Thursday, October 31, 2019

East Asia paper 2 Essay Example | Topics and Well Written Essays - 750 words

East Asia paper 2 - Essay Example With such economic disparity, China’s development continued to fall as Western culture continued to take its peak. Aside from these, its centralized government began to crumble as rampant corruption erupted. Decentralization in power, warfare, rebellions, overpopulation, as well as the continuing economic downscale continued to pour over China’s arms. Rebellions continued its sprout, starting with the White Lotus Sect that placed an end to the golden age of the Qing dynasty and lasted for almost nine years. Named after the White lotus Buddhist sectarianism, White lotus revolution sparked the Chinese movement to overthrow the Qing dynasty. Starting as tax protesters, this sect was able to gain support from ordinary people against serious concerns in the government. By 1840, the Opium War, armed invasion of France and Britain against China, also broke out. This war was rooted from the dispute against opium trade, as the Chinese Emperor banned opium for its harmful effects in its citizens and derogatory impact on Chinese culture. Such conflict of premise contrasted Britain’s view on opium as a profitable commodity for commercial trade. The Opium War and the series of â€Å"unequal treaties† (or unreasonable treaties which demanded China to give up territories, pay indemnities, and open trading ports) beneficial to Britain further contributed to the downfall of China. The sudden turn of events converted China into a semi-feudal and semi-colonized country. Aside from the aforementioned wars, China also suffered from the Boxer Rebellion, a rebellion of the Chinese patriots (who used acts of violence such as murder, robbery, vandalism, and arson) as a means in opposing the forces of foreign traders and troops.

Monday, October 28, 2019

Creation of Snow and Jack Frost Essay Example for Free

Creation of Snow and Jack Frost Essay Long ago, the weather was just warm and the grass was just green. Every person on earth was happy the way they were, and the way everything was. God was always trying to bring new things into Earth, to complete its perfectness. One day God had this big feeling that he needed to create something for Earth and his people. But what could it be? Everything was already so perfect. So God asked and angel named Jack to go down to Earth and figure out what was missing. Jack went down and searched and searched, he disguised himself as a human and asked many children and adults, â€Å"If you could add something to our earth, what would it be? everybody’s answers were the same. They all said that there was no needed change. Jack reported back to God and told him everything, but God still didn’t agree. He thought and thought of different ideas every day. One day, He caught a cold, and He couldn’t stop coughing or sneezing. Even when He had this cold, he still looked over Earth every single day and tried to improve it. But right when God was just about to give up and say the Earth was perfect enough, He let out the biggest strongest sneeze anyone could imagine. His sneeze was so powerful that it blew all the clouds onto the ground onto Earth and made them stay over top of the grass and cover every single thing on Earth in soft white stuff. When God seen this, He was appalled. He thought he ruined everything. But then a bright idea came into Angel Jack’s head. He said â€Å"Well since Earth has only warm weather and green grass, what if these clouds turn into cold soft ice and the weather becomes cold for half the year? † God thought this was a brilliant idea, so He did what Jack suggested. He turned the clouds and weather cold. He decided to call the clouds snow. He then told Jack to go check it out and see how the humans reacted. Jack once again went down to Earth and disguised himself. He asked all the children and adults what they thought of this snow. They all said the same thing, that they don’t know what to do or how to have fun in this snow. Jack thought to himself, â€Å"what if I think of fun games the children could play in this snow? † So he did, he lied on top of the snow, and started to move his hands up and down and his feet in and out. All the children saw what he was doing and did the same. They asked him what he was doing. Jack answered quickly, â€Å"I’m making, uh, snow angels! See these are the wings and these are their white long clothes! † The children’s faces lit up and asked Jack if he could show them any other fun stuff to do. So he thought quickly and started forming balls to throw and blocks of snow to make little forts. The children seen what he did and all said, â€Å"Let’s make snow balls and snow forts like Jack is! I love the snow! † Once Jack heard this, he was on his way back to God. He came back and when God asked how everyone liked it, he told him all this stories and God was exceeded. God then asked Jack, â€Å"Do you like this snow? † Jack answered, â€Å"I love this snow, so much! † So then God asked if he would like to become in charge of when snow falls, and in charge of making games and keeping the snow to the humans’ likings. Jack answered with a yes, so God said, â€Å"Well then Angel Jack, you are now named Jack Frost! † Jack was happy with that, he made his home at the North Pole and kept track of the snow and made sure everyone was happy ever since.

Saturday, October 26, 2019

Why are US Veterans becoming Homeless?

