Wednesday, October 30, 2019

Analysisn of Premier Food`s Code of Conduct and Business Ethics Essay

Analysisn of Premier Food`s Code of Conduct and Business Ethics - Essay Example These values are reflected not only in the company’s code of conduct, but in Premier Foods’ annual report to shareholders which emphasise corporate social responsibility as a key business success factor. Critical analysis of Premier Foods’ Code of Conduct Premier Foods has established its code of conduct, a document illustrating the expectations of both managers and employees to satisfy demands for ethical business behaviour. The code of conduct stipulates that manager should be leading by example as well as creating a decentralised environment in which employees are allowed to express their concerns openly (Premier Foods 2012). Premier Foods identifies one of its core values as trust (Premier Foods 2012), the foundation by which employees are willing to follow leadership guidance and example. According to Farrell and Knight (2003, p.541) â€Å"trust is embodied in the regulations, rules and policies by which leaders seek to get accepted by others†. The co de of conduct acts as both a reinforcement of expectations of ethical behaviour and also as a sanction by which to ensure compliance, backed by managerial role modelling of desired behaviours to gain employee commitment to achieving strategic goals. Premier Foods establishes an ethical climate by using the code of conduct to promote social justice. Under social justice theory in ethics, it is assumed that every individual in society or in the organisation maintains an inviolability of justice and human rights that cannot and should not be overridden by the broader organisational culture (Rawls 2005). The expectations of managers in promoting equality and rights in the workplace are reflected in the corporate code of conduct, emphasised under the company’s â€Å"treating people fairly† guidelines. Premier Foods ensures that fair treatment is imposed on the employee population with decisions made based on individual merit (Premier Foods 2012). The company also ensures eq ual opportunities for all employees through objective management systems. These aforementioned managerial responsibilities highlighted in the corporate code of conduct are designed around transformational leadership theory, one in which managers are interactive with employees, regularly impart mission and vision principles to gain commitment, and where managers utilise role modelling to promote ethics under social learning theory (Fairholm 2009; Schlosberg 2006). This is how trust is instilled into the organisation: the business does not simply promote its belief in social justice and equality, but injects a clear example of its ethical values into the philosophy of management utilised by leaders in the organisation. Premier Foods is able to maintain its tight and unified corporate culture by not deviating from management theory that promotes equality and shared decision-making. â€Å"Leaders who are ethical demonstrate a level of integrity that is important for stimulating a sense of leader trustworthiness† (Resick et al. 2006, p.348). Grieves (2010) iterates that change must be a negotiated order in order to gain employee commitment and loyalty. The conception of social justice and equality, as two components acting as the foundation of trust, are reinforced by establishing expectations for managerial behaviour under visionary or transformational

Sunday, October 27, 2019

Adding Value In Supply Chain Management Commerce Essay

Adding Value In Supply Chain Management Commerce Essay This chapter reviews the relevant literature and starts with discussion on Adding Value in supply chain management with special focus on pharmaceutical industry and to understanding firms supply chain management and competitive advantages. With involved four major points those are Challenges, Collaboration and Planning High performance delivery, Integration Implementation. Following there is a discussion on theoretical framework on supply chain management, role of top management and overview of latest supply chain management systems. In the last this chapter conclude with summary. 2.1 Adding Value in supply chain management: First question arise that what is Value adding in supply chain? Base on literature review value adding is the difference between input cost and output value (Hines, 2004, p.224). Value added along supply chain takes the form of tangible goods added and intangible services supplied (Hines, 2004). Value added notify to any additional value created at a particular stage of service by key service factors including; tangible value added through material transformation, labour and captical goods and intangible value added through capital and building of collaborative relationships. Firms can add value in many ways, like improve supply method from current level to higher level which is also part of add value in supply chain. Value adding resources within a supply chain are the tangible (processes). Intangible capabilities of a firm (firm attributes, firm controlled information, knowledge and collaborative relationships) enhance efficiency and effectiveness (Cunningham, 1995). By reviewing literature, the value chain concept was developed and popularized in 1985 by Michael Porter in Competitive Advantage. Porter defined value as the amount buyers or customers are willing to pay for what a firm provides, and he visualized the value chain as the arrangement of nine basic values to customers. Porter linked up the value chains between firms to form what he mentioned a value system; now in present era of globalisation and collaboration the link between two firms creating value process called the value chain. As value chain name involves the interpedently processes that generate value of products and the resulting demand and funds flows that are created. According to the Martin Christopher value chain activities can be categorized into two types primary activities (Inbound logistics, operations, outbound logistics, marketing and sales and services) and support activities (Infrastructure, human resource management, technology development and procurement) (Christo pher, 2005). From the literature review, author suggests that first, we need to understand the physical resources that are required within a supply chain to create and deliver a finished service to a customer. Second, we must understand the exchange relationship between particular supply chain resources and the flow of revenue in the value chain. Third, we must also understand what it is about the ownership and control of particular supply chain resources that allows certain resources to command more of the flow of value than others. In understanding this, the process of analytically mapping the properties of power within supply and value chains can commence. To deliver a value, product category and availability is also play important role in supply chain management. By reviewing literature, author understand that alternative perspective of viewing supply chains as value chains identifies economic value as being added through coordinated management of the flow of physical goods and information at each stage of the chain (Davis Stewart, 2004). The theoretical basis for supply chains, Handfield and Nichol (2002, p8), define them as including all organisation and activities associated with the flow and transformation of goods from the materials stage, through to the end user, as well as the associated information flows Information sharing is identified as a key driver for improving supply chain performance and enhancing competitive advantage (Zhang, 2006). Additionally supply chains can be characterised as value system and are defined as a connected series of organisations, resources and knowledge streams involved in the creation and delivery of value to the end customer(Handfield Nichols, 2002, P11). 2.1.2 Companys supply chain management and competitive advantage: Definition of supply chain is the network of organizations that are involved, through upstream and downstream linkages, in the different processes and activities that produce value in the form of products and services delivered to the ultimate consumer (Christopher 1992). In other words, a supply chain consists of multiple firms, both upstream (i.e., supply) and downstream (i.e., distribution), and the ultimate consumer (John T. Mentzer, 2001). The philosophy behind supply-chain management has changed. Previously the central concept was to manage an inventory that acted as a buffer between a limited production capacity and variable customer demands. The scope of the task was interpreted as managing warehouses and transport operations. The current priority is to engineer the supply chain as a seamless whole, breaking down the barriers that have existed between purchasing, production, distribution and sales. These issues are particularly relevant to the pharmaceutical industry. Functions have traditionally operated independently and there has been a consequent sub optimization of the supply chain by fragmenting it along functional lines. In its new form, supply-chain management is a corporate-level task on which several strategic objectives depend, not least ensuring a satisfactory return on capital employed while ensuring the supply of goods and services to designated markets at the service levels demanded. To achieve this, even at a national level, using local facilities to supply local markets is a challenge, requiring close integration of the supply chain and subjugation of functional/ departmental objectives to the needs of the supply chain as a whole. To achieve it globally is much more difficult (Booth, 1996). 2.1.3 Contemporary approaches to achieve competitive advantage: One of the first ideas about theoretical framework for understanding firms performance is Porter (1980). He introduces a strategic and analytical approach to understanding competitive strategy, and said that Every firm competing in an industry has a competitive strategy, whether open or hidden (Porter, 1980). He proposes a framework for analysis industries and competitors and describes three generic strategies, cost leadership, differentiation and focus. He postulates that if a firm is able to do well in any of these strategic fields, It will gain competitive advantage. Porters concept is portraying in below figure. Competitive Advantage of a Firm Generic Competitive strategies Overall cost leadership Differentiation Focus Figure: 2-1: Strategies to achieve competitive advantage: source Porter (1980). -Cost Leadership is most important in competitive pharmaceutical distribution chain, efficient-scale facilities, pursuit of cost reductions, and cost minimization in all areas of the firm. This action can increase companys profit. -Differentiation of product like, different one medicine in different brand (Ports and Blister pack) or service differentiation including design and brand image, customer service, and distribution or dealer network. This action can help increase customer loyalty and ensure often purchase. -Focus on markets, buyers or product line (new line of medicine with its generics version) can help to achieve competitive advantage. The framework of Porter, in fig 2-1 shows, that the proficient strategies can provide competitive advantage. Porter (1980) also argues that competitive advantage comes from the many separate activities a firm achieve in designing, storage, marketing, delivering and creating owns products. Each of this processing contributes to a firms relative cost to position and creates a basis for differentiation. This is the Pharmaceutical logistic value chain, and a firm has to recollection its strategically relevant activities in order to understand the behaviour of costs and the existing and potential sources of differentiation. A company gains competitive advantage by performing these strategically important activities better than its competitors (Porter, 1985). The general value chain concept, and Sigmas existing concept is illustrated in figure 2-2. Supply chain advance Marketing Leadership Advance Primary Activities Profit Margin Support Activities Inbound Sigma House Picking and Customer Marketing Logistics (Warehouse) Assembling Service Tele-sales Procurement Human Resource Management Technology service Development Firm (Sigmas) Infrastructure and Platform Services Figure 2-2: The value chain and Theoretical Framework to achieve competitive Advantage (Adapted from Porter 1985). The definition of supply chain including all basic activities, therefore sales, marketing and customer service activities can be construed as part of the supply chain approach show in the above figure. In company, Tele-sales and marketing processes, such as demand management, order processing and customer relationship building management are included in the internal processes shown in the figure and in the supply chain literature review. However, sales and marketing activity, such as sales calls, advertising and some post delivery support processes are excluded from supply chain activity. This is consistent with the approach taken by the supply chain model it uses to measure supply chain activity (Supply chain council, 2007). There is various types of approaches to achieve competitive advantage, strategic approach, 2.1.4 The strategic Planning approach: In important of porter (1980) approaches, a strategic planning approach that is companys competitive advantage can be planned for this. This includes planning for differentiation in the delivering a value in supply chain, low cost leadership and focus. Strategy is always the product of a complex and unexpected interplay between basic information, personalities and aspiration according to Hamel (1998). What this implies is that one does not gain for obvious solution and strategies but should look at alternatives, challenge assumptions, and look at new ways of delivering superior customer value and firm performance. 2.1.5 Marketing strategy approach: The marketing capabilities approach introduces the concept of capabilities of a market driven organization and explores the links between capabilities and a firms performance and market success (Day, 1999). A firms competitive advantage comes from two sources: Assets or resources, which are acquired over time and distinct capabilities, which are the glue that holds these assets together. Examples are DHLs secure delivery across the globe and Walmarts logistic systems. Such capabilities provide competitive advantage and help organization to deliver a value to its every customer. Other Proponents of the marketing capability approach are cool and Derrick (1989), Aaker (1989), caves and Gale (1987). The concept of capabilities is not new and was proposed much earlier by penrose in 1959. However, this has been popularized as the concept of core competencies of the corporation that can lead to a firms success by Hamel and Prahalad in 1990. They actually propose some tests to measure the st rength and success of core competencies. An example of Federal expresses its packaging and delivery process. The product differentiation approach by Trout (2000), states that what matters is differentiation of product or service, that are too many choice in todays world, and only differentiation provides competitive advantage. In Pharmaceutical business there many manufacture produce a medicine under different choice, keeping all different sort of product and supplying on time will be better advantage over the competitive. 2.1.6 The Introduction of the supply chain approach: In the competitive market of the early decade, there has been a change in management action, resulting for searching strategies that provide superior value to customers. As a result in the supply chain approach to gaining competitive advantage has moved into the frontline of business strategies, especially in developed countries. This approach has its introduced from historical military campaigns (Britannica, 1999) and recently from porter of value chain, with its importance on inbound and outbound logistics, and production operation. In a discussion on marketing logistics thinking argue that logistics has major impact on customer satisfaction, success and costs. They recommend that a firm manage its entire supply chain and that such an approach will add value in existing supply chain within the organization and will help to gain competitive advantage over rival. 2.2 Supply chain Management and factors: 2.2.1 Definition of supply chain and management: It will be helpful to go through some basic definitions of supply chain and management: Supply chain is all inter linked resources and activities needed to create and deliver products and service to customers (Hakanson, 1999). Supply chain management goes advance and including managing supply and demand, resourcing, assembling and packing, distribution across the globe and delivery to the every customer (Supply chain council, 2009). A more on supply chain management is a network of relationships, with the goal to deliver superior value, the management of upper level and lower level relationships with suppliers and customers to deliver best value in services at effective cost to the supply chain as a whole (Christopher, 1998). This definition is a key part of this dissertation in terms of gaining competitive advantage or delivering best value to sigma pharmaceutical customers. 2.2.2 Key areas of Supply chain management system: References Literature Review 1. Christopher, M. (2005). Logistic and supply chain managment. London: FT prentice Hall. 2. Handfield, R. B. Nichols, E. L. (2002) Supply Chain Redesign: Transforming Supply Chains into Integrated Value systems, U.S.A: Prentice Hall. 3. Zhang, C. (2006). Secure Information sharing in Internet-based supply chain management systerms. Coumputer Information Systems , 18-24. 4.

