Tuesday, November 26, 2019

rebellion essays

rebellion essays Rebellion in the Fifties During the Fifties the United States was filled with confidence but at the same time insecurity. The United States emerged from WWII as a global superpower and a symbol for freedom. The United States saw its role in world affairs as the protector of free countries from communism. The fear of communism expansionism during the fifties was a major issue. Communism represented radical thinking and ideas, a shift away from conservatism thinking or a shift away from the center, to a shift towards the edge. During the Fifties the fear of communism spreading in America gave rise to movements such as McCarthyism and the House on un-American Activities (HUAC). These movements represented the feelings of Americans towards communism at the time, they represented fear and the way to contain their fears was to weed out the bad seeds. These movements created a shift towards the center again, towards conservatism. This trend towards the center or conservatism can be seen in all aspects of American life. Not only was conservatism evident in the Fifties, but also rebellion. The push to be conservative and persecute individualism was an immense undertaking that it created fear and out of that fear came rebellion. In any controlled environment, such as the one the United States created for itself during the Fifties, there is bound to be some kind of tension or rebellion, rebellion against the pressure of being normal or conservative. There was a great deal of stress being placed on being just like everyone else. The voice of the rebellion was usually the entertainers, artists, or writers. Many of these people expressed their feelings about current issues by disguising it in their stories, movies or, paintings. Many of these people challenged the politics of the mainstream or the center. However there were works done that supported the shift towards the center and conservatism. Three wor...

Friday, November 22, 2019

How to Use the IRS Taxpayer Advocate Service to Get Tax Help

How to Use the IRS Taxpayer Advocate Service to Get Tax Help You may be able to get tax help from the​ Taxpayer Advocate Service, an independent organization within the Internal Revenue Service (IRS). It is charged with assisting taxpayers who are experiencing economic difficulty and need help resolving tax problems that have not been resolved through normal channels, or who believe that an IRS system or procedure is not working as it should. You may be eligible for assistance if: You are experiencing economic harm, financial difficulty, or significant cost (including fees for professional representation) for yourself, your family, or your business.You or your business is facing the threat of an immediate adverse action.You have experienced a delay of more than 30 days to resolve a tax issue or havent been able to get a response from the IRS after repeated attempts at contacting them.You have not received a response or resolution to your problem by the date promised by the IRS. The service is free, confidential, tailored to meet taxpayers needs, and available for businesses as well as individuals. There is at least one local taxpayer advocate in each state, the District of Columbia and Puerto Rico. Taxpayers can contact the Taxpayer Advocate Service by calling its toll-free line at 1-877-777-4778 or TTY/TTD 1-800-829-4059 to determine whether they are eligible for assistance. Taxpayers can also call or write to their local taxpayer advocate, whose phone number and address are listed in the local telephone directory and in Publication 1546 (.pdf), The Taxpayer Advocate Service of the IRS - How to Get Help With Unresolved Tax Problems. What to Expect from a Taxpayer Advocate If you qualify for the help of a taxpayer advocate, you will be assigned to one person. Youll get your advocates contact information including name, phone number, and employee number. The service is confidential, required by law to provide secure and independent communications separate from other IRS offices. However, with your permission, they will disclose information to other IRS employees to help resolve your problems. Your advocate will do an impartial review of your problem, giving your updates on their progress and timeframes for action. You can also expect to get advice on how you can prevent problems with your federal tax returns in the future. Some taxpayer advocate offices provide video conferencing and virtual help, depending on the state. Information You Will Need to Provide to the Taxpayer Advocate Be ready to provide your full identification and contact information, including social security number or employee identification number, name, address, phone number. Organize your information on the problem you are having with your taxes, so your advocate will be able to understand it. This should include what steps you have taken to contact the IRS, which offices you contacted, and how you have already tried to resolve your problem. You can also fill out IRS Form 2848, Power of Attorney and Declaration of Representative, or Form 8821, Tax Information Authorization and send those to your advocate. These authorize another person to discuss your tax issue or to receive information about your tax issue.

