (Brickley, Smith, Zimmerman, & Willett, 2000). Nonetheless, any knowledge that enters or is produced by the organization should create value to all the stakeholders. Organizational theory, design and change, structure and culture, have an interconnecting role in an organization. Organizational theory refers to the duty of an organization on the impact of the surrounding on the operational outline of the organization and how the organization works in the environment. This depicts an association with the cause and effect law. The organizational design and change points to how and why a variety of methods are selected. This helps the organization to manage its culture

Sunday, October 27, 2019

Advantages And Disadvantages Of Diversification In Agriculture Environmental Sciences Essay

Advantages And Disadvantages Of Diversification In Agriculture Environmental Sciences Essay Agriculture is the pre-dominant economic line of work of the rural communities in India, and plays a vital role in the socio-economic development of these communities. India acquires its major share of production revenues from the rural / agricultural sector of the economy. The agriculture sector in India is enormously significant in spite of its declining share in GDP. Sectoral shifts occurred as a result of the industrialization which had raised the Services sector shares in GDP during the 1990s, where as Agriculture, which had a major share in GDP in the 1950s, contributed only 22.5 % by the end of March 2004 (Economic Survey, GOl, 2003-04). Thus came up a pressing need for a paradigm shift in the governments agricultural policy to address the problems faced in the agricultural sector in the new domestic and global economic environment and avenues to enhance the income of the farmers. The possible solution for meliorating the agro sector is Diversification. This study traces the d efinition of diversification, area expansion problems, immediate needs, and its future prospects. Diversification can also involve a shift of resources from one crop (or livestock) to a larger mix of crops and livestock, keeping in view the varying nature of risks and expected returns from each crop/livestock activity, and adjusting in such a way that it leads to optimum portfolio of income (Joshi, et al, 2003). It is a way of a gradual movement from subsistence staple food crops towards diversified market-oriented crops which have a larger potential for land returns. DOA being a strategy would open up opportunities, to a large extent, for value addition in agriculture and will also lead to better crop planning and improve the earning opportunities in the farm community. In India, Andhra Pradesh has been proactive in taking up agricultural diversification as a strategy to accelerate the growth of agriculture. Crop Diversification Crop diversification takes into account the economic returns from different value-added crops. It also implies the effective use of environmental as well as human resources to grow a mix of crops with complementary marketing opportunities, and it entails shifting of resources from low value crops to high value crops. Due to globalization, crop diversification in agriculture is also a means to increase the total crop productivity in terms of quality, monetary and quantity value under specific, diverse agro-climatic situations all over the world. There are two approaches to crop diversification in agriculture. Horizontal diversification the primary approach to crop diversification used in production agriculture. In this approach, diversification normally takes place through crop intensification which means adding new high-value crops to existing cropping systems as a way of improving the overall productivity of a particular farm or a regions farming economy as a whole. Vertical diversification approach in which value is added to the products by farmers through various methods such as processing, regional branding, packaging, merchandising, or other efforts to enhance the product. Opportunities for crop diversification normally vary depending upon the risk, opportunity and the feasibility of proposed changes within a socio-economic and agro-economic context. Crop diversification may occur as a result of government policies. The Technology Mission on Oilseeds, Spices Development Board, and Coconut Development Board etc is some examples where the Indian government created policies to thrust changes upon farmers and the food supply chain at large as a way of promoting crop diversity. Crop diversification is the outcome of several interactive effects of many factors: Environmental factors which includes irrigation, rainfall, and temperature and soil fertility. Price-related factors which includes output and input prices with respect to national and international trade policies and other economic policies that affect the prices either directly or indirectly. Technology-related factors which includes seeds, fertilizers and water technologies, but also those related to marketing, harvest, storage, agro-processing, distribution, logistics, etc. Household-related factors which includes regional food traditions, fodder and fuel as well as the labor and investment capacity of farm people and their communities. Institutional and Infrastructure-related factors which includes farm size, location and tenancy arrangements, research, in-field technical support, marketing systems and government regulating policies, etc. All these five factors are interrelated. Area expansion problems under rice and wheat crops Scaling up production area poses several new problems of significance such as: 1. Excessive use of groundwater leading to poor water use efficiency and depletion of groundwater. 2. Deterioration of soil health or soil fertility. 3. Multiple infestations of weed flora, insect pests and diseases. 4. Indiscriminate use of energy such as chemical, electricity or disease, etc. 5. Reduction in the availability of other protective food and high value crops. 6. Pollution of agro-ecosystems. Despite the expansion problems, crop diversification has the potential to be an economic driver in agricultural regions. It may prove to become the paramount importance in meeting challenges that arise from a post-green revolution scenario. In view of shrinkage of agricultural land and operational holdings due to expansion of urban centers, changes in consumer food habits, exponential population growth rate, farmers are pressured to include or substitute additional crops in to the cropping system. Key Drivers Of Diversification The key drivers of diversification that are identified are : (1) Food Security; (2) Employment generation through creation of off-farm and non-farm investment opportunities within the capabilities of the resource-poor farmers; (3) Changes in crop patterns and farming systems; (4) More effective use of land and water resources; (5) Market access initiatives replacing risk aversion with risk acceptance; (6) Changing consumer demands irrespective of the nature of habitation and standards of living due to spread-effect of health consciousness caused by the visual media and non-discriminatory demand for quality goods, and (7) The role of urbanization in fast developing countries like India. Crop diversification can better tolerate the ups and downs in the market value of farm products and may ensure economic stability for farming families of the country. The adverse effects of aberrant weather, such as erratic and scanty rainfall and drought are very common in a vast area in agricultural production of the country. Incidence of flood in one part of the country and drought in the other part is a very frequent phenomenon in India. Under these aberrant weather situations, dependence on one or two major cereals (rice, wheat, etc.) is always risky. Hence, crop diversification through substitution of one crop or mixed cropping/inter-cropping may be a useful tool to mitigate problems associated with aberrant weather to some extent, especially in the arid and semi-arid drought-prone/dry land areas. Immediate Need In India, crop diversification in agriculture takes place vertically or horizontally, depending upon the market forces and also occasionally due to the domestic needs. With regards to use of land and water use and quality, there is an immediate need to consider the following factors (Aradhana , 2009): Farm produce processing into value added products will offer employment scope in non-farm works as in distillation of active ingredients from medicinal and aromatic plants (herbal products), scope of industrialization in agriculture for sugar, paper board manufacturing, etc. There is a need to find place-based approaches for diversifying the farming situations under various socio-economic conditions, infrastructure of market, domestic needs, supply of inputs, etc. The research and development on crop diversification is best done in a farmer-participatory mode where a multi-disciplinary team consisting of scientists will involve farmers from the project planning phase till arriving at conclusions and solutions. The concept of sustainable productivity for each land and water units through crop diversification needs to be fostered. There is critical need for promoting co-operatives in rural areas to solve micro-level and demographic problems. Strengthening food processing and other value-added industries in rural areas is a means to provide employment to rural youth. Alternate cropping systems and farm enterprise diversification are most important for environment protection. There are abundant opportunities in adopting the subsidiary occupations to the rice-wheat cropping systems present in India. They are vegetable farming, fruit cultivation, floriculture, medicinal and aromatic plants cultivation, mushroom farming, dairying, piggery, goatery, poultry and duckery, fishery or aquaculture, bee-keeping, to provide ample scope for diversification of rice-wheat cropping system in north-western and south India and north-eastern states. Farm enterprise diversification will generate more income opportunities and rural employment round the year. Conclusion Diversification in agriculture will have a tremendous impact on the agro-socio-economic areas and also in the uplifting of resource-inadequate farming communities. It will be able to generate income and employment opportunities for rural youth around the year for the utmost benefits of the Indian farmers. It shows the use of local resources in a bigger mix of diversified cropping systems and livestock, aquaculture and other non-farm sectors in the rural areas. As in the WTO era along with the globalization of markets, diversification in agriculture is an ace means to step up the total production and productivity with respect to quality, quantity and monetary benefits under diverse agro-climatic state of affairs in the country. There are still numerous opportunities for crop diversification present in both- irrigated and non-irrigated vast areas in the rural India.

Friday, October 25, 2019

The DEA :: essays research papers

On our planet, phenomena’s occur occasionally in nature. Tornadoes, earthquakes, and flashfloods are all types of phenomena’s that could occur. Most of these mysterious events are small and go unnoticed; however, on a rare occasion these sorts of event can be horrendous. One such occasion occurred back around 4,000 BC (Werner Keller, 48). As the story goes, God’s population was growing rapidly on earth. At this point, he had been growing bored with the same people on earth so he made sure no man would live past the age of 120. Given this time, the people of earth started to take advantage of the human race; these acts of selfishness disgusted God. He decided to destroy everything on earth. A man by the name of Noah had lived his life by God’s nature, which eventually led to a close relationship between the two. God had told Noah to build a boat with exact measurements. God had instructed Noah to put two of every kind of animal into the boat; one had to be male and the other female. Then God told Noah to get into the boat with his family, their families, and the animals. Then for forty days and forty nights the clouds seemed to have poured endless amounts of water onto the earth (Genesis 6:1-9). Floods rushed through the landscape, destroying everything in its path. The waters were higher than the tallest mountains, standing above the highest peaks. All living things on earth had died. The water covered the earth at this level for five months (Paul S. Taylor, 1). In time the water began to dry up. Eventually Noah was able to leave the ship and release all he had brought with him. From this point, evolution occurs.   Ã‚  Ã‚  Ã‚  Ã‚  The story of the great flood has been debated many times as far as its historical accuracy. Many experts seem to think that such an event would be unnatural while others believe that this great worldwide flood actually did occur. In today’s society, more people are beginning to question catastrophic events that occur in nature. This great flood seems to be a very common example of this. This research paper will investigate the Holy Bible’s reliability as scientific and historical literature by focusing on its recording of the great flood. Many people are interested in these world phenomena’s; this paper will aim to end some of the controversy about this particular phenomenon.

