Tuesday, August 6, 2019
Developed nations Essay Example for Free
Developed nations Essay Developed nations such as Canada, Japan, Australia and America are emitting the most air pollutants in the world and contribute in much emission of green house gases in the atmosphere. Developed nations use much of the natural resources until a near depletion occurs. Hover there are exceptions in that Germany, Sweden and Norway governments have worked with environment and they have benefited economically due to their environment sustainability (Pickering Owen, 213). Environmental degradation in the third world is exacerbated by international dumping of hazardous wastes and environmental imperialism. Third world countries do not have many choices to choose from and their environment is partly degraded by developed countries. These acts of the developed nations of cleaning their backyard and then transporting their hazardous wastes to the third world countries as well as forbidding the developed countries to develop violates the principles of sustainable environment. First world countries degrade the environment because they consume more of the natural resources (Pickering Owen, 213). Environmental issues of china and Latin America In china there is a growing concern of the ever increasing desertification on the northern and western side of the country. Desertification is being exacerbated by climate change in china and result from excessive industrialization on the fragile ecosystems and poor land management (Rajan, 321). The unrestrained industrialization and development that is taking place throughout the country is making china to be vulnerable to the growing changes of climate due to the increased levels of green house gas emissions in the atmosphere. For example extreme ecological events melting of glaciers and rising temperatures are now common in china besides desertification. These phenomena have detrimental effects on human health and the fragile ecosystems (Rajan, 328). Desertification engulfs the ecosystems with sand and reduces the available arable land thus creates eco- refugees. Shrinking glaciers on the other hand temporary raises the level of after in lakes and river and eventually disappears leaving an acute shortage of water. The economy of china is based mainly on coal for cheap energy and heavy industry that emits high levels of green house gases and thus accelerates global warming and climate change (Rajan, 321). However Chinese government is now using experimental means and artificial precipitation to alleviate the short term effects of the climate change. The government is also adopting stricter energy conservation legislation and increasing international cooperation to help fight the problem of climate change (Rajan, 3330). On the other hand the municipalities of china generate more than a hundred million tones of trash wastes per annum and currently the amount is rapidly rising. The existing land fills in china are reaching their capacity and therefore china will be required to build more land fills to satisfy the ever increasing amount of garbage accumulated. China will also be required to make up the poorly managed land fills (Rajan, 330). The problem of solid waste leakages from poorly managed land fills has rendered many hectares of land around the cities to be useless and therefore it is posing a great land constrains since china supports a big percentage of the world population and has a small percentage of the arable land. China is also facing human health and ecological threats from the Brownfield sites that are stemming from poorly managed landfills and from older landfills that do not have proper lining. There are problems of illegal dumping of industrial and municipal wastes that are exacerbating the situation. The incineration of waste in china is also emitting chemicals such as mercury, furans and dioxins which are harmful to the health of people globally (Rajan, 431). It is difficult to understate the environmental pollution of china on the pacific region of Asia and beyond. The prevailing wind often carries pollutants such as mercury particulate matters and ozone from one continent to another continent and in this case the pollutants are carried from Asia to North America. The overall trend of air pollution in china indicates a growing health and economic threats both within and outside china. The regional impact of air pollution in china has encouraged cooperation and new data on environmental, economic and human health implications of pollution of china on the north eastern side of Asia and western side of United States and Canada calls for global efforts to engage china in these issues (Rajan, 441). The majority of the regional trans-boundary air pollution in china originates from its heavy reliance on coal which constitutes about 70 percent of its global energy mix. Despite efforts to diversify the energy sources in china the country has continued to rely on coal and it seem it will continue to rely on the same for the fore seeable future. The dependence on coal and the lack of scrubbers and coal washing infrastructures at power plants and industrial facilities and its plan to build new coal powered stations translates to wide spread of environmental and health issues in pacific region of Asia and beyond. Car emission in china has replaced coal as the major source of air pollution in urban centers. Currently sixteen out of twenty most polluted sites are in china and therefore the emission will worsens the air quality in china. The current data shows that china has 22 cars per 1000 people compared to United States which has 764 cars per 1000 people however china is on its way of becoming the dominant market for automobiles. Due to WTO reduction the number of vehicle in china are expected to rise from the current 24 million to 100 million by the year 2020. In china there is a car culture that is developing similar to that was witnessed in 1940s in the United States. a prime example is the car driving clubs. There are many obstacles which face the policies for cleaner cars (Rajan, 450). On the other hand current industrial pollution in Latin America is a growing problem. Latin America is predominantly becoming an urban society and its environmental pollution issues are becoming important issues on the political agenda (Diaz West, 73). Mexico, Brazil and Argentina account for about four-fifth of manufacturing production in the region and hence constitute the bulk of industrial pollution in Latin America. Data for air pollution which have been obtained shows that concentrations of pollutant in the major cities are above World health organizations (WHO) guide lines for the air quality standards (Diaz West, 74). However it is only Sao Paulo whose data on air pollution falls within the quality standards provided by world health organization. Another element that is contributing to air pollution in Latin America is emissions from vehicles. There are also problems of water quality both to the regional rivers and coastal waters. For instance most watersheds in Mexico are strongly polluted (Diaz West, 76). The stretches of Paribas do Sul river of Rio de Janeiro and most of its tributaries are badly polluted as it is in Guanabara Bay. Due to lack of monitoring of pollution in Latin America it is difficult to obtain estimates of industrial effluents and emissions. Population growth in urban centers in Latin America has also caused slides deforestation and soil loss for agriculture in the peripheries of the urban centers (Hillstrom Hillstrom, 89).