Friday, October 25, 2019

All Quiet on the Western Front :: All Quiet on the Western Front Essays

All Quiet on the Western Front Millions dead, tens of millions injured, for what? For a petty argument between two countries. War is devastating to countries and most indefinitely individuals. Men can be left disturbed mentally, physically, and socially for the rest of their lives. Is this necessary? Well maybe you should decide after reading the next few paragraphs. You can decide if the war being fought is a war of dignity and glory as everyone would make it out to be or if it was a battle of death and gore. You maybe surprised at what happens to men out there. Well it would be glorious to be wounded and or die for your country right? Well maybe if you were the one seeing everything from the outside looking in. If you were a soldier your outlook on war may be a little different. The physical ailments of the young men are terrible. Some even consider it lucky if you die. For example, Remarque made it very clear that he was aware of the pains men were forced to endure when he put Paul and Albert Kropp in the hospital. Paul was going on leave and asked Albert if there was anything that he could get for him and Kropp said, "A gun." Paul showed his disapproval of this idea and Albert said something to the degree of I would rather die then live without a leg. Another example was when Kat was wounded by the bomb that went off while he was delivering supplies to the men on the front. Kat could not even walk. Then while Paul was taking him back to the First Aid center the man said, "He's stone dead." Paul was so oblivious to what was going on that he simply replied, "No, he's just fainted." When he looked at his hand and found a bullet wound in the back of Kat's head he was so stunned that he could not even think or see straight. In the real world people would leave their homes cheerful young men and return tattered worn cripples. Men would return with missing appendages. Some would return without legs. Others would come home without sight or unable to breathe on their own.

Thursday, October 24, 2019

Greed is for Wimps

In a Wall Street Journal article titled â€Å"Greed is for Wimps†, the writer talks about how the new generation, Generation Y, is becoming more socially aware. According to the article, this new generation of professionals wants to give back to the community. Apparently it’s not enough to be successful and make all the money in the world. These young professionals are no longer satisfied with driving expensive cars and wearing name brand clothes. An interview with one such young entrepreneur explained how â€Å"the positive impact [we] make on people’s lives is the best measure† of accomplishment. (Omidi) With the way this new generation has such easy access to information over the Internet and socially networking sites, it facilitates them to become more socially conscious. Also, with the effects of the financial crisis still lingering around, this new generation is beginning to find unappealing careers that focus just on making money. Perhaps today’s youth is realizing that everyone’s lives in this world is more intertwined than we believed. We can no longer just look out for ourselves and we can’t decide to help others once we have all the money we want. Instead we should help others as we make our money. I really hope this article is revealing what’s really going on in today’s professional generation and it’s not just subjective. It would be great if everyone began to see that â€Å"social returns outweigh the financial ones. †

Wednesday, October 23, 2019

Ethical Lens Essay

During the Ethical Lens Inventory exercise that I did, I learned that I do not really have a personal preferred ethical lens. I see the gifts and the weaknesses of each lens and I am able to move fluidly among them to adapt the right tools to each situation to assure the best outcome. I am able to use my reasoning skills to determine my duties, as well as the universal rules and the systems that will assure fairness and justice for everyone. I also listen to my intuition to determine the greatest good for each individual, as well as the virtues that will best serve the community. I have either a mature ability to use the right tools in a given situation or a paralyzed belief that everyone has a valid point. Although each of us has preferred lens, some who are ethically mature and able to use the tools of all the lenses, adapting them as appropriate in a given situation, test in the center of the grid. Others who test in the center of the grid actually have underdeveloped ethical skills. Those without skills tend to be paralyzed by their ability to see all sides and are too desperate to please everyone. I personally think I do more of the being desperate to please everyone than the not being able to see all sides of the situation. I was able to get this information from the exercise I did at: http://www. ethicsgame. com/Exec/Eli/EthicalLensResults. aspx? R=1 My Core Values are: Autonomy, Equality, Rationality and Sensibility. I value autonomy and equality equally and I value rationality and sensibility equally. My Classic Values are: Temperance, Prudence, Justice and Fortitude. I am able to manifest all four classic virtues depending on what the circumstances require. My Key Phrase is: â€Å"I make ethical choices for myself and others. † I am able to see myself and others clearly, therefore I do not make assumptions about why people act the way they do or how things should be done. My Definition of Ethical Behavior is: Doing the Right Thing. I tend to hold this high standard for myself but I do not judge others who fall short, so long as their intentions were honorable. My Tools for Analyzing Problems are: Reason, Experience, Authority and Tradition. I am comfortable using all available tools to analyze a problem. These can include critical thinking skills, reference to experts, my own past experience and the traditions of the community. My Gift to the community is balance among all four lenses, because I can see the benefits of each of the lenses and I can use the tools of all of them. The mature expression of this position has no blind spot. I am able to see both the strengths and the weaknesses of each lens and to harmonize the four core values of autonomy, equality, rationality and sensibility. Discernment comes with ethical maturity and provides direction in specific situations. My Risk is: Inaction. I run the risk of seeing everything and deciding nothing if I am not self-aware. As one who sees the legitimacy of everyone’s point of view, I am particularly prone to delay or outright inaction. My Temptation is: Superiority. Believing that my balanced vantage point gives me a superior ability to resolve ethical dilemmas, I may convince myself that I have all the answers and do not need any input from others. My Vice is: Insistence on Agreement. By insisting that everyone validate all points of view as I do before moving forward, I become tyrannical and may actually provoke dissenters into sabotaging the process as the only way they feel they can maintain the integrity of their different viewpoint. My Crisis is: Confusion. Unless I develop the practice of mindfulness and reflection, at some point I will become confused and find that I have lost my moral compass. The downside of being able to see everyone else’s perspective is that I can lose track of my own. My Seeing Clearly is: Listen to my heart; use my head; act with confidence. To see more clearly, I need to first consider the nature of the problem. Then I need to use both my head and my heart to discern which course of action will best manifest interdependence. Once I have assessed the ramifications of the various options, I will need to act with confidence and courage. Although there may be more than one way to resolve a problem, some actually are better than others. I think I could use my personal ethics to determine a course of action by knowing how I feel about the situation along with all the circumstances involving the situation.

