Thursday, October 31, 2019

Organ Systems & Evolution Assignment Example | Topics and Well Written Essays - 1000 words

Organ Systems & Evolution - Assignment Example The circulatory and lymphatic systems are also connected, for lymph in the lymphatic system comes from blood. Lastly, secondary lymphedema, an obstruction of lymph flow, is discussed with its similarities to atherosclerosis. Atherosclerosis and Heart Attack Normally, the heart supplies oxygen to all parts of the body to keep them alive, and at the same time, oxygen-rich blood must be supplied to the heart muscle to keep it alive. However, in the case of atherosclerosis, or the buildup of plaque in the arterial walls, the flow of oxygen-rich blood to a particular section of a heart muscle, or myocardium, can get blocked. If the blood supply to the heart muscle is greatly reduced or completely prevented, it will eventually cause the muscle to die. Although there could be other causes for a heart attack, the one caused by this buildup of plaque, or atherosclerosis, is known as coronary heart disease, or CHD (â€Å"What is a Heart Attack,† NIH, 2011). The reason behind the name is the fact that the coronary artery is responsible for the supply of oxygen to the heart. (Matthews, 2011) Coronary heart disease is caused by the buildup of plaque for many years, and will most likely lead to a heart attack. As plaque accumulates in the wall of the artery which supplies oxygen-rich blood to the heart, this plaque may cause a rupture inside the artery and thus cause a blood clot to form on the surface of the plaque. If this plaque grows in size and becomes large enough, it may completely block all blood flow to the heart muscle (â€Å"What is a Heart Attack,† NIH, 2011). The complete obstruction of the blood will cause a myocardial infarction, or heart attack. However, partial blockage may only cause chest pain. (Matthews, 2011) Heart attacks may not kill the person and may simply cause heart failure. Heart failure can lead to other problems like dyspnea, or shortness of breath, and edema, or swelling of the body due to buildup of fluid the heart would normall y get rid of as waste if it were functioning efficiently. (Sourfer, 2002) Arteries, Veins and Capillaries Blood vessels are hollow tubes that do not only hold the blood within the body but also circulate them across organs in the body. There are three types or varieties of blood vessels. The arteries transport oxygenated blood away from the heart. The capillaries are the ones that connect the arteries and the veins, and finally the veins carry the deoxygenated blood back to the heart. (â€Å"Blood Vessels,† 2011) The main function of arteries is to carry blood from the heart to all the other organs, except for the pulmonary arteries that carry deoxygenated blood towards the lungs. Arteries are thick-walled blood vessels and thus may be able to withstand constant stretching every time blood rushes through them for every heartbeat. The thick walls of the artery protect it from the high pressure of blood flow coming from the ventricles of the heart. (â€Å"Blood Vessels,† 2000) Veins, on the other hand, may undergo less pressure coming from the blood flow from organs. It also follows that the wall of a vein is thinner than that of an artery. The function of veins is generally to carry deoxygenated blood from the organs towards the heart, except for pulmonary veins that carry oxygenated blood from the lungs towards the heart. Moreover, veins have a special purpose of carrying waste

Tuesday, October 29, 2019

Leadership assignment Example | Topics and Well Written Essays - 1500 words

Leadership - Assignment Example The main drawback of the manager was that he was very autocratic in his style. The company consisted of 100 employees then. Though there were divisional managers for each functional level, the decisions for the functional levels are taken by the MD himself. Even if the decisions of the divisional managers are worth, the MD hardly approves them. The second major drawback of his is that he is less concerned about the growth of his employees. In other words, he is highly afraid of being dethroned by other talents in the company. When an employee aims for taking accreditation tests, he de-motivates them by saying that it is not required at their stage and they could think of it on some later years. Overall he wants the employees to progress very slowly in the organization. But there is one good quality that he possesses. He takes quick decisions. There were many instances where the company required immediate decisions to sustain business. He was good enough to take decision at the right time and sustain the business. Though decision making is one of the best skills of a leader, its sole possession cannot make a person an efficient leader. Organizational Structure and Culture The organization which I worked for was a partnership firm. The company had a very informal culture. As per the firm’s objectives, there were no strict hierarchies to be followed. Everybody from the associate staff to the top directors of the firm are to be addressed each other’s by their first name only. Even an associate staff has the liberty to report anything directly to the chairman or director. Every individual who is recruited to the company is being given orientation program about the organizational culture and practices. This one week of orientation program is given in order to make the individual learn and unlearn various things. The culture of the firm has definitely helped me to enhance my relationship skills. The only hindrance for growth was the attitude of the manag ing director. My role in the company was a consultant. A consultant is just one level next to the associate staff. I am a person who likes to interact and mingle with people. The company’s culture helped me to be in constant interaction with the divisional managers and even the managing director. I could always interact with them on work or non-work related matters. The workforce of the firm was divided into various groups based on the companies for which the consulting is performed. A group is not permanent and each group will have members based on their team requirements. For instance, the team for Kraft Foods consulting will be different from the team for John Deer consulting. Both the teams may or may not have common members in them. Therefore, the team system enables an individual to be connected with various people in the organization. The team will also undergo minor re-shuffling every year. Each team will also have a person as a team lead who will manage the smooth fl ow of work in that team. Therefore, it gives an individual the opportunity for enhancing their leadership skills. Performance of the selected leader As discussed before, one of the good qualities of the managing director was his effective communication skills. He always communicated well with the employees. In that way he has helped me to motivate me on my communication skills. I always like to interact with people. I could always talk to him about anything. He always

