.

Monday, September 30, 2019

Is Fame Good Or Bad?

Most people think that being famous is heaven, but it's more like hell. What do you think? Phenomenom of fame is widespread around the world. Being famous today is not the same as it was 50-100 years ago. Andy Warhol once said : In the future everyone will have their 15 minutes of fame. Well, in my opinion, that time has come. People from all around the world are trying to get their way out there on the stage. It has become easy to acquire fame, but difficult to keep it. People get famous for doing nothing and the ones who want to become famous don't have many obstacles on their way.They can just apply on a reality show and soon their names will be on the tops of „the most searchedâ€Å" lists on Google and Yahoo, and not to mention the yellow press. Little girls and boys from all around the world are, when asked what do they want to be when they grow up, usually answering that they want to be famous. Fame has lost its value. Celebrities with or without justified reasons to be famous are followed by a bunch of paparazzi each day. They are getting interviewed and photographed for worthless magazines intended for masses.Their private lives become a matter of abstraction and are endangered. As for those whose fame is a result of hard work, talent, high IQ or great achievements, their fame is well-earned. Such are, for example, great writers, mathematicians and artists. They are usually the ones who are, no matter how good they are at what they do, less famous than the ones who deserve it less. That is good because they don't need to sacrifice their private lives, they have their freedom of expression + they make a lot of money. As for me, I'm not a fan of fame and I think it's lame.People are sometimes desperate, don't receive enough of attention in their private lives and they search for a way out by becoming an object of admiration in other peoples life by being famous. On the other hand, there are people whose fame is a result of their great work and the y have to take that difficult burden of fame on their backs. Either way, I wouldn't like to be famous. Sometimes I don't like being alone, but there are people whose solitude is not even a matter of choice and represents an impossible mission. Threathing my private life, I do the same thing to my familys' and friends' life and that I cannot cope with.I don't need other peoples admiration to accept myself the way I am. Money, fame, fortune, and everything that goes with it- yes, sure it can be helpful, but having everything is sometimes just the same as having nothing, because it usually means not wanting anything. Any by not wanting anything, we don't have real goals in our life or anything that can bring us joy. That's why I prefer solitude over fame and fortune. It's hard enough to prove to myself everyday, proving myself to whole world everyday would really be a hell.

Sunday, September 29, 2019

Celta

CELTA P/T Karolina Szybinska Assignment 3: Skills Related Tasks -1I decided to use the â€Å"Metro† article on Big Brother for my skills related task. I think it is an appropriate text for English language learners, because the article was published in â€Å"Metro† – a free newspaper which students will immediately recognise (proven that they have lived in London for more than 2 weeks). I also think that the use of an â€Å"authentic† text could be hugely appreciated by the students; the ability to read and understand a newspaper they see daily is an enormous confidence booster for them.The article deals with contemporary issue, and the topic is not culturally biased as the concept of Big Brother will be known to European students and possibly to other students with a little bit of an interest in the western culture. But, most of all, this article is perfect for a reading activity, as the topic is known to be a very controversial one and would make it a gr eat discussion/ productive skill extension.I would use it with an intermediate/upper intermediate level students (depending on the individual students too, trying not to match the level to the strongest students, but also making sure the students are not bored or unchallenged because I focus too much on the weaker ones). -2– I think a good starting point for this lesson would be playing a trailer of The Truman Show movie and start from there. Many students will be familiar with the movie already and if they are not, the trailer provides a good explanation of the problem in the movie.The idea of being invigilated 24/7 is put across quite bluntly in the trailer alone. The trailer is also a good aid to use, should any Assignment 3 P/T Celta Karolina Szybinska 1 students have problems with a sentence in the text â€Å"The Truman Show-style concept†. Students could first discuss with partners whether or not they have seen the movie, how they feel about being filmed, do they know any other movies/books/TV programs where this idea is explored . After eliciting Big Brother, ask some additional, personalised questions like â€Å"Have you ever watched BB? , â€Å"Would you like to be one of the contestants? †, â€Å"Have you ever applied for the show? †. Then I could move to the first reading activity. -3Although there are plenty of new vocabulary items in the article, I think students would not have any significant difficulties with grasping the overall meaning of the text. I am not a fan of pre-teaching vocabulary, I agree with Jeremy Harmer here, who claims that â€Å"by giving them some or all of those words we deny them [a chance to practice tackling authentic texts]† (Harmer, 203) i.I think that students get the better grasp of the word if they work themselves towards the meaning, e. g. from the context, and in this article I would only preteach key vocabulary, such as contestants, to air sth, to screen sth, pittance. I would us e pictures/movies and CCQs to convey the meaning. For the remaining vocabulary issues I would count on the students to try and convey the meaning from the context or give them a matching exercise of words and synonyms to be completed in pairs in the pre-reading stage of the lesson. 4I would use this article to practise skim reading. It is not long, but consists of enough paragraphs to cater for the teacher to set up skimming activities. My activities for practising skim reading through this article would be as follows: ? Match the paragraph with the heading ? Put the scrambled paragraphs in order. Assignment 3 P/T Celta Karolina Szybinska 2 I would remind/explain to the students that skim reading is a skill that require quick reading and ability to choose only important information.After instructing activity, give them the handout to match headings with paragraphs and give the students quite conservative time limit (2 minutes), as they need the push to read quickly and finish before the time is up, otherwise the students tend to focus too much on unknown vocabulary instead (Riddell, 102)ii. After that, pair and then group feedback. Then give out another handout with scrambled paragraphs and give them another 3 minutes to put them in a correct order, followed by pair and group feedback. For this task I prepared two various copies.If the group is energetic, I would just ask the students to number the paragraphs from 1-6. If the group is low on energy and needs some kinaesthetic and personalised activities, I would give them scissors, glue and a blank sheet of paper, so they would have to cut the paragraphs up and glue the correct order. -5For the more detailed understanding task, I would use 2 activities, which I think will be suitable. ? a set of questions with multiple choice answer. ? a True/False questionnaire about the article, each followed by â€Å"why? so the student can also identify the fragment of the article containing the relevant information. Davi d Riddell says that answering multiple choice and T/F questions required scanning the text for specific informationii but I truly think that this activity could be used as the detailed reading task. Because students would have already skimmed the text by then, additional scanning would supplement the initial task Assignment 3 P/T Celta Karolina Szybinska 3 and together it could form a comprehensive and detailed reading activity. Particularly if the questions were not too easy with an obvious answer. 6For the last part of the lesson I would put pictures of Big Brother contestants engaged in various activities in the house (sleeping, cooking, working in the garden, cleaning, dancing etc. ) around the classroom. I would also play a short clip of Davina McCall reporting from a Big Brother house. Students will be put in pairs and told that they are news reporters broadcasting from outside the Big Brother house and that their producer gave them 10 minutes to prepare the topic and wants th em to mention specific items (new vocabulary from the lesson, put on the board).The students can walk around the classroom and decide what information they would like to include in the broadcast. After ten minutes each pair stands in front of the rest of the classmates and â€Å"broadcast† their story on Big Brother. Assignment 3 P/T Celta Karolina Szybinska 4 i Harmer, J. The Practice Of English Language Teaching. 3rd Edition. Longman, 2001. Riddell, D. Teach Yourself Teaching English as a Foreign/Second Language. McGraw-Hill, 2003 ii

Saturday, September 28, 2019

Risks Facing Financial Insitutions Essay Example | Topics and Well Written Essays - 2500 words

Risks Facing Financial Insitutions - Essay Example alth and wealth of such financial institutions. (Aharony, 1986) Its 1988 Basel Accord deals with credit risk and has extensively guided international banks in their risk management.Similarly the Basel II(International Convergence of Capital Measurement and Capital Standards) deals with the problem of operational ,legal and strategic as well as those arising out of the loss of goodwill. ( Hsaio 2008) , This paper therefore discusses the risks faced by modern financial institutions,international efforts to resolve such risks as well as the techniques used by banks to calculate interest risks. The past two decades have indeed seen an increased banking response to the systemic risks in the financial system which emerged in response to the 1930's banking crises of the 1930s.Banks and other financial institutions perform the functions of financial intermediaries that distinguish them from other businesses. They intermediate liquidity between economic subjects and in this process face a number of risk atypical of non-financial firms. (Aharony, 1986)This financial risk measurement and management becomes very important for banks than for other companies.The modern financial institutions are very complex as they increasingly offer fee-based financial services and relatively new financial instruments and this has led to the creation of a number of new risks.Essentially the riskier the bank's business, the more capital it should hold to be able to cover future fiscal losses. Although various banks face different risks (with regards to their category) some risks are common to most banks like Credit risk , Liquidity risk , Solvency risk , Operational risk , Market risk and Interest rate risk. (Aharony, 1986) In the above paragraph a number of risks have been identified and while many of them have been overcome by regulation many still sting the face of financial prudence as unresolved dilemmas. (Aharony, 1986) These are risks like operational risks (which have been defined by the Basel Committee(Basel II) as arising from 'inadequate or failed processes, people and systems or from external events'. ( Hsaio 2008) , Operational Risks cover a wide category of risks which pertain to human error or technical deficiencies.(Black,1972) and are related to all other types of risk such as capital needs, inflation, concentration of revenues (by customers, products, geographies, etc.) new competitive conditions and environmental remediation obligations(reinforced by the new concept of Corporate Social Responsibility).(Black,1972). Operational risk is the newest area of focus in the the arena of the financial institutions but there are theoretical and practical difficulties involved in it's assessment as well as statistical irregularities in the data available. ( Hsaio 2008) , However more serious risks pertain to losses which arise due to the failure of the obligator to perform(Credit Risk) and such losses are reported to be responsible for more

