Wednesday, November 27, 2019

Colonization Essays - Thirteen Colonies, Free Essays, Term Papers

Colonization Essays - Thirteen Colonies, Free Essays, Term Papers Colonization Essay #1 Although New England and the Chesapeake regions were settled largely by people of English origin, by 1700 the regions had evolved into two distinct societies. I have described both societies in an attempt to demonstrate their developments. Virginia Colony In 1607 a group of merchants established England?s first permanent colony in North America at Jamestown, Virginia. They operated as a joint-stock company that allowed them to sell shares of stock in their company and use the pooled investment capital to outfit and supply overseas expeditions. This joint stock company operated under a charter from James I with a concern for bringing Christian religion to the native people. However, most of the settlers probably agreed with Captain John Smith that the real aim was profit rather than religion. Profits were elusive in the early years; expectations of gold and other minerals, trade with Indians for beaver and deer skins were not to be had by the colonists. Many Virginia colonists died of dysentery, malaria and malnutrition. The Virginia Company sent a diverse collection of people to Jamestown; there were artists and glassmakers, as well as unskilled servants. Both types of people adapted poorly to the wilderness conditions. Relations between the colonists and the Indians were bitter from the beginning. John Smith dealt with the Indians by shows of force and the Indians withdrew trade with the English. Many settlers died of starvation in the first years. The discovery that tobacco would grow in the Chesapeake region was a salvation for Virginia. The planters shipped the first crop in 1617 and thereafter tobacco cultivation spread rapidly. By 1624, Virginia was exporting 200,000 pounds of tobacco; by 1638 the crop exceeded 3 million pounds. The cultivation of tobacco caused Virginia?s planters to find a reliable supply of cheap labor. To fill this need, planters recruited immigrants from various countries. These immigrants were called indentured servants. They willingly sold a portion of their working lives in exchange for free passage across the Atlantic ocean. Many of the indentured servants were unemployed and held the lower class on the social ladder from their places of origin. Life for indentured servants was often a nightmare. If diseases did not kill them, many succumbed to the brutal work routine that harsh masters imposed upon them. When the remaining servants neared the end of their contract, masters would find ways to add time to the contracts. The profitable tobacco crops created an intense demand for land. As more and more colonists settled along the rivers that flowed in Chesapeake Bay, the local Indian tribes retaliated. The murder of an Indian captain triggered a fierce Indian assault that dealt a staggering blow to Virginia. This attack led to the bankruptcy of the Virginia Company. The surviving planters felt they had justified reasons for the destruction of the Indians. As more settlers arrived, more pressure was placed on the Indians for land. Wars over land was provoked in 1644 and again in 1675. In each of these conflicts, the colonizers were victorious. The native population of Virginia was reduced to less than 1,000 by 1680. Immigrants to the Chesapeake Bay region found existence difficult. Many immigrants arrived as indentured servants and could not marry until their time was paid. Once marriage was made, diseases claimed many within about seven years. Few children growing up could expect to have both parents alive. Widows and widowers often remarried soon after the death of their spouse, creating a complex web of family life. Because of mortality, the Chesapeake settlers remained, for most of the seventeenth-century, a land of immigrants rather than a land of settled families. Social institutions such as churches and schools took root very slowly. The Chesapeake region architecture showed the fragility of life in the tobacco growing environment. Settlers at first built primitive huts and shanties. After establishing crops, planters improved their habitats but still built ramshackle one-room dwellings. Even as Virginia and Maryland matured, cheaply built and cramped houses remained the norm. Life was too uncertain and the tobacco economy was too volatile. Massachusetts Bay Colony While some English settlers scrambled for wealth on the Chesapeake, others were seized by the spirit of religion. These individuals were known as Puritans. They aimed their