Sunday, October 27, 2019

Overview of VPN Evolution of Private Networks

Overview of VPN Evolution of Private Networks Before the emergence and popularity virtual private networks have gained as a secure and cheaper medium for sensitive information to be accessed and transmitted between two or more corporate network over a public network such as the internet, other network technologies have been innovated and used to connect within business sites and across to other sites that are miles away from each other. In the sixties, sites were connected together to enable data transfer through the use of analog phone lines and 2,400-bps modems leased from ATT, businesses had no other faster modems they could choose from because the telephone companies were controlled by the government. It was not until the early eighties that businesses were able to connect to sites at higher speed using 9,600-bps modems because other telephone companies emerged as a result of the changes in government control and policy on telephone. During this period, there were not much mobile workers besides the modem links were static not as dynamic as what is available now. The analog phone lines were permanently wired to the sites and were specially selected lines (called conditional lines) that were specifically built for full time use by companies; these lines are different from regular phone lines. This technology ensured full bandwidth and privacy but this came at a great cost, i.e. payment is expected for the full ba ndwidth even if the line was used or not. Another innovation that was used for connecting sites which came out in the mid 1970s was the Digital Data Service (DDS). This was the first digital service with a connection of 56 Kbps and was used for private line. This service later became a major and useful innovation for wide area networks, which grew into other services that are popularly used today such as the T1 service which consists of 24 separate channels and each can carry up to 64 Kbps of either data or voice traffic. In the late 1970s the idea of VPN was initiated with the introduction of an innovation called the X.25. It is a Virtual Connection (VC) form of WAN packet switching which logically separates data streams. With this function, the service provider is able to send as many point-to-point VCs across a switch network infrastructure, depending each endpoints have a device that facilitates communication in the site. Sometime in the early 1980s, X.25 service providers offered VPN services to customers (i.e. businesses) who used network protocols at the time as well as early adopters of TCP/IP. Over years, in the 1990s other networking technologies were deployed for connecting private networks such as the high speed Frame relay and Asynchronous Transfer Mode (ATM) switching. This networking technologies were provided to give virtual connection to businesses at the speed of up to OC3 (155 Mbps). The components for setting up this kind of technologies involved the use of customer IP routers (customer premise equipment, or CPE) interconnected in a partial or full mesh of frame relay or ATM VCs to other CPE devices, in other words less equipments are needed for its set up. – Metz, C. (2003). Based on some definitions and some researchers like Mangan, T. (2001), the frame relay and ATM technology are referred the standard for VPN technology. These technologies gained so much popularity after the leased line in connecting sites and they were also easy to set up. With the increasing speed at which businesses grow and expand globally, thereby allowing staffs to be mobile and work offsite, the frame relay is not the best technology to use for remote access since it is just an overlay technology. In as much as the leased line is a better technology alternative for connecting business sites, it is excessively expensive to be owned. With the advent of the internet and its wide use in everyday transaction, businesses have adopted the technology for transmitting and accessing data across various sites by implementing a VPN connection, which is relatively cheap, flexible and scalable, between both sites in order to secure the data that are sent across the insecure internet from being tampered by unauthorized persons. VPN definition There are various definitions of a Virtual Private Network (VPN) which are given by various vendors which best describes their products. Several books, journals, whitepapers, conference papers and internet sites have various definitions of what the technology is, and these definitions are usually put in different words and sentence structure but mostly they say the same thing. In order to get a good understand of what the technology is all about, definitions given by several people from different sources will be looked at and a concise definition will be formulated from all definitions that will be used throughout this research work. â€Å"A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizations network.† SearchSecurity.com (2008). â€Å"A VPN is a group of two or more computer systems, typically connected to a private network (a network built and maintained by an organization solely for its own use) with limited public-network access that communicates securely over a public network.† (Calsoft labs whitepaper, 2007) Aoyagi, S. et al. (2005) A Virtual Private Network (VPN) enables a private connection to a LAN through a public network such as the Internet. With a VPN, data is sent between two nodes across a public network in a manner that emulates a dial-link. There are two types of VPN systems, one is used for connecting LANs across the Internet, and the other is used to connect a remote node to a LAN across the Internet. â€Å"A VPN tunnel encapsulates data within IP packets to transport information that requires additional security or does not conform to internet addressing standards. The result is that remote users act as virtual nodes on the network into which they have tunnelled.† – Kaeo, M. (2004) p135. â€Å"A VPN is a virtual network connection that uses the internet to establish a connection that is secure.† Holden, G. (2003), p 286. â€Å"A VPN uses a public network, such as the internet, to facilitate communication; however it adds a layer of security by encrypting the data travelling between companies and authenticating users to ensure that only authorized users can access the VPN connection†. Mackey, D. (2003) p157 Randall, K. et al. (2002), p377 likened a Virtual Private Network (VPN) to a Tunnel Mode, as a means of transmitting data between two security gateways, such as two routers, that encrypts the entire IP packet and appends a new IP header entering the receiving gateways address in the destination address. â€Å"VPNs enable companies to connect geographically dispersed offices and remote workers via secure links to the private company network, using the public Internet as a backbone.† Lee, H. et al (2000) Looking at all these definitions closely from various authors, they all stress on security and connectivity. These are the essential features of VPNs because they are able to create a connection between two private networks over a public network by encapsulation and tunnelling protocols in transmitting data and also provide security by encryption and authentication in order to control access to data and resources on the company’s network. In other words a VPN is a network technology that securely connects two or more private networks over an insecure public network such as the internet, so as to enable internal access to files and resources and data transfer. Types of VPN There are three different VPN connectivity models that can be implemented over a public network: Remote-access VPNs: It provides remote access to an enterprise customer’s intranet or extranet over a shared infrastructure. Deploying a remote-access VPN enables corporations to reduce communications expenses by leveraging the local dial up infrastructures of internet service providers. At the same time VPN allows mobile workers, telecommuters, and day extenders to take advantage of broadband connectivity. Access VPNs impose security over analog, dial, ISDN, digital subscriber line (DSL), Mobile IP, and cable technologies that connect mobile users, telecommuters, and branch offices. Intranet VPNs: It links enterprise customer headquarters, remote offices, and branch offices in an internal network over a shared infrastructure. Remote and branch offices can use VPNs over existing Internet connections, thus providing a secure connection for remote offices. This eliminates costly dedicated connections and reduces WAN costs. Intranet VPNs allow access only to enterprise customer’s employees. Extranet VPNs: It links outside customers, partners, or communities of interest to an enterprise customer’s network over a shared infrastructure. Extranet VPNs differ from intranet VPNs in that they allow access to uses outside the enterprise. VPN configurations There are two main types of VPN configurations for deploying the VPN connection over a public network. These are; Site-to-site VPNs: This is sometimes referred to as secure gateway-to-gateway connections over the internet, private or outsourced networks. This configuration secures information sent across multiple LANS and between two or more office networks and this can be done effectively by routing packets across a secure VPN tunnel over the network between two gateway devices or routers. The secure VPN tunnel enables two private networks (sites) to share data through an insecure network without fear that the data will be intercepted by unauthorized persons outside the sites. The site-to-site VPN establishes a one-to-one peer relationship between two networks via the VPN tunnel Kaeo, M. (2004. Also Holden, G. (2003), describes a site-to-site VPN as a link between two or networks. This is mostly used in Intranet VPNs and sometimes in extranet VPNs. Client-to-Site VPNs: This is a configuration that involves a client at an insecure remote location who wants to access an internal data from outside the organization network’s LAN. Holden, G. (2003) explains a client-to-site VPN as a network made accessible to remote users who need dial-in access. While Kaeo, M. (2004) defined a client-to-site VPN as a collection of many tunnels that terminate on a common shared end point on the LAN side. In this configuration, the user needs to establish a connection to the VPN server in order to gain a secure route into the site’s LAN and this can be done by configuring a VPN client which could either be a computer operating system or hardware VPN – such as a router. By so doing, the connection enables the client to access and use internal network resources. This kind of configuration is also referred to as secure client-to-gateway connection. This is usually used in access VPNs and sometimes in extranet VPNs. VPN Topology VPN Components To create a VPN connection between sites or networks, it involves the use of some components. These components however contain some elements that need to be properly set up in order to aid the transmission of data from one network endpoint to another. These elements include: VPN server: This is either a computer system or router configured to accept connections from the client (i.e. a remote computer) who gains access by dialling in or connecting directly through the internet. This serves as one endpoint of the VPN tunnel. VPN client: This can either be a hardware based system; usually a router that serves as the endpoint of a gateway-to-gateway VPN connection, or a software based system; either an inbuilt or downloaded software program on the computer operating system that can be configured to function as an endpoint in a VPN, such as Windows XP, 2000 or vista or checkpoint client software. Tunnel – this is the link between the VPN server and client endpoints through which the data is sent. VPN protocols – These are set of standardised data transmission technologies the software and hardware systems use to create security rules and policies on data sent along the VPN. Types of VPN Systems The VPN components form the endpoints of the VPN connection from one private network to another through the public network. The choice of what components to use is dependent on various factors such as the size of the organization – is it a small, large or growing organization, the cost involved in implementing a VPN either by using new components or existing components and lastly, the choice of which of the components will is best for the connection. There are three components that can be used to set up a VPN connection, also a combination of any of these components can be used to set up a VPN connection. One way to set up a VPN is to use Hardware device. The hardware device is a VPN component that is designed to connect gateways or multiple LANS together over the public network by using secure protocols to ensure network and data security. There are two devices that are commonly used that perform these functions. One typical hardware based VPN device used is a router, which is used to encrypt and decrypt data that goes in and out of the network gateways. Another device is a VPN appliance, its objective is to terminate VPNs connection and join multiple LANs (Holden, G. 2003). This device creates a connection between multiple users or networks. The VPN hardware devices are more cost effective for fast growing organizations since they are built to handle more network traffic. It is a better choice when considering the network throughput and processing overhead. It is also a good choice when the routers used at each network ends are the same and controlled by the same organization. Another way to set up a VPN is to use a Software based component. The software component is a program, otherwise stored on the operating system of the system, which can be used to set up a VPN connection. It is easy to configure and more flexible and cost effective than the hardware VPN. They are suitable in networks that use different routers and firewalls or are best used between different organizations and network administrators – such as partner companies. The software VPNs allow traffic to be tunnelled based on address or protocols unlike hardware-based products, which generally tunnel all traffic that it handles. But software-based systems are generally harder to manage than hardware based systems. They require familiarity with the host operating system, the application itself, and appropriate security mechanisms. And some software VPN packages require changes to routing tables and network addressing schemes (Calsoft labs whitepaper, 2007). The third component, is the Firewall based VPN; it makes use of the firewall’s mechanisms as well as restricting access to the internal network. This kind of component ensures that the VPN traffic passes through the network gateway of the desired destination and non-VPN traffic is filtered according to the organization’s security policy, this is achieved by it performing address translation, making sure that requirements for strong authentication are in order and serving up real-time alarms and extensive logging. These three components can be combined together to set up a VPN in order add layers of security on the network. This can be a combination of hardware and software VPN or a combination of all three in the same device. There are several Hardware based VPN packages that offer software –only clients for remote installation, and incorporate some of the access control features more traditionally managed by firewalls or other perimeter security devices (Calsoft labs whitepaper, 2007). An example of such device is the Cisco 3000 Series VPN concentrator which gives users the option of operating in two modes: client and network extension mode. In the client mode the device acts as a software