Friday, September 27, 2019

The Nation Splits and Reunites (US History) Assignment

The Nation Splits and Reunites (US History) - Assignment Example Northern businessmen helped get the "Tariff Act" passed which in turn raised the prices of manufactured products from Europe mainly sold in the South. This angered the Southern people to have to pay more for these goods and hence developed hatred towards the Northern people (Davis). The political power in the Federal government led further to escalation of the conflict. Since the Northern States were becoming more and more powerful, the Southern States felt a growing need for freedom and as such wanted to break away from the north and govern themselves. The north would not allow this and hence the civil war. Finally, the martial confrontation between the Federal states and the Confederate States of America further fueled the Civil War when Fort Sumter in South Carolina was attacked (Davis). 2) In most polls of presidents by historians Lincoln is either ranked first or second. Does he deserved such an exalted position, or as his detractors claim, he should be ranked lower because he presided over a war that killed 620,000 of his fellow citizens? Explain. In my opinion, Abraham Lincoln should be ranked lower as the President of the United States because he presided over a war that killed 620,000 of his fellow citizens. Firstly, he vowed to keep the country united and the new western territories free from slavery. Sadly, this was not so. First of all, many Southerners were afraid that he was not sympathetic to their way of life and therefore could not treat them fairly (Davis). This feeling led the South to break away from the United States and joined together to form a new nation named the Confederate States of America. Although more than half of the said deaths were caused by disease, documented statistics indicate that one third of all Southern soldiers died in the civil war during Lincoln’s reign (Davis). Consequently, a big majority of families felt this pain and loss, a testimony of how much the War had scarred and devastated the American

Thursday, September 26, 2019

Portfolio Essay Example | Topics and Well Written Essays - 3250 words

Portfolio - Essay Example The observation class had 24 learners, all from different community background; 3 support teachers and the class teacher. The children fall between 3 and 4 years, and during the start of the class, they were all sited on the floor, as the teacher took the class register. Due to their varied community backgrounds, approximately 80 percent of the learners are bilingual: they are of language and national backgrounds foreign to the U.K. The observation reports for observation 1 and 2 are included in this report as Appendix 1 and 2, respectively. Qualitative observation was the primary qualitative tools of inquiry used for this particular observation study, towards ensuring that the study gave as much information as possible, through the two observation cases. The narrative method of reporting is used in presenting the information and the inferences drawn form the two observations: narrative reporting was an effective evaluation and reporting model for this observation. The principle of à ¢â‚¬Ëœemergent literacy’ is used to describe the wider conception of learning, for the learners between the ages 0 to 5. Under this conception, emphasis is placed on informal learning strategies and learning settings, using a variety of activities and exercises, for example the activity of fighting dinosaurs, which looks very informal, but offered an effective learning experience for the children (Yarden et al., 1999). Critical evaluation and analysis of the resources and the strategies used during the exercise As explained by Maria Montessori (1870-1952), young learners, during their initial years of schooling, require a systematic and orderly way of training and education – so they can master different skill-sets, one after another. This is in line with Whitehead (2010), who advocates that learners, during early years of learning should be taught using activities like writing and reading exercises, incorporated into plays. For example, during the second activity, the teachers required the learners to write or draw names of things they were familiar with, for example dog and cat, as a way to improve their comprehension of the letters of the alphabet. The activities helped them to explore the surroundings around them, so they can create sense from their perceived experiences. The two activities for the class are developed according to the standards of the EYFS syllabus, which incorporates learning in fun to do activities, and plays or games. For example, through the activity of the fighting dinosaurs, the social and communication skills of the children were greatly fostered (DCSF, 2008). According to Lev Vygotsky (1896-1934), instructors are obligated to carefully observe, design and plan study activities in a way that will challenge the young learners’, next level of conception and learning. From the current case, it is evident that the teachers had designed the activities in a careful manner – so as to enhance and simulate the int erest of the learners in the learning incorporated into play. For example, through the first activity, where different children were supposed to act-out different roles, the creativity of the children was fostered – for example, they were supposed to make dinosaur sounds. The group that was supposed to protect the baby dinosaur was to build a wall to shield it, which greatly improves the motor skills of children within their age range. According to Jean Jacques Rousseau (1712-1778), special emphasis should be placed on ensuring that children are not taught concepts or ideas that they may not be ready to take-in. For example, in the second observation, the teacher only required the children to draw words of common things

Wednesday, September 25, 2019

Gay Relationships - Same or Different Essay Example | Topics and Well Written Essays - 1000 words

Gay Relationships - Same or Different - Essay Example The paper explains why and how this is so, culling insights from Cloud's own seven-plus years in a failed relationship with his ex-mate Michael. In essence Cloud is saying that gay relationships are marked by a different set of dynamics owing to the following: the fact that both parties to the couple are the same sex; that homosexuals growing up often face stigmatization and experience a sense of being repressed in early life, and those color how they act in adult homosexual relationships, among other things; and that, to a certain extent, the very nature of gay relationships have within them the seeds of their own demise. The latter is a controversial assertion, but borne out by facts Cloud cites a study that found that gay couples were more likely to break up over a 12-year period than straight couples (Cloud). That said, this paper asserts that beyond distinctions of couple relationships based on gender, the universal themes that are reflected in the Aristophanes myth hold. The in tensity of emotions and focus that Cloud displays in his essay reflects just how gripping and central, and painful, the experience of breaking up and losing one's other half is. Also, the way Cloud's relationship seemed to have disintegrated, and followed the seven-year pattern of many couples, indicates a kind of fated end that meets all those who seek and lose. Cloud is playing out the part that is his, in a dance with his partner that is fated to end, and beyond anyone's control to do something about, least of all the lovers themselves. As the author notes, with resignation (Cloud): And yet if ours had been a straight marriage, I have little doubt we would still be together. We had financial security and supportive families. We almost certainly would have had children. This isn't regret--fighting my homosexuality would be like shouting against the rain (Cloud). Discussion Cloud sets forth to define what it was that he wanted to find out and discuss in the essay, in a set of quest ions that haunted him in those early mornings after the breakup, and when he was done with his frantic going about to fill his time after that. Here we see that even Cloud could not figure out at that point what it was that happened exactly, a hint of the fated nature of the end, as if he and Michael were merely acting out parts in a script (Cloud): What impact had our homosexuality had on the longevity, arc and dissolution of our relationship? Had we given up on each other because we were men or because we were gay? Or neither? Friends offered cliches: Some people just aren't meant for each other. But our straight friends usually stayed married. Why not us? (Cloud) Cloud answers those questions in the affirmative, mainly, and that just as he could not change his sexual orientation, so too he could not change the manner in which his relationship with Michael played out and died. The seeds of that relationship and its destruction lay in themselves, and the way they are built sexually , as gays. Yet Cloud also points out that his experience in a relationship is in many ways similar to the experience of other people in relationships, regardless of sex. Underneath it all, there is the universal dictate to find someone to love and stay with. There is the sense that Cloud wanted this permanent relationship, the complete bonding with one's significant other. There is some wishful thinking in the following lines, as well as a sense of resignation regarding the fate that befalls man, who seems

Tuesday, September 24, 2019

Statistics & Quantitative Methods Speech or Presentation - 1

Statistics & Quantitative Methods - Speech or Presentation Example Thus, the payback period for Project A is 2.33 years. The Payback Period Method therefore is a technique used in appraising investments by actually trying to find out the Payback Period of a project. In this way, expected time required to recover the original investment can be calculated. 1.a.ii. Net Present Value Method. With the emergence of discounted cash flow techniques, it has become easy nowadays to implement the net present value method in investment appraisal. The net present value method is a method of ranking investment proposals using the net present value, which is equal to the present value of future net cash flows, discounted at the marginal cost of capital (Brigham, 1992). 1.a.iii. Internal Rate of Return Method. This is a method of ranking investment proposals using the rate of return on an asset investment, calculated by finding the discount rate that equates the present value of future cash inflows to the investment’s cost (Brigham, 1992). The internal rate of return is the discount rate which forces the present value of a project’s inflows to equal the present value of its costs. In conclusion, it is good to look clearly which among of these three mentioned methods are good. Payback period method is very simple among the three methods. However, with its simplicity come two major weaknesses. It definitely does not take into account the benefits that occur after the payback period. In short, it does not measure the total income. With this, it does not take into consideration the time value of money. It uses cash flows in the calculation but not net income so it has nothing to say much about a project’s total profitability. The net present value unlike payback period is computed in terms of currency. The net present value accounts for the time value of money, inflation, risk, financing and other considerations which make it a good measure of profitability. The internal rate of return on the other hand is good when it

Monday, September 23, 2019

See below Essay Example | Topics and Well Written Essays - 250 words - 9

See below - Essay Example ry suggests that the goodwill, moral, and political aspect of a person depends on the contract and agreement amongst a group of people within the society. Aristotle uses this theory to convince Crito to remain in prison and accept his death penalty (Anton). Philosophy describes egoism as an intrinsic factor that should emanate from within us. Aristotle includes this concept in his theory when he states that wisdom depends on our deliberate actions, emotions, and social skills. Motivation in people occurs when they develop certain interests and desires in life. Utilitarianism phenomenon suggests that most of the good things that happen in human lives result from being morally upright. In order to distinguish utilitarianism from egoism, we consider that maximization of the moral right behavior in respect to the good well of an individual as well as the others within the society. According to Kant, achieving happiness is luck and not within our power. Aristotle fails to address this iss ue. However, he suggests that both practical and theoretical concepts builds on already existing phenomenon hence one cannot develop a theory from scratch. Kant expresses the same skepticism in his theory. The feminist theory tries to prevent gender decimation. Aristotle fails to mention this concept in his work. However, his ethical definition summarizes this concept. In conclusion, Aristotle ethical theory is a master of all these theories. It summarizes all the concepts highlighted by various

