Thursday, November 28, 2019

Introduction Essays (646 words) - Religion, Transcendentalism

Introduction Ralph Waldo Emerson "...was truly one of our great geniuses" even though he may have a short biography (Hodgins 212). But as Emerson once said himself, "Great geniuses have the shortest biographies." Emerson was also a major leader of "the philosophical movement of Transcendentalism". (Encarta 1) Transcendentalism was belief in a higher reality than that found everyday life that a human can achieve. Biographical Information Emerson was born on May 25, 1803 in Boston, Massachusetts. His father died when he was young and his mother was left with him and his four other siblings. At the age of 18 he graduated from Harvard University and was a teacher for three years in Boston. Then in 1825 he entered Harvard Divinity School and preached for three years. At the age of 29 he resigned for ministry, partly because of the death of his wife after only 17 months of marriage. In 1835 he married Lydia Jackson and started to lecture. Then in 1836, he helped to start the Transcendental Club. The Transcendental Club was formed for authors that were part of this historical movement. Emerson was a big part of this and practically initiated the entire club. As we know he was already a major part of the movement and know got himself involved more. Many people and ways of life throughout his career including Neoplatonism, the Hindu religion, Plato and even his wife influenced Emerson. He also inspired many Transcendentalists like Thoreau. Emerson didn't win any major awards, but he did win the love and appreciation of his readers. Literary Information Emerson wrote many genres of writing including poetry and sermons, but his best writing is found in his essays. Even though he is noted for his essays, he was also a strong force in poetry. Emerson was known for presenting ideas in an expressive style. He wrote about numerous issues including nature, society, conspiracy and freedom. After returning to America after a visit to England, he wrote for the abolitionist cause, which was eliminating slavery. Emerson used these ideas in his 1837 lecture "The American Scholar," which he presented before the Phi Beta Kappa Society of Harvard. In it he talked about Americans becoming more intelligently independent. In a second address, commonly referred to as the "Address at Divinity College," given in 1838 to the graduating class of Cambridge Divinity College, brought about a problem because it attacked religion and pushed independence. Some of Emerson's famous titles are "Essays", which was published in 1844, Poems, which was published in 1847, "Nature: Addresses and Lectures", 1849, and "Representative Men", 1850. In 1860, he published "Conduct of Life", which was the first of his works to receive immediate popularity. In these works you were able to see the influence Plato and Neoplatonism had of him. "Plato was an ancient Greek philosopher. He developed the notion of a higher reality that exists beyond the powers of human comprehension. Plato explained that the idea of absolute goodness transcends human description. Neoplantonism was a collective designation for the philosophical and religious doctrines of a heterogeneous school of speculative thinkers who sought to develop and synthesize the metaphysical ideas of Plato" (Encarta). Ralph Waldo Emerson found motivation to write in anything he did, whether it was visiting England, the Transcendental Movement or if it was abolishing slavery. He didn't receive much fame during his lifetime, but after he passed away in1882, he was remembered for all of his writing, not just one good essay. "Emerson was the most important figure during the Romantic Period" (Myerson 3). He left his mark on writing, especially the Romantic Period. Bibliography "Emerson, Ralph Waldo." Microsoft Encarta. CD-ROM. 1998 ed. "Emerson, Ralph Waldo." Lkd. Columbia University Homepage, at "ILT Web." http://www.ilt.columbia.edu/acedemic/digitexts/emerson/bio_emerson.html Hodgins, Francis. ed. Adventures in American Literature. Orlando: Harcourt, 1989. Myerson, Joel. "Ralph Waldo Emerson." Grolier Encyclopedia. CD-ROM. 1993 ed.