Why are US Veterans becoming Homeless? Aubrieann Hale In this paper, I will focus on the topic of why veterans are coming back homeless. Veterans are seen as a savior of the country they are risking their lives for every day, so why is it that they are coming back from tours and service and ultimately ending up homeless? Since 2009 the United States stated that in five years they would end veteran homeless, but the United States is still facing veteran homelessness in the year 2017. Though the homeless rates of veterans have gone down since then, why are veterans still facing homelessness if so many resources are supposed to be available for them. Is there more than meets the eye when it comes to homelessness, especially with veterans, yes. Many things can attribute to this continuing issue such as lack of assistances provided, mental illnesses, PTSD, lack or loss of support from being deployed, the use of drugs and alcohol as coping strategies, and the economics. Homelessness is something that many individuals in every country face on a daily basis. The definition of homelessness can vary from what one individual to the next individuals definition of homelessness. The United States Department of Health and Human Services definition of homelessness is: An individual without permanent housing who may live on the streets, stay in a shelter, mission, single room occupancy facilities, abandoned building or vehicle, or in any other unstable or non-permanent situation. An individual may be considered as homeless if that person is doubled up, a term that refers to a situation where individuals are unable to maintain their housing situation and are forced to stay with a series of friends and/or extended family members. In addition, previously homeless individuals who are to be released from a prison or a hospital may be considered homeless if they do not have a stable housing situation to which they can return (U. S. D. of H. and H, n.d.). The Veterans Assistance program (VA) was originally founded in 1811 by the federal government for veteran domiciliary and medical facilities, but at the time was named the Veterans Bureau. The federal government recognized the instability of an individuals living arrangements as a critical aspect of the definition of homelessness. Later on, in the 19th century, the Veterans Administration was expanded to include benefits and or pensions not only for veterans but for their widows and dependents if something were to have happened. After the Civil War, many states began to establish veterans homes. Since domiciliary care was available at all state veterans homes, coinciding with that medical and hospital treatment were also provided for all injuries and diseases, without discrimination of service area. Veterans of the Indian Wars, Civil War, Spanish-American War, and Mexican Border, as well as regularly discharged members of the United States Armed Forces, were able to receive care at t hese veteran homes (U.S. Department of Veterans Affairs, n.d). As the United States entered World War I, congress established a new system of veterans benefits, including programs for disability compensation, insurance for service personnel and veterans, and vocational rehabilitation for the disabled (U.S. Department of Veterans Affairs, n.d). In 1928, admission to the national veteran homes was extended to all women who served, National Guard and militia Veterans (all able-bodied civilians eligible by law for military service) (U.S. Department of Veterans Affairs, n.d). In 1930, President Herbert Hoover signed an executive order that elevated the Veterans Bureau to a federal administration creating the what is now known as the Veterans Administration. From 1944 through 1993, Veterans Administration guaranteed 13.9 million home loans valued at more than 433.1 billion dollars (U.S. Department of Veterans Affairs, n.d). To assist a Veteran between discharge and reemployment, the GI Bi ll also provided unemployment benefits of 20 dollars a week, for up to a maximum of 52 weeks (U.S. Department of Veterans Affairs, n.d). This assistance was put in place to avoid a repetition of World War I when unemployed Veterans were reduced to relying on charities for food and shelter. The Veterans Administration was then later renamed the Department of Veterans Affairs and continued to this day be known as the VA. It was not until the early 1980s, when the United States entered a recession in 1980 with the unemployment rate remaining unchanged through the start of a second recession in 1981, that veteran homelessness began to be recognized as an important public health problem. The Veterans Administration has gone through many changes over the past 200 years since it was founded. But it still remains to be focused on offering veterans the resources in which it was founded, for domiciliary and medical needs of veterans who have served. Post-traumatic stress disorder (PTSD) is one of the different ways a veteran can manifest postwar adjustment difficulties. PTSD is a mental health problem that some individuals can develop after experiencing or witnessing a life-threatening event, such as combat, a natural disaster, a car accident, or sexual assault. It is normal for an individual to have upsetting memories, feel on edge, or have trouble sleeping after a traumatic event. It may be hard to do normal activities, such as going to work, school, or spending time with people you care about. For some individuals, PTSD symptoms may not start right away, they may come and go over time. With PTSD, veterans may find it hard to keep their support groups such as family, friends and possible significant others close due to the symptoms of PTSD. Individuals can have a difficult time trying to get back into a routine that has now changed, whether they themselves are suffering from PTSD or individuals closest to those who are sufferi ng. Personally, coming from a family where my father is a veteran and my brother-in-law has been deployed 3 times in the past 4 years I have been able to see the costs that military families have to pay that can render them in hard financial situations in the future. For instance, military uniforms have multiple parts that are required, and if an individual is not wearing them they are out of conduct. Here is a cost breakdown of one of the 4 uniforms, military personnel are required to have. For combat and training, uniforms the required coat starts at 47.51 dollars, 48.00 dollars for the trousers, 8.10 dollars for the patrol cap, 4.77 dollars for the undershirt, 4.07 dollars for the rigger belt, 350-100 dollars for boots, up to 25 dollars per insignia, and 200 dollars for the required backpack (Army Air Force Exchange Services, n.d.). For just a combat uniform it can cost up to 700 dollars. For their formal uniforms, it can cost up to 500 dollars, and for physical training, uniforms it can cost up to 200 dollars. While they are given a uniform allowance, the military is constantly changing their uniforms and not compensating for that change, making it stressful for some to try and find ways to pay for what they need. There is also the factor of paying for housing, while there are barracks that military personnel can live in, some chose to live in apartments off base, due to having more freedom or having a family. So, they can be paying the housing costs outside of the military, but when it comes to deployment if they are single and not living with someone else it can become an issue of trying to keep payments going to the landlord regularly and if something goes wrong there is a possibility of them losing their place to stay ultimately coming back homeless. When it comes to having a family, they usually try to stay in one area and not have to move so often due to inconveniences. But when the military personnel get stationed in a new state, it becomes a matter of is the whole family going to move only to have the military personnel deployed in a couple of months leaving the family in an unknown area with no support like they had before. Now if the family made the choice to stay, then they are paying for housing in two states, which put the family in a financial burden, but they are able to keep their support systems. A median annual income of Veterans was approximately $50,000 (Elbogen, et al., 2012). In their studies, they indicated that treatment costs for veterans were a barrier to obtaining psychiatric and proper care. The US Military released a pay grade chart for 2017 because they offer many different variations for each area I will only focus on serving for 4 years. These numbers are based on monthly pay rounded up to the nearest us dollar. As an E-1 for 4 years they would make 1592 dollars, E-2 1785 dollars, E-3 2115 dollars, E-4 2420 dollars, E-5 2656 dollars, E-6 2960 dollars, and E-7 3401 dollars (Military pay chart, 2016). These are numbers only for enlistees and not officers, seeing that enlistees are the most common within the military. Substance abuse can be a leading factor in homelessness or continuing to be homeless. From a study conducted by Robert M. Bray, Mary Ellen Marsden, and Michael R. Peterson, they found that overall military personnel are more likely to drink and drink heavily than civilians are. Military personnel are twice as likely as civilians to be heavy drinkers, about one-third of military men who are younger drink heavily (Bray, et al., 1991). Veterans that are most at risk of coming back from war homeless usually have multiple factors that lead to the problem. Most of the individuals are either single, divorced, widowed, lack of family support or support systems, rendering them unable for proper reentry into civilian life. When those in the military are deployed, they are housed at the bases in that area, if they have their own family back in the states they can find it difficult to communicate with them. The military does not offer free Wi-Fi or calling, so if they were wanting to communicate with those back home, they will have to pay a monthly fee to do so. If an individual cannot afford that fee, there is the possibility of them losing their connections and support. Veterans who were officers and those who had graduated from college are more likely to have an easier readjusting process for their post-military life than enlisted personnel and those who are high school graduates. Along with veterans who mentioned they had an emotionally traumatic experience while serving or suffered a serious injury had more problems with re-entry when other factors are held constant. Though I would like to provide a definite answer to why are United States veterans coming back homeless, there is still much research to do. There are many factors that can lead to an individual becoming homeless and that is the same for veterans. While there are many studies on veteran homelessness, my goal was to figure out why they are homeless, and while again there are many articles and studies they do not clearly focus on specifically why. I would say that I have not been able to fully answer my question of why United States veterans are coming back homeless, but I hope that in the future, I will be able to conduct my own studies on this topic and find a more concise answer. Until then I can only say that there are many factors that lead to this unfortunate event such as lack of assistances provided, mental illnesses, PTSD, lack or loss of support from being deployed, the use of drugs and alcohol as coping strategies, and the economics. References Services, U. S. D. of H. and H. (n.d.). HHS.gov Retrieved March 8, 2017, from https://www.hhs.gov/ Elbogen, E. B., Johnson, C. S. C., Wagner, H. R., Newton, V. M., Beckham, J. C. (2012). Financial Well-Being and Post-Deployment Adjustment among Iraq and Afghanistan War Veterans. Military Medicine, 177(6), 669-675. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3390745/ Shop Army Air Force Exchange Service. (n.d.). Retrieved March 13, 2017, from https://www.shopmyexchange.com/browse/military/army-uniforms/_/N-104825 Brett Litz, S. M. O. (n.d.). The Returning Veteran of the Iraq War: Background Issues and Assessment Guidelines. https://secure.ce-credit.com/articles/101192/3_4-101192.pdf 2017 Military Pay Chart. (2016). Retrieved March 13, 2017, from https://www.usmilitary.com/2017-military-pay-chart/ U.S. Department of Veterans Affairs. (n.d.). Retrieved March 13, 2017, from https://www.va.gov/ Alvin S. Mares, R. A. R. (2006). Attitudes Towards Employment and Employment Outcomes Among Homeless Veterans with Substance Abuse and or Psychiatric Problems. Taylor Francis Group, LLC. Stephen Metraux, L. X. C., John D. Daigh, D. P. C., Vincent Kane. (n.d.). Risk Factors for Becoming Homeless Among a Cohort of Veterans Who Served in the Era of the Iraq and Afghanistan Conà ¯Ã‚ ¬Ã¢â‚¬Å¡icts. Matthew Chinman, G. H., Sharon McCarthy. (2012). Lessons Learned from a Quality Improvement Intervention with Homeless Veteran Services. Johns Hopkins University Press, 23(3), 210-224. Tsai, J., Rosenheck, R. A. (2015). Risk Factors for Homelessness Among US Veterans. Epidemiologic Reviews, 37, 177-195. https://doi.org/10.1093/epirev/mxu004 Bray, R. M., Marsden, M. E., Peterson, M. R. (1991). Standardized comparisons of the use of alcohol, drugs, and cigarettes among military personnel and civilians. American Journal of Public Health, 81(7), 865-869. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1405176/

Thursday, October 24, 2019

Essay --

The Vietnam War was fought from December 1956 to April 1975 in the Indohchina region that encompasses Vietnam, Cambodia and Laos. At its most basic level, it can be described as a war between the communist regime in North Vietnam, headed by Ho Chi Minh, with its sympathizers in the South and the Southern non-communist Vietnamese regime. Its roots can be traced back to the end of the Second World War, when Ho Chi Minh and the Vietminh (nationalist communist party) seized power in formally French-controlled Vietnam after the Japanese occupants withdrew. France, unwilling to relinquish their power, sent troops into Indochina in order to regain their control. Meanwhile, Ho Chi Minh continued to consolidate his power through his Soviet and Chinese communist allies—employing tactics such as imprisonment, exile, and sometimes even murder to be rid of any political opposition or threats to his Communist regime. The struggle continued until the Vietnimh—with Chinese support in weapons and advising—took siege of the village Dien Bein Phu, where French troops were located. In May 1954, the Vietnamese successfully took the village, and soon after that the French left Indochina all together acknowledging their defeat. In the late 50s, South Vietnam was under control of Ngo Dinh Diem, who implemented a severe and brutal anti-Communist regime, leading to small collectives of communist revolutionaries, who eventually in 1959 were supported and aided materially by the North. Thus the Vietnam War as we know it today began. The Communist North, aided by Chinese and Soviet allies, fought battles with the anti-communist South, aided primarily by the U.S. Yet, how did the U.S. become involved so heavily in a war that seemed to have nothing to do with... ...relenting. It is argued that a fundamental difference between the experiences of Vietnam vets as opposed to veterans of other wars is that veterans of a war such as World War II, though still had a difficult time with what they did and witnessed, had a feeling that what they did in the war was significant and important beyond what they individually may have seen or done—there was a greater purpose to all of it (i.e. WWII stopping the Nazi invasion and terror). However, considering the turn the war in Vietnam took—how the U.S. public eventually protested strongly against it and its goals—that feeling was not always present for the surviving soldiers. This fact among the various other factors like the horrors and gruesomeness of the war contributes to the widespread psychological problems that plagued the veterans of the war long after they returned home to the U.S.

Wednesday, October 23, 2019

Ethics Essay Essay

The theories of virtue, utilitarianism, and deontology are similar in some aspects but for the most part are very different. Each of the theories will be explained to show their differences and the type of person that would gravitate towards that theory. Through the explanations one would also be able to consider where there morals or ethics may lie but can also see themselves in each theory. The Virtue Theory, also know as Virtue Ethics, refers to the character of each person. This theory states that every person should try for excellence. The characteristics of each individual are made up from their environment that they are a part of. The theory would further suggest that it is not defined as a single moment in each individual’s life but their entire life as a whole. In thinking about the Virtue Theory, it can be explained by stating that each person needs to be the best they can and avoid the need or ability to hurt others. In Basic ethics: Basic ethics in action it talks about Aristotle and his view on virtue ethics to include characteristics or virtues of an individual. There are some that Aristotle would suggest to be the median or virtues such as courage, self-control, proper emotion, and friendliness to name a few. Reviewing these ideals of what characteristics a person should posses would or could be considered common traits of most individuals in the world today. In the simplistic form the virtue theory is about better one self and the other individuals that are around them. Deontology Theory states that there is a moral duty for one to act no matter the circumstances. This theory is furthered by the thought process of not thinking through any actions or the consequences but because it is action that is taken is right. â€Å"The word â€Å"deontology† comes from two Greek words, deion+ logos. Deion comes from the particle dei which means â€Å"must. † Logos (in this context) means â€Å"the account of† (Boylan, 2009). In breaking this down, it shows that is the account of the musts. In meaning one must act on the account of others or for themselves. Deontology theory can be seen within those persons that provide protection for another without question no matter the inherent danger. The will to act is shown through this theory such as that would be considered of the Spartan Army. The Spartan Army would not ask how many strong are the enemy but where the enemy is. Utilitarianism Theory is one that embodies the thought of taking care of the whole group and not the individual. This theory is a moral theory as we see wanting to make the group better. It can only be our morals to drive us to want what is best for a group. If one person is stronger in writing than another during the course of the project, then the weaker writer may ask the stronger one to take over. It is knowing your personal weakness and asking or foregoing your own glory to better the group that you are part of. One that can set aside their pride is a far better person and shows their true sense of morals. In thinking about a personal experience to be discussed in combination with one of these theories, I keep coming back to the theory of utilitarianism. The reason being that I know I have an alpha personality, meaning that I like to be in control and have the control. I tend to leave this part of me outside the classroom to have a clear head and to allow the learning teams to work more cohesive with the other members. It has been my experience that issues have arisen in each of the groups that I have been a part of. This is either due to lack of participation, inability to communicate or the plain fact of laziness. I have stopped from confronting the team member numerous times in order to keep the team moving in the right direction. Later in the class the issues continue to build and that is when I will confront the person and attempt to deal with the issue. I feel that in setting aside my alpha mentality and waiting to confront the individual is a way for the betterment of the learning team as whole.