Sunday, September 22, 2019

Human biology Assignment Example | Topics and Well Written Essays - 750 words

Human biology - Assignment Example The normal level of glucose in the blood is about 90 mg per 100 cm3 (Taylor, Green, & Stout, 1984). To have a very low level of glucose (hypoglycemia) or a very high level (hyperglycemia) are, both, serious problems disturbing the osmotic equilibrium of the body. Pancreas is the regulatory organ which helps control glucose levels. It has glucose receptor cells which measure the concentration of glucose in the blood stream together with endocrine cells called the islets of Langerhans which secrete glucagon or insulin depending on which is needed by the body at that particular time. When a person eats a meal, the glucose level in the blood stream tends to rise. This is detected by the pancreas. Consequently, the -Cells in the Islets of Langerhans release the hormone: insulin. The hormone enters the blood stream and its target organs are mainly liver and muscles. The respiration rate is increased (break down of glucose to release carbon dioxide and water). Moreover, it is converted into storage forms i.e. glycogen and fats. Hence, this causes the glucose level to fall. On the other hand, during fasting or starvation, the glucose level is decreased. Detected by the pancreas (-cells), the hypothalamus in brain and adrenal glands (adrenal medulla), hormones like glucagon, adrenaline, cortisol and thyroxin are produced that hasten the conversion of glycogen to glucose. Furthermore, proteins in the body are converted to glucose, which in turn increases the glucose levels in the blood (Saul, 2004). What if this control mechanism fails? The consequence would be in the form of diseases like Diabetes Mellitus. It has two forms. Either the insulin receptors do not function properly or the insulin is not produced at all. This leads to symptoms like high thirst since water moves from the cells into the blood stream, copious urine production,