Thursday, October 24, 2019

Macbeth Act Iv Lines 111-134

In Macbeth Act IV scene 1 lines 111-134, William Shakespeare heightens the themes of guilt and conscience and order and disorder, Shakespeare also furthers Macbeth’s character in his ambition all through the utilization of punctuation, imagery, and irony through royal imagery. In this passage, Macbeth speaks to the wierd sisters and they speak back to him, the passage ends with a soliloquy. We already know going into this section of the play as previously discussed by my colleagues Keegan and Alex, that Macbeth has gone under quite a change.Out of fear and paranoia, he has decided to seek out the witches in search of the answers of his future. Although macbeth has experienced this change, his guilt of the murder of Banquo is evident in this passage. Macbeth has just been given his prophecy and this bonus hallucination is given by Shakespeare as a glimpse into Macbeth’s state of mind. The First device shakespeare utilizes is punctuation. With one quick glance at these li nes, Shakespeare's vast use of punctuation is immediately evident.In these lines there are six periods, nine exclamation points, five colons, two semicolons, nine commas, and five question marks. Firstly, shakespeare utilizes exclamation points, which are only found in Macbeth’s lines to display Macbeth’s surprise in the hallucinations he is witnessing, this surprise then brings Macbeth to question what the witches are showing him, hence the use of question marks. For example, in line 115, Macbeth asks â€Å"why do you show me this? † and before his question can be answered, yet another hallucination of a king enters.A similar event occurs at line 118. Usually when there is a comma used, there is another thought which follows, this occurs when Macbeth says â€Å"and yet the eight appears, who bears a glass† â€Å"Banquo smiles upon me, and points at them for his† when the witch says â€Å"I’ll charm the air to give a sound, while you perfor m your antic round† and â€Å"that this great king may kindly say, our duties did his welcome pay† Alone, the utilization of a specific form of punctuation contributes its own benefits for example, a comma contributes another idea.Altogether, however, the massive amount of punctuation used by Shakespeare really creates a sense of confusion, thus heightening the theme of order and disorder. The second device used is sorcery and supernatural imagery. Examples of this found in the text are â€Å"spirit† â€Å"filthy hags† â€Å"crack of doom† â€Å"blood-bolter‘d banquo† â€Å"antic round† and â€Å"accursed† Shakespeare's use of such words reinforce the presence of the supernatural that Macbeth is currently experiencing and further the theme of the supernatural.The third and final device Shakespeare uses is irony through royal imagery. In the vision of the eight kings which pass by Macbeth, all of whom looking like Banquo wh ich is irony in itself, Shakespeare describes the eight kings by only giving information on monarch related objects, for example, â€Å"thy crown does sear mine eyeballs† â€Å"thou other gold-bound brow is like the first. † â€Å"some I see that two-fold balls and treble scepters carry†.Shakespeare furthers Macbeth’s character as the fixation of the crown related objects suggests Macbeth’s hunger and obsession for power has grown thus heightening the theme of ambition and furthers Macbeth’s character in illustration of the change that has overcome him. As stated earlier, Macbeth has already received his prophecy, so why would the witches give him more visions? In the lines prior to the start of the show of kings, all the witches say, â€Å"Show his eyes and grieve his heart, come like shadows, so depart. What the witches are doing Is creating vision out of Macbeth’s guilts fears and worries, thus the eight kings which appear. Shakes peare is suggesting that Macbeth’s immense guilt of Banquo’s death, and hunger for power are the reasons causing this bizarre hallucination, which continues to further Macbeth’s character in the theme of ambition and guilty conscience in the illustration of his obsession with the crown and Banquo.So far, we have focused upon the devices present in the lines, but what about the devices that aren’t? Shakespeare did not include a time motif in this passage, not while the witches were present that is. When the witches disappeared, the time motif is reaffirmed. Time, is man made and represents order, in the absence of the time motif while the witches are present Shakespeare is suggesting that the witches are the root of the disorder and chaos experienced, thus heightening the theme of order and disorder.In the context of the human condition, Shakespeare suggests that one’s colossal guilt and desires manifested in length will eventually lead to their ine vitable destruction. Understanding the sins we have committed, and learning from the mistakes we have made is utterly important in our mental health and in some cases our existence. The opposite is displayed in Macbeth’s character as he continues to strive for an increase in power. This ambition is unhealthy, and eventually leads to Macbeth’s destruction.Not only is this aspect of the human condition found in Macbeth, but is also commonly found throughout history, most recently, the late Muammer al-Gaddafi of Libya, who’s obsession for power in his own country, just like Macbeth lead to his timely end. In the tragedy of Macbeth act IV scene I lines 111-134, William Shakespeare forces the reader to question human nature as it pertains to guilt and unchecked ambition in the face of desperation and confusion. Now Dmitri will deconstruct his lines through a video presentation. Thank you.

Wednesday, October 23, 2019

How do the poems reflect the experiences of going to War and at War? Essay

The experiences of World War One are reflected in a variety of different ways. Poems are a very good source of seeing how the different attitudes from the War, are expressed. In this essay I will analyse the mood and tone, mood, language and attitudes of the writers in â€Å"Dead Man’s Dump† and â€Å"Exposure†. The mood and tone in Dead Man’s Dump (DMD) is defined from the very first stanza. It is very descriptive and describes the actual movement of the horses that pull the gun carriages over a ruined and battle wounded road (â€Å"Plunging limbers over the shattered track†). This creates a very negative image in the readers mind and sets an attitude against the War. There is also a very strong, prominent religious tone in the poem which is also seen in the first stanza when the barbed wire is described as â€Å"Crowns of thorns† which links towards the death of Christ. This could imply that the soldiers, like Christ, are sacrificing their lives for God and their people. This could be seen as a Pro-War meaning. On the other hand it could mean that the Soldiers are also doomed to die like Christ was doomed to be crucified. The Language used in DMD is very archaic, such as â€Å"Man Born of Man, and born of woman†, which reflects more of the religious undertone in the whole of the poem and expresses that since the age of Christ, people have died for Christ and Kingdom. Moreover the language is very emotive and strong, like in stanza three â€Å"Now she has them at last†, where Earth is personified and is repossessing the men after she had made them, watched them live and now is waiting for the soldiers to die and return to her soil and be part of the earth again. The attitude of the writer, Isaac Rosenberg, is shown throughout the poem but is most prominent in the last stanza when he is describing one soldier dying. â€Å"So we crashed round the bend, / We heard his weak scream, / We heard his very last sound, / And our wheels grazed his dead face.† This is a very personal ending as Rosenberg uses collective viewpoint and therefore includes himself into the poem, and it shows it from his personal experience. The last four lines of this poem seem very sudden and it seems as if it is happening in the present with the reader. The impact of the experience of seeing the newly dead body not only affects the reader but also must have affected the writer, which he shows us through his writing. Exposure has lots of different meanings. Even though it is only one word it makes us wonder what he meant, who is exposed and to what? It could be the men are exposed to the elements, which could be what the whole poem is about. It could be the men being exposed to death, so, like a flower, in winter which slowly freezes, until, eventually it shrivels up and dies, or it could be the men being exposed to the enemy but which is very unlikely as the enemy is not directly mentioned in the poem at all. In Exposure the mood is dreary and cold and sad. Words that prove this are â€Å"Knive†, â€Å"Mad† and Shaking Grasp†. It shows that this poem was an anti war poem as it is graphic and truthful. Owen probably wanted to shock people because the description is very vivid. Also a lot about the elements is mentioned which shows that the real enemy was not the Germans (who are not mentioned at all in the poem) but the wind, snow, rain and hail, which could also be why he used this as one of his main themes. Also Misery was a theme which he showed by using â€Å"Wearied† and â€Å"Nervous† which shows just how scared these men in the trenches were of everything. Exposure does not really have a rhythm because it is very messy and the dactylic diameter is very weak. I think it is to show the confusion and tiredness on the soldiers in the trenches, but it could also represent their slurred speech and their sluggish thoughts. It could also represent the mess and destruction, so we can picture it clearly. A very long layout of the stanzas is used in Exposure. The sentences are long and slow, which starts to bear down on the reader – to create a sense of empathy with the soldiers’ situation. Each stanza is cut short through the use of caesuras, which makes you more aware of the poem, sharply drawing your focus; Owen could be trying to represent how the soldiers jolt in and out of consciousness when they are on guard or waiting to fight and how they then are alerted by something like a flurry of bullets. It is very vivid and unpleasant, which Owen does purposely to mimic the soldiers’ experience. The ellipsis help to show this too, â€Å"the poignant misery of dawn begins to grow†¦Ã¢â‚¬  Exposure demands a less deep understanding of it because the meaning is less hidden. The misery is very direct and powerful. This shows that Owen wanted the reader to empathise with the soldiers. An example of this is shown in stanza two: Like twitching agonies of men among its brambles It is a use of imagery and personification. It also links the barbed wire to nature, which is used a lot in the poem to show the harshness and merciless wrath of it. It could also be from a religious point of view, as it could mean that god is shunning them for causing a war on earth. This could lead to the meaning that the men were on the verge of gaining or losing faith in god and that they are questioning his existence. Collective pronouns like â€Å"we† and â€Å"our† are used to show that the men are united and stand together against the enemy. But it could also mean that they are one writhing mass of pained soldiers that have changed so much that they are unidentifiable, that they have forgotten names and just use collective pronouns. Exposure is altogether a very serious and deep poem, as it encourages you to think about it a lot during the process of reading it. The reader empathises during it and also at the end gets to feel a fraction of what the soldiers did in the trenches, so they are left with a sense of misery and distraught. It helps to learn about the soldiers by reading this, as it is very vivid and uses imagery and personification. Both â€Å"Dead Man’s Dump† and â€Å"Exposure† reflect very negative aspects of the war, but from very different perspectives. Whereas â€Å"exposure concentrates on nature as an enemy, â€Å"DMD† concentrates on Death and Loss and is very personal, and they both help us to view the war in different more realistic ways.

Tuesday, October 22, 2019

Insect Defense essays

Insect Defense essays Above the countless number of species on our planet, insects stand among the most successful animals on Earth in regards to sheer variety and abundance. About one million species of insects have been identified so far (some estimates reach three million), which is about half of all the animals known to the scientific world. Insects inhabit nearly every nook on Earth. Rock crawlers survive in the peaks of the Himalayas by producing a kind of antifreeze, and worker ants forage for food in the Sahara Desert at temperatures above 47oC. Insects can be aquatic, air-borne, land-dwelling, tree-dwelling and anything in between. Some insects, such as the silverfish have even adapted to living indoors and surviving on a diet of paper and glue. Because insects are nutritious, abundant, diverse, and found everywhere, they are eaten by humans, animals and plants alike. So how is it that these tiny creatures have managed to subsist so successfully for millions of years in the face of such adv ersity? Evolution has endowed them with a remarkable ability to adapt and defend. A great variety of moths spend their days resting safely upon tree trunks, so perfectly matching the mottled bark that their very invisibility forms their defense. To repel honey thieves, some stingless social bees erect walls of sticky resin in front of or around the nest entrance, while other species will smear a repugnant liquid. Some insects, such as the puss moth caterpillar, can be so elaborate in their defenses that an attack is almost impossible. When resting upon a branch, the puss moth caterpillar resembles a curled poplar leaf with a blackened margin; it holds the two prongs of its tail together resembling a leaf stalk. When a threat appears however, the caterpillar quickly throws off its passive protection, rearing its head to display the startling crimson front of its prothorax with its two eye spots. Simultaneously, the caterpillar spreads its forked t...

Monday, October 21, 2019

3 Reasons Quitting Might Be the Right Thing to Do

3 Reasons Quitting Might Be the Right Thing to Do The world is full of inspirational posters, coffee mugs, and bumper stickers telling us not to be quitters. But that kind of blanket dogma- black-and-white in a world of grey- can be hurtful on occasions when giving up might actually be the best idea. Here are three reasons why we think this advice doesn’t always have to be the final word. 1. It  can lead you to the path you really wantIt’s all well and good to say â€Å"winners never quit and quitters never win,† but what if you’ve devoted yourself to the wrong pursuit and quitting could lead you to a better one- where you could actually win and not just slog away forever because you’ve been told you’d be weak or lazy if you quit?If you’re on the wrong track, and you know it, sometimes quitting is the braver, nobler thing to do. And it just might be the only route to winning in the end. So have the courage to take stock of where you are and what you’re doing.2. Sometimes,   you’re just truly unhappyThere are a ton of cognitive biases that already predispose us against quitting. Like the sunk cost fallacy (â€Å"I’ve already spent so much on this hobby,† or â€Å"I’ve wasted so much of my life playing the tuba, so I can’t switch to building miniature boats†) or our bias towards the status quo (â€Å"I may have it rough now, but the unknown could be even worse†). Not to mention loss aversion and the need to hold on to whatever gains we’ve made at all costs. But none of these are good reasons to stick it out in bad relationships or careers. The last thing we need is some smarmy â€Å"Never give up† slogan making us feel even worse about our prospects.3. You  can set an example  and be an inspirationQuitting is considered weak, and quitters a failure. But we should buck this trend. Wouldn’t it be better to encourage people to be more mindful about what they do? And to check in from t ime to time to see whether they should still be doing it?Next time you notice someone spewing platitudes on Facebook about quitters or inspirational gifs about never giving up, take a moment to disagree. That advice can keep people from being their best selves, and can actually be harmful when wielded willy-nilly.

