Thursday, November 28, 2019

M11Cde Skills-Based Assessment Essay Example

M11Cde Skills-Based Assessment Essay School of Engineering Computing Department of Computing Internet Information Security (M11CDE) Layered Security Student Name: BUSA ABANG OBI SID:4560229 I certify that this is my own work yes/no and that I have read and understand the University Assessment regulations. Signature: [pic] Submission Details The details below indicate what you should submit, when you should submit it and where is should be submitted to. Submission Date and Method Deadline 11 January 2013 11:50pm online submission. Submission Format: 1. Fill the online quiz for the practical test which will be available one week before the final fixed deadline. . Download an electronic copy of this document and where there are blanks or spaces to complete addressing information etc. , please include them in the document. You submission should include the answers in the document, but do not change the document in any other way! If the document has been modified other than to include the required information your submissio n will be null and void. 3. Your files should be name as â€Å"SID_FIRSTNAME_SURNAME. doc†. E. g. 100292_FIRSTNAME_SURNAME. doc. 4. Save the configurations from all your network devices and embed them into the end of this document. 5. If you have attempted to configure VLANs, please also include a switch configuration from any one of your LAN switches. Please note that this must be a switch that you have actually configured VLANs on. 6. If you have implemented the network in Packet Tracer, you may consider submitting a copy of that as well but this is not compulsory. Zero Tolerance for late submission: If your work is late it will have to be marked zero according to new university policy. Please ensure you upload your work well before the deadline. You will be able to delete and update your work before the deadline. Plagiarism Note: We will write a custom essay sample on M11Cde Skills-Based Assessment specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on M11Cde Skills-Based Assessment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on M11Cde Skills-Based Assessment specifically for you FOR ONLY $16.38 $13.9/page Hire Writer As with all assessed work, both the research and written submission should be your own work. When submitting this work you are explicitly indicating that you have read the rules on plagiarism as defined in the University regulations and that all work is in fact your own, except where explicitly referenced using the accepted referencing style. Feedback and marking: The practical work will be marked by using the questions set in the online quiz and number of questions for each section will depend on the weightings set in the below sections. Feedbacks and marks will be provided once the online practical quiz is submitted. Network topology [Whilst the topology shows only two hosts on each LAN, you should configure four hosts on each LAN. ] Network Information The WAN IP network address between Dundee and Glasgow is 209. 154. 17. 0 with a subnet mask of 255. 255. 255. 0. The WAN IP network address between Edinburgh and Glasgow is 209. 154. 16. 0 with a subnet mask of 255. 255. 255. 0. This is clearly shown on the network topology. Dundee information The LAN for Dundee has been assigned an IP network address of 192. 168. 6. 0 Each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 40. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Dundee |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 6th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. The table below shows how the 6th usable network can be identified. |Network |Network ID |First Host |Last Host |Broadcast |Mask | |0 |192. 168. 6. 0 |192. 168. 6. 1 |192. 168. 6. 14 |192. 168. 6. 15 |/28 | |1 |192. 168. 6. 16 |192. 168. 6. 17 |192. 168. 6. 30 |192. 168. 6. 31 |/28 | |2 |192. 168. 6. 2 |192. 168. 6. 33 |192. 168. 6. 46 |192. 168. 6. 47 |/28 | |3 |192. 168. 6. 48 |192. 168. 6. 49 |192. 168. 6. 62 |192. 168. 6. 63 |/28 | |4 |192. 168. 6. 64 |192. 168. 6. 65 |192. 168. 6. 78 |192. 168. 6. 79 |/28 | |5 |192. 168. 6. 80 |192. 168. 6. 81 |192. 168. 6. 94 |192. 168. 6. 95 |/28 | |6 |192. 168. 6. 6 |192. 168. 6. 97 |192. 168. 6. 110 |192. 168. 6. 111 |/28 | |7 |192. 168. 6. 112 |192. 168. 6. 113 |192. 168. 6. 126 |192. 168. 6. 127 |/28 | You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. Edinburgh information The LAN for Edinburgh has been assigned an IP network address of 192. 168. 5. 0 Again, each subnet of the above network needs to accommodate 14 host addresses. The subnet mask will be 255. 255. 255. 240. This is worked out by borrowing 4 bits from the final octet and is shown in the table below. Table 1 Custom Subnet Mask for Edinburgh |255 |255 |255 |240 | |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 |128 64 32 16 8 4 2 1 | |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 1 1 1 1 |1 1 1 1 0 0 0 0 | Use the 4th usable subnet for the LAN. Do not use subnet zero as the first usable subnet. You must follow the example for Dundee to complete the table for step 1 planning. You should be able to identify the pattern (or magic number from the subnet mask). If it is not immediately apparent subtract the last non-zero octet from 256. The elements of the coursework are: 1. Planning and assigning addresses [30 marks] 2. Basic configuration [40 marks] 3. Security ACLs [10 marks] 4. Security VLANs [20 marks] The basic theme is that Glasgow (GLA) is regional headquarters of the company. Edinburgh and Dundee are branch offices. Each network associate (student) will be responsible for an entire network. This means that using either the lab equipment in EC1-13 or Packet Tracer, you will configure 3 routers, 2 switches and 8 PCs. A network address and specific number of hosts per subnet has been assigned for the local LAN on each network (Edinburgh and Dundee). From the information provided, the subnet address, the subnet mask, the first and last usable addresses and the broadcast address for each site LAN need to be determined. (When using the router or Packet Tracer it is expected that you keep a copy of your router configuration at each stage, just in case you run into problems). Step 1 Planning Using the chart below, plan the first ten usable subnets of the LAN address assigned to Edinburgh. You have been given the first 6 addresses for Dundee, you are now expected to plan for the first 10 addresses for Edinburgh. Subnet |Subnet |Subnet |First Host |Last Host |Broadcast | | |Address |Mask (/x) | | | | |0 |192. 