Monday, August 5, 2019
Network Attacks in Real Time Scenario Over Campus Network
Network Attacks in Real Time Scenario Over Campus Network Amit Mahajan* Vibhakar Mansotra** ABSTRACT This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper discusses about the dependency over the IDS/IPS signatures and proposes for a solution which records the events with raw traffic and visualizes the traffic to give better understanding of the behavior of the traffic flow over the network. Keywords: UTM, Attacks, Visualization, Afterglow, tcpdump. I INTRODUCTION Networks have been under attack from the time Internet came into existence. There is consistently some lack of determination connected with the effect of these attacks. In the present situation of PC innovation, any institution can have enormous machine frameworks of distinctive natures. With the advancement of technology, Organizations have started facing difficulties due to different types of computer viruses and attacks. This resulted in tremendous loss of the internal assets like data and utility of time. Thus there is an urgent need to study these attacks and network breaches by means of which one will be able to devise preventive measures and thereby protect the internal assets. In view of the above objectives one has to understand the networks and how they expand widely. Also one has to understand the attacks and breaches. Mostly the internet is one of the sources of the viruses and attacks but quite often the local network is also a major source of threats for campus networks. Generally administrators and organizations safe guard their networks from outside threats but the internal attacks and breaches are very crucial. The IDS/IPS ( ) are installed over the gateway level to scan the outgoing and incoming traffic. Where these kind of mechanism to study the behavior of internal attacks is vague. One is very much interested in knowing the kind of traffic flow, and its identification etc in the network. This kind of approach will help the user community to adopt preventive measures or in other words one has obtain a solution by studying the internal attacks and network breaches and thereby how to minimize and protect the internal assets . Analysis of the netw ork can be used as a tool to scan the network traffic. The behavior of the network may be understood through penetration tools, simulations etc. Alternatively a tool like IPS having capability of network behavior analysis also can be of great help in understanding the problem. SURVEY OF WORK Asmaa Shaker Ashoor and Sharad Gore in their research differentiated the Intrusion Detection System and Intrusion Prevention System (IDS/IPS) technology which is used in the computer networks. They compare the stability, performance and accuracy wise result of IDS and IPS. They highlighted that the major difference between the IDS / IPS is among their deployments over the network. IDS technology works on out band system which means it is not lined with the network path but IPS technology works on in-line with the system, means it can pass through in between the devices in real time. Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit discusses about the Present run-through for fighting cyber-attacks which are typically used by the Intrusion Detection Sensors (IDS) to inactively detect and block multi-stage attacks. The algorithm, TANDI, helps in reducing the problem difficulty by separating the simulations of the attackerââ¬â¢s capability and opportunity and thus fuses the two to determine the attackers intent. The results of the research demonstrate that the algorithm TANDI predicts that the future attack action precisely as long as it is not a coordinated attack and which contains no internal threats. In the presence of the malicious attack events, the algorithm TANDI, will give alarm to the network analyst for further analysis. This can be further analysed with the help of simulation. Nilima R. Patil and Nitin N. Patil in their paper discussed about the importance of attack graph to check the possible attacks in the network. Using attack graph, analysis can be done effectively. This helps the administrators to further analyze the attack graphs deeply to know where their system weaknesses lie. Accordingly help them to decide what kind of security measures can be opted for effective deployment. They study different ways to analyse attack graphs and to provide future scope for research on these attack graphs. Rosslin John Robbles, Tai-hoon Kim, Seung Lee in their paper have shown that a second level in addition to access control intrusion confinement can dramatically enhance the security especially integrity and availability of a system in many situation. It showed that intrusion confinement can effectively resolve the conflicting design goals of