client enabling a client-to-host VPN connection while in the extension mode it acts as a hardware system enabling a site-to-site VPN connection. Also a combination of all these components by different vendors can be used to set up a VPN connection, but this comes with some challenges. The solution as proposed by Holden, G (2004) is to use a standard security protocol that is widely used and supported by all products. VPN Security Features The main purpose of VPN is to ensure security and connectivity (tunnel) over a public network and this cannot be done without some key activities being performed and policies set up. For VPNs to provide a cost–effective and better way of securing data over an insecure network it applies some security principles/measures. Data sent over the internet using the TCP/IP rule are called packets. A packet consists of the data and an IP header. The first thing that happens to a data being sent across a VPN is that it gets encrypted at the source endpoint and decrypted at the destination endpoint. Encryption is a method of protecting information from unauthorised persons by coding the information that can only be read by the recipient. The method, encryption, is done by using an algorithm which generates a key that allows information to be coded as unreadable by all and only readable to the recipient. The larger the number of data bits used to generate the key, the stronger the encryption and the harder it can be broken by intruders. Data encryption can be done in two ways; it can either be encrypted by transport mode or tunnel mode. These modes are process of transmitting data securely between two private networks. In transport mode, the data part (otherwise known as the payload) of the IP packet is encrypted and decrypted but not the header by both endpoint hosts. While in the tunnel mode both the data part and header of the IP packet are encrypted and decrypted between the gateways of the source computer and the destination computer. Another security measure implemented by VPN on data is IP Encapsulation. The VPN uses the principle of IP encapsulation to protect packets from being intercepted on the network by intruders by enclosing the actual IP packet in another IP packet having the source and destination address of the VPN gateways, therefore hiding the data being sent and the private networks IP address which â€Å"does not conform to internet addressing standards†. The third security measure is Authentication. This is a method of identifying a user by proving that the user is actually authorized to access and use internal files. Authenticating a, host, user or a computer that uses the VPN depends on the tunneling protocol established and also encryption for added security. The tunneling protocols that are widely used for authentication over a network are IPSec, PPTP, LT2P and SSL but the most commonly used is the IPSec. The hosts using VPN establish a Security Association (SA) and authenticate one another by exchanging keys which are generated by an algorithm (mathematical formula). These keys can either be symmetric key which is a private key that are exactly the same and only known by the hosts to verify the identity of one another or asymmetric key where each hosts has a private key that can be used to generate a public key. The sending host uses the other’s public key to encrypt information that can only be decrypted by the receiving host private key. The Point-to-Point Tunneling Protocol uses the Microsoft Challenge/Response Authentication Protocol (MS-CHAP) to authenticate computers using VPN by exchanging authentication packets to one another. Also the users connecting to VPN can be authenticated by what the user knows- a password (shared secret), what the user has – a smart card and what the user is – biometrics e.g. finger prints. VPN Tunnelling Protocols VPNs create secure connections, called tunnels, through public shared communication infrastructures such as the Internet. These tunnels are not physical entities, but logical constructs, created using encryption, security standards, and protocols Clemente, F. et al (2005). The VPN tunnelling protocol are set of standardised rules and policy that are employed on the transmitted data. There are various standard of protocol technologies used to create a VPN tunnel and each of these protocols is specially built with some unique security features. In this research work the protocols explained in this section are the most widely used. Internet Protocol Security (IPSec) The Internet Protocol Security (IPSec) has proposed in Internet Engineering Task Force (IETF) Request for Comment (RFC) database in RFC (2401), provides data packet integrity, confidentiality and authentication over IP networks. The IPSec policy consists of sets of rules that designate the traffic to be protected, the type of protection, such as authentication or confidentiality, and the required protection parameters, such as the encryption algorithm. (Jason, K. 2003, Hamed, H. et al 2005, Shue, C. et al 2005, Berger, T. 2006, Clemente, F. et al 2005, Liu, L. and Gao, W. 2007). The IPSec protocol provides security at the network layer and offers a collection of methods, protocols, algorithms and techniques to establish a secure VPN connection. There are two basic modes of IPSec connections, Transport mode and Tunnel mode. The transport mode, attaches an IPSec header to the IP header of the packet. The Tunnel mode is more flexible compared to the transport mode; it encapsulates the IP packet into another IP packet, also attaching an IPSec header to the outer IP packet. This mode protects the entire IP packet. The IPSec modes, are determined and agreed on by both corporate networks at each end of the VPN connection, are contained in the Security Association(SA) among other things. The SA is a set of policy and keys used to protect information such as the IPSec modes, symmetric ciphers, and keys which are used during secure data transmission. The IPSec uses two main protocols that are usually used with any of the modes, the Authentication Header (AH), and Encapsulating Security Payload (ESP). The authentication header contains a Security Parameter Index(SPI) and provides data authentication and integrity (MD5 or SHA-1 hash) on the whole IP packet but does not guarantee privacy (confidentiality) on the data. ESP guarantees privacy (confidentiality) on the data in addition to all the features AH provides. The ESP header includes an initialization field, which is used by symmetric block ciphers (Berger, T. 2006). Another essential protocol that IPSec uses in establishing the VPN tunnel is the Internet Key Exchange protocol (IKE). This protocol exchanges encryption keys and shares authentication data (RFC 2409) through UDP packets at port 500, and also relies on the Internet security association and key management protocol(ISAKMP) – this protocol allows both endpoints share a public key and authenticate themselves with digital certificates (RFC 2408). To create a VPN tunnel using the IPSec protocol, two things needs to be done. First, both networks need to agree on the SA for the IKE and this is done by using the Diffie – Hellman key exchange method to authenticate one another. After this is done, both network endpoints need to set the parameters for the VPN tunnel including symmetric cipher keys (and key expiry information), security policy, network routes, and other connection-relevant information. Point-to-Point Tunneling Protocol (PPTP) Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a virtual private network (VPN) across TCP/IP-based data networks (Microsoft TechNet, 2008). PPTP operates at Layer 2 of the OSI model. PPTP, as specified in the RFC 2637 document, is a protocol that describes a means for carrying Point-to-Point protocol (PPP) – described in RFC 1661 – over an IP based network. It is created by a vendor consortium known as the PPTP industry forum which includes Microsoft Corporation, Ascend Communications, 3Com/Primary Access, ECI Telematics, US Robotics and Copper Mountain Networks. PPTP is the most commonly used protocol for dial-up access to the internet. Microsoft included PPTP support in Windows NT Server (version 4) and released a Dial-up Networking pack in Windows 95 and since then PPTP is supported in any Microsoft Windows version. The PPTP transfers two different types of packets over a VPN connection. The first is the Generic Routing Encapsulation (GRE) (described in RFC 1701 and RFC 1702) packet. It encapsulates PPP frames as tunneled data by attaching a GRE header to the PPP packet or frame. The PPP frame contains the initial PPP payload which is encrypted and encapsulated with PPP while the GRE header contains various control bits, sequence and tunnel numbers. The function of the GRE is to provide a flow- and congestion-control encapsulated datagram service for carrying PPP packets. The total sum up of the packet consists of a Data link header, IP header, GRE Header, PPP Header, Encrypted PPP payload and Data link trailer. The second type of packet is the PPTP control message or packet. The PPTP control packet includes control information such as connection requests and responses, connection parameters, and error messages and it consists of IP header, TCP header, PPTP control message and a data link traile r. In order to create, maintain and terminate the VPN tunnel, the PPTP uses a control connection between the remote client and the server using the TCP port 1723. This two different packets used by PPTP does not ensure privacy on the packet payload, so in order to enhance security on these packets, the PPTP supports encryption and authentication method same as used in PPP connections (Berger, T, 2006 and vpntools.com, 2006). To authenticate packets that pass through the VPN tunnel, PPTP uses any of the following protocols; Extensible Authentication protocol – Transport Layer Security (EAP-TLS), Microsoft Challenge Handshake Authentication Protocol (MS-CHAP), Shiva Password Authentication protocol (SPAP) and Password Authentication Protocol (PAP). For encryption, PPTP uses either the Microsoft Point to Point Encryption (MPPE) to encrypt PPP packets that passes between the remote computer and the remote access server by enhancing the confidentiality of PPP encapsulated packets (as described in RCF 3078) or uses the symmetric RC4 stream cipher to encrypt the GRE payload is encrypted. Layer 2 Tunneling Protocol (L2TP) The L2TP is an IETF standard established as a result of combining the best features of two protocols: Cisco’s Layer 2 Forwarding (L2F) protocol (described in RFC 2341) and Microsoft’s PPTP (Cisco Systems, 2008). L2TP facilitates the tunneling of PPP frames across an intervening network in a way that is as transparent as possible to both end-users and applications (RFC 2661). L2TP encapsulates the PPP packet (whose payload can either be encrypted or compressed or both can be done) into a User Datagram Protocol (UDP) packet at transport layer. The L2TP can be used over the internet as well as over private intranet and also can send PPP packets over X.25, Frame relay or ATM networks. The UDP packet consists of the following in this order: UDP header with source and destination address using port 1701, control bits representing options like version and length of the packet, sequence number and tunnel ID fields which is used to track the packet and identify the tunnel, the l ayer 2 frame which contains the following also: Media Access Code (MAC) addresses and the payload. To ensure security and enhance authenticity of the L2TP packet it is combined with IPSec by attaching an IPSec ESP header, using the IPSec transport mode. After combining IPSec to L2TP, the UDP packet is encrypted and encapsulated with an IPSec ESP header and trailer and ESP authentication trailer. The L2TP packet now consists the following: data link header, IP Header, IPSec ESP Header, UDP header, L2TP frame, IPSec ESP trailer, IPSec ESP Authentication trailer and Data Link trailer, resulting in excessive protocol overhead (Berger, T, 2006 and vpntools.com, 2006). Secure Socket Layer (SSL) Multiprotocol Label Switching Literature Review VPN Protocol Overhead The tunneling protocols also affect the performance of the network by adding processing overhead on the VPN connection. Implementing these secure technologies on any insecure public network like the internet comes with some weaknesses and this can be as a result of either the specific standards are not sophisticated enough to provide secure, stable and fast data links, or interaction with lower levelled protocols causes serious problems (Berger, T., 2006).For example the IPSec technology employs three kinds of protocols namely AH, ESP and IKE; in order to ensure security over the public network, this in turn adds overhead on the packet being sent. The IPSec uses two modes for transferring packets: transport and tunneling mode. The tunneling mode is the widely used because the tunnel can be used to access several resources and it encapsulate and encrypts all part of the IP packet within another IP packet. In a research paper by Shue, C. Et al (2005), an analysis was carried out in ord er to evaluate the performance of the overhead associated with IPSec on VPN servers, and the tunneling mode was used. The tunneling mode uses different technologies to ensure added security on the packet: it uses two different kinds of protocols namely ESP and IKE and various encryption algorithm and cryptographic key sizes, by so doing doubling the size of the packet. It is reported that overheads of the IKE protocol are considerably higher than those incurred by ESP for processing a data packet, also cryptographic operations contribute 32 − 60% of the overheads for IKE and 34 − 55% for ESP, and lastly, digital signature generation and Diffie-Hellman computations are the largest contributor of overheads during the IKE process and only a small amount of the overheads can be attributed to the symmetric key encryption and hashing. Also the layer 2 Tunneling Protocol (L2TP) implemented on the VPN connection originally does not cause any overhead since encryption, authentication and privacy mechanism is not used on the data packet. But when this protocol is combined with IPSec, it adds all the aforementioned mechanism on the packet and makes it very secure but this comes with added problems – protocol overhead, among other things. In this case both the IPSec and L2TP headers are added to the data packet which increases the size of the packet and by so doing, it decreases the VPN performance. (Berger, T., 2006) The Internet, the Problem. There are some articles and journals that clearly argues that VPN does not directly incur processing overhead on the network instead the internet affects the performance. According to an article that was posted on the internet by VPN Consultants in San Francisco Bay Area on FAQ on Security, it was argued that most performance slowdowns will in fact result from inconsistent Internet connections rather than by encryption processing overhead. Also, according to Liu, L. and Gao, W. (2007), explains that IPv4 ( this is an internet protocol that is widely deployed) based networks have inherent deficiencies which have become obstacles to the evolution of networks. They argue that VPNs implemented on the network i.e. the internet automatically inherits some of these problems, such as, big overhead of the net-transport, lack of quality assurance of Service (QoS), NAT traversing problem, and so on. They propose that VPNs implemented on IPv6 (Internet Protocol version 6), which is known as â€Å"the next generation protocol† can solve this problems effectively. Packet Loss A VPN tunnel can sometimes suffer high packet loss and reordering of packets problems. Reordering can cause problems for some bridged protocols, and high pack