Sunday, November 24, 2019

World War I Campaigns of 1917

World War I Campaigns of 1917 In November 1916, Allied leaders again met at Chantilly to devise plans for the coming year. In their discussions, they determined to renew the fighting on the 1916 Somme battlefield as well as mount an offensive in Flanders designed to clear the Germans from the Belgian coast. These plans were quickly altered when General Robert Nivelle replaced General Joseph Joffre as commander-in-chief of the French Army. One of the heroes of Verdun, Nivelle was an artillery officer who believed that saturation bombardment coupled with creeping barrages could destroy the enemys defenses creating rupture and allowing Allied troops to break through to the open ground in the German rear. As the shattered landscape of the Somme did not offer suitable ground for these tactics, the Allied plan for 1917 came to resemble that of 1915, with offensives planned for Arras in the north and the Aisne in the south. While the Allies debated strategy, the Germans were planning to change their position. Arriving in the West in August 1916, General Paul von Hindenburg and his chief lieutenant, General Erich Ludendorff, began construction of a new set of entrenchments behind the Somme. Formidable in scale and depth, this new Hindenburg Line reduced the length of the German position in France, freeing ten divisions for service elsewhere. Completed in January 1917, German troops began shifting back to the new line in March. Watching the Germans withdraw, Allied troops followed in their wake and constructed a new set of trenches opposite the Hindenburg Line. Fortunately for Nivelle, this movement did not affect the areas targeted for offensive operations (Map). America Enters the Fray In the wake of the Lusitania sinking in 1915, President Woodrow Wilson had demanded that Germany cease its policy of unrestricted submarine warfare. Though the Germans had complied with this, Wilson began efforts to bring the combatants to the negotiating table in 1916. Working through his emissary Colonel Edward House, Wilson even offered the Allies American military intervention if they would accept his conditions for a peace conference before the Germans. Despite this, the United States remained decidedly isolationist at the beginning of 1917 and its citizens were not eager to join what was seen as a European war. Two events in January 1917 set in motion a series of events which brought the nation into the conflict. The first of these was the Zimmermann Telegram which was made public in the United States on March 1. Transmitted in January, the telegram was a message from German Foreign Secretary Arthur Zimmermann to the government of Mexico seeking a military alliance in event of war with the United States. In return for attacking the United States, Mexico was promised the return of territory lost during the Mexican-American War (1846-1848), including Texas, New Mexico, and Arizona, as well as substantial financial assistance. Intercepted by British naval intelligence and the US State Department, the contents of the message caused widespread outrage among the American people. On December 22, 1916, the Chief of Staff of the Kaiserliche Marine, Admiral Henning von Holtzendorff issued a memorandum calling for the resumption of unrestricted submarine warfare. Arguing that victory could only be achieved by attacking Britains maritime supply lines, he was quickly supported by von Hindenburg and Ludendorff. In January 1917, they convinced Kaiser Wilhelm II that the approach was worth the risk of a break with the United States and submarine attacks resumed on February 1. The American reaction was swift and more severe than anticipated in Berlin. On February 26, Wilson asked Congress for permission to arm American merchant ships. In mid-March, three American ships were sunk by German submarines. A direct challenge, Wilson went before a special session of Congress on April 2 declaring that the submarine campaign was a war against all nations and asked that war be declared with Germany. This request was granted on April 6 and subsequent declarations of war were issu ed against Austria-Hungary, the Ottoman Empire, and Bulgaria. Mobilizing for War Though the United States had joined the fight, it would be some time before American troops could be fielded in large numbers. Numbering only 108,000 men in April 1917, the US Army began a rapid expansion as volunteers enlisted in large numbers and a selective draft instituted. Despite this, it was decided to immediately dispatch an American Expeditionary Force composed of one division and two Marine brigades to France. Command of the new AEF was given to General John J. Pershing. Possessing the second-largest battle fleet in the world, the American naval contribution was more immediate as US battleships joined the British Grand Fleet at Scapa Flow, giving the Allies a decisive and permanent numerical advantage at sea. The U-boat War As the United States mobilized for war, Germany began its U-boat campaign in earnest. In lobbying for unrestricted submarine warfare, Holtzendorff had estimated that sinking 600,000 tons per month for five months would cripple Britain. Rampaging across the Atlantic, his submarines crossed the threshold in April when they sunk 860,334 tons. Desperately seeking to avert disaster, the British Admiralty tried a variety of approaches to stem the losses, including Q ships which were warships disguised as merchantmen. Though initially resisted by the Admiralty, a system of convoys was implemented in late April. The expansion of this system led to reduced losses as the year progressed. While not eliminated, convoys, the expansion of air operations, and mine barriers worked to mitigate the U-boat threat for the remainder of the war. The Battle of Arras On April 9, the commander of the British Expeditionary Force, Field Marshal Sir Douglas Haig, opened the  offensive at Arras. Beginning a week earlier than Nivelles push to the south, it was hoped that Haigs attack would draw German troops away from the French front. Having conducted extensive planning and preparation, the British troops achieved great success on the first day of the offensive. Most notable was the swift capture of Vimy Ridge by General Julian Byngs Canadian Corps. Though advances were achieved, planned pauses in the attack hampered the exploitation of successful assaults. The next day, German reserves appeared on the battlefield and fighting intensified. By April 23, the battle had devolved into the type of attritional stalemate that had become typical of the Western Front. Under pressure to support Nivelles efforts, Haig pressed the offensive as casualties mounted. Finally, on May 23, the battle was brought to an end. Though Vimy Ridge had been taken, the strateg ic situation had not changed dramatically. The Nivelle Offensive To the south, the Germans faired better against Nivelle. Aware that an offensive was coming due to captured documents and loose French talk, the Germans had shifted additional reserves to the area behind the Chemin des Dames ridge in Aisne. In addition, they employed a system of flexible defense which removed the bulk of the defensive troops from the front lines. Having promised victory within forty-eight hours, Nivelle sent his men forward through rain and sleet on April 16. Pressing up the wooded ridge, his men were not able to keep up with the creeping barrage that was intended to protect them. Meeting increasingly heavy resistance, the advance slowed as heavy casualties were sustained. Advancing no more than 600 yards on the first day, the offensive soon became a bloody disaster (Map). By the end of the fifth day, 130,000 casualties (29,000 dead) had been sustained and Nivelle abandoned the attack having advanced around four miles on a sixteen-mile front. For his failure, he was relieved on April 29 and replaced by  General Philippe Pà ©tain. Discontent in the French Ranks In the wake of the failed Nivelle Offensive, a series of mutinies broke out in the French ranks. Though more along the lines of military strikes than traditional mutinies, the unrest manifested itself when fifty-four French divisions (nearly half the army) refused to the return to the front. In those divisions which were affected, there was no violence between the officers and men, simply unwillingness on the part of the rank and file to maintain the status quo. Demands from the mutineers generally were characterized by requests for more leave, better food, better treatment for their families, and a halt to offensive operations. Though known for his abrupt personality, Pà ©tain recognized the severity of the crisis and took a soft hand. Though unable to openly state that offensive operations would be halted, he implied that this would be the case. In addition, he promised more regular and frequent leave, as well as implementing a defense in depth system which required fewer troops in the front lines. While his officers worked to win back the mens obedience, efforts were made to round up the ringleaders. All told, 3,427 men were court-martialed for their roles in the mutinies with forty-nine executed for their crimes. Much to Pà ©tains fortune, the Germans