an intrusion detection system by achieving both a high rate of detection and a low rate of errors. Developing a more concrete isolation protocols will further be studied in the future research. Meera Gandhi and S.K Srivastava in their paper highlighted the importance of Intrusion detection in business sector and in active area of research. They describe IDS as important tool for information security. An IDS is intended to identify and fight with some common attacks over the network systems. In such systems log displays the list of attacks to the administrator for ambiguous action. This system works as an observant device in the event of attacks directed towards an entire network. In the light of the above available information a need has been felt to undertake similar type of work in the University of Jammu as well. This will help in study of attacks received by the network of the campus. The network is setup on optical fiber backbone with around 100 distributed switches across the campus. Which also has WI- FI wireless Connectivity with access points around 200 approx. Such an ICT facility available over the network is plays an important role in helping the students, researches, teacher and staff. The number of users in the UOJ campus network appxo 3000. Thus the analysis of the attacks is taken up in this campus. II EXPERIMENTAL SETUP USING UTM University of Jammu is one of the pioneer higher educational institutes in the state of Jammu and Kashmir, India. Whose vision is to be an internationally competitive academic and research institution? To achieve University of Jammu has lot of focus on the information technology. In 2003 university started its initiatives to be an IT enabled university by setting up a university campus network on optical fiber backbone. Later this network was further converged with Jammu University JU Wi-Fi. This facility is playing a very crucial role in order to help the students, teachers, researchers and administrative staff to use the ICT facilities available over the network. University of Jammu is having huge internet bandwidth connectivityââ¬â¢s to cater the needs of the university fraternity. This internet bandwidth connectivityââ¬â¢s constantly keeps on upgrading from time to time. At present university is having 40 mbps Internet bandwidth 1:1 OPTICAL FIBER lease line from reliance an d 1 Giga optical fiber connectivity from National Knowledge Network. Students, researchers and teaching faculty are able to access the scholarly contents online from any location within the campus. There are around 37 departments comprising of teaching and centers other than administrative blocks which are connected through this optical fiber back bone network. All the three girls and boys hostels are also connected through the optical fiber backbone. There are around 100 distributed switches (Cisco and Dlink) and approx. 200 indoor wireless access points (Linksys and Dlink) and 18 outdoor access points (Dlink) which are installed at the various locations of these departments / blocks of the university. All the equipmentââ¬â¢s are connected through optical fiber backbone to the control room campus network of the university with Cisco catalyst switches 4507R, 4506. In order to maintain such vast network and ICT Facilities University has deployed a UTM device in the network. This UTM device helps the university it administrators to maintain the university campus network more efficiently. UTM installed at the university is a product from worldââ¬â¢s top IT security company Cyberoam. This UTM is installed almost all the major academic institutes of the country. The UTM device has multiple solutions in a single box. It comprises of load balancing of internet bandwidths, Antivirus and anti-spam scanning at the gate way level, User identity based firewall rules, gateway level IDS and IPS scanning and AAA authentications etc. This UTM device is installed between the ISPS Routers and Cisco catalyst switches so that the whole traffic gets scanned through the UTM device. All the policies are applied on the firewall rules as per the requirement of the University network. Figure: 1 UTM Deployment in Gateway Mode With the increase in the University network and ICT facilities over this network, it is observed that the ratio of attacks also gets increased. These attacks reduce the performance of the University Network and other ICT facilities available. Thus to study the kind of attacks, their significance and a solution how to reduce them is proposed in this paper. UTM device installed in the University network is considered for collecting the IPS attacks data. Since it has the ability to produce the Attack reports, this will help the University IT administrators to see the trend of the attacks how they are generating and affecting the