Tuesday, October 22, 2019

Computer Essays - Computer Network Security, Cyberwarfare

Computer Essays - Computer Network Security, Cyberwarfare Computer Why is a site inspection important? A site inspection will be performed to double-check these plans: investigate traditional problem areas, such as elevator shafts, firewalls, and potential sources of interference. Spend some time looking around the Campus or your place of work. What obstacles do you think you would face when installing a network? List 12 things that could cause a problem. Class schedule People (students, and facilities) You are working for a company that is using your computer skills to provide computer support to other employees. This is not an official part of your job and you are still expected to get your job done. One day a consultant shows up and starts planning a network and computer support services. Neither your supervisor or the consultant acknowledges your role or asks for your opinion. How do you think you would react? As a manager how could you avoid this potential problem? Who do you think should be involved in the planning process managers, supervisors, staff members, senior staff, existing technical staff? Why/Why Not? Everybody should involve from the planning process, because adding a network involves changes to the ways people work, the human element is equally important. Would you recommend that the company use an outside consultant? Why/Why Not? For all but the smallest of networks, unless youre already an experienced networker, it might be wise to consider enlisting the services of a qualified network consultant in planning and implementing your network. The only caveat is to remember that consultants can only deliver what you ask for; the more specific and detailed your requests, the better the results will be. What

Monday, October 21, 2019

Free Essays on Catch 22

When Heller began his writing career in the late 1940s, he turned his back on traditional methods of story telling. He seemed to resent the "realism" of the conventional mode of fiction with its rational structure, its assumptions of continuity in plot, situation, and character, and its neat attempts to draw well-defined resolutions. His own experience as an airman in World War II caused him to distrust the cause-and effect relation of surface reality as something merely superficial which captured only outer reality. So in his fiction, Heller developed a structure and style that suited the absurdities in public and private life that he observed around him. The dislocation of episodic continuity serves a dual purpose. Some of the events are juxtaposed not on the basis of chronology but randomly so as to highlight their inter-relationship and to emphasize certain ironic contrasts. Besides, the episodes of the novel are so structured as to create a gradually increasing tension through the sinister events represented in them. Heller gives us several accounts, scattered over various chapters, of the catastrophic events in Yossarian’s plane leading up to a death. Each attempt at narrating the gory details serves to intensify the traumatic impact it has on the morale and psyche of Yossarian. The overall time structure of the novel does acquire some chronological continuity through the intermittent repetition of certain crucial incidents. Recurrent references include the monumental growth of Minderbinder’s black-market operations, the death of Snowden; Cathcart’s rising of the number of missions, and Orr’s repeated ditching of his planes at sea. Catch-22 depicts the absurdities and excesses of life in wartime conditions; on the other hand, it castigates the insanity and inhumanity of bureaucratic systems both in wartime and in peace. It is not surprising, then that the postwar generation of the 1950s and 1960s identi... Free Essays on Catch 22 Free Essays on Catch 22 When Heller began his writing career in the late 1940s, he turned his back on traditional methods of story telling. He seemed to resent the "realism" of the conventional mode of fiction with its rational structure, its assumptions of continuity in plot, situation, and character, and its neat attempts to draw well-defined resolutions. His own experience as an airman in World War II caused him to distrust the cause-and effect relation of surface reality as something merely superficial which captured only outer reality. So in his fiction, Heller developed a structure and style that suited the absurdities in public and private life that he observed around him. The dislocation of episodic continuity serves a dual purpose. Some of the events are juxtaposed not on the basis of chronology but randomly so as to highlight their inter-relationship and to emphasize certain ironic contrasts. Besides, the episodes of the novel are so structured as to create a gradually increasing tension through the sinister events represented in them. Heller gives us several accounts, scattered over various chapters, of the catastrophic events in Yossarian’s plane leading up to a death. Each attempt at narrating the gory details serves to intensify the traumatic impact it has on the morale and psyche of Yossarian. The overall time structure of the novel does acquire some chronological continuity through the intermittent repetition of certain crucial incidents. Recurrent references include the monumental growth of Minderbinder’s black-market operations, the death of Snowden; Cathcart’s rising of the number of missions, and Orr’s repeated ditching of his planes at sea. Catch-22 depicts the absurdities and excesses of life in wartime conditions; on the other hand, it castigates the insanity and inhumanity of bureaucratic systems both in wartime and in peace. It is not surprising, then that the postwar generation of the 1950s and 1960s identi...

Sunday, October 20, 2019

Understanding Difficult Biology Words

Understanding Difficult Biology Words One of the keys to being successful in biology is being able to understand the terminology. Difficult biology words and terms can be made easy to understand by becoming familiar with common prefixes and suffixes used in biology. These affixes, derived from Latin and Greek roots, form the basis for many difficult biology words. Biology Terms Below is a list of a few biology words and terms that many biology students find difficult to understand. By breaking these words down into discrete units, even the most complex terms can be understood. Autotroph This word can be separated as follows: Auto - troph.Auto - means self, troph - means nourish. Autotrophs are organisms capable of self-nourishment. Cytokinesis This word can be separated as follows: Cyto - kinesis.Cyto - means cell, kinesis - means movement. Cytokinesis refers to the movement of the cytoplasm that produces distinct daughter cells during cell division. Eukaryote This word can be separated as follows: Eu - karyo - te.Eu - means true, karyo - means nucleus. A eukaryote is an organism whose cells contain a true membrane-bound nucleus. Heterozygous This word can be separated as follows: Hetero - zyg - ous.Hetero - means different, zyg - means yolk or union, ous - means characterized by or full of. Heterozygous refers to a union characterized by the joining of two different alleles for a given trait. Hydrophilic This word can be separated as follows: Hydro - philic.Hydro - refers to water, philic - means love. Hydrophilic means water-loving. Oligosaccharide This word can be separated as follows: Oligo - saccharide.Oligo - means few or little, saccharide - means sugar. An oligosaccharide is a carbohydrate that contains a small number of component sugars. Osteoblast This word can be separated as follows: Osteo - blast.Osteo - means bone, blast - means bud or germ (early form of an organism). An osteoblast is a cell from which bone is derived. Tegmentum This word can be separated as follows: Teg - ment - um.Teg - means cover, ment - refers to mind or brain. The tegmentum is the bundle of fibers that cover the brain. Key Takeaways To be successful in the sciences, particularly in biology, one must understand the terminology.Common affixes (prefixes and suffixes) that are used in biology are often derived from Latin and Greek roots.These affixes form the basis for many difficult biology words.By breaking these difficult terms down into their formative units, even the most complex biological words can be easily understood. Additional Biology Terms For more practice with breaking down biology terms, review the words below. The main prefixes and suffixes used are angio-, -troph, and -trophy. Allotroph (allo - troph) Allotrophs are organisms that get their energy from food obtained from their environments. Angiostenosis (angio - stenosis) Refers to the narrowing of a vessel, particularly a blood vessel. Angiomyogenesis (angio - myo - genesis) A medical term referring to the regeneration of heart tissue. Angiostimulatory (angio - stimulatory) Refers to the growth and stimulation of blood vessels. Axonotrophy (axono - trophy) Is a condition where axons are destroyed due to disease. Biotroph (bio - troph) Biotrophs are parasites that do not kill their hosts. They establish a long-term infection to continue to get their energy from the living cells. Bradytroph (brady - troph) Bradytroph refers to an organism that experiences very slow growth without a particular substance. Cellulotrophy (cellulo - trophy) This term refers to the digestion of cellulose, an organic polymer. Chemotrophy (chemo - trophy) Chemotrophy refers to an organism making its energy by the oxidation of molecules. Electrotroph (electro - troph) These are organisms that can obtain their energy from an electric source. Necrotroph (necro - troph) Unlike the aforementioned biotrophs, necrotrophs are parasites that kill their host since they survive on the dead remains. Oligotroph (oligo - troph) Organisms that can live in places with very few nutrients are called oligotrophs. Oxalotrophy (oxalo - trophy) Refers to organisms that metabolize oxalates or oxalic acid. Biology Word Dissections For more information on how to understand difficult biology words or terms see: Biology Word Dissections - Pneumonoultramicroscopicsilicovolcanoconiosis. Yes, this is an actual word. What does it mean?

Saturday, October 19, 2019

Ellen's analysis speech Essay Example | Topics and Well Written Essays - 500 words

Ellen's analysis speech - Essay Example The speech was well organized because it began on a light note with humor and proceeded to more serious sections of illustrations and facts before it ended with jokes and humor. The impact of this style enhanced the aesthetics of the speech. It also contributed to the aspect of memorability. The transitions were evident in the course of the speech. They were mainly noted in the rising and falling of pitch in different parts of the speech. Parts of humor were highlighted in a high pitch while factual parts were captured in a low and serious pitched voice. The effect was to capture and retain the attention of the audience. The speaker’s introduction was effective. She began the speech on a high note and enlisted humor to capture the attention of the audience. The introduction prepared the audience for the captivating details in the rest of the speech. The speaker’s conclusion was effective because it provided a summary of the major themes discussed. The conclusion also eased the attention of the audience through the relaxation of tone and mood. It also involved some sense of humor through the jokes used. Credibility of the story was used through reference to personal experiences. It was also enhanced by incorporating details of current affairs and information. This combination enhanced the factual representation of the core issues of the speech. The speaker’s facial expression and body movement were consistent with the verbal aspects of the speech. She did not exaggerate her gestures and appeared to command some balance in the aspect of presentation. However, her last minute dancing seemed to go slightly beyond expectations. The speaker was effective in her facial expressions. She changed her facial expressions at different parts of the speech to demonstrate change of tone and mood. This strategy provides the means of adjusting the expectations and concentration of the audience. The speaker was sufficiently effective in her vocal

Friday, October 18, 2019

Burning Man outline Essay Example | Topics and Well Written Essays - 500 words

Burning Man outline - Essay Example ve such a large number of individuals across the world spending so much of their efforts and their time to construct something that will only last a few weeks? Why would the same people spend a junk of their resources on things that do not have any monetary gains? What compelling force was behind the formation of the Burning man and what powers make it possible to spread as fast as it did soon after its foundation? The last question is what importance does the festival of burning man have on our lives? The answers to such issues relate to the creativity of the founders of the movement, who developed an idea that replicated and extended on itself to form one of the strongest movements. As such, the founders of the ceremony talk of the importance of the ceremony on the sensitization of humans on the need for identity. The body of this work will discuss a number of implications of the ceremony of burning man on the lives of people. For instance, there will be a demonstration of how the whole idea of the ceremony developed in relation to propaganda. As such, the work will describe the usefulness of idea novelty in the manipulation of the minds of individuals. There are those people who participate in the without understanding the needfulness of the same. Essentially, the creative extremities that the ceremony holds are a result of its differentiating ethos (Johnson 20). The ceremony could be one that satisfies the truthfulness of the quotation that what matters to the lives of people Is not what happens to them, but what they remember as well as how they remember it. What people do in life in relation to the burning man ceremony is, therefore, an emphasis on the usefulness of propaganda in the development of life-binding ideologies. The movement is now among those that inspires people across the world on the need for identity and personality. McRae, Kateri, et al. "Context-Dependent Emotion Regulation: Suppression and Reappraisal at the Burning Man Festival."Â  Basic