Saturday, November 23, 2019

The Ultimate AP Human Geography Study Guide

The Ultimate AP Human Geography Study Guide SAT / ACT Prep Online Guides and Tips In your AP Human Geography class, you'll learn about the dynamics of societies around the world in economic, social, political, and environmental contexts. This course focuses a lot on ideas and models, along with terminology that defines the ways in which we've chosen to inhabit and change our surroundings. The following AP Human Geography study guide is designed to guide you through all the concepts covered in the course, with an emphasis on cumulative preparation for the AP exam. What Will You Get From This AP Human Geography Study Guide? This guide will help you review for assessments in your AP Human Geography class by providing links to practice resources and tips on effective study strategies. I'll also give advice that's specific to preparing for the final AP exam. In the first section, I’ll detail a step-by-step process you can follow to create and execute a customized study plan for the test.This process includes taking a diagnostic test, evaluating your weaknesses, studying the content areas where you struggled the most, and taking additional practice tests to check your progress. To follow up the study plan, I’ll list a few key study tips to remember as you revisit the course content and take practice exams.I’ll also give you notes for each topic area that you can use to study for in-class tests and review for the AP exam. Having all this information in one place will hopefully make studying for this class much less stressful! Creating a Study Plan for AP Human Geography In this section, I'll go through the steps of a basic study plan for the AP exam. Most of the principles will also apply to your studying for tests throughout the class, but full practice tests are only important when directly preparing for the final exam. You can use shorter topic-specific quizzes to diagnose your weaknesses in different units of the course earlier in the school year. Step 1: Take and Score a Full Practice Test The first step is to take a full practice test so you can get a better idea of your current score level.When you take the test, time it to the specifications of the real AP exam so that you’ll be able to tell if you have any issues with time management. Keep in mind that on the AP test, you only have an hour to answer 75 multiple-choice questions.To be on the safe side, you should try to get your time down to around 30 seconds per question.The only way to get used to this pace is to take practice tests under the same conditions. You might consider usingthis full practice test from Barron’s, which offers both timed and untimed versions with automatic scoring for multiple choice.As you take your practice test, circle or make note of any questions where you feel anything less than totally confident in your answer. Even if you end up getting them right, you should reexamine that content later in your review to increase your comfort level with the material. When you're done, score your test so you can see where you fall in the AP range. You can use this online calculatorfor a decent score estimation based on how many raw points you earned.Then, set a goal for improvement, and decide how many hours you’ll need to put into your prep.If you have a couple of months, you should be able to put in 20+ hours of study time.This will be an appropriate amount studying if you’re hoping to improve by more than one AP point.If you only need to improve by one point or are just looking to raise your score within the same range, you might be able to wait until the month before the test to start the rest of the process. You shouldn’t need to study for more than 10-20 hours. Step 2: Go Through Your Mistakes If you decide to begin the rest of this process now, go through your mistakes on the practice test, and categorize them.This is how you’ll decide which content and skill areas to focus on in your review.There’s no point in studying concepts and terms that you’ve already mastered.If you want to see real improvements, this is the most important stage of the study process.You can’t fix your mistakes unless you know what they are first! Step 3: Study Appropriate Content After you finish analyzing your mistakes, start looking at notes that correspond to the areas where you had the most trouble on the test.Make sure you’re fully absorbing the information as you read.In this case, flashcards might be useful because there are so many terms to remember for AP Human Geography.If you found the free response questions especially challenging, practice a few more of those before you move on to the next step.You can also use some of the sites I’ll link to later in this article to review specific topics with short multiple-choice quizzes. Step 4: Take a Second Full Practice Test When you feel that you’ve fully addressed all of your mistakes on the first test, you can take a second test to see if your scores have improved. Compare your new score to the goal you set in the first step, and decide whether you want to go through the study process again or are happy with your current score. If you're satisfied, you can take a break and just do a bit of light review up until the test. If you find that you haven’t improved, you should reevaluate how you conducted this process and make some changes to your strategy in the next round.Were you in an environment that was too distracting? Did you skim over our notes without really absorbing them? These are the kinds of things that can cause your progress to stall. For planning purposes, here’s the estimated time required for each of the steps in the process for this exam: Step 1: 2.5 hours Step 2: 1 hour Step 3: 2 hours Step 4: 2.5 hours It should take approximately eight hours total for a complete cycle. Of course, you can always extend the time you spend reviewing content if you’re rusty on a bunch of different topics or just want to be extra thorough. Clean off that rust with an acidic solution of facts. AP Human Geography Study Tips These are a few of the most valuable strategies to keep in mind as you go through your study plan to prepare for the AP exam.They should also be helpful in your preparation for smaller assessments throughout the school year in your class. Tip #1: Know Your Regions To get full credit for most free response questions, you have to provide specific examples to support your answers.That means being able to identify the characteristics of world regions regarding their various cultures, demographics, and physical environments.You’ll see a map of the major regions covered by AP Human Geography in the content section of this guide along with a list of seven topics.You should be able to locate each region and identify the relationship it has with each of the seven topic areas. Tip #2: Terms, Terms, Terms Although knowing your way around a map is important, much of AP Human Geography is about your knowledge of terminology.I’d highly recommend making flashcards or using online flashcards in your studying (I'll put a link to some of these in the upcoming content section!).Many multiple-choice questions are essentially just asking for definitions, and some free response questions begin by asking you to define a term that the rest of the question addresses in more depth. Even if it's not this direct, knowing your way around the language of the field of geography will make it much easier to understand questions without relying on shaky assumptions or inferences. Tip #3: Pay Attention to Important Models and Theories Human Geography is mostly considered a humanities subject, but there are some scientific elements to it. These show up in the form of demographic models that are introduced throughout the course. It's important to know how to read models and understand what they represent. You should also know how they connect to major theories in human geography and what those theories say about the development of society. I'll give you a link to a comprehensive list of models and theories at the end of the next section. Skylar, how many times do I have to explain homophones to you? YOU'RE. NOT. HELPING. AP Human GeographyTopics and Notes AP Human Geography covers seven major topic areas. In this section,I’ll list each of them followed by notes that cover relevant subtopics. You can use these notes in the content review stage of your final AP study process and during the year as you review for in-class tests.You might find these notes (from CourseNotes) difficult to get through because they’re written in such a way that it’s hard to pick out key concepts. There are a lot of long paragraphs with no bolding of important terms.If you find these notes borderline incomprehensible, you should try getting a review book that puts all the content in clearer terms. I thinkCracking the AP Human Geography Exam is a good starting point. As a precursor to the notes, here's a map of all the world regions that are discussed throughout the course. You'll need to consider how these topics apply differently to varying locations around the globe: Topic #1: Geography: Its Nature and Perspectives Geography and Human Geography Topic #2: Population The Earth As Humanity’s Home Fundamentals of Population: Location, Distribution, and Density Processes and Cycles of Population Change Where and Why People Move Topic #3: Cultural Patterns and Processes Cultures, Environments, and Regions A Geography of Languages Diffusion of Languages Modern Language Mosaics Origins and Distribution of Religions Religion: Location, Diffusion, and Cultural Landscape Religion, Culture, and Conflict Topic #4: Political Organization of Space Political Culture and the Evolving State State Organization and National Power Multinationalism on the Map The Changing Global Political Landscape Topic #5: Agricultural and Rural Land Use The Livelihoods of Rural Peoples Rural Settlement Forms Commercial Agriculture Global Disparities in Nutrition and Health Topic #6: Industrialization and Economic Development Industrial Activity and Geographic Location Resources and Regions: The Global Distribution of Industry Concepts of Development From Deindustrialization to Globalization Topic #7: Cities and Urban Land Use Civilization and Urbanization Urbanization and Location Urban Pattern and Structure Changing Civic Experiences Since terms are so important on the exam, I’d also recommend checking out this full list of all vocab covered by the course (provided by Quizlet) so that you can review