168. 5. 0 |28 |192. 168. 5. 1 |192. 168. 5. 14 |192. 168. 5. 5 | |1 |192. 168. 5. 16 |28 |192. 168. 5. 17 |192. 168. 5. 30 |192. 168. 5. 31 | |2 |192. 168. 5. 32 |28 |192. 168. 5. 33 |192. 168. 5. 46 |192. 168. 5. 47 | |3 |192. 168. 5. 48 |28 |192. 168. 5. 49 |192. 168. 5. 2 |192. 168. 5. 63 | |4 |192. 168. 5. 64 |28 |192. 168. 5. 65 |192. 168. 5. 78 |192. 168. 5. 79 | |5 |192. 168. 5. 80 |28 |192. 168. 5. 81 |192. 168. 5. 94 |192. 168. 5. 95 | |6 |192. 168. 5. 96 |28 |192. 168. 5. 97 |192. 68. 5. 110 |192. 168. 5. 111 | |7 |192. 168. 5. 112 |28 |192. 168. 5. 113 |192. 168. 5. 126 |192. 168. 5. 127 | |8 |192. 168. 5. 128 |28 |192. 168. 5. 129 |192. 168. 5. 142 |192. 168. 5. 143 | |9 |192. 168. 5. 144 |28 |192. 68. 5. 145 |192. 168. 5. 152 |192. 168. 5. 159 | |10 |192. 168. 5. 160 |28 |192. 168. 5. 161 |192. 168. 5. 174 |192. 168. 5. 175 | For the WAN links for DUN and EDN the lowest usable address on the networks must be used. Identify and use the lowest usable WAN address for your S0 interface assigned to you for the two networks shown: 1 Dundee:209. 154. 17. 1 Edinburgh:209. 154. 16. 1 For security reasons, all of the production workstations will be assigned the lower-half of the IP addresses of the assigned subnet. All of the network devices and management stations will be assigned the upper-half of the IP address numbers of the subnet assigned for the LAN. From this upper half range of addresses, the Ethernet router interface (the default gateway on each LAN) is to be assigned the highest usable address. Identify the required IP address of the Ethernet interface on your two routers. Address of your Ethernet interface on Dundee : 192. 168. 6. 10 Address of your Ethernet interface on Edinburgh : 192. 168. 5. 78 The host (PC) configurations must also be planned. Using the table, complete the host information. |Branch: DUN |IP Address Range | |Production Host Range |192. 168. 6. 97192. 168. 6. 103 | |(Lower half) | | |Management Host Range |192. 168. 6. 104192. 168. 6. 10 | |(Upper half) | | [5 marks for ranges of addresses] Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 6. 97 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 6. 110 Management Host (1) IP Address192. 168. 6. 104 Subnet Mask255. 255. 255. 240 Default Gateway192. 1 68. 6. 110 |Branch: EDN |IP Address Range | |Production Host Range |192. 68. 5. 65192. 168. 5. 71 | |(Lower half) | | |Management Host Range |192. 168. 5. 72192. 168. 5. 78 | |(Upper half) | | Supply addresses for a production and management host. Production Host (1) IP Address192. 168. 5. 65 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Management Host (1) IP Address192. 168. 5. 72 Subnet Mask255. 255. 255. 240 Default Gateway192. 168. 5. 78 Step 2 Basic Configuration Apply a basic configuration to the router. This configuration should include all the normal configuration items. You must supply one router configuration file. This will be either Dundee or Edinburgh. The router configuration files will be marked as follows: Basic Configuration †¢ Router name †¢ Console and VTY configuration and passwords (use ‘cisco’, ‘class’ and ‘berril’ for console, secret and VTY passwords respectively) †¢ Interface configurations DTE/DCE identified appropriately and clockrates set only on DCE †¢ Routing correct and working (RIP is fine) †¢ Host tables †¢ Banner display before login – warn of unauthorised access Basic Configuration (40 marks) Security (ACLS Marked as part of step 3) 1. ACLs correct and applied to correct interface in correct direction [10] 2. ACLs correct but not applied to correct interface or direction [7 9] 3. ACLs attempted but some errors or wrong placement [4 6] 4. ACLs attempted but incorrect and not applied properly [1- 3] 5. ACLs not attempted [0] ACL Total (Total 10 marks) Step 3 Security There are several security concerns in the Internetwork. Develop Access Control Lists (ACLs) to address security issues. The following problems must be addressed: 1. The production hosts in both the Edinburgh and Dundee networks are permitted HTTP access to the 172. 16. 0. 0 network, management hosts are permitted no access to this network. 2. The company has discovered an Internet Web server at 198. 145. 7. 1 that is known to contain viruses. All hosts are banned from reaching this site. The ACLs are worth 10 marks. Step 4 VLANs This step is the final 20% of the coursework mark. To achieve this step you should consider how you might use a VLAN to separate the production and management LANs. The goal is that neither network should be able to see the other network traffic. There is no additional guidance on this part of the skills test as you are expected to identify: 1. An appropriate VLAN number to use for each VLAN. 2. An appropriate VLAN configuration. 3. Implement the VLAN and provide the switch configuration file(s) to show that the VLAN has been implemented. VLAN Marks The VLAN component will be marked as follows: VLAN configured and correct configuration supplied [20] †¢ VLAN identified but configuration incomplete or incorrect [10 – 15] †¢ VLAN attempted [5 – 10 depending on level of attempt] †¢ VLAN not attempted [0] VLAN (Total 20 marks) Appendix Network device configurations†¦Ã¢â‚¬ ¦ [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] Press RETURN to get st arted! Routerenable Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# Router(config)#hostname EDINBURGH EDINBURGH(config)#line console 0 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#line vty 0 4 EDINBURGH(config-line)#password cisco EDINBURGH(config-line)#login EDINBURGH(config-line)#exit EDINBURGH(config)#enable password cisco EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHen Password: EDINBURGH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#enable secret class EDINBURGH(config)#exit EDINBURGH# SYS-5-CONFIG_I: Configured from console by console [pic] [pic] EDINBURGH#configure terminal Enter configuration commands, one per line. End with CNTL/Z. EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip address 209. 