Tuesday, October 22, 2019

Differences Between Veterans and Social Security Benefits

Differences Between Veterans and Social Security Benefits Social Security and Veterans Benefits: Understanding the Differences While both the Social Security Administration (SSA) and the Veterans Benefits Administration (VBA) provide assistance to American citizens in need, the two agencies differ greatly in scope, intent and procedure. Understanding the differences between the SSA and VBA can save claimants time- and prevent potential headaches. An article on these differences appears here.Understanding Social Security DisabilityThe Social Security Administration (SSA) provides benefits for Americans who have worked, paid into the system and have encountered a disability that now leaves them unable to work. Social Security Disability (SSD) benefits carry over until the recipient reaches retirement age.SSD is a simple, all-or-nothing benefit. Under the administration’s rules, the claimant is either disabled or they are not. Adjudicators simply need to determine if the claimant is able to work. These cases typically take two to three years to resolve. SSA will terminate disability benefits once a recip ient reaches retirement age.Understanding Veterans Disability BenefitsUnder the Veterans Administration (VA), Veterans Disability Benefits provide compensation to veterans for their service-connected disabilities. VA Disability- in a marked difference from SSD- has no age limit. A successful claim can provide benefits for life.In contrast to SSD, the VA assesses each illness or injury as a separate claim- assigning each its own rating. At the VA, each ailment is considered a distinct claim and each claim is rated separately. A veteran must submit evidence for each claim- which the VA will evaluate under separate criteria. A Veterans Disability case could potentially take five, ten, perhaps as long as 20 years to resolve.We Can HelpIf you are disabled and unable to work, call Disability Attorneys of Michigan for a free confidential consultation. We’ll let you know if we can help you get a monthly check and help you determine if any money or assets you receive could impact your eligibility for disability benefits.Disability Attorneys of Michigan works hard every day helping the disabled of Michigan seek the Social Security Disability and Veterans Disability benefits they need. If you are unable to work due to a physical, mental or cognitive impairment, call Disability Attorneys of Michigan now for a free consultation at 800-949- 2900.Let Michigan’s experienced disability law firm help you get the benefits you deserve.Disability Attorneys of Michigan, Compassionate Excellence. Michigan Social Security Disability Lawyer, Michigan Veteran Disability Attorney