Ethics in Professional Societies Essay Example | Topics and Well Written Essays - 1000 words

Ethics in Professional Societies - Essay Example In any professional sphere, it is relevant to follow ethical principles and not only to work. Ethical principles have a different power in comparison with laws. Thus, laws can regulate or not, support or not some ethical principles. For example, from the perspective of medical ethics, abortion is unethical deed. It is a life interruption. In accordance with laws in many countries abortion is a legal issue. Nevertheless, Civil Rights Law in America propagates ethical and legal commitment. In one way or another, but the modern society requires ethical regulations in any profession. Still, the conditions of underdeveloped professional ethics among engineers cannot be denied. The fact that medical ethics is more developed cannot be denied as well. Still, the necessity of ethical principle following in these both spheres is an inarguable fact. Ethical principle relevance in the medical professional society usually concerns how medicals should ethically behave when they deal with the issue s concerning life and death. The most known ethical code of behavior for medicals is the Oath of Hippocrates. Currently, the American Medical Association has introduced bioethics. It covers such issues as pharmacy, nursing, social work and so on. Therefore, we can claim that for the American Medical Association ethical principles following in all spheres and aspects of medicine are of crucial importance1. It goes another way in the professional society of engineers. ... eering and Technology, a specific nature of ethics in engineering encompasses the following issues: â€Å"public safety; bribery and fraud; environmental protection; fairness; honesty in research and testing conflicts of interest†2. The necessity to develop code of ethics for engineers in accordance with the specific nature of the field of their activity can be explained by the following facts: the decisions made by engineers can cause a negative impact on public’s health; moral implications are of high importance for engineers. In such a way, it is necessary to support legally the development of ethical principles for engineers: the latter would think critically and independently about different moral issues; moral thinking would be incorporated in the professional engineering practice. In accordance with the research project â€Å"Ethics in Engineering†: â€Å"ethical problems in engineering are often complex and involve conflicting ethical principles. Enginee rs must be able to intelligently resolve these conflicts and reach a defensible decision†3. Therefore, engineers are not considered in the modern society as technicians, they are intelligent individuals with the ability to morally and ethically behave and think. Ethical principles of engineering in comparison with other professions There are numerous complexities within the professional field of engineers. These professionals are not self-employed and usually work for large corporations. Moreover, there is a lack of respect paid to engineers in comparison with medicals 4and they also do not have such high payments as physicians or lawyers do. Engineering professional society is not as well developed as the professional society of medicals (AMA) or as the professional association of lawyers (ABA)5. Therefore,

THE REALCO BREADMASTER & A BUMPY ROAD FOR TOYOTA Research Paper

THE REALCO BREADMASTER & A BUMPY ROAD FOR TOYOTA - Research Paper Example Table of master production schedule The forecasted inventory is ideally low whereas the available to promise figures are sparingly low for the first five weeks compared to the last three weeks. It is clear that Realco overpromised customers in the last three weeks of production. From the evidence, there are no products to supply to meet demand. This will eventually lead to high level of customer dissatisfaction as the customers are disappointed in the long run since their orders are not availed. From my point of view, Realco needs to re-evaluate its projection or the total production figures. This influences customer satisfaction and builds strong thrust between the organization and the customers since customers are not disappointed. In almost all organization customer satisfaction is the key to their success (Boston 102). Business organizations have systems, which enhances, close level of communications targeting customers in order to meet customers’ needs and demands. Customers are satisfied and hence the organization meets or maintains its growth target. This is made possible by establishing a strong relationship through networking as a marketing goal. When customers are satisfied, they would have no option but to remain loyal to the organization since all their demands and need are taken care off. This will eventually ensures the organization has a large customer base and has a bigger market share. As a critical success factor, Realco adheres to the needs of the customers. This can only be achieved by ensuring that target projection meets those of the customers. This will not only increase revenue but also improves customer loyalty. Jack’s focus on order promising is truly ideal and strategic. This is because it ensures that customers are not swayed to pick other products from his competitors. By virtue of giving an allowance of one week, ensures that in case of disruption of the production

Thursday, October 17, 2019

HU-Midterm Composition Assignment Example | Topics and Well Written Essays - 750 words

HU-Midterm Composition - Assignment Example Therefore, the work portrays the events in the ancient Egypt. It is claimed that the British archaeologist, once J. E. Quibell, place this art in this location during his 1897/98 excavation season. Alongside his colleagues, they deposited stemming artifacts that would later be recorded in the history of the ancient Egypt. These artifacts contained fragments of the ceremonial head of Narmer alongside other mace head fragments with some other inscribed with the Horus ‘Scorpion the name that was traced to be the name of one of the Narmer’s predecessors. Regardless of these findings and records of the Palette of Narmer, there are still doubts that the exact finding circumstances related this palette are not exact; thus, it appears that a lot of contradicting publications have been published concerning Quibell’s work at Hierakonpolis. Nonetheless, the general military symbolism relating to the palette is still clear and acceptable (Stokstad and Cothren 26). The palette of Narmer describes the kingdom of the ancient Egypt while the Stele of Naram Sin presents the northern Mesopotamia kingdom that existed in 2332 BCE pictorially. It is apparent that these two pieces of art were used to describe the historical events of this time. In the 2334 BCE, there were loosely linked sites known as the Sumer. Sargon of Akkad became the great king who emerged to control these cities. Later, Naram Sin the grandson of Sargon initiated victory stele at Sippar in order to commemorate his Lullubi’s victory (Stokstad and Cothren 36). It is under these circumstances that the Stele of Naram Sin art created to signify his divinity. Therefore, it is clear these two pieces of art were related to actions of the ancient Kings. At some levels of understanding, it is apparent that the Stele of Naram Sin and the palette of king Narmer present a striking parallelism. Nonetheless, both of them are designed to commemorate

Challenges Faced by International Firms in Asia and Their Response to Research Paper - 1

Challenges Faced by International Firms in Asia and Their Response to These Problems - Research Paper Example As the paper declares, one of the problems of multinational companies in Asia, among many, is the â€Å"long, thin arm† problem, the assumption that it is adequate to think globally while acting locally and of course the absence of cross border integration in Asia. For the multinational companies to remain relevant in an increasingly competitive scenario that is now the face of global commerce.  According to the paper findings, the political stability within the country that a foreign investor takes interest in is crucial. When there is civil unrest or war, then the risks are raised sometimes to a point that the business venture is not worth undertaking. The government plays a major role in whether the investor in creating the ambiance to attract investor since it is the government that formulates policies on trade and other factors that influence trade. Risks that come with tax also acts as a restraint for multinational firms in Asia with China being the first with the high est tax-related risks. The Chinese government has tried to counter this by having a different taxation system for firms with foreign affiliations. The survey also indicates that firms found India’s taxation system as being the most complex. The feature of the Asian market that encourages foreign firms is that labor, though the cost of which has been rising, is still relatively cheap. When Western multinationals first came to Asia, they were impressed by the low-cost manufacturing operations that were presented by the continent.

Wednesday, October 16, 2019

HU-Midterm Composition Assignment Example | Topics and Well Written Essays - 750 words

HU-Midterm Composition - Assignment Example Therefore, the work portrays the events in the ancient Egypt. It is claimed that the British archaeologist, once J. E. Quibell, place this art in this location during his 1897/98 excavation season. Alongside his colleagues, they deposited stemming artifacts that would later be recorded in the history of the ancient Egypt. These artifacts contained fragments of the ceremonial head of Narmer alongside other mace head fragments with some other inscribed with the Horus ‘Scorpion the name that was traced to be the name of one of the Narmer’s predecessors. Regardless of these findings and records of the Palette of Narmer, there are still doubts that the exact finding circumstances related this palette are not exact; thus, it appears that a lot of contradicting publications have been published concerning Quibell’s work at Hierakonpolis. Nonetheless, the general military symbolism relating to the palette is still clear and acceptable (Stokstad and Cothren 26). The palette of Narmer describes the kingdom of the ancient Egypt while the Stele of Naram Sin presents the northern Mesopotamia kingdom that existed in 2332 BCE pictorially. It is apparent that these two pieces of art were used to describe the historical events of this time. In the 2334 BCE, there were loosely linked sites known as the Sumer. Sargon of Akkad became the great king who emerged to control these cities. Later, Naram Sin the grandson of Sargon initiated victory stele at Sippar in order to commemorate his Lullubi’s victory (Stokstad and Cothren 36). It is under these circumstances that the Stele of Naram Sin art created to signify his divinity. Therefore, it is clear these two pieces of art were related to actions of the ancient Kings. At some levels of understanding, it is apparent that the Stele of Naram Sin and the palette of king Narmer present a striking parallelism. Nonetheless, both of them are designed to commemorate