never detected the crisis and remained quiet along the French front. By August, Pà ©tain felt confident enough to conduct minor offensive operations near Verdun, but much to the mens pleasure, no major French offensive occurred prior to July 1918. The British Carry the Load With French forces effectively incapacitated, the British were forced to bear the responsibility for keeping the pressure on the Germans. In the days after the Chemin des Dames debacle, Haig began seeking a way to relieve pressure on the French. He found his answer in plans that General Sir Herbert Plumer had been developing for capturing Messines Ridge near Ypres. Calling for extensive mining under the ridge, the plan was approved and Plumer opened the  Battle of Messines  on June 7. Following a preliminary bombardment, explosives in the mines were detonated vaporizing part of the German front. Swarming forward, Plumers men took the ridge and rapidly achieved the operations objectives. Repelling German counterattacks, British forces built new defensive lines to hold their gains. Concluding on June 14, Messines was one of the few clear-cut victories achieved by either side on the Western Front (Map). The Third Battle of Ypres (Battle of Passchendaele) With the success at Messines, Haig sought to revive his plan for an offensive through the center of the Ypres salient. Intended to first capture the village of Passchendaele,  the offensive  was to break through the German lines and clear them from the coast. In planning the operation, Haig was opposed Prime Minister David Lloyd George who increasingly wished to husband British resources and await the arrival of large numbers of American troops before launching any major offensives on the Western Front. With the support of Georges principal military advisor, General Sir William Robertson, Haig was finally able to secure approval. Opening the battle on July 31, British troops attempted to secure the Gheluvelt Plateau. Subsequent attacks were mounted against Pilckem Ridge and Langemarck. The battlefield, which was largely reclaimed land, soon degenerated into a vast sea of mud as seasonal rains moved through the area. Though the advance was slow, new bite and hold tactics allowed the British to gain ground. These called for short advances supported by massive amounts of artillery. Employment of these tactics secured objectives such as the Menin Road, Polygon Wood, and Broodseinde. Pressing on despite heavy losses and criticism from London, Haig secured Passchendaele on November 6. Fighting subsided four days later (Map). The Third Battle of Ypres became a symbol of the conflicts grinding, attritional warfare and many have debated the need for the offensive. In the fighting, the British had made a maximum effort, sustained over 240,000 casualties, and failed to breach the German defenses. While these losses coul d not be replaced, the Germans had forces in the East to make good their losses. The Battle of Cambrai With the fighting for Passchendaele devolving into a bloody stalemate, Haig approved a plan presented by General Sir Julian Byng for a  combined attack against Cambrai  by the Third Army and the Tank Corps. A new weapon, tanks have not previously been massed in large numbers for an assault. Utilizing a new artillery scheme, Third Army achieved surprise over the Germans on November 20 and made quick gains. Though achieving their initial objectives, Byngs men had difficulty exploiting the success as reinforcements had trouble reaching the front. By the next day, German reserves began arriving and fighting intensified. British troops fought a bitter battle to take control of Bourlon Ridge and by November 28 began digging in to defend their gains. Two days later, German troops, utilizing stormtrooper infiltration tactics, launched a massive counterattack. While the British fought hard to defend the ridge in the north, the Germans made gains in the south. When the fighting ended on De cember 6, the battle had become a draw with each side gaining and losing about the same amount of territory. The fighting at Cambrai effectively brought operations on the Western Front to a close for the winter (Map). In Italy To the south in Italy, the forces of General Luigi Cadorna continued attacks in the Isonzo Valley. Fought in May-June 1917, the Tenth Battle of the Isonzo and gained little ground. Not to be dissuaded, he opened the Eleventh Battle on August 19. Focusing on the Bainsizza Plateau, Italian forces made some gains but could not dislodge the Austro-Hungarian defenders. Suffering 160,000 casualties, the battle badly depleted Austrian forces on the Italian front (Map). Seeking help, Emperor Karl sought reinforcements from Germany. These were forthcoming and soon a total of thirty-five divisions opposed Cadorna. Through years of fighting, the Italians had taken much of the valley, but the Austrians still held two bridgeheads across the river. Utilizing these crossings, German General Otto von Below attacked on October 24, with his troops employing stormtrooper tactics and poison gas. Known as the  Battle of Caporetto, von Belows forces broke into the rear of the Italian Second Army and cau sed Cadornas entire position to collapse. Forced into headlong retreat, the Italians attempted to make a stand at the Tagliamento River but were forced back when the Germans bridged it on November 2. Continuing the retreat, the Italians finally halted behind the Piave River. In achieving his victory, von Below advanced eighty miles and had taken 275,000 prisoners. Revolution in Russia The beginning of 1917 saw troops in the Russian ranks expressing many of the same complaints offered by the French later that year. In the rear, the Russian economy had reached a full war footing, but the boom that resulted brought about rapid inflation and led to the break down of the economy and infrastructure. As food supplies in Petrograd dwindled, unrest increased leading to mass demonstrations and a revolt by the Tsars Guards. At his headquarters in Mogilev, Tsar Nicholas II was initially unconcerned by events in the capital. Beginning on March 8, the February Revolution (Russia still used the Julian calendar) saw the rise of a Provisional Government in Petrograd. Ultimately convinced to abdicate, he stepped down on March 15 and nominated his brother Grand Duke Michael to succeed him. This offer was refused and the Provisional Government took power. Willing to continue the war, this government, in conjunction with the local Soviets, soon appointed Alexander Kerensky Minister of War. Naming General Aleksei Brusilov Chief of Staff, Kerensky worked to restore the spirit of the army. On June 18, the Kerensky Offensive began with Russian troops striking the Austrians with the goal of reaching Lemberg. For the first two days, the Russians advanced before the lead units, believing they had done their part, halted. Reserve units refused to move forward to take their place and mass desertions began (Map). As the Provisional Government faltered at the front, it came under attack from the rear from returning extremists such as Vladimir Lenin. Aided by the Germans, Lenin had arrived back in Russia on April 3. Lenin immediately began speaking at Bolshevik meetings and preaching a program of non-cooperation with the Provisional Government, nationalization, and an end to the war. As the Russian army began to melt away at the front, the Germans took advantage and conducted offensive operations in the north which culminated in the capture of Riga. Becoming prime minister in July, Kerensky sacked Brusilov and replaced him with anti-German General Lavr Kornilov. On August 25, Kornilov ordered troops to occupy Petrograd and disperse the Soviet. Calling for military reforms, including the abolition of Soldiers Soviets and political regiments, Kornilov grew in popularity with Russian moderates. Ultimately maneuvered into attempting a coup, he was removed after its failure. With Kornilovs defeat, Kerensky and the Provisional Government effectively lost their power as Lenin and the Bolsheviks were in the ascent. On November 7, the October Revolution began which saw the Bolsheviks seize power. Taking control, Lenin formed a new government and immediately called for a three-month armistice. Peace in the East Initially wary of dealing with the revolutionaries, the Germans and Austrians finally agreed to meet with Lenins representatives in December. Opening peace negotiations at Brest-Litovsk, the Germans demanded independence for Poland and Lithuania, while the Bolsheviks wished for peace without annexations or indemnities. Though in a weak position, the Bolsheviks continued to stall. Frustrated, the Germans announced in February that they would suspend the armistice unless their terms were accepted and take as much of Russia as they desired. On February 18, German forces began advancing. Meeting no resistance, they seized much of the Baltic countries, Ukraine, and Belarus. Panic-struck, Bolshevik leaders ordered their delegation to accept Germanys terms immediately. While the  Treaty of Brest-Litovsk  took Russia out of the war, it cost the nation 290,000 square miles of territory, as well as a quarter of its population and industrial resources.