Friday, October 25, 2019

The Metamorphosis and Ethan Frome :: Free Essay Writer

The Metamorphosis and Ethan Frome The routine of life can bring some people a sense of stability and happiness. For others this routine can be the cause of immense discontent and a feeling of entrapment. The main characters of the books The Metamorphosis by Franz Kafka and Ethan Frome by Edith Wharton both experience this feeling of being trapped by their everyday responsibilities and environment. Family obligation, societal expectation, and their internal and external appearances trap both Gregor Samsa and Ethan Frome. One main cause for Gregor being trapped is his obligation to his family. His financial obligation alone is enough to put a great amount of pressure on him. His job and his secret plan to put his sister through school also place a demand on him. Gregor is solely responsible for repaying his parents’ old debts. The weight this puts on him is demonstrated when he says, Well, I haven’t given up hope completely; once I’ve gotten the money together to pay off my parents’ debt to him-that will probably take another five or six years-I’m going to do it without fail(Kafka 4). Even after discovering he has turned into a bug he still feels his obligation to his family. Society also has expectations of Gregor that he cannot escape even when he is locked up in the room that eventually becomes his grave. On one of his agonizing sleepless nights he is still thinking of his workday and of people he mingles with on a daily basis. He realizes that instead of helping him and his family, they were all inaccessible and he was glad when they faded away(Kafka 43). Gregor receives no help from the society that he is so loyal to. Gregor is obviously trapped by his external appearance. His physical limitations deepen his feeling of futility. His external appearance mimics his internal feelings, as he now feels helpless by not being able to physically carry out his responsibilities. Ethan was also trapped by obligation to his family. It trapped him when he wanted to go off with Mattie and it trapped him for the rest of his life after the accident. Zeena was the main source of the futility of Ethan’s existence. This is shown when Ethan reflects grimly that his seven years with Zeena seemed to Starkfield ‘not so long’(Wharton 64).

Thursday, October 24, 2019

Fetal Pig Extra Credit Essay

Dissection Exercise 3 1. How do the locations of the endocrine organs in the fetal pig compare with those in the human? They are similar except for the pancreas and the adrenal glands. In the fetal pig, the adrenal glands are medial to each kidney and inferior to the pancreas rather than atop to kidneys and superior to the pancreas as in humans. 2. Name two endocrine organs located in the throat region? Thymus gland and thyroid gland. 3. Name three Endocrine organs located in the abdominal cavity. Adrenal glands, pancreas, and gonads. 4. Given the assumption that human beings have more stress than adult pigs, which endocrine organs would expect to be relatively larger in humans? The adrenal glands. 5. Explain why the thymus gland in the fetal pig is so large, relatively speaking. It is so large because it is still a fetus and it will shrink as the big matures. Dissection Exercise 4 1. Is the fetal pig’s lymphatic drainage pattern basically similar or dissimilar to that of humans? Similar. 2. What is the role of the following?  a. Thoracic duct: Receives lymph and drains lymph from everywhere except for what the right lymphatic duct covers. b. Right lymphatic duct: Drains lymph from the right upper extremity, head, and thorax delivered by the jugular, subclavian, and bronchomediastinal trunks. 3. What differences did you observe between the origin of the common carotid arteries in the pig and in the human? In the pig, the left common carotid artery originates from the brachiocephalic trunk while in humans the left common carotid artery originates from the aortic arch. 4. How do the relative sizes of the external and internal jugular veins differ in the human and the pig? In the fetal pig, both internal and external jugular veins were about the same size in diameter. In humans, the internal jugular vein has a larger diameter than the external jugular vein. 5. How do the brachial veins in the pig differ from those of human? The brachial veins in the pig follow the same path along with the brachial arteries. 6. What difference did you note between  the origin of the hepatic portal vein in the pig and in humans? They are similar except that the fetal pig has a gastrosplenic vein and a gastroduodenal vein instead of a splenic vein and left gastric vein as in humans. 7. Define the following terms. Ascending aorta: The ascending part of the aorta as it emerges from the left ventricle. Aortic arch: The part of the aorta that arches and turns downward. Descending thoracic aorta: The descending part of the aorta that branches into the thoracic and abdominal aortae. Descending abdominal aorta: The distal part of the descending aorta, below the diaphragm; it is continuous with the thoracic aorta. Dissection Exercise 5 1. Are the cartilaginous rings in the pig trachea complete or incomplete? Incomplete 2. How does the number of lung lobes in the pig compare with the number in humans? Pigs have 4 lobes in the right lung and 2 lobes in the left lung. Humans have 3 lobes in the right lung and 2 lobes in the left lung. 3. Describe the appearance of lung tissue under the dissection microscope. Dense since the lungs haven’t been inflated yet. 4. Why did the segment of lung tissue, cut from the fetal pig’s lung, sink when placed in water? The fetal pig has not yet used the lungs to breathe so they are dense and deflated. Dissection Exercise 6 1. Several differences between pig and human digestive anatomy should have become apparent during the dissection. Note the pertinent differences between the human and the pig relative to the following structures. Structure| Pig| Human| Dissection Exercise 7 1. How do the structure and connectivity of the urinary bladder of the fetal pig differ from those of the urinary bladder of the human (or adult pig for that matter)? The fetal pig’s urinary bladder is collapsed elongated sac that lies between the umbilical arteries. This is due to the fetal use of the allantois. 2. What differences in fetal elimination of nitrogenous wastes account for the structural differences described above? The fetus gets rid of wastes via the allantois. 3. How does the site of urethral emptying in the female pig differ from the termination point in the human female? In the female fetal pig, urine is emptied into the urogenital sinus while in a human female urine is emptied through the external urethral orifice which is separate from the vagina. Dissection Exercise 8 1. The female pig has a Y-shaped (bipartite) uterus; that of the human female is pear-shaped (one-part). Explain the difference in structure of these two uterine types. 2. What reproductive advantage is conferred by the pig’s uterine type? The ability to produce litters. 3. Cite differences noted between the pig and human relative to the following structures: A. Uterine tubes or Oviducts: In the fetal pig, the uterine tubes are tiny and relatively much shorter than in a human. B. Urethral and vaginal openings in the female: In the female fetal pig, the urethra and vagina meet to create the urogenital sinus. The urethra and vagina in a female human never meet and are separate from one another.

Wednesday, October 23, 2019

Japan or China the Most Important Strategic Relationship for Australia Among the Major Asian Powers?