all the vocabulary you need to know in one place. You should also check out this overview of all the different theories and models covered throughout the course. When lots of humans get together to form an urban community, they can't help but color on everything. What an adorable species. Resources for Reviewing Content In this section, I’ll go over a few different resources that you can use to test your knowledge of the content and take practice tests and quizzes. Review Books Review books are helpful resources that provide access to additional practice questions and tests.They often include diagnostic tests that will help you diagnose your weak areas accurately and with less legwork on your part.Especially in a subject like Human Geography that can be a little elusive, review books will help you figure out exactly what you need to study and how you should study it.Read my guide to the best review books for this course to get a better idea of which ones you should consider getting.Some solid review books include: Cracking the AP Human Geography Exam (Princeton Review) Barron’s AP Human Geography AP Human Geography Crash Course (REA) Official Free Response Questions (2001-2015) This includes all the free response questions that have been asked on the AP Human Geography exam since 2001.Be aware that the scoring guidelines are only included for 2004 onwards, so the first three sets of questions for 2001-2003 don’t have official answers that you can consult. Sporcle Geography Quizzes As I mentioned in the tips section, it's important to know your world regions for AP Human Geography so you can back up your answers with specific examples.You don’t need to be a complete expert on where every country is located, but these quizzes are both fun AND educational, so I’d recommend checking them out (warning: super addictive). Countries of the World Countries of Asia Countries of Europe Countries of Africa Countries of South America Countries of North America Varsity Tutors Diagnostic Tests This site offers four diagnostic tests for AP Human Geography with 75 questions each (multiple-choice only).The tests have automatic scoring, and each is given a preliminary difficulty level rating.There are also tons of mini-quizzes listed by concept if you want to practice topic-specific questions as well as flashcards that will help you learn all the course terminology. Learnerator Practice Quizzes There are quizzes on every topic with questions categorized by difficulty level. Quizzes range in length from 10-40 questions, and the site keeps a running tally of how many questions you’ve answered correctly in each category (easy, medium, and hard). Unfortunately, you do need to pay for access to the quiz questions in the "hard" category.It’s $25 to get full access to all the AP Human Geography questions, including a bunch of free response practice. Chapter Quizzes for Human Geography: Landscapes of Human Activities (11th Edition) If you select a chapter of this book on the left-hand navigation bar, you can scroll down and click on a link for a multiple choice quiz.These quizzes are helpful review materials even if your class isn’t using this particular textbook. Now, sit back and enjoy the fruits of your labor in the form of an A and/or 5. Conclusion This AP Human Geography study guide has covered a review plan for the AP test, tips for success in studying throughout the year, and a list of all the topics included in the AP Human Geography curriculum. Let's recap!The steps in a successful study plan should look something like this: Step 1: Take and Score a Practice Test Step 2: Go Through Your Mistakes Step 3: Study Appropriate Content Step 4: Take a Second Practice Test Again, you can go through this process multiple times if you don't get the results you want in the first round. Just pay close attention to whether or not you're improving. If not, make changes to amp up the effectiveness of your content review. Some study tips you should keep in mind as you study for both the AP test and in-class assessments include: Tip #1: Know Your World Regions Tip #2: Terms Are Important Tip #3: Pay Attention to Major Geographic Models and Theories After you're clear on the fundamentals of how to study, you can use the notes and practice resources in the second half of the article to prepare for unit quizzes, midterms, and the final AP test. What's Next? Are you thinking about self-studying this class or other AP classes? Find out more about whether AP self-study is right for your situation and which classes are the most manageable options. If you're still planning out your schedule for the future, check out our article on which other history classes you should takeafter AP Human Geography. You might also be interested in these articles that discussAP credit policies at colleges and which classes you should takethroughout the rest of your time in high school based on your college goals. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:

Thursday, November 21, 2019

111History of Psychology... 1st one Essay Example | Topics and Well Written Essays - 1000 words

111History of Psychology... 1st one - Essay Example Therefore, the strict position of empiricism states that we have no instincts and rational thinking does not, alone, allow us to reach any conclusion unless we have suitable experience to profit from. This experience can be either in one particular instance or through many different instances that have all been combined together to give that person suitable knowledge. Even small common facts such as the color of an object or the sequence of numbers are attained with experience and only with the first hand experience of these facts can these facts be justified by the individual. Notable history of empiricism includes a Renaissance philosopher Francis Bacon who emphasized that gaining knowledge of the natural world was easier and more efficient through observation than through deductive reasoning [1]. While he did not oppose the thought of prior or instinctive knowledge, he firmly believed that any knowledge that was not experienced was far less useful or important than that which was gained through experience. Experienced knowledge was so important, in fact, that without it the human species would not be able to evolve or advance. This belief helped pave the way for William Ockham, a Franciscan philosopher, to note that all knowledge of the natural world is experienced through the senses [4]. He implied that any rationalization of abstract knowledge was merely hypothetical thinking. A thought that later lead to the belief that causation is merely an observation of regularity instead of an actual conclusive connection [4]. This line of thought was taken even further by Thomas Hobbes who believed that, while all genuine knowledge was held through prior knowledge, it required deduction from definitions of experience in order to derive any conclusion [1, 4]. Perhaps the most influential philosopher on empiricism was John Locke who believed that

Wednesday, November 20, 2019

Assimilation and Multicultural in bilingual education within the Research Paper

Assimilation and Multicultural in bilingual education within the sociopolitical context - Research Paper Example The world is fast becoming a global melting point of people from different cultural, ethical, religious and social backgrounds. Cities around the world are becoming more and more cosmopolitan as the effect of globalization, industrialization, trade; commerce and immigration are being realized. The unprecedented increase in diversity especially in the first world countries has called for tolerance and coexistence. Indeed there has been a raging debate with two contrary opinions on dealing with this issue of diversity. Some people see the assimilation of smaller ethnic groups as a way of creating uniformity and cohesiveness. This is especially an issue in the USA where diversity is perhaps the most widespread. Proponents backing this ideology of assimilation are of the view that smaller ethnic minorities should be encouraged to adopt the dominant culture, in this the White culture, for the sake of national unity and cohesiveness. However opponents of the idea of assimilation foster ano ther ideology. The idea of multiculturalism is widely supported by almost all ethnic groups that argue that assimilation will put their different cultures at risk of erosion that may eventually lead to extinction. Some provisions have been made in the education system to embrace this diversity and possibly preserve the different cultures of all these communities. Schools therefore have become fundamental in trying to foster tolerance, understanding and coexistence in the society. Assimilation is commonly defined as the ideological stand that members of a different ethnic community should give up their heritage culture and adopt a more â€Å"American† way of life.... Indeed this view widely held especially amongst the White working class families who view other communities as ‘outsiders’. Recently in Europe, leaders have taken stands in support of assimilation as the best way to realize unity. German Chancellor Angel Merkel was quoted in 2010 as saying â€Å"This multicultural approach has failed, utterly failed.†British Prime Minister David Cameron also lent his support to the assimilation agenda by saying that multiculturalism should be faulted, as it is responsible for the ‘weakening of national identity’. Perhaps this issue is not as divisive and controversial in Europe as an American. The diversity of American society has elicited very many different opinions on the cultural issue with both intra and inter-groups opinions also tending to differ. Multiculturalism refers to an ideology held by some people that these small ethnic minority groups should not only be allowed to maintain their culture but also to pr omote it in the spirit of coexistence and tolerance. Multiculturalism challenges and rejects racism and other forms of discrimination in schools and society, and accepts and affirms pluralism (Micro, 1992). Supporters are adamant with the reasoning that multiculturalism promotes multicultural tolerance and conserve each group’s contribution (Glazer, Moyniham 1970 Greely 1974, Novak 1972). Those who oppose multiculturalism point to the potential that this could have on negatively diversifying the society and create language barriers. Many pundits and interested parties have moved more towards the revival of multiculturalism as they see it as not only a solution for creating