Saturday, September 21, 2019

Baker College Corporate Services Essay Example for Free

Baker College Corporate Services Essay Franklin Delano Roosevelt was one of Americas greatest Leaders. His accomplishments are discussed in this paper in a biographical manner, as well as other Authors opinions about them, including my humble self’s. This paper gives an example of a forward looking, charismatic leader. The whole population of this great country is benefitting from his accomplishments, and will continue to do so for generations, with only slight adjustments for technology and culture. Franklin Delano Roosevelt An Example to Remember When somebody asks to pick a favorite leader, a number of the great ones pop into mind, like Christopher Columbus, George Washington, Abraham Lincoln, Douglas McArthur, Franklin Delano Roosevelt among others. It is a tough choice. They were all great. Franklin Delano Roosevelt had so many great accomplishments during his life time; the only way to list and discuss them would be in the biographical manner the Author chose. The reason the author chose to write about Franklin Delano Roosevelt was the similarity of todays economy that he faced at the time of his first term in the office as well as our current president elects choice to use some of his strategies to correct the present state of our economy. Faced with World War II, Franklin Delano Roosevelt (FDR), guided America through one of its greatest domestic crisis, His presidency, which spanned twelve years, was unparalleled, not only in length but in scope. FDR took office with the country mired in a horrible and debilitating economic depression which not only sapped its material wealth and spiritual strength, but cast a cloud over its future, not unlike what we are facing today. Roosevelts combination of confidence, optimism, and political savvy, all of which came together in the experimental economic and social programs of the New Deal helped bring about the beginnings of a national recovery (Baliles, 2005, p. 1). FDR also committed the United States to the defeat of Germany, Japan, and Italy, and led the nation and its allies to the brink of victory. This triumph dramatically altered Americas relationship with the world, putting the United States into a position of international power, as well as political and moral leadership. By virtue of its newfound political and economic power, the United States would play a leading role in shaping the remainder of the twentieth century. Inside the United States Franklin Roosevelt stirred a domestic political revolution on several fronts. FDR and the Democratic Party built a power base which carried the party to electoral and ideological, dominance until the late 1960s (Baliles, 2005, p. 1) . FDRs policies, especially those comprising the New Deal, helped redefine and strengthen both the country as well as the American presidency, expanding its political, administrative, and constitutional powers of the office (Baliles, 2005). FDR was born in Hyde Park, New York, in 1882, to James and Sara Roosevelt. His parents were well off, if not wealthy by New York High society standards. While growing up, they were able to provide a succession of nannies, and at age 14 send him to a prestigious boarding school in Massachusetts. He went on to Harvard College, where he spent most of his time at the college paper, where he declared himself a Democrat. While at Harvard, he grew close to his cousin Theodor Roosevelt, who was moving up the political ladder in the Democratic Party, and began courting his distant cousin, Elanor Roosevelt. Although FDR started attending law school at Columbia at this time, he had little interest and dropped out after one year. Elanor and FDR were married in New York City in 1905. He had six children: Anna Elanor, born 1906; James, born 1907; Franklin Jr. , born 1909 and died the same year in November; Elliott, born 1910; Franklin Jr. , born 1914 and John Aspinwall, born 1916 (Coker, 2005). In 1910 FDR ran and got elected to the New York Senate and was re-elected in 1912. One year later he began his tenure as assistant secretary of the Navy under the Wilson administration at the age of 31, helping to prepare the country for entry into the world war. He moved his family to Washington for this reason. WWI lasted from April1917 until November 1918. On more than one occasion, he was subject to ribbing by those around him as being a little boy. Nevertheless, in characteristic Roosevelt fashion, he was undaunted by his lack of experience and plunged into the job with enthusiasm and confidence (Coker, 2005, pg. 28). As a matter of fact, he did such a great job, that in 1920 the Democratic Party named him the vice-presidential candidate on James Coxs ticket. They lost the election in November of that year. Roosevelt’s most significant responsibility in the Navy Department had to do with labor negotiations with defense contractors. His primary goal in this area was to encourage positive relations between workers, industry leaders, and the military. In this capacity he gained appreciation for labor issues and learned how to handle sometimes rocky labor disputes (Coker, 2005). â€Å"FDR proved to have the exceptional ability to juggle various administrative and political responsibilities. Part of the reason he was able to do so many things simultaneously was that he insisted on bringing the indispensable Louis Howe to Washington with him to serve as his personal secretary. Howe seemed to be everywhere at once, assisting Roosevelt in all matters-scheduling appointments, helping with clerical work, and even helping Roosevelt keep an eye on, and a hand in, New York politics. † (Coker, 2005, pg. 31) In1921 FDR contracted polio, an incurable disease that left his legs paralyzed. By investing a considerable part of his fortune in renovating a spa in Warm Springs, Georgia, whose curative waters, together with strenuous physical therapy and the support of his wife, children and close confidantes, was he able to regain some use of his legs. By 1928 with the relentless help of his wife, Howe and a new personal secretary, Marguerite (Missy) LeHand, FDR was apparently sufficiently recovered to resume his political ambitions to run and win the governorship of New York. The very next year FDR had to cope with the stock market crash in October. The stock market was pretty volatile in the 1920s. With no regulation, Americans and investors bought stock on credit. By the second half of 1929 the economy slowed because of rising unemployment and high interest rates. When everybody started selling stock and found no buyers, the market nosedived. October 24th (Black Thursday) and October 29th ( Black Tuesday) were two days that marked the beginning of the depression, although not the only cause. At the same time, farmers were taking advantage of new technologies, which caused overproduction. The Stock market crash, along with overseas competition, and urban areas lacking the income to buy agricultural products, caused those prices to crash also. Because of the prosperity in the 1920 over 80% of Americans held no savings at all and the rich stopped buying. Because of all these factors, 5000 banks collapsed, one in four farms went into foreclosure and 100,000 jobs vanished each week. By 1932 one quarter of this countrys people in were unemployed (Baliles, 2005). FDR implemented a number of innovative relief and recovery initiatives: unemployment insurance, pensions for the elderly, limits on work hours, and massive public works projects. These programs labeled him as a liberal reformer and won him reelection as governor in 1930. It is important to note that FDR as Governor surrounded himself with best minds that worked with him in the State Senate, as well as some members of Al Smiths former gubernatorial administration, to solve his States problems. At the same time he had Louise Howe, as his chief campaign strategist and the head of the state Democratic Party, James Farley laying the ground work for a presidential campaign (Coker, 2005). In the grip of the great depression, the Democrats turned to FDR in the election season of 1932 to run for President. He was a popular and successful governor for two terms, with a recognizable last name, that could challenge President Hoover. He won the presidency in a landslide, promising the American People a â€Å"New Deal†. Voters extended FDR approval to both houses of congress, giving the democrats overwhelming majority, which would prove vital in FDRs first year in office. In his inaugural address, FDR promised the distraught Americans hope by telling them that they had â€Å"nothing to fear but fear itself (Baliles, 2005). † True to his character, FDR surrounded himself with a group of advisers nicknamed the brain trust. This brain trust included former progressives, liberal-minded professors and bright young lawyers. One of the traits FDR is consistent on is the ability to recognize when expert help is needed, and then surrounding himself with it (Dubrin, 2004). An array of emergency measures proposed by FDR, and passed by Congress reflected three basic goals: industrial recovery through business-government cooperation and pump-priming federal spending; agricultural recovery through crop reduction; and short-term emergency relief distributed through state and local agencies when possible, but directly by the federal government if necessary. ( Boyer, P. et. al. (2008). pg. 734) Between March and June 1933, a period labeled Hundred Days, Congress enacted more than a dozen key measures ( Boyer, P. et. al. (2008). pg. 736). These measures were all directed to solve every aspect of the depression, including regulating the stock market. Because so many people had been unemployed for some time, the help did not come fast enough. By 1934 the unity spirit of the hundred days was fading, industry was chafing under increasing National Recovery Administration (NRA) regulations. Even Nature seemed to work against recovery efforts. Between 1930 and 1939 the drought in the Oklahoma panhandle region turned much of the Great Plains in the Midwest into a dust bowl. Depression persisted, despite all efforts. FDR put great store in talking to the people, and he used radio to talk to them. He would talk regularly and informally on shows called fireside chats about results and plans to help the nation and alleviate peoples fears (Boyer, P. et. al. (2008). At this point in his research the author remembered the first four chapters of required reading for the class. It is without exaggeration, when saying, that it is hard to single out any one part of these chapters to describe FDR. They simply seem written about him. From the definition of leadership to the nine leadership roles in chapter one, the personality traits, motives and cognitive factors of effective leadership in chapter two, to initiating structure and consideration and attitude and behaviors of a leader in chapter four. FDR had it all. If it has been noticed the Author left out chapter three, because this chapter dealt with Charisma and transformational leadership. It would not be fair to pick any part of this chapter in the authors opinion FDR was the embodiment of this chapter (Dubrin, 2004). While he was loved by the people, the new deal was criticized from all directions. Some saying that the New Deal was going to far, others saying it was not going far enough. FDR seemed to relish the attacks of his critics, saying that the New Deal protected the average American, not the rich. In 1935 FDR fought back the criticism with a series of legislation that eclipsed the first hundred days termed the Second New Deal. He also lost support from the business community because of his support for the Wagner Act and Social Security. Both were the more memorable of FDRs accomplishments, the former allowed labor unions to organize and bargain collectively, the latter set up programs designed to provide for the needs of the aged, the poor, and the unemployed, but excluding farmers, domestic workers, and the self employed (Baliles, 2005). Because of his popularity with the American people, FDR wins the election of 1936 against Republican Alf Landon by a major majority. What this proved, was that the Democratic Party was the major party in the states. At his inauguration he promised the people to continue to fight for the nations underprivileged. FDR put together a group of voters from different regions of the country. This diverse group became the core of the Democratic Party. It came to be called the New Deal Coalition or Roosevelt coalition and included members from different labor, racial, religious and ethnic groups, along with academics and intellectuals (Coker, 2005). FDR is first to realize he can not do it all himself, and has the presents and humility to put together a group that can give him, information, ideas and feedback from every segment of the population he is trying to help (Dubrin, 2004). FDRs second term in office started with doing something about the resistance he has been encountering to his New Deal. The Supreme Court was on top of his lists of concern. They had overturned some agricultural and industrial New Deal reforms earlier and Roosevelt was concerned for future programs. He found it unbelievable that this body could overrule not only the presidency, but the Congress as well. He blamed it on the lack of vision of several older judges and was determined to do something about it. If they refused to retire or to die, he would find a more systematic way to protect his policies from them. He consulted legal experts and advisers within the organization and came up with the idea to expand the number of judges on the Supreme Court. In 1937 FDR proposed legislation stating that because the age of some of the judges, and in the interest of efficiency, adding an additional new and younger justice for every one of the sitting ones over the age of 75. Most of his opposition called FDR a dictator, but having such a majority in both houses of congress, the bill would have probably passed. Perhaps that was the reason later that year, that the Supreme Court upheld some state and federal legislation. By the time the bill reached the Senate, all the steam went out of the argument and did not pass. The possibility of the event coming to pass however, had such an impact on the Supreme Court that they have not invalidated any legislation concerning regulating business or expanding social rights for the remainder of the century. Having won his point with the court, he was finding the whole federal bureaucracy moving to slow for his tastes, started to bypass established procedures, creating emergency agencies to carry out policies. In 1937 Roosevelt had a plan for reorganizing his cabinet. It called him to receive 6 full time executive assistants, for a single administrator to head the Civil Service Commission, for him and his staff to assume all responsibility in budget planning, and for every executive agency to be under the control of a cabinet department. Although he did get some of these things passed by Congress in 1939, his opposition was able to paint him as imperious and power-hungry (Baliles, 2005). The Author can empathize with FDR on the point of the Judges, mainly because of a similar difficulty in his work environment, involving very high sonority workers that could retire and make room for younger people to work in this difficult economy. He would have told him that he is also of the opinion that any political appointment should not be for life. Frustrated by red tape of bureaucracy FDR shows a segment of entrepreneurial leadership (Dubrin, 2004). To top all this controversy, FDR also tried to eliminate some of the conservatives within his own party by supporting their more liberal opponents in the 1938 primary. This attempt was later labeled The great Purge and failed. Of the 10 Democrats targeted, only one lost. All these were reasons the party suffered significant setbacks, as the Republicans reclaimed 81 seats in the House of Representatives and 8 in the Senate in the 1938 midterm elections. In the midst of these setbacks, international events were becoming more important and harder to ignore. During the internal struggle of the depression the administration had