Monday, October 21, 2019

Cloud Computing Security Issues in Enterprise Organizations

Cloud Computing Security Issues in Enterprise Organizations Introduction Cloud computing has started to move beyond hype and into the fabric of businesses today. Small and Medium Businesses have discovered by utilizing cloud services, they can gain significant benefits including access to novel business application and state of the art infrastructure resources.Advertising We will write a custom thesis sample on Cloud Computing Security Issues in Enterprise Organizations specifically for you for only $16.05 $11/page Learn More Although Enterprise Organizations are gaining valuable insight into the potential benefits of cloud, IT directors still have concerns about the security of their corporate data in the cloud. There are three major security issues inherent in cloud computing that make implementation in Enterprise Organizations a challenge. These issues are: Loss of control over data and Dependence on the Cloud Service Provider (CSP) Spying These three issues can lead to a number of legal and security concerns re lated to infrastructure, identity management, access control, risk management, regulatory and legislative compliance, auditing and logging, integrity control as well as Cloud Computing provider dependent risks (CEPIS, 2011). This paper will set out to show that while there are significant security threats that an enterprise faces when it migrates to the cloud, there are solutions that can be implemented to mitigate these threats and ensure that the enterprise is able to benefit from the numerous advantages of the cloud without exposing itself to unnecessary risks. Defining Cloud Computing The concepts behind cloud computing have been applied for over two decades (CEPIS, 2011). However, the widespread implementation of cloud computing services has only become prevalent over the last 7 years. The National Institute of Standards and Technology defines cloud computing as a model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing reso urces that can be rapidly provisioned and delivered with minimal management effort or service provider interaction (Chirag et al., 2013, p.562). Cloud computing offers a number of significant benefits, therefore making it attractive to many enterprises. To begin with, cloud computing utilizes a pay-per-use model, meaning that the organization only gets to pay for the services that it uses. Chirag et al. (2012) document that cloud computing present businesses with the ability to increase their IT capabilities on demand and without having to invest much in new infrastructure or training of personnel.Advertising Looking for thesis on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More The enterprise is therefore allowed to focus on its core business concerns instead of dealing with technical IT issues. According to Chirag et al. (2013), many of the organizations in the US and Europe that have migrated to the Cloud en vironment have done so in order to exploit the advantages or cost reduction. Skendrovic (2013) reaffirms this observation by noting that most enterprises acknowledge that using a cloud solution is integral to maintaining future organizational growth and productivity. Concerns In spite of the widespread enthusiasm for cloud computing, there still exists significant apprehension about migrating to the cloud. Cloud computing brings about risks that an organization would not be forced to face if its applications were run in-house. A number of significant and valid security concerns have caused this apprehension. Loss of Control over Data When an enterprise makes use of cloud services it, in essence, relegates the control of data and applications to third parties. An enterprise that migrates from the traditional in-house environment to a cloud environment immediately relinquishes its control over the networking infrastructure. The cloud service provider (CSP) is in control of infrastruct ure including servers, log files, and incident reports. The first issue that arises is that the enterprise does not have control over the physical infrastructure where its data is stored. Chirag et al. (2013) assert that a reality for organizations that choose to make use of cloud computing is that their data will be stored off-site. Since the servers, storage space, and application programs are provided by external service providers, the organization will have a loss of control over the infrastructure. Enterprises expose themselves to a higher risk of facing unauthorized access when they use a cloud system as opposed to the traditional network system. Cloud service providers store data for various organizations at the same location. This stored data (data at rest) needs to be protected from physical and electronic compromise. A non-authorized user who is able to access the shared environment has access to the private data of the organizations that use the particular cloud computing service provider. The distributed nature of cloud system resources makes it hard to ensure data security and privacy (Qaisar Khawaja, 2012).Advertising We will write a custom thesis sample on Cloud Computing Security Issues in Enterprise Organizations specifically for you for only $16.05 $11/page Learn More This risk is high since the cloud system typically has a high number of administrators and users. Malicious users can successfully attack a cloud control interface and gain control of an enterprise’s account. When this happens, the intruder will have access to the data stored in the account. Enterprises are likely to be co-tenants with attackers on the Cloud (Juels Oprea, 2013). This jeopardizes the enterprises data since the malicious co-tenant is well placed to carry out a successful attack. Since the enterprise does not own or control where the data is stored and processed, there is a threat of theft or misuse. If the cloud provider does not provide solid physical or logical security, the organizations data might be stolen. The organizations data may also be used in a way that the client has not agreed to. Cloud providers might use the data for different purposes from those originally notified to and agreed with the consumer. Pearson and Yee (2012) document that cloud service providers may gain revenue from unauthorized uses of client data such as resale of detailed sales data to competitors. Enterprises that make use of cloud services do not have control over the lifecycle of their data. Organizations that maintain data onsite have data lifecycle plans that determine how long the data will be retained and when it will be destroyed. When using a cloud service provider, the enterprise cannot be guaranteed that its request for data deletion will be honored. The organization might issue a command to delete data using its application program, but the service provider might continue to store the data without the knowledge o f the organization. Dependence on the Cloud Computing provider As previously noted, employing cloud computing services means that the enterprise will be using the computing resources of a third party; the Cloud Service Provider. This reliance on a third party to provide critical services might lead to a number of problems. To begin with, the organization is not in control of the availability of the computing services it requires. Since the services are provided through the internet, there is a possibility that temporary or permanent loss of services might be caused by Denial of Service attacks. Vulnerabilities in the network have a direct negative effect on the security of the Cloud. Chirag et al. (2013) declare that the network is the backbone of Cloud computing since it is the most crucial component of Cloud services.Advertising Looking for thesis on communications media? Let's see if we can help you! Get your first paper with 15% OFF Learn More Enterprises that make use of the cloud might suffer from access limitations. Since data and information flow occurs through the service provider, it is not possible to ensure that an organization can access its data at all times. The power to limit access control lies with the service provider who has overall control of the communication infrastructure. The enterprise is therefore at risk of having its data locked in by the CSP for a number of reasons including orders from the government. In addition to this, use of cloud services presents a transparency issue. Users are often abstracted from the details of how the applications run on the Cloud and in most cases, the organization is kept in the dark concerning issues such as the exact location where the data is stored and who owns it or what will be done with it. This lack of transparency means that organizations are at risk of having their data used in ways that they did not authorize. In addition to relying on the Cloud service pr ovider to make the computing resources available, enterprises have to rely on the cloud provider to provide adequate security for the data at rest. The enterprise has to depend on the CSP to notify it of any security breaches that might occur on its data or applications. Since the enterprise does not control the data, it might be unaware of any security breaches that occur. Pearson and Yee (2012) state that there are uncertainties about notification, including of any privacy breaches that occur in the cloud. The organization will find it difficult to know if any breach has occurred since the cloud service provider might be reluctant to reveal such information since it will damage the image of the provider. It is also hard to determine whose fault it is in case of a security breach since the comprehensive security logs are maintained by the cloud service provider. Spying Spying has become an issue of significant concern over the last two years. The issue of electronic surveillance ha s gained a lot of interest following the revelations that the US National Security Agency is engaged in rampant data collection. Use of CSP increases the risk that an organization might be spied on. To begin with, cloud services are provided through the internet creating an opportunity for government agencies to intercept data as it is transferred from one location to the other. Saroj (2014) suggests that this risk would not be there is an organization made use of an intranet where all the data was processed in-house. The relationship between the major technology companies that serve as CSPs and intelligence agencies increases the level of spying that enterprises face. Hamilton (2013) reveals that in the US, there is cooperation between technology companies such as Microsoft, Google, and Amazon and intelligence agencies. There have been reports of the NSA and the FBI being provided access to data from the cloud storages of these companies. When the CSP provides government agencies w ith access to its data, the organization’s information is open to illegal scrutiny by the government entities. The risk of spying increases when the data has to cross over geographical boundaries that are subject to different laws. Different countries have varying data protection laws. An organization that is storing personal data with a CSP operating in a different country might find itself subjected to different data protection laws in the host country. Saroj (2014) confirms that due to the exposure of the high level of espionage activities conducted by the NSA, most enterprises are likely to invest more to on-premise solutions for their technology needs. Solutions Coming up with solutions to the security issues inherent in cloud computing is integral to the future success of cloud computing. Undoubtedly, the pooled computing resources and multi-tenancy model utilized by cloud computing introduces new security challenges that call for novel techniques to address them. Witho ut feasible solutions to the challenges, organizations will continue to demonstrate reluctance to migrating to cloud computing. Solutions to Loss of Control Most organizations would like to ensure that they do not lose control of their data. This outcome can be achieved in a number of ways. Enterprises can enter into contracts to ensure that their data and especially intellectual property rights are protected even in the cloud (KPMG, 2013). Ownership of intellectual property should remain with the organization at all times. As such, intellectual property attached to the data or generated by applications that is hosted in the cloud should belong to the user of the cloud. The enterprise can increase control over its data by negotiating a customer-oriented contract with the CSP. Priya and Ward (2013) state that such an agreement should increase the liability of the CSP in the event of a security breach and increase the rights of the organization over its data. Ensuring that the CSP can only use the organization’s data in ways that the organization has stipulated is important. Many organizations are keen to ensure that unauthorized secondary usage or their data do not happen. Pearson and Yee (2012) warn that at the present, there are no technological barriers to such secondary uses and as such, the cloud service provider might misuse company data. However, this risk might be mitigated by developing legally binding agreements as to how data provided to the CSP can be used. Solutions to Dependence on the CSPs The problems of availability that are caused by the high dependency on the cloud computing provider can be solved in a number of ways. Enterprises can make use of multiple providers to ensure continuous availability. Most CSPs provide the data proliferation function which entails having data stored or processed at different data centers. Replicating data in multiple data centers ensures full-time availability since it is unlikely that all data centers wi ll be experiencing problems at the same time. Juels and Oprea (2013) state that distributing data across multiple cloud providers provides redundancy therefore ensuring that reliable cloud services can be obtained from unreliable components. The enterprise can increase their protection against data loss due to damage to the cloud infrastructure by maintaining backup storage. Organizations should demand that the service provider maintains an off-site data backup that can be used in case the cloud infrastructure collapses. The provide should also have a standby disaster recovery and continuity plan that will ensure that the clients are able to resume normal functioning in the shortest period of time after a catastrophic failure (Zissis Lekkas, 2010). Chirag et al. (2013) confirm that it is hard to prevent all the attacks to the Cloud network due to the distributed nature of the cloud. However, implementing security solutions such as firewalls, anti-malware and strong encryption techn ology will mitigate these threats. In addition to protecting the data from online attacks, it is important to ensure that physical security of the cloud computing infrastructure. This security can be assured by ensuring that the servers are located in a secure location where there is constant surveillance. Nkhoma and Dang (2013) notes that most CSPs make use of the best security technologies such as biometric screening to ensure that only authorized staff have physical access to the company’s servers. Saroj (2014) confirms that majority of the cloud data centers offer great security than on-site data centers. The safety of organizational data is therefore better secured in the cloud that it would be if the company stored the data on its own premises. The higher than average security is possible since most cloud providers have the resources and expertise to implement the best security technologies available in the market. Solution to Spying The ability of spying agencies to ac cess organizational data can be inhibited by encrypting data before transmission. Researchers agree that the greatest risk for data being transmitted to or from the cloud is poor encryption technology. Hamilton (2013) observes that organizations such as the NSA find it easy to spy on organizations since they access the data in raw text or they are provided with keys that make it possible to successfully decrypt data. Organizations should ensure that their data is always encrypted before it is transmitted over the network. Using strong encryption standards during data transmission will increase the user confidence that the data is not prone to attacks from opportunistic hackers or government intelligence agencies. In addition to this, the enterprise should demand for its data to be stored in encrypted form in the CSPs storage facilities. This would ensure that even if spying takes place, it would require significant effort to decrypt the data. The threat of spying is exacerbated if t he CSP allows government agencies free access to its databases. Cloud service providers should be able to tell their clients if the data in the cloud is being accessed by any government agency. This transparency will enable the enterprise to make an informed decision on whether to store their data on the cloud. Addressing the spying problem is critical for enterprises to have confidence in cloud solutions. Most US cloud service providers are aware of the negative effect that the NSA spying could have on this industry. In recognition of the damage that spying might have on the cloud business, many companies are enforcing security measures intended to ensure that governments are not able to illegally spy on users. Google enforces mandatory encrypting of all the data stored on its cloud on behalf of the clients. Organizations that make use of the Google cloud are allowed to manage their own encryption keys, therefore increasing the level of security. Conclusion This paper set out to di scuss the issues that an enterprise might face when it makes use of cloud computing providers as well as the solutions to these problems. It began by highlighting the increasing interest that organizations have shown to cloud computing due to the benefits that this technology offers. It then highlighted some of the major issues inherent in cloud computing. The paper has demonstrated that security remains to be the primary factor preventing most organizations from migrating to the cloud. From the facts presented in this paper, it is clear that these fears are valid since the cloud infrastructure has some major vulnerability that could lead to problems for the enterprise. It should be noted that most of the threats inherent in cloud computing are not unique to the cloud environment. Problems such as data loss, unauthorized data access and spying can occur even when the data is maintained by the organization on-site. The problems inherent in Cloud Computing can be mitigated by implemen ting the solutions proposed in this paper. References Chirag, M., Dhiren, P., Borisaniya, B., Avi, P., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. Journal of Supercomputing, 63(2), 561-592. Council of European Professional Informatics Societies (CEPIS) (2011). Cloud Computing Security and Privacy Issues. Retrieved from: cepis.org/media/CEPIS_Cloud_Computing_Security_v17.11.pdf. Hamilton, D. (October 11, 2013). Leaked Documents Implicate Microsoft in Giving Government Agencies Access to Cloud, Email, VoIP Data. Web Host Industry Review (WHIR). Retrieved from: thewhir.com/web-hosting-news/leaked-documents-implicate-microsoft-in-giving-government-agencies-access-to-cloud-email-voip-data. Juels, A., Oprea, A. (2013). New Approaches to Security and Availability for Cloud Data. Communications of the ACM, 56(2), 64-73. KPMG (2013). The cloud takes shape. Retrieved from: https://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPu blications/cloud-service-providers-survey/Documents/the-cloud-takes-shapev2.pdf. Nkhoma, M.Z. Dang, D.P. (2013). Contributing Factors of Cloud Computing Adoption: a Technology-Organisation-Environment Framework Approach. Proceedings of the European Conference on Information Management Evaluation, 2(1), 180-188. Pearson, S., Yee, G. (2012). Privacy and Security for Cloud Computing Computer Communications and Networks ITPro collection. NY: Springer. Priya, D., Ward, C. (2013). Cyber-Security Threats and Privacy Controls for Cloud Computing, Emphasizing Software as a Service. The Computer Internet Lawyer, 30(3), 20-24. Qaisar, S., Khawaja, F. (2012). Cloud Computing: Network/Security Threats and Countermeasures. IJCRB, 3(9), 1323-1329. Saroj, K. (January 8, 2014). NSA Spying Will Hurt Cloud Computing Software Spending in 2014. Cloud Times Retrieved from: http://cloudtimes.org/2014/01/08/nsa-spying-will-hurt-cloud-computing-software-spending-in-2014/. Skendrovic, D. (2013). Growin g pains in the cloud. NTT Communications Retrieved from: eu.ntt.com/fileadmin/NTT-Europe/media/PDF/Research_Reports/NTT_Research_Report_Growing_Pains_In_The_Cloud_FINAL.pdf. Zissis, D., Lekkas, D. (2010). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583–592.