Sunday, November 17, 2019

Apple Executive Summary Essay Example for Free

Apple Executive Summary Essay The iShare is an innovative product designed to offer more convenience and speed in file sharing. iShare aims to help eliminate the traditional inconveniences and complicated requirements involved when transferring files between any two Apple i-devices, to give users the joy of easy sharing, and to deliver sustainable profit to its shareholders. This business plan concerns the introduction of iShare to the Thai market. MARKET ANALYSIS We aim to be the expert in file-sharing gadgets between any electronic devices. We decided to first begin by developing a device called the iShare, which enables music sharing between the Apple iPods/iPhones before we go further and make similar products for other brands like Samsung and HTC in the future. The target market for iShare is mainly the Thai middle-to-upper-class, younger generation who owns an iPod/iPhone and have solid income to spend on this innovative gadget. Our market size is carefully calculated to be approximately 200,000,000 THB for the iShare alone and up to 1,000,000,000 THB in total. Our direct competitor is miShare LLC, which offers a similar product to customers in the US and Europe. Indirect competitors include other computer programs that enable easy file transfer between e-devices as well. PRODUCT AND TECHNOLOGY The iShare is a small device that connects 2 iPods or iPhones together, and let users easily transfer files from one device to another without any computer required. We aim to provide our customers the never-before convenience, speed, and the fun of directly transferring files between their device and their friends’. The iShare will also overcome the technical problems and satisfy the customer needs that has not been met previously by our main competitor, miShare LLC. We will develop the software ourselves and outsource the production to China. After we succeed with the iShare, similar products capable with HTC Android and Samsung Galaxy will be introduced to the market. MARKETING AND SALES STRATEGY The iShare will be launched in the middle of the year 2012. They will be sold directly to first tier distributors who will then pass them on to other retailers. The iShare can be purchased from any iStudio and authorized retail stores. Customers can also find an online user manual, a demonstration video, and many more useful information on the iShare website. The iShare will be advertised through various distribution channels such as social networking websites, printed advertising, and viral marketing. MANAGEMENT TEAM Our team is composed of many talented members with different expertise and great connections. We have a technology expert with a background in consumer electronics, a talented software programmer and developer, an experienced and amazingly creative designer who specializes in hi-tech gadget designs, and a very devoting marketing manager with 5 years of experience in marketing consumer electronics. In addition, we also have a close relationship with a huge manufacturing company in China, which will be our supplier and manufacturer for the iShare. The company has confidently claimed that it is capable of producing our product at our desired cost, given our carefully developed software program and product specifications. FINANCIAL HIGHLIGHTS Market and Competition Analysis Market Opportunity There are many ideas and theories concerning the relationship between the choice of media and personality types nowadays. One of the most popular and widely accepted ideas is the one stating that a person’s music taste reveals personality type: classical music fans are most likely to be shy, while British-pop fans are mostly young, indie hipsters. As we all know, everybody in this world is unique, or at least they want to be perceived that way: as being unique, different, and have their own tastes and preferences for basically everything. Most people are likely to be confident in their own tastes. People with the same taste in music usually gets along well, providing that they believe they have some common values, backgrounds, and personalities that enable them to understand each other better. Music has always been one of the most popular communication tools that bring people closer together. Many people love to share with their friends their favorite album, current favorite songs, or the artists they admire. Nowadays in the world that has become much more digitalized, almost every music and songs offered are in the digital format, to be played and listened to on a digital music player. Sales of music CDs and cassette tapes has been constantly decreasing, while on the other hand the sales of online music, in the iTunes store, for example, has rocketed worldwide. Digital music players have become so popular, and the use of them is widely adopted globally. Cassette tapes and CD players, on the other hand, are going into extinction. One of the general customer needs that have not been fully met in the digital market nowadays is the ability to share their digital files with friends and families easily and without a computer. Whether it is a HTC android, a Samsung Galaxy Player, or an Apple iPod touch, it requires at least a cable and a computer to support file transfer and sh aring. For some particular brands like Apple, transferring files between two iPods or iPhones is still not easy, even with a computer involved. Unlike many other music player producers, the complicated Apple software does not allow users to simply copy and paste files from the portable device to the computer, but requires that users have the corresponding program, the iTunes, that supports the uploading and syncing of files from a computer to their device, and vice versa. Our group sees this unsatisfied customer need as a great market opportunity. We are determined to become the expert in file sharing between electronic devices, especially focusing on music sharing. Eventually we will become the business that provides the market with a device that will make file sharing much more easier for users of almost every digital music player brand, but we have decided to first begin with Apple. From various researches, surveys, and discussions with digital experts, we came to the conclusion that easy music sharing between the Apple i-devices is the highest in demand, due to the brand’s complicated traditional requirements involved in file transferring, and to the massive number of existing Apple users in the market. We have decided to develop first a device that enables music sharing between the Apple iPod/iPhone before we go further and make similar products for other brands like Samsung and HTC in the future. These devices to follow the iShare will work with Samsung Galaxy and HTC Androids, and can be expected to be developed, produced, and offered to the market relatively quickly. This expectation is due to the existing capability, experiences gained, and the competences achieved during the development, sales, and marketing of our first product, the iShare. Our group’s product, the iShare, is a small device that connects 2 Apple iPods or iPhones together, and let users easily transfer files from one device to another. Ordinarily, people would need a computer to transfer files, but the iShare helps eliminate this inconvenient requirement. We aim to provide our customers the never-before convenience, speed, and the fun of directly transferring files between their device and their friends’. Market Size Generally, our target market is the Thai people who own at least one digital music player and have the passion and anxiety about innovative gadgets and file sharing made-easy on their electronic devices. They are likely to be middle-to-upper-class, young to middle aged people with solid income to spend on gadgets and electronic devices’ accessories. They are likely to be interested in new technology and keep themselves updated with new innovation and hi-tech products. We also target on people whose career revolves around the digital music industry, in which it will be very helpful for them to have a device that makes file sharing and transferring convenient and fast. The overall market size is carefully estimated to be approximately 3,000,000 people. However, due to the fact that this business plan will mainly focus only on the iShare, a sharing device specifically designed for the Apple iPod and iPhone, the potential number of market size is reduced to 1,000,000 people as of now. This number is believed to be constantly rising due to the increasing popularity of Apple products. The market size for iShare can be predicted by the number of existing iPod/iPhone users in Thailand. From our careful calculation, together with some reliable sources, out of all the population in Thailand, the number of people who owns at least 1 iPod or iPhone is around 1 million people. Assuming realistically that we can sell the iShare to about 10% of this total, our market size can be estimated at roughly 100,000 people in total. Given that our wholesale price for a single iShare is 2,000 THB, our market size for the iShare alone can be estimated to be around 200,000,000 THB. However, this number does not include other potential markets, the markets for other brands’ users that we will enter in the future. If we take those markets into account, the total market size for our business can be as high as 1,000,000,000 THB. Our Section of the Market Figure 1 : Age groups of Apple i-devices users in Thailand In Thailand, the major group of Apple customers, which accounts for 32% of all users, is between the ages of 22-35. This group also made up a majority of the early adopters of Apple products. Other groups of users, which also contribute a lot to the total number of users, are users with the age of 18-21 and 36-50, which together accounts for 52% of all users. ( See illustration in Figure 1 ) Figure 2 : Percentage share of Apple users among e-mobile users per country According to Figure 2, in Thailand, the percentage share of Apple users among all other e-mobile users in Thailand is 79.6% of the whole market. This makes the market of complementary products to be used with the electronic devices very large; therefore, we can attract a lot of potential customers by introducing iShare, the new, innovative complementary product to the Apple iPhone/iPod. We conducted a survey at MBK mall, one of the most popular malls in Bangkok for mobiles and electronic devices shopping. We gave out a questionnaire about the iShare to 100 people who were wandering around the mobile phone section. More than 90% said that they are very interested in this product and more than 70% of the interested people have responded they are willing to pay up to 3000 THB for the iShare, while another 30% thinks that it would be too expensive and they would not buy it at this price. Market Segmentation Our market for iPod/iPhone users can be segmented further using age groups. By looking at different age groups of users, we can determine the segment that is most likely to be our potential customers and thus market our product and create strategies accordingly. Different segments for our market are as follow: 1. Apple devices users with the age of lower than 18 ( Students ) 2. Apple devices users between 18-21 years old ( College students ) 3. Apple devices users between 22-35 year old ( Junior working class ) 4. Apple devices users between 36-50 years old ( Senior working class ) 5. Apple devices users with the age of more than 50 years old ( Senior citizens ) ( Refer to Figure 1 for illustration ) We are targeting a specific market and plan on overtaking it with quality – what we try to achieve is to be a selection of choice that will offer a never-before convenient and fun product that enables people to share more with each other. We aimed at existing users of iPod/iPhone who desire the ability to save the time and effort required to transfer files between their devices. Basically our market is largely based on a millennium age people that give a huge importance in the ease of use and the amount of time that can be saved by using our product. After looking at some statistics and researches previously done by many interested parties, we came to the conclusion that the most interesting segments for our product are the iPhone/iPod owners with the age of between 18-35, or segment 2 and 3 from our classification. These two segments make up more than 60% of all Apple i-devices users in Thailand. Market Growth Since the market for electronic devices, including smart phones, MP3 players and tablet PC, is growing worldwide, the complementary products market is most likely to be growing along with them in the same direction. We first focused on Apple products because of its undeniable continuous rise in popularity and demand. Not only Apple, there are a lot of other companies such as Samsung, HTC and Sony who are also in the electronic device market, and in the near future there is likely to be more and more brands that will enter into this market. Although this will also attract many other competitors, we can gain the brand loyalty easier as a first mover of a product of this kind in Thailand. Therefore, after we succeed with the iShare for Apple products, we will modify the iShare and make it compatible for use with other brand users in order to generate more revenues for our business from the new market segment. We will develop a similar device to the iShare that will work with a Samsung Galaxy Tab, a HTC android, and possibly other competing brands in the future. We see a lot of opportunity for growth in this industry, and we will continue to maintain our image as being the expert in music sharing with our restless innovation. Market Competition Looking only at the iShare, our direct competitor would be the one company that actually gave us the idea of this device at the very beginning of our project: miShare LLC. MiShare LLC is a software and hardware developer company in New York City, specializing in publishing tools for iPods and other digital media and offering publishing systems for schools, museums, music and movie companies, and marketers who want to distribute audio and video directly to iPods and other digital-media players for immediate playback. MiShare LLC is the inventor and legal producer and distributor of the miShare, a small device that enables users to transfer music, pictures, or videos from one iPod to another without the use of a computer. In the past, there had been similar devices that claimed to have the same ability, but most of them failed and none has ever been as successful as miShare. Nathaniel Wice, the CEO and cofounder of miShare LLC, is the technology entrepreneur and marketer with a journalism background. He adds startup experience and contacts to the miShare and looks forward for collaboration with other startups on business and funding opportunities. His other co-partner name is Josh Hochman, a busy writing software programmer. Hochman is the top programmer with the background in consumer electronics. The company’s main players in the office consist of Nathaniel Wice, Josh Hochman, and a young woman doing shipping-and-receiving department working on the hand-stamping envelopes. Our group’s idea of the iShare originates from the fact that such successful and widely accepted device like a miShare is not yet made available to the Thai and other Asian market. MiShare targets only the iPod users in the United States and Europe. Currently they do not have the policy to ship their product to any Asian country. Thus, we take this opportunity to follow their footsteps and bring to the Thai market this interesting product. We aim to outperform miShare by overcoming their product’s major weakness, which is the current version of miShares software that does not work with the distinctive disk format of iPhone and iPod touch. Their products only works with a limited range of iPod models such as the iPod shuffle, and iPod touch are still unsupported by miShare. This is the technical problem that we aim to overcome in order to provide an even more superior file-sharing device that also works with iPod and iPhone, the iShare, in order to satisfy our customers need and be successful in our business. Other indirect competitors include other iPod/iPhone applications that also enable users to transfer files from one Apple device to another easier than traditionally required. These include applications like Bluetooth Share and Files Lite. Bluetooth share is an application that allows users to share files, photos and contacts. It was first launched to App store in early 2010. However, its major weakness is the fact that its sharing process takes much longer time than the iShare. A regular 3 minutes song would take 5 minutes to transfer from one device to the other. Another indirect competitor, Files Lite, is an application that gives users the ability to synchronize documents directly to their devices. They can store and share files via email and PC easily. The files can be opened directly on the devices. Files Lite supports Microsoft documents, PDF, HTML, images, videos, audios, Apple iWork and text documents. With the most recent update in January 2012, this application allows users to transfer their files easier and quicker. However, a Wi-fi connection is required to connect Files Lite to transfer files and documents. The transfer time is slightly faster than Bluetooth share, but still is much slower compared to iShare. Despite the fact that these applications have also made it easier for its users to transfer music and files between 2 iPods or iPhones, there are still some disadvantages that still make the iShare a superior choice over them. The fact that these applications are much slower and that some require internet connection in order to transfer files are some of those disadvantages. Looking at the situation from every angle, the iShare still holds the superior advantage of being the fastest, most convenient choice ever for file sharing. Product and Technology Product Technologies From our design development and our effective and innovative production process, the iShare will provide the convenience and speed in file transferring between Apple i-Devices like never before. Our RD Team has developed this new gadget to make file sharing between iPods and iPhones much easier. No computer or cable is needed, and its very easy to use. Users can use the iShare to transfer just about anything they have on their iPods or iPhones: music, photos, videos, and playlists. A typical song will take ten seconds to transfer once the devices are attached, depending on the file sizes. A short home video in iPod format could require half a minute.