Is Japan or China the most important strategic relationship for Australia among the major Asian powers? By Mej Amran B Mohamad RMAF Malaysian Armed Forces Defence College Haigate Kuala Lumpur Malaysia. 12 Nov 2009 Author can be contacted at : [email  protected] com. au ——————————————————————————————————————— Introduction Australia’s credentials and place in today international system is quite significant which influence greatly her ability to position and formulating herself strategically in the global scenario especially in the Asia Pacific region. As a nation with global interests, Australia deals with many countries in many regions and one of them is in Asian region. Australia undoubtedly and substantially engages hers interests in a wide range of aspects within the framework of the countries within this Asian region. Among the countries which are influential in shaping Australia’s strategic and defense policy within the Asia Pacific ring are China, Japan and South Korea, North Korea and Association of South East Asian Nations (ASEAN) block countries. On the other hand significant Australian interests are also engaged in Australia’s relationships with the other states such as the European Union and its member states, and in the South Pacific, New Zealand and Papua New Guinea. However the emerging of China and the influence of Japanese among the major power and largest economies of the Asia-Pacific region has considerably alter the region stability lately. Many new factors and balancing pointers have emerged and its impacts cannot be ignored in shaping Australia strategic relationship and its development of defense policy. Consequently new form of challenges have emerged such as North Korea nuclear proliferation issues and overlapping claimed territory in the South China Sea to mention a few. As such advertently Australia needs to revisit and review back its strategic relationship between the so called major powers in Asia region like China and Japan in order to ensure its effective implementation of strategic environment. Australia essentially need to ensure its security, trading, investment, economic, social partners towards the region continue to uphold and be beneficial to Australia in order to continue sustain and maintain its competitive advantage. Aim The aim of this paper is to examine and to look into some critical aspects of Australia strategic and defense planning policy framework imperatives in order to decide whether China or Japan is the most important strategic relationship for Australia among the major Asian powers. Australia International Relations In its international relations arena, Australia utilizes its assets such as economic, strategic and cultural to uphold its international reputation as a responsible, constructive and practical country. It can be seen that the values which Australia brings to its international relations presently are the values of a liberal democracy greatly influence by her American ally. Australia global politics undoubtedly have been shaped by national experience and given vigour through cultural diversity of the country itself. Some of the important imperatives include the rule of law, the accountability of the government to an elected parliament, freedom of the press and a commitment to a ‘fair go’. Australia ranks eleventh in the world in terms of Gross Domestic Product (GDP) per capita. For comparison, Australia's main export destinations[1], 2008 to Japan was 22. 7% 1 and China 15. 6% respectively. Australia's main import sources, 2008 China 14. 6% and from Japan 9%. Australia’s defense capability is seem to be very significant in regional terms. Australia also has a broadly based alliance relationship with the United States, whose strategic engagement and commitment underwrite the stability of East Asia as a whole. Australia Strategic Environment According Senator the Hon Robert Hill Minister for Defense[2] in 2005, he stressed out that providing the capability to defend Australia and Australian interests remains the first responsibility of ruling government. Now lets us look into Australia strategic environment before discussing in depth by delineates the impact of globalization in relation to its strategic perspective. The Impact of Globalisation The world is undeniably experiencing profound and rapid change. While the international world system is dynamic, globalization is accelerating the movement of ideas and technologies and advertently exposing Australia to a new strategic environment framework such as increased the interdependency between countries and made borders more porous, increased of the potency of the terrorist threat, increase the complexity of the potential danger of WMD proliferation[3]. Globalisation has accelerated the trends which have a significant impact on security policy matters, defense capability and decision-making due to increased unpredictability and uncertainty; the technology revolution has led to a diffusion of technology at a faster tempo, particularly in the areas of information and communications; existing of asymmetric threats such as terrorism or WMD have reduced the value of defenses built around geographic advantage; non-state players quite often in some circumstances, constitute a strategic threat such as new form of transnational terrorist organisations, with no state allegiance and new types of weapons and tactics ; and borders as security barriers are now much less effective to mention a few[4]. The interconnectedness of globalisation profoundly have widen and intensify their impacts. Defense Policy In general, Australia’s defense policy response to this environment comprises of two major elements[5]. The first is to shape and build a defense capability that is versatile and adaptable. Australia has and will continue to build a force that is joint, balanced, networked and deployable. Such a force provides options for a credible response wherever Australia’s security interests are engaged. Secondly is to build strong security relationships both globally and regionally. It must be able to lead and have the capacity to contribute to coalitions in region of interest such as the Asia region as per say. Australia’s Security Interests Asia Pacific global issues have significant security implications for Australia. Generally the risk of global conflict diminished considerably with the end of the Cold War, however other potential threats remain. Conflicts in Europe, the Middle East and South Asia regions have the potential to disrupt global security. To address this Australia need to form a strategic partnership with many countries in her global political engagements and of course within Asia Pacific Ring, Japan and China are the most important priority among the Asia regional major powers. Australia’s national security and its economic interests are inextricably linked to the security and stability of the Asia Pacific region. It can be seen that the key components of Australia’s security strategy are maintaining a strong national defense capability, the security alliance with the United States, developing bilateral defense and security relationships with the countries throughout the Asia Pacific, and strengthening multilateral security links in the region, especially with the ASEAN Regional Forum (ARF). As such by continuously fostering strategic relationship with China and Japan are paramount. Regular bilateral security dialogues with countries in the Asia Pacific, and with key partners beyond the region, provide an opportunity to share views on a wide range of regional and global security issues, promote transparency and reinforce Australia’s commitment to working cooperatively with regional countries on security issues. Australia has increased the number of countries with which it has such dialogues, as part of its long-term strategy of promoting shared security perceptions in the Asia Pa cific region. The ARF for example is an important means of encouraging a sense of strategic community in the region. It complements the central role of bilateral links in dealing with global and regional security issues, and has an important role in encouraging regional support for international regimes against the proliferation of weapons of mass destruction and their missile delivery systems. One of the features of the ARF in 2000 was the participation for the first time of the Democratic People’s Republic of Korea (DPRK). On the other hand Australia sees Japan as a strong proponent and strongly supports ASEAN countries economic growth by providing financial aids and assistance in terms of Official Development Aids (ODA) for instance. Subsequently, Australia on the other hand has been very much part of the process of seeking to engage the DPRK more constructively with the regional and international community, including through an exchange of high-level visits. Australia announced the re-establishment of diplomatic relations with the DPRK in May 2000. Australia has made a major contribution to the significant progress in establishing international regimes to prevent the proliferation of nuclear, chemical and biological weapons and of missiles. Australia’s future efforts will be concentrated on ensuring that these regimes are implemented and remain effective and, where necessary, are strengthened. Australia is a strong proponent of encouraging adherence to the international regime banning the use, stockpiling, production and transfer of anti-personnel landmines. Australia is committed and relentlessly to adopt practical measures such as landmine clearance, victim assistance and mine clearance technology programs. So after looking inside the Australia needs, now lets us see what has China and Japan share in common and in what ways Australia can benefit more and have the edge by associating herself with the two countries strategically from my perspectives. One thing for sure is that Australia strategic relationships in the Asian region are becoming more complex and continue to evolve. China China’s increasing political and strategic engagement with the Asia-Pacific region with its emerging economic profoundly has many significant impacts on the global economy as well as within the Asia region. Its increasing demand for resources is driving China expansion of economic activity development in the Asia-Pacific region and also emerging as a significant technological centre for region. Hence, China’s importance to Australia grows along with this development accordingly and it cannot be totally ignored. Undoubtedly Australia sees China’s relations with the countries of the Asia-Pacific region are critically important to the maintenance of regional peace, security and stability. According to Jieh-Yung Lo, (2007)[6], Australia’s strategic responses would include China’s relationship with East Asia, placing strong emphasis on the Korean Peninsula. In particular, China’s relations with Japan and the United States play another vital role in shaping the security context for the entire region. It is in Australia’s national interest actively to encourage and support Chinese participation in dialogue and cooperation on regional security issues. As for example during 2000-01 the exchange of high-level visits started by the visit of Chinese President Jiang Zemin to Australia in late 1999 continued, with six Australian ministers and the Deputy Prime Minister visiting China. The investment and trade relationship between Australia and China is very encouraging and expanding. China today is Australia’s third largest merchandise trade partner. New opportunities for Australia are wide open when China’s was accepted entry into the WTO, both in terms of greater market access for Australian goods and services. Thus by encouraging China to integrate further into the global economy and abide by international trade rules, the role China played in advocating regional stability become more pronounce.. Mutual economic and trade interests are increasingly underpinned by the strengthening of broader bilateral ties including cultural, educational, scientific and people-to-people links. With different cultures and traditions, Australia and China do not always share the same view, but regular dialogue and government-to-government exchanges have been established on a range of issues – from human rights to security issues – in a bid to discuss differences of opinion. The one-China policy will continue to be a fundamental element of the bilateral relationship within which Australia pursues important economic and trade interests with Taiwan. The size, competitiveness and pace of growth of the Chinese economy will continue to be a dynamic influence on other Asia-Pacific economies. Hence its strategic influence will continue to grow and need to be carefully weighted by Australia in planning her defense policy in the region. Japan On the other hand Japan arms of influence cannot be simply being ignored. It must not be forgotten and by reminiscing on the past history of the might of Japanese expansion and World War II (WW II) and the remarkable effort of its quick phase to recover and become a developed country later to become the giant world economy just next to United States need not to be considered lightly. As such undoubtedly Japan occupies a vital strategic position in North-East Asia and continues to play a primary economic and political role in Asia Pacific immediate region. So, realizing this, Australia relentlessly works hard to encourage and continue endlessly for close dialogue with Japan on a wide range of political, economic, and strategic issues and the development, to the extent possible, of policies which are mutually reinforcing. Japan continues to be Australia’s major trading partner, accounting for some 16% by value of our total trade (exports plus imports) in 2000. It is a significant investor in Australia and our largest source of in-bound tourism. The Japanese Government is taking more active role in regional and global security. It remains active in the war on terrorism. Japan increased its commitment to other part of the world such as Iraq, both financially and through the deployment of elements of the Japanese Self-Defense Force in non-combat roles. The Japanese Self-Defense contributions to peacekeeping effort are quite positive. On the other hand the strategic relationship with the United States continues to develop through increased interoperability, harmonization of Japanese and US capabilities and cooperation in missile defense. Australia’s partnership with Japan reflects the broad alignment of Australian and Japanese strategic, political and economic interests in the Asia-Pacific region. Like Australia, Japan supports the long-term strategic engagement of the United States in the Asia-Pacific region and recognizes the fundamental contribution that it makes to regional stability. Japan also shares our interest in advancing the APEC forum as the primary vehicle for economic cooperation in the Asia Pacific region. The Australia-Japan Conference for the 21st Century was held in Sydney on 29 and 30 April 2001 to chart new directions – strategic, economic, cultural, educational and scientific – for the relationship. The Conference Declaration, ‘The Sydney Declaration for Australia-Japan Creative Partnership’, set out a comprehensive action agenda: to