Sunday, October 20, 2019

Students Are the Best Audience for Who to Write a Book at College

Students Are the Best Audience for Who to Write a Book at College Students Are the Best Audience for Who to Write a Book at College If you are a student and have decided to become a writer, you must consider each step carefully. Becoming a famous writer does not happen overnight. You may not know who to write a book for. As you are a college student, it makes sense to write for the student audience. If you are interested in writing novels, it is a good idea to start with something a bit easier, like tutorials for your fellow mates. This way, you can listen to feedback, find and develop your own style in writing. Here are five topics to write about in order to engage the student audience. 1. How to Become an Expert in Academic Writing All college students have to write papers on one subject or another. Some students find writing papers extremely difficult and stressful, so writing on academic issues is a great idea at college. Walk your fellow students through the different aspects of writing: brainstorming a topic, creating the first draft, then proofreading and editing. Include tips on styling, organization, vocabulary usage, perhaps even grammar and punctuation. Your readers are sure to appreciate the comprehensive guide on academic writing. 2. Problems of Student Life and How to Cope with Them Student life is complicated, so a book about how to cope with college successfully could be a real winner within the student audience. Think about problems you have experienced as a student and how you have solved them. Also you can give practical advice about college, supplying with entertaining stories of your own experience. You can write about typical college student problems, like living on a student budget, adjusting to life in college, dealing with a roommate and living in dorms, eating at the dining halls, etc. 3. How to Become an A Student Balancing grades, living in society and adjusting to a new place is pretty challenging, isn’t it? Thus, you could write a book concerning these issues. Such a guide surely will be helpful for a plenty of students. A comprehensive guide on choosing classes and professors, studying for college exams will be a real hit within college students. 4. Establishing Relations in College All humans want to be in love and to build relationships, and college students are not an exception. Dating in college can be complicated experience, so many students will be engaged to read a guide on how to make connections with the opposite sex. Fill your book with funny stories about your own dating experience, or ask your close friends to share their experience with you and include their best stories. 5. A Practical Guide for College We have already discussed that the tips on how to deal with typical college problems will be the best idea for the book. Nevertheless, what about the guide for student everyday life, especially for newbies? First year students could use practical advice on how to register for classes, how to choose the best ones, how to ensure they are on track for their degrees, how to join a fraternity or sorority, maybe even how to do laundry! You could even gift such a guide for your college or university so people will know about you really fast and your fame will come faster! If you are interested in becoming a novelist, here are a few topics you can write about to sharpen your writing skills, practice your own style, and find the target audience.

Saturday, October 19, 2019

Who was the historical Jesus What was his message Why is Paul such an Essay

Who was the historical Jesus What was his message Why is Paul such an important figure for early Christianity - Essay Example This has made scholars dedicated to investigate the historical Jesus to come to an agreement regarding those events in his life. Jesus was baptized by John the Baptist and it is this time that he had a vision to start preaching to people around the land. John the Baptist is a recognized figure who oversaw the baptism of people and he actually baptized Jesus. He was crucified under the rule of Pontius Pilate. There remain artifacts that portray how he was crucified.ost of the people who are after facts for the crucifixion of Jesus agree that he was indeed crucified but they differ in the reasons for his crucifixion. The Pontius Pilate who was a roman prefect failed to stop the crucifixion of Jesus on ground s that the will of people prevail- he was accused of falsely claiming to be the son of God and the messiah. Since he started teaching, he gathered disciples and dedicated followers. He moved from town to towns passing the message of reformation. Jesus taught that the earth could be transformed to a kingdom of God. Therefore, he was preaching the need for people to be reformed, follow the ways of God and live in a manner that would please God. He was regarded as a wise teacher and he taught in a manner that would appeal to people. To carry out his message, he used parables that people would relate to. It made it simpler for people to grasp his lessons (Grassi 34). Actually, researchers assert that he was highly regarded as a teacher and also a healer in Judea and Galilee. Through the teachings of Jesus, it is evident that he intended all the people he taught to be part of the â€Å"Kingdom of God†. It was his full time role to teach in different places accompanied by his 12 disciples. Paul is of the greatest contributors to the spread of gospel approved in Christianity. He is credited for spreading Christianity to Rome. He has written a large number of epistles in the New Testament. Paul was particularly important in early Christianity

Friday, October 18, 2019

Geotechnical Essay Example | Topics and Well Written Essays - 4500 words

Geotechnical - Essay Example A simpler definition of a dam would be that it is a man-made barricade for water that is built across a river or large source/mass of water especially at the far ends so as to contain the water for use in various means. In the older days, this structure was used with people back then applying dynamic remote materials to contain the flow of water across a river and then engage the reserved the intended usage. This practice of building dams has been carried along historical lines and is still being practiced in the modern world by current generation. However, it is expected that the uses of dams may have been improved and made to be quite sophisticated due to the advancement in technology and techniques of setting up such structures. Currently, dams have been put to use in areas such as the generation of electric power, controlling of floods, supply water for commercial and domestic use, and in navigation among other uses. Subsequently, there are various dams that have been currently built in the world and one such dam is the Aswan High Dam that is situated in Egypt, and built across the Nile River by two main engineers, Maurice Fitzmaurice and Benjamin Baker. A study on this dam would reveal that it is approximately 3,600m in length and approximately 111m in height. The construction of the dam was completed in the year 1970, and its inauguration took place in January 1971. Other than the domestic uses that the dam has been to, it is used to generate electricity that approximates 10 billion kilowatts in a single year, much of which is supplied in the whole of Egypt. To this regard, it can be said that dams are of a great value to economies all over the world. A diagrammatic representation of the Aswan High Dam is as shown in the figure below. Dams are also constructed in various forms and natures and currently, the

A Public Relations Plan of Blackberry Essay Example | Topics and Well Written Essays - 2500 words

A Public Relations Plan of Blackberry - Essay Example Moreover, the ailing complementary PlayBook tablet. But one of BlackBerrys major strengths has all the time been information security. As written by enterprise mobile security expert Lisa Phifer, the BlackBerry OS includes a thorough collection of original security capabilities, for instance strong support for password security, AES encryption of data embedded on the device, automatic remote wiping and integrated data transport safeguard, all easily managed through flexible policies via BlackBerry Enterprise Server. At the moment, consumerization of IT has worn out what once was the BlackBerrys point of strength in enterprise (Pople & Turnbull, 2012). BlackBerry security has assumed a backseat to competitor`s flash and functionality, as most users are more concerned with introducing sexy back to devices in their pockets and also needing a solo device for both personal and business use (Tench & Yeomans, 2009). Most enterprise security teams, a few pressured by their executives, have tacitly permitted these mobile devices into their networks, opting to look the other way instead of identifying and addressing security problems these hugely unchecked devices present (Du, 2000). Now the security worry on consumer-centric mobile devices has become impossible for Blackberry to ignore and this is what warrants the establishment of public relation plan. Blackberry considers its target market to be people who are hyper-socially connected as well as true multi-taskers who require getting staffs done. In simple terms, Blackberry believes this is approximately a third of the entire available market globally. The company believes this target audience needs both a professional and Personal balance with simplicity. I’d also bet most of the users need this. For the past two months, close to 50 million new Android and iOS users have registered to exploit the company`s messaging service, BBM. So as to reach out

I will explain it in the instructions Essay Example | Topics and Well Written Essays - 500 words - 1

I will explain it in the instructions - Essay Example   Therefore, authorizing euthanasia results to doctor-assisted death of non-critical casualties1. Conservatives like in America wants a dominion on the world .Only if Americans synergetic ally work tough, and attain the potential, then they reign as the only cost-effective and martial superpower. Other countries will befriend them, work with us and trade with them but cannot manage to contest with them, whereas, liberals don’t want the nation to be much successful as such1. Liberals  consider the action of the state governance to provide opportunities fairly to all and equality.   It is upon the government to assuage the social ills to defend social independence, entity and human rights. The essential responsibility of government is to care for the general wellness and secretive civil rights which were considered inextricably associated if not similar people concur to restrictions on their conduct by conceding to government definite imperfect powers and only if the government policy represented in both public and private rights  while on the other hand, Conservatives  holds on individual accountability, partial government, liberal markets, character autonomy, traditional2.   Believe the task of government ought to endow people with the liberty required to practice the goals of their desire. Conventional policy commonly emphasizes on strengthening individuals to handle their own questions at hand1. The importance of ideology differences became a theoretical debate just after the assertion of the occurrence in political discourse2. This is due to the fact that main components of ideology cover political behavior and use of propaganda to obtain both within and global legitimacy to be recorded since in the past. A severe methodical investigation of the ideological mechanism in intercontinental associations turned out to be promising, subsequent to two situations that were realised. To

Thursday, October 17, 2019

Impact of Television Technology in Global Communication Research Paper

Impact of Television Technology in Global Communication - Research Paper Example In fact, 89% (1.42 billion) of all households worldwide have 1.6 billion TV sets with 4.2 billion (61% of the world’s total population) TV viewers (Ahonen 1). Particularly in the US, 99% of its households have TV sets and are watching at an average of four hours a day which when computed in a 65-year life would mean a total of nine years of television viewing, the A.C. Nielsen Co. says (Herr 1). â€Å"Its all-pervasiveness and instantaneity are finely tuned to our way of thinking†¦ [that] we expect from it effortless pleasure and hot news† (Peters 1).This captivating power of the television technology is essentially embedded in the very term ‘television’. Etymologically, the term ‘television’ (TV) is a combined term of different origins. The prefix ‘tele’ is from Ancient Greek that means ‘far’; the main word ‘visio’ is from Latin that means ‘sight’ or ‘seeing’. Hence, televis ion means ‘far seeing’ – a perfect term for the great miracle it offers mankind, as it amazingly extends man’s seeing capability beyond the limits of physical distance. (Stephens 46) Technically defined, â€Å"television is the electronic delivery of moving images and sound from a source to a receiver† (Noll, par.1). The receiver manipulates three kinds of different necessary information: the picture, the sound, and the synchronization. Amazingly, the picture is moving though not real but simply an optical illusion made possible by the rapid succession at 30 per second rate of slightly different still frames. (Videoforms 1) It is this experience that keep people hook up to the TV. Today, it has even become a necessity and has become an indicator of one’s socio-economic status. In fact, the global distribution of television ownership and use is illustrative of the so-called digital divide as can be seen in the following data. The Industrialize d World has 630 million TV sets in 470 million households with only 1.05 billion viewers, hence a ratio of 1.3 TV set for every household and a ratio of 1.6 viewers for every TV set. On the other hand, the Emerging World has 970 million TV sets in 950 million households but with 3.15 billion viewers, exactly three times larger than that of the Industrialized World, hence a ratio of only 1 TV set for every household and a ratio of 3.24 viewers for every TV set. Also, 34% of households in the Industrialized World own 2 or more TV sets; whereas, only 2% of households in the Emerging World own 2 or more TV sets. (Ahonen, par. 4) 1 The Evolution of Television How could a lifeless entertainment device greatly impact global communication? Understanding the evolution of TV from its inception to its current form (see Appendix) will help clarify this unexpected phenomenon. The television technology had its humble and skeptical beginnings, but except for the Internet is the 20th centuryâ€℠¢s most influential invention, Monaghan argues (1). Even its own inventors may not have imagined the development it has reached today and the further development it could reach in the future. The invention of the television cannot be attributed to a single person but many individuals (Bellis, â€Å"The Invention of Television† 1) whose works and accidental discoveries on optical, mechanical and

European Union Single Currency Policy Essay Example | Topics and Well Written Essays - 3000 words

European Union Single Currency Policy - Essay Example This paper illustrates that the European â€Å"dollar hegemony, thawed out frozen masses of immobilized capital, increased the volume and value of international trade, and opened and expanded markets on a vast scale. It created pressures that, if not irresistible, at least required better and more tenacious defenses, opened horizons beyond anything previously imaginable, yet also posed new regulatory challenges†. There are many advantages and disadvantages in implementing a change of work, place, policy, statute, condition or environment. There are successes, failures, and depression brought about by the fluctuations in a currency's market price. The following paragraphs explain the nuances of the single currency European Union economy and other related topics which are pegged on the European Union Dollar. European Union single currency policy is beneficial to its member countries. The potential benefits, as well as expenditures of the single European Monetary Unit, had been d iscussed at length in the European Commissions study entitled One Market, One Money. This report gave four major benefits that the single currency would bring to European Union member countries. The first benefit is the reduction in transaction costs. The second benefit is the reduction in risk. The third benefit would be the increase in competition. The last benefit would be the emergence of an international currency to compete on equal footing with the United States dollar. The first benefit is the reduction in transaction costs. The reduction of the transaction costs is connected with the decrease in the need to exchange the currency when one European Union Country like the United Kingdom would have to endure when buying a car from Germany, another European Union member state. Some of the members of the European Union include Sweden, Finland, Latvia, Lithuania, Denmark, United Kingdom, Ireland, Germany, Belgium, Luxemburg, France, Portugal, Spain, Italy, Austria, Hungary, Romania , Bulgaria, Poland and Slovenia.