Friday, November 15, 2019

Hurricane Katrina Essay -- Natural Disasters Papers

Hurricane Katrina Hurricane Katrina has been one the most devastating natural disasters to hit USA ever costing a total of 125 billion dollars, and leaving almost 1000 dead. We need to look at ways of preventing such a disaster. As this is the only problem, we can predict and perceive how dangerous a hurricane can be but preventing one is a different matter entirely. The U.S. National Hurricane Centre (NHC) reported on August 23 that Tropical Depression Twelve had formed over the south-eastern Bahamas this was soon to be named hurricane Katrina, it was upgraded to a hurricane on the 25th of august, it hit land the same day lousing its strength while travailing over Florida. Although on the 26th of August it grew it to a category 2 hurricane. It became clear the storm was headed for Mississippi and Louisiana. The next day the hurricane grew to category 3 and again the day after, the storm grew in intensity and on August the 28th it became category 5 with winds up 214mph. Katrina made...

Tuesday, November 12, 2019

Network VPN and Web Security Cryptography Essay

Securing Internet commercial transactions and sensitive banking data is increasingly becoming critical as threats to computer networks continue to cause significant financial losses resulting from data damage, loss or corruption by spy ware, viruses and other data corrupting hostile codes (Mogollon, 2007). The consequences of having weak security system administration become enormous and companies should step up their security measures to protect sensitive data by cryptographic methods. In online transactions, the secure Web server communicates with the client’s computer by authenticating each other. They do this by enciphering the data which is transmitted by means specific protocols such as transport layer security (TLS), Internet protocol security (IPsec) and secure socket layer (SSL). All Web browsers such as Internet Explorer and Netscape have in-built TLS and SSL protocols. To make internet transactions safe, the problems associated with end-user certificate distribution have to be solved and this was the challenge that led to the fall of secure electronic transaction (SET) technology after its introduction in 1990s (Mogollon, 2007). This paper will discuss important technologies behind VPN SSL and website encryption paying critical attention to algorithms which make encryption in financial systems such as the Internet commercial transactions possible and secure. In particular, the paper addresses advanced and critical issues in online transactions as one of the areas applying cryptography and network security. The Need for Network Security in Financial Systems The modern online commerce and financial systems are rapidly growing partly because several protocols for Web encryption are often implemented hence ensuring secure transactions. In a practical scenario, online clients buying commodities enter the credit card number online and then hit the â€Å"Submit† button. While this information is provided online and can be deciphered by hackers, the Web browser commits to secure this online transaction by enciphering the transmitted data (Mogollon, 2007). Secure communication between the client and the server requires client-server authentication which is a cryptographic key exchange involving an agreement of both parties. The client and the server will agree on a common pre-master secret code or key. Data is then enciphered using the keys which are generated from the agreed pre-master key. This communication agreement between the client and server also involves the decisions on which versions and protocols to use such as SSL2, SSL3, TLS1. 0, and TLS 1. 1 (Mogollon, 2007). They will also agree on which cryptographic algorithm to use and whether to authenticate to each other or not. The use of certain techniques of public-key encryption which generate the pre-master secret key will also be agreed on. Both have to make an agreement that session keys are to be created to help in the enciphering of the messages. Virtual Private Network (VPN) A virtual private network (VPN) serves as an extension of a private network which encompasses links across public or shared networks such as the Internet (Mogollon, 2007). VPN enables users to send data between two interconnected computers across a public or shared network in a way that it emulates point-to-point private link properties. Virtual private networking is the technique of creating and configuring VPN and it emulates point-to-point links (Mogollon, 2007). There should be data encapsulation or wrapping with headers to provide routing information thus allowing it to traverse the public or shared transit internetwork and attain its endpoint. At the same time, to emulate private links, the sent data must be encrypted for security and confidentiality (Microsoft Corporation, 2003). The packets intercepted on public or shared networks cannot be deciphered without the use of encryption keys. Private data is encapsulated in a connection portion known as the tunnel and it is encrypted in a connection portion known as the VPN connection (Microsoft Corporation, 2003). Fig 1. 1 Figure 1. 1: Virtual private network connection (Microsoft Corporation, 2003) The VPN connection provide the capabilities for remote users while at homes, branch offices or even while traveling to securely connect to remote organizations’ servers by the use of routing infrastructure which is provided by a shares or public network like the Internet(Microsoft Corporation, 2003). Since the creation of VPN connection is facilitated by the Internet from anywhere, these networks require strong security mechanisms to avoid any unwelcome private network access and to protect private data while traversing the public network (Microsoft Corporation, 2003). These security mechanisms include data encryption and authentication as well as other advanced VPN security measures such as certificate-based authentication. Virtual private network security (VPNs) is provided by the Internet Protocol security (IPsec), TLS and SSL (Mogollon, 2007). IPsecVPN are commonly used in several enterprises but they are not as easy to use as SSLVPN. Another difference between IPsec VPN and SSL VPN is that IPsec VPN works at Layer 3 and creates a tunnel into networks. This way, IPsec allows for devices to log on as if they have physical connections to the local area network (LAN) (Mogollon, 2007). On the other hand, the SSL VPN work at the application Layer 4 and users can have access to individual applications through the Web browser. In SSLVPN, the administrators can dictate the access by applications instead of providing entire network access. VPN emulates the facility of private wide area network (WAN) by the use of private Internet Protocol (IP) and public internet backbones (Mogollon, 2007). Secure Socket Layer Virtual Private Network (SSLVPN) Security networks particularly those used in online transactions demand increasingly complex cryptographic systems and algorithms (Lian, 2009). Therefore, there is need for individuals concerned with the implementation of security policies in companies to use technical knowledge and skill in information technology in order to implement critical security mechanisms. Unlike the traditional IPsec VPN which requires the use of special client software on computers of end users, the SSL VPN such as Web SSL VPN requires no installation of such software (Lian, 2009). SSLVPN is mainly designed to provide remote users access to various client-server applications, Web application as well as internal network connections. SSL VPN authenticates and encrypts client-server communication (Lian, 2009). Two types of SSL VPNs are recognized: the SSL Portal VPN and SSL Tunnel VPN (Lian, 2009). The SSL Portal VPN usually allows a single SSL to connect to the website while allowing secure access to a number of network services by end users. This common website is known as the portal because it serves as a single door leading to a number of resources. The site is usually a single page having links to other pages. The second example of SSLVPN is the SSL Tunnel VPN which allows Web browsers, and thus users to safely access a number of multiple network services as well as protocols and applications which are not Web-based (Lian, 2009). Access is mainly provided via a tunnel which runs under SSL. The SSL Tunnel VPN requires all browsers to have the capacity to support active content that makes them to have more functionality not possible with SSL Portal VPN. The active content supported by SSL Tunnel VPN includes Active X, Java, JavaScript and plug-ins or Flash applications (Lian, 2009). Secure Socket Layer (SSL) provides a standardized communication encryption deployed for the purpose of protecting a number of protocols (Lian, 2009). For instance, most online transacting sites such as PayPal, AlertPay and MoneyBookers have their Universal Resource Locator (URL) address beginning with â€Å"https://† instead of â€Å"http://. † This means that the Hypertext Transfer Protocol (Http) is wrapped inside the SSL (Lian, 2009). Cryptography and Encryption Cryptography is concerned with the development of algorithms where data is written secretly thus the names, crypto-meaning secret and –graphy, meaning writing (Li, n. d). Cryptography basically provides a number of ways to confirm data security during VPN communication. These various means or algorithms include hash, cipher, digital signature, authentication and key generation (Lian, 2009). Cryptography endeavors to conceal the actual context of data from everyone except the recipient and the sender hence maintaining secrecy or privacy. Cryptography also verifies or authenticates the correctness or validity of data to recipients in virtual private network. As a result of this, cryptography has been the basis of a number of technological solutions to problems such as communication and network security in share networks such as that in VPN. In general, cryptography can be defined as the technique exploiting the methods and principles of converting intelligible data into unintelligible one and then changing it back to the original form (Li, n. d). SSL VPN encryption involves the adoption of traditions and novel algorithms of encryption in the protection of sensitive data such as the one exchanged during online transactions. The original data is transformed into secure data with specific algorithm of encryption by the use of the encryption key. At the same time, the encrypted data can be decrypted back into its original state with the help of algorithms of decryption. Sometimes, attacks to data are common in networked systems where hackers break into systems to obtain the original data which has not been encrypted. The present research focuses on the efficient algorithms of encryption and decryption which are secure against these attacks (Lian, 2009). Typical VPN Encryption Algorithms VPN encryption utilizes a number of encryption algorithms to secure flowing traffic across a shared or public network (Malik, 2003). The encryption of VPN connections is done so as to allow VPN and Web traffic to traverse share or public network like the Internet. Example of encrypted VPN is the SSL VPN and IPsec which uses encryption algorithms to safely allow traffic across shared or public network such as the Internet (Malik, 2003). Apart from classifying VPN in terms of encryption, classification of VPN can also be based on the model of OSI layer which they are constructed in. this is an important classification as the encrypted VPN only allows specific amount of traffic which gets encrypted and the degree of transparency to VPN clients (Malik, 2003). Classification of VPN based on the OSI model layers recognizes three types of VPNs: data link layer, network layer and application layer VPNs (Malik, 2003). Algorithms used for encryption can be classified into partial encryption, direct encryption and compression-combined encryption (Lian, 2009). According to the number of keys used, algorithms can also be classified into asymmetrical and symmetrical algorithms. In general, different encryption algorithms encrypt data volumes hence acquiring different efficiency and security. It therefore remains a decision of system security administrators to select which algorithm to use which will provide the best VPN security (Microsoft Corporation, 2005). There is no single encryption algorithm which is efficient to address all situations (Microsoft Corporation, 2005). However, there are basic factors to consider when selecting the type of algorithm to use in VPN security. Strong encryption algorithms always consume more resources in computer systems compared to weaker encryption algorithms. Long encryption keys are considered to offer stronger securities than the shorter keys. Therefore, Chief Security Officer (CSOs) should decide on longer keys to enhance system securities (Microsoft Corporation, 2005). Asymmetric algorithms are also considered stronger than the symmetric ones since they use different keys (Microsoft Corporation, 2005). However, asymmetric algorithms of encryption are slower compared to symmetric ones. Experts also prefer block ciphers as they use loner keys hence offer stronger security compared to stream ciphers. Passwords that are long and complex seem to offer better security than shorter and simpler passwords which can be broken easily by hackers. It should be factor to consider the amount of data which is being encrypted. If large amounts of data are to be encrypted, then symmetric keys are to be used to encrypt the data and asymmetric keys should be used to encrypt the symmetric keys. It is also critical to compress data before encrypting because it is not easy to compress data once it has been encrypted (Microsoft Corporation, 2005). Direct encryption involves the encryption of data content with either traditional or novel cipher directly. Partial encryption involves the encryption of only significant portions of data and other parts are left unencrypted (Microsoft Corporation, 2003). Compression-combined encryption involves the combinations of encryption operation with compression operation which are simultaneously implemented. Comparably, direct encryption offers the highest data security as it encrypts largest volumes of data. However, this method has the lowest efficiency as it takes much time encrypting all data volumes. The reduction of data volumes in partial and compression-combined encryptions result to lower security but with highest efficiency (Lian, 2009). There are specific examples of ciphering algorithms used by most online companies to protect sensitive and private data such as business data, personal messages or passwords for online banking. The commonly used ciphering algorithms include the DES/3 DES, RC4, SEAL and Blowfish (MyCrypto. net, n. d). Data encryption in VPN client-server communications is critical for data confidentiality. This is because data is passed between VPN clients and VPN servers over a public or shared network which often poses risks of illegal data interception by the hackers. However, VPN servers can be configured to force communication encryption. The encryption will force VPN clients connecting to VPN servers to encrypt their data or else be denied connections. Microsoft Windows Server 2003 employs two different types of encryptions: the Internet Protocol security (IPSec) encryption that uses the Layer Two Tunneling Protocol (L2TP) and Microsoft Point-to-Point Encryption (MPPE) which used Point –to –Point Tunneling Protocol (Microsoft Corporation, 2005). In telephone communication or dial-up clients, data encryption is not necessary between the clients and their Internet Service Providers (ISP) since the encryption is always carried out with VPN client-VPN server connections. This implies that mobile users using dial-up connections to dial local ISPs need not to encrypt anything since once the Internet connection has been established, the users can create VPN connection with corporate VPN servers. In case VPN connections are encrypted, there is no need for encryption between users and ISPs in dial-up connections (Microsoft Corporation, 2005). VPN encryption generally allows for the attainment of the highest possible security standards made possible by key generation in a certified centre using the RSA, 1024 bit (MyCrypto. net, n. d). Smart card technology especially the TCOS-2. 