Sunday, October 20, 2019

Crack Writers Can Lay Easter Eggs

Crack Writers Can Lay Easter Eggs Crack Writers Can Lay Easter Eggs Crack Writers Can Lay Easter Eggs By Mark Nichol Do you like Easter egg hunts? No, not the kind with puzzled toddlers and woven baskets and brightly colored candy and hardboiled eggs. The type of Easter egg in question is a hidden message or other feature in any piece of content or even a computer or software program. A variation on this theme is naming or describing someone or something in a story to give readers a clue about a plot element. Writers employ this device all the time, merely by giving a character an evocative name. The moniker of Ebenezer Scrooge, for example, thanks to its grating, discordant qualities, does not inspire a reader to visualize a kindly, generous figure (though names can be or, in this case, can become deceiving). But authors can go a step further and foreshadow plot revelations or twists by assigning a name that, at least for some readers, will hint at later developments. Here are a few examples of this strategy (which, for all I know, may have another name): The Egg of Columbus Speaking of eggs, an anecdote about Christopher Columbus features him countering the claim that anyone else could have accomplished his feat of discovery by challenging others to stand an egg on end. When they fail to do so, he taps the egg on a table, breaking the end, and sets it upright on its now-flattened base. (A similar, possibly apocryphal story predates this incident, which itself may or may not be historical.) This analog to the Gordian knot or a reference to the Gordian knot itself, part of the lore of Alexander the Great could allude to an offbeat solution to a problem. Kobayashi Maru This is the name of a fictional spaceship in the Star Trek universe, the subject of a computer simulation that tests a prospective Starfleet officer’s character by presenting a scenario in which the vessel is disabled in forbidden territory. The exercise, similar in theme to the riddles of the Egg of Columbus and the Gordian knot, is ostensibly a no-win situation: The simulation program cheats so that the test subject always loses, thus guaranteeing that the focus will be not only on the person’s approach to solving the problem but also their reaction to the failure. However, several Star Trek films, series episodes, and novels refer to efforts to subvert the test. In your story, a ship or person so labeled perhaps with the names inverted will tease knowing readers with the understanding that some similar stratagem is in the offing. Arthur Conan Doyle The creator of Sherlock Holmes can lend his name to any one of a number of intriguing ideas. A character named Doyle (using the full name would be overkill) might allude to sleuthing or presents a link to one of the following alternative notions: At least one researcher suspects that Doyle was a conspirator in the Piltdown Man hoax, in which a fossil skull found in England in the early twentieth century was believed to be the fabled missing link between apes and humans. Doyle became an ardent spiritualist after the deaths of his wife, a son, and other close family members, and argued for the existence of fairies. He was a friend of escape artist Harry Houdini until the latter’s antispiritualism crusade, during which Houdini debunked fraudulent psychics and mediums, led to an estrangement. Doyle also created another legendary character, Professor Edward Challenger, hero of The Lost World and other adventures. This post does not suggest using these specific examples; my hope is that they will inspire you to cook up some of your own Easter eggs purchased in your store of knowledge and served in a story in the appropriate genre. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:"Because Of" and "Due To" Broadcast vs Broadcasted as Past FormA "Diploma" is not a "Degree"

Saturday, October 19, 2019

Art Essay Example | Topics and Well Written Essays - 750 words - 10

Art - Essay Example Just like the expression that ‘beauty is in the eyes of the beholder’, the appreciation for aesthetic value in art, lies in a more profound understanding of the beholder. The significance of studying art as a discipline is taken in the context that with greater knowledge of art, one gets the chance to be enriched, not only in theoretical knowledge of different works of art from various time frames; but more so, develop a more keen and analytical perspective in appreciating the intended meaning that the artists have relayed through their personal creation. Thus, more than just seeing or visualizing art works, the study of art has provided the improvement of skills in interpretation, in possessing a critical eye, as well as in understanding how art evolved through time using different media, elements, resources, and the application of creative skills and styles, as evident from one period to the other. In a particular work of art, for instance, one previously responds through interpreting the creation in its purely visual representation. This means that one gets to comment on the aesthetic quality: the vividness of the colors, the shading, and the images that are seen. Upon delving into a more in-depth understanding of art through the course, one recognized more elements of art could actually be evaluated as forming an integral part of the art work. For instance, one could analyze the juxtaposition of images and how it contributed to the overall unity and message of the work of art. In addition, one could discern, despite the abstract expression of an artist, the real meaning that was intended for the viewers through the use of colors, forms, and creative style. As such, when figuring out an art work that one plans to hang on the wall, the qualities that would be included in the selection process would not merely depend on the way the art work looks (visual qualities); but on the overall ability of the

Friday, October 18, 2019

Nonw Essay Example | Topics and Well Written Essays - 2250 words

Nonw - Essay Example For Patricia Muir, the carrying capacity of the earth is the maximum theoretical population size that will remain stable if and only if the supply of resources does not change. However, this is indeed theoretical at best because not only does population size change all the time, but the supply of resources also change independent of population changes. The worst case scenario, therefore, based on Muir’s definition, is that the population size will keep increasing, the supply of resources will keep decreasing, and this will most likely drive the population to instability. Stability, as implied by Muir, is the state where the population may not experience any social or economic problems related to survival and ease of living. Sarah Postel, in her article â€Å"Carrying Capacity: Earth’s Bottom Line,† defines carrying capacity in a rather simple way as â€Å"the largest number of any given species that a habitat can support indefinitely† (4). There is no idea of stabilization driven at here by Postel, as based on her definition, carrying capacity is simply the capacity of the earth to feed a certain maximum number of people, whether or not this will lead to stability. Nevertheless, the definitions of Muir and Postel are far from the reality of the situation for several other factors that affect carrying capacity are not being considered in their definitions. Based on data from Cornell University, the carrying capacity of the earth is estimated to be 10 to 15 billion people, but estimates since 1679 by Anton van Leeuwhenhoek to the present have varied at the range between 1 billion to over a trillion people. The variations are due to the fact that it is admittedly â€Å"difficult to estimate† the human carrying capacity of the earth (The Carrying Capacity). The true reason behind this degree of uncertainty is that the world has been different in different eras in history and humans had different needs and different lifestyles for every part of his history. This is evident during the sudden exponential rise in human population from 1400 to the present while it remained fairly stable centuries before 1400, and no one knows for sure why this happened (Cohen 341). Another reason for the uncertainty in determining the carrying capacity of the earth is that the governments of the world do not exactly know what factors ultimately determine carrying capacity. Among the factors being considered there are food, nutrients, space, technology specifically and the availability of each (The Carrying Capacity). Still, other experts say that the problem is not within the environment but with people’s social, political and economic activities, which are all affected by culture, religion, language, values and ethnicity (Cohen 341). Others like Hardin theorize that the earth actually has its own natural way of correcting its own carrying capacity and the problem is that people’s ethical beliefs, like â€Å"Human life is sacred†

E potfolio Essay Example | Topics and Well Written Essays - 500 words

E potfolio - Essay Example Consequently, developments in information systems also involve social and political relationships-and thus ethical consideration in how information is used is all the more important. Government records, workplaces and private lives of the people are within the reach of the system and it is a vital responsibility now to balance the needs and rights of everyone. While everything with online security systems seems very user friendly and tends to make life easier for a management team, there is also a significantly dangerous side to the use of online information systems. One of them happens to be cyber crime. Typically, cyber crime can be divided into four categories; theft, fraud, copyright infringement and attacks. With the popularization of the internet and its several weak links, hackers find it possible to break into security systems where they have access to a person's key personal data such as social security numbers, date of birth, driver's license numbers and credit card informa tion. Affected individuals have experienced fraudulent financial transactions, and false accusations of crimes they have never committed which begin showing against their names on their personal record files. Information systems are vulnerable to physical attacks, electronic hacking, viruses and natural disasters.

Executive summary Essay Example | Topics and Well Written Essays - 1000 words - 2

Executive summary - Essay Example The projects partners will be picked on the basis of their innovative idea with regards to telecommunication services, technological competencies and the projects credibility. The partners will be trained on the use of T-Mobile platform and will also get the support on the integration and testing of the services and applications designed. At the project closure, the chosen partners will be certified by T-Mobile which will engage them further in a closer collaboration. The collaboration might entail the designing products for the service operators and communication networks. The designed systems might also be exported to other communication firms and even government agencies. In all the incidences, the partners will be the sole proprietors of their applications and ideas developed. The project will be set within T-Mobile’s regional offices from Middle East and Africa. It will be open for the ideas submitted by the partners across the region. The main projects objective is to see the development and enrichment of applications and services that can be delivered through T-Mobile‘s telecommunication networks and the internet within Middle East and Africa regions. The objective is justified by its technological knowhow that makes it possible and that the designed applications and services will increase the revenue collected besides justifying the extensions of the internet access and telecom infrastructure towards the areas they serve. There is unexplored talent in the area with a myriad of these countries currently regarding the development of applications and services leveraging on the internet and telecom networks as a way of seeing rapid economic growth. The project seeks to support the local partners to achieve their dream and use them to transform the lives of the locals. The result of the initiative will be a win-win situation for the partners, T-Mobile, and locals. (Liu, 2009) As stated

Thursday, October 17, 2019

Business Law - common law question Essay Example | Topics and Well Written Essays - 3000 words