Tuesday, October 15, 2019

PV system Assignment Example | Topics and Well Written Essays - 500 words

PV system - Assignment Example h. power storage: solar power can be put away in solar batteries and warm thermal solar frameworks for warming homes. At the point when there is light, the panels charge the batteries. Amid the night and climate conditions without the sun, the batteries are utilized to power the lightings (Conservative critic). (a) It is the design that expands the gathering of vitality from solar sources from a vast territory. It is attained by concentrating solar radiation from a vast region into a PV cell. It fundamentally lessens on the measure of the silicon wafer that is put into the generation of power. (b) Concentrating beams from the light is best accomplished by utilizing mirrors and lenses a procedure termed as optical force. Then again, a glass window built with luminescent substances in a methodology called luminescent concentration. (C) By guaranteeing that a lot of light from an unfathomable zone falls on a little PV cell, less measure of silicon is required to create and deliver high measures of energy subsequently lessening generation cost. For the luminescent concentration, the sheet of luminescent substance reradiates light, which wind up inside the glass. The reflection brought on falls on the PV cells to create power. The setup obliges that silicon wafer is just made utilization of on the edges. Productivity is a component considered from over edge as it prompts expanded proficiency (Ferowich). Ferowich, Grant. Solar Power: Cost and Reliability Make It the Perfect Energy Source. 31 MAY 2013. 4 OCT 2014

Monday, October 14, 2019

Attack Tree Model Analysis of Security Breaches

Attack Tree Model Analysis of Security Breaches THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting systems in place, he says. (Fred Sandsmark, p11) The above-mentioned stated that there was slightly increase in computers attack in 2005. As technology evolving, companies willingly to spend more money on computer systems to do business activities with their associate and partners. This will increase more and more security breaches on the computer systems. The purpose of this analysis report is to examine the various possible attack methods to compromise the availability of the computers, information and associated resources of a small firm. Research for this report includes an attack tree diagram, showing how the hacker can compromise the availability of the systems services, associated resources and to access sensitive information through different attack techniques. Each technique is the subset of the different type of attack methods, with possible assumptions attach to each methods, the attack tree will be discussed in greater details. INTRODUCTION The manager of the Raylee Pte Ltd has recently heard through the media and newspaper publications that there are numerous threats which could compromise the availability of the computers, information and associated resources. Management of Raylee Pte Ltd has decided to hire the security consultant firm Red Alert Security Pte Ltd to undertake a details analysis of its current computer and network state in order to prevent the hackers to compromise the availability of the computers services, information and resources. The under-mentions are the network and desktop environments of the Raylee Pte Ltd. There are six computers and one internal server (for processing orders) within the firm. Each computer encompasses Microsoft Windows 7 and Microsoft 2007 Each workstation has been patched with all updates as of March 25th, 2010. The company shares an ADSL 2+ connection amongst all computers. Server backups are done fortnightly and stored on a DVD spindle name backup1 Workstation backups are done bi-monthly and stored on a DVD spindle name backup2 Employees have email addresses provided by the Internet Service Provider. Documents are shared amongst employees through a D-Link DNS-323 NAS The router is utilising a default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. SCOPE Security consultant of Red Alert Security Pte Ltd will analyse of the company current computer system, network state and desktop environment in order to prevent the hackers to compromise the availability of the computers services, information and resources. Then the consultant will submit a detail analysis report to the Management of Raylee Pte Ltd for recommendations METHODOGLY The security consultant uses a technique known as attack tree to identify the best possible options to compromise the availability of the system services, information and resource in the quickest time. Below is the attack tree he comes up with. Compromise The Availability Of Computers, Information And Associated Resources 1. Remote Access Router: D-Link DSL G604t 2. Access NAS: D-Link DNS-323 3. 3. Gain Access Internal Server (Processing Orders) Orders) 4. Steal Password: Workstations METHODOLOGY From the attack tree in the previous page, each of the sub attack tree will be discussed in more detail. Figure 1 1. Remote Access Router : D-Link DSL G604t 1.1 Determine the password 1.1.1 Learn password 1.1.2 Use widely know password 1.1.3 Dictionary attacks 1.1. Determine password Hacker and cyber criminal will try to determine the password of the router in order to access the network environment and do whatever they want. We will briefly explain the methods as follows 1.1.1 Learn password If the user has not set new password and is using the default which is normally blank. Hackers can easily search online for the manual of the particular wireless router and know the password. Hackers login the wireless router configuration page to change the setting and sabotage the network. For instance, hacker can surf this link http://www.routerpasswords.com/index.asp to get the default password for all the routers. 1.1.2 Use widely know password The common used passwords are admin, password, [emailprotected], 123456, 666666, qwerty, 00000000 and etc. These widely used passwords allow hackers to easily access the router. 1.1.3 Dictionary attacks As the word dictionary it implies that it is one of the attack techniques use by the hackers to determine its decryption key, password or passphrase by searching the all the words which are usually seven characters or lesser chosen by the user in the dictionary. METHODOLOGY Figure 2 2. Access NAS : D-Link DNS-323 2.1 FTP server 2.2 Folder File Permission 2.3 P2P distribution 2.1.1 Bounce Attack 2.1.2 Misconfigure 2.3.1 File poisoning 2.3.2 Sybil attack 2.1 FTP server Most of the Network Attach Storage device comes with the feature of the FTP server which allows user to download or upload file remotely anywhere. However, this service creates a loophole for attacker to retrieve sensitive information and data. The various attack methods on FTP server are discussed as follows 2.1.1 Bounce Attack FTP bounce attack is another attacking technique use by the hacker to exploit the ftp protocol so that he can use the PORT command to send request access to the ftp port indirectly to another victim machine which acts as third party for such request to access the ftp. 2.1.2 Misconfigure One of the common problems is to misconfigure the ftp server which allows users to download and upload the files in the same directory (global/tmp directory) for people to share data with each other. It will create an opportunity for attacker or theft to steal the data or upload virus program to the directory. Hence employee will accidentally install the virus program and infect to the computer systems and network. 2.2 Folder File Permission Proper folder and file permission must be set according to the employee roles and responsibilities. If there is no permission setting on the files and folder and gives everyone permission to read, write and execute it. Then it will be easily for attacker to retrieve information upon hacking into the company network. 2.3 P2P Distribution It is a peer-to-peer file transfer protocol to allow users each download different pieces of the broken file from the original uploader (seed). Users exchange the pieces with their peers to obtain the broken ones which are missing. IT savvy employees can make use of the P2P to download their favourite movies, videos, music and software. Hacker will make use of the P2P attacks to gain access into the network. There are two types of attacks which are file poisoning and Sybil attack. 2.3.1 File Poisoning File poisoning attacks operate on the data plane and have become extremely commonplace in P2P networks. The purpose of this attack is to replace a file in the network by a fake one and this file will be corrupted and no longer in use. 2.3.2 Sybil Attack The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Once the attacker gains the control, he can abuse the protocol in any way he likes. METHODOLOGY Figure 3 3. Gain Access Internal Server (Processing Orders) 3.1 Steal sensitive information from the database 3.1.1 Gain access by internet 3.1.2 Physical access to the server 3.1.3 Access server from workstation OR OR 3.1.1.1 Monitor network traffic 3.1.1.2 Use remote exploit 3.1 Steal sensitive information from the database Sometimes hackers are hired by the competitor to create chaos in the company network and to steal confidential information such as customer data, vendor data, pricing information, new product launch information from the computer systems. There are various methods to steal information from the database and there are as follows: 3.1.1 Gain Access By Internet Attack corporate network by using internet is becoming more sophisticated as technologies evolving. There is an increase of internet attacks orchestrate by the hackers to strike highly protected targets, to coordinate waves of scripted exploits and/or to conceal the true origin of an attack. 3.1.1 .1 Monitor Network Traffic Cyber criminal use network monitor tools to monitor the local area networks or wide area networks. Some of the network monitoring tools such as Microsoft Network Monitor, Ettercap, TCP Dump and DSniff can be download freely from the internet. This program can intercept and log the traffic passing over the network or part of the network. Once the information is captured by the program, hacker will decodes and analyse its content according to the appropriate RFC or other specifications. 3.1.1 .2 Use Remote Exploit The server is connected to the internet and the operating system is not updated the latest patches, then the cyber attacker will use remote exploit the vulnerability of the system to infiltrated the system to steal the information and sabotage the server by destroy the database and hard disk. Since the server backups are done fortnightly, management will be facing difficulties in recover the data. 3.1.2 Physical Access To The Server Due to the space constraint, sometime the server share space with someones cubicle or office. This creates an opportunity for an attacker who able to access files and other data by removes the hard disk, and then attaches it to another computer. He can also use third-party operating system CD to start the computer and steal corporate data or insert USB drive to inject virus into the system. 3.1.3 Access Server From Workstation Cyber attacker is not limited to hack into the server. Workstation is the often the first target the hacker will try to access because from there, he can learn about the network environment and security loopholes to attack the server. He will use the workstation as the stepping-stone to server-level break-in by stealing administrator passwords. METHODOLOGY Figure 4 4. Steal Password: Workstations 4.1 Users Login password 4.1.2 Obtain password illegally 4.1.1 Social Engineering 4.1.1.1 Share password 4.1.1.2 Phishing 4.1.2.2 Find written password 4.1.2.1 Steal password 4.1.2.1.2 Install keyboard sniffer 4.1.2.1.1 Obtain sniffer output file AND 4.1 Users Login Password Companies must know that hackers not only interested in the corporate data, they are also interested in the employees personal data such as bank account, credit card, email address and others. To break into the workstation, hackers will need to know the users login password. 4.1.1 Social Engineering Social engineering is the method of non technical hacking into the system by manipulating people through social interaction via email or phone to reveal their password. 4.1.1.1 Shared Password It is very common for employees to share computer password with their colleagues. Sometimes in their absence in the office, they will usually call one another to help them login to the computer to retrieve some information. 4.1.1.2 Phishing Hacker can create an email or instant messaging with attach fake website link which looks almost the same as the real one to lure the user enters their personal details such as username, password, credit card details and banking credential. All these information will be sending to the hacker. 4.1.2 Obtain Password Illegally Weak password makes hacker to obtain password illegally and faster. Cyber attackers will steal the password by infect the workstation with trojan. Basically there are three types of trojan attackers can use to steal the password namely: keyboard sniffer, login spoofing and password stealer. When attacker install the keyboard sniffer program which will monitor each keystroke the user has entered and this program generate the sniffer output file which send to the attacker. Sometimes hacker can pose as companys guest to access the premises. Upon entering the office, he will look for password which the employee written on a piece of paper and paste it around the working cubicle. CONCLUSION Companies are constantly at risk of losing sensitive corporate data. In this report,  we have use the attack tree model to analyse various attacks method the attackers use to steal sensitive information on the server, network attach storage device, router and workstations. The most common and easier method is to obtain the users password by learn the password, use widely common password, dictionary attack, shared password, phishing, find written password and steal passwords. Cyber attackers and novice hackers are usual like to steal the passwords by downloading keyboard loggers, passwords cracking software, keyboard sniffers and others which are available on the website to test on their skill. Management should implement counter measures to prevent hackers to attack their system and security breaches. We recommend antivirus program to be installed on  the workstation and server as they are utilising Microsoft Windows Malicious Software Removal Tool which is not enough for the prevention of the cyber attacks. Local group policy of the password needs to enforce on the networking devices, workstation and server so that the password is not being easily crack by the hackers. Lastly, passwords should be set minimum 8 characters and contain alphanumeric and symbols for complexity. In conclusion, steal password is the easiest method for hackers to attack the computer system because local authorities might face difficulties in tracking them down if they are distant hackers. GLOSSARY Attack tree Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes. (Source : http://www.schneier.com/paper-attacktrees-ddj-ft.html ) Social Engineering In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. (Source : http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html ) 3. Phishing Phishing is a technique of fraudulently obtaining private information. (Source : http://en.wikipedia.org/wiki/Social_engineering_(security)#Pretexting ) 4. Keyboard Sniffer A program which reads the keystrokes made by a user and transmits them to someone else. Such programs are usually used by intruders into computer systems in order to capture important information such as passwords. (Source : http://www.encyclopedia.com/doc/1O12-keyboardsniffer.html ) 5. RFC Short for Request for Comments, a series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard. Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number. (Source : http://www.webopedia.com/TERM/R/RFC.html )