Wednesday, October 16, 2019

Impact of Television Technology in Global Communication Research Paper

Impact of Television Technology in Global Communication - Research Paper Example In fact, 89% (1.42 billion) of all households worldwide have 1.6 billion TV sets with 4.2 billion (61% of the world’s total population) TV viewers (Ahonen 1). Particularly in the US, 99% of its households have TV sets and are watching at an average of four hours a day which when computed in a 65-year life would mean a total of nine years of television viewing, the A.C. Nielsen Co. says (Herr 1). â€Å"Its all-pervasiveness and instantaneity are finely tuned to our way of thinking†¦ [that] we expect from it effortless pleasure and hot news† (Peters 1).This captivating power of the television technology is essentially embedded in the very term ‘television’. Etymologically, the term ‘television’ (TV) is a combined term of different origins. The prefix ‘tele’ is from Ancient Greek that means ‘far’; the main word ‘visio’ is from Latin that means ‘sight’ or ‘seeing’. Hence, televis ion means ‘far seeing’ – a perfect term for the great miracle it offers mankind, as it amazingly extends man’s seeing capability beyond the limits of physical distance. (Stephens 46) Technically defined, â€Å"television is the electronic delivery of moving images and sound from a source to a receiver† (Noll, par.1). The receiver manipulates three kinds of different necessary information: the picture, the sound, and the synchronization. Amazingly, the picture is moving though not real but simply an optical illusion made possible by the rapid succession at 30 per second rate of slightly different still frames. (Videoforms 1) It is this experience that keep people hook up to the TV. Today, it has even become a necessity and has become an indicator of one’s socio-economic status. In fact, the global distribution of television ownership and use is illustrative of the so-called digital divide as can be seen in the following data. The Industrialize d World has 630 million TV sets in 470 million households with only 1.05 billion viewers, hence a ratio of 1.3 TV set for every household and a ratio of 1.6 viewers for every TV set. On the other hand, the Emerging World has 970 million TV sets in 950 million households but with 3.15 billion viewers, exactly three times larger than that of the Industrialized World, hence a ratio of only 1 TV set for every household and a ratio of 3.24 viewers for every TV set. Also, 34% of households in the Industrialized World own 2 or more TV sets; whereas, only 2% of households in the Emerging World own 2 or more TV sets. (Ahonen, par. 4) 1 The Evolution of Television How could a lifeless entertainment device greatly impact global communication? Understanding the evolution of TV from its inception to its current form (see Appendix) will help clarify this unexpected phenomenon. The television technology had its humble and skeptical beginnings, but except for the Internet is the 20th centuryâ€℠¢s most influential invention, Monaghan argues (1). Even its own inventors may not have imagined the development it has reached today and the further development it could reach in the future. The invention of the television cannot be attributed to a single person but many individuals (Bellis, â€Å"The Invention of Television† 1) whose works and accidental discoveries on optical, mechanical and

Tuesday, October 15, 2019

Research Report Essay Example | Topics and Well Written Essays - 3250 words

Research Report - Essay Example This saves the time that they would take in going to the ticket sale points in order to acquire them. This has also reduced the cases of theft by various parties involved in the processes of the designing of the manual tickets as most of them print extra ticked for sale without the knowledge of the management of the clubs (Benun, 2007, p.79). The money that they get from such activities go directly into their own pockets and this denies the clubs a lot of revenue. This is what has led to many companies and football teams adopting the technology of online ticketing for the purposes of saving time, money as well as maximizing on the revenue. The use of this technology also helps the clubs in knowing their members easily as fans are in a position of subscribing to the club’s website in order to gain membership. The fans are given their login details that they use to enter the website. After they have given their details, they are also notified through SMSs that are sent to them i nforming them of the upcoming matches and the ticketing information. This gives the fans in knowing when and where their team will be playing without having to rely on news from the mainstream media (Clark, 2003, p.48). The clubs are also able to sale their products such as merchandize through their website as the payments are done online and then delivery is done. Currently, nearly all the big clubs sale their tickets online and the sales can start as early as a week earlier before the kick off. In the website, the fans can acquire membership by creating their own accounts that they are identified with. The importance of the membership programs is that it gives them priority in matters ticketing as they become the first ones to get their tickets before the non-members. This can also give them the advantage of getting the tickets at cheaper prices as compared to the non-members. Literature review. Some websites are designed in a manner such that before one logs into the website, the y receive some messages that contain the codes that they use to enter (Krug, 2000, p.93). These are purposely for security to avoid things such as hacking. This also helps in avoiding things such as ticket broking whereby some other business people buy the tickets from the club at affordable rates and then sell them to other people at their own set price. This has the effect of locking out some fans from the stadium who cannot afford their ticket prices or even denying the club its revenue as potential clients are discouraged by the exorbitant prices set by the brokers, thinking that they are the clubs’ agents (Slatin, and Rush, 2002, p.78). Communication through SMS has been on a steady increase in personal matters, business and even purposes of information. Presently, many innovative applications are built on top of the technology of SMS and even development of more. Several organizations in the countries that are more developed have started using SMS services in interactio n with members and also sending notifications and alerts (Mueller, and Mueller, 2003 p.67). The major advantages of this technology is receiving and sending information to people and groups. Application of the SMS in web-based ecommerce The technology of SMS is now being applied in several organizations for delivery of their services in a more efficient and effective manner. The technology could be used in the provision of easy and quick access to the website of