Business Law - common law question - Essay Example Law is separated into two parts which are criminal law as well as civil law (Barker, 2000). Criminal law is enacted when some harm is committed to the social order and the convict person is penalized with fines or imprisonment. Criminal law is developed from the common law as well as the statutes enacted by the government like the Crimes Act 1900 New South Wales (NSW). Most of the criminal statutes of Australia are derived from the English criminal law. Criminal law is divided into two segments which are ‘indictable offences’ as well as ‘summary offences’. ‘Indictable offences’ are the cases which are recorded in the document ‘indictment’ prepared for the ‘Crown’ (State) as prosecutor. ‘Summary offences’ are the cases which are required to be settled in front of the magistrate (Criminal law and civil law, 2012). Civil law deals with disagreements in among individuals or organizations as well as provides leg al remedy. Civil law involves cases relating to accidents as well as contracts. The civil law cases are to be settled in a court before a judge providing reasons for the actions taken in settlement of the claims (Criminal law and civil law, 2012). IRAC denotes Issue, Rule, Application as well as Conclusion. The method or framework is a valuable process to formulate legal analysis. The aspect of issue depicts the significant controversy upon which the basic foundation of the case is formulated. The section of rule or relevant law describes the prevalent laws that can be applied to the identified issue in terms of legal case scenario. The analysis section comprises the use of the relevant rule to the recognized issue. The conclusion section includes the expected outcomes of the identified issue/case. In relation to the provided scenario, the IRAC method would be applied in order to gauge the possible outcomes of the case (What is IRAC?, n.d.). According to the scenario of the case, An na was injured for apparent negligence of Michael who was driving the car under the influence of alcohol. Thus, Anna wanted to take legal actions against Michael. Issue The identified issue that would be presented to the court for trials would be a scenario which occurred in a rainy late night where Anna desired to have a lift to home from Michael rather than waiting for other taxis for commutation to home. During her travel with Michael, Anna came to know that he had consumed alcohol and he faced problems in keeping control of the vehicle. However, Anna still agreed to continue her journey with Michael on way to Anna’s home. After travelling to a certain distance, Michael lost control over the car and hit a tree. This accident resulted in causing severe injuries to Anna and Michael. Subsequent to the accident, Anna decided to sue Michael for the accident causing her injuries and moreover for the probable negligence which took place on that on behalf of Michael. Moreover, thi s case intends to emphasize on the circumstances that whether Anna will be able to sue Michael for his negligence or not in relation to the circumstance in which the accident took place. In this case, in order to succeed in the trails after suing Michael the aspects that Anna should consider and establish have also been analyzed. Rules/Relevant Law In relation to the issue of the case, Anna was provided lift by Michael who had consumed more than allowable level of alcohol which resulted in an accident causing injuries to

Personal and Private Information Exposures and Opportunities Term Paper

Personal and Private Information Exposures and Opportunities - Term Paper Example It will discuss these concerns from the perspective of protecting personal rights. The rights of companies to share information will also be discussed and the rights to have private information protected shall also be considered in this discussion. How credit agencies often skate the thin lines in privacy shall be another aspect of this paper. Case studies and measures supporting the position taken will also be presented. This paper is being carried out in order to provide a clear and well-supported discussion on rights of privacy in the current age of pervasive socialization activities. Private and personal information are now available through various access points in the internet – via social networking sites, online sales transactions, and even membership in organizations (Boyd and Heer). However, private and personal information expose individuals to various illegal internet activities including internet fraud, identity theft, harassment, phishing and similar activities. Through social networking sites alone, personal information is often available to the public and to the user’s friends (Chiaramonte and Martinez, 6). ... Networking sites, especially Facebook have come under fire for its failure to protect the privacy of its users (Coppola, et.al., 95). At one point, Facebook founder Mark Zuckerberg was severely criticized for stating that ‘privacy was dead.’ This belief epitomizes Zuckerberg lackadaisical concern for user privacy in Facebookl this would also explain why features to protect user’s privacy were not immediately laid out from the very start (Public Policy and Management). It took years and a significant amount of pressure and backlash from the social networking community for Facebook to finally relent to the installation of tighter privacy options for users. At one point, Facebook even admitted that it made the email addresses of their users available to various organizations and corporations (Lampe, et.al., 167). This practice has since been stopped by the popular social networking site. Despite the privacy settings now made available to Facebook and social network u sers, there still are risks to the exposure of the privacy of these users (Hass, 30). For one, there is still no guarantee that the social networking sites are not releasing user information to corporations for the right price. Moreover, the failure of users in utilizing the privacy features is also an issue which does not guarantee privacy and protection of users (Stutzman). Some users in Facebook are not aware that their social activities and other internet activities are often being tracked and posted in Facebook. Many websites now ask users or readers whether they are reading as Facebook users, and not knowing the implications of agreeing to Yes/No dialogue boxes, these users often just tick Yes and from then, all the articles they read, the videos they watch, and the

Wednesday, October 16, 2019

Executive summary Essay Example | Topics and Well Written Essays - 1000 words - 2

Executive summary - Essay Example The projects partners will be picked on the basis of their innovative idea with regards to telecommunication services, technological competencies and the projects credibility. The partners will be trained on the use of T-Mobile platform and will also get the support on the integration and testing of the services and applications designed. At the project closure, the chosen partners will be certified by T-Mobile which will engage them further in a closer collaboration. The collaboration might entail the designing products for the service operators and communication networks. The designed systems might also be exported to other communication firms and even government agencies. In all the incidences, the partners will be the sole proprietors of their applications and ideas developed. The project will be set within T-Mobile’s regional offices from Middle East and Africa. It will be open for the ideas submitted by the partners across the region. The main projects objective is to see the development and enrichment of applications and services that can be delivered through T-Mobile‘s telecommunication networks and the internet within Middle East and Africa regions. The objective is justified by its technological knowhow that makes it possible and that the designed applications and services will increase the revenue collected besides justifying the extensions of the internet access and telecom infrastructure towards the areas they serve. There is unexplored talent in the area with a myriad of these countries currently regarding the development of applications and services leveraging on the internet and telecom networks as a way of seeing rapid economic growth. The project seeks to support the local partners to achieve their dream and use them to transform the lives of the locals. The result of the initiative will be a win-win situation for the partners, T-Mobile, and locals. (Liu, 2009) As stated

Tuesday, October 15, 2019

Personal and Private Information Exposures and Opportunities Term Paper

Personal and Private Information Exposures and Opportunities - Term Paper Example It will discuss these concerns from the perspective of protecting personal rights. The rights of companies to share information will also be discussed and the rights to have private information protected shall also be considered in this discussion. How credit agencies often skate the thin lines in privacy shall be another aspect of this paper. Case studies and measures supporting the position taken will also be presented. This paper is being carried out in order to provide a clear and well-supported discussion on rights of privacy in the current age of pervasive socialization activities. Private and personal information are now available through various access points in the internet – via social networking sites, online sales transactions, and even membership in organizations (Boyd and Heer). However, private and personal information expose individuals to various illegal internet activities including internet fraud, identity theft, harassment, phishing and similar activities. Through social networking sites alone, personal information is often available to the public and to the user’s friends (Chiaramonte and Martinez, 6). ... Networking sites, especially Facebook have come under fire for its failure to protect the privacy of its users (Coppola, et.al., 95). At one point, Facebook founder Mark Zuckerberg was severely criticized for stating that ‘privacy was dead.’ This belief epitomizes Zuckerberg lackadaisical concern for user privacy in Facebookl this would also explain why features to protect user’s privacy were not immediately laid out from the very start (Public Policy and Management). It took years and a significant amount of pressure and backlash from the social networking community for Facebook to finally relent to the installation of tighter privacy options for users. At one point, Facebook even admitted that it made the email addresses of their users available to various organizations and corporations (Lampe, et.al., 167). This practice has since been stopped by the popular social networking site. Despite the privacy settings now made available to Facebook and social network u sers, there still are risks to the exposure of the privacy of these users (Hass, 30). For one, there is still no guarantee that the social networking sites are not releasing user information to corporations for the right price. Moreover, the failure of users in utilizing the privacy features is also an issue which does not guarantee privacy and protection of users (Stutzman). Some users in Facebook are not aware that their social activities and other internet activities are often being tracked and posted in Facebook. Many websites now ask users or readers whether they are reading as Facebook users, and not knowing the implications of agreeing to Yes/No dialogue boxes, these users often just tick Yes and from then, all the articles they read, the videos they watch, and the