Thursday, November 21, 2019

Sustainability in chemical engineering Research Paper

Sustainability in chemical engineering - Research Paper Example Sustainable chemistry is the â€Å"chemistry that contributes to securing the needs of the present without compromising the ability of future generations to meet their own needs† (Christensen, 2009). Chemical Engineering is a course or program that plays a significant role in sustaining a society through manufacturing products and making processes for a better environment. Chemical Engineering contributes to sustainability through green chemistry. The terms ‘green chemistry’ and ‘sustainable chemistry’ are used interchangeably (Hardy, 2004). The purpose of green chemistry is to eliminate or reduce the risk of chemical hazards which in turn obviates the need to establish expensive exposure controls and prevents accidents leading to environmental incidents. Research in green chemistry is directed at alternative feedstocks, reagents and catalysts, environmentally benign solvents, and making of recyclable chemical products. This is achieved by giving bio-based feedstocks preference over petroleum-based sources. For example, the important intermediaries of commodity chemicals’ production; adipic acid, catechol, and hydroquinone can be produced from glucose as a raw material instead of benzene (Abraham, 2005, p. 168). While recycling increases the overall production, the cost of production is reduced because waste materials are used rather than getting disposed off. The importance of clean air, clean water, and safe environment highlights the significance of green chemistry. Chemical engineering has contributed to the increase of sustainability by introducing a range of efficient and productive systems including the large lake bio-complexity systems, systems dynamic modeling and ecological engineering and restoration. Sustainable development is based on the approach to service systems and industrial products’ manufacturing. Companies like General motors and HP are using â€Å"design for environment† techniques

Tuesday, November 19, 2019

Special Teacher Training in Saudi Arabia Thesis Proposal

Special Teacher Training in Saudi Arabia - Thesis Proposal Example From the discussion it is clear that the government of Saudi began to incorporate deaf students into regular public schools following pressure from the public. The move was not accompanied by measures to train teachers on how to handle deaf students alongside those without hearing impairments. This placed deaf students in public schools at somewhat of a disadvantage compared to the normal learners. The author believes that the move was a good one. Secluding deaf learners in their schools as a form of discrimination. However, the Saudi government needs to review the curriculum for ordinary teacher training to incorporate the skills necessary for teachers to handle deaf students.As the report declares  until recently, institutions of higher learning in Saudi Arabia did not admit deaf students because they lacked the facilities needed to support them. This scenario forced deaf students who wanted to pursue higher education after high school to seek opportunities abroad. Another effect of the failure of Saudi colleges and universities to admit deaf students was that they (the deaf students) were locked out teaching deaf students at primary, secondary and higher education levels. Instead, the instruction of deaf students was left exclusively to hearing teachers. This situation has persisted despite research conducted elsewhere indicating that the instruction of deaf students is more effective if it is undertaken by deaf teachers.

Saturday, November 16, 2019

Health Care Policy Making in the Federal System Essay Example for Free

Health Care Policy Making in the Federal System Essay Patient Protection and Affordable Health Care Act Open policymaking in the United States is molded on a basic level by American federalism. Federalism in the United States is defined as â€Å"a governmental system whereby power and authority are shared by national and state governments, with ultimate authority derived from the people†Ã‚  (Levin-Waldman, 2012). The interaction between the levels makes a muddled approach process. Government policymakers and bureaucrats at diverse levels of the elected framework – national, state and local – regularly have truly distinctive interests and points of view on how specific policies ought to be developed and implemented. In regards to health care policy, the national government has accepted essential obligation, with states playing a significant but auxiliary role. For national and state policymakers, there are three key objectives in healthcare policy: control services expenses of health care, improve the quality of health care, and allow for all citizens to have access to health care. The challenge is to beat the long-standing status of the U.S. as a nation with high medical costs paired with deficient coverage for a number of its citizens. On March 23, 2010, after a multitude of debates and votes, Congress approved and President Obama signed into law the Patient Protection and Affordable Health Care Act (obamacarefacts.com). This is the most comprehensive health care law passed at the national level, and possibly the most controversial too. This enactment is giving a real test of American federalism. Each state is required to create an exchange in which people can look for a competitive plan. This online exchange will offer individual people, families, and small businesses a venue in which to review suitable and affordable plans. In the event that a state does not make an exchange, the national government will do so. There are many debates surrounding this new law as many feel it will do more harm than good. Under the law, tens of millions of uninsured will get access to competitive, quality, health insurance. In order to help cover the many millions who require monetary assistance, there are new taxes, generally felt by the upper income levels. These taxes are in the form of mandates; either as an individual mandate or an employer mandate. These mandates require individuals to obtain coverage, get an exemption, or pay a fee. However, it is estimated that over half of those uninsured prior to this new law, will be able to obtain free or low cost coverage thru their State’s exchange. Similarly, employers with an equivalent of 50 full time employees must provide health insurance coverage to their employees or they will have to pay a fine. This has prompted some businesses to cut employee hours to avoid meeting the criteria, although small businesses can qualify for up to 50% of their employees premium costs. (healthcarereform.procon.org) While the law allows young adults to remain on their parents plans until the age of 26, there is concern that the premiums these young adults could be paying on their own would help offset the rise in premiums due to the sick. In order for the premiums to remain low, there needs to be a significantly large healthy pool of insured. Their premiums will offset the expenses the insurance company will have to pay for the claims of those that are sick. If healthy young adults remain on their parent’s plans longer, it decreases the cushion the insurance company has to cover such claims. Since you cannot be dropped from your plan when you become sick, insurance companies must cover the sick and this causes premiums to rise. (healthcarereformprocon.org) Many question whether or not the government can enforce such a law. The U.S. Constitution makes no reference to health care policy or services as rights. To play a role in such, the national government must turn to less particular parts of the Constitution, for example, the  obligation to promote the general welfare, provide equal protection under the laws, or regulate commerce among the states. State constitutions by and large make no particular reference to health awareness as a commitment of state government or right of residents. Likewise with the national government, state power around there rests principally on more general protected provisions to promote the benefit of everyone. The law was presented to the Supreme Court and upheld by a vote of 5 to 4. â€Å"The Affordable Care Act’s requirement that certain individuals pay a financial  penalty for not obtaining health insurance may reasonably be characterized as a tax,† Chief Justice Roberts wrote in the majority opinion. â€Å"Because the Constitution permits such a tax, it is not our role to forbid it, or to pass upon its wisdom or fairness.† (nytimes.com). Conclusion Policymaking in our federal system is laden with challenges. In health care, policymakers and other government authorities at all three levels of government assume vital and interconnected parts. Policymaking in our federal system has served the United States well for a long time, yet it remains a real test. It is uncommon that one level of government can bring an approach through to its fulfillment. Rather, most arrangements incorporate an imperative intergovernmental element. The unpredictability of intergovernmental policymaking and the numerous purposes of potential restriction in an elected framework put a premium on practicing successful initiative and making intergovernmental connections. To push ahead in the 21st Century, national, state and local policymakers will require a full set of administration and interpersonal abilities to unite all parties in the federalism process of policy making. References Levin-Waldman, O. M. (2012). American government. San Diego, CA: Bridgepoint Education, Inc. Liptak, A. (2012, June 28). Supreme Court Upholds Health Care Law, 5-4, in Victory for Obama. The New York Times. Retrieved from www.nytimes.com Is the Patient Protection and Affordable Care Act (Obamacare) Good for America? (2010, September). Retrieved from http://healthcarereform.procon.org The Pros and Cons of Obamacare. (n.d.). Retrieved from http://obamacarefacts.com