system. The critical IPS attacks will be studied over a time to find the patterns of the attacks and their significance over the network applications and ports to which they are associated. This study will help the university and other institutes which are using the same UTM to fine-tune the rules and other parameters so that network bandwidth and other services performance does not get affected with the attacks and users of the ICT facilities should have performance oriented service. III DATA COLLECTION AND ANALYSIS USING UTM As described in the previous about the network system university campus. The information on the number of IPS attacks has been collected since 1 July -2013 to 2-dec -2013 (22 weeks). The total number of attacks is 1301567. Out of these the type of attacks having frequency more than approx 100 is 1299646 lakh. These 13 lakh IPS attacks have been classified into 5 categories broadly example HTTP/ HTTPS, ICMP, UDP, FTP, TCP based on the signatures. The display of the number of IPS attacks belonging to each category is shown in figure-2: Figure -2 Classifications of Attacks Out of the above 13 lakh of the attacks the top 14 critical attacks from the five major categories have been identified to 162810 by the IPS and them display is shown in figure-3: From the figure-3 it may be noted that the prominent attack having a frequency greater than equal to 4.38% are 6 types (responses 403 forbidden type is 45.62% , 17.38 % web misc handler access 8.57 % is https/ssl renegotion , 7.38% web php , 7.34% web cgi count , 4.38% info ftp bad login) . While rest of the 16 attacks less than 10 % are having very small frequencies. The percentage of attacks each of the 22 weeks is shown in the bar diagrams in figure series: Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week7 Week 8 Week 9 Week 10 Week 11 Week 12 Week13 Week 14 Week15 Week 16 Week 17 Week 18 Week 19 Week 20 Week 21 Week 22 Out of 22 weeks, the percentage of Attack Responses 403 Forbidden is the most dominant one. Forbidden attack response is the highest attacks with 45.62% overall in the 22 weeks, this incidence is generated when a 403 error response code is returned to a client by a web server, which indicates that an effort is made to take an unauthorized access to a web server or an application running on a web server. The 400 series error messages indicate an error on the part of the browser client making the request to a web server. The 403 response shows a request for a forbidden resource which cannot be gain access to even with authentication identifications. Many events can show a determined effort to exploit vulnerability on the victimââ¬â¢s server. Certain applications do not perform strict checks when confirming the credentials of a client host linking to the services offered on a host server. It can lead to an unauthorized access and probably escalated rights to that of the administrator. Information stored on the machine will be compromised and trust relationships established between the victim server and the other hosts that can be exploited by an attacker. In such Attack Scenarios; attacker can access the authentication mechanism and provide his/her own credentials to gain access. On the other hand the attacker can exploit the weaknesses to gain the administrator access without any exploit code.While the other prominent attacks are:- ICMP trace route: This attack is generated when a Windows trace route (tracert) is detected. A trace route is be used to discover live hosts and network topologies. A Windows trace route command uses an ICMP echo request with a lower than normal Time to Live (TTL) value to identify live hosts and network topologies. Web- MISC handler Attacks: this attack is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server. The other attack which has very high severity level is the SNMP attack. From the figure- 4 shown below , it is noted that there is a peak in the number of attacks in the 8th (19-0ct-2013 and 9th week).It may be noted that this peak is due to SNMP attack responded by UDP with application whose activity is pronounced. Figure: 4 shows16 different types of attacks out of 22 attacks per week are shown Figure ââ¬â5 different types of major attacks per week Figure: 5 Shows 16 different types of attacks out of 22 attacks per week are shown over the entire period. Of these 6 are found to be more conspicuous: ATTACK-RESPONSES 403 Forbidden (ATK-RES403F) 71067, ICMP trace route (29205), WEB-MISC handler access (13959), SNMP request UDP (11954), SNMP public access UDP (11952), HTTPS/SSL Renegotiation DoS (7062) IV FRAME WORK FOR EVALUATION AT THE GATEWEY LEVEL TO STUDY THE ATTACKS USING RAW PACKETS GENERATED BY THE NETWORK To study the attacks more affectively, a frame work was deployed using open source software like Ubuntu, tcpdump