adopted a position of isolation and neutrality toward the rest of the world claiming the United States was dragged into WWI by trade entanglements with European factions. The Japanese invaded the Chinese Mainland in 1937 and the fact this happened with very little resistance, FDR considered responding, concerned Japan might be encouraged to continue to press forward threatening crucial United States locations in the Philippines. Although FDR wanted to respond to the threat, he relented to his opposition. He sufficed to publicly quarantined Japan, mainly to express U. S. opposition to the invasion. He did ask and receive funding for increased naval development in the pacific under the guise of creating more jobs (Baliles, 2005). FDR shows his democratic leadership side as he cedes to the wishes of the population and the political majority and refrains from taking any direct and hostile action toward Japan. He probably realizes that the internal problems need the most focus as Japan has not physically attacked the U. S. Although, like the entrepreneurial and situational leader that he is, he sees an opportunity to use the goals of economic recovery and job creation to build up the countrys defenses. The Author would most likely have suggested using this creative plan to enforce the navy in the Atlantic as well (Dubrin, 2004). In Europe, Germany lead by Hitler was also invading neighboring countries under the guise of reuniting Germanic people under one nation. As long as his actions suited his declaration, France and England were content to stay out of the action. Russia under Stalin, seeing the lack of opposition, made a nonaggression pact with Hitler, and started seizing territory in Eastern Europe, while Hitler invaded Poland. These actions in 1939 shocked the world, with France and England declaring the start of World War II (Coker, 2005). Throughout this aggression in Europe, FDR was hamstrung because of the neutrality acts congress passed between 1935 and 1939. Being as staunch supporter of England and France, he did manage to relax them in 1939, accomplishing two goals, boosting our economy with our allies able to buy arms and munitions from us, as well as supporting them. In a speech to Congress he voiced his opposition to the neutrality laws and his regret of signing them. Explaining that none of our ships would enter hostile waters, the allies buying from us would transport the munitions. He also refrained from using military language, afraid of loosing hard won political support, needed in the upcoming election. At this time decisions war vying for supremacy in FDR between the future of the nation and his political career (Baliles, 2005). It is admirable and probably due to his inner circle of family and friend, that FDR has the presents of mind to divide his concentration between the troubles in Europe, trouble in the country and making sure he wins the election. FDR seems to see himself as a servant leader (Dubrin, 2004). Although expressing concern once that the Democratic Party was becoming to dependent on him, he was confidante he would win the nomination and be a favorite in the election. After a period of indecision, that left the party hanging, FDR announced his full support for the ticket. He did win the nomination and promptly announced his intention to replace the vice president, conservative John Nance Garner with Henry Wallace, a progressive who had been a major player in the administration. This caused a major disagreement within the party as nobody wanted a change. FDR got his way by a narrow margin, simply because he threatened to drop out of the race and resign from the white house immediately (Baliles, 2005). FDR seems to let his position go to his head somewhat as his actions describe a section of chapter 4 entitled the dark side of charismatic leadership. It describes that the end justifies the means (Dubrin, 2004). The race was the most challenging so far for FDR. The republicans, taking advantage of the strife in the Republican Party, tried labeling FDR as unstable and warmonger. In return FDR was warning the public of the threat the republicans would dismantle the New Deal and destroy the progress it had made. FDR would win the presidency for a third term with a narrower margin than the last two. Without the concern of the an election FDR proposed a bill to congress, which he promoted through a Fireside chat as well as a speech in congress, stressing that while the country was a peaceful one, with no intention of entering the war, the country had a good neighbor responsibility to help defeat Hitler through the production of goods and weaponry and a Lend-Lease program, under which the Allies could borrow military hardware to return after use. A bill was passed in congress in early1941 that greatly increased our help to Great Britain. As Hitler was fighting by now against England and Russia, having broken the nonaggression pack, FDR was able to increase the U. S. naval presence in the Atlantic on the threat that Hitler was out of control without breaking the neutrality act. This action caused our ships to come under fire, resulting in the sinking of several. In September of 1941, while mourning the death of his mother, FDR gave our navy orders to fire at will. Emboldened by its alliance with Germany, Japan attacked the U. S. at Pearl Harbor hoping to invade and secure the natural resources, denied them after their alliance with Germany, which they were importing from the U. S. before. On December 8, 1941, FDR delivered his famous A ate which will live in infamy speech, to congress asking for a declaration of war and getting it that same afternoon (Coker, 2005). Despite Roosevelts lifelong interest in diplomacy, he never held illusions that he would formulate strategy in case of war. He did, however, expect to stay in close contact with his officers and surround himself with an able advisory team (Coker, 2005, Pg. 134). He also took similar steps to reorient the country for war production, creating the War Production Board to oversee mobilization soon joined by an Office of War Mobilization. FDRs New Deal experience helped him create a cooperative venture between government and private industry to meet defense needs (Coker, 2005). During mobilization FDR brought about significant changes for the betterment of unemployed and minorities. Farmers streamed into cities, finding jobs, women were urged to work at jobs previously occupied by men and everybody was urged to join a union. Unions saw the peek of membership during these years. If the New Deal was slow in turning the economy around, although creating enormous deficit, the Second World War kick started the economy into high gear. Although reluctant and concerned about violating civil liberties, FDR, as was his policy in most military matters, listened to his military advisors and issued Executive Order 9066, which forced over 100,000 Japanese-Americans into internment camps, for security reasons. (Coker, 2005) Controversial and widely criticized later, this action was done out of fear of espionage. At that time, however not the Civil Liberties Union, nor the public objected to this action. If War was not one of FDRs strong points, organizing, creating smooth transitions using programs such as maintenance for membership and no strike-pledge was. He used fireside chats to explain to the public the need for such policies, applying to patriotism. While researching FDRs accomplishments during WWII, the author was amazed by his power of persuasion and organization during this time of mass confusion in this country. Had he lived in this time frame, the Author would have liked FDR to tell him how he kept it all straight (Dubrin, 2004). The outlook did not look promising for the allies in the first months of 1942, but things turned against Germany and Japan when the U. S. won victories in the pacific theater in 1943 and D-Day operation was a great success in France in 1944. On the home front, FDR had to concentrate internally again for several reasons. First the Republicans, having won major advancements in the election of 1942 in Congress, were making it almost impossible to pass legislation to fund the war, which mainly consisted of significant tax hikes. The Labor unions were also threatening to strike over this issue. Mainly the public was fed up with funding the war and having to do without. In 1944, FDR made it known to his party that he was willing to run for a forth term. The party acknowledged that he would be their best chance for victory, however, nominated Senator Harry Truman as Vice President. Although a sick man, run down from his years in office, his energetic campaigning and his medical condition, FDR downplayed the situation and convinced the public they should not change leaders in mid-war. He won the presidency against republican New York governor Thomas Dewey by 54% of the popular vote (Baliles, 2005). FDRs stamina and drive at this point in his life is a little disturbing from the authors point of view. Highly regarded as a great leader, it is surprising he does not recognize his deficiencies and recommends the party choose a different candidate. But then, if his wife, doctor and friends could not persuade him to retire, the author doubts highly that his own powers of persuasion could have influenced FDR to turn the country over to somebody else, and concentrate on his health and family. FDRs health deteriorated rapidly after the election. He would not live to see the end of WWII. Convalescing in Warm Spring, Georgia on April, 12, 1945; he collapsed and died of cerebral hemorrhage. His body was transported from Georgia to Washington D. C. and from there to Hyde Park, N. Y. for burial. Hundreds of thousands of people came to pay their respects during this final journey, attesting to the fact that he was considered the hero and savior of the 20th century (Boyer, P. et. al. (2008). Congress did limit the terms of a president to two terms shortly after FDR’s death. Actually, the Republican Party started legislation on this subject four years earlier, at the time of the last election. They did not pursue it on the grounds of seeming petty during the election. Over the decades the subject â€Å"FDR†, private life, political life and all his accomplishments, good or bad, would be studied by economists, politicians, and academics as well as students like us. One such example is a Policy Review interview of several students asked to compare the Contract with America which the 1995, 104th Congress and House Speaker Newt Gingrich promised to deliver in less than 100 days with FDR’s New Deal. The Author would like to show Quotes to prove several points. Sally C. Pipes, President of Pacific Research Institute for Public Policy â€Å"Speaker of the House Newt Gingrich and the new Republican House Leadership deserve thanks and congratulations for the successful completion of the Contract with America. What a revolutionary series of events has taken place! With the Contract, a promise to the American people was made; in a little less than the promised hundred days, the promise was kept. Of what other Congress in this Century can that be said? † (Pitney, 1995) Mike Siegel, Former president of the National Association of Radio Talk Show Hosts. â€Å"The Contract with America committed the House Republicans to raising and voting on each of the Contract Items. This was accomplished and should be considered a major shift from politics as usual (Pitney, 1995). † Deroy Murdock, President of Loud Clear Communication. â€Å"Assuming the Senate and President Clinton cooperate, the enactment of most Contract items, per se, will not influence American politics as profoundly as did FDR in his First Hundred Days. However, the paradigm shift that has accompanied the Contract likely will parallel the new thinking that FDR inspired 62 years ago. † (Pitney, 1995) Mona Charen, Nationally syndicated columnist. â€Å"The First Hundred Days of the Republican majority were like a laser show—full of color and sound, but so fast and furious that it was difficult for voters to single out the benefits of tort reform, welfare reform, or regulatory reform. † (Pitney, 1995) Jeff Jacoby, Nationally syndicated columnist for the Boston Globe. â€Å"So, no, in terms of legislation completed, Gingrich’s First Hundred Days don’t compare with FDR’s. So thoroughly did Gingrich and his army upend that piece of conventional wisdom, that by the end of a hundred days, Bill Clinton was reduced to insisting he still mattered. â€Å"The President,† he sniffled in a mid-April press conference, â€Å"is relevant here. † (Pitney, 1995) William A. Rusher, Former publisher of National Review. â€Å"The First Hundred Days of the new House Republican Leaders will deserve that well-worn adjective â€Å"historic† even if relatively few of the measures listed in their Contract with America ever become law in the form they recognize (Pitney, 1995). † Burton W. Folsom Jr. , Senior Fellow in Economic Education at the Mackinac Center for Public Policy in Midland, Michigan. â€Å"The House Republican Leadership did most of what it said it would do in the Contract with America. The Republican Contract was a conscious, thoughtful, and usually coherent plan that went from campaign document to legislative writ. The New Deal was improvisational and contradictory right from the start. † (Pitney, 1995) John J Pitney, JR. Associate professor of government at Claremont McKenna College. â€Å"The House GOP’s First Hundred Day compared badly with FDR’s. Although all the items in the Contract With America reached the House floor, only two of them became law before the hundredth day. By contrast, FDR signed bushels of bills during the Hundred Days of 1933. Crisis is the great lubricant of the legislative process, and the economic calamities of FDR’s early days briefly suspended Capitol Hill’s normal Friction. Government has become tangled in its own red tape. † (Pitney, 1995) The Author would like to point out, that there is hardly mention of the president of this time and then only to point out that he was left out of the loop. Apparently the House Speaker and the Republican majority in Congress decided they could upstage a Democratic President with a style of government by one of its own party example. As shown, none of the interviewees have lied, but it was entertaining to read just how much of the story a particular party adherent brings to light to prove his point of view. Clearly, the more is known of the story, the worse the scenario of the Contract With America sounds. We have just had a historical presidential election. If FDR started with having blacks, women and other minorities in high office, this country as a whole just elected a black man into the White house. In 1995 Congress took up FDR’s ideology but tried to upend the hierarchy. Since then the Country’s problems have just gotten worse. Again the cry has started and the president has taken up the challenge and stated publicly that he would use some of FDR’s strategies. Immediately the media, economists and scholars exploded with the similarities of the state of the country then and now, advice and warnings to the administration. We are closer to the FDR era state of the economy, the sharp rise in unemployment, the near collapse of the banking industry and the essential pessimism of the population. FDR’s overall message is less caution and more boldness. The congress will also have a democratic majority next year and one of the most liberal caucuses ever, which should facilitate cooperation by past experience. Together with the lubricant of crisis stated earlier should help (Schlesinger, 2009). Two other similarities are contributed to Barack Obama. He unusually charismatic person and is a great speaker, which should help him guide the general public through this crisis. He has surrounded himself with an experienced staff, headed by â€Å"101st Senator† Rouse. To get his agenda passed, he just needs to convince Congress to take some political risks (Drum, 2008). There is hardly any advice this Author can offer that has not already been offered by persons more qualified other than hope. Hope that lessons have been learned from history and similar situations. God knows this country has had most imaginable, and the