Thursday, November 14, 2019

Free College Essays - Symbolism in Hawthornes The Scarlet Letter :: Scarlet Letter essays

The Scarlet Letter Symbolism The Scarlet Letter is a book of much symbolism.   One of the most complex and misunderstood symbols in the book is Pearl, the daughter of Hester Prynne.   Pearl, throughout the story, develops into a dynamic symbol -   one that is always changing.   In the following essay, I will explore some of the symbolism which Pearl came to represent throughout the novel.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In The Scarlet Letter, Hester, for her sins, received a scarlet letter, "A" which she had to wear upon her chest.   This was the Puritan way of treating her as a criminal, for the crime of adultery.   The Puritan treatment continued, because as Hester would walk through the streets, she would be looked down upon as if she were some sort of demon from Hell, that committed a terrible crime.   This would give her much mental anguish and grief.   On the other hand, God's treatment of Hester for her sin was quite different than just a physical token: he gave Hester the punishment of a very unique child which she named Pearl.   This punishment handed down from God was a constant mental and physical reminder to Hester of what she had done wrong, and she could not escape it.   In this aspect, Pearl symbolized God's way of punishing Hester for adultery.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The way Hester's life was ruined for so long was the ultimate price that Hester paid for Pearl.   With Pearl, Hester's life was one almost never filled with joy, but instead a constant nagging.   Pearl would harass her mother over the scarlet "A" which she wore.   Pearl would also make her own "A" to wear, and sometimes she played games with her mother's, trying to hit it with rocks.   When Hester would go into the town with Pearl, the other children would make fun of her, and Pearl would yell and throw dirt at them.   So, in this case, Pearl symbolized the decimation of Hester's life and mental state.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Although Hester had so much trouble with Pearl, she still felt that Pearl was her treasure.   Pearl was really the only thing that Hester had in life, and if Pearl wasn't in Hester's life, Hester would almost surely have committed suicide.   Once and a while, Pearl would bring joy to Hester's life, and that helped her to keep on living.   Pearl really symbolized a rose to her mother, at some times she could be bright and vibrant, and really love her mother, but at other times, she could be wilting.