Understanding Three Psalms of the Old Testament Essay Example for Free

Understanding Three Psalms of the Old Testament Essay Psalm 78 and Psalm 89 are both referred to as â€Å"maskils. † According to Gordon Churchyard (2004), a maskil may be the name given to verses that teach their readers something of value. The Book of Psalms published by the International Bible Society in the United States, however, explains the word â€Å"maskil† as a literary or musical term (Psalm 78, 1984). The fact remains, though, that every psalm of the Old Testament is unique as a teaching tool of religion. Although neither Psalm 78 nor Psalm 89 have been written by David, and Bible commentators guess that Psalm 132 might have been written by Solomon, the regal heir of King David, all three psalms have an extraordinary message to convey to the believer who may be reminded of the duties of man toward God, and the latter’s promises made to man, through these psalms (Churchyard). Psalm 78 is said to have been written 720 years before the holy birth of Jesus Christ (Churchyard). This maskil of Asaph is a story about the Children of Israel from their experience of slavery under the mighty pharaoh of Egypt until their time under King David, the opposite of the pharaoh in God’s perspective. This psalm is a reminder to the Children of Israel that the God who saved them from the clutches of slavery is ever prepared to rescue them from all troubles, provided that their hearts are loyal to Him, and their spirits are faithful to Him. In the beginning of the psalm, Asaph relates that this reminder is most important for the future generations of Israel, who are expected to be more loyal and faithful to God than were their forefathers. As a matter of fact, their forefathers had proved to be quite disobedient to God. Despite the fact that He showed them miracle after miracle especially at the time of Moses, who was the chosen one of God to lead the Children of Israel out of the clutches of slavery, the Children of Israel expressed doubts in their beliefs about the faithful love of God. Whereas He continued to UNDERSTANDING THREE PSALMS OF THE OLD TESTAMENT Page # 2 shower His blessings upon them, they refused to believe in Him with the absolute faithfulness that should have appeared to them as a necessity given the extraordinary miracles they were being made to witness (Psalm 78). The Children of Israel kept on doubting the love and faithfulness of God even though He had, among other things, punished their enemies by turning their water into blood, and had helped out the Children of Israel in the desert by letting springs flow out of a rock. â€Å"In spite of all this, they kept on sinning;† reads the psalm, â€Å"in spite of His wonders, they did not believe. † The psalm reminds the reader that the consequences of unbelief could be fatal: â€Å"So He ended their days in futility/ and their years in terror. † The Children of Israel had also turned to idol worship despite the physical evidence of God’s care for them. So, God took revenge because He is a jealous God (Psalm 78). Psalm 78 also reminds the reader of the mercy of God when it reads: â€Å"Time after time He restrained His anger/ and did not stir up His full wrath. / He remembered that they were but flesh/ a passing breeze that does not return. † Even though God could have eradicated everybody who showed unfaithfulness to Him, He decided not to do so, seeing as the Children of Israel were not a threat to Him. Moreover, it can be understood from the psalm that God wanted the future generations of Israel to benefit from the teachings and miracles of the earlier generations. Thus, He replaced the pharaoh’s leadership over Israel with David’s godly leadership, once again, as a mercy to Israel. Psalm 78, therefore, ends on a hopeful note: â€Å"And David shepherded them with integrity of heart/ with skillful hands he led them† (Psalm 78). UNDERSTANDING THREE PSALMS OF THE OLD TESTAMENT Page # 3 Psalm 89 also brings King David to mind when the writer of the maskil reminds God of the covenant He had made with His servant, David. Bible commentators believe that this maskil was composed by three different people in three separate periods of time (Churchyard). All the same, the psalm serves as a teaching instrument of religion explaining that it is not God who breaks His promises, but man who refuses to keep His commands time after time (Psalm 89, 1984). God had promised David that He would take special care of His servant as well as his descendants who kept the law of the Lord. Thus, the psalm glorifies God for His covenant, and expresses that the only fortunate people are those that know how to glorify God. Besides, the heavens and everything on earth glorifies the Lord, and the angels too are busy praising Him. Everything is obedient to God. It is only man that has been given the right to oppose God’s law and commandments. Hence, one of the descendants of David, the â€Å"anointed one,† is being ridiculed by his enemies apparently because he has violated the decrees of God. Although the psalm does not provide any information about why the â€Å"anointed one† is being punished, it can be inferred that God is not quickly coming to his rescue because the man has disobeyed the Lord. After all, God had spoken about David: â€Å"If his sons forsake my law/ and do not follow my statutes,/ if they violate my decrees/ and fail to keep my commands,/ I will punish their sin with the rod,/ their iniquity with flogging†¦. (Psalm 89)† God remains faithful to His promise. He would not punish a descendent of David without a genuine reason. God is fair, which is the reason why the psalmist appeals to God toward the end of the maskil with a desperation that may only be reduced or eliminated by the loving mercy of UNDERSTANDING THREE PSALMS OF THE OLD TESTAMENT Page # 4 the Lord. Before praising God and ending the psalm with His praise, the psalmist once again reminds God about the faithfulness He showed toward His servant, David. He also refers to God’s â€Å"great former love† for David. Still, it is expected that God would not go against His promise made to David, which included punishment for his descendants that disobeyed the Lord. The psalmist insists, however, on being forgiven once and for all because he finds that God’s punishments are truly unbearable: â€Å"How long, O Lord? Will you hide yourself forever? / How long will your wrath burn like fire? / Remember how fleeting is my life. / For what futility you have created all men! † The psalmist continues to remind God about his condition despite the fact that God is all-knowing at all times: â€Å"Remember, Lord, how your servant has been mocked,/ how I bear in my heart the taunts of all the nations,/ the taunts with which your enemies have mocked, O Lord,/ with which they have mocked every step of your anointed one† (Psalm 89). Psalm 89 ends with praise of God, informing the reader that the â€Å"anointed one† with his complaints and desperate pleas nevertheless understands that God must be praised despite the pain that the â€Å"anointed one† is suffering from. In other words, God punishes for a wise reason, and even if man does not fully understand his flaws it is important for him to praise God before He answers the prayers of the suffering man. God cannot be blamed for suffering. Rather, man must learn to glorify Him despite the suffering, and thereby open the channel of communication with God who is expected to sooner or later deliver the believer from suffering (Psalm 89). This is, indeed, the most important teaching of this psalm. Psalm 132 also acts as a reminder of the covenant that God made with His servant, David: â€Å"One of your own descendants/ I will place on your throne / if your sons keep my covenant/ UNDERSTANDING THREE PSALMS OF THE OLD TESTAMENT Page # 5 and the statutes I will teach them,/ then their sons will sit/ on your throne for ever and ever. † Another point of similarity between Psalm 89 and Psalm 132 is that both act as pleas for God’s mercy for the sake of David. Thus, Psalm 132 reads: â€Å"For the sake of David your servant,/ do not reject your anointed one. † Yet, this psalm does not offer any complaints or desperate pleas unto God. Rather, this is the â€Å"song of ascents† or the â€Å"song of climbing† that mostly serves to remind the reader of the special importance of Zion and of Israel as a whole in God’s plan (Psalm 132, 1984; Churchyard). The song of ascents discusses the temple of God that David had been planning to build, but which was only completed in Solomon’s time. More than four hundred years after Solomon, Ezra and Nehemiah rebuilt the temple of God, which is why Bible commentators believe that this psalm may have been written by Nehemiah or Ezra if not by Solomon (Churchyard). In any case, the psalm identifies Zion as the dwelling place of the God of Israel, a place of ultimate bliss on earth where abundance would replace poverty and the enemies of God would be crushed â€Å"with shame†. The psalmist agrees that the temple of God and Zion are the places where God must be sincerely worshipped. He invites God to His own dwelling place. Moreover, he prays for the sincere ones of God, His priests and His saints, who would all worship the Lord together in His dwelling place (Psalm 132). Although Psalm 132 does not make a complaint, the fact that it starts out with the remembrance of David, â€Å"O Lord, remember David/ and all the hardships he endured,† allows the reader to infer that David is acting as a spiritual intercessor of his people just as the Messiah is for the Christians. The song of ascents is essentially a song of worship, a reminder to God that UNDERSTANDING THREE PSALMS OF THE OLD TESTAMENT Page # 6 His people remember how to praise and worship Him. Furthermore, His people would like Him to answer their needs with the mention of one of His favorite chosen ones, David (Psalm 132). Thus, all three psalms serve their unique purposes: Psalm 78 as a reminder about the importance of faithfulness and obedience to God; Psalm 89 as a desperate plea made to God with His praise; and Psalm 132 as a reminder to God that His people remember how to worship Him, and still seek His special mercy that was previously shown to David. References Churchyard, Gordon. (2004). â€Å"Free Bible Commentary on Psalm 78, Psalm 89, Psalm 132 in Simple English. † Easy English. Available at http://www. easyenglish. info/. (22 April 2007). 2. â€Å"Psalm 78. † (1984). The Book of Psalms. Colorado Springs, CO: International Bible Society, p. 70-73. 3. â€Å"Psalm 89. † (1984). The Book of Psalms. Colorado Springs, CO: International Bible Society, p. 81-83. 4. â€Å"Psalm 132. † (1984). The Book of Psalms. Colorado Springs, CO: International Bible Society, p. 123-124.