Thursday, November 21, 2019

Social Psychology 4423 Essay Example | Topics and Well Written Essays - 2000 words

Social Psychology 4423 - Essay Example The aphorism, ‘men are better than women’ has become no less than a haunt for women who try to achieve an equal footing with men in the society. Women are forced to hear comments regarding their inferiority in all walks of life be it driving, office work, state affairs or something as womanly as cooking. The essay looks into the possible affects of sexism on women, how confronting sexism helps women, and a summary of the article ‘Excuse Me—What Did You Just Say?!: Women’s Public and Private Responses to Sexist Remarks’ (Swim and Hyers 68-88). Swim and Hyers have highlighted how women react to sexist remarks that they come across. The article is divided into two studies which throw light on styles of confrontations of sexism and types of responses influenced by costs of responses perceived respectively. In the first study, they have observed how women confront sexism keeping in mind that the style of confrontation varies within the groups due to difference in perceptions about sexism societal pressures. Women who are more afraid of being identified as feminists and being tabbed as rude are less likely to confront sexism publicly. While women who wish to put an end to the problems that they face due to sexism are more likely to confront sexist remarks publicly in an attempt to change the views of advocates of sexism. This is influenced by one’s personal beliefs and motivation to react coupled with the gender of the bystanders as more women respond publicly if they are surrounded by females who do not react openly to sexist comments than if they are surrounded by males who adopt an inactive stance on sexism. The study also suggests that women often develop private dislike for sexists and their comments when they are unable to confront sexism publicly. The second study suggests that women are more likely to assume that they are capable of publicly confronting sexism than they actually are. This hypothesis is coupled wi th the assumption that women usually analyze the costs and benefits associated with their responses before actually reacting to the situation. A public confrontation is thus made when women view their reaction as polite and only if they believe that their response would not augur a strong and impolite retaliation from the people who have passed the sexist comments. In their article, Swim and Hyers conclude that most of the women in their studies have not responded as they would have liked to respond to the sexist comments that were directed at them. Women in different parts of the world face sexism in round about similar forms. However, it has recently been noticed that confronting sexism helps women more than if the decide to remain quiet and develop a private dislike towards it. Instances of confronting sexism are generally lower because women are mostly afraid to confront sexism publicly. This is mostly because they are fearful of the fact that they will be discriminated more and will become the main target of the people who they will try to confront. They therefore avoid confronting sexist remarks publicly in an attempt to prevent themselves from becoming the point of focus for the sexist comments that would come forward as a reaction to their confrontation. Women also fear confronting sexism publicly because they are unable to deal with the label of impolite and rude that is stuck with them after