Tuesday, November 12, 2019

Information Security Policy Essay

1. Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. The goal of this security policy is to lay out a basic plan for a secure information system to be used by Bloom Design Group. This policy will protect the company’s systems from threats that can come from humans and from natural disasters as well. The policy will also put into consideration the privacy, reputation, intellectual property and productivity of the Bloom Design Group. The continued operation of this company depends on being able to access and use resources within the organization and being able to remote access with security. Each persons role in the company will be considered and appropriate access will be given to ensure the efficient operation of the business, while not giving access to those who are not authorized. This policy will also help in the company’s adherence to any governmental regulations. Any disruptions of service or security related issues will be dealt with immediately by means of system software that is automated to handle certain threats . More serious issues will be dealt with by the IT staff whose responsibility it is to oversee the everyday operation of the information system. 2. Introduction Due in Week One: Give an overview of the company and the security goals to be achieved. 2.1. Company overview The Bloom Design Group is a company that offers interior design services to businesses and individuals around the world. There corporate office is located in New York with a secondary office in Los Angeles for handling operations on the West coast. They have a web site that offers their customers the ability to work up their designs online and then purchase them through a electronic order processing system. Also, the designers use secure logins and passwords to access the web site. A large number of the workforce work remotely possibly using tablets or ipads connected to secure VPNs or Virtual Private Networks. 2.2. Security policy overview Bloom Design group already provides secure logins and networks to their employees so they already have some type of system setup already. However, this does not mean it is a system that works efficiently. I think the appropriate security policy to implement for this project would be system specific. 2.3. Security policy goals As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy. 2.3.1. Confidentiality The policy I plan to implement will help to protect information by reviewing how the company stores sensitive information such as employee and client records, trade secrets, and other sensitive data. 2.3.2. Integrity Since the company will be using passwords and secure logins the system will not be accessible to the public. So the primary focus should be on the employees. Authentication and verification can be done using a data log to keep records of employees activity while on the company’s VPN. Also, the use of a firewall will help with integrity as it will prevent employees from unknowingly accessing damaging websites. 2.3.3. Availability The policy I plan to use will help with back-up and recovery by the possible use of cloud storage or a central data storage center. Although they are already using secure logins for access control the whole system needs to be reviewed. This is to make sure only authorized personnel have access to sensitive areas. 3. Disaster Recovery Plan Due in Week Three: For your selected scenario, describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP. 3.1. Risk Assessment 3.1.1. Critical business processes The mission-critical business systems and services that must be protected by this DRP are: Payroll, Human Resource Data, POS backup media, and Web Servers and their services. 3.1.2. Internal, external, and environmental risks Examples of internal risks that may affect business are unauthorized access  by individuals who are employed by the company, and those who aren’t employed by the company but still have access to individual store’s computer systems, applications, or areas where the servers and backup media are located. Other external and environmental risks include fire, floods, power outages, hardware failure, software glitches and failure, storms, and other acts of nature. 3.2. Disaster Recovery Strategy Most cases, having an alternative site (a hot site, or cold site depending on the disaster) would be the correct way of dealing with most disasters. With Bloom design group I think having a warm site facility would be the best option. Warm sites are cheaper than hot sites but require more effort. On the other hand, they are more expensive than cold-site facilities but less labor intensive and more likely to be effective in a disaster. Also, having a backup and retention site to work from, and recover from for the main servers and web services is a good idea. 3.3. Disaster Recovery Test Plan For each testing method listed, briefly describe each method and your rationale for why it will or will not be included in your DRP test plan. 3.3.1. Walk-throughs This test plan would be a great way for the key personnel to come together and formulate a plan of action in the event of an emergency. Due to Bloom Design group being spread across a large area it might require some video conferencing and traveling on the part of some employees. 3.3.2. Simulations I think this test plan is the most effective when compared to the others. Simulating an actual emergency is a great way for people to get used to operating in a critical time under pressure. This will show you where your people have their strengths and weaknesses when trying to recover from a disaster. 3.3.3. Checklists This passive type of testing would be a good system to implement on a weekly or monthly basis depending on the needs of the company. This will help in detecting problems before they become a major issue. 3.3.4. Parallel testing Since Bloom Design group is updating their security parameters and do not have an equal type of system already implemented parallel testing would not be appropriate for this security policy. 3.3.5. Full interruption I think this is another very effective way to test the system in the event of an emergency. However, to minimize inconveniences to the customers it would have to be done during off hours. 