Sunday, October 13, 2019

Hamlet: Character Analysis :: essays research papers

Over the centuries many people have complained that William Shakespeare did an inadequate job of steering the readers of Hamlet to a specific interpretation of each character. Each reader is left to decide the true extent of Hamlet’s evil and insane ways or to realize that he clearly is a victim of circumstances beyond his control, therefore declaring him innocent. Because of William Shakespeare’s writing style, the reader receives little help in discovering who is truly innocent and who is as guilty as Claudius. Many scholars agree that Hamlet may be the most complex character presented by any playwrite. Over the centuries critics have offered many theories and explanations for Hamlet’s actions, but none have sufficiently explained him. Many people view Hamlet as a deeply troubled youth who caused many unnecessary deaths, such as those of Polonius and Laertes. Critics who support this theory point out the cruel actions carried out by Hamlet, one example being the indifferent and boastful way Hamlet describes the ingenious way he had his two good friend, Rosencrantz and Guildentsern killed. But wilt thou hear now how I did proceed?†¦I sat down, devised a new commission, wrote it fair. I once did hold it, as our satists do, a baseness to write fair, labored much how to forget that learning, but, sir, now it did me a yeoman’s service. Wilt thou know th’ effect of what I wrote?†¦An earnest conjuration from the King, as England was his faithful tributary†¦that on the view and knowing of the contents, without debatement further more or less, he should those bearers put to sudden death. (Shakespeare 5:228-45) The way Hamlet treats Ophelia, the woman he supposedly loved, also supports the portrayal of him being a barbarian. If thou dost marry ,I’ll give thee this plague for thy dowry: be thou as chaste as ice, as pure as snow, thou shalt not escape calumny. Get thee to a nunnery[referring to a brothel], go and quickly, too.(Shakespeare 3:1 136-141) Another offered interpretation suggests that using the information given by the ghost of King Hamlet, Hamlet seized the opportunity to regain what was rightfully his-the throne of Denmark. One less popular belief that has been expressed states that Hamlet was actually a girl, raised as a man, so there would be an heir to the throne. Critics who support this view say that this theory explains Hamlet’s reluctance and hesitation to commit murder(which is most often viewed as a masculine act).

Saturday, October 12, 2019

Computers in the Classroom :: Education Teaching

Computers in the Classroom Technology is increasingly becoming part of our everyday life. We can think back to a time when we did not even know what a computer was and all we had was the telephone, radio, and television. Now, we cannot go a day without using my computer and the internet to do something that we need to get done. When did it all change? Everything is happening so fast. We remember going to school and all that we were allowed to use was paper and pencil and we are only twenty and twenty-two years old. When we think about how quickly things have changed, we can only image what it’s going to be like for the next generation. Everyday there is something new coming out into the technology market whether it be, an upgrade to a software package or a new model for a computer. We have come to the realization that as soon as we buy a product, such as a new computer or printer that within a month or less, it is essentially out dated. The reason for that is that as soon as the companies such as Hewett Packard put a new product out on the market, they have already begun work on a new model to improve the one that they just put out. Not only have computers become part of everyday life; they have also become an essential part of instruction in the classroom for both teachers and students. Throughout this paper, we will be discussing several different aspects of why computers are important tool in the classroom. The job of a teacher is to engage students in learning. Computers are engaging learning tools because they reinforce the concepts which are being taught in the classroom. In the past ten years from Kindergarten through college, teachers and students have embraced information technology. Eight-five percent of children know more about computers and the Internet then both their parents (http://www.davidpearcesnyder.com/computers_and_classrooms.htm, n.d). When computers are used in an interactive mode it enhances the average young person’s ability to learn. Some examples of inactive mode include video games, educational games, and chat rooms. In addition, CD-ROMs allow students to learn to read faster and retain more information. In high school, three fourths of students prefer researching school assignments on the Internet (http://www.

Friday, October 11, 2019

Foreign Direct investment policies Essay

Recently Egypt has made some impressive reforms in reforming its foreign direct investment policies but there are still some significant barriers. Currently the FDI stands at 12. 2 Billion up from one billion in 2001. Barriers to entry have been eased for foreign investors; the country has dedicated a ministry to propel the number of foreign investors. Egypt streamlined its tax system with a reduction in corporate income tax rate from between thirty two percent and forty percent to a uniform of twenty percent. In manufacturing, foreign investment has been fully liberalized other than in industries related to defense activities. Foreign equity is allowed to participate in privately owned communication and financial services up to one hundred percent. It has become cheaper and quicker for foreigners to register new companies (Ikram et al 1980) In some sectors such as transport, electricity and construction, foreign investment is restricted. For example in construction foreign companies have to set up a joint venture, in which the equity of foreigner is only limited to forty nine percent. Economic Structure and performance The economy of Egypt is undergoing a steady growth in the last quarter of 2008. Egypt’s annual growth domestic product had risen from 7. 3 in 2006 to 8. 6 in 2008. The rate of inflation has also dropped from 18. 3% in 2003 to 3. 21% in 2008. However with the current economic downturn inflation rate in Egypt stand at 10. 87%. With the economic reforms that the government has undertaken, private sector commands over eighty percent of Egypt’s economy. As economic reforms take root, the annual growth domestic percent is likely to accelerate. It has been predicted that it will hit 13. 5 % by 2010. Economist agrees that the economic climate that currently exists in Egypt is the best one for investing. The Egyptian economy as it is now is able to create more opportunity for domestic growth of wealth and also has enormous potential over long term because of the following reasons: strong economic growth of 8. 6% in 2007, incentives and reforms given to foreign investors, low cost of living and availability of cheap labor. Since 2001, Egypt consumer price index, has registered a significant growth from 12. 68% in 2004 to 3. 6% a fact that is attributed to the rise in the value of the Egyptian Pound. The current account of Egypt has also grown from a deficit of 1. 8% of the annual gross domestic product to an estimated 6. 1% in 2007. (CIAO/EIU Partnership 2008) With the high population in Egypt, the county has a wider market of both skilled labor and unskilled labor. The ministry of education has always ensured that the courses offered in both private and public learning institutions are at par with the requirements in the job market. With the assistance of IMF and World, Egypt has embarked on a program that will see the private sector takes a big role in the county. Egyptian government entrenched Law 203, which was to speed privatization of the public sector. Currently the degree of privatization in Egypt is high (72 percent). By 2007, the government had privatized over eighty percent of the 314 public enterprises which it had earmarked for privatization. The ministry of public enterprise in Egypt predicts that by 2010, all the public enterprises that were earmarked for privatization will have been privatized. With privatization of these public enterprises, the benefits accrued to the Egypt economy is an additional savings to the country. The total gain which has so far been realized by privatization is that GDP has grown by 2. 8 %. With the growth in GDP, the country’s infrastructure has also noticed some improvement, because most of the savings that the government is making as a result of privatization is currently being used for development (Sayed et al 2007 pp12-29) The Egyptian’s road network is somehow underdeveloped. It is currently being serviced by a network of over sixty eighty thousand kilometers of both secondary and primary roads. Despite modernizations of roads in Egypt in mid 1980s, most of them are either under construction or are in poor condition. The level of congestion of automobiles has continued to rise due to the increase in the number of licensed automobiles. According to a report released by EIU (2006) country profile, Egypt reported the highest incidences of automobile fatalities in the entire world: it was 44. 8 deaths per one hundred thousand kilometers. In terms of energy Egypt has adequate supply of electricity from Egyptian Electricity Authority which produces over fifteen thousand megawatts of power. Plans are already underway for EAA to increase its power production by more than two thousands five hundred by 2010. Power consumption has reported a constant growth of 6. 1% per year. Telecommunication services are cheaper and modern. According to reports by EIU country profile for 2006/2007, Egypt had more than seven million lines. The lines are increasing at a rate of one million per year. The country has seventy nine internet providers (Economic intelligence unit country profile) Natural and Cultural factors Egypt has a diverse cultural mix which is good for investors. 80 percent of the Egyptian population is Muslims, while Christians and Hindu makes up the remaining percentage. The country observes religious practices like during the holy month of Ramadhan the country is always in a prayer mood. Egypt also has an average temperature of between 13 and 29 degree centigrade. For entry to Egypt, Visa is usually required. EU and U. S nationalities that are traveling or want to invest in Dahab, Taba, Sharm EL Shik and Hurghada are given a free visa stamp upon arriving at the airport Social and political stability Egypt is a democratic country with many political parties. The country has a semi presidential system, where power has been split between the prime minister and the president. In 2005, Egypt changed its constitution to allow for more presidential candidates to take part in the elections. The county also has a good political temperature that is favorable for investors. The country was the first Arab country to embraces political relationship with Israel. It also plays in mediating conflict between different countries in the Middle East. The political life in Egypt is good for investors. Hence U. S businessmen who are currently doing their business there or who want to start doing their business should do so. Recommendation and Conclusion From the analysis carried, the writer of this paper is of the opinion that Egypt is a good country for any American companies who are thinking of investing there or who have already invested there to continue. The writer is of the opinion that Egypt has an attractive and stable market for property investors. The country has an emerging property market in tourist destinations and it is also offering a return that is excellent on property investment. Despite the fact that foreign equity in construction industry is standing at forty nine percent Americans companies should ventures into it because of the high rate of return that this industry commands in Egypt. Reference: Abd al –Salam, Abou Khaf M & Abu Qahf (2005) Foreign direct investment in developing countries, a comprehensive analysis of the determinants, policies, organization & impacts a case study of Egypt. Buckley P (2003) the changing global context of Egypt international Trade CIAO/EIU Partnership (2007) Economic structure of Egypt retrieved from www. ciaonet. org on March 26 2009 Egypt trade summary PDF retrieved from www. ustr. gov/assets/Document_Library on March, 26 2009 Economic intelligence unit country profile 2006/2007 report retrieved from www. eiu. com/index. asp March, 26 2009 Galal A & Lawrence (1998) An Egypt US free trade Brookings Institution Press pp 23 -56 Ikram K & World Bank (1980) Egypt, Economic management during transition period – A mission report sent to Egypt by the World Bank pp 12 -42 Kaudhar- Luis F (2006) Investing in Construction Industry in Egypt Alexandra University Press pp 9 – 30 Marks S & Ken K 2001 a comparative study of foreign direct investment in Egypt Published by USAID pp 9 -14 Olarreaga M & Madani D (2002) Politically Optimal Tariffs- an application of Egypt pp 6 – 29 Sayed S, Idarat A. & Dawliyah (2007) international business in Egypt & Middle East Jordan Publisher 12 -65 Weigel D, Wagle D & Gregory W (1997) foreign direct investment World Bank Publications pp 1 -22