154. 16. 1 255. 255. 255. 0 EDINBURGH(config-if)#no shutdown %LINK-5-CHANGED: Interface Serial2/0, changed state to up EDINBURGH(config-if)#exit %LINEPROTO-5-UPDOWN: Line protocol on Interface Seri al2/0, changed state to up EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip address 192. 168. 5. 78 255. 255. 255. 240 EDINBURGH(config-if)#no shutdown LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up EDINBURGH(config-if)#exit EDINBURGH(config)#router rip EDINBURGH(config-router)#network 172. 16. 0. 0 EDINBURGH(config-router)#network 192. 168. 6. 0 EDINBURGH(config-router)#network 192. 168. 5. 0 EDINBURGH(config-router)#network 209. 154. 16. 0 EDINBURGH(config-router)#network 209. 154. 17. 0 EDINBURGH(config-router)#exit EDINBURGH(config)# banner motd #warn of unauthorised access# EDINBURGH(config)# banner login #do not enter if you are not authorized# EDINBURGH(config)#ip host DUN 209. 54. 17. 1 192. 168. 6. 110 EDINBURGH(config)#ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration [OK] EDINBURGH# EDINBURGHshow host Default Domain is not set Name/address lookup uses domain service Name servers are 255. 255. 255. 255 Codes: UN unknown, EX expired, OK OK, revalidate temp temporary, perm permanent NA Not Applicable None Not defined Host Port Flags Age Type Address(es) DUN None (perm, OK) 0 IP 192. 168. 6. 110 209. 154. 17. 1 GLA None (perm, OK) 0 IP 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 EDINBURGH [pic] [pic] [pic] EDINBURGH#show r Building configuration Current configuration : 1291 bytes ! version 12. 2 no service timestamps log datetime msec no service timestamps debug datetime msec o service password-encryption ! hostname EDINBURGH ! ! ! enable secret 5 $1$mERr$9cTjUIEqNGurQiFU. ZeCi1 enable password cisco ! ! ! ! ! ! ! ! ip host DUN 192. 168. 6. 110 209. 154. 17. 1 ip host GLA 172. 16. 1. 254 209. 154. 16. 2 209. 154. 17. 2 ! ! ! ! ! ! interface FastEthernet0/0 ip address 192. 168. 5. 78 255. 255. 255. 240 ip access-group 100 in duplex auto speed auto ! interface FastEthernet1/0 no ip address duplex auto speed auto shutdown ! interface Serial2/0 ip address 209. 154. 16. 1 255. 255. 255. 0 ip access-group 10 out ! interface Serial3/0 no ip address shutdown ! interface FastEthernet4/0 o ip address sh utdown ! interface FastEthernet5/0 no ip address shutdown ! router rip network 172. 16. 0. 0 network 192. 168. 5. 0 network 192. 168. 6. 0 network 209. 154. 16. 0 network 209. 154. 17. 0 ! ip classless ! ! access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www access-list 100 permit ip any any access-list 10 permit any access-list 10 deny host 198. 145. 7. 1 ! ! ! no cdp run ! banner login ^Cdo not enter if you are not authorized^C banner motd ^Cwarn of unauthorised access^C ! ! ! ! line con 0 password cisco login line vty 0 4 password cisco login ! ! ! end EDINBURGH# EDINBURGH#show access-lists configuration EDINBURGH(config)#access-list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq 80 EDINBURGH(config)#access-list 100 permit ip any any EDINBURGH(config)#interface fastethernet0/0 EDINBURGH(config-if)#ip access-group 100 in EDINBURGH(config-if)#exit EDINBURGH(config)#access-list 10 permit any EDINBURGH(config)#access-list 10 deny host 198. 145. 7. 1 EDINBURGH(config)#interface serial2/0 EDINBURGH(config-if)#ip access-group 10 out EDINBURGH(config-if)#exit EDINBURGH(config)#exit EDINBURGH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGH#copy running-config startup-config Destination filename [startup-config]? Building configuration [OK] EDINBURGH# [pic] EDINBURGH#show access-lists Extended IP access list 100 deny tcp 192. 168. 5. 72 0. 0. 0. 7 172. 16. 0. 0 0. 0. 255. 255 eq www permit ip any any Standard IP access list 10 permit any deny host 198. 145. 7. 1 EDINBURGH# [pic] EDINBURGHSWITCH CONFIGURATION Switchen Switch#config t Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#hostname EDINBURGHSWITCH EDINBURGHSWITCH(config)#line console 0 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#line vty 0 4 EDINBURGHSWITCH(config-line)#password cisco EDINBURGHSWITCH(config-line)#login EDINBURGHSWITCH(config-line)#exit EDINBURGHSWITCH(config)#enable password cisco EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#enable secret class EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH# EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface vlan1 EDINBURGHSWITCH(config-if)#ip address 192. 168. 5. 77 255. 255. 255. 240 EDINBURGHSWITCH(config-if)#no shutdown %LINK-5-CHANGED: Interface Vlan1, changed state to up %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up EDINBURGHSWITCH(config-if)#ip default-gateway 192. 168. 5. 78 EDINBURGHSWITCH(config)#exit EDINBURGHSWITCH# %SYS-5-CONFIG_I: Configured from console by console EDINBURGHSWITCH#copy running-config startup-config Destination filename [startup-config]? Building configuration [OK] EDINBURGHSWITCH# EDINBURGHSWITCH#vlan database % Warning: It is recommended to configure VLAN from config mode, as VLAN database mode is being deprecated. Please consult user documentation for configuring VTP/VLAN in config mode. EDINBURGHSWITCH(vlan)#vlan 10 name production VLAN 10 modified: Name: production EDINBURGHSWITCH(vlan)#vlan 20 name management VLAN 20 added: Name: management EDINBURGHSWITCH(vlan)#exit APPLY completed. EDINBURGHSWITCH#config t Enter configuration commands, one per line. End with CNTL/Z. EDINBURGHSWITCH(config)#interface fastethernet0/2 EDINBURGHSWITCH(config-if)#switchport mode access EDINBURGHSWITCH(config-if)#switchport access vlan 10 EDINBURGHSWITCH(config-if)