4. Physical Security Policy Due in Week Five: Outline the Physical Security Policy. Merkow and Breithaupt (2006) state, â€Å"an often overlooked connection between physical systems (computer hardware) and logical systems (the software that runs on it) is that, in order to protect logical systems, the hardware running them must be physically secure† (p.165). Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario. These controls may include the following: Physical controls (such as perimeter security controls, badges, keys and combination locks, cameras, barricades, fencing, security dogs, lighting, and separating the workplace into functional areas) Technical controls (such as smart cards, audit trails or access logs, intrusion detection, alarm systems, and biometrics) Environmental or life-safety controls (such as power, fire detection and suppression, heating, ventilation, and air conditioning) 4.1. Security of the building facilities 4.1.1. Physical entry controls At the two office locations (Los Angeles, New York) for Bloom Design Group I would use employee badges that double as an electronic key to access the building and other sensitive locations. This will work in conjunction with  an access control system that limits entrance/exit to the offices through one main entrance. There will be an employee entrance as well also to be accessed by an electronic badge. 4.1.2. Security offices, rooms and facilities For the security offices I would implement biometric scanners due to the sensitive equipment inside. Other rooms and facilities of a sensitive nature will utilize electronic badges with a photo and name of the employee. 4.1.3. Isolated delivery and loading areas For these areas I would implement electronic key card access with the use of a CCTV system recording to a DVR. With a CCTV camera located on the driver door in the loading area the person responsible for deliveries will know when a delivery is being made and can observe he outside environment before opening the door. 4.2. Security of the information systems 4.2.1. Workplace protection For this part of the security policy I would utilize pre-employment screening and mandatory vacation time. This prevents people from hiding illegal activities while performing their duties. Also, I would setup privileged entity controls so operators and system administrators have special access to computing resources. 4.2.2. Unused ports and cabling For unused ports I would use a piece of security equipment that can be plugged into the unused port and can only be removed by someone with a special key. This will help prevent unauthorized access into the network. For unused cabling I would secure it in a secure storage room which can only be accessed by authorized personnel. If the above mentioned equipment isn’t available then the port should be removed. 4.2.3. Network/server equipment Being that this is some of the most critical equipment for business operations I would use biometric locks and scanners on any room that  contains this equipment. Also these rooms will be environmentally controlled with air conditioners and dehumidifiers to allow the equipment to operate at peak efficiency. 4.2.4. Equipment maintenance Since a lot of the equipment is spread across a large region I would utilize remote communication connections to troubleshoot issues. If the maintenance need is more severe than I would have a small centrally located facility that specializes in assessing and repairing malfunctioning equipment. 4.2.5. Security of laptops/roaming equipment For laptops and roaming equipment I would install all devices with a GPS tracker and encryption software to protect against unauthorized access. The equipment itself would be stored in a secure storage room with access being tightly controlled. 5. Access Control Policy Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems 5.1. Authentication Authentication credentials permit the system to verify one’s identification credential. Authenticating yourself to a system tells it the information you have established to prove that you are who you say you are. Most often, this is a simple password that you set up when you receive the privilege to access a system. You may receive an assigned password initially with the requirement that you must reset it to something more personal—something that only you can remember. However, passwords are the easiest type of authentication to beat. Free and widely available programs are available on the Internet to break the security afforded by passwords on most of the commonly used systems. With two or three factors to authenticate, an information owner can gain confidence that users who access their systems are indeed authorized to access their systems. This is accomplished by adding more controls and/or devices to the password authentication process. Biometric scanning uses unique human characteristics to identify whether the person trying to gain access is authorized to enter or not. One common  approach to managing IDs and passwords is to create a password or PIN vault. These programs use secure methods to locally store IDs and passwords that are protected by a master password that unlocks the vault when it’s needed. 5.2. Access control strategy 5.2.1. Discretionary access control The discretionary access control system will be used for Bloom Design Group because this is the favored approach in the corporate environment and due to the wide area of operations this will allow several authorized users to have access to the system at any given time. The principle of least privilege is the predominant strategy to assure confidentiality. The objective is to give people the least amount of access to a system that is needed to perform the job they’re doing. The need-to-know dictates the privilege (authority) to perform a transaction or access a resource (system, data, and so forth). An information owner is one who maintains overall responsibility for the information within an information system. For the Bloom Design Group the information owner is going to be the corporate head of IT operations. 