Wednesday, November 20, 2019

Mobile Van Restaurant Company Analysis Coursework

Mobile Van Restaurant Company Analysis - Coursework Example The name of the mobile van restaurant suggested is Fastbite Inc. and the target group of our business would be the executives who belong to the white and the blue collar working class. The van would operate from 6 am in the morning to 10 pm and we will sell breakfast such as raffles near Singapore MRT station car park or central of Singapore. However, in the afternoon during 11 to 2 pm, we will sell lunch in areas such as Tuas, Loyang Way or Woodand while after 2-5pm, we will deliver orders to our customers. Mobile van restaurants were more commonly found in Somerset MRT and East Coast Park but there are many other areas where can be covered by us. Besides serving the areas where factories are located, we will also sell food in deserted areas because this is the place where food is not available and it is also easy to locate vans in these areas since they are movable. Therefore, we will also sell food in boon lay area forest which is the place where the soldiers are trained. Since no thing is available for the soldiers to eat, they will buy the food we will offer them so the risk will be low. However, in the cities there are many other restaurants and options available to the customers which would make it difficult for us to attract the customers. The population of Singapore is 4,740,737 and 77% of the population falls in the age group of 15 to 64 years of age. Singapore has a 92.5% of literacy rate and unemployment rate of 2.1% which means that most of the population is employed which means that none of the individual living in Singapore lives below poverty line and even the rate of inflation is just 2.8%.1 Business Operation and management We will sell ready packed food which will be prepared from a home based kitchen and the mobile van will be used for selling purpose only. We will require both physical and human capital which will be our key resources to operate the business. For the van, we will hire two individuals while for the kitchen, we will hire three people to cook, pack and receive orders. For the need of physical capital we will buy a van. Convenience is the main benefit that we aim to give to our customers which will also be our competitive edge. We did a break even analysis which showed that our business idea would work well. The Industry Data that we collected gave us all the information about mobile van restaurants and some of the possible risks include the external factors such as changes in any government policies or weather changes and to meet these, we will have a backup plan. Business features, functionality and benefits Some of the business features includes convenience we provide to our customers along with nutritious and well packed warm food. Our business would operate mainly on a mobile van on which we will sell our food items. Although we have competition around, we will develop product differentiation on the basis of branding, service and location. Our business will operate in monopolistic competition which me ans an imperfect competition in which the products are substitutes but will be sold by the competitors will only be differentiated on the basis of branding and service. For this, we conducted market analysis to know more about the industry and competition. Branding Fastbite Inc. is our suggested name which would include pastries, sandwiches and minced noodles while we will sell barbecue including sea food and chicken wings, beef noddle and Kway Teow, chicken noddles and rice, curry

Sunday, November 17, 2019

Cost Management Essay Example | Topics and Well Written Essays - 2000 words

Cost Management - Essay Example Using learning lessons from General Electric, and through referencing personal experiences with cost management, learning associated with cost management and future projections about competent business planning can be developed. It is necessary to understand the demand environment and operational costs in order to successfully meet budget guidelines and secure effective cost management. Main Issues Mattel company did not fully understand its demand environment, thus the business was making decisions, strategically for long-term financial gain, that would not be sustained according to models of product life cycle. The product life cycle model recognizes the gains associated with new product launch and then follows the viability of products throughout the time period where product would be accepted by consumer markets. The life cycle model recognizes that products will eventually reach a maturity stage where new technologies or innovations begin to make demand volumes obsolete, thus th e business must be equipped to launch new products to offset any losses that occur. Dooley (2005) offers that it is extremely difficult to predict whether a product will have a long and profitable life cycle or whether the product, due to competition or even changing social and lifestyle needs, will have a long period where profit is sustainable. Mattel acquired a software company, Learning Co., as a means of diversifying its product portfolio and thus offering customers more selection of product and to ensure the business sustained its quality brand in the minds of buyers. Some of the main software titles were Carmen Sandiego and other relevant software characters that were associated with lifestyle and child values. Mattel believed that this decision would provide software titles with significantly-long product life cycles, thus offering more profitability through sales volumes. Soon after acquisition, Mattel realized that the decision to utilize these particular software names wa s not leading to the profit expected, thus leading to higher operational costs without sales volumes to sustain projections. It was assumed that the Carmen Sandiego, and other relevant brands, would have a much longer growth period in the life cycle than consumers actually favored. The end result: Mattel was left with very high operational costs, such as inventory and supply chain, which left the business with little options but to divest some of its business holdings. General Electric, on the other hand, understands the importance of not only diversifying its portfolio of products, but to create systems and feedback mechanisms that recognize the majority of costs during the planning process. Mattel was looking too closely at the consumer environment without realizing that some products would ultimately reach the maturity stage long before projections suspected. What did this indicate? It suggested that Mattel was not proactive in creating a well diversified product line, the firm d id not understand fully what was driving consumer demand ratios, and that Mattel had significant failures associated with manufacture and related operational costs. Mattel, in its proverbial effort to put all of its eggs in one software basket, did not create a supply chain methodology that would sustain unique product innovation and growth