Monday, November 25, 2019

Women and Labor in Early America

Women and Labor in Early America Working in the Home From the late colonial period through the American Revolution, womens work usually centered on the home, but romanticizing this role as the Domestic Sphere came in the early 19th century. During much of the colonial period, the birth rate was high: soon after the time of the American Revolution it was still about seven children per mother. In early America among the colonists, the work of a wife was often alongside her husband, running a household, farm or plantation. Cooking for the household took a major part of a womans time. Making garments - spinning yarn, weaving cloth, sewing and mending clothes - also took much time. Slaves and Servants Other women worked as servants or were enslaved.  Some European women came as indentured servants, required so serve for a certain amount of time before having independence.  Women who were enslaved, captured from Africa or born to slave mothers, often did the same work that the men did, in the home or in the field. Some work was skilled labor, but much was unskilled field labor or in the household. Early in colonial history, Native Americans were also sometimes enslaved. Division of Labor by Gender In the typical white home in 18th century America, most of which were engaged in agriculture, the men were responsible for agricultural labor and the women for domestic chores, including cooking, cleaning, spinning yarn, weaving and sewing cloth, care of the animals that lived near the house, care of the gardens, in addition to their work caring for the children. Women participated in mens work at times. At harvest time, it was not unusual for women to also work in the fields. When husbands were away on long journeys, the wives usually took over the farm management. Women Outside Marriage Unmarried women, or divorced women without property, might work in another household, helping out with household chores of the wife or substituting for the wife if there was not one in the family. (Widows and widowers tended to remarry very quickly, though.)  Some unmarried or widowed women ran schools or taught in them, or worked as governesses for other families. Women in the Cities In cities, where families owned shops or worked in trades, the women often took care of domestic chores including raising children, preparing food, cleaning, taking care of small animals and house gardens, and preparing clothing. They also often worked alongside their husbands, assisting with some tasks in the shop or business, or taking care of customers. Women could not keep their own wages, so many of the records that might tell us more about womens work just dont exist. Many women, especially but not only widows, owned businesses. Women worked as apothecaries, barbers, blacksmiths, sextons, printers, tavern keepers and midwives. During the Revolution During the American Revolution, many women in colonial families participated in boycotting British goods, which meant more home manufacture to replace those items.  When men were at war, the women and children had to do the chores that would usually have been done by the men. After the Revolution After the Revolution and into the early 19th century, higher expectations for educating the children fell, often, to the mother. Widows and the wives of men off to war or traveling on business often ran large farms and plantations pretty much as the sole managers. Beginnings of Industrialization In the 1840s and 1850s, as the Industrial Revolution and factory labor took hold in the United States, more women went to work outside the home. By 1840, ten percent of women held jobs outside the household; ten years later, this had risen to fifteen percent. Factory owners hired women and children when they could, because they could pay lower wages to women and children than to men. For some tasks, like sewing, women were preferred because they had training and experience, and the jobs were womens work. The sewing machine was not introduced into the factory system until the 1830s; before that, sewing was done by hand. Factory work by women led to some of the first labor union organizing involving women workers, including when the Lowell girls organized (workers in the Lowell mills).