5.2.2. Mandatory access control In a system that uses mandatory access control (MAC; also called nondiscretionary access control), the system decides who gains access to information based on the concepts of subjects, objects, and labels, as defined below. Since the Bloom Design Group is spread out over such a large area I do not think this is the best choice for this scenario. MAC is better suited for military or governmental systems. 5.2.3. Role-based access control Role-based access control (RBAC) group’s users with a common access need. You can assign a role for a group of users who perform the same job functions and require similar access to resources. This would also be appropriate for this scenario because it will allow the information owner to easily assign access to certain groups such as designers, office personnel, customer service associates and so forth. 5.3. Remote access Remote Access Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access users to communicate with a central  server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to set up a policy that can be applied at a single administered network point. Having a central service also means that it’s easier to track usage for billing and for keeping network statistics. A virtual private network (VPN) is another common means for remote users to access corporate networks. With a VPN, a user connects to the Internet via his or her ISP and initiates a connection to the protected network (often using a RADIUS server), creating a private tunnel between the end points that prevents eavesdropping or data modification. 6. Network Security Policy Due in Week Nine: Outline the Network Security Policy. As each link in the chain of network protocols can be attacked, describe the policies covering security services for network access and network security control devices. 6.1. Data network overview Due to the large geographic distances between Bloom Design Group offices a WAN is going to be utilized. WAN covers a larger geographic area than a LAN (technically, a network that covers an area larger than a single building). A WAN can span the entire nation or even the globe using satellites. 6.2. Network security services 6.2.1. Authentication Access to documents can be restricted in one of two ways: by asking for a username and password or by the hostname of the browser being used. For Bloom Design Group employees will need to enter a user ID and password to access restricted documents and sites. 6.2.2. Access control Unlike authentication, which is security-based on the user’s identity, restricting access based on something other than identity is called â€Å"access control.† For Bloom Design group access control to physical locations will be done by controlled by electronic badges. More sensitive areas such as the server rooms will utilize biometric scanners. 6.2.3. Data confidentiality This service protects data against unauthorized disclosure and has two components: content confidentiality and message flow confidentiality. For Bloom Design group all messages transmitted and received through company offices will be encrypted to prevent the unauthorized viewing of sensitive company documents. 6.2.4. Data integrity The goal is to protect data from accidental or malicious modification whether during data transfer, data storage, or from an operation performed on it, and to preserve it for its intended use. For Bloom Design Group the only people who will be authorized to make changes or modifications will be the Head of the IT department and anyone else they deem necessary. 6.2.5. Nonrepudiation A service guaranteeing that the sender of a message cannot deny having sent the message and the receiver cannot deny having received the message. I do not think this will be necessary for Bloom Design group. However, if it does then the proper modifications can always be made. 6.2.6. Logging and monitoring These services allow IS specialists to observe system activity during and after the fact by using monitoring and logging tools. These include operating system logs, server records, application log errors, warnings, and observation of network, switch and router traffic between network segments. I do not think this will be necessary for Bloom Design Group as a whole. However, it will be utilized for any programs having to do with the servers due to its sensitive business content. 6.3. Firewall system Outline the roles of the following network security control devices and how these basic security infrastructures are used to protect the company’s network against malicious activity. Provide a description of each type of firewall system and how it is used to protect the network. Include how the firewall system is or is not applicable to the company’s network configuration in your selected scenario. 6.3.1. Packet-filtering router firewall system The most common Internet firewall system consists of nothing more than a packet-filtering router deployed between the private network and the Internet. A packet-filtering router performs the typical routing functions of forwarding traffic between networks as well as using packet-filtering rules to permit or deny traffic. 6.3.2. Screened host firewall system The second firewall example employs both a packet-filtering router and a bastion host. This firewall system provides higher levels of security than the previous example because it implements both Network-Layer security (packet-filtering) and Application-Layer security (proxy services). Also, an intruder has to penetrate two separate systems before the security of the private network can be compromised. This will be the option chosen for Bloom Design Group based on needs and cost. Since Bloom Design group is not a governmental or military related company then it doesn’t require the most elaborate form of firewall protection. 6.3.3. Screened-Subnet firewall system The final firewall example employs two packet-filtering routers and a bastion host. This firewall system creates the most secure firewall system, as it supports both Network-Layer and Application-Layer security while defining a â€Å"demilitarized zone† (DMZ) network. 7. References Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author. Information Security: Principles and Practices, by Mark S. Merkow, CISSP, CISM and Jim Breithaupt.