Friday, November 15, 2019

Ebook Security With Adobe Adapt DRM

Ebook Security With Adobe Adapt DRM Abstract EBooks can be secured in various ways dependant on device or format. The report focuses on the encryption method used by Adobe in their Adept DRM used to secure EPUB and PDF formats. The report describes what a DRM is and its uses and purposes within the industry, how Adobe have adapted this for their purpose, the RSA and AES encryptions used, along with any advancements and vulnerabilities with the process. Recommendations are then given on how the process could be improved and conclusions drawn on the overall effectiveness of the system. Table of Contents 2. Literature review 2.1 What is DRM 2.2 RSA with PKCS#1 v1.5 padding 2.2.1 PKCS #1 2.2.2 RSA 2.2.2.1 GENERATE A PUBLIC KEY AND PRIVATE KEY 2.2.3 Padding 2.3 AES in CBC mode with a random generated IV 4. Vulnerabilities Security Known attacks Side-channel attacks NIST/CSEC validation Test vectors 5. Recommendations 6. Conclusion 7. References 2. Literature review 2.1 What is DRM? Digital Rights Management or DRMs restrict the ability to print, modify, lend or use the extended features of purchased digital media specifically EBooks. Restriction levels are dependent on publishers, distributors, device and even time. These restrictions are also used to limit the number of E-Readers a book can be viewed on and time restrictions on features can be added. DRMs come in different forms, at present there are eight main types, excluding obscure formats or those used in non-English countries, and a large proportion of these are incompatible with each other. While there is no de-facto standard, Adobe DRM is the most prolific, although Amazon Kindle and Apple iBooks use proprietary DRMs. The Adobe ADEPT DRM system has five key parts: Adobe Content server is responsible for the storage and management of EBooks. Adobe Activation Server is responsible for storing and tracking Adobe IDs and authorised devices. Adobe Content Server Message (ACSM) file carries the details of the book including name, synopsis and location. Adobe ID is the unique identification that is associated with the user. This is required to unlock the ACSM. Adobe Reader Software Development Kit (SDK) is used for distributers to create their own mobile reading apps. (Jenny Ellis and Kyle Cook (2013)) The following process is used when a purchased EBook with an Adobe Adept DRM is opened with Adobe Digital Editions. 1. A unique user key is created for the user account encrypted with RSA with PKCS#1 v1.5 padding by the E-Reader software. The account information not the device is used to create the key therefore allowing an EBook with DRM to be read on various devices. This is required to open the ACSM file. 2. Once an EBook is purchased a key for decryption known as the book key or ACSM is sent to the user. This book key is encrypted by the distributor using the unique user key created in step one. The book encryption is AES with Cipher Block Chaining with an Initialization vector that is randomly generated. 3.T he E-Reader software uses the user key to decrypt the book key and subsequently the book key is used to decrypt the EBook and allow access to the device or software. Copying is prevented by requiring the user key to decrypt the book key as it is not stored in a decrypted form on the device or software. To enable reading on another device it requires authorisation, once complete the user key is sent and the device is registered allowing EBook to be read on the newly enabled device. (Xiao Zhang 201) Image 01: The DRM Process 2.2 RSA with PKCS#1 v1.5 padding RSA with Public Key Cryptography Standards (PKCS) #1 and padding is used to encrypt the unique user account key, below is a description of how each part works to protect the user identification and eBook. 2.2.1 PKCS #1 PKCS #1 is the first standard of mathematical recommendations and properties for the correct implementation of RSA public and private keys. The key pairs are based on a modulus of two distinct large prime numbers. (Weisstein 2015) 2.2.2 RSA Image 02: How RSA Encryption Works (Page Don 2010) In 1977 Ron Rivest, Adi Shamir and Leonard Adleman first described RSA public key or asymmetric cryptography. RSA uses two keys, one public one private that are mathematically linked. As the name suggests public keys can be shared with anyone whereas the private key must be kept secure. Either key can be used to encrypt the data and the opposite key is used to decrypt. RSA if implemented correctly can provide confidentiality, integrity and non-reputability of electronic communications and data storage. (Rouse 2014) 2.2.2.1 Generating Public and Private Keys The first step to generating the public and private keys is two prime numbers. A prime number is a number greater 1 and is only divisible by 1 or itself. Examples of prime numbers are: 2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41. These two prime numbers p and q are multiplied together to give n and multiplied together minus one to give t. For Example: p = 29q= 31 n = p * q = 29 * 31 ∠´ n = 899 t = ( p -1 ) * ( q 1) = ( 29 1 ) * ( 31 1 ) ∠´ t = 840 Another prime number e is required, although e needs to be a relative prime to t, therefore t cannot be divisible by e. Since t = 840, e cannot be 2, 3, 5 or 7 ∠´ e can be 11, 13, 17 etc. 11 was selected as it was the first relative prime to t. ∠´ e = 11. The last figure required for the calculations is d. The formula used to ascertain d is: d * e = 1 mod t ∠´ (d * 11) / 840 will result in the remainder of 1. To find d the inverse of e mod t is required and is often computed using the Extended Euclidean Algorithm. ∠´ ( 611* 11) / 840 = 8 r 1 ∠´ d = 611. The public key is n and e ∠´ 899 and 11. The private key is n and d ∠´ 899 and 611. (Page Don 2010) 2.3 AES in CBC mode with a random generated IV AES with Cipher Block Chaining with an Initialization vector that is randomly generated is used to encrypt the book key or ACSM, below is a description of how each part works to protect the eBook to prevent unauthorised use. 3. Vulnerabilities On paper, this encryption scheme ensures a strong DRM mechanism. However, it was soon observed that the software used to read ePubs and PDFs, Adobe Digital Editions, uses a very weak obfuscation to hide the per-user key. An attack that uses reverse-engineering on the software reveals a rather easy method of retrieving the per-user key from the software and use it to decrypt other Adept encrypted PDF or ePub file. Newer versions of the Adobe Digital Editions use more cryptic ways of hiding the per-user key, but attacks still exist to retrieve it from the registry 4. Recommendations Adobe Digital Editions, uses a very weak obfuscation to hide the per-user key. An attack that uses reverse-engineering on the software reveals a rather easy method of retrieving the per-user key from the software and use it to decrypt other Adept encrypted PDF or ePub file. Newer versions of the Adobe Digital Editions use more cryptic ways of hiding the per-user key, but attacks still exist to retrieve it from the registry  for better useable security and privacy Write with  the  knowledge  you have gained during  the  lectures  and  also  sensible  intuition  about improvements that can be made to ensure better security and privacy of all involved state holders. à ¯Ã¢â‚¬Å¡Ã‚ §Ã‚  You are  not  asked to  provide  workable solutions there should be no limit  to your imagination; however with  sensible intuition. You can discuss systems, frameworks, protocols, tools, best practices, government  regulations etc. 5. Conclusion highlight important facts and findings. 6. References http://www.inthelibrarywiththeleadpipe.org/2013/building-a-community-of-readers-social-reading-and-an-aggregated-ebook-reading-app-for-libraries/ http://www.cse.wustl.edu/~jain/cse571-11/ftp/drm/#sec2.3.1 E-Book Security and Preventing Theft and Unauthorised Editing http://inkwelleditorial.com/prevent-ebook-theft http://ebookforum.info/how-can-i-stop-theft-of-my-ebook/ http://www.star-force.com/press/articles/?news=2562 DRM http://ebookarchitects.com/learn-about-ebooks/drm/ https://www.editionguard.com/