strengthen economic relations, including through a trade and investment facilitation agreement; to expand dialogue and cooperation on security; and to increase people-to-people links. The Prime Minister’s visit to Japan in August 2001 built further on these links. The Factors Shaping Its Development and the Challenges to Be Met To Ensure Its Effective Implementation. In today dynamic environment more quite often the failure of existing international institutions to provide confidence in collective security arrangements has prompted an increasing resort to coalitions-of-the-willing to resolve issues of common concern. As such anticipating and meeting hallenges to Australia’s security remains a demanding task. Some of the crucial factors shaping Australia defense planning in general include the war on terrorism, proliferatio n of nuclear weapons and weapon of mass destruction The war on terrorism continues unabated on many fronts. Successive terrorist attacks in NewYork, Washington, Jakarta, Bali, Madrid, London and elsewhere since 2001 have demonstrated clearly that no country is immune from experiencing the debacle and horrors of non state actor such international terrorism. The threat of proliferation of weapons of mass destruction has yet to be defeated as some states still seek to acquire a nuclear weapons capability. Longstanding issues, including those relating to the Middle East, North Korea, Iran and Taiwan, remain the subject of international tension. Many countries, including in the Asia-Pacific region, continue to struggle to create the conditions they need for stable economic and political development. Issues of economic downturn, human trafficking, human migration, drugs smuggling, environmental issues, overlapping claimed, boundary disputes are among current issues that need to be emphasize and handle diplomatically and strategically. These imperatives are among many challenges faced by Australia. Analyse the Strengths and Limitations on Current Australian Policy Australia employs its defence capability as the most potent of the range of instruments in order to promote and support its security interests. Among Australia strength include having a formidable Australian Defence Forces (ADF) which is able to meet all these policy and strategic needs. The ADF is capable of operating as a networked, joint force across information, air, land and maritime domains. It also has the capability to operate in environments that are complex and ambiguous, and where adversaries, including non-state adversaries, have increasingly lethal capabilities. Through continuing modernization, it needs to retain capability edge over potential rivals by having the elements of versatility[7]. robustness[8], jointness[9] and integration[10]. At all times it must maintain high levels of preparedness as demonstrated by ADF personnel whom have been deployed in many operations, including those in East Timor, Bougainville, Afghanistan, the Middle East and Iraq, the Solomon Islands, and the Sudan to mention a few. Several of these operations have been concurrent. On the other hand, there have been continuing border security tasks, natural disaster relief operations and contributions to long-running UN peacekeeping or peace-monitoring operations in the Sinai and elsewhere in the Middle East. Other role includes supporting domestic security operations such as those for the Olympic Games and the Commonwealth Heads of Government Meeting. Some of the constraints include growing cost pressures on the defense budget. This consequently affects the rising cost of ‘state of the art’ military equipment, particularly capabilities essential for the ADF’s capacity to develop and operate as a superior networked force. The other aspects is the recruitment and retention of an evermore technically capable force amidst of a strong and growing economy, will surely become more challenging Thirdly is to ensure the most efficient use of resources posses a significant challenge to the ADF. Australia Strategic Alliance Priority to Chinese or Japan Australia security accord with Japan has been greeted with much controversy over Australia's actions and intentions of containing China. These two Asian major powers have brought back the shadows of â€Å"Cold War† language of fundamental power relations and strategic competition within the Asia region. However rivalry could be restricted to peaceful economic competition for economic resources. According to Jieh-Yung Lo[11] (2007) China and Japan produce an environment of bi-polar Asia and putting Australia with the dilemma of balancing its national interests in the face of this strategic competition. All this while Japan has become a long time trusted partners in the Asia-Pacific region. Japan and Australia share a common interest in regional stability and prosperity. And today, Australia and Japan enjoy one of the most significant economic and strategic partnerships in Asia. As can be seen in July 2003 besides the latest security accord, Australia and Japan concluded a Trade and Economic Framework to set directions for the future development of the bilateral trade relationship. On the contrary Australia recognizes that both China and Japan are important to its foreign policy and defense policy in the region and shares a growing and thriving relationship with China and on the other side of the coin have a stable relationship with Japan. Australia is very clear where its interests lie and tends to see economics and security as separate issues. It welcomes China's growth, but believes that Japan and the United States should remain influential players in regional affairs. 12] Conclusion From the discussion above it can be seen that it is essential for Australia to form up a formidable defense planning which must provide for both the needs of the present and the possibilities of the future into the uncharted territory. In my opinion thus Australia strategic a lliance with Japan is most crucial and prioritized compare to with China. It is based on many elements of shared values and interests between Japan and Australia. I cogently believed the relationship will still remain the cornerstone of Australia strategic partnership in order to foster and enhance further regional security and stability in the Asian region. Bear in mind that a country’s effectiveness and influence in international affairs is determined by a combination of tangible and intangible factors including its reputation, its geographic size and population, the size and success of its economy, its strategic culture and its defense capability. I can foresee that Australia will continue to work to support the Asia-Pacific region in addressing threats of terrorism, weapons proliferation and the challenge of failing states. In an ever more inter-related world, threats to our neighbours are threats to us among which include the threat of proliferation of WMD within the region and in supporting fragile and vulnerable states. Whether fighting terrorism, piracy, transnational crime, international drug syndicates or people smugglers, effective defense policy remains a key tool of the Australian Government. As such it is importantly and uniquely for Australia to form up a smart partnership and strategic alliance with another countries in this case among one of the major powers in Asia region the most important is Japan if compare to China. In building war fighting capacity to respond to possible future threats, undoubtedly the right defense policy framework will still remains the primary instrument of the Australian Government and will therefore continue to have a central role to play in protecting and assuring Australia’s national goals of a peaceful, stable and increasingly prosperous region. However China as an emerging economic power with it renowned of its military might of course also play a vital role in destabilize the East Asian region and have great influence on the North Koreas and its proliferation nuclear issues cannot be totally ignored. I strongly believe that that a good ongoing relationship with Australia-China is still very useful and Australia need to diligently and willingly maintain a role in influencing China to a certain extent. There is evident in Australia's growing economic and political relationship with China in terms of trade and regional affairs. I also believe that strategic competition between China and Japan will continue to be dominant factors and shape the security and future stability in the region. On present trends, I believe China has reasons to be confidence. Bibliography Books Defending Australia in the Asia Pacific century: Force 2030. Canberra, ACT : Dept. of Defense (2009) Dibb, Paul. (2008) Australia’s security relationship with Japan: how much further can it go? Canberra, ACT : Strategic and Defense Studies Centre P 355. 033094 AUS/407 Frost, Frank. (2005) Directions in China’s foreign relations: implications for East Asia and Australia. Canberra, ACT : Dept. of Parliamentary Services Gupta, Amit. (2008) Strategic stability in Asia. Aldershot, England : Ashgate. 355. 03305 STR Hale, David D. 92006) In the balance: China’s unprecedented growth and implications for the Asia-Pacific. Canberra, ACT : Australian Strategic Policy Institute. P 327. 94 ASP Jennings, Peter. 2005) Getting China right : Australia’s policy options for dealing with China. Canberra, ACT : Australian Strategic Policy Institute. P 327. 94 ASP / SI 19 Lee, John. (2007) Foundations for modern approaches to the China security question. Canberra, ACT : Strateg ic and Defense Studies Centre P 355. 033094 AUS/405 Mulgan, Aurelia George. (2007) Australia-Japan relations: New Directions. Canberra, ACT : Australian Strategic Policy Institute. P 327. 94 ASP Sutter, Robert G. (2008) Chinese foreign relations: power and policy since the Cold War. Lanham, MD. : Rownan & Littlefield 327. 51 CHI Taylor, Brendan. (2007) Australia As An Asia-Pacific Regional Power: Friendships In Flux? London : Routledge 327. 94 AUS Terrill, Rose. (2006) Riding the wave: the rise of China and options for Australian policy. Canberra, ACT : Australian Strategic Policy Institute. P 327. 94 ASP Tow, William T. (2007) Asia-Pacific Security: Us, Australia And Japan And The New Security Triangle. London : Routledge. 355. 03305 ASI Williams, Brad and Newman Andrew. (2006) Japan, Australia and Asia-Pacific security. London : Routledge 355. 0310952 JAP Articles Beeson, Mark and Yoshimatsu, Hidetaka. (2007) Asia’s odd men out: Australia, Japan, and the politics of regionalism. International Relations of the Asia-Pacific, Vol. 7, no. 2, pp. 227-250. Bisley, Nick. 2008) The Japan-Australia security declaration and the changing regional security setting: wheels, webs and beyond? Australian Journal of International Affairs, Vol. 62, no. 1, March, pp. 38-52. Cobb, Adam C. (2007) Balancing act: Australia’s strategic relations with China and the United States. Georgetown Journal of Int ernational Affairs, Vol. 8, no. 2, Summer, (Available via Proquest) Ishihara, Yusuke. (2009) Partnership adrift: reshaping Australia-Japan strategic relations. Security Challenges, Vol. 5, no. 1, Autumn, pp. 103-122. Jain, Purnendra. (2006) Japan-Australia security ties and the United States: the evolution of the trilateral dialogue process and its challenges. Australian Journal of International Affairs, Vol. 60, no. 4, December, pp. 521-535. Mulgan, Aurelia George. (2008) Breaking the mould: Japan’s Subtle Shift From Exclusive Bilateralism To Modest Mini Lateralism. Contemporary Southeast Asia, Vol. 30, no. 1, pp. 52-72. Naoko, Sajima. (2006) Japan and Australia: potential for an effective strategic partnership. Gaiko Forum, Vol. 6, no. 2, Summer, pp. 12-21. Sato, Yoichiro. (2008) Japan-Australia security cooperation: jointly cultivating the trust of the community. Asian Affairs, an American Review, Vol. 35, no. 3, Fall (Available via Proquest) Snyder, Craig A. (2006) Southeast Asian perceptions of Australia’s foreign policy. Contemporary Southeast Asia, Vol. 28, no. 2, pp. 322-340. Taylor, Nicholas. (2007) China as a status quo or revisionist power: implications for Australia. Security Challenges, Vol. 3, no. 1, February, pp. 29-45 Terada, Takashi. (2006) Thirty years of the Australia-Japan partnership in Asian regionalism: evolution and future directions. Australian Journal of International Affairs, Vol. 60, no. 4, December, pp. 536-551. Tow, William T. (2008) Asia’s competitive ‘strategic geometries’: the Australian perspective. Contemporary Southeast Asia, Vol. 30, no. 1, pp. Walton, David. (2006) Future Directions In Australia-Japan Relations: An Australian Perspective. Australian Journal of International Affairs, Vol. 60, no. 4, December, pp. 598-605. White, Hugh. (2005) The limits to optimism: Australia and the rise of China. Australian Journal of International Affairs, Vol. 59, no. 4, December, pp. 469-480. Internet Bateman, Sam. (2009) The great Australian defense debate: is China a threat? RSIS Commentaries, 24 April 09 http://www3. ntu. edu. sg/rsis/publications/Perspective/RSIS0402009. pdf Australia's bilateral relationships can be found at http://www. dfat. gov. au/geo/fs Specific trade and investment information see http://www. dfat. gov. au/ And http://www. tradewatch. dfat. gov. au East Asian Analytical Unit http://www. dfat. gov. u/publications/catalogue/pub_bycountry. html DFAT statistical publications see http://www. dfat. gov. au/publications/index. html Australia's international treaty commitments http://www. austlii. edu. au/au/other/dfat Australia's human rights policy e http://www. dfat. gov. au/hr Australia’s international environmental activities http://www. dfat. gov. au/environment Australian Agency for International Development (AusAID), http://www. ausaid. gov. au. Australian Centre for International Agricultural Research, http://www. aciar. gov. au Australian Safeguards and Non-proliferation Office, http://www. asno. dfat. gov. au Australian Trade Commission (Austrade), http://www. austrade. ov. au Export Finance and Insurance Corporation (EFIC), http://www. efic. gov. au/ ———————– [1] Fact Sheet, Market Information and Research Section, DFAT, http://www. dfat. gov. au/geo/fs (dated 4 Sept 09) [2] Australia’s National Security, A Defence Update 2005, Australia Department Of Defense , pp. v [3] Ibid pp. 5 [4] Ibid pp. 2-4 [5] Ibid pp 12 [6] Jieh-Yung Lo, (2007), Article on China v Japan: implications for Australia? Dated 4 Dec 2007 [7] Versatility represents the capacity to perform a range of different roles, often concurrently. Aust ralia’s National Security, A Defense Update 2005, Australia Department Of Defense pp. 9 [8] Robustness is indicated by depth in resources and personnel and is an essential quality if the ADF is to retain the ability to sustain operations for lengthy periods. Ibid pp. 20 [9] Jointnes refers to responds to the challenge of ensuring that all service elements operate together in ways that make a truly joint force. Ibid pp. 20 [10] Integration represents the ability to network weapons platforms and capabilities to strengthen their effectiveness as part of a whole force. Ibid pp. 20 [11] Jieh-Yung Lo, (2007), Article on China v Japan: implications for Australia? Dated 4 Dec 2007. [12] Jieh-Yung Lo, (2007), Article on China v Japan: implications for Australia? Dated 4 Dec 2007