Saturday, November 9, 2019

Life as a Parent

Growing up we all wish that one day we will have a family, with a partner and children. At least that’s what I’ve always known. That I believe should be everyone’s plan growing up. Unfortunately, there are some people not fortunate enough to have the opportunity to have children of their own, but like they say a parent is someone who raises them not someone who has just their blood. I met a young couple who got married at a very young age, and struggled much to have children. They tried and tried for many years. Their names were Phil Hansen and Candy Chang. They were a young couple who lived in a huge mansion. Phil was a great artist and Candy was an artist, designer, and urban planner. They had it all money, a big house, great jobs, but that wasn’t all they needed in life. They wanted to have children so bad but after so many treatments found out that neither of them had the capability of producing any children. Candy would always say to Phil â€Å"I want children so bad honey, I want to smell a newborn baby, their just so adorable†. This would upset Phil badly, he wanted to make Candy happy and give her everything she wanted. Until one day, he thought of a great idea. He thought maybe him and Candy could adopt two children. He thought it was a great idea but didn’t know how Candy would feel about it. One night he decided to take Candy out for dinner to her favorite restaurant. That night Candy got ready and said to Phil â€Å"What’s the reason is for this dinner? She said. Phil responded, No reason just felt like going out for dinner and having a serious conversation with you. That only left Candy wondering what was really going on. They arrived at a restaurant called â€Å"Ming Chinese Buffet†, it was a Chinese restaurant. After enjoying a wonderful tasty dinner, Phil asked Candy â€Å"Candy would you like to adopt some children and make hem our own†? Candy smiled, and replied of course that is a wonderful idea. She was so excited. The next morning they went to orphanage, where there were children left that had no parents, and were waiting for someone to want to be their parents. There were kids of all ages, from newborns to teenagers. Phil and Candy were undecided on wether to adopt newborns or teenagers, because they knew they wanted to adopt two children. They fell in love with many children there, they all were lovely. After giving it lots of though, they decided to go for thse two boys that were cousins. They were 5 & 6 years of age. Their names were Stephen Ritz and Ramsey Musallam. Their mothers were sisters; they both gave them up for their drug addiction. Phil and Candy completed the adoption process and took their boys home after a few weeks. These boys started changing their life’s since day one. Phil and Candy created rooms for both their boys, bought them clothes, toy, everything they wanted. They boys meant everything to them; they gave them the best education, the best of everything. They enjoyed every minute with them, they knew that time would fly, and they would be adult in no time. Years and years went by. Next thing you knew they were adults. Ramsey was 24 and Stephen was 25. They were two grown men. They were so thrilled, and happy that these two young men were all grown up, and were two young men. They both were very smart boys, that knew exactly what they wanted to be in life. Stephen knew he wanted to be a teacher, and he wanted to change the life of many children. Ramsey as well was interested in the education field; he wanted to be an educator. They knew exactly what they had to do, and with such great parents, they knew that they had all the support from them. Phil and Candy paid Stephen and Ramsey’s way through the best of the education there is out there. They successfully were able to accomplish everything they intended to. Stephen became a well-known teacher/administrator. He had a believe that students shouldn’t have to leave their community to live, learn and earn. He wanted to help children have something of their own, in their own community. That is why a successful group of his students features the first edible wall in New York City. This wall generates enough produce to feed about 450 students very healthy meals, and trains young children. His students traveled throughout New York and earned their own wage. He felt very successful for accomplishing one of his goals. Ramsey on the other hand was a successful educator. He believed that education was a slow and painful process. All this new technology, he believed was hard to consume. He was a great science teacher at Sacred Heart Cathedral Prep in San Francisco, CA. His goal from the start was to integrate multimedia into a hands on, inquiry-based learning cycle, and to empower other teachers to do the same. He became a successful advocate for flip teaching, tab casting, video casting, and screen casting in classrooms. They both succeeded in what they wanted to acknowledge. They became very well-known educators that made a change. They were able to accomplish all this with the help of Candy and Phil. They were such a great support system to them, and never failed to be there for them. Phil and Candy were very proud of their children and how successful they were. They knew that they had raised to very wonderful children. They were proud of all their accomplishments, and were very thankful for adopting such wonderful children, whom they loved as they were their own. The story of this wonderful couple really made me realize, there’s always an opportunity for everything. Phil and Candy were devastated of the thought of never having children, and at first didn’t acknowledge the opportunity of adoption. When they made that choice, they knew it wasn’t going to be easy, but decided to go for it anyways. Now they feel so grateful for the big opportunity life set for them, and for getting the opportunity to be such great parents. They felt like they succeeded as parents, and now plan for a wonderful future with their successful children.

Thursday, November 7, 2019

Television Censhorship and how it changes the way we live.