Friday, September 20, 2019

Important Characteristics Of The Wigig Technology Computer Science Essay

Important Characteristics Of The Wigig Technology Computer Science Essay Wireless Gigabit is an up-and-coming technology expected to enable wireless connectivity of up to 7Gbps in data, display and audio applications. The organization sponsoring this technology is the Wireless Gigabit Alliance. Features of Wigig: Some of the important characteristics of the Wigig technology are listed below: Wigig is capable of providing a wireless network which its speed is up to 7Gbps, while the fastest current 802.11n has theoretically the highest speeds up to 600Mbps. WiGig is operated at 60GHz which allows a wider channel and supports super-fast transfer speeds. It can transfer data between 1Gbps to 7Gbps, 60 times more than Wi-Fi. Wigig can be able to support the Tri band devices. WiGig is a multi-gigabit communication technology which is an ideal standard for the use of streaming HD video so it can display full 1080 pixels of the PC to the TV via a wireless network. How does Wigig works: Wigig will primarily be used within a single room to provide wireless connectivity between home entertainment equipment. It will enable very fast data transfers and streaming media which is 10 times faster than the old wireless technologies, in addition to wireless connections for cameras, laptops. Deliverables Technical Issues Current and future expectations of WiGig deployment. Types of challenges or difficulties are there related to WiGig implementations. Kinds of organisations might need these new standards. Security Issues Discuss and analyse the security issues that might arise due to wide deployment of WiGig Alliance. (802.11 security issue and the Galois/Counter Mode of the AES encryption algorithm) Discuss and analyse cross layer security framework in Wireless LAN deployment. Is that framework will improve security in WLAN or not. Technical Issues Current Wigig deployment The industry standard relevant to Wigig is IEEE 802.11ad. Draft 1.0 of the specification was published in Jan 2011. Per the draft standard, signals will occupy the unlicensed 60 GHZ frequency band and all 802.11 ad-compliant devices will provide backward compatibility with 802.11 standard. As a result, tri-band devices will operate at 2.4, 5.0 and 60 GHz. The Wigig specification includes main features to maximize performance, minimize implementation complexity and cost, enable backward compatibility with existing Wi-Fi and provide advanced security. Key features include: Support for data transmission rates up to 7 Gbps. Wigig operates at 60 GHz band that means it has much more spectrum available, the channels are much wider, enabling multi-gigabit data rates. Wigig defines 4 channels, each 2.16 GHz wide which is 50 times wider than the channels available in 802.11n. Seamless switching between 2.4/5/60 GHz bands Based on IEEE 802.11, Wigig provides native Wi-Fi support and enables devices which has tri-band radios to be able to transparently switch between 802.11 network operating in any frequency band including 2.4/5/60 GHz Support for beamforming, a technology which maximize the signal strength and enable robust communication at distances beyond 10 meters. WiGig is integrated a technology, called Beamforming. It allows the radio beam is shot to the right target with the best performance; minimize waste in the process of transmission. Thus, WiGig uses energy more efficient than traditional Wi-Fi connection. Beamforming employs directional antennas to reduce interference and focus the signal between two devices into a concentrated beam. This allows faster data transmission over longer distances. Beamforming is defined within the PHY and MAC layers. During the beamforming process, two devices establish communication and then fine-tune their antenna settings to improve the quality of directional communication until there is enough capacity for the desired data transmission. The devices can quickly establish a new communications pathway using beams that reflect off walls when an obstacle blocks the line of sight between two devices or if someone walks between them. http://genk2.vcmedia.vn/N0WoyYblO3QdmZFKPMtKnadHAHTevz/Image/2012/04/2_6a565.jpg Advanced security using the Galois/Counter Mode of the AES encryption algorithm. AES-GCM is an authenticated encryption algorithm designed to provide both authentication and privacy. Developed by David A McGrew and John Viega, it uses universal hashing over a binary Galois field to provide authenticated encryption. GCM was designed originally as a way of supporting very high data rates, since it can take advantage of pipelining and parallel processing techniques to bypass the normal limits imposed by feedback MAC algorithms. This allows authenticated encryption at data rates of many ten of Gbps, permitting high grade encryption and authentication on system which previously could not be fully protected. Different types of layers take part in the working of the wireless gigabit technology, physical layer (PHY) deals with all the devices of low and high power and maintain the status of communication. Protocol adaption layers (PALs) are being developed to support specific system interfaces including data buses for PC peripherals and display interfaces for HDTVs, monitors and projectors. Supplements and extends the 802.11 Medium Access Control(MAC) layer and is backward compatible with the IEEE 80211 standard Power Management Wigig devices can take advantage of a new scheduled access mode to reduce power consumption. Two devices communicating with each other via a directional link may schedule the periods during which they communicate; in between those periods, they can sleep to save power. 802.11 ad draft standard is compared to other wireless technology http://images-news.easyvn.net/upload/2011/12/08/article/cong-nghe-khong-day-60-ghz-cho-docking-usb-hdmi_3.jpg Wigig in future WGA has announced the launch of a new wireless connection standard, Wigig 1.1 ready for certification. The Wigig 1.1 is added 2 new PALs specifications, the Wigig Display Extension (WDE) and Wigig Serial Extension (WSE) to supplement the previously published Wigig Bus Extension (WBE) and MAC/PHY specifications. Structure of Wigig Wigig is defined in 2 layers based on IEEE 802.11. They are Physical and Medium Access Control layers. These layers enable native support for IP networking over 60Ghz band. They make simpler and less expensive to produce devices that can communicate over both Wigig and existing Wi-Fi using tri-band radios (2.4GHz, 5GHz and 60 GHz). http://farm3.static.flickr.com/2390/5791077356_c2146fb4f0.jpg Physical Layer The physical layer of the 802.11 ad standardized 2 wireless data exchange techniques: Orthogonal frequency-division multiplexing (OFDM) Single carrier (SC) The 802.11ad divides the 60GHz band into four 2.16 GHz wide channels. Data rates of up to 7 Gbits/s are possible using OFDM with different modulation schemes. A single channel version for low power operation is available and can deliver a speed up to 4.6 Gbits/s. These wide channels enable WIgig to support applications that require extremely fast communication, such as uncompressed video transmission. The PHY in 802.11ad is split into Physical Layer Convergence Protocol (PLCP) and the Physical Medium Dependent (PMD) sub layers. The PLCP parses data units transmitted/received using various 802.11 media access techniques. The PMD performs the data transmission/reception and modulation/demodulation directly accessing air under the guidance of the PLCP. The 802.11 ad MAC layer to great extend is affected by the nature of the media. For instance, it implements a relatively complex for the second layer fragmentation of PDUs. Medium Access Control (MAC) layer Wigig shares MAC layer with existing 802.11 networks enables session switching between 802.11 networks operating in the 2.4 GHz, 5GHz and 60 GHz bands, resulting in uninterrupted wireless data communications. The 802.11 ad MAC layer has been extended to include beamforming support and address the 60 GHz specific aspects of channel access, synchronization, association and authentication. Protocol Adaption Layer (PALs) PAL is a layer added to network transmissions to help adapt to older standards. It allows wireless implementations of key computer and consumer electronics interfaces over 60GHz Wigig networks. The version 1.0 A/V and I/O protocol adaption layer (PAL) specifications have been developed to support specific system interfaces including extensions for PC peripherals and display interfaces for HDTVs, monitors and projectors. The Wigig Bus Extension (WBE) Define high-performance wireless implementations of widely used computer interfaces over 60GHz. Enable multi-gigabit wireless connectivity between any two devices, such as connection to storage and other high-speed peripherals The Wigig Display Extension (WDE) Support wireless transmission of audio/visual data Enable wireless DisplayPort and other display interfaces that include the High-bandwidth Digital Content Protection 2.0 feature. Offers key A/V applications, such as the transmission of lightly compressed or uncompressed video from a computer or digital camera to an HDTV, monitor or projector. http://img84.imageshack.us/img84/2195/fig2m.jpg Modulation Coding Scheme (MCS) The specification supports two types of modulation and coding schemes, which provide different benefits. Orthogonal frequency-division multiplexing (OFDM) supports communication over longer distances with greater delay spreads, providing more flexibility in handling obstacles and reflected signals. The single carrier, suited to lower applications, achieves a data rate up to 4.6 Gbits/s, while OFDM enables 7 Gbits/s. Usage Models Wigig has a high compatibility and is used for many purposes. Wigig can act as an alternative method which is used for replacing old connectivity standards such as: USB, DisplayPort, PCIe and HDMI. In addition, it is backward compatible with most devices which using 802.11 connectivity in the 2.4 GHz and 5 GHz bands. The main function of Wigig is to connect home entertainment devices together tablets, smartphones, PC, TV and more. http://images-news.easyvn.net/upload/2011/12/08/article/cong-nghe-khong-day-60-ghz-cho-docking-usb-hdmi_2.jpg Challenges or difficulties are there related to WiGig implementations. The biggest technical challenge is that these networks will operate in much higher frequencies, around 60 GHz. The higher the frequency is, the greater the propagation loss over distance. Another challenge is 60 GHz radio are absorbed by wood, bricks, human body and particularly paint are far more opaque to 60 GHz waves. Thus, Wigig is most suitable for in-room applications. Attenuation of various materials by frequency Besides that, the beamforming of compliant equipment needs to be within line of sight of receiving devices in order to work well. Even a person stepping between two communicating devices can break the signal. With these weaknesses, they will prevent Wigig from being implemented popularly in the future. Moreover, most today devices only support 802.11 a/g/n; it will take time to replace all these devices with new devices which support 802.11ad standard. Kinds of organisations might need these new standards WiGig is a multi-gigabit communication technology which is an ideal standard for the use of streaming HD video so it can display full 1080 pixels of the PC to the TV via a wireless network. In addition, its speed is up to 7 Gbps which is very useful for so many organizations such as: Multimedia organization (newspapers, advertisement, movie) Financial organization (Bank, office, tax) Education organization (TAFE, university) Medical organization (Hospital) IT organization (Intel, Dell, Apple etc.) Government Military Security Issues Due to Wigig is based on IEEE 802.11 standards; it has the same security issues with 802.11 a/b/g/n. Easy to access Wireless LANs are easy to find. To enable clients to find them, networks must transmit Beacon frames with network parameters. The information needed to join a network is also the information needed to launch an attack on a network. Beacon frames a not processed by any privacy functions, which means that your 802.11 network and its parameters are available for anybody with an 802.11 card. Attackers with high-gain antennas can find networks from nearby roads or buildings and may launch attacks without having physical access to your facility. Solution: Enforce Strong Access Control Ensuring that wireless networks are subject to strong access control can mitigate the risk of wireless network deployment. Networks should place access points outside of security perimeter devices such as firewalls, and administrators should consider using VPNs to provide access to the corporate network. Strong user authentication should be deployed, preferably using new products based on the IEEE 802.1x standard. 802.1x defines new frame types for user-based authentication and leverages existing enterprise user databases, such as RADIUS. Rogue Access Points Easy access to wireless LANs is coupled with easy deployment. When combined, these two characteristics can cause headaches for network administrators and security officers. Any user can run to a nearby computer store, purchase an access point, and connect it to the corporate network without authorization. Rogue access deployed by end users poses great security risks. End users are not security experts, and may not be aware of the risks posed by wireless LANs. Many deployments that have been logged and mapped by war drivers do not have any security features enabled, and a significant fraction have no changes from the default configuration. Solution: Regular Site Audits Like any other network technology, wireless networks require vigilance on the part of security administrators. The obvious way to find unauthorized networks is to do the same thing that attackers do: use an antenna and look for them so that you find unauthorized networks before attackers exploit them. Physical site audits should be conducted as frequently as possible. Unauthorized Use of Service Several war drivers have published results indicating that a clear majority of access points are put in service with only minimal modifications to their default configuration. Unauthorized users may not necessarily obey your service providers terms of service, and it may only take one spammer to cause your ISP to revoke your connectivity. Solution: Design and Audit for Strong Authentication The obvious defence against unauthorized use is to prevent unauthorized users from accessing the network. Strong, cryptographically protected authentication is a precondition for authorization because access privileges are based on user identity. VPN solutions deployed to protect traffic in transit across the radio link provide strong authentication. MAC Spoofing and Session Hijacking 802.11 networks do not authenticate frames. Every frame has a source address, but there is no guarantee that the station sending the frame actually put the frame in the air. Just as on traditional Ethernet networks, there is no protection against forgery of frame source addresses. Attackers can use spoofed frames to redirect traffic and corrupt ARP tables. At a much simpler level, attackers can observe the MAC addresses of stations in use on the network and adopt those addresses for malicious transmissions. Attackers can use spoofed frames in active attacks as well. In addition to hijacking sessions, attackers can exploit the lack of authentication of access points. Access points are identified by their broadcasts of Beacon frames. Any station which claims to be an access point and broadcasts the right service set identifier (SSID, also commonly called a network name) will appear to be part of an authorized network. Attackers can, however, easily pretend to be an access point because nothing in 802.11 requires an access point to prove it really is an access point. At that point, the attacker could potentially steal credentials and use them to gain access to the network through a man-in-the-middle (MITM) attack. Solution: Adopt Strong Protocols and Use Them Using methods based on Transport Layer Security (TLS), access points will need to prove their identity before clients provide authentication credentials, and credentials are protected by strong cryptography for transmission over the air. Session hijacking can be prevented only by using a strong cryptographic protocol such as IPsec. Using strong VPN protocols which require the use of strong user authentication with 802.1x. Traffic Analysis and Eavesdropping 802.11 provides no protection against attacks which passively observe traffic. The main risk is that 802.11 does not provide a way to secure data in transit against eavesdropping. Frame headers are always in the clear and are visible to anybody with a wireless network analyser. Security against eavesdropping was supposed to be provided by Wired Equivalent Privacy (WEP). However, it protects only the initial association with the network and user data frames. Management and control frames are not encrypted or authenticated by WEP, leaving an attacker wide latitude to disrupt transmissions with spoofed frames. Solution: Perform Risk Analysis When addressing the threat of eavesdropping, the key decision is to balance the threat of using only WEP against the complexity of deploying a more proven solution. If wireless LAN is being used for sensitive data, WEP may very well be insufficient for your needs. Strong cryptographic solutions like SSH, SSL, and IPsec were designed to transmit data securely over public channels and have proven resistant to attack over many years, and will almost certainly provide a higher level of security. Key Problems with WEP Repeat in key stream which allows easy decryption of data for a moderately sophisticated adversary. Weak implementation of the RC4 algorithm leads to an efficient attack that allows key recovery Subject to brute force attacks (Short Keys) Easily compromised keys (Shared keys/No Key management) Message modification is possible No user authentication occurs Subject to Man in the Middle attacks WPA Benefits Improved Cryptography Strong Network access control Will Support 802.1x, EAP, EAP-TLS, Radius, and Pre-Placed Keys Key Management Replay Protection Provides for data and header integrity Flaws While (Temporal Key Integrity Protocol) TKIP (a message integrity check algorithm is to verify the integrity of the packets) Michael significantly improve WEP security, design limitations result in cryptographic weaknesses. Limitations of Michael to retrieve the keystream from short packets to use for re-injection and spoofing. WPA2 Benefits Strong Cryptography Support for Legacy Equipment Strong Network Access Control Will Support 802.1x, EAP, EAP-TLS, Radius, and Pre-Placed Keys Key Management Replay Protection Provides for data and Header Integrity Roaming Support Security issue There is a flaw that was discovered. It is called WPS (wireless protected setup); it is the little initial setup that most new/newer routers come with. The WPS is a button which we need to hit when we want to initially set up connection. That is the security flaw thats used now to crack wpa/wpa2. There is a free program to exploit this flaw (reaver) and it has about a 100% success rate in cracking wpa/wpa2. Galois/Counter Mode (GCM) GCM is a block cipher mode of operation providing both confidentiality and data origin authentication. It was designed by McGrew and Viega. Benefits Support communication speeds of 10 Gbps Provides strong encryption based on the Advanced Encryption Standard (AES) Be able to implement in hardware for performance and efficiency Security Issues GCM provides no message authentication There are some security issues if GCM mode is used incorrectly. GCM is not suited for use with short tag lengths or a very long message. The user should monitor and limit the number of unsuccessful verification attempts for each key. It is strongly recommended to use all 16 bytes for the tag, and generally no less than 8 bytes. The same length of tag must always be used for a given key. The initialization vector (IV) must be unique for each operation for a given key. Security is destroyed for all text encrypted with the same key if the IV is used for different plaintext. Using 12 bytes randomly generated IV is ok and so is a counter that is controlled over so that it can never be repeated. Cross layer security framework in Wireless LAN deployment Cross-layer design appears to be a suitable approach for future contributions in the framework of WLANs able to address emerging issues related to ever-higher performance, energy consumption, mobility. The single layer security is often inefficient and inadequate for provisioning secure data transmission in WLAN. In generally, the security of a network is determined by the security it has over all the layers. Thus, the cross-layer security framework needs to be proposed in WLAN. The security framework may support many components like intrusion detection system, Trust framework and adapted link layer communication protocol. In order to carry out practical cross-layer security framework in WLAN, we need to follow: Component based security: Security measures must be provided to all the components of a protocol stack as well as to the entire network. The developers should focus on securing the entire network. Robust, simple and flexible designs: Security mechanisms should construct a trustworthy system out of untrustworthy components and have the capability to detect and function when need arises. This should also support scalability. Various types of active and passive attacks have been recorded in WLAN A denial of service (DoS) attack: In DoS attack, a malicious node could prevent another node to go back to sleep mode which in turn causes battery depletion. Eavesdropping and invasion: If no sound security measures are taken, invasion becomes fairly an easy task due to wireless communication. An adversary could easily extract useful information from the unattended nodes. Hence, a malicious user could join the network undetected by impersonating as some other legitimate node, to have access to secret data, disrupt the network operations, or trace the activity of any node in the network. Physical node tampering leading to node compromising. Forced battery exhaustion of a node. Radio jamming at the physical layer. There are some types of cross-layer security Cross-layer security design for intrusion detection All approaches pertaining to intrusion detection schemes have been focused on routing and MAC protocols. The existing secure protocols or intrusion detection schemes are normally presented for one protocol layer. So, the effect of these schemes is sandwiched to attacks to a particular layer. They are seldom effective to attacks from different protocol layers; however, security concerns may arise in all protocol layers. It is necessary to have a cross-layer based detection framework that consolidates various schemes in various protocol layers. Cross-layer security design for power efficiency As previously mentioned, energy conservation is one of the primary concerns for sensor networks design, so it should be considered across protocol layers from the beginning stage through subsequent stages of the design to achieve the trade-off between energy consumption, network performance and complexity, and maximize the longevity of the entire network. Our cross-layer approach can achieve this while providing network security provisioning. For instance, the carrier detection is responsible for DoS attacks. A detrimental or malicious node can exploit then interplays in MAC layer to frequently request for channels. This not only prohibits other nodes from connecting with the destination, but also can deplete its battery energy due to frequent responses. To overcome this issue, the information can be collected from other layers and the detrimental node can be recognized and then be limited or isolated. Conclusion After analysing the security risks of WLAN and investigating the advantages of cross-layer security framework, I believe that the cross-layer design is a unique candidate to improve security in WLAN. Summary Wigig or 802.11ad based on the 802.11 standard is a new wireless technology which provides data rates up to 7Gbps over the unlicensed 60 GHz. It will primarily be used within a single room to provide wireless connectivity between home entertainment equipment. It will enable very fast data transfers and streaming media which is 10 times faster than the old wireless technologies. However, Wigig still has some challenges which are the limitation of propagation loss and distance. That is why it can primarily be used within a room or an office. But Wireless Gigabit Alliance claimed that Wigig can be used beyond 10 meters by using beamforming technology in the near future.