with visualizing software like afterglow to capture real time at the core switch. This will help to monitor and analyze the network traffic in real time scenario. Data was evaluated for two hundred thousand packets captured using tcpdump ââ¬ânnelr data.pcap l wc ââ¬âl at the root. This will capture the raw traffic for two hundred thousand packets for data analysis and visualization. The data captured by the tcpdump will be converted to a csv file with all fields. Tcpdump-vttttnnelr ju.pcap|./tcpdump2csv.pltimestamp sourcemac destmac sip dip sport dport flags len proto ttl id offset tos ipflags > ju.csv. The Csv file is then exported to Mysql database. load data infile ââ¬â¢ju.csvââ¬â¢ into table analysis fields terminated by ââ¬â¢,ââ¬â¢ lines terminated by ââ¬â¢nââ¬â¢ (timestamp, sourcemac, destmac, sourceip, destip, sourceport, destport, proto, tcpflags, length, ttl, ipid, iptos, ipflags, offset); Further, ju.csv file was converted to dot file, which was converted to png file. tcpdump -vttttnnelr Ju.pcap |./tcpdump2csv.pl|./afterglow.pl-c color.properties > Ju.dot Cat Ju.dot | neato -Tpng ââ¬âo Ju.png Figure 6 shows Whole Traffic captured for network Figure-6 shows that the outgoing traffic is greater than incoming traffic, which states that traffic is compromised. Therefore there is need to identify the port 80 traffic and identify the machines which are compromised. From figure 7 we identify visually that the out traffic on port 80 is very high. Therefore, needs to identify machines which are compromised. Figure 7 shows the out going traffic of port 80 Figure -8 shows ATTACK from IP 192.176.2.25 Figure-8 Shows visualization of machine with IP 192.176.2 25 that is connected over the network which is compromised and sending malicious traffic outside. This helps the administrators to identify the machine irrespective of any signatures within the IPS database. Similarly other machines can be identified. V CONCLUSION AND FUTURE SCOPE IDS/ IPS are installed in almost every organization but they are designed to work on signatures. To study attacks which exist other than signatures, we need to further do the analysis through the frame work created with high end hardware which is required to capture and analyze the traffic for longer duration. So that fine tuning of the IDS/IPS as per the campus network requirement will be done to further increase the network performance. VI REFERENCES [1] Paxson. Bro: A System for Detecting Network Intruders in Real- Time. In Computer Networks, volume 31 (23ââ¬â 24), pages 2435ââ¬â2463, 1999 [2] G. Stein, B. Chen, A.S. Wu, and K.A. Hua, ââ¬Å"Decision Tree Classifier for Network Intrusion Detection with GA- Based Feature Selection,â⬠Proc. 43rd ACM Southeast Regional Conf.ââ¬âVolume 2, Mar. 2005. [3] Schwartz, Matthew, ââ¬Å"Beyond Firewalls and IPS: Monitoring Network Behavior.â⬠February 2006, available on http://esj.com/articles/2006/02/07/beyond- Firewalls-and-ips-monitoring-networkbehavior.aspx [4] S. J. Yang, J. Holsopple, and M. Sudit, ââ¬Å"Evaluating Threat Assessment for Multi-stage Cyber Attacks,â⬠in Proceedings of IEEE MILCOM: 2nd IEEE Workshop on Situation Management (SIMA), Washington, DC, Oct 23-25, 2006 [5] Z. Yu and J. Tsai, ââ¬Å"An efficient intrusion detection system using a boosting-based learning algorithmâ⬠. International Journal of Computer Applications in Technology, Vol. 27 (4), 2007, 223-231. [6] Meera Gandhi, S.K.Srivatsa ââ¬Å"Detecting and preventing Attacks using network intrusion detection systemsâ⬠International Journal of Computer Science and Security, Volume (2) : Issue (1) June 2009 [7] Asmaa Shaker Ashoor, Prof. Sharad Gore, ââ¬Å"Intrusion Detection System (IDS) Intrusion Prevention System (IPS): Case Studyâ⬠. International Journal of Scientific Engineering Research Volume 2, Issue 7, July-2011 [8] Rosslin John Robles, Tai-hoon Kim,SeungLee,â⬠A Study on Intrusion Confinement for Internal Networkâ⬠, Journal of Security Engineering), vol.5issue no1, P73, 2008 [9] Patil, Nilima R.; Patil, Nitin N, â⬠A comparative study of network vulnerability analysis using attack graphâ⬠World Journal of Science Technology; 2012, Vol. 2 Issue 3, p91 *University of Jammu, e-mail id :[emailprotected] , **University of Jammu, email id: [emailprotected] 1
Sunday, August 4, 2019
The Future Of Education: On-Line Classes Essays -- School Internet Tec