Tuesday, November 12, 2019

The Last Turn of the Crew: A “Battle” between the Governess and Miles E

Henry James’ the Turn of the Screw, written in the Victoria era, tells a ghost story of a governess’s experience with two children in the house. By presenting the story in a symbolic way, the ambiguous narrative of the ghost story suggests an inner conflict of immorality and innocence in the governess. It also seems to imply a loss of insanity and a tragedy as a result of the oppression of desire. This paper will argue that chapter 23 is the most crucial part of the story, because it is the first moment the Governess found the weakness of the ghosts and has a real confrontation with the ghost indirectly through Miles. Miles’ suggestion of going out drives her to the wall, which leads to the tragic end that the only way for governess to protect Miles is to hold him in her, even it is too tight to kill him. The paper will first analyze important scenes in chapter 23. Then it will reveal the symbolic meanings and the latent conflicts in the story, which is signific ant to their â€Å"battle† in chapter 23 and the ending. Before chapter 23, Flora is finally â€Å"corrupted† by Miss Jessel as the governess perceives, which signifies a failure of the governess to protect the children. The sudden change not only leaves the governess faces Miles alone, but also forces the governess to make a resolution. The governess realizes that the situation is â€Å"demanding [†¦] only another turn of the screw† (79). And the final turn of the screw which push her into an extremely â€Å"unusual direction† (79) takes place in chapter 23. The chapter starts with a vague dialogue between governess and Miles who are left alone. The governess first denies that they are not absolutely alone, implying the existence of the ghosts. However, Miles seems to accept that by answer... ...riumph, Miles breaks that by asking for going out, which breaks her last nerve and sanity. The only thing the governess can do to defense her power and her innocence is to hold Miles tightly till his death so that â€Å"[Quint] has lost [Miles] forever† (87). In conclusion, since the governess perceives the fight between the ghosts and her represents her inner fight of immoral and moral, the confrontation in chapter 23 is the last turn of the screw as the governess finally discovers the weakness of the ghost and it is the last chance for her to win. Mile’s request starts a quiet â€Å"fight† between them and drives the whole story to an extreme direction that the governess at last loses her sanity with an excessive protection that kills Miles. The story thus seems to imply an insanity and tragedy as a result of oppressed desire and sexuality in the special period of time.

Sunday, November 10, 2019

View the Environment: Professional Staff vs Management Staff

In a healthcare environment, the professional, front-line staff members such as doctors and nurses are those staff members who interact directly with customers or the public, rather than with members of the organization. The latter is more typical of management. Although collaboration between nurses and doctors can itself be a problem, this is less likely to prove problematic than the relationship between professional staff members and management staff (Zwarenstein, 2000) Professional staff members, because they have extensive interaction with customers or the public, will invariably have a more patient-focused rather than cost-focused orientation than hospital management staff. Also, in contrast to management, there are stronger time and resource pressures on the front-line environment in an immediate and personal way, than in a holistic and long-term fashion. Professional staff members are technically focused on doing the job for the day and helping patients, rather than helping the hospital-the pressures of patient health provide a more immediate focus. Unlike management, the professional members of the staff have received a considerable amount of structured training as part of their previous, pre-organizational hands-on healthcare education. The hospital organization is legally liable for the actions of front-line staff, should mistakes regarding patient health be made, nor organizational business ‘health'-health care staff are health care professionals, not business people. (Robertson, 2003) There is little team-based or project-based work in the front-line professional health care environment. Instead, the front-line typically performs the work specified by their profession and the needs of patients, reflecting any changes and initiatives implemented by management only when instructed. (Robertson, 2003) Cost of supplies, for example may be a greater concern for management than care for professional staff, and professionals may have less of a tolerance for bureaucracy and paper work, although certain concerns, such as time management may be shared by both.