Television Censhorship and how it changes the way we live. " F*** Television Censorship"by Ben FlickAccess is threatened today by the government by putting a brown paper bag around "risquÂÆ'Â ©" material on the Internet and television. Industry, responding both to government pressure and consumer demand, has compounded the problem by creating easy tools for censorship. Government is privatizing censorship, pushing it out. Recently there have been efforts to make television and the Internet "family friendly," by giving parents tools to create "kid-safe" environments. But the consequences may be far-reaching, as the tools used in the home to shield children from certain ideas and images increasingly appear in schools and libraries, where they limit the ability of the entire community to gain access to valuable information. The promise of the electronic media - to create a more vibrant and democratic "marketplace of ideas" than has ever before been possible - could be undermined, if rating and filtering is widely embraced.Saniresch shooting f or children’s television pro...By directing a bright light at these censorship tools, we may persuade viewers and users to resort not to ratings and filters, but to open and unfettered access to information and freedom of expression to demand more speech, not enforced silence. The Telecommunications Act creates a statutory scheme to regulate content of television programming. It mandates that new television sets be equipped with a V-chip capable of blocking programs, and it requires to prescribe guidelines to identify programming containing sexual, violent or other indecent material to help parents limit children's viewing - unless the television/cable industry "voluntarily" devises its own "acceptable" rules for labeling programs. The terms "violent" "sexual" or "indecent" are not defined in the Act. In July 1997, the major networks, with the exception of NBC, agreed to begin using TV Parental Guidelines, a television rating system, to supplement the previously introduced mo vie-style age-based rating: TV-G...

Tuesday, November 5, 2019

Expressing Quantity in French - Zero, None - Pas De

Expressing Quantity in French - Zero, None - Pas De Theres a lot to keep in mind when expressing quantities in French. We have  studied  how to express unspecific quantities, du, de la, de l, des, then how to express specific quantities, numbers and expressions of quantity, so now for the last part: when there is nothing, zero, zip, not any! 1 - The Quantity Is None Aha! I bet you didnt think about that one! Well, zero is also a quantity. Which means when you say I dont have money (join the club), you are using a quantity. You could be saying I dont have any money, but the any is often left out in everyday speech.   So, if you wanted to actually say zero, well thats easy, its a number: - jai zà ©ro chat (I have zero cat). But where it gets complicated is when you use a negative. I dont have (any) cat.   In French, wed say something like I dont have none of cat. Please, dont think of it this way, because youd never say that in English, so translating doesnt work. I am just saying it to explain, but its more logical to think of it as pas being a quantity, therefore followed by de/d in French. Je nai pas de chat. (I dont have any cat)Je nai pas de fille. (I dont have a daughter)Je nai pas de lait. (I dont have milk)Je nai pas denfants (I dont have children) And of course, there is a main exception. This rule doesnt apply when your verb is à ªtre (to be). So with à ªtre in the negative, you say the same thing as in the affirmative. Je suis une fille. Je ne suis pas une fille. (I am a girl. I am not a girl). 2 - Adjectives of Quantity Are Not Followed by De/d Aucun/e/s and plusieur/s are adjectives. They dont need an article. Jai plusieurs chats - I have several cats.Je nai aucun ami - I have no friend, I dont have a single friend, I dont have any friend.. 3 - To Recap Some things are easy to quantify: one apple. It’s a whole apple. You usually buy, eat, need one, 2, 3 apples.  But you may decide to be vague, and say â€Å"des pommes† more than one, but I don’t know exactly how many. Now, some things are less easily quantifiable†¦ You don’t buy â€Å"one rice†. You buy either â€Å"one kilo of rice† (a kilo of, an expression of quantity), or â€Å"some rice† (unspecific quantity of an item which is not easily quantifiable). So you need to ask yourself: Am I talking about... A very specific  quantity (a number, or an expression of quantity : une pomme, 5 pommes, un kilo de pommes, une bouteille deau†¦).An unspecified quantity of an item (du vin), or an unspecified quantity of something that you cannot quantify easily (du riz, de la patience)More than one of an item, but a vague plural quantity (des pommes)No item at all (pas de pomme) This is a lot to take in. Read these  lessons over a couple of times and even read it out-loud so you really take the time to understand and process everything.

Saturday, November 2, 2019

Postmodernity and Five Fundamental Theological Issues Essay

Postmodernity and Five Fundamental Theological Issues - Essay Example Post-modernism developed as a concept in the mid-1980s and has received increased following over the years. As a concept, post-modernism defies definition because in this moment it means different things to different observers. (Guarino, Thomas, 2009). â€Å"Postmodernism is hard to define, because it is a concept that appears in a wide variety of disciplines or areas of study, including art, architecture, music, film, literature, sociology, communications, fashion, and technology. It's hard to locate it temporally or historically, because it's not clear exactly when postmodernism begins. â€Å"Perhaps the easiest way to start thinking about postmodernism is by thinking about modernism, the movement from which postmodernism seems to grow or emerge. Modernism has two facets, or two modes of definition, both of which are relevant to understanding postmodernism. â€Å"The first facet or definition of modernism comes from the aesthetic movement broadly labeled "modernism." This movement is roughly coterminous with twentieth century Western ideas about art (though traces of it in emergent forms can be found in the nineteenth century as well). Modernism is the movement in visual arts, music, literature, and drama which rejected the old Victorian standards of how art should be made, consumed, and what it should mean.