Thursday, October 10, 2019

HBC From Fur to Fendi Essay

1. Three competitive strategies that the company HBC used prior to its sale to Zucker and NRDC are the differentiation strategy, the growth strategy and an e-business strategy. HBC used the differentiation strategy by reinventing itself with a more fashionable image through designer depot/Style depot. HBC used the growth strategy by expansion of the corporation to strengthen its share of the market with the acquisition of other retailers such as K-Mart Canada. They also opened the HBC Rewards Program to entice costumers back to its stores. HBC also used the e-business strategy by opening their online shopping program, allowing customers to have the option to shop online instead of having to go to the store. 2. Three strategies HBC adopted since the sale would be the renewal strategy, the focus differentiation strategy and the diversification strategy. Under the NRDC leadership, The Bay’s main focus was reattracting customers. They did this by dropping over 60 percent of its previous brands and relaunching the â€Å"Room†, which was located at one of its Toronto locations. â€Å"The Room† is a VIP suite containing high end designers. HBC also used the focus differentiation strategy by becoming an official sponsor for the 2010 Olympics in Vancouver. By selling Olympic branded merchandise this allowed the Bay to be open to a whole new market. Selling Olympic merchandise allows Olympic fans to have the option to buy that merchandise at The Bay. HBC uses the diversification strategy by launching â€Å"The Room† which allowed The Bay to then sell designer merchandise to customers, which broadened their variety to a whole new market of customers. 3. The competitive strategies mentioned before can be categorized into two categories, business or corporate level strategies. The business level strategies included, the differentiation strategy and the focus differentiation strategy. The corporate strategies included the growth strategy, e-business strategy, renewal strategy, and the diversification strategy.