Monday, October 14, 2019

Ipsec implementation

Ipsec implementation There are many methods to IP Security. In the Microsofts Windows 2003 the server version, there are many such techniques and tweaks which are useful to help provide a secure base to the system. The operating system is very good in protecting the system from attacks which may be active attacks or in some cases passive attacks. The procedures for IPSec are placed properly into the system which helps it tackle such attacks. This is possible by providing a secure packet filter for packet transport and also using cryptography. This technology is very in high use for communication types like host to host, router to router, gateway to gateway, site to site and also in virtual private networks. Some other places for successful implementation are secure servers. The IPSec comes as a basic Group Policy controlled by Dos Prompt commands and it also has user interface with custom programs installed. The implementation of IPSec involves these steps: Overview of IPSec Deployment Determining Our Internet Protocol Security targets Preparing a Internet Protocol Security Policy Implementation of the designed policies Overview of IPSec Deployment: There are many techniques such as usage of cryptography and authentication software to secure the communication in a network. The connection may be between two parties or between a group of users. Security is to make sure that the communication is not broken, the communication is not intervened and the data is not altered. The Internet Protocol Security has some features which help running a secure transmission. IPSec has set procedures which help achieve these ends. Today there are many companies and it is getting harder day by day to ensure the security of such humungous networks with a heavy workload on the networks. It is also very hard to track any attacks on the network in millions and millions of request. Using firewalls to protect a network did work for some days but it has proved to be impractical as it has no proper rules to detect intrusions or attacks. The advent of IPSec is a leap in computer and network security. This protocol has a wide spectrum of features which are strong enough to contain such high volume of network requests and also handle intrusions. The Internet Protocol for Security is not a versatile detection protocol. It is capable of managing most of the policies to grant or reject, block and negotiate the traffic in a network. This can also be permitted to a specific set of addresses or in some cases protocol and also a different policy to each port. It is recommended that we use ICF (Internet Connection Firewall) when we are in need of a firewall which is capable of providing a network interface for very big networks. This is because the internet protocol for Security has a very strict and a very stern strategy which is based on static filtering based on IP addresses. But this is it is totally different in the case of the Internet Connection Firewall. The ICF has policies which has a set of filter for all the addresses which are capable of being accessed. The Internet Protocol for Security can be used when the restriction is only to a particular set of addresses or the communication between a group of computers. There are many ways to use IPSec in a network but the best way is bye using a directory with all the domains and also a GP when needed. Some areas of interest when implementing IPSecurity: The decision of where we must secure computers and how on our network which can be done by running a group of systems in a directory which is also called as the Active Directory Organisational Units or OUs. The next step is to determine the strength of the policies we assign. Determining Our Internet Protocol Security targets: The first step in deploying IPSec on our server or the network can be done properly by deciding which set of systems are in dire need of security. There are surely some places on the network which are in a need of higher security than the other sections. It is for sure that IPSec is capable of providing optimal security but the problems starts when the network slows down due to the excessive data to be processed and also a large number of systems for IPSec to follow and maintain. In some cases, there are systems which are not upgraded to be able to support the IPSecurity. Determining Your IPsec Needs In beginning of the protocol design procedure, proper planning should be done to make sure that our current network environment available for use. It is always helpful to have a set of the network topology with all of its hardware and software components. This procedure is of high importance mainly in the designing procedure. IPSecurity is highly vulnerable to a network topology. There are many network topologies in which IPSec is not well suited. Preparing a Internet Protocol Security Policy: As said earlier, there are many network topologies which are not suitable to the default structure of the IPSec policies. There is a need to develop a custom IPSec set of policies well suited for the current network. Some organisations can run their network with a small set of policies. But in companies with a very huge network, there are many policies which are to be implemented properly and also a stringent structure is to be maintained. Steps below shows how IP Sec policies work. Designing IPsec Policies There might be some cases where the company or the organisation is interested in implementing a policy which sets a secure communication between two specified computers. This can be done by restricting all traffic and adding exceptions which relates to these two systems. This method can be done vice versa. A network can be setup with policies to allow all requests and block specific ports or computers. To implement such exceptions, a thorough analysis of the network is clearly needed. Computer roles: Security for Data Transmission: Security needs are different from each and every data packet transmitted. The security policies are also very different. There are many levels in this instance. When considering encryption, there are many types such as AES, DE5, RSA and many more. RSA is the best encryption software available presently. These programs can be used to secure files on transmission, on a network or even in the system. Operating System Computers: IPSecurity is a very unique technique used to implement security in a network. There are many operating systems which are not so advanced to implement IPSec. There is no support for IPSec. But there are many operating systems which are capable of running IPSec in transport mode. Some other cases, the policies are stored locally which makes it easier to decide as the implementation doesnt take long enough. In some cases, IPSec policies are implemented through the Group Policy. General IPSec Policy Settings General IPSec policy settings must be specified whether we want the policy to provide packet filtering or end-to-end networks. IPSec Rules IPSec rules determine which traffic is affected by an IPSec policy and which actions take place when that type of traffic is encountered. Table6.5 describes the contents of IPSec rules that two computers use to establish a secure, authenticated channel. Specifies a named list of filters. Each filter in the filter list specifies the types of traffic to which the filter action is applied. Filters can be defined to match specific IP protocols, source and destination TCP and UDP ports, and source and destination IP addresses. The filter list name might include the version number, the last update time, and the administrative owner. Each computer discards the filter list name during policy processing. Filter action Specifies whether a packet is permitted, blocked, or secured. If packets are to be secured, specifies how they are secured. A list of security methods specifies the security protocol, cryptographic algorithm, and session key regeneration frequency. Request Security Authentication methods One or more authentication methods, which are specified in order of preference. Available options are KerberosV5, certificate, or preshared key. Specifies whether to use tunnel mode and, if so, the tunnels endpoint. Specifies whether the rule applies to LAN connections, remote access connections, or both. Assigning IPSec Policies: As a domain administrator, we can configure IPSec policies to meet the security requirements of a user, group, application, domain, site, or global enterprise from a domain controller. IPSec policy can also be implemented in a non-Windows2000-based domain environment by using local IPSec policies. Deploying Our IPSec Solution: After scoping our needs, building IPSec policies, and determining our strategy for assigning the policies to specific OUs, test the IPSec policies in a lab environment and conduct a pilot project before rolling them out for production use. To ensure that IPSec policy functions as expected and provides the appropriate level of security, test specific IPSec policy configurations on clients and servers in a lab environment, and then conduct pilot or beta tests in a limited operational environment before conducting a full-scale deployment. A Cryptographic Evaluation of IPsec: Even with all the serious critisisms that we have on IPsec, it is probably the best IP security protocol available at the moment. We have looked at other, functionally similar, protocols in the past (including PPTP [SM98, SM99]) in much the same manner as we have looked at IPsec. None of these protocols come anywhere near their target, but the others manage to miss the mark by a wider margin than IPsec. This difference is less significant from a security point of view; there are no points for getting security nearly right. From a marketing point of view, this is important. IPsec is the current best practice, no matter how badly that reects on our ability to create a good security standard. Our main criticism of IPsec is its complexity. IPsec contains too many options and too much exibility; there are often several ways of doing the same or similar things. This is a typical committee efiect. Committees are notorious for adding features, options, and additional exibility to satisfy various factions within the committee. As we all know, this additional complexity and bloat is seriously detrimental to a normal (functional) standard. However, it has a devastating efiect on a security standard. It is instructive to compare this to the approach taken by NIST for the development of AES [NIST97a, NIST97b]. Instead of a committee, NIST organized a contest. Several small groups each created their own proposal, and the process is limited to picking one of them. At the time of writing there has been one stage of elimination, and any one of the five remaining candidates will make a much better standard than any committee could ever have made. The Complexity Trap: Securitys worst enemy is complexity. Complexity of IPsec In our opinion, IPsec is too complex to be secure. The design obviously tries to support many difierent situations with difierent options. We feel very strongly that the resulting system is well beyond the level of complexity that can be analysed or properly implemented with current methodologies. Thus, no IPsec system will achieve the goal of providing a high level of security. IPsec has two modes of operation: transport mode and tunnel mode. There are two protocols: AH and ESP. AH provides authentication, ESP provides authentication, encryption, or both. This creates a lot of extra complexity: two machines that wish to authenticate a packet can use a total of four difierent modes: transport/AH, tunnel/AH, transport/ESP with NULL encryption, and tunnel/ESP with NULL encryption. The difierences between these options, both in functionality and performance, are minor. The documentation also makes it clear that under some circumstances it is envisioned to use two protocols: AH for the authentication and ESP for the encryption. Modes As far as we can determine, the functionality of tunnel mode is a superset of the functionality of transport mode. (From a network point of view, one can view tunnel mode as a special case of transport mode, but from a security point of view this is not the case.) The only advantage that we can see to transport mode is that it results in a somewhat smaller bandwidth overhead. However, the tunnel mode could be extended in a straightforward way with a specialized header-compression scheme that we will explain shortly. This would achieve virtually the same performance as transport mode without introducing an entirely new mode. We therefore recommend that transport mode be eliminated. Recommendation 1 Eliminate transport mode. Without any documented rationale, we do not know why IPsec has two modes. In our opinion it would require a very compelling argument to introduce a second major mode of operation. The extra cost of a second mode (in terms of added complexity and resulting loss of security) is huge, and it certainly should not be introduced without clearly documented reasons. Eliminating transport mode also eliminates the need to separate the machines on the network into the two categories of hosts and security gateways. The main distinction seems to be that security gateways may not use transport mode; without transport mode the distinction is no longer necessary. Protocols The functionality provided by the two protocols overlaps somewhat. AH provides authentication of the payload and the packet header, while ESP provides authentication and confidentiality of the payload. In transport mode, AH provides a stronger authentication than ESP can provide, as it also authenticates the IP header fields. One of the standard modes of operation would seem to be to use both AH and ESP in transport mode. In tunnel mode, ESP provides the same level of authentication (as the payload includes the original IP header), and AH is typically not combined with ESP [KA98c, section 4.5]. (Implementations are not required to support nested tunnels that would allow ESP and AH to both be used in tunnel mode.) One can question why the IP header fields are being authenticated at all. The authentication of the payload proves that it came from someone who knows the proper authentication key. That by itself should provide adequate information. The IP header fields are only used to get the data to the recipient, and should not afiect the interpretation of the packet. There might be a very good reason why the IP header fields need to be authenticated, but until somebody provides that reason the rationale remains unclear to us. The AH protocol [KA98a] authenticates the IP headers of the loour layers. This is a clear violation of the modularization of the protocol stack. It creates all kind of problems, as some header fields change in transit. As a result, the AH protocol needs to be aware of all data formats used at loour layers so that these mutable fields can be avoided. This is a very ugly construction, and one that will create more problems when future extensions to the IP protocol are made that create new fields that the AH protocol is not aware of. Also, as some header fields are not authenticated, the receiving application still cannot rely on the entire packet. To fully understand the authentication provided by AH, an application needs to take into account the same complex IP header parsing rules that AH uses. The complex definition of the functionality that AH provides can easily lead to security-relevant errors. The tunnel/ESP authentication avoids this problem, but uses more bandwidth. The extra bandwidth requirement can be reduced by a simple specialized compression scheme: for some suitably chosen set of IP header fields X, a single bit in the ESP header indicates whether the X fields in the inner IP header are identical to the corresponding fields in the outer header.2 The fields in question are then removed to reduce the payload size. This compression should be applied after computing the authentication but before any encryption. The authentication is thus still computed on the entire original packet. The receiver reconstitutes the original packet using the outer header fields, and verifies the authentication. A suitable choice of the set of header fields X allows tunnel/ESP to achieve virtually the same low message expansion as transport/AH. We conclude that eliminating transport mode allows the elimination of the AH protocol as well, without loss of functionality. We therefore recommend that the AH protocol be eliminated. IPSEC methodology using different operating systems: IPSEC is a framework for security that operates at the Network Layer by extending the IP packet header. This gives it the ability to encrypt any higher layer protocol, including TCP and UDP sessions, so it offers the greatest flexibility of all the existing TCP/IP cryptosystems. While conceptually simple, setting up IPSEC is much more complex that installing SSH, for example. IPSEC also has the disadvantage of requiring operating system support, since most O/S kernels dont allow direct manipulation of IP headers. Linux IPSEC support (the FreeS/WAN project), for example, isnt included in the standard kernel distribution for this reason, and has to be applied as an add-on. Furthermore, putting the cryptography in the kernel isolates it from the application, making it more difficult to code crypto-aware software. Using SSL, for example, simply requires linking a library into the application and allows the application to easily query what certificates have been used to authenticate a client. IPSEC defines a Security Association (SA) as its primitive means of protecting IP packets. An SA is defined by the packets destination IP address and a 32-bit Security Parameter Index (SPI), that functions somewhat like a TCP or UDP port number. SAs can operate in transport mode, where the IPSEC data field begins with upper level packet headers (usually TCP, UDP, or ICMP), or in tunnel mode, where the IPSEC data field begins with an entirely new IP packet header, ala RFC 2003. Furthermore, SAs can be encapsulated within SAs, forming SA bundles, allowing layered IPSEC protection. For example, one SA might protect all traffic through a gateway, while another SA would protect all traffic to a particular host. The packets finally routed across the network would be encapsulated in an SA bundle consisting of both SAs. A common use of IPSEC is the construction of a Virtual Private Network (VPN), where multiple segments of a private network are linked over a public network using encrypted tunnels. This allows applications on the private network to communicate securely without any local cryptographic support, since the VPN routers perform the encryption and decryption. IPSEC is well suited for this environment, more so than tunneling PPP over SSL or SSH, since it operates directly on the IP packets and preserves a one-to-one correspondence between packets inside and outside the network. In the case of tunneling PPP over an encrypted TCP connection, any packet loss in the public network would trigger a TCP retransmission, stalling the link until the packet was delivered. In particular, running Voice Over IP (VoIP) traffic through a TCP/PPP tunnel would largely defeat the RTP protocol used for VoIP; IPSEC is better suited in this case. IPsec Development for Linux: In the Linux IPv4 IPsec world, a lot of people use FreeS/WAN projects implementation. It consists of an inkernel IPsec processing part, Key Exchange daemon Pluto and some utility commands/scripts. To run Pluto with small changes on our IPsec kernel implementation and reduce impact for user who use FreeS/WAN implementation, we have decided to keep compatibility with FreeS/WANs IPsec programming interface between kernel and userland. For this, we use the same PF KEY interface which FreeS/WAN project extended. In kernel IPsec packet processing part, we developed AH, ESP, SAD and SPD from scratch. PF KEY interface PF KEY(v2), which is described in RFC2367, is key management API mainly for IPsec. PF KEY is used for handling the IPsec Security Association Database. Additionally we have to handle the IPsec Security Policy Database, but there is no standard for the IPsec Security Policy management API. In FreeS/WAN implementation, PF KEY interface is extended to manage the IPsec Security Policy Database. Our kernel 2.4 IPsec implementation also uses the same PF KEY interface as FreeS/WANs one. It is important to be able to run the FreeS/WANs userland application (e.g., Pluto) with small changes. Encryption and Authentication algorithm We provide HMAC-SHA1 and HMAC-MD5 for authentication, NULL, DES-CBC, 3DES-CBS and AES for encryption. We thought encryption and authentication algorithm is not only used by IPsec and there are many algorithms so that we consider encryption and authentication algorithm and those interface should have good modularity. We adopted cipher modules which provided by CryptoAPI Project. Security Association and Security Policy SA and SP themselves dont depend substantially on the IP version. FreeS/WAN project architecture depends on their special virtual network interface for IPsec because it might focus on IPv4 tunnel mode (Their implementation also provides IPv4 transport mode). Their SA, SP, SAD and SPD also depend on their special virtual network interface. We considered and decided it was not suit to IPv6 because the IPv6 stack needed the neighbor discovery and the auto address configuration in its basic specification. If we had implemented IPv6 IPsec stack with their architecture, we had to implement those basic specification in their special virtual network interface. Therefore we implemented our own SAD and SPD in order to handle both IPv4 and IPv6. To improve the system performance, Each database will be locked by smallest granularity. And in many cases we use the read lock. SA and SP are managed by the reference counter to prevent used SA from removing by accident. IPsec Packet Processing Output There are various packet output paths from the IP(v4/6) layer to the network driver layer in Linux kernel networking stack (TCP, UDP/ICMP, and NDP[10] for IPv6). The packets which may be applied IPsec will go through these paths. We had to add IPsec functionality for these output paths, e.g, in IPv6 ip6 xmit() for TCP, ip6 build xmit() for UDP/ICMP and ndisc send ns()/ndisc send rs() for neighbor discovery packets. Output process is as follows): check IPsec SP lookup the IPsec SA by the IPsec SP apply IPsec processing to the packet output the packet to the network driver layer To reduce SA searhing time, we link the SP and the found SA after lookup from the first time. Input At input, there is only path for IP packets. We added IPsec processing part in ip6 input finish. Input process is as follows: receive the packet lookup the IPsec SA by SPI(which resides in AH/ESP header) check integrity and decrypt check IPsec Policy. IPsec Tunnel mode We are using IPv6-over-IPv6(and IPv4-over-IPv4) virtual tunnel device to implement IPsec tunnel mode. This implementation can avoid to duplication code of encapsulation/ decapsulation outer IP header compairing with having these code in the IPsec processing part itself. The virtual tunnel device is not different from the normal IP-over-IP virtual tunnel device in Linux. 4 IPsec implementation for kernel 2.6 The most important difference between ours and them is SAD/SPD part. They thought the whole SPD/SAD mechanic should be flow cache based lookup system shared by IPv4 and IPv6. One month later, they introduced the new network architecture called XFRM to Linux kernel 2.5. At first their developing code lacked IPv6 IPsec only for IPv4 IPsec. In order to suport IPv6 IPsec, we have implemented IPv6 IPsec code based on XFRM (and discarded our original code). PF KEY interface The PF KEY interface of Linux kernel 2.6(and 2.5) is compatible with KAME[3] PF KEY interface. We can use setkey command for configuring SA and SP and Racoon for IKE. Additionally we can add IPsec Policy each socket via Netlink3. They have suported only IPv4 in their first code, we have added IPv6 support. Security Association and Security Policy On the XFRM architecture, IPsec SP, which is represented as xfrm policy structure, will be bound to the routing flow cache (and IPsec policy will point IPsec SA bundle) and IPsec SA, which is represented as xfrm state structure, is included in destination cache, dst entry structure. The chaining destination cache means IPsec SA bundle. IPsec Packet Processing Output The output part of the XFRM architecture is placed between the IP layer and the network driver layer. In general, non IPsec packet will be passed to the network driver layer by a single destination output function, which is resolved routing lookup. But IPsec packet will be need to apply some IPsec processing (e.g., encryption, hash). XFRM functions make a chain of destination output functions (We call Stackable Destination, as shown in Figure3). Each function match each IPsec processing (AH, ESP and IPcomp[11]). To be more specific, in order to pass a packet to the network driver layer we have to do as follows. lookup routing table to decide output function by ip6 route output lookup IPsec Security Policy lookup IPsec Security Association(s) suitable for IPsec Security Policy and create destination chain to apply IPsec, pass a packet to the destination chain Input The input part of the XFRM architecture is simpler than output. The XFRM input function is handled as same as upper layer protocols like TCP, UDP, etc. In IPv6, IPsec headers are defined as IPv6 extension header but IPsec input functions are handled as an upper layer protocol handler. As the result of introducing IPv6 IPsec input processing in Linux. kernel, inconsistencies existed between IPsec headers and other IPv6 extension headers. In order to resolve this, we moved to the other IPv6 extension header handler functions to upper layer protocol handler. In detail, we registered IPsec header (both AH and ESP) handler functions with upper layer protocol handler array inet6 protos. Incoming IPsec packet processing flow is as follows: process IP packet from IP header in sequence process IPsec part (check integrity and decrypt) if founded check IPsec Security Policy pass IP packet next handler IPsec Tunnel mode Linux kernel 2.6 IPsec tunnel mode doesnt use the virtual tunnel device to create tunnel. The IPsec stack builds the outer IP header during IPsec processing by itself. IPSec Best practices Best practices IPSEC in transport mode has some serious advantages over other solutions. Compared to other technologies, IPSEC is built into to the Linux kernel. In other words there is nodaemonrunning in the background. Better yet, IPSEC does not require port-forwarding; some people elect to useSSH, stunnel, and other technologies that rely onport forwarding. With IPSEC, you simply have to run a program and its configuration file. After running it,encryptionbetween hosts is mandatory. Connections will be refused if the other connection does not have the appropriate keys. Groups of computers can share the same key, and it can even be done on a per-port setting (for example securing VNC, etc). Downsides? IPSEC in transport mode does have a couple draw backs. In transport mode you cannot have any dynamic setups where the IP addresses change from time to time. In other words, IPSEC is usually insufficient for workstation environments or dynamically assigned networks. Also, if you want to do a per-port setup the configuration becomes harder. Security Implications A very astute user can use IPSEC to bypass firewalls and other security measures. Since IPSEC uses cryptography, information is passed between machines in encrypted format. If the keys are not known, there is no practical way to decrypt the information (it is virtual impossible due to the sheer amount of time it would take). Machine-to-Machine IPSEC installations should be considered as Virtual Private Networks (VPNs) for security considerations. Please check with yoursystem administrator, business policies, and laws and regulations of your locality in order to establish whether or not to institute IPSEC. Requirements ipsec-tools package static IP addresses for each machine Configuration file The configuration file, /etc/setkey.conf, contains the information about the IPSECpolicy. Below is a sampleconfiguration policy(i.e. dont implement this policy because it is insecure). These lines are the actual keys and the encryption that will be used. The first block has the keys that will be used for authentication. In this case, it is the hmac-md5algorithm. The second block contains the keys that will be used for privacy, and the method of encryption. In the example, AES-CBC will be used, which is probably stronger than should be required; the key that we will be using is 194bits, meaning that it is good enough for US Government Secret and below classifications. The final block includes the actual policy. This is where you can put port numbers and even define whether it will be TCP orUDP. Generating the keys The more random the key, the better. Obviously, the example above is insufficient to secure a network. The following command will generate a random key. While running this command, youll need to wiggle the mouse to make it run faster. Or, if you are using a terminal use/dev/urandom instead. dd if=/dev/random count=16 bs=1| xxd -ps Depending on the size of the key that you want, adjust the count (16 will produce a 128 bit key, 24 will produce a 196 bit key, and 32 will produce a 512 bit key) The size of the key is important. If you really paranoid or just haveCPUcycles to