Thursday, September 19, 2019

New commercial landscaping technological processes and restructured Ess

New commercial landscaping technological processes and restructured as a Limited Liability Corporation. Joe's is being considered as a potential business investment, "Business Venture Capital". Buying an existing business can be an excellent way to become a business owner or to expand your present business. You can save time and effort of building a customer and supplier base. You may also avoid the trouble of locating equipment and hiring and training employees. However, you should abide by the Latin slogan which translates "Let the buyer beware." If you are not careful, acquiring an existing business can lead to disaster. (Poznak, 1998) Joe's Landscaping and Tree Trimming (Joe's) began as a small sole proprietorship. In efforts to expand and become a company that investors would be interested in, the company has ventured into new commercial landscaping technological processes and restructured as a Limited Liability Corporation. Joe's is being considered as a potential business investment, however, after reviewing the requirements of the legal due diligence process, it is my recommendation that an investment is not made into Joe's. In the third quarter of 2002, investors pumped $4.5 billion into 647 entrepreneurial companies, a decrease of 26% from the prior quarter, which saw $6 billion of funding to 838 startups. While IT startups consistently gain venture capitalists' attention, software companies continue to gather the largest amounts of cash despite a 10% drop in funding from the prior quarter. Representing 22% of total investment dollars, 180 software companies got funding, totaling $993 million. "Software is once again leading VC back to its roots, being the largest category in all of 2 but the last 10 years," says Tracy Lefteroff, global managing partner of the venture-capital practice at PricewaterhouseCoopers. He says that software companies are a safer bet for investors, as they have lower initial capital requirements and early milestones for achievements. (www.informationweek.com) While startups at all stages are struggling in this down market, the stakes are highest for new companies who want to gain first-time funding. Only 159 entrepreneurs received first-time funding in the third quarter, compared with 214 in the second quarter. Software startups took 30% of that money. Overall, the tightened i... ...ele. Since more revenue dollars are used for labor expenses, it is imperative that management maximizes the productivity they get out of their employees. (www.asbdc.com) It is imperative to mitigate major risks when considering investment opportunities. Potential liabilities are often over looked in the excitement of the investment opportunity. Liability claims from hazardous working conditions and potential environmental concerns makes Joe's a risky investment. More research needs to be done to ensure the company is utilizing environmentally safe products, tools, and is creating opportunities to produce safer materials and processes. References Arkansas Small Business Development Center. (2003, April). Retrieved June 23, 2004, from http://www.asbdc.ualr.edu/bizfacts/8002.asp Cuneo, E. C. (2002, October). More Venture Capitalists Keep Their Wallets Closed. Retrieved June 23, 2004, from http://www.informationweek.com/story/IWK20021028S0010?ls=TW_012803_fea&fb=20030128_software Poznak, J. L. (1998, August). Buying a business: Let the buyer beware. Retrieved June 23, 2004, from http://www.keepmedia.com/ShowItemDetails.do?itemID=203222&extID=10032&oliID=213 New commercial landscaping technological processes and restructured Ess New commercial landscaping technological processes and restructured as a Limited Liability Corporation. Joe's is being considered as a potential business investment, "Business Venture Capital". Buying an existing business can be an excellent way to become a business owner or to expand your present business. You can save time and effort of building a customer and supplier base. You may also avoid the trouble of locating equipment and hiring and training employees. However, you should abide by the Latin slogan which translates "Let the buyer beware." If you are not careful, acquiring an existing business can lead to disaster. (Poznak, 1998) Joe's Landscaping and Tree Trimming (Joe's) began as a small sole proprietorship. In efforts to expand and become a company that investors would be interested in, the company has ventured into new commercial landscaping technological processes and restructured as a Limited Liability Corporation. Joe's is being considered as a potential business investment, however, after reviewing the requirements of the legal due diligence process, it is my recommendation that an investment is not made into Joe's. In the third quarter of 2002, investors pumped $4.5 billion into 647 entrepreneurial companies, a decrease of 26% from the prior quarter, which saw $6 billion of funding to 838 startups. While IT startups consistently gain venture capitalists' attention, software companies continue to gather the largest amounts of cash despite a 10% drop in funding from the prior quarter. Representing 22% of total investment dollars, 180 software companies got funding, totaling $993 million. "Software is once again leading VC back to its roots, being the largest category in all of 2 but the last 10 years," says Tracy Lefteroff, global managing partner of the venture-capital practice at PricewaterhouseCoopers. He says that software companies are a safer bet for investors, as they have lower initial capital requirements and early milestones for achievements. (www.informationweek.com) While startups at all stages are struggling in this down market, the stakes are highest for new companies who want to gain first-time funding. Only 159 entrepreneurs received first-time funding in the third quarter, compared with 214 in the second quarter. Software startups took 30% of that money. Overall, the tightened i... ...ele. Since more revenue dollars are used for labor expenses, it is imperative that management maximizes the productivity they get out of their employees. (www.asbdc.com) It is imperative to mitigate major risks when considering investment opportunities. Potential liabilities are often over looked in the excitement of the investment opportunity. Liability claims from hazardous working conditions and potential environmental concerns makes Joe's a risky investment. More research needs to be done to ensure the company is utilizing environmentally safe products, tools, and is creating opportunities to produce safer materials and processes. References Arkansas Small Business Development Center. (2003, April). Retrieved June 23, 2004, from http://www.asbdc.ualr.edu/bizfacts/8002.asp Cuneo, E. C. (2002, October). More Venture Capitalists Keep Their Wallets Closed. Retrieved June 23, 2004, from http://www.informationweek.com/story/IWK20021028S0010?ls=TW_012803_fea&fb=20030128_software Poznak, J. L. (1998, August). Buying a business: Let the buyer beware. Retrieved June 23, 2004, from http://www.keepmedia.com/ShowItemDetails.do?itemID=203222&extID=10032&oliID=213