0 Net Key SmartCard OS (operating system) grant a safe mode for key storage which complies with the evaluation criteria of information security systems (Li, n. d). Different types of encryption algorithms employ proprietary specific methods to generate the secret keys and thus the encryption algorithms become useful in different types of applications (MyCrypto. net, n. d). The length of keys generated by these algorithms determines the strength of encryption. The most common algorithms, DES/3DES, BLOWFISH, IDEA, SEAL, RC4 and RSA have different qualities and capabilities which network security administrators may choose to use in providing VPN security (MyCrypto. net, n. d). The RSA algorithm, developed in 1979 was named after its developers Ron Rivest, Shamir and Adleman hence the name RSA (Riikonen, 2002). RSA supports digital signatures and encryption and it is therefore the most widely used type of public key algorithm. RSA takes advantage of the problem of integer factorization to enhance security and it utilizes both private and public keys. It is one of the algorithms which is easy to understand and it has been patent-free since the year 2000 (Riikonen, 2002). RSA is commonly used for securing IP data, transport (SSL/TSL) data, emails, terminal connections and conferencing services. Its security entirely depends on the randomness of the numbers generated by the Pseudo Random Number Generator (PRNG). Data Encryption Standard/ Triple Data Encryption Standard (DES/3DES) has widely been used as a standard in banking institutions in Automatic Teller Machines (ATMs) as well as in UNIX OS password encryption (MyCrypto. net, n. d). DES/3DES allows the authentication of Personal Identification Number (PIN) to be made possible. While DES is basically a 64-bit block cipher, it uses 56-bit keys in encryption and most users don’t regard it as advances in computer technology continue to transform the banking and online industry (MyCrypto. net, n. d). DES has been found to be vulnerable to some cyberattacks and experts have now recommended 3DES as the stronger option. 3DES has the ability to encrypt data 3 times hence the name 3DES. It uses different keys for all the three passes and this gives it a total cumulative of 112-168 bit key size (MyCrypto. net, n. d). IDEA (International Data Encryption Algorithm) is another type of algorithm first developed by Prof. Massey and Dr. Lai in the wake of 1990s in Switzerland (MyCrypto. net, n. d) . It was meant to replace DES algorithm but one of the weaknesses of DES is that it uses a common key for both encryption and decryption and it only operates on 8 bytes at every incident. The success of IDEA in enhancing security lies on the length of its 128-bit key which makes hackers difficult to break especially those who try out every key. To present, there are no known means of breaking the IDEA 128-bit key other than trying each key at a time which is also difficult (MyCrypto. net, n. d). This then makes the algorithm better for security. Since it is a fast algorithm, IDEA has been implemented in most hardware chipsets to male them run faster (MyCrypto. net, n. d). Just like IDEA and DES, Blowfish represent another type of a symmetric block cipher which tales a varying key length ranging from 32 to 448 bits (MyCrypto. net, n. d). This makes it ideal for both exportable and domestic use. Developed in 1993 by Bruce Schneier, Blowfish became not only a fast alternative but also a free option to the other existing algorithms of encryption. Blowfish is now becoming more accepted by many experts because of its strong encryption properties (MyCrypto. net, n. d). Software-optimized Encryption Algorithm (SEAL), developed by Coppersmith and Rogaway is an example of a stream cipher where data is encrypted continuously (MyCrypto. net, n. d). Stream ciphers represent a group of algorithms which are faster compared to block ciphers such as IDEA, Blowfish and DES. However, stream ciphers have an extended initialization phase whereby a secure harsh algorithm is used to complete the set of tables (MyCrypto. net, n. d). It is considered a very fast algorithm as it uses 160 bit key for the purpose of encryption. In addition, SEAL is considered one of the safest algorithms used to protect data from hackers and thus, it can be used in managing passwords in financial systems (MyCrypto. net, n. d). Ciphers and Encryption Ciphers transform plaintext into secured ciphertext and then recover it back from ciphertext with the help of keys (Li, n. d). This way, data is kept private during client-server communication this providing maximum VPN and Web security. The transformation into plaintext and the recovery from ciphertext is commonly known as encryption and decryption respectively. During the decryption process, a key is required and without the key, correct plaintext recovery is not possible. There are several types of ciphers widely known and have been classified according to their properties. Ciphers can be classified as to either symmetric or asymmetric ciphers (Li, n. d). In symmetric ciphers, the decryption key used in cryptography is the same as that used in encryption. The operation for decrypting is often symmetric to the encrypting operation in symmetric ciphers (Li, n. d). In asymmetric ciphers, the decryption operations are never symmetric to encryption operations hence the keys used might differ (Lian, 2009). A simple model for showing asymmetric and symmetric ciphers is as shown below in Fig 2. 1 (a) and (b). Fig 2. 1(a) and (b) (a) Symmetric cipher (b) Asymmetric cipher Fig 2. 1 (a) and (b): Symmetric and asymmetric ciphers (Lian, 2009) In the models shown above, symmetric cipher use same key (K0) in encryption and decryption while asymmetric cipher use different keys (K1) and (K1) for encryption and decryption respectively (Lian, 2009). Since in asymmetric cipher the key is similar in both encryption and decryption operations, the key is known both to the sender and the receiver but not to the third party and it should always be kept private. Otherwise, the third party can decrypt the ciphertext and expose the ciphertext as plaintext. This is why the asymmetric cipher is also known as the private cipher. However, symmetric ciphers such as Advanced Encryption Standard (AES), Data Encryption Standard (DES) and International Data Encryption Algorithm (IDEA) have widely been used despite some vulnerabilities of ciphertext decryption by third parties (Lian, 2009). Asymmetric ciphers offer advanced security as the encryption key (K1) can securely be made public but the decryption key (K2) is safely kept private only made known to the receiver. This means that if the sender and the third party only knows one key (the encryption key), he is not able to decrypt the ciphertext hence maintaining maximum network security. The asymmetric cipher is therefore known as the public cipher and the symmetric cipher, private cipher. Asymmetric cipher or public ciphers are regarded more suitable particularly for key exchanges in online communications and internet commercial transactions. The reasons which make public ciphers suitable for VPN securities are for instance the difficulties in large number factorization in RSA cipher. The problem of the discrete logarithm is the concept behind the suitability of Elliptic Curve Cryptography (ECC). The ElGamal encryption is also regarded to offer suitable securities because of the problem with complex computing of discrete logarithms as the encryption is always defines over a wide range of cyclic groups. Cryptanalysis and Security Attacks Cryptanalysis techniques allow hackers to break easily into cipher systems in VPN. According to Kerckhoffs principle, the hacker clearly knows the cipher per se and the security of the cipher is largely depended on the private key (Lian, 2009). Cryptanalysis techniques employed by attackers aim to get access to the cipher’s private key with the aim of knowing the information as plaintext, ciphertext or even encryption algorithm. Cryptanalysis methods can be grouped into four categories according to the information best known to the attackers (Lian, 2009). The attack based on only ciphertext means that the attack only progresses after the attacker has known ciphertext collection. This method is known as ciphertext-only attack (Lian, 2009). Known-plaintext attack is another cryptanalysis method which means that the attack method will only be successful when the hacker has obtained pairs of plain-text-ciphertext sets. Another attack method is the chosen-plaintext attack which progresses only when the hacker has ciphertexts which correspond to arbitrary plaintexts sets. The last possible method of attack is the related-key attack which works after the attacker has obtained ciphertext which are encrypted using two dissimilar keys (Lian, 2009). Encryption algorithms security is determined by the resistance to cryptanalysis techniques including attacks like differential analysis, statistical attack and relate-key attacks. Ciphers used for network VPN and Web security should be analyzed thoroughly before they can be used, otherwise, attackers will break into systems when ciphers don’t provide the required maximum network security. Simple metrics can be employed in measuring resistance to cryptographic analysis and common attacks of ciphers. These metrics include plaintext sensitivity, key sensitivity and ciphertext randomness (Lian, 2009). It can therefore be said that the cryptographic algorithm is of high security only when the encryption algorithm is heavily secured against cryptographic analysis and attacks. In case the algorithm doe not provide this essential requirement, the encryption algorithm is then considered to be of low security. Key sensitivity refers to changes in ciphertext as a result of changes in keys. Good ciphers will recognize the slightest difference in keys and cause significant changes in ciphertext. Plain text sensitivity is almost similar to plaintext sensitivity and is defines as the alteration in ciphertext as a result of plaintext changes. Good ciphers should also be able to recognize any slight difference in plaintext changes and therefore cause significant ciphertext changes. Ciphertext randomness basically differs from the plaintext. In good ciphers, the ciphertext always has good randomness which makes it hard for attackers to establish holes in statistical properties of ciphertexts (Lian, 2009). Ciphers transform original intelligible data into a form which is unintelligible by the help of keys. This method is used to secure data confidentiality. Hash always uses the original data to generate short strings used to protect data integrity. Digital signatures employ the key-based hash in the generation of hash values for the data which is to be protected. Digital signatures are often used in the detection whether operations are done by the authenticated owner or not. This is critical in online transactions such as those involving online payment methods such as AlertPay, PayPal and MoneyBookers. Key generation and authentication provide critical methods which help in the generation and distribution of multiple keys during communication. Hackers use cryptoanalytical methods to analyze and break into networked systems through cryptographic means. Cryptoanalysis provides some special or common means to analyze hash, cipher, digital signatures or key generation and authentication algorithms securities. The best cryptographic methods in VPN and Web security should be immune to cryptoanalytical methods before they can be applied in system network security. Conclusion Encryption algorithms offer secure communication against cryptanalysis used by attackers such as known-plaintext attack, ciphertext-only attack and select-plaintext attacks. Complete encryption offers security to traditional and novel ciphers against cryptanalysis by hackers. Partial encryption allows some parameters to be encrypted using ciphers which are immune to cryptographic attacks. Compression-combined encryption involves the combination of encryption and comprension operations which make it secure from the perspective of cryptanalysis. VPN encryption utilizes basic encryption mechanisms which secure the traffic flowing across shared or public network. The encryption is critical in allowing VPN traffic to traverse public or shared network like the Internet. Banking systems have always employed complex security measures such as SSL VPN and IPsec VPN to encrypt traffics by the use of encryption algorithm in shared VPN connections. References: Malik, S (2003). Network security principles and practices. Indianapolis, IN: Cisco Press. Mogollon, M (2007). Cryptography and security services: mechanisms and applications. Hershey, New York: Cybertech Publishing. Lian, S (2009). Multimedia content encryption: Techniques and applications. New York: Taylor & Francis Group. Li, X (n. d). Cryptography and network security. Retrieved July 31, 2010 from, http://www. cs. iit. edu/~cs549/lectures/CNS-1. pdf. Microsoft Corporation (2005). Data encryption between VPN server and client. Retrieved August 4, 2010 from, http://technet. microsoft. com/en- us/library/cc778013%28WS. 10%29. aspx Microsoft Corporation (2003). Virtual private networking with Windows Server 2003: Overview. Retrieved August 1, 2010 from, http://www. microsoft. com/windowsserver2003 MyCrypto. net (n. d). Encryption algorithm. Retrieved August 4, 2010 from, http://www. mycrypto. net/encryption/crypto_algorithms. html Riikonen, K (2002). RSA algorithm. Retrieved August 4, 2010 from, http://www. cs. uku. fi/kurssit/ads/rsa. pdf