Thursday, November 21, 2019

Detail the severity of unemployment in the United States, the Research Paper

Detail the severity of unemployment in the United States, the Administration's response, and one major economic objection to the - Research Paper Example The unemployment statistics have never been as poor as they are today, at least not in decades. In fact, there is a possibility that is far worse than we have been led to believe. The United States unemployment issues is a huge topic be tossed back and forth, by both candidates, in the presidential election. In order to understand the overall unemployment issue it is necessary to grasp what does â€Å"unemployment† actually mean to the government? What do the statistics truly reveal about the current unemployment crisis and what has the current administration done to improve or prevent it? Generally speaking one would define â€Å"unemployment† as anyone who is not employed. It seems rather self explanatory, and yet the government has a different way of perceiving the concept, as well as, a number of categorizations that make up the statistics. In the eyes of the government an unemployed person is someone who is able to work and has been seeking work within the given mo nth. All of these individuals, 16 years of age and older, will fall into this category and therefore become part the current statistical assessment. It is upon these people that we receive the current, official unemployment rate. That rate, as of August 2012, is stated to be 8.1 percent.("Labor force statistics," 2012) The problem with this percentage is the restrictions on whom they are judging their assessments. They do not include the long-time unemployed who, due the nature of the job market, have given up the search for the, nearly, impossible. They do not include, previously, stay at home mothers or fathers that have, due to the economic crisis, found it necessary to find work but are unable to do so. For this reason, there are many Americans whose unemployment is not being immediately reflected in the above percentage. The government, also, has specific groupings to justify the different categories within unemployment. Natural unemployment reflects literally, the natural acce ptance and level of unemployment which is typical. Frictional unemployment allows for those employees that become unemployed intentionally, transitionally, but have yet to find new employment. Structural unemployment is when the skills of job seekers are not the skills employers are needing. Cyclical unemployment, is not considered a direct part of natural unemployment, it occurs with the success and failures within the business industry. Seasonal employees and â€Å"classically† unemployed are, also, included is separate categories. The Bureau of Labor Statistics assures that all people, in all forms of unemployment are ultimately assessed, but are statistically not included in the official unemployment rate. The unfortunate problem with this system is that it is not providing the overall data all together; if it did then the United States at this moment is closer to 25 percent, â€Å"†¦the same as during the Great Depression.†( Amadeo, 2012) According to the Bur eau of Labor Statistics unemployment was at the lowest it had been in many year in 2007, and the a sudden rise, followed by a continual rise over the last four years, until a sudden, subtle drop in the present year; as seen in the chart below-right.(â€Å"Labor force statistics,† 2012) In comparison to other countries it has been It is shocking. In 2002 the United States has the lowest unemployment rate worldwide. By 2010 we were the highest, as seen in the chart above-right, higher than the United Kingdom, Japan and Italy.(Ydstie, 2012) There

Wednesday, November 20, 2019

How is capability deprivation a more powerful approach for finding Essay

How is capability deprivation a more powerful approach for finding ways to fight poverty than a focus on raising the incomes of - Essay Example The realities faced by the poor people can be termed as dissimilar, multifaceted and dynamic; an aspect that leads to the analysts and researchers looking for explanations and solutions to the problem of unemployment. This paper shall address the issue of unemployment by arguing from the point that, poverty can be easily eliminated by applying the capability restitution mechanism as opposed to raising the income of the poor. The view of poverty in terms of capability perspective is one that is multi-dimensional as seen in the work of Sen (1). In the work, the author continues to argue that since poverty can be analyzed from the perspective of an individual’s lack of the basic items, income is one of the main items that would allow the same individual access their basic wants (2). This is to mean that, insufficient or lack of capital is a major determining factor of the ability of an individual to reassure their daily life. This interprets the reason why some families and perso ns are more economically able as contrasted to others. Therefore, in this case, the incapability of an individual to access the income that would be helpful in reducing poverty is useful in coming up with policies useful for dealing with poverty. It is at this juncture that Sen insists that; it would not be possible to give all these persons the necessary amount of money to maintain their livelihoods (2). Sen poses a question on whether it would be probable to fund a sick or a disabled person with sufficient funds to protract their livelihoods (2). In this case, it would be more sensible and practical to allow these individuals to obtain the skills of accessing income as opposed to giving them the funds. Though Sen is cautious of the fact that it would not be undemanding for persons with special needs and the sick to work equally the same as the ordinary persons, giving them an opportunity to acquire the right skills to work is the best solution in assuaging poverty (2). Capability restitution method is yet another more potent approach in alleviating poverty as the approach deals with issues of handling poverty. Poverty that is realistic, as indicated by Sen, does not revolve around the income liberty, but the main concern is a consideration of the mechanisms that bring out the poor persons from their misery (2). A cited example is that of the elderly members of the society, and other groups that are sinking in misery (1). In this case, apportioning a certain amount of money in an endeavor to fight poverty would result to the same persons being reliant on the fact that, with or with no jobs, they have an amount of money set aside for their use. It is warranted, from this argument, to argue that these persons have undeniably been reduced to slaves of their own desolation, as they have no capability to secure a job, and earn a considerable amount of money that would be helpful for their personal development. Sen gives a case in point whereby a family is allocate d funds as a means of alleviating poverty (2). In the event that the boy-child is given priority over the girl due to their gender difference, as seen in Asia and parts of North Africa, then a new division of poor persons will automatically emerge. In terms of capability deprivation, this means that girls are not given a chance to exercise their full potential as they are neglected in terms of access to healthcare, income amongst others (Sen 1). In the long run, the