The Future Of Education: On-Line Classes "The future is outside the traditional campus, outside the traditional classroom. Distance learning is coming on fast," says management philosopher Peter Drucker (qtd. in Ebeling and Gubernick). One form of distance learning, on-line education (courses offered over the Internet), has caught the eye of the public and is forcing educators to reevaluate the present state of the educational system. Because of their convenience, cost, and amount of and access to readily-available information, these on-line classes, specifically those in math and computer science, are becoming more and more prevalent throughout the Internet community. TARGET TECHNOLOGY Description On-line math and computer science classes are educational courses offered over the Internet. They differ from traditionally taught classes in that they offer a wealth of information which can be easily and quickly accessed with the right equipment (i.e. a computer and Internet connection) and knowledge. They also allow the user to log on to and participate in the class at any time of day at his/her convenience. This may prove advantageous to those with strict work schedules, to those with families, or to those who learn best at their own rate or at different times of day. "This format [on-line classes] is really good for older, nontraditional students who work full-time and have families," says Xeturah Woodley-Tillman, an on-line instructor at Metropolitan State College of Denver (qtd. in Brown). History The presence of and participation in on-line math and computer science classes has been rising ever since the Internet became readily available to the public. For example, four years ago Peterson's college guide li... ...lemented and fully utilized. While they alone may not change the current state of the educational system, on-line math and computer science classes should be a welcomed addition and should continue to grow in use far into the future. WORKS CITED Brown, Jacquelyn A. "Big Modem On Campus." Essence Oct. 1997: 150. Brown, John Seely, and Paul Duguid. "Universities In The Digital Age." Change July/Aug. 1996: 11+. Ebeling, Ashlea, and Lisa Gubernick. "I Got My Degree Through E-Mail." Forbes 16 June 1997: 84+. Natale, Jo Anna. "On-Line School For Home Learners." Education Digest Dec. 1995: 36+. Schutte, Jerald G. "Virtual Teaching in Higher Education: The New Intellectual Superhighway or Just Another Traffic Jam?" [http://www.csun.edu][/sociology/virexp.htm][30 April 1999]. Tillson, Tamsen. "High-Grade Opportunity." Canadian Business Dec. 1996: 53+.
Saturday, August 3, 2019
Steinbecks Red Chrysanthemums East of Edens Grapes Essay -- Literary
Every great writer creates powerful images and presents story lines that draw their readers deep into the pages of their books, however; any writer would be hard pressed to do so without incorporating their own feelings, trials and tribulations into the plots and John Steinbeck is no exception. Through his appreciation for adventure and willingness to indulge in it, Steinbeck found a myriad of fascinating people in addition to experiences that he was eager to share. Past various negative criticisms and frequent rejections of his work, he manages to provide relatable characters capable of deep connections to those who enter into the realms of his tales. John Steinbeck's early life experiences influenced his portrayals of women, his love of the land, and his intimate connection to the plight of lower social classes, themes which translate into his work. Initially insecure from teasing in his youth, Steinbeck's delayed sexual progression produced a need for female validation; a theme which presented itself as the characterization of women as sexual objects, particularly prostitutes, in his narratives. Jay Parini, author of "John Steinbeck: A Biography", points out that Steinbeck endured nicknames such as little squirrel, muskrat and mouse from his own family relating to his physical features, which created in him a great propensity for shyness. Physical maturity that lagged behind his schoolmates added to his isolation from his peers, especially women (Parini 17). His friend George Mors disclosed that Steinbeck "spent much of his time with a stack of pulp novels and girlie magazines" demonstrating his desire for sexual stimulation yet insufficient resolve to seek it out (Parini 26). Steinbeck overcame his apprehension after happ... ...ings of the people he met along his way. While some of his works have been praised for their greatness and other discarded as junk, Steinbeck satisfied his need to write and in doing so shared some fantastic stories with the world. Works Cited Parini, Jay. John Steinbeck. New York: Henry Holt and Company, Inc., 1995. 9,12,13,17,25,26,38. Print. Beyond Boundries. Tuscaloosa: The University of Alabama Press, 2002. 15,57,74. Print. John Steinbeck . Chelsea House Publishers, a division of Main Line Book Co., 1987. 92. Print. Readings on John Steinbeck. San Diego: Greenhaven Press, Inc., 1996. 15. Print. Moss, Joyce, and George Wilson. Overview: The Red Pony (1997): n.pag. Library Resource. Web. 9 May 2012. Shillinglaw, Susan. "The Martha Heasley Cox Center for Steinbeck Studies." John Steinbeck, American Writer n.pag. Web. 9 May 2012.