Sunday, November 10, 2019

Kung-Fu Panda 2 Belonging

In the film Kung-Fu Panda 2, the extended metaphor of â€Å"Inner Peace† in the film symbolizes the need for a person to acknowledge their own weaknesses, their past and their faults, which conveys the importance of finding and accepting one’s identity. Furthermore throughout the film, there are various scenes where water droplets are dropping and flowing in slow motion, combined with flashbacks of the past, demonstrates the power of spiritual connections and nature. The importance of belonging and loving your family is also emphasised in Kung-Fu Panda 2.Through the protagonist, Po’s, exploration of his true parentage, the power of common memories to influence the bonds between people is displayed. It is important to accept who yo9u are as it can affect where you belong and how you feel. When he questions his dad about his true parentage, saying he had a dream about his mother, his adoptive father, Mr. Ping, freezes and looks agitated, showing that he is scared t hat he will lose Po if the truth is revealed. Whenever Po questions his lineage, sad music is played, making the audience feel sympathy for Po’s turmoils.Even after all the events that happens throughout the film, Po comes home back to Mr. Ping he says to him â€Å"I know who I am now, I am your son, I love you dad. † While this is happening, there is soft and happy music playing in the background, showing that even though they aren’t blood related, they are still happy together. This is true belonging. Even though they have no blood relations, they are truly happy together and value each other’s company, showing that they belong together. This relates to belonging and accepting yourself.The importance of individuality in finding a role in society is emphasised heavily throughout the film. The film follows the growth of Po in his journey of achieving â€Å"Inner Peace†. In the film you see Po’s idolization of other Kung Fu legends displays h is own inner emotional insecurity and spiritual turmoil. This is also reinforced through the technique juxtaposition, shown through Po’s fatness and Tigress’s hardened self. The need for you to accept your true self in forming meaningful relationships is shown through this.It is shown through the dramatic irony of Po’s insensitive comment â€Å"I have to know, the hard-core wouldn’t understand† directed at Tigress, saying that she is unable to feel both physically and emotionally. The close-up shot of Tigress’s saddened and hurt face combined with the sad; non-diegetic music further incites the audience’s sympathy of Po trying to find out about his own individuality with Tigress stopping him. Throughout the film you also hear the metaphor of â€Å"Inner Peace† used excessively.The phrase â€Å"Inner Peace† means to be spiritually and mentally at peace, with enough knowledge to keep oneself strong when under great hardshi p and stress. Throughout the film, Po is plagued by nightmares of his past and his own insecurity compared to Tigress and the others. In the beginning, Po witnesses Master Shifu moving a droplet of water all over his body without it splashing or breaking its form. When Po inquires how he did this, Shifu responds by saying â€Å"Inner Peace†. It is implying that having inner peace allows you to do things that are impossible, which is also shown when Po catches a cannon ball and throws it back.In the film, having inner peace symbolises that you have accepted yourself for who you are, complete with strengths and weaknesses. By having inner peace, it is saying that you can achieve things that you couldn’t achieve before & to be able to find out where you truly belong. The director of this movie positions the audience to sympathise with Po through the demonstration of the fallibility of one’s memory, which is shown through the flashbacks and dramatic devices used as Po lies to himself. Po couldn’t accept his own self throughout the film, which draws in the audience to feel sorry and sympathise for him.The differing perspectives of Po and his companions are comically shown through his fights with them. However, the audience is positioned to support Po though the uses of Mise-en-scene, as screen elements’ visual size are diminished whenever Po is in the screen. As Po zooms towards the audience and takes the centre of the screen, it enables the audience to see things through Po’s perspective. At the end of the film, Po is hailed as a hero & feels that he has finally found that he has been accepted by Tigress and the others. He finally feels that he belongs.

Friday, November 8, 2019

Osmosis essays

Osmosis essays Diffusion, Osmosis and Cell Membranes All living things have certain requirements they must satisfy in order to remain alive. These include exchanging gases (usually CO2 and O2), taking in water, minerals, and food, and eliminating wastes. These tasks ultimately occur at the cellular level, and require that molecules move through the membrane that surrounds the cell. This membrane is a complex structure that is responsible for separating the contents of the cell from its surroundings, for controlling the movement of materials into and out of the cell, and for interacting with the environment surrounding the cell. There are two ways that the molecules move through the membrane: passive transport and active transport. Active transport requires that the cell use energy that it has obtained from food to move the molecules (or larger particles) through the cell membrane. Passive transport does not require such an energy expenditure, and occurs spontaneously. The principle means of passive transport is diffusion. Diffusion is the movement of molecules from a region in which they are highly concentrated to a region in which they are less concentrated. It depends on the motion of the molecules and continues until the system in which the molecules are found reaches a state of equilibrium, which means that the molecules are randomly distributed throughout the system. An important concept in understanding diffusion is the concept of equilibrium. There are two types of equilibrium. Static equilibrium occurs when there is no action taking place. Dynamic equilibrium occurs when two opposing actions occur at the same rate. For example, consider a bucket full of water. It is in a state of static equilibrium because the water level stays the same. The water is not moving. If you were to poke a hole in the bottom of the bucket, water would leak out. This system would not be at equilibrium because there is action taking place - water is leaking...