Monday, November 18, 2019

Buddism Essay Example | Topics and Well Written Essays - 1500 words

Buddism - Essay Example The quest of a Prince, confined to the four walls of the Palace, to know the truth in life, gave to the world the great philosophy and world religion or way of life known as BUDDHISM. It is based on the teachings of Siddhartha Gautama, who is known as the Buddha, or the Enlightened One. Siddhartha Gautama, the great warrior Prince, was born around 566 BC in Lumbini (formerly in North India). Even when he was an infant a seer predicted that Siddhartha would become either a great King or an ‘enlightened one’. The king, fearful of losing his son and heir to the kingdom, confined him to the Palace. During his three attempts to encounter with the realities that lay outside the walls of the Palace, Prince Siddhartha saw a sick man, an old woman and a decaying corpse and a wandering holy man. This created unrest within him and he realized that there is something beyond the human life, beyond the physical existence. He realized that all men have to undergo all these four stages and not just in one life but life after life. While the Palace was sleeping, one night he escaped leaving his wife and child, and the luxuries of the Palace, in search of the truth. This was the first step towards attaining ‘bodha’. In search of the truth Siddhartha travelled across the country, from one saint to the other. At each step he did release one layer of negativity from within but was still not able to attain the truth. He realized that neither a the life penance and ascetic practices nor a life full of luxuries could reach him there. He discovered what is now called the ‘middle path’ to attain enlightenment. He remembered a moment in childhood in which he had been watching his father start the seasons plowing, and he had fallen into a naturally concentrated and focused state in which time seemed to stand still, and which was blissful and refreshing (Wikipedia). He sat down under a large