Wednesday, September 18, 2019

The Work of Langston Hughes Essay example -- Poetry Langston Hughes Au

The Work of Langston Hughes Langston Hughes is considered by many readers to be the most significant black poet of the twentieth century. He is described as  ³...the beloved author of poems steeped in the richness of African American culture, poems that exude Hughes ¹s affection for black Americans across all divisions of region, class, and gender. ² (Rampersad 3) His writing was both depressing and uplifting at times. His poetry, spanning five decades from 1926 to 1967, reflected the changing black experience in America, from the Harlem Renaissance to the turbulent sixties. At the beginning of his career, he was surrounded by the Harlem Renaissance. New York City in the 1920 ¹s was a place of immense growth and richness in African-American culture and art. For Hughes, this was the perfect opportunity to establish his poems. His early work reflects the happy times of the era. However, as time progressed he became increasingly bitter and upset over race relations. Except for a few examples, all his poems from this later period spoke about social injustice in America. The somber tone of his writing often reflected his mood. Race relations was the shadow of his career, following him from his first poem to his last. The tone and subject matter of Hughes ¹s poetry can be linked to certain points in history, and his life. The youth of Hughes is brought out by his poem  ³Harlem Night Club ², a piece which describes living in the moment. Often children do not consider the consequences of their actions; they act on instinct and desire. Hughes might have been 27 when he wrote this poem, but the feisty, upbeat tempo of a school boy is present in his style.  ³Harlem Night Club ² is unique in that it describes the integration of blacks and whites in an optimistic tone. The vigor and spirit of his youth is reflected in the energy of the writing,  ³Jazz-band, jazz-band, ­ / Play, plAY, PLAY! / Tomorrow....who knows? / Dance today! ² The repetition of the words, and the increasing emphasis on the word  ³play ² bring out the excitement to the reader. More evidence of Hughes ¹s youth comes from the very focus of the poem: the interracial couples. The entire poem can be summed up as  ³...a single-glance tableau of interracial flirtation against a background of heady jazz. ² (Emanuel 120) This festive relationship between the two sexes can rarely be seen in any of Hughes ¹s later poems. At th... ... civil rights movement had peaked, Hughes is left feeling worthless. The bitterness he faced during his lifetime built up to a dull apathy that appears in this piece. Despite the fact that Hughes is  ³...among the most eloquent American poets to have sung about the wounds caused by injustice ² (Rampersad 3), he thought his poems made no impact on society. On the contrary, Hughes ¹s poems had a tremendous influence on African-American society. Although scholars and critics throughout his career dismissed his poetry as too  ³simple and unlearned, ² his primary audience, the black masses, and even Hughes himself viewed his work as  ³folk poetry ² which was beneath criticism. (Rampersad 4-5) His poems, when studied as a collection over the span of his life, clearly show how the tone and emphasis in the writing reflect the mood of Hughes himself as he grew old. The universal theme of racism and race relations defined all the important work of Langston Hughes. Langston Hu ghes Danny Belinkie December 23, 1999 Period 2 Works Cited Emanuel, James. Langston Hughes. Twayne Publishers, Boston, 1967. Arnold Rampersad. The Collected Poems of Langston Hughes. Vintage Classics, New York, 1994.

Tuesday, September 17, 2019

The Challenging Issue of the Separation of Church and State :: Exploratory Essays Research Papers

The Challenging Issue of the Separation of Church and State When the first amendment was written it said â€Å"Congress shall make no law respecting and establishment or religion or prohibiting the free exercise thereof†¦Ã¢â‚¬ Ã‚   This was written because America didn’t want a mandatory religious system like that of England.   American people didn’t want freedom from religion they simply wanted freedom of religion.   Even the men who wrote the constitution believed that God could do much more than man, therefore they used the Bible to help form the government. Our constitution has been amended and changed driven by the effects of modern controversies. The founding fathers did not intend to create a Christian nation.   The Christian cross and American flag were displayed in public places with hardly any voice of dissent.   Jefferson felt that he did not have the constitutional authority to lead the people in act of prayer. Under the strong influence of Virginia, southern states decided to rewrite their constitution and disestablish all Churches.   The constitution was then rewritten with God’s name removed. The issue whether or not church and state should be separate didn’t evolve until the 19th century, and today it is hot topic among both separationists and accommodationists alike.   Separationists are the people who push separation of church Separationists feel that neither state nor the federal government can set up churches / aid religion; there should be absolutely no governmental funding of religious activity/displays, any praying in public school / teaching of evolution.   On the opposing side, accommodationists oppose separation between church and state, interpreting the first amendment exactly as it is stated.   No where in the first amendment does it say â€Å"separation of church and state . Accommodationists support government funding of religious schools / organization, they support government organized (non denominational) prayers, and the funding of religious displays. Religions place in schools has always been scrutinized.   In 1954 ‘under God’ was placed in the pledge of allegiance.   Since then, regulations have severely changed.   Prayer in schools has been deemed unconstitutional. Instead, schools allow a moment of silence as long as no religious intent is applied.   Prayer is allowed in schools as long as students initiate and control the religious meetings. In Doe vs. Santa Fe, during a school football game over the school PA system, a prayer was announced.   The school claimed prayer â€Å"promotes good sportsmanship and student safety, and to establish the appropriate environment for the competition.

Leadership Profile Essay

When examing what makes a good leader you can ask a very simple question, what I believe to be a very important factor, which is, do they have passion in what they do? Leaders in business today have to have a passion for what they do in order to make a successful and influential leader. The success of any company is only as great as the employees on the forefront make it. Transformational leadership is a form of leadership that occurs when leaders ‘broaden and elevate the interests of their employees, when they generate awareness and acceptance of the purposes and the mission of the group and when they stir their employees to look beyond their own self-interest for the good of the group† (Bass, 1990). Transformational leadership has the ability to generate a higher commitment to the company from its’ employees. I believe that Sam Walton, the Founder of Walmart had this ability. Walmart as we know it today evolved from Sam Walton’s goals for great value and great customer service. â€Å"Mr. Sam,† as he was known, believed in leadership through service. This belief that true leadership depends on willing service was the principle on which Walmart was built, and drove the decisions the company has made for the past 50 years. So much of Walmart’s history is tied to the story of Sam Walton himself, and so much of our future will be rooted in Mr. Sam’s principles† (Walmart, 2012). You can see this principle the moment that you walk in to any Walmart store. There is a greeter there to meet you everytime. Sam Walton made sure that from the time that you walked in the door that you had great customer service experience. Not only will it make the customer feel welcomed, but it will also help repeat business. To obtain this type of customer service level, the leader behind the scenes needs to create â€Å"buy ‘in† from their employees. The employees need to believe in what they are doing and understand the goal of the company. One of the towering strengths of Sam Walton was his unique ability to gain the trust and support of the people around him. He called his customers â€Å"neighbors† or â€Å"guests† and he referred to the managers in his company as ‘coaches’† (Bergdahl). The first Walmart was opened in 1962 and by 1970, the company went public because of how much it had grown. This is a true testament of a good leader having a clear vision of what he wants for his company and what he expect from the employees. His vision alone is what makes him so effective. He believed that offering lower prices and greater customer service can make all the difference to a business. Seeing the success of Walmart proves this theory. Employees easily understand the goal of the company. They too benefit from the lower prices. According to Michael Bergdahl, author of The 10 Rules of Sam Walton, Sam Walton was a man who had a vision, never gave up, and was optimistic. These are just a few of the characteristics of Sam Walton that have affected many people. â€Å"Walton also a leader who close to the employees. Often vanity top executives has led to the collapse of a company. They tend to build a distance (gap) with front-line employees. The bigger of the company, usually the greater the possibility of these leaders have lost contact with the front-line employees. But not so with Sam Walton, he was a leader who humble and modest. Throughout his life, he often visited the front lines of every store. Sam Walton’s leadership style is close to the employee coloring corporate culture of Wal-Mart today† (Bergdahl).