Wednesday, October 9, 2019

Is3440 Project Part 1 Essay

First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry – Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad. All security requirements for SOX, PCI-DSS, and GLBA can be achieved using Linux and open source infrastructure. Some examples of open source software that we might use are: Web Server – Apache Web Filtering – DansGuardian Network Firewall – Turtle Firewall VPN – Endian Firewall Community IDS/IPS – Suricata Database – MySQL File Server – Samba SMTP Server – hMailServer I would recommend that we use a â€Å"Defense in Depth† strategy, having multiple layers of access protection. We need to have an IDS/IPS on both sides of our edge firewall. The inside IDS/IPS will be used as additional protection for our network and the outside IDS/IPS will serve as an early warning system from attacks. We will also use the outside IDS/IPS for additional protection and to monitor what types of attacks are occurring. Our web server and mail server should be completely separated from the rest of our network in a de-militarized zone (DMZ). We need to have a network firewall between our DMZ and our internal network, between the outside world and our internal network, and between our DMZ and the outside world. There should also be a local firewall enabled on each local machine. Also, since our physical servers will be hosted at a third party location, we must have VPN access to these servers to manage them. All private data will need to be encrypted, as well as all data transitions. To go along with the previously mentioned physical and software based security measures, we will also apply multiple policies to maintain this security. Acceptable Use  Policy – This policy will describe how the companies IT assets should and can be used. As well as what is not acceptable to do on company assets. Password Policy – This policy will explain what parameters a password must meet to be accepted. For example; a password must be at least 15 characters long have at least on capital letter, have at least one lower case letter, have at least one number, and have at least on symbol. Privacy Policy – This policy describes what information must remain confidential. Training employees on the proper way to use (and how NOT to use) company assets is a major key to ensuring the CIA triad remains intact and our network secure. In this part of the executive summary, I am going to be explaining, and making recommendations on what the best options are for the open source software that is needed for the management of the First World Savings and Loan financial institute’s various web and application servers. F or each of the servers, I recommend using the Red Hat Enterprise Linux operating system for a number of reasons. The main ones being that it is one of the most secure, It’s backed by years of technical support, It’s supported by a vast number of different hardware, and It is one of the most, if not the most, popular and used server OSs that one can get today. I would rather go with software that has been vigorously tested to its breaking point and still remains at the top tier of server software options that’s readily available today, than one that has just come out with all of the bells and whistles. So on that note, let’s get started on what I recommend to be the best of the best in terms of specific software and service needs. There are numerous great open source software solutions for database servers, like, H2, HyperSQL, MySQL, mysql, Oracle, and PostgreSQL, just to name a few. They all offer topnotch functionality, performance, scalability, and security. As far as which one is the best, I recommend PostgreSQL. PostgreSQL is an object-relational Database softwar e solution that offers some of the most feature rich options as compared to the bigger commercial manufacturers like Oracle, IBM, Sybase and Informix, and the best part of it, it’s free. It’s also one of the first database software that was released, and it has a proven track record with over 23 years of active development. It was created back in 1989. The only other DB software that came out before it is Oracle, which was created back in 1979. Now PostgreSQL might not be the fastest, but It more than makes up for it with its functionality. It allows the use of two  different types of interfaces, a GUI (for those who like the point-click style) and a SQL. It works on most OSs like windows, Linux, Mac, Unix, etc. It has a vast array of services and tools that is included to streamline the administration of the Database. Here are just some examples; Full ACID (Atomicity, Consistency, Isolation, & Durability) compliancy, commercial & noncommercial support, triggers support, user defined data type support, stored procedure support, online backup, multiple index type input support, embedded access controls, encryption, etc. Here is a comparison of the top DB software available I got from the unbiased, data-driven comparison website; www.findthebest.com/database-management-sytems: —————— Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Specifications Product | MySQL | Oracle | PostgreSQL | Architecture | Relational Model | Relational Model | Object-relational Model | Software License | * GPL * PostgreSQL * Proprietary | * GPL * PostgreSQL * Proprietary | * GPL * PostgreSQL * Proprietary | Operating System | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | * Windows * Mac OS X * Linux * UNIX * z/OS * BSD * Symbian * AmigaOS | Demo? | | – | | Interface | * GUI * SQL | * GUI * SQL | * GUI * SQL | Website | MySQL (mysql.com) | Oracle (oracle.com) | PostgreSQL (postgresql.org) | First Public Release Year | 1995 | 1979 | 1989 | Lastest Stable Version | 5.5.19 | 11g Release 2 | 9.1.3 | ————————————————- -Price Price | $0 | $180 | $0 | Purchase Page | MySQL (https) | Oracle (https) | – | ————————————————- -General Features Features | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | * ACID * Backup * Custom Functions * Database Imports * Export Data * Extensibility * High Availability * Highly Scalable * Import Data * Java Support * Multi-Core Support * See more†º | Indexes | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | * Bitmap * Expression * Full-text * GIN * GiST * Hash * Partial * R-/R+ Tree * Reverse | Database Capabilities | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | * Blobs and Clobs * Common Table Expressions * Except * Inner Joins * Inner Selects * Intersect * Merge Joins * Outer Joins * Parallel Query * Union * Windowing Functions | Partitioning | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | * Composite (Range + Hash) * Hash * List * Native Replication API * Range * Shadow | Access Control | * Audit * Brute-force Protection * Enterprise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | * Audit * Brute-force Protection * Enterprise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | * Audit * Brute-force Protection * Enterpr ise Directory Compatibility * Native Network Encryption * Password Complexity Rules * Patch Access * Resource Limit * Run Unprivileged * Security Certification | Tables and Views | * Materialized Views * Temporary Table | * Materialized Views * Temporary Table | * Materialized Views * Temporary Table | Other Objects | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | * Cursor * Data Domain * External Routine * Function * Procedure * Trigger | Support Features | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | * Email * FAQ * Forums * Live chat * Mailing List * On-site * Phone * Tips and hints * White papers | ————————————————- -Product Description Product Description | MySQL is a relational database management system (RDBMS) that runs as a server providing multi-user access to a number of databases. MySQL is officially pronounced /maÉ ªÃ‹Å'É›skjuË Ã‹Ë†Ã‰â€ºl/ (â€Å"My S-Q-L†), but is often also pronounced /maÉ ªÃ‹Ë†siË kwÉ™l/ (â€Å"My Sequel†). It is named for original developer Michael Widenius’s daughter My. | Oracle Database 11g Release 2 provides the foundation for IT to successfully deliver more information with higher quality of service, reduce the risk of change within IT, and make more efficient use of their IT budgets. By deploying Oracle Database 11g Release 2 as their data management foundation, organizations can utilize the full power of the world’s leading database to:ï‚ · Reduce server costs by a factor of 5ï‚ · Reduce storage requirements by a factor of 12ï‚ · Improve mission critical systems performance by a factor of 10ï‚ · Increase DBA productivity by a fa ctor of 2ï‚ · Eliminate idle redundancy in the data center, andï‚ · Simplify their overall IT software portfolio. | PostgreSQL is a powerful, open source object-relational database system. It has more than 15 years of active development and a proven architecture that has earned it a strong reputation for reliability, data integrity, and correctness. It runs on all major operating systems, including Linux, UNIX (AIX, BSD, HP-UX, SGI IRIX, Mac OS X, Solaris, Tru64), and Windows. It is fully ACID compliant, has full support for foreign keys, joins, views, triggers, and stored procedures (in multiple languages). It includes most SQL:2008 data types, including INTEGER, NUMERIC, BOOLEAN, CHAR, VARCHAR, DATE, INTERVAL, and TIMESTAMP. It also supports storage of binary large objects, including pictures, sounds, or video. It has native programming interfaces for C/C++, Java, .Net, Perl, Python, Ruby, Tcl, ODBC, among others, and exceptional documentation. | ———â₠¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- -Contact Information Contact Link | MySQL (mysql.com) | Oracle (oracle.com) | PostgreSQL (postgresql.org) | Phone | 1 (866) 221-0634 | 1 (800) 392-2999 | – | ————————————————- -Limits Max Blob/Clob Size | 4 GB | Unlimited | 1 GB (text, bytea) – stored inline or 2 GB (stored in pg_largeobject) | Max CHAR Size | 64 KB (text) | 4000 B | 1 GB | Max Column Name Size | 64 | 30 | 63 | Max Columns per Row | 4096 | 1000 | 250-1600 depending on type | Max DATE Value | 9999 | 9999 | 5874897 | Max DB Size | Unlimited | Unlimited | Unlimited | Max NUMBER Size | 64 bits | 126 bits | Unlimited | Max Row Size | 64 KB | 8KB | 1.6 TB | Max Table Size | MyISAM storage limits: 256TB; Innodb storage limits: 64TB | 4 GB | 32 TB | Min DATE Value | 1000 | -4712 | -4713 | ————————————————- -Data Types Type System | * Dynamic * Static | * Dynamic * Static | * Dynamic * Static | Integer | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | * BIGINT (64-bit) * INTEGER (32-bit) * MEDIUMINT (24-bit) * NUMBER * SMALLINT * SMALLINT (16-bit) * TINYINT (8-bit) | Floating Point | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | * BINARY_DOUBLE * BINARY_FLOAT * DOUBLE (64-bit) * DOUBLE PRECISION * FLOAT * REAL | Decimal | * DECIMAL * NUMERIC | * DECIMAL * NUMERIC | * DECIMAL * NUMERIC | String | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | * CHAR * NCHAR * NVARCHAR * TEXT * VARCHAR | Binary | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLO B * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLOB * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | * BFILE * BINARY * BINARY LARGE OBJECT * BYTEA * LONGBLOB * LONGRAW * MEDIUMBLOB * RAW * TINYBLOB * VARBINARY | Date/Time | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | * DATE * DATETIME * TIME * TIMESTAMP * YEAR | Boolean | * BOOLEAN * Unknown | * BOOLEAN * Unknown | * BOOLEAN * Unknown | Other | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | * ARRAYS * AUDIO * BIT * CIDR * CIRCLE * DICOM * ENUM * GIS data types * IMAGE * INET * MACCADDR * See more†º | I think it’s pretty obvious that the data speaks for itself. You can’t get any better option unless you want to pay big money for these specific services. When it comes to deciding on which open source web server software to utilize, there are a lot of different options, such as, Apache, LightTPD, NGiNX, Boa, Cherokee, etc. The one that stands out the most is Apache. Apache is the most popular web server to date. It is the leading web server that is used most over all others including open source and non-open source options, such as, Microsoft’s IIS, Google’s proprietary custom servers, NGiNX, AOL, IBM, etc. according to the website www.makeuseof.com. Here is a graph table I found (it’s a little dated) to give you an idea: Apache is the leader because of its functionality, performance, price (it’s free), stability, and security. It has top notch cross-plat forming capabilities so it can be used on numerous operating systems like, Microsoft’s Windows platform, Linux and UNIX based platforms, Macintosh platforms, BSD platforms, IBM platforms, HP platforms, etc. It can basically run on just about all OS platforms. This is ideal in today’s ever evolving business needs and requirements. Some of the best features that an Apache web server offers are as follows: Basic access authentication & digest access authentication, SSL/TLS HTTPS, virtual hosting, CGI, FCGI, SCGI, Java, SSI, ISAPI, runs in user space versus kernel space, Administration console, and IPv4 & IPv6 addressing. Now these are just some of the feature sets that Apache uses. It helps that most, if not all, of these features are security based; which is most important when dealing with IT in any aspect of today’s business world and society itself. There are a lot of different options when it comes to file servers. Some examples are, FileZilla, Samba,  HFS, TurnKey, Cerberus, VSFTPD, etc. As far as what’s the best file server software options it boils down to the company’s needs. I recommend using Samba or FileZilla for a number of reasons. Samba has over 20 years of development and FileZilla has over 10 years of development, They both offer amazing cross-plat forming capabilities on several different operating systems, They are both pretty easy to setup and administer, they both offer great security, and best of all they are free. This is extremely important for a modern business. Also the fact that they are free helps in cutting down company costs and drives up financial gains throughout the entire company. Plus, Samba speaks natively with Microsoft Windows machines and these are typically what most end users use for their operating systems. Now for the open source SMTP server software I recommend using iRedMail. iRedMail offers two different options, iRedMail (which is free) & iRedMailPro (which is a paid version for $299 per server per year) with amazing fully fledged features. The feature include: blazing fast deployment (less than 1 minute), easy to use, security and stability, mind-blowing productivity (uses a very little resources to run), top notch support, absolute control over data (all personal data is stored on company’s hard disk versus some third party storage medium), supports virtualization and non-virtualization software (VMware, Xen, VirtualBox, KVM, OpenVZ, etc. with i386 and x86/x64/ amd64 compatibility), low maintenance, unlimited accounts, stores mail in openLDAP, MySQL, and PostgreSQL, Service and access restrictions, throttling, Anti-Spam & Anti-Virus by de fault, Webmail, backup support, and security (forced password change policy for every 90 days, uses SSL/TLS connections for sending and receiving mail, etc.). The support offered for iRedMail is among the best and in the business world, this is a must. The LDAP server I recommend is Red Hat Directory Server because it offers some of the best features to date. It’s also has some of the best support in the business. It has an amazing reputation as well. Here is a list of the features that it offers: cost-savings, tremendous scalability (Allows 4-way multimaster replication of data across the entire enterprise while providing centralized, consistent data, and allows extranet applications), enhanced security (provides centralized, fine-grained access controls, and utilizes strong certificate-based authentication & encryption.), and amazing productivity (centralizes user identity and  applications for ease of access for administration), you can’t go wrong with using softw are from a nationally known and reputable company like Red Hat Linux. Each user will be put into groups; this will be done to control access to the file system. Each user on the network will have to meet the standards below. Having each user in groups will help manage them, and what they have access and are allowed to do on the server. Each user will have their own partitioned /home directory to reduce impact of the file system. No user should be without a group, any users without groups will only have access to only their home directory. The following is the password policy they will be using: User account Standard users: Restrict reuse of passwords to once per 18 months Set min day for password expire Set max day for password expire every 30 days Set password complexity to require 1 capital letter, 1 lower case letter, 1 number, 1 symbol and must be at least 15 characters long Enforce password policies Ensure all users do not have access to sudo, or su rights  Create groups for all users, and give them allow sups or admins to maintain rights to those groups, and allow them specific path use on sudo (only if needed). This will allow users to access the data they need to complete their jobs. Also with this password system in place, it will ensure they do not use simple passwords or recycle passwords too often. Super users: Rights to manage groups Specific path use of sudo Restrict reuse of passwords Set min day for password expire Set max day for password expire Set password complexity Enforce password policies These will help super users to manage groups and have access to the tools that they need. This also prevents the users from having too much access to the systems. This helps the admin manage groups by allowing them to move users into the correct group or give them access to specific files that they may need access to. Su will only be used by top level admins, and only if something is truly not working. Lower level admins will have sudo access to files they need to have access to. Users will only have read/write access to the files they need access to; the rest will be read only access. Kernel will be locked down and will need admin permission to access. Passwd file will not be accessible by anyone other than top level admins Firewall and iptables will only be accessible by top level admins and super users. Configuring our network in this manner and applying these user access control permissions will cost less money and add a greater level of security. Using this â€Å"Defense in Depth† strategy, we will have multiple layers of security that an attacker will have to penetrate to break the CIA triad.