Friday, November 15, 2019

Causes of the Lebanese Civil War

Causes of the Lebanese Civil War The Middle Eastern region has always been a symbol of regional instability; much like a leaky propane tank in an area prone to wild fires, just one spark in the wrong place can create an inferno. The subject of this investigation is to determine the primary causes for the Lebanese Civil War, why the fighting persisted for the better part of two decades, and how it finally ended. Using books written at the time of the war from scholarly sources and examining the firsthand accounts of individuals affected by the war, we will be able to at least draw some conclusions of how and why history unfolded the way it has. For fifteen years (1975-1990), Lebanon was embroiled in a vicious civil war that ultimately resulted in de facto Syrian military control over the small Middle Eastern state and left thousands of people dead—many non-combatant civilians. Most civil wars are fought between two religious or political factions, but the belligerents included the Lebanese Front, Syria, the Palestinian Liberation Organisation (PLO), Israel, and the Lebanese National Movement (LNM), though it can be argued that this was a battle of control between the region’s Muslim and Christian populations though the scope of interests involved would make it far more significant. Thus, it would not be entirely accurate to refer to this conflict as a ‘civil war’, but an ideological struggle of an entire region fought on a very small piece of land. According to David C. Gordon in his book Lebanon, the Fragmented Nation, ‘It has been a war between haves and have-nots, Christians and Muslims, Lebanese nationalists and non-Lebanese Palestinians, as well as a war between rival Arab states and ideologies on Lebanese soil, and part of the confrontation between Israel, the Arabs, and more.’[1] Summary of Evidence: A Timeline Lebanon obtains her independence in 1946.[2] The state of Israel is formed in 1948. Palestinian refugees are driven from Israeli territory to neighbouring countries. Lebanon attempts to absorb more than half a million Palestinian refugees, not really welcoming them into the society. Stability is compromised during the 1960s and power shifts several times ultimately leading to civil war in 1958.[3] During the 1960s and 1970s, the PLO violates Lebanese sovereignty to attack Israel. Lebanese society is polarized as the Muslim minority feels powerless and allies itself with more powerful Muslim forces such as the PLO and the Syrians.[4] Christian majority allies themselves with the nationalist forces. Open warfare breaks out in 1975 and becomes a microcosm for the rest of the conflict in the Middle East.[5] An Evaluation of Sources Itamar Rabinovich’s The War for Lebanon 1970-1985 was a source of basic information. It identified the various factions and their objectives and provided a summary of the major events in the war and the tensions leading up to it. A valuable source for someone that needs to familiarise themselves with the general situation, though it does not adopt a particular perspective. This would be a good place to start when beginning research. In Syria and Iran by Anoushiravan Ehteshami and Raymond A. Hinnebusch, the subject of discussion focused on the growing hegemony of Syria and Iran as an opposition to Israel’s growth in the Middle East. At first glance, the subject matter had very little to do with the Lebanese Civil War, however, the books sixth chapter introduces the theory that the war in Lebanon was critical to the interests of many factions in the region rather than being a simple resolution of sovereignty and government representation. ‘The struggle for Lebanon is most usefully understood, not as part of a civilizational conflict between Islam and the West, but as a conflict of national interests: if Israel could control Lebanon, it could smash Syrian and Palestinian resistance to its hegemony. Syria and Iran sought to make Lebanon, respectively, a buffer and a front in the struggle with Israel.’[6] This book was critical to understanding how a delicate situation was pushed into civil unrest by external forces. In this case, Iran and Syria were threatened by an Israel backed by the superpower that was the United States of America and much of the Shi’a Muslims in the region became more energized to resist that influence. Of special interest was the alliance of the Lebanese Shi’a Muslims with Syria and Iran, and their ultimate success. ‘The USA and Israel withdrew from Lebanon. Syria and Amal had forged an alliance in opposition to the USA, the Phalanges and Israel which would prove remarkably enduring.’[7] In contrast Lebanon, the Fragmented Nation by David Gordon was indispensable to understanding the internal issues that precipitated the war, focusing on the diverse nature of Lebanon and its inability to decide whether to become a part of a ‘greater’ Syrian society or remain the Arab World’s link to the West. When asked, the Christian and Muslim population offered radically different visions of the society that Lebanon should become.[8] This may suggest that religious diversity is not possible, especially when the religions involved tend to be expansionist and the practitioners themselves extremist, albeit co-existence is possible in a society where the diverse groups were moderate and non-expansionist (i.e. believe that everyone should abide by the mores of their particular group). While the first source couched the war in terms of Islam vs. Christianity and Zionism, this source explored the fundamental division between Christians and Muslims in Lebanese society, which could never lead to a lasting peace. The personal account provides a most important perspective for this investigation: the individual soldier or civilian whose life was impacted by the hostilities. Scholarly historical books and documents offer a bird’s eye view of the social and political forces that led to this outcome, however, it does not capture the personal element of how the individual is pushed into fighting for a particular cause. According to Lebanese writer Fawaz Gerges, the Civil War was a grand struggle ‘for the soul and future of the Muslim and Arab world.’[9] This is not an exaggerated statement given that the causes for the war and the parties involved originated beyond Lebanon’s borders, but the writer of this story wanted to express how the interference of the West and the extremism of the Christian soldiers began to inflame the passions of young jihadists. This source was chosen for its historical relevance because the jihadist movement is more powerful than ever in the twe nty-first century and Lebanon is considered more an ally of the Muslims than a Christian state even as it retains a sizeable Christian population. Although this does not show the origin of the war per se, this book highlights the origin of Muslim extremism and how a climate embroiled in religious strife can polarise the most moderate reasonable people. Analysis From the sources that were gathered for this study, it is clear that the seeds of the conflict were sown in 1948 when the Jewish state of Israel was formed. With its alliance with the Western world and a new religious influence in the area, it challenged the existing balance of power in the Middle East. As we know, the Palestinians already inhabiting the territory ceded to Israel were strongly opposed and began to attack the newly formed nation because there was a resentment against having to give up land that was theirs to begin with, and that they had done nothing wrong to merit its loss. When the Israelis won and expanded their borders, many Palestinians were forced to seek refuge in neighbouring countries. When Jordan expelled many of the Palestinian refugees for reasons of national security, the refugees (along with PLO forces) began to migrate into Lebanon in greater numbers. Political asylum seekers that could not have easily assimilated into Lebanese culture were absorbed int o the population resulting from Israel’s treaty with Lebanon. ‘One result of Israel’s creation was that Lebanon became host to many of the some 700,000 Arab Palestinian refugees. Most of the Diaspora was Muslim, and so in this predominantly Christian state, it was inconceivable that they should be given citizenship and assimilated. To do so would have been to undermine the statistically based legitimacy of the Establishment to continue to rule. Muslims of course took full note of the fact that when thousands of Christian Armenians had poured into Lebanon after the First World War they had been quickly provided with the rights of citizenship.’[10] Lebanon had only been independent of France for two years and a nation is most vulnerable in the first years of formation as the stronger factions seek to overcome the minority groups and the new order overturns outdated power structures, and attempted coups by ambitious power brokers were rather common.[11] With the influx of Palestinian refugees, the balance of power began to shift. The Lebanese government was created to empower both Christians and Muslims. The President of Lebanon must be a Maronite Christian and the Prime Minister must be a Muslim. However, the balance of power strongly favoured Christians. When Muslims began agitating for more influence because they believed they were in the majority, a mini-civil war was fought in 1958, which claimed 4,000 lives leaving the region even more fraught with religious tension. The rise of religious extremism in general and Muslim fundamentalism in particular characterised the 1970s social and political climate, and many hard line members of the Abrahamic religions believed that their sect should be in control of the Holy Land, with the city of Jerusalem at its centre. While this in and of itself was not enough to spark the war in Lebanon per se, Palestine’s insistence on using its adopted country as a staging ground for an attack on Israel polarised the Lebanese people into two camps. The Muslim faction supported Palestine’s military efforts while the Christians were strongly opposed, and many Christians commonly support the Jewish claim to the city of Jerusalem. Considering Lebanon’s religiously and politically diverse population, it is not difficult to imagine that obtaining a consensus on foreign relations would be extremely difficult. This was especially true once the United States and Europe were intervening on behalf of the newly formed Jewish state that most of the Arab nations in the region wished to destroy. Tensions between the Lebanese and Palestinians escalated as the Palestinian Liberation Organisation (PLO) sought to fight Israel from Lebanese territory, which suggests that the root of this conflict was the seizure of Palestinian lands when Israel was founded in 1948. ‘It was not the Lebanese that started the violence; rather, Israel’s dispossession of the Palestinians was the root of the Lebanese civil war and the civil war was greatly exacerbated by the 1982 Israeli invasion which was supported by the USA in order to smash the PLO and the Islamic movement and reinforce Israel.’[12] Conclusion After Israel’s invasion of Lebanon in 1982, the Shi’a Islamic group Hezbollah was created as a political group that provides social services to the Shiites living in Lebanon, however, it is considered a terrorist organisation in the West. The Ayatollah Khomeini’s revolution in Iran inspired and influenced the development of radical and powerful Islamic political groups in Lebanon, and eventually the small nation had become an enemy of Israel and the West. The Lebanese Civil War was a historically significant event because it led to a revival of Islam centred on Jihad. The growing influence of the West in the Middle East caused moderate Arab Muslims to turn to religious extremism, which is evident in the acts of terrorism taking place in the Middle East, Asia, Europe, and North America. Would the war have taken place had the United Nations never introduced the state of Israel into the region? It is rather unlikely, as the Palestinians would have remained in their homeland and many speculate that there would not be a radical Muslim movement except at the fringes of society, much in the same way that hard line Christian sects are on the fringes of European society. However, it is usually quite difficult to predict what would happen on an alternate timeline because who would have known that the assassination of two aristocrats in Austria-Hungary would have led to one of the worst wars of all time? Bibliography Ehteshami, A Hinnebusch, R A (1997) Syria and Iran: Middle powers in a penetrated regional system Routledge, London Gerges, F A (2006) Journey of the Jihadist: Inside Muslim Militancy Harcourt Trade, Orlando, Florida USA Gordon, D C (1980) Lebanon, the Fragmented Nation Croom Helm Ltd, London Rabinovich, I (1985) The War for Lebanon, 1970-1985 Cornell University Press, Ithaca, New York USA 1 Footnotes [1] D C Gordon (1980) p. 234 [2] Gordon (ibid.) p. 49 [3] Rabinovich (1985) p. 42 [4] A Ehteshami R A Himmebusch (1997) p. 116 [5] Gerges, F A (2006) p. 61 [6] Ehteshami Hinnebusch (ibid.) p. 116 [7] Ehteshami Hinnebusch (ibid.) p. 122 [8] Gordon (ibid.) p. 145 [9] Gerges (ibid.) p. 61 [10] Gordon (ibid.) p. 49 [11] Gordon (ibid.) p. 50 [12] Ehteshami Hinnebusch (ibid.) p. 127