Sunday, October 13, 2019

Educational Philosophy :: Education Teaching Teachers Essays

Educational Philosophy â€Å"Let’s play school?† So many times when I was growing up would I pose this question to my younger brother. I would always play the role of the teacher and he would be my somewhat enthused student. Of course, childhood never lasts forever and the unforgiving world of adolescence greets us. I was a miserable thirteen year old, wishing for those days of pretending, while I suffered the torments of a bully and had the feeling that I would never be accepted or fit in. I wondered, would my peers ever treat me equally? Would I ever be able to be what society says a young woman should be? It was during this trying time that I realized my childhood game, coupled with my desire to make kids feel good about themselves, was my destined career choice. I was destined to be an educator. As time passed and I entered college I realized that with the ideas of Progressivism and Social Reconstructionism that I was meant to be a teacher who would teach kids facts and formulas and teach them self worth in the process. To me, school is much more than a place to learn about history and math and reading, it’s a place to grow socially and emotionally. I believe it is vitally important to teach character development and self worth at an early age. This way, by the time a child hits puberty, they have a sense of self-pride, they feel they have a special gift or talent that makes them unique and important in society. Perhaps if I had had an elementary school teacher who taught me these things, then middle school wouldn’t have been such a difficult struggle for me. Many future teachers I speak with say that they want to teach out of West Virginia. They say they want to teach in a big city where they can get a high paying teachers job. But you can’t put a price tag on education; children here in the mountain state need young, dynamic teachers with fresh ways of thinking, as current teachers reach retirement age. This is why I want to teacher in West Virginia.

Saturday, October 12, 2019

Comparing Love in Go Tell It on the Mountain, Giovannis Room, and Anot

     Ã‚  Ã‚  Ã‚   Baldwin’s first three novels -Go Tell It on the Mountain, Giovanni's Room, and Another Country-boil over with anger, prejudice, and hatred, yet the primary force his characters must contend with is love.   Not meek or mawkish but "...something active, more like fire, like the wind" (qtd. in O'Neale 126), Baldwin's notion of love can conquer the horrors of society and pave the way to "emotional security" (Kinnamon 5).   His recipe calls for a determined identity, a confrontation with and acceptance of reality, and finally, an open, committed relationship.   Though Baldwin's characters desperately need love, they fail to meet these individual requirements, and the seeds of love they sow never take root and grow to fruition.    Baldwin's fixation with love, especially a love perpetually denied, arises from his past, which colors must of his writings.   Baldwin never knew his father.   He endured the brunt of his stepfather's abuse simply because he was not his true son.   Similarly, Baldwin's characters never receive familial love and are cast out, with neither support nor an understanding of love, into a world of hatred.   Baldwin never forgot his cold, strict, intolerant stepfather, David Baldwin, and this failed relationship between father and son forms the basis for his first novel, Go Tell It on the Mountain.   Also fundamental to Baldwin's works is his homosexuality, which plays a predominate role in Giovanni's Room and Another Country.   He favors the homosexual characters, who come closest to achieving love, not merely on account of their sexuality, but because they tend to meet more of Baldwin's prerequisites: "In his most elegant formulation, [Baldwin] remarked that the word homosexual might be an adjective, perhaps a... ...unity."   MELUS 10 (1983), 27-31.   Rpt. in Fred L. Standley and Nancy V. Burt.   Critical Essays on James Baldwin.   Boston: G. K. Hall, 1988. O'Neale, Sondra A.   "Fathers, Gods, and Religion: Perceptions of Christianity and Ethnic Faith in James Baldwin."   In Fred L. Standley and Nancy V. Burt.   Critical Essays on James Baldwin.   Boston: G. K. Hall, 1988. Pratt, Louis H. James Baldwin.   Boston: Twayne, 1978. Rosenblatt, Roger.   "Out of Control: Go Tell It on the Mountain and Another Country."   In Black Fiction.   N.p.: Harvard University, 1974.   Rpt. in Harold Bloom ed.   James Baldwin.   New York: Chelsea House, 1986. Standley, Fred L.   "James Baldwin: The Artist as Incorrigible Disturber of the Peace." Southern Humanities Review 4 (1970), 18-30.   Rpt. in Fred L. Standley and Nancy V. Burt.   Critical Essays on James Baldwin.   Boston: G. K. Hall, 1988. Comparing Love in Go Tell It on the Mountain, Giovanni's Room, and Anot      Ã‚  Ã‚  Ã‚   Baldwin’s first three novels -Go Tell It on the Mountain, Giovanni's Room, and Another Country-boil over with anger, prejudice, and hatred, yet the primary force his characters must contend with is love.   Not meek or mawkish but "...something active, more like fire, like the wind" (qtd. in O'Neale 126), Baldwin's notion of love can conquer the horrors of society and pave the way to "emotional security" (Kinnamon 5).   His recipe calls for a determined identity, a confrontation with and acceptance of reality, and finally, an open, committed relationship.   Though Baldwin's characters desperately need love, they fail to meet these individual requirements, and the seeds of love they sow never take root and grow to fruition.    Baldwin's fixation with love, especially a love perpetually denied, arises from his past, which colors must of his writings.   Baldwin never knew his father.   He endured the brunt of his stepfather's abuse simply because he was not his true son.   Similarly, Baldwin's characters never receive familial love and are cast out, with neither support nor an understanding of love, into a world of hatred.   Baldwin never forgot his cold, strict, intolerant stepfather, David Baldwin, and this failed relationship between father and son forms the basis for his first novel, Go Tell It on the Mountain.   Also fundamental to Baldwin's works is his homosexuality, which plays a predominate role in Giovanni's Room and Another Country.   He favors the homosexual characters, who come closest to achieving love, not merely on account of their sexuality, but because they tend to meet more of Baldwin's prerequisites: "In his most elegant formulation, [Baldwin] remarked that the word homosexual might be an adjective, perhaps a... ...unity."   MELUS 10 (1983), 27-31.   Rpt. in Fred L. Standley and Nancy V. Burt.   Critical Essays on James Baldwin.   Boston: G. K. Hall, 1988. O'Neale, Sondra A.   "Fathers, Gods, and Religion: Perceptions of Christianity and Ethnic Faith in James Baldwin."   In Fred L. Standley and Nancy V. Burt.   Critical Essays on James Baldwin.   Boston: G. K. Hall, 1988. Pratt, Louis H. James Baldwin.   Boston: Twayne, 1978. Rosenblatt, Roger.   "Out of Control: Go Tell It on the Mountain and Another Country."   In Black Fiction.   N.p.: Harvard University, 1974.   Rpt. in Harold Bloom ed.   James Baldwin.   New York: Chelsea House, 1986. Standley, Fred L.   "James Baldwin: The Artist as Incorrigible Disturber of the Peace." Southern Humanities Review 4 (1970), 18-30.   Rpt. in Fred L. Standley and Nancy V. Burt.   Critical Essays on James Baldwin.   Boston: G. K. Hall, 1988.