Friday, August 2, 2019
Religion at the time of the Communist Manifesto Essay -- Karl Marx Rel
Religion at the time of the Communist Manifesto Following the Industrial Revolution in 19th century Europe, change was in full swing and religion began to have different meanings for different people. The upper-class citizens used Religion, namely Christianity, and the power that it possessed in an attempt to keep their high status in society, while the lower class turned to faith so that their lives could possibly improve. Instead of religion being the cornerstone of faith and worship amongst all people, it was being used for power and money by the upper class. Even worse, religious leaders were using the upper class people as well, gaining money and authority from their endorsement. A man by the name of Karl Marx saw what was happening and thus spoke out about it, declaring religion as ââ¬Å"the opium of the people.â⬠[1] He had a vision for equality, and wrote it down in the form of the Communist Manifesto; however nowhere in this document were aspirations of religious harmony. Religion was becoming the c atalyst for class separation and social mayhem in 19th century Europe, and according to Karl Marx, equality was only possible with the abolition of it as a whole. In a time where industry was at a peak, and the wealthy citizens, or bourgeois, were getting richer and richer, religion was being used as a way to make money and ensure the power of the upper class, while the lower class proletariats could but watch their lives fade away into the horrific conditions of the working class, with little hope due to the lack of lower class education.[2] As religions spread out freely, the authoritarian peoples frequently used their power to embrace religion as a moneymaker, and prevent liberty from turning ... ...eger, 1961.) 33 [4] Armstrong, 178 [5] Karl Marx and Friedrich Engels, Manifesto of the Communist Party, trans. Samuel Moore (Chicago: Charles H. Kerr Publishing Company, 1989) [6] Friedrich Engels, The Condition of the Working-Class in England in 1844 (London: Swan Sonnenschein & Co., 1892) 45, 48-51. [7]) McClellan, 63 [8] Sherman, Dennis , and Joyce Salisbury. The West in the World. (Boston: McGraw Hill, 2001.) 617 [9] Lichtheim, 42. [10] Butterfield, Herbert. Christianity in European History. (London: Collins, 1951) 5. [11] Sherman, Salisbury, 617 Links: Professor Santamarina's webpage http://www.marxist.com/Theory/marxism_and_religion.html http://www.faithnet.freeserve.co.uk/marxism.htm http://dwardmac.pitzer.edu/Anarchist_Archives/bookchin/comman.html http://www.marxists.org/archive/marx/index.htm
Organizational Culture of Cisco Systems Inc. Essay
Cisco Systems, Inc. is a global company that embodies the many characteristics of a company that values its employees as much as its clients. Cisco listens to their employees and responds to their needs. Cisco Systems has long been recognized as being one of the top 25 best places to work in America because of how its high regard for its employees. Ciscoââ¬â¢s Organizational AppealThe appeal of Ciscoââ¬â¢s organizational culture is that it appreciates its employees. It offers flexibility that few other companies do. This is particularly appealing to me in that I have observed over the years that many companies forget that if an employee feels like a stakeholder in the business, then he or she will be far more willing to take the extra steps to walk the extra mile to perform to the highest of standards. An unhappy, disgruntled employee, on the other hand, will merely show up, do just enough to keep the boss off his or her back and call it a day. Cisco Systems offers a myriad of perks to its employees including but not limited to:1.Access to on-site childcare. 2.E-learning courses. 3.Formal and in-formal flexibility of work hours that allows for the integration of home and professional life in a comfortable, manageable way. 4.On-site Weight Watchers Programs. 5.Elder Care Assistance. These are but a few of the benefits that Cisco offers. When an employee feels like the company believes in and cares for them as a person, then they believe in that company too. I share the core value of employees coming first with Cisco. I believe that without employees to tote the barge and life the bale, the work will not be done. All too many companies forget that business is like an upside-down pyramid and that the employees are at the top of the pyramid no matter how management may try to think otherwise. The seven characteristics that Cisco Systems employees include stability where growth comes in a balanced manner, outcome orientation, innovation, team orientation, people orientation, organizational easygoingness and detail orientation. Each and every one of these characteristics must be present. They must be present in a manner that is balanced. Should any one of them characteristics become imbalanced, an organization will find itself in deep trouble. Cisco Systems has managed to find and maintain the delicate balance of all of these and their success is reflected in their continued growth and prosperity. However, if I had to narrow the field to just one, I would have to saw their orientation to the team concept, team organization, if you will, is their primary embodiment. Virtually all of their professional activities are organized around partners and teams. Cisco Systems possesses a very strong cultural appeal. This is evidenced by the undeniable fact that they are a leader in cultural diversity and technological advancement. They have earned the respect of their employees and their partners because of this organizational culture. This culture is ethical in nature because to treat employees fairly and as human beings, not just bodies that fill the seats in the cubicles is a matter of morality on the part of the employer. High business morals are consistent with high business ethics. It cannot be denied that Cisco Systems is a model for other organizations to emulate when the layers are peeled away. References: Gildorf, Jeanette W. ââ¬Å"Organizational Vulture.â⬠Business Guidelines. 2006. 18 Mar. 2008 . Stock, G. N. (2007). Organizational Culture. Internal Journal of Production Economics, 106(2), 368-392.