Tuesday, October 22, 2019

Siege of Paris in the Franco-Prussian War

Siege of Paris in the Franco-Prussian War The Siege of Paris was fought September 19, 1870 to January 28, 1871 and was a key battle of the Franco-Prussian War (1870-1871). With the beginning of the Franco-Prussian War in July 1870, French forces suffered a string of serious reverses at the hands of the Prussians. Following their decisive victory at the Battle of Sedan on September 1, the Prussians quickly advanced on Paris and encircled the city. Laying siege to city, the invaders were able to contain Paris garrison and defeated several attempted breakout attempts. Seeking to reach a decision, the Prussians began shelling the city in January 1871. Three days later the Paris surrendered. The Prussian triumph effectively ended the conflict and led to the unification of Germany. Background Following their triumph over the French at the Battle of Sedan on September 1, 1870, Prussian forces began marching on Paris. Moving swiftly, the Prussian 3rd Army along with the Army of Meuse encountered little resistance as they neared the city. Personally guided by King Wilhelm I and his chief of staff, Field Marshal Helmuth von Moltke, Prussian troops began encircling the city. Within Paris, the citys governor, General Louis Jules Trochu, had massed around 400,000 soldiers, half of which were untested National Guardsmen. Count Helmuth von Moltke. Photograph Source: Public Domain As the pincers closed, a French force under General Joseph Vinoy attacked Crown Prince Fredericks troops south of the city at Villeneuve Saint Georges on September 17. Attempting to save a supply dump in the area, Vinoys men were driven back by massed artillery fire. The following day the railroad to Orleans was cut and Versailles occupied by the 3rd Army. By the 19th, the Prussians had completely encircled the city beginning the siege. In the Prussian headquarters a debate was had over how best to take the city. Siege of Paris Conflict: Franco-Prussian War (1870-1871)Dates: September 19, 1870-January 28, 1871Armies Commanders:PrussiaField Marshal Helmuth von MoltkeField Marshal Leonhard Graf von Blumenthal240,000 menFranceGovernor Louis Jules TrochuGeneral Joseph Vinoyapprox. 200,000 regularsapprox. 200,000 militiaCasualties:Prussians: 24,000 dead and wounded, 146,000 captured, approximately 47,000 civilian casualtiesFrench: 12,000 killed and wounded The Siege Begins Prussian Chancellor Otto von Bismarck argued in favor of immediately shelling the city into submission. This was countered by the sieges commander, Field Marshal Leonhard Graf von Blumenthal who believed shelling the city to be inhumane and against the rules of war. He also argued that a quick victory would lead to peace before the remaining French field armies could be destroyed. With these in place, it was likely that the war would be renewed in a short time. After hearing arguments from both sides, William elected to allow Blumenthal to proceed with the siege as planned. Within the city, Trochu remained on the defensive. Lacking faith in his National Guardsmen, he hoped that the Prussians would attack allowing his men to fight from within the citys defenses. As it quickly became apparent that the Prussians were not going to attempt to storm the city, Trochu was forced to reconsider his plans. On September 30, he ordered Vinoy to demonstrate and test the Prussian lines west of the city at Chevilly. Striking the Prussian VI Corps with 20,000 men, Vinoy was easily repulsed. Two weeks later, on October 13, another attack was made at Chà ¢tillon. St-Cloud after the fighting at Chà ¢tillon, October 1870. Public Domain   French Efforts to Break the Siege Though French troops succeeded in taking the town from the Bavarian II Corps, they were eventually driven back by Prussian artillery. On October 27, General Carey de Bellemare, commander of the fort at Saint Denis, attacked the town of Le Bourget. Though he had no orders from Trochu to move forward, his attack was successful and French troops occupied the town. Though it was of little value, Crown Prince Albert ordered it retaken and Prussian forces drove the French out on the 30th. With morale in Paris low and made worse by news of the French defeat at Metz, Trochu planned a large sortie for November 30. Consisting of 80,000 men, led by General Auguste-Alexandre Ducrot, the attack struck at Champigny, Creteil and Villiers. In the resulting Battle of Villiers, Ducrot succeeded in driving back the Prussians and taking Champigny and Creteil. Pressing across the Marne River towards Villiers, Ducrot was unable to breakthrough the last lines of Prussian defenses. Having suffered over 9,000 casualties, he was forced to withdraw to Paris by December 3. With food supplies low and communication with the outside world reduced to sending letters by balloon, Trochu planned a final breakout attempt. Prussian troops outside of Paris, 1870.   Bundesarchiv, Bild 183-H26707 / CC-BY-SA 3.0 The City Falls On January 19, 1871, a day after William had been crowned kaiser (emperor) at Versailles, Trochu assaulted the Prussian positions at Buzenval. Though Trochu took the village of St. Cloud, his supporting attacks failed, leaving his position isolated. At the end of the day Trochu was forced to fall back having taken 4,000 casualties. As a result of the failure, he resigned as governor and turned command over to Vinoy. Though they had contained the French, many in the Prussian high command were becoming impatient with the siege and the increasing duration of the war. With the war adversely affecting the Prussian economy and disease beginning to break out on the siege lines, William ordered that a solution be found. On January 25, he directed von Moltke to consult with Bismarck on all military operations. After doing so, Bismarck immediately ordered that Paris be shelled with the armys heavy Krupp siege guns. Following three days of bombardment, and with the citys population starving, Vinoy surrendered the city. Aftermath In the fighting for Paris, the French suffered 24,000 dead and wounded, 146,000 captured, as well as approximately 47,000 civilian casualties. Prussian losses were around 12,000 dead and wounded. The fall of Paris effectively ended the Franco-Prussian War as French forces were ordered to cease fighting following the citys surrender. The Government of National Defense signed the Treaty of Frankfurt on May 10, 1871, officially ending the war. The war itself had completed the unification of Germany and resulted in the transfer of Alsace and Lorraine to Germany.

Monday, October 21, 2019

T4A Tax Slips for Canadian Income Taxes

T4A Tax Slips for Canadian Income Taxes Tax season is never a walk in the park, and having the deal with forms with confusing names that sound like Star Wars robots dont make it any better. But once you know what each form is for, filing taxes becomes just that much less of a nuisance. If you are working in Canada, you will most likely encounter the T4A Tax Slip. Here is a quick breakdown of what the T4A Tax Slip is and what to do with it. What Are T4A Tax Slips? A Canadian T4A tax slip, or Statement of Pension, Retirement, Annuity, and Other Income, is prepared and issued by an employer, a trustee, an estate executor or liquidator, a pension administrator, or a corporate director, to tell you and the ​Canada Revenue Agency (CRA) how much of certain types of income they paid you during a tax year and the amount of income tax that was deducted. Income covered by T4A tax slips includes: Pension or superannuationLump-sum paymentsSelf-employed commissionsAnnuitiesRetiring allowancesPatronage allocationsRESP accumulated income paymentsRESP educational assistance paymentsPayments under a wage-loss replacement planOther income, including death benefits, registered disability savings plan payments, research grants, scholarships, bursaries, fellowships, artists project grants, and prizes Note that pension income from Old Age Security is reported on the T4A(OAS) tax slip and amounts you received from the Canada Pension Plan (CPP) or Quebec Pension Plan (QPP) are reported on the T4A(P) tax slip. Deadline for T4A Tax Slips T4A tax slips must be issued by the last day of February the year after the calendar year to which the T4A tax slips apply. Sample T4A Tax Slip This sample T4A tax slip from the CRA site shows what a T4A tax slip looks like. For more information on what is included in each box on the T4A tax slip and how to deal with it when filing your income tax return, click on the box number in the pull-down menu or click on the box on the sample T4A tax slip. Filing T4A Tax Slips With Your Income Tax Return When you file a paper income tax return, include copies of each of the T4A tax slips you receive. If you file your income tax return using NETFILE or EFILE, keep copies of your T4A tax slips with your records for six years in case the CRA asks to see them. Missing T4A Tax Slips If you havent received a T4A tax slip, file your income tax return by the deadline anyway to avoid penalties for filing your income taxes late. Calculate the income and any related deductions and credits you can claim as closely as you can using any information you have. Include a note with the issuers name and address, the type of income, and what you have done to get a copy of the missing T4A slip. You are required to ask for a copy of the missing T4A slip. Include copies of any statements and information you used in calculating the income and deductions for the missing T4A tax slip. Other T4 Tax Information Slips Other T4 tax information slips include: T4 - Statement of Remuneration PaidT4A(OAS) - Statement of Old Age SecurityT4A(P) - Statement of Canada Pension Plan BenefitsT4E - Statement of Employment Insurance and Other BenefitsT4RIF - Statement of Income From a Registered Retirement Income FundT4RSP - Statement of RRSP Income

Sunday, October 20, 2019

French Expressions With the Verb Rendre

French Expressions With the Verb Rendre The French verb rendre literally means to return and is also used in many idiomatic expressions. Learn how to give thanks, glorify, comply with orders, and more with this list of expressions with rendre. Possible meanings of rendre to give back, returnto administer (justice)to hand in (homework)to pay off (e.g., an experiment)to produce, make, yieldto repayto render (a thought, an expression)to surrenderto vomit Expressions with rendre rendre adjectiveto make (happy, scared, mad, etc.)rendre là ¢meto breathe ones lastrendre un culte to worshiprendre de la distance (running)to have a (distance) handicaprendre gloire to glorifyrendre gorgeto repay unfairly gotten gainsrendre grà ¢ces to give thanks torendre hommage to pay homage torendre honneur - rendre les derniers honneurs to pay tribute to - to pay the last tributes torendre du poids (horse-riding)to have a (weight) handicaprendre des pointsto give someone a head startrendre raison de quelque chose to give a reason for somethingrendre serviceto be a great help, to be handyrendre service quelquunto do someone a servicerendre le soupirto breathe ones last rendre visite quelquunto visit someonese rendre to go tose rendre lappel de quelquunto respond to someones appealse rendre lavis de quelquunto bow to someones advicese rendre compte deto realizese rendre levidenceto face factsse rendre aux ordresto comply with ordersse rendre aux prià ¨res de quelquun  Ã‚  to yield to someones pleasse rendre aux raisons de quelquunto bow to someones reasonsRendez-vous compte!Just imagine!Tu te rends compte?Can you imagine?