Friday, October 11, 2019

A class performance Essay

magine you are going to direct act 3 scene 4 for a class performance what advice would you give to your actors to make this scene interesting and tense? Hello, with the performance creeping closer all the time we need to look at act 3 scene 4 so today we will be concentrating on that, I will be giving you all some advice to made the scene tense and interesting for your audience who will be watching you all I will first go thought the basis plot of this scene telling you in detail of a few important features. So here we go Macbeth and his wife lady Macbeth are hosting a banquet at their castle the other lords attending are Ross, Lennox and other lord that are un-named. Macbeth and Lady macbeth enter and sit on the thrones provide for them there is some dialog greeting the lords and thanking them for them for coming before this scene macbeth has ordered two murders to go and kill his loyal friend Banquo and his son Flence because they are a threat to Macbeth as Banquo is the only other one except lady macbeth that knows about the witches and their predictions in the predictions the witches tell Banquo he will not be king himself but he will father a line of kings so Macbeth feels that if Flence is dead then there is no way that will happen and no one will take over from Macbeth as king, but the murder bring bad news he has successfully killed banquo but his son escaped. Macbeth is not too worried because he does not feel he is too much of a threat at the moment but will grow up to be trouble. Lady macbeth still knows nothing and is carry on with the banquet while Lady macbeth is talking to the lords Banquos ghost enters and sit in Macbeths place no one else can see this because it is in Macbeth mind the lords start to ask Macbeth to take a seat on the table to join in with the feast but Banquo ghost is sat there. The other lords can’t work out why Macbeth won’t sit down and join them. Macbeth then starts to talk about Banquo to the lords and says that he could not make it tonight. Inside Macbeth mind the ghost is talking over. Macbeth starts to talk to the ghost Lady Macbeth and the lords are very puzzled by this. One of the lords Ross say the king is unwell Lady macbeth reassures the lords that everything is fine then talks to Macbeth on her own Macbeth tells her what he sees Lady macbeth tells him to behave and act like a man and it is all in your head. They both resume back to the lords, as Macbeth can no longer see the ghost. But the he comes back. In angry Macbeth starts shouting at Banquos ghost. Ross asks him what he sees but Lady macbeth steps in so that he doesn’t say anything she asks them all to leave which they do they are very puzzled as to the way the king has acted. But noting is said. After they have all left Macbeth and Lady macbeth talk Macbeth is going on about how Banquo and he is dead and his blood is on his hands, At the end of the scene Lady macbeth says â€Å"you lack the seasons of all natures, sleep. He is lacking this sleep because thought out the play sleep is one of the main themes and it is only for innocent people which he is not because he has killed Duncan he was killing god too because they though that the king was god so they had gone against god and killed him. So they were now evil and they would have no sleep. Well that is a round up of this sence as you can see it is one that needs a lot of effort put into to keep the audience concentrating on the play. Paul as Macbeth you have a big role to play in this scene also do you Pam Lady macbeth is trying very hard to take control over the situation and stop Macbeth spilling the beans on the bad deeds that he has done. You need to make sure that you look like you are in control of the matter and know how to handle it. When you are telling Macbeth to act like a man you need to be very harsh with him knock him back into the real world and make him see sense. Paul when you are talking to Banquos ghost at first you are very scared but then you could out of your shell slowly and face up to him, you will need to speak as if you are angry so talk in a low husky voice. Pam your voice needs to be firm and stern both of you need to act tired as you can as both of you are getting no sleep as I have already explained so if you take all this information I have told you today and work on it you will have them all hanging off the edge of their seat thank you for you all coming today I hope this advice has been help to you all.

Thursday, October 10, 2019

Imperatives for Developing My Transformational Leadership Potential: Some Plans Essay