Tuesday, November 5, 2019

Battle of Big Bethel - American Civil War

Battle of Big Bethel - American Civil War The Battle of Big Bethel was fought June 10, 1861, during the American Civil War (1861-1865). Following the Confederate attack on Fort Sumter on April 12, 1861, President Abraham Lincoln called for 75,000 men to aid in putting down the rebellion. Unwilling to provide soldiers, Virginia instead elected to leave the Union and join the Confederacy. As Virginia mobilized its state forces, Colonel Justin Dimick prepared to defend Fort Monroe at the tip of the peninsula between the York and James Rivers. Situated on Old Point Comfort, the fort commanded Hampton Roads and part of the Chesapeake Bay. Easily resupplied by water, its land approaches consisted of a narrow causeway and isthmus which were covered by the forts guns. After refusing an early surrender request from the Virginia militia, Dimicks situation became stronger after April 20 when two Massachusetts militia regiments arrived as reinforcements. These forces continued to be augmented over the next month and on May 23 Major General Benjamin F. Butler assumed command. As the garrison swelled, the forts grounds were no longer sufficient to encamp the Union forces. While Dimick had established Camp Hamilton outside the forts walls, Butler sent a force eight miles northwest to Newport News on May 27. Taking the town, the Union troops constructed fortifications which were dubbed Camp Butler. Guns were soon emplaced which covered the James River and the mouth of the Nansemond River. Over the following days, both Camps Hamilton and Butler continued to be enlarged. In Richmond, Major General Robert E. Lee, commanding the Virginia forces, increasingly became concerned regarding Butlers activity. In an effort to contain and push back Union forces, he directed Colonel John B. Magruder take troops down the Peninsula. Establishing his headquarters at Yorktown on May 24, he commanded around 1,500 men including some troops from North Carolina. Armies Commanders: Union Major General Benjamin ButlerBrigadier General Ebenezer Peirce Confederate Colonel John B. MagruderColonel Daniel H. Hill Magruder Moves South On June 6, Magruder sent a force under Colonel D.H. Hill south to Big Bethel Church which was approximately eight miles from the Union camps. Assuming a position on the heights north of the west branch of the Back River, he commenced building a series of fortifications across the road between Yorktown and Hampton including a bridge over the river. To support this position, Hill built a redoubt across the river on his right as well as works covering a ford to his left. As construction moved along at Big Bethel, he pushed a small force of around 50 men south to Little Bethel Church where an outpost was established. Having assumed these positions, Magruder began harassing Union patrols. Butler Responds Aware that Magruder had a substantial force at Big Bethel, Butler wrongly assumed that the garrison at Little Bethel was of a similar size. Desiring to push the Confederates back, he directed Major Theodore Winthrop of his staff to devise an attack plan. Calling for converging columns from Camps Butler and Hamilton, Winthrop intended to mount a night assault on Little Bethel before pushing on to Big Bethel. On the night of June 9-10, Butler put 3,500 men in motion under the overall command of Brigadier General Ebenezer W. Peirce of the Massachusetts militia. The plan called for Colonel Abram Duryees 5th New York Volunteer Infantry to leave Camp Hamilton and sever the road between Big and Little Bethel before attacking the latter. They were to be followed by Colonel Frederick Townsends 3rd New York Volunteer Infantry Regiment which would provide support. As troops were departing Camp Hamilton, detachments of the 1st Vermont and 4th Massachusetts Volunteer Infantry, under Lieutenant Colonel Peter T. Washburn, and Colonel John A. Bendixs 7th New York Volunteer were to advance from Camp Butler. These were to meet Townsends regiment and form a reserve. Concerned about the green nature of his men and confusion at night, Butler directed that Union troops wear a white band on their left arm and use the password Boston. Unfortunately, Butlers messenger to Camp Butler failed to pass on this information. Around 4:00 AM, Duryees men were in position and Captain Judson Kilpatrick captured the Confederate pickets. Before the 5th New York could attack they heard gunfire in their rear. This proved to be Bendixs men accidentally firing on Townsends regiment as they approached. As the Union had yet to standardize its uniforms, the situation was increasingly confused as the 3rd New York wore gray. Pushing On Restoring order, Duryee and Washburn recommended that the operation be canceled. Unwilling to do so, Peirce elected to continue the advance. The friendly fire incident alerted Magruders men to the Union attack and the men at Little Bethel withdrew. Pushing on with Duryees Regiment in the lead, Peirce occupied and burned Little Bethel Church before marching north towards Big Bethel. As the Union troops approached, Magruder had just settled his men into their lines having aborted a movement against Hampton. Having lost the element of surprise, Kilpatrick further alerted the enemy to the Union approach when he shot at the Confederate pickets. Partially screened by trees and buildings, Peirces men began to arrive on the field. Duryees regiment was the first to attack and was turned back by heavy enemy fire. Union Failure Deploying his troops astride the Hampton Road, Peirce also brought up three guns overseen by Lieutenant John T. Greble. Around noon, the 3rd New York advanced and attacked the forward Confederate position. This proved unsuccessful and Townsends men sought cover before withdrawing. In the earthworks, Colonel W.D. Stuart feared that he was being outflanked and withdrew to the main Confederate line. This allowed the 5th New York, which had been supporting Townsends regiment to capture the redoubt. Unwilling to cede this position, Magruder directed reinforcements forward. Left unsupported, the 5th New York was forced to retreat. With this setback, Peirce directed attempts to turn the Confederate flanks. These too proved unsuccessful and Winthrop was killed. With the battle becoming a stalemate, Union troops and artillery continued firing on Magruders men from building on the south side of the creek. When a sortie to burn these structures was forced back, he directed his artillery to destroy them. Successful, the effort exposed Grebles guns which continued firing. As the Confederate artillery concentrated on this position, Greble was struck down. Seeing that no advantage could be gained, Peirce ordered his men to begin leaving the field. Aftermath Though pursued by a small force of Confederate cavalry, the Union troops reached their camps by 5:00 PM. In the fighting at Big Bethel, Peirce sustained 18 killed, 53 wounded, and 5 missing while Magruders command incurred 1 killed and 7 wounded. One of the first Civil War battles to be fought in Virginia, Big Bethel led Union troops to halt their advance up the Peninsula. Though victorious, Magruder also withdrew to a new, stronger line near Yorktown. Following the Union defeat at First Bull Run the following month, Butlers forces were reduced which further hampered operations. This would change the following spring when Major General George B. McClellan arrived with the Army of the Potomac at the start of the Peninsula Campaign. As Union troops moved north, Magruder slowed their advance using a variety of tricks during the Siege of Yorktown.

Sunday, November 3, 2019

Profiles of an Effective Teacher Essay Example | Topics and Well Written Essays - 750 words

Profiles of an Effective Teacher - Essay Example In addition, it is the role of the school principles to hire reliable teachers with all the qualities of effectiveness. From the research effective teaching is described as a practice used to cultivate learning skills, create motivation, and instill knowledge to students. Skills and competencies of an effective teacher could be demonstrated when teaching in class, planning their lessons, modes of motivating students in classes among others. However, to improve the level of effectiveness of the teachers, principals should play a big role by devising various activities that could assist in guiding the teachers. The principal should supervise the teaching practices and evaluate the progress of the teachers to find whether they are on the right track towards effectiveness. The principals should come up with the ways to reward effective teachers and also creating guidelines that can assist the teachers to develop their skills and competencies. To improve the achievement of schools, principals should create strategies that could impart positive changes in the performance progress of both the teachers and students alike. The principals should adopt five domains implemented by Marzano (2013). Firstly, the principals and the teachers should develop data the focuses on the improvement of the students’ performance both at school and outside the school. Secondly, the teachers and principals should improve the existing instructions continuously that seem to pull back the performance of the school. Thirdly, the school should have a definite and reliable curriculum based on effective teaching and learning practices. Fourth, cooperation and collaboration among the teachers, principals, parents, and students should be put in place in the schools’ virtues.

Friday, November 1, 2019

Article from Marketing Journals Example | Topics and Well Written Essays - 1000 words

From Marketing Journals - Article Example The process adds to the product's final cost, convenience, and customer acceptance. A process may be streamlined to reduce costs and diminish consumer options, or the product may be customized, which adds to the total cost of the product but offers the consumer a greater number of alternatives. The article contended that the two major measurable and manageable characteristics of any process are complexity and divergence. It is the challenge of the manager to find the most effective balance of these important components of the process. Complexity refers to the "number and intricacy of the steps required" to perform the process (35). A laboratory that performs DNA testing could be said to be more complex than checking the air pressure in a tire. Divergence is the "degree of freedom allowed or inherent in a process step or sequence" (35). Processes that require analyzation, assimilating data, and judgment are said to be highly divergent, such as a doctor performing surgery. By blueprinting a service into a schematically represented diagram, or flow chart, the degree of complexity and divergence can be readily and visually available. The complexity and divergence can then be adjusted to fit a marketing, cost, manufacturing, or consumer need. Altering the complexity and divergence of the service process can have a significant impa... For example, a gasoline outlet may decide to offer only 2 grades of gasoline instead of 4. This will save costs by reducing inventory requirements and overhead costs. However, the customer has been offered fewer options. Alternatively, the station may decide to carry 6 grades of gasoline and add kerosene and diesel fuel. This strategy can result in a niche market with lower volume and greater margins, as it increases the divergence and positions the station differently in the market. Complexity also dictates the market position as well as consumer perception. A mechanic's garage may opt to reduce their complexity and limit their work to muffler and brake systems. This specialization strategy can be risky when competing with more broad based and full service alternatives (38). However, increasing complexity runs the risk of poor quality or customer confusion. Customers may be unaware that a garage that offers automobile detailing, inspections, body and paint, and mechanical work, also does quality brake work. The manager must look for the market position that will maximize the opportunities with the least risk. In conclusion, visualizing the complexity and divergence of the service processes can help to understand the current market position and help plan for repositioning. The process that goods or services are subjected to is a raw material that can be manipulated and formed. This structured approach can reveal the characteristics that "not only affect market position, but also can be deliberately and strategically managed for positioning purposes" (42). Blueprinting and diagramming gives the manager a greater understanding and more control over the processes that affect cost, quality, deliverability, and consumer perception. Works Cited Shostack, G L.