Thursday, August 1, 2019
MEMO strategy
This memo explains the strategy that I will apply to implement the communication situation of the case 5. Audience The audience for the message is the immediate superior, and therefore it is more effective to use memo to communicate with him or her. The reason is because memo is more formal and less personal than a letter or email. This is able to create the semblance of a valid business concern based on data and studies as opposed to a letter, be it hand or type written, which conveys sentiments and passion and is not regarded as authoritative. Purpose The general purpose of the message is to persuade. In order to be able to do this effectively, it must be shown that there is a valid business concern that needs to be addressed. The use of a memo, as mentioned earlier, gives the appearance of official correspondence devoid of any feelings and sentiments, which are usually not considered when making business decisions. Associated essay: Sample Memo for Company Team Building In order to convince the superior, there is a need to downplay personal convictions while at the same time express this as a valid business concern that is normally addressed in day to day business matters. Therefore, memo is the most often used means of accomplishing this in any corporate structure. Content The general tone that must be used in this memo is a formal business tone. The superior needs to understand the relevance of the matter in relation to business and company performance. This is why a business tone, which avoids conversational language, must be used. Structure Finally, since this will be addressed to a superior, the memo must avoid a direct and confrontational approach while maintaining its authoritativeness. à Before beginning, a buffer can be used to improve the way the superior will handle the situation and perhaps be able to get the desired outcome.à The first few sentences should already outline the problem that will be faced and the potential cost, which helps get the bossââ¬â¢s attention. By the end, it must be made clear to the boss what action must be taken.à The memo must also take care as not to appear as if it is attacking the superior or severely criticizing his decision and this can be achieved by adding a buffer at the beginning. Based on the analysis of this communication situation, I will use a memo as an effective medium to solve this case. To:à à à à à à à à à à à à à à à à Brad Pitt, Executive Director From:à à à à à à à à à à à Hayeon Jung, Project Head Date:à à à à à à à à à à à à à November 13, 2006 Subject:à à à à à à à Extended Warranties and Sales training We have recently received news which may be vital to the profitability of our extended warranty sales and after a careful study of our proposed actions regarding the sales training program for extended warranties, I believe that it may be in our best interests to come up with an alternative approach regarding this matter.à Based on my studies, this has the potential to be very risky move for the company because of the lower sales of all company products due to the anticipated consumer backlash to this marketing strategy. Business Week, a widely read business magazine, is publishing an article on extended warranties, and it makes specific mention of the fact that half of the warranty price goes to the salesperson as a commission and that only 20 percent of the total amount customers pay for warranties eventually goes to product repair. Early failures are usuà ally covered by manufacturers' warranties, and the extended warranties we are selling are designed to cover that middle part of the life span. In other words, many extended warranties cover the period of time during which consumers are least likely to need them and offer no coverage when consumers need them most. While extended warranties present profitable margins for the company, the resulting consumer backlash from this article could potentially reduce sales for all of the companyââ¬â¢s products. With the current sales training lined up, more aggressive marketing for extended warranties will send the wrong signal to the consumers. Furthermore, the potential threat of added media exposure caused by the article in Business Week could threaten the sales projections for the company. It is strongly recommended that the plan to continue the sales training be ceased.à Doing so will reduce any overhead costs and training expenses that may be incurred from the implementation of the training program. Moreover, alternative marketing strategies such as using the Business Week article to the advantage of the company can be formulated instead of the sales training. I strongly believe that our company has a great future under your leadership as we continually explore ways to strengthen the relationship between the customers and the company. Hayeon jung Customer Service Manager
Subscribe to:
Posts (Atom)