The word â€Å"leader† first appeared in the English language in the 1300s; it stems from the root â€Å"leden† meaning â€Å"to travel† or â€Å"show the way.†   The term â€Å"leadership†, however, followed only some five centuries later.   One can sift through many definitions of the term â€Å"leadership† and fail to find a single ‘common denominator’ that will unite all of them. This may be because there are so numerous, varying usages of the term in equally numerous and complicated situations.   However, for purposes of this paper, the following definitions used in many leadership studies were adopted: Leadership was broadly defined by Yukl (1989) as â€Å"influencing task objectives and strategies, influencing commitment and compliance in task behavior to achieve these objectives, influencing the culture of an organization.†Ã‚   In simpler terms, leaders influence the actions and behaviours of their followers to obtain a shared vision or aim.   According to Deming (1992), leadership must come from top management and leaders must possess profound knowledge. By profound knowledge, Deming meant that one must have knowledge of systems, variations (statistical thinking), theory, and psychology. Leadership is quite different from management; leaders grow from mastering their own conflict which arises during their developing years using internal strength to survive. On the other hand, managers tend to perceive issues as positive progressions of events which must be planned, organized, scheduled, and controlled.   In order to create the proper thinking perspective, leaders must aggressively investigate and act on the current market to create opportunities.   Effective leaders are those that are capable of assisting their organization/country manage change and steer it towards success. Past Work Experience I have had the opportunity to work with a local company; at peak work periods, I am tasked to manage a small team of 4 staff. Some of the responsibilities involved in this role are delegation of work; prioritizing tasks based on urgency and importance; reporting regularly to my superior for updates and new directives; and updating my superior at the end of the day for concerns and accomplishments. Moreover, it requires me to plan and manage my own time. Effective people skills are as critical as the management of tasks in a team leader’s role. It is necessary for me to create and manage smooth working relationships with line managers, colleagues, and team members. I am also expected to manage their performance by clearly explaining to them standards of work and behavior. An Assessment of My Leadership Style I personally want to develop a transformational leadership style that is more dynamic, innovative and accepting of change than that espoused by a management role. Tichy and Devanna (1986) assert that managers engage in very little change but manage what is present and leave things much as they found them when they depart. Transformational leadership, they declared, focuses on change, innovation, and entrepreneurship. They assumed that transformational leaders begin with a social fabric, disrupt that environment, and then recreate the social fabric to better reflect the overall business climate (Bass, 1990). They argue that there are four suggested personal characteristics of a transformational leader: (a) dominance, (b) self-confidence, (c) need for influence, and (d) conviction of moral righteousness. These are the traits that I have to focus on in undertaking my development plan. Transformational leaders are expected to deal with the paradox of predicting the unknown and sometimes the unknowable.   These leaders change and transform the organization according to a vision of a preferred status. Leaders then are change makers and transformers, guiding the organization to a new and more compelling vision, a demanding role expectation. Studies have been carried out in many different countries, and research in this area also shows that transformational leadership is closer to perceptions of ideal leadership than transactional leadership.   As Hartog et al (1999) note, being perceived as a leader is a prerequisite for being able to go beyond a formal role in influencing others.   They hold that leadership perceptions can be based on two alternative processes.   First, leadership can be inferred from outcomes of salient events, and attribution is crucial in these inference-based processes. For example, a successful business ‘turnaround’ is often quickly attributed to the high quality ‘leadership’ of top executives or the CEO.   Leadership can also be recognized based on the fit between an observed person’s characteristics with the perceivers’ implicit ideas of what ‘leaders’ are (Hartog et al., 1999). This again points to the fact that an effective manager is not only focused on delivering tasks, but on handling his people well. This is especially true among people in the organization who put high premium on a manager’s interpersonal skills. The first step I will consider in my developmental plan is to maintain my enthusiasm and motivation of my team towards their work. Concurrently, I will also aim to develop my leadership potential. I will concretely undertake this by developing a strong mentoring relationship with my superior. Empirical research from both educational and industrial settings suggests that students and employees both have increased probability of success if they have had a mentor. While mentors are effective for everyone, sometimes organizations implement mentoring programs to support particular parts of their populations, often newer employees. And while mentoring programs are always established with the best of intentions, their results are often mixed (Werner, 2004). To make the most of my work exposure, I hope to establish a strong mentoring relationship with my superior or with an expert in my field to develop my competence further. Coaching and mentoring is a very effective way of developing my leadership potential because it does not only develop me in terms of technical expertise, but it will also allow me to actually experience how these experts undergo the coaching and mentoring exercise. Skills Acquisition Skill acquisition acknowledges that proficiency and expertise are a function of the exposure to a variety of situations. These circumstances become experiences for the learner to elicit apt responses. Bandura (1977) emphasized that most learning transpires by observing and modeling behaviors. Information is then stored and coded cognitively and utilized as guide for action. He further noted that the development of a realistic learning setting incorporating environment, behavior, and thought promotes the acquisition of complex skills. Moreover, simulation can help in providing this realistic exposure for neophyte professionals (Bandura, 1977). Because I have gone past beyond being a novice, now is the perfect time for developing strategic leadership skills. I will also be able to add on to my networks by attending conferences related to my field to be able to build and establish peer contacts. I will also endeavor to build relationships with members and managers of other teams within the organization. The following soft competencies have been recommended areas for leadership development by the Development Dimensions International website (2005): master at managing through ambiguity; inspires confidence and belief in the future; have a passion for results; are marked by unwavering integrity; set others up for success; have strong rather than big egos; and have the courage to make big decisions. Mastery at managing through ambiguity. Build a culture that embraces change; constantly set clear goals and expectations; are able to manage across boundaries (and lead others to do the same); show connections between individual accountabilities, team goals, and organizational vision and strategies; sets out a clear course even though it may change frequently. Inspires confidence and belief in the future. Are able to articulate a vision depicting what they want their organization; exudes calm and projects optimism in the face of uncertainty; can engage and inspire employees in their work connecting their needs and values with those of the institution. Passion for results. Set clear accountabilities and high expectations for themselves and for others; hire, promote and reward high performers; keep themselves and their employees focused on the top two or three customer-driven priorities; take action on those who do not fit or who are consistently not performing; establish critical measures of success and make sure they are visible to others. Marked by unwavering integrity. Serve as a â€Å"moral compass† for others; keeps promises and commitments; â€Å"walks the talk†; gives straight, honest feedback; leads through values; acts promptly when their own or the integrity of their organization is compromised.    Set others up for success. Coaches others to succeed before they have the opportunity to fail; truly enjoys seeing people learn and grow; rewards and recognizes success; views failures as learning opportunities; shares (rather than hordes) talent for the good of the organization. Have strong rather than big egos. Humbly shares credit with others; never shoots the messenger – they encourage the sharing of bad news; are always asking â€Å"how can we do things better?†; blame themselves before pointing a finger at others; knows themselves and are guided by strong personal values; listens to understand; recognizes that they, more often than not, are not the ones with the right answers.    Have the courage to make big decisions. Addresses issues or problems quickly; takes actions that are right, even when they are unpopular – they act on conviction; stands by their decisions once they make them – even if circumstances cause them to change course later; takes a longer term view consistent with a future vision (www.ddiworld.com, 2005). Soft skills are as equally if not more important than technical skills, in the development of leadership potential. These competencies must also be integrated into my success competency profile and adequately addressed through formal classroom or on-the-job training. Naturally, to be able to identify which leadership areas I need to focus on, I need to use reflection. The main approach is to develop fully into a transformational leadership role. With transformational leadership, the followers feel trust, admiration, loyalty and respect towards the leader and they are motivated to do more then they originally expected to do. Leaders transform and motivate followers by: (1) making them more aware of the importance of task outcomes, and (2) inducing them to transcend their own self-interest for the sake of the organization or team and activating their higher order needs. In contrast, transactional leadership involves an exchange process that may result in follower compliance with leader requests but is not likely to generate enthusiasm and commitment to task objectives. Therefore, my staff need to feel that I can empathize with them, are able to give them feedback while maintaining their self-esteem, and also solicit their ideas on important issues. Transformational and transactional leadership are distinct but not mutually exclusive processes. Transformational leadership increases follower motivation and performance more than transactional leadership, but effective leaders use a combination of both types of leadership.   Such is the argument of   Gary Yukl (1989).   He defined transformational behavior as idealized influence, individualized consideration, inspirational motivation and intellectual stimulation. Yukl theorized that transformational leadership probably involves internationalization because inspirational motivation includes the articulation of an appealing vision that relates task objectives to follower values and ideals, it therefore also involves personal identification.   Yukl (1989) described transformational leadership as a process of micro-level and macro-level influence. At the macro-level, transformational leaders must take charge of the social systems and reform the organization by creating an appropriate power situation. At the micro-level, transformational leaders must attend to the personalities in the organization to facilitate change at an interpersonal level. One other way of developing my leadership potential is by regularly reflecting on areas for improvement. In this area, the feedback of my superior would serve as critical input. There is now broad agreement on four key attributes, therefore, known as the four i’s of Transformational Leadership (Avolio et al., 1991; Bass & Avolio, 1994b). Inspirational leadership means ‘the arousal and heightening of motivation among followers that occurs primarily from charismatic leadership’ and individualized consideration is evident when subordinates are treated individually according to their needs. Intellectual stimulation refers to the leader’s influence on followers’ thinking and imagination (Bass, 1985, pp. 62,82 and 99). And, finally, idealized influence is the identification with and emulation of the leader’s mission and vision. Apart from focusing on my own leadership needs, I would also like to assist in the drafting of Career Management plans of the members of my team. I would also like to ensure that I continuously serve as a model and inspiration for them in terms of giving support, praise and encouragement to all team members. Moreover, I will work for the implementation of retention strategies among the team members I work with through career development,   flexible work, induction, partnership and staff involvement, and pay and rewards. Some Comments on the Transformational Leadership Framework / Theory In contrast with leader emergence which deals with the likelihood that a person will become a leader, leader performance involves the idea that excellent leaders possess certain characteristics that certain leaders do not. For example, an excellent leader might be intelligent, assertive, friendly, and independent, whereas a poor leader might be shy, aloof, and calm. Research on the relationship between personal characteristics and leader performance has concentrated on three areas: traits, needs and orientation. In relation to transformational leadership framework, I do agree that the leader must possess certain characteristics to transform the organization. But this is not all – there must also be ample consideration of other factors such as subordinates’ ability and organizational climate. Traits. The idea that certain traits are associated with effective leadership is appealing, but in 1964, a review by Heslin and Dunphy indicated that only two traits – intelligence and interpersonal adjustment – have consistently been related to leadership performance. More recently, it has been proposed that good leaders need to possess only one stable trait – adaptability or self-monitoring (Cohen & Bradford, 1990). Thus, good leaders will constantly change their behaviors to meet the demands of the situation or person with whom they are dealing. Support from this theory comes from a study by Caldwell & O’Reilly (1982), who found that field representatives who dealt with many different types of people were more effective if they were high self-monitors. Similar results were found with Zaccaro, Foti & Kenny (1991). The concept of self-monitoring focuses on what leaders do as opposed to what they are. For example, a high self-monitoring leader may possess the trait of shyness and not truly want to communicate with other people. He know, however, that talking to others is an important part of his job, so he says hello to his employees when he arrives at work, and at least once a day stops and talks to each employee. Thus, the leader has the trait of shyness but adapts his outward behavior to appear to be outgoing and confident. An interesting extension of the trait theory of leader performance suggests that certain traits are necessary requirements for leadership excellence but that they do not guarantee it (Simonton, 1979). Instead, leadership excellence is a function of the right person being in the right place at the right time. The fact that one person with certain traits becomes an excellent leader while another with the same trait flounders may be no more than the result of timing and chance. Needs. A personal characteristic that has received some support to a leader’s need for power, need for achievement, and need for affiliation. Research by McClelland and Burnham (1976) and McClelland and Boyatzis (1982) have demonstrated that high-performance managers have a leadership motive pattern, which is a high need for power and a low need for affiliation. The need is not for personal power but for organizational power. This pattern of needs is thought to be important because it implies that an effective leader should be more concerned with results than with being liked. Leaders who need to be liked by their subordinates will have a tough time making decisions. A decision to make an employee work overtime, for example, may be necessary for the organization’s survival, but it will probably be unpopular with employees. Leaders with high affiliation needs may decide that being liked is more important than being successful, causing conflict with their decision. Needs for power, achievement and affiliation can be measured through various psychological tests. The most commonly used is the Thematic Apperception Test (TAT). The TAT is a projective test in which a person is shown a series of pictures and is asked to tell a story about what is happening in each picture. The stories are then analyzed by a trained psychologist who identifies the needs themes that are contained in the stories. Obviously, this technique is time consuming and requires a great deal of training. Task vs. person orientation. Over the last 45 years, three major schools of thought – Ohio State studies (Fleishman, Harris & Burtt, 1955), Theory X (McGregor, 1960) and managerial grid (Blake & Mouton, 1984) – have postulated that differences in leader performance can be attributed to differences in the extent to which leaders are task versus person oriented. Person-oriented leaders (country club leaders, theory Y leaders, leaders in high consideration) act in a warm and supportive manner and show concern for their subordinates. Person-oriented leaders believe that employees are intrinsically motivated, seek responsibility, are self-controlled, and do not necessarily dislike work, Because of these assumptions, person-oriented leaders consult their subordinates before making decisions, praise their work, ask about their families, look over their shoulders, and use a more â€Å"hands-off† approach to leadership. Under pressure, person-oriented leaders tend to become socially withdrawn (Bond, 1995). Task –oriented leaders (task-centered leaders, theory X leaders, leaders high in initiating structure) define and structure their own roles and those of their subordinates to attain the group’s formal goals. Task-oriented leaders see their employees as lazy, extrinsically motivated, wanting security, undisciplined, and shirking responsibility. Because of these assumptions, task-oriented leaders tend to manage or lead by giving directives, setting goals, and making decisions without consulting their subordinates. Under pressure, task-oriented leaders tend to produce humor (e.g. tell jokes and stories) whereas person-oriented leaders tend to appreciate humor (e.g. listen to others’ jokes) (Philbrick, 1989). I feel that the best leader who may undertake transformation in the organization ought to be both person and task-oriented. In effect, in being a transformational leader, I should put premium on both person and task orientations, exhibiting each one with equal strength or emphasis. Interaction between the Leader and the Situation Apart from just focusing on the leader, I feel it is equally important for him to consider the complexities of his situation so that he may have a better grasp of how it is to transform the organization. In line with this, I should also be able to focus not only on developing myself but also consider the characteristics of the situation which I find myself in. One of the more recent research on this area is the situational theory of Geier, Downey and Johnson (1980) who believed that the leader has one of six behavioral styles, namely, informational, magnetic, position, affiliation, coercive or tactical. Each type is only effective in a particular situation, or in what researchers call an organizational climate. These researchers further say that based on the organizational climate, a leader with an informational style is best fit in ac climate of ignorance; those with magnetic style in a climate of despair; those with a position style in a climate of instability; affiliation style in a climate of anxiety; coercive style in a climate of crisis; tactical style in a climate of disorganization. This suggests that as a transformational leader, I should be able to adjust myself on the basis of my assessment of my organization’s climate. Relationship with Subordinates One other facet of transformational leadership which I intend to integrate into my personal development plan is my relationship with subordinates. This is consistent with the vertical dyad linkage theory. Vertical dyad linkage (VDL) theory was developed by Dansereau, Graen, and Haga (1974) and is a unique situational theory that makes good intuitive sense. Some situational theories concentrate on interactions between leaders and situations and between leaders and employees with differing levels of ability. VDL theory, however, concentrates on the interactions between leaders and subordinates. These interactions are called leader-member exchanges (LMXs). The theory takes its name from the relationship between two people (a dyad), the position of the leader above the subordinate (vertical), and their interrelated behavior (linkage). VDL theory states that leaders develop different roles with different subordinates and thus act differently with different subordinates. Dansereau et al (1974) believe that subordinates fall in one of two groups, the in-group or the outgroup. In-group subordinates are those who have developed trusting, friendly relationships with the leader. As a result, the leader deals with in-group members by allowing them to participate in decisions and by rarely disciplining them. Thus, in-group membership is thought to increase performance. Out-group subordinates are treated differently from those in the in-group and are more likely to be given direct orders and to have less say about how affairs are conducted. In general, research on VDL theory has been supportive (Grestner & Day, 1997). There are, however, relationships between leaders and subordinates that probably can be categorized into types other than in-group and out-group. In relation to transformational leadership, I should increase my self-awareness in treating my subordinates such that there is no rigid classification of whether they are members of the in-group or the out-group. Under the transformational leadership framework, all subordinates are encouraged to participate in decision making. As such, I should try my best to gather input from all of my staff to be able to come up with the most optimal solution to a problem or an issue. Subordinate Ability Apart from self-development, the transformational leader must also be wary of his subordinates’ abilities in carrying out his plan for change or transformation. According to House’s (1971) path goal theory, a leader can adopt one of four behavioral leadership styles to handle each situation: instrumental, supportive, participative and achievement-oriented. The instrumental style calls for planning, organizing, and controlling the activities of employees. The supportive style leader shows concern for employees, the participative style leader shares information with employees and lets them participate in decision making, and the leader who uses the achievement oriented style sets challenging goals and rewards increases in performance. Each style will only work in certain situations and depends on subordinates’ abilities and the extent to which the task is structured. In general, the higher the level of subordinate ability, the less directive the leader should be. Likewise, the more structured the situation, the more directive the leader should be (Schriesheim & DeNisi, 1981). In conclusion, I feel that the transformational leadership framework is wanting of some considerations. Apart from just focusing on the leader himself, the plan should include a grave consideration of other important factors, such as his subordinates’ ability and the organizational climate in which the leader operates. My transformational leadership development plan, in summary, will equip me with the necessary technical and leadership competencies towards effectively taking on a management role, whilst seriously considering my subordinates’ abilities and the culture of the company I am working for. Ultimately, this will reflect in being able to lead and motivate a team – who in themselves are competent, goal-driven and are able to contribute to the organization’s bottomline. References Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavior change. Psych Rev . 1977;84:191–215. Bass, B. (1990). Bass & Stogdill’s handbook of leadership: theory, research and managerial   Ã‚  Ã‚  Ã‚  Ã‚   applications. New York: The Free Press. Blake, R. R., & Mouton, J. S. (1984). The managerial grid III. Houston: Gulf. Bond, G. E. (1995). Leadership behavior: How personality, stress, and gender affect leader behavior. University of Washington. Caldwell, D. F., & O’Reilly, C. A. (1982). Boundary spanning and individual performance: The impact of self-monitoring. Journal of Applied Psychology, 67, 124-127. Cohen, A R., & Bradford, D. L. (1990). Influence without authority. New York: John Wiley. Dansereau, F., Graen, G., & Haga, W. J. (1975). A vertical dyad linkage approach to leadership within the formal organization. Unpublished report, State University of New York, Buffalo. Deming, W. E. , (1992) Leadership, Four Day Seminar – Charlotte, NC, October 27 – 30. Development Dimensions International. (2005). DDI’s leadership beliefs. Retrieved on December 17, 2006 from www.ddiworld.com. Fleishman, E. A., Harris, E. F., & Burtt, H. E. (1955). Leadership and supervision in industry. Columbus: Ohio State University Press. Geier, J. G., Downey, D. E., & Johnson, J. B. (1980). Climate impact profile. Minneapolis, MN: Performax Systems International. Gerstner, C. R, & Day, D. V. (1997). Meta-analytic review of leader-member exchange theory: Correlates and construct issues. Journal of Applied Psychology, 82(6), 827-844. Hartog, D. N., House, R.. J., Hanges, P. J., et al. (1999). Culture specific and cross-culturally generalizable implicit leadership theories: Are attributes of charismatic/ transformational leadership universally endorsed? Leadership Quarterly, 10(2), 219-256. House, R. J. (1971). A path-goal theory of leader effectiveness. Administrative Science Quarterly, 9, 321-332. McClelland, D. & Boyatzis, R. E. (1982). Leadership motive pattern and long-term success in management. Journal of Applied Psychology, 67, 737-743. McClelland, D. & Burnham, D. H. (1976). Power is the great motivator. Harvard Business Review, 54(2), 102-104. McGregor, D. (1960). The human side of enterprise. New York: McGraw-Hill. Philbrick, K. D. (1989). The use of humor and effective leadership styles. University of Florida. Schriesheim, C. A., & DeNisi, A. S. (1981). Task dimensions as moderators of the effects of instrumental leadership: A two-sample replicated test of path-goal leadership theory. Journal of Applied Psychology, 66, 589-597. Tichy, Noel and M.A. Devanna (1986). The Transformational Leader, John Wiley and Sons. Werner, W. (2004). The importance of mentoring. Law Practice Today. Retrieved on December 17, 2006 from http://www.abanet.org/lpm/lpt/articles/mgt07041.html Yukl, G. (1989). Managerial leadership: A review of theory and research. Journal of Management, 15(2), 251 – 289. Zaccaro, S. J., Foti, R. J., & Kenny, D. A (1991). Self-monitoring and trait-based variance in leadership: An investigation of leader flexibility across multiple group situations. Journal of Applied Psychology, 76(2), 308-315.