Wednesday, November 13, 2019

Netflix Essay -- Technology, DVD Rentals

Introduction Reed Hastings (co-founded) founded Netflix in 1997. During this time, Netflix offered DVD rentals by mail. As Netflix went public in 2002, shortly a year later their subscription reached the one million mark (Netflix Management, 2011). Recently, Netflix is recognized as one of the 50 most innovative companies, ranking number eight for â€Å"streaming itself into a $9 billion powerhouse (and crushing Blockbuster)† with 20 million subscribers (fastcompany.com, 2011). This success shows how Netflix embraced a business approach where their mission was to take the troublesome experience of everyday consumers and transform them into a business opportunity. Below illustrates how Netflix rank in other categories. Number 1 Number 2 Number 3 Number 4 Film Netflix Double Negative Real D Dreamworks Video YouTube Twitter Netflix FX Web Companies Twitter Google Zynga Netflix Learning Team A will describes and evaluate Netflix’s innovation strategy, the specific products offered to their members, and the benefits that the company brings to its customers and employees. To begin, innovation goes beyond an invention. It captures the opportunity for change, growth, and market leadership that allows leaps within the industry in multiple ways (Pearce & Robinson, 2011, p. 376). Simply stated on Merriam-Webster.com, innovation is â€Å"the introduction to something new; a new idea, method, or device† Netflix’s Innovative Overview The outlook for Netflix has developed a trend of continuous growth with subscribers and providing products with a substantial cost advantage by distributing a wide variety of titles that appeal to different customer groups (Anthony, 2005). The success of Netflix was simply listening to consumer’s feedback regard... ...a remarkable opportunity to grow in the industry and lead as an innovative provider, Netflix has much opportunity to satisfy its customers and maintain their attention with their revolutionary business growth (Martala, 2009). Their success goes beyond their product. As stated, it is a combination of their culture of high performance drivers and fosters the â€Å"freedom and responsibility† mindset (Elliott, 2010). Because of their innovation and gradual entry into the market, Netflix has the competitive advantage to add layers of products for growth for years to come. Currently, Netflix has the competitive advantage to increase price and retain their current customer base. Even more beneficial, is the opportunity to attract additional subscribers with their new features. To end this, combining their products, price, culture, and strategic plan makes Netflix innovative.