Monday, October 14, 2019

A new car, a new choice

A new car, a new choice A New Car, a New Choice For most teenagers, only one thing is on their mind when they turn 16: being able to drive. I remember ever since I received my learners permit, I couldnt wait to drive on my own. I looked forward to driving as fast as I wanted and blasting music with the windows rolled down; I of course couldnt do this with one of my parents in the passengers seat. When I turned 16, I not only obtained my drivers license, but I was also lucky enough to receive a new car. Now I know what youre thinking, and I assure you that I am not just a spoiled rich kid who gets everything handed to him from his parents. My family only owned two cars at the time and being the oldest of four children, I would only be one of the many future drivers; owning only two cars just wasnt enough. One of the fun parts about acquiring the new car was that I had some input in the selection process. My parents narrowed the choices down to a Toyota 4Runner and a Jeep Grand Cherokee and allowed me to help them with the final dec ision. After comparing and contrasting both vehicles, we decided to go with the Toyota 4Runner. Despite the Jeep Grand Cherokee having better performance and many similarities with the 4Runner, my parents and I chose the 4Runner because of its safety, price, and our loyalty to Toyota. The first thing I did when I was comparing the two cars was look at the performance of each vehicle. The Jeep Grand Cherokee has 210 horsepower which is extremely high for an SUV, especially compared to the 4Runners measly 157 horsepower. I really liked the fact that the Grand Cherokee has a lot of power and was able to go pretty fast. The Grand Cherokee packs quite a wallop compared to the 4Runner with respect to torque, which is the force that lets you accelerate quickly. Torque equals pickup, and the Grand Cherokee will have picked up and left by the time the 4Runner finally gets moving. Horsepower and torque was not high on my parents priority list though, they actually thought the Grand Cherokee had too much power. They also explained that bigger engines use more gasoline than smaller ones, meaning that the 4Runner gets better gas mileage. I looked up the statistics to see if they were right and sure enough I found out the 4Runner has an 18/23 city to highway miles per gallon wh ile the Grand Cherokee only has a 16/21 city to highway miles per gallon. Another important aspect of the performance is the handling of the vehicle. With their comparable turning radii, the Grand Cherokee and the 4Runner handle about the same. The Grand Cherokee may edge out the 4Runner in power, but the 4Runner has the advantage with gas mileage, a factor that my parents really care about since they pay for gas. Despite my preference with the Grand Cherokee in the performance category, my parents had the final decision and gave the advantage to the 4Runner. Another category my parents and I looked at when deciding between the two cars was safety. After looking up safety statistics, we found out that the 4Runner has one of the highest safety-crash ratings for an SUV. The Grand Cherokee on the other hand, received average ratings. My parents claimed that safety was one of their top priorities especially since I was just beginning to drive. They told me that according to the National Highway Traffic Safety Administration, more than 7,000 people aged 15 to 20 are involved in fatal crashes a year. My parents did their research and wanted to make sure I was as safe as possible out on the road. The Grand Cherokee is a reliable vehicle and received decent safety reviews, but with the 4Runner, they could feel more comfortable knowing I was in a safer vehicle. When referring to size, neither the 4Runner nor the Grand Cherokee has a marked advantage as far as seating capacity. While the front cabin in the Grand Cherokee offers a bit more head room than the 4Runner, there honestly isnt much of a difference. The Grand Cherokee provides more head and leg room to passengers than the 4Runner does, but the difference wasnt big enough to affect our decision. Both cars have the same seating capacity, being able to seat 5 passengers. The 4Runner though is likely a better choice than the Grand Cherokee when it comes to transporting cargo but the Grand Cherokee out tows the 4Runner by a massive margin. My parents and I didnt take these factors into consideration because I wouldnt be using the car to transport cargo or tow objects, so we didnt really look into size or utility that much due to the similarities. The last categories my parents and I looked at were the price and the manufacturer. The introductory price for the 4Runner is $27,500, while the price for the Grand Cherokee is $30,710, making the 4Runner $3,210 cheaper. On top of the 4Runner being cheaper, the Grand Cherokee requires more trips to the pump, meaning more money would be spent on gas with the Grand Cherokee. The prices state that they also do not include destination charges. After doing more research, we found out that the destination charge is a standard charge for transporting the vehicle from its point of origin to the dealer. It costs almost the same to get the Grand Cherokee to the dealership as the 4Runner so we didnt take that much into consideration. What we did take into heavy consideration though was the manufacturer. My family has always bought Toyota vehicles. We currently own a Toyota Sequoia and a Toyota Camry and even before those two cars, both my parents had always owned a Toyota vehicle. My parents cl aim that they like the reliability and they are very reluctant to change so until one of the cars break down or cause them trouble, we will probably continue to buy from Toyota. Seeing how the 4Runner is manufactures by Toyota, it pretty much sealed the deal. After considering both vehicles and all their pros and cons, my parents and I agreed on the 4Runner. Despite the performance of the 4Runner not being up to par with the Grand Cherokee, the rest of the factors made me favor the 4Runner and to this day Im glad we went with the 4Runner. My parents loved every aspect of the 4Runner and believe it was a perfect fit for me and the rest of my siblings down the road. It still drives great and I love all the features of the vehicle. I dont know how different it would be if we had decided on the Grand Cherokee, but comparing and contrasting the two vehicles really helped us pick the car that best suited our family. With the combination of good gas mileage, safety, price, and the Toyota brand name the 4Runner seemed like a perfect fit.

Sunday, October 13, 2019

John Calvins contribution to the church :: essays research papers

John Calvin "We must remember that Satan has his miracles, too."-John Calvin.1 Mr. John Calvin was the leading French Protestant Reformer and the most important figure in the second generation of the Protestant Reformation.2 He was a contributing catholic. We see why and how he was suck a good religious man by his backround, biography, and contributions to Christianity. He created a thing called "Calvinism"3 which helped form Christianity. His life was certainly a remarkable one. John Calvin's life started on July Tenth, 1509 in Noyon, in picardy, France.4 He was born of two middle class parents. His father was a lay administrator in service of the local bishop.5 So, in Calvin's early years he was immediatly exposed to Catholicism. His native town was an old cathedral city whose bishop was its ruler and was at the same time one of the twelve Peers of France.6 Calvin's mother died very soon in Calvin's life, not much is known about her except she had a great reputation for piety.7 Calvin's life started off with a lot of religion surrounding him. In the years that Calvin was alive there were many govermental factors effecting his childhood as well. At the time of his birth until 1525, the throne of Noyon was occupied by Charles de Hangest who belonged to the nobility of the neighbourhood.8 A lot of his family members were involved in Catholicism, such connections were not without effect upon young Calvin. Growing up John Calvin was not an only child. His father married a young bourgeois, Jeanne Lefranc, who bore him four sons, Charles, Jean (John), Antoine and Francois. They also had two daughters, Marie and another whose name is unknown.9 Francois died at an early age, Charles became a priest and died excommunicated in 1537.10 Marie and Antoine followed the reformer to Geneua, where Antoine assisted his brother in his literary work.11 Clavin's father had great amibitions for his sons and especially for Jean, also known as John. John Calvin's father pressured his to study Law but in 1531 his father died giving Calvin the freedom to resume his religious studies.

Saturday, October 12, 2019

The Pursuit of Happiness in Fahrenheit 451 :: Fahrenheit 451 Essays

Happiness plays an important and necessary role in the lives of people around the world. In America, happiness has been engrained in our national consciousness since Thomas Jefferson penned these famous words in the Declaration of Independence: â€Å"We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable rights, that among these are Life, Liberty and the pursuit of Happiness† (Jefferson). Since then, Americans have been engaged in that act: pursuing happiness. The problem however, as Ray Bradbury demonstrates in his novel Fahrenheit 451, is that those things which make us happy initially may eventually lead to our downfall. By examining Guy Montag, the protagonist in Fahrenheit 451, and the world he lives in we can gain valuable insights to direct us in our own pursuit of happiness. From Montag and other characters we will learn how physical, emotional, and spiritual happiness can drasti cally affect our lives. We must ask ourselves what our lives, words, and actions are worth. We should hope that our words are not meaningless, â€Å"as wind in dried grass† (Eliot). History Before we look into specifics, we’ll examine the history and development of â€Å"happiness† as a philosophy. Of course, the emotion of happiness has always existed, but it began to be seriously contemplated around 2,500 years ago by philosophers like Confucius, Buddha, Socrates and Aristotle. Shortly after Buddha taught his followers his Noble Eight Fold Path (which we will talk about later), Aristotle was teaching that happiness is â€Å"dependent on the individual† (Aristotle). Probably more than any of the early philosophers, Aristotle promoted happiness as a central component of human life. The Greeks used a term, eudaimonia, which is often used as the Greek word for happiness. However, most scholars translate it as â€Å"human flourishing† or â€Å"well-being of the spirit.† Along with eudaimonia, terms like arete, â€Å"virtue†, and phronesis, â€Å"practical or moral wisdom†, are at the core of Greek philosophy. So if you could have asked Aristotle â€Å"What components or values must a person have in order to live a fulfilling life?† He probably would have answered, â€Å"Virtue, wisdom, and spiritual well-being.† Would Aristotle have been pleased with the futuristic world of Fahrenheit 451? Probably not. Certainly, the lack of virtue, learning, and the false sense of happiness would have astonished any of the early philosophers. Physical Happiness

Friday, October 11, 2019

Internal and External Sources of Finance Essay

I will explain the different sources of finance, some of which are internal and external to the Loxford Business unit. I will state the advantages and disadvantages of each of the sources of finance. Loxford Business Unit use both internal and external sources to get money in order to run the Business Unit successfully. Source of Finance Definition Internal or external Advantages Disadvantages Applicable to the Loxford Business Unit Retained Profits An amount of money saved aside from the business earning to be used when necessary. Internal The money doesn’t have to be repaid and there is no interest. Also they are flexible as management -have complete control over how the money is reinvested and what portion is kept rather than paid as dividends. The disadvantages are: There will unhappy shareholders as they will receive lower dividends. Also retained profit is not available for new business as they main aim will be to survive and break even, so therefore they will either make no profit or little profit. The Loxford Business will only use retained profit if the amount is large enough, if not then there will be no need to use the retained profit. Owners Savings Money from the owner’s personal savings. Internal Cheap – because there is no interest that has to be paid. Flexible – the money can be used for whatever reasons the owner please. The disadvantages are: It is risky – as you may waste your money. Not enough money – The money may not be enough. The Loxford Business Unit may use the owners fund if there is enough available however in order for the business to expand successfully the owners fund may not be enough. Overdraft A loan arrangement under which the bank extends credit up to a maximum amount. External Flexible- there when needed, Efficient – allows a business to make essential payments and maintains cash flow. Quick – quick and easy to arrange. Useful temporary cash The disadvantages are: Costs- overdrafts carry interest is often at much higher rates than loans, therefore making it expensive for a business for long-term borrowing. Recall – Unless specified in the terms and conditions, the bank can recall the entire overdraft at any time. This may happen if you fail to make other payments, or if you have broken terms and conditions; though sometimes the banks simply change their policies. They are terms and conditions. The Loxford Business Unit may use an overdraft as its quick process so it will give the business immediate money. Also this type of finance is suitable because the money will be available when needed. Venture Capital Money provided by investors to start up firms. External Willingness -The investors are more willing to invest. Gain information – The investors are a valuable source of information, advice and resources. Value added services – such as mentoring, alliances and advice. Provides funding that a business company needs to expand its business. The disadvantages are: Control- the investors will expect a say in decisions. Long process- It can be a long and complicated process. Lots of paper work required to provide such as a business plan, including financial records. Accounting Fee -The business will have to pay legal accounting fees whether or not they will successful in securing funds. Loxford Business Unit may use a venture capitalist for professional help and advice about achieving the necessary grades although this process will be long and complicated, it will be worth it in the long-term because it mean that students will achieve good grades overall. Bank Loan Borrowing money from the bank over a period of time which is then to be paid back with interest. External Reliability – Loans are very reliable and secure, you are assured the money for the duration of the loan (unless you break terms and conditions). Complicated process- Must have right documentations such as business plan and cash flow forecast. Money will be paid back with interest. A bank loan will be efficient for the Loxford Baines Unit because they will be given a large sum of money, which is to be paid back slowly and in instalments.