Friday, November 8, 2019

Capstone Discussion Question Essay Example

Capstone Discussion Question Essay Example Capstone Discussion Question Essay Capstone Discussion Question Essay Essay Topic: Discussion In the wake of accounting scandals over the past several years, how has the As urbane-Cooley Act (SOX) of 2002 affected the practice of accounting? What is the role of internal controls in complying with SOX (2002)? The Serbians-Cooley Act (SOX) of 2002 is an act pass by the Congress of the United States in the year of 2002 with the intention to protect investors in case of a possible fraudulent account act which normally are conducted by the organizations. This act gave a strict reforms to organizations to follow, by doing so it help to prevent accounting fraud and improve disclosure made by mom organizations. The act was the result of multiple accounting scandals such as Tycoon, World and Enron in the year of 2000. These scams resulted in the loss Of confidence Of the investor in the financial Statement and demanded the need for regulations. By introducing the Act, there were various compliance, regulatory measures which increased the amount of information that the organization needs to supplied the government authorities, which it also led to the changes in the accounting mechanism of the organizations. The act also requested that the organization needed to roved with more detailed application of accounting standards and differential reporting of segmental analysis, and expenses. All accounting transactions are now require to have a more professional approach and analytical by the accounting department of the organizations. The final report also has been increased, the correct classification of the expenses and the income should always be done after making the deterministic approach rather than the facie approach. The introduction of SOX in 2002, made accounting an ongoing process to carry through the year and it also returned organizations with a higher fees as compare to Pre-Sox periods.

Wednesday, November 6, 2019

Being and Been

Being and Been Being and Been Being and Been By Maeve Maddox Saad Khan asks to know the difference between being and been. Been is the past participle form of the verb to be. It is used with the auxiliary verbs has, have, and had to form perfect tenses: How long has it been since you were in Paris? He had been writing that novel for thirty years when he died. How long have you been living here? Being is the present participle form of the verb to be. It is used with the auxiliaries is, are, was, and were to form continuous tenses: Mary is being difficult. The letter is being written. It is used as a verbal, a word that partakes of both verb and noun: Being polite is more productive than being rude. The word being can also be used a noun meaning â€Å"creature.† No human being should be homeless. I watched a movie about a being from outer space. Being can also mean â€Å"existence.† We are called from nothingness into being. In the expression â€Å"for the time being,† it means â€Å"the present.† We’ll leave him in charge for the time being. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Grammar category, check our popular posts, or choose a related post below:85 Synonyms for â€Å"Help†Excited ABOUT, not "for" Grammar Review #1: Particles and Phrasal Verbs

Sunday, November 3, 2019

Foundations in Strategic Management Case Study Example | Topics and Well Written Essays - 750 words

Foundations in Strategic Management - Case Study Example To synchronize with markets that are culturally diverse in the international network requires deep insight into the dynamics of the environment (Hitt, et al, 2013). To receive joint venture partnerships and licenses, the company has to strategically place mechanisms that will leave it in a win-win situation (Murray-Webster and Williams, 2013; Lasserre (2012).   Using PESTLE model, the above issues can be analyzed such that clear and comprehensive perspectives on the factors can be unearthed. PESTLE involves considering ‘Political, Economic, Social, Technological’ as well as the ‘legal and environmental’ frameworks of an issue (Tesar, 2008). It is advantageous since it provides a multi-dimensional framework that is all-inclusive in capturing all points of a problem. It is disregarded as a model that may veer off analysts owing to its long comprehensive techniques (Tschà ¤ppeler and Krogerus, 2011).   Cultural is a social aspect that requires analysis from an inclusive point of view as it touches and embeds on many other spheres within the society (Gassmann, et al, 2008). PESTLE model starting with the social values of the culture, its norms and traditions among others that will enable the strategists to understand and predict the consumer attitude and behavior (Caddle, et al, 2010). This will enable devise approaches aimed at harmonizing the organizational values with customers’ expectations and culture since it already has the ability to integrate easily into various cultures (Austin, 2008). The political analysis will consider what it will take to survive in the political temperatures of the country such that the company does not find itself aligning to one political division that might make it lose customers (Lasssere, 2012).   

Friday, November 1, 2019

Public Speaking Essay Example | Topics and Well Written Essays - 750 words

Public Speaking - Essay Example The truth is that the basic and daily communication amounts to some form of public speaking only that there is no conscious effort to perfect on it (Scherer and Volk, 2011). This paper will explore a few aspects of public speaking like the importance of public speaking, anxiety and skills and techniques of public speaking. Efficiently delivered speech is one that effectively communicates to the audience. Excellence public speaking has, for many people, defined their success or failure. First, public speaking enhances self confidence which boosts self esteem (Scherer and Volk, 2011). One is able to feel more comfortable interacting with people around them. Effective public speaking means better delivery of the message. For an employee, one stands above the rest and is more promotable to manage higher responsibilities owing to the confidence portrayed and the perception of being more knowledgeable. Knowledge increases owing to the fact that one researches deeply for every topic of discussion. Therefore, it is highly beneficial for one to speak in public as many times as opportunities may allow. The common problem with many people is the management of their anxiety while in front of gazing eyes and attentive ears. One all over sudden loses control of body actions at the most critical moment. One starts to sweat from everywhere; hands, face, feet and armpits and so on. The mouth mysteriously runs dry while the knees feel weak and start shaking. The heart beats faster and harder and the stomach feels full with butterflies and the voice becomes distorted (Bodie, 2010). This problem is best solved by properly and fully researching beforehand one’s topic and audience since this will create confidence. One needs also to set the goal of offering the best speech and focus on doing it and when a flaw happens, one should just proceed. In short, when delivering a speech, one needs to hold positive