Saturday, October 19, 2019

THERE NO SPECIFIC TOPIC, BUT SHOULD RELEVANT TO CORPORATE Research Paper - 1

THERE NO SPECIFIC TOPIC, BUT SHOULD RELEVANT TO CORPORATE COMMUNICATION OR COMMUNICATION SCIENCE - Research Paper Example Besides, there has been a shift from the traditional communication channels to the use of internet services leading to an incredible impact. Certainly, information technology has transformed corporate operation in many ways; communication has been the greatest area of corporate evolution. Initially, corporate bodies used written communication as the sole communication tool either internally or external. Over the last two decades, the advent of social media and organizational internet use has posed significant reforms in the marketing, product promotion, and internal communication1. The creation business technology department in many organizations is an example of structural adjustment that has been introduced by adoption of internet connection. In addition, it has led to the creation of an exclusive online business leading to the emergence of e-commerce, a concept that has been integrated into modern businesses. Notably, majority of the companies including Star buck, Caterpillar Inc., Deere and many others have created an automated platform where consumers can make orders and receive deliveries within the shortest time possible2. Communication experts see the advent of the internet in communication as a recipe or business growth since it discourages the long and traditional communication channels. Effective communication involves receiving sending of information and receiving feedback; the internet platform provides an excellent medium that allows a direct link with the business operations. Today, a consumer can make orders or inquiries from the comfort of their rooms and receive feedback almost immediately. However, corporate communication through internet has created business platforms that do not allow personal interaction. It has introduced use of personal computers, cash register systems, server storage, and point-of-sale technological avenues. Following increasing competition in the business operations, some of the businesses have

Friday, October 18, 2019

The risk of being a diabetic Essay Example | Topics and Well Written Essays - 500 words

The risk of being a diabetic - Essay Example enal functioning, the working of the liver as well as visual problems and vascular changes which may predispose a person to fatal conditions like atherosclerosis. This paper aims to achieve the following three objectives of briefly explaining: There are two types of Diabetes i.e. type on and type two. Diabetes mellitus type one presents with weight loss and the patient complains of increased thirst, hunger and urination. The patient develops low blood glucose levels often and ketosis is also seen in them. As the patient is not able to produce insulin within the body, the only treatment option for them is the intravenous administration of insulin to control the levels of blood glucose. Insulin pumps can also be used for the delivery of insulin within the body. In diabetes type 2 the disease progresses with the loss of responsiveness of the tissues of the body to insulin. That is they become resistant to the effect of this hormone and hence the metabolism of glucose is altered. The increased levels of insulin and high blood glucose levels alter the functioning of the beta cells which initially respond by increased secretion of the hormone. When this affect does not show a significant result there is loss of function of the beta cells. Diabetes becomes an even more dangerous disease in its latter stages when it is not being controlled. If early treatment of diabetes is not done in some cases it is seen that amputation is required. By amputation here it is meant that an organ has to be cut off from the body. If the person does not control diabetes it can also lead to heart failure or a heart attack. At times it is seen that diabetes leads to the blockage of vessels in the body. Diabetes can also effect sensitive organs of the body such as eye. It can form a cataract in the eye because of which the vision of an individual is impaired. Diabetes is a slow poison as it slowly affects the person’s metabolic processes. It is necessary that an individual controls it and

Case Analysis Presentation(climb the legal ladder) Essay

Case Analysis Presentation(climb the legal ladder) - Essay Example make comparisons related to their level of experience and period they have worked for the company in order to establish if there are any notable differences. Sullivan and Cromwell’s pay structure should motivate behaviours that can influence associates to put optimum performance in their operations given that they will get handsome rewards at the end of the year. The company should also motivate the associates to stay longer in the company. Retention of the associates is very important since it helps the company to retain talented people. 2. In case of associates who joined the firm four years ago, it is recommended that they also get a similar pay rise. Like any other firm, there are different grades for employees and they also have different salary scales. This should be maintained in the company in order to ensure that there are no conflicts that can arise as a result of pay structures. The pay structure should show a gap that distinguishes people from different grades and this should increase as we move up the ladder. Indeed, a new person in the company should not start off with a salary scale that is almost equivalent to senior people in the company. Part 1: I think the pay structure for Sullivan and Cromwell is fair because it uses a clear model in determining the salary scales for the associates. It is quite normal that a person starts from a lower level and that person moves up the ladder through ranks on the basis of his or her performance. In order for one to be upgraded to the next level, two things are considered namely experience and level of performance in the firm. These two strategies are very effective since they are not characterised by elements such as favouritism. This pay structure is likely to motivate the employees to put optimum performance in their work so that they can also be upgraded to a higher level. This strategy motivates people to know that good living comes through hard work and it is also fair in that any person is given the

Review of Litterature Article Example | Topics and Well Written Essays - 500 words

Review of Litterature - Article Example The study is in such a design where the respondents get maximum benefits at minimum risk. Prompt introduction of the problem was done and developed and the purpose of the research has been relayed to the reader, however the significance to nursing has not been described. The research variables in the study are Rural Student Recruitment program and rural student numbers enrolled in medicine at University of Western Australia and the study explains them well. The article has a clear exposition of the hypothesis with two variables and deduces it from the research problem. Sampling was not done in the study as real figures of students enrolled into the Rural Student Recruitment Program were used allowing for generalization to future participants in the program. Data was derived from the RSR database with the rationale that the data shows all participants in the RSR program. Data analysis method used fits the measurement method used in the study and there is a logical and clear link between analysis and findings in the study. Numerical and text presentation of the statistical result as well as clear, simple and accurate graphs are used to present the findings. The assumption in the study is that the postal code of the addresses represents the participant’s area of residents and the assumption is not stated. A limitation is that it focuses on the western part of Western Australia; this limitation is not also stated. The results are well analyzed and further research recommended for a similar study to be made with a focus on the northern areas of Western Australia. This recommendation is supported by the data. Generalizations are made to include future student participants of the success of RSR program in improving the success of rural student recruitment for medicine at University of Western Australia. The article has a clearly stated title that gives the key area of study and states the problem clearly that builds a persuasive need for

Thursday, October 17, 2019

Project management is not just about the 'tools' we use it is as much Essay

Project management is not just about the 'tools' we use it is as much as anything about people - how they interact, how they - Essay Example Furthermore, I will discuss the project lifecycle and the different processes that go with it. And finally, the importance of people in the success of a project will be investigated before concluding. For a project to be successful, the project manager must understand the different characteristics of a project. A project has a start and end dates. It has dates that properly specify when the project activities will start and when it is going to end. It uses resources – time, money, people and equipment. And finally, a project has an outcome - whether it’s a new condominium, building, satellite or a new highway. ‘A project is considered successful if it delivers the outcome with an agreed quality, does not overrun its end date and remains within the budget (cost resources). Note however, that outcome, time and budget are interrelated, and during a project the project manager may need to do trade-offs between them’ (Singh). Say for instance, if you want the pr oject to be done more quickly, you have to pump in more money for additional resources like people, time and equipment. Because of the increasing competition in the business environment, organisations are forced to come-up with high quality products at a lower cost and in a shorter time. And that’s the reason why project management exists. Project management allows the project manager to plan and organise resources to achieve a specified outcome within the allotted timeframe. The techniques of project management allow the project manager to manage and anticipate risks in a structured manner. Through proper project management better utilisation of resources, shorter development time, reduced costs, interdepartmental cooperation and a better focus on results and quality is achieved. ‘A project has a lifecycle. It starts with the initiating process, then the planning, executing, controlling and monitoring and the last phase is closing’ (Singh). Throughout this lifec ycle people are employed to do the tasks. The workforce spells the success or failure of a project. But before a project starts, a project manager should be appointed. As a project manager, he must have the Project Charter or commercial contract to get the wheels spinning in motion. At the minimum, the Project Charter designates the person as the project manager with the authority to use resources to bring the project to completion. This is formally done by the project sponsor or main stakeholders. The charter provides a short description of the result, outcome, product or services to be produced by the project. It also refers to the commercial contract (if there is a formal contract) as the basis for initiating the project. During the initiating process, the project manager refines the project goals, reviews the expectations of all stakeholders and determines assumptions and risks in the project. This is also the time when he selects the people to form the project team. However, th ere are times when the project team has already been imposed. If that’s the case, the role of the project manager is to familiarise himself to their skills and understands their roles in the project. He should ask the project sponsor and main stakeholders to share with him any emails, letters, memos, project feasibility, meeting minutes, requirements or other documents related