Wednesday, January 29, 2020

Integrative Network Design Essay Example for Free

Integrative Network Design Essay Riordan Manufacturing is a global plastics manufacturer. Their products include plastic beverage containers produced in Albany, Georgia, custom plastic parts produced in Pontiac, Michigan, and plastic fan parts produced in Hang Zhou, China (UOPX, 2013, p. 1). Riordan’s research and development is in San Jose, California (Corporate Headquarters). Riordans main customers are automotive parts manufacturers, aircraft manufacturers, the Department of Defense, beverage makers and bottlers, and appliance manufacturers (UOPX, 2013, p. 1). Team B and associates were task by Riordan to analysis Riordan’s WAN and add a wireless Network to Riordan Manufacturing, also to analyze and update Riordan’s Internet security in each of the locations and provide documentation for security policies and procedures. What is a wireless network and what are the benefits of going wireless. With the current wireless technology, Wi-Fi is everywhere; one can connect to the Internet by going to coffee houses, airports, hospitals, hotels, and homes. Businesses can stay connected to their coworkers and customers without being tied to their office desk by using wireless networks and Wi-Fi hotspots. Wireless local-area network (WLAN) allows personnel to connect to their computers without wires or cables. A wireless network uses radio waves to connect and communicate within a certain area to mobile devices. If someone needs a document while attending a meeting in the conference room or one needs to access the inventory list from the warehouse. A wireless network allows one to access the company’s Internet and retrieve documents on their mobile devises without leaving the meeting or going back to their office. Benefits of Wireless Networking The benefits of company’s going wireless include convenience, mobility productivity, and ease of set up, scalability, security, and cost. Mobile devices in today’s society are equipped with Wi-Fi technology and able to connect to a WLAN. Convenience: employees can access securely to their company’s network resources from any location within their coverage area. The coverage area normally is the office building but is able to expand to other company facilities. Mobility: employees are connected to the network when they are not at their office desk. People in meetings can access documents and applications with their mobile devices. Salespeople can access the company’s network from any location. Productivity: employees accessing their documents and applications are the key to get the job done, and it encourages teamwork. Customers also have access to the company’s Internet using a secure guest access to view their business data. Ease of setup: business do not have to run cables through the facilities, installation is quick and cost-effective. WLAN’s make it easier to for hard to reach locations to have connectivity to the network. Scalability: with businesses expand, company’s need to expand quickly along with their network. Wireless network expands with the current existing equipment. Security: the success in controlling and managing secure access to a business’s wireless network is very important. Security managers must be knowledgeable with the advanced Wi-Fi technology and needs to provide vigorous security protections to protect their data, but only giving permission to who need access. Cost: businesses that operate with and WLAN, reduces wiring costs during office upgrades. How Riordan Manufacturing can use a wireless Networking Company’s using a wireless networks are boosting productivity and encourage data information sharing. Employees can wander throughout the building using mobile devices and still have constant access to documents, e-mails, applications, and other network resources required to do their jobs. Employees using wireless LAN can travel throughout the office building without losing Internet connectivity. Employees having a team meeting or in conference can have the most updated communications, including all documents and applications on the network. Voice over internet protocol (VOIP) technology; also have roaming capabilities in their voice communications. Improved responsiveness Customers require rapid replies to questions and concerns. A WLAN improves customer service or relationships by connecting employees to the data information. Better access to information WLAN’s allow business’s access to all areas in the building without any connectivity issues. WLAN’s are very effective in warehouses, manufacturing plants, and distribution centers. Employees can access inventories and providing accurate figures in real time to management. Easier network expansion Businesses expanding and hiring new employees are easily added the network by the network administrator. Office furniture is easily moved and employees are added or removed to/from the network without issues. Enhanced guest access WLAN’s allow businesses to provide secure wireless access to the Internet for guests or visitors. Hospitals, restaurants, hotels, coffee shops, and other public businesses provide WI-FI to all mobile devices. The IT administrator will need to verify that all the desktop PCs already have the integrated Wi-Fi hardware installed or the PC’s will need to upgraded. Switching to a WLAN does not mean switching changing from ones existing wired network. It is common for businesses to have a wired-wireless network that provides wireless capabilities to conference rooms or in new expanded office spaces. WLAN’s also supports VOIP for the conference rooms. IT managers should be aware of some of the technical aspects of WLAN’s. The WLAN network covers approximately about 3,000 square feet. The range of a wireless router could be affected by walls and cubicles, and the signals are hard to be received in elevators. Other issues IT managers should be made aware of include: †¢Wireless router is shared between 15-20 users per each access point for data, 8-12 for VOIP †¢VOIP quality, wireless routers need to be installed closer together †¢Routers have enhanced coverage when they are installed on the ceiling. Security policies and procedures in a WLAN are very important to consider when establishing a wireless network. Security policies that need to be considered: †¢Data encryption †¢User authentication †¢Secure access for visitors †¢Control systems. To prove that the design meets the data rate requirements, you need to calculate the required data transfer rate for all your networks. Backups over the network must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. To calculate the data transfer rate, use this formula: Required network data transfer rate = (amount of data to back up) / (backup window) the chart below shows the typical transfer rates of some of the more resent network technologies. Table: Network data transfer rates (PowerTech. com, 2010, p. 1) Network TechnologyTheoretical gigabytes per hourTypical gigabytes per hour 100BaseT (switched)3625 1000BaseT (switched)360250 10000BaseT (switched)360025 Here is an example of how to calculate the required data transfer rate for your network: (Symantec Corp, 2013, p. 1) Use the following assumptions: †¢Amount of data to back up = 500 gigabytes †¢Backup window = 8 hours †¢Required network transfer rate = 500 gigabytes/8hr = 62. 5 gigabytes per hour Solution 1: Network Technology = 100BaseT (switched) Typical transfer rate = 25 gigabytes per hour A single 100BaseT network has a transfer rate of 25 gigabytes per hour. This network cannot handle your required data transfer rate of 62. 5 gigabytes per hour. In this case, you would have to explore other options, such as the following; backing up your data over a faster network (1000BaseT), large servers to dedicated tape drives (SAN media servers), SAN connections by means of SAN Client. Performing off-host backups using Snapshot Client to present a snapshot directly to a media server that backups during a longer time window, performs your backups over faster dedicated networks such as solution 2: Network Technology = 1000BaseT (switched) and Typical transfer rate = 250 gigabytes per hour Based on the above network table; a single 1000BaseT network has a transfer rate of 250 gigabytes per hour. This network has much more capacity to handle the backups for this system. To build a backup system for you network; you complete the following. The data transfer rates for your networks must be calculated in order to identify your various problems and potential bottlenecks. (The latest breaking technological solutions for dealing with multiple networks problems and potential bottlenecks are readily available for installation. ) Once the data transfer rates required for your backups are calculated, the rate of transfer must be able to achieve a complete backup of all your data within the allotted time. Then you must determine the most efficient type of tape or disk technology is available to meet your company’s specific needs. Determine the specific number of tape drives needed and the required data transfer rate is going to be for your network. To set the backups needed for your network, (as before) you must move the data from all your clients, to your media servers fast enough to finish backups within your backup window. Then determine the size of your systems ‘Netback up’ image database, exactly how much disk space will be needed to store your entire Netback up image database, the size of the ‘Netback up relational database’ (NBDB), and the required space that will be needed to handle the NBDB. Then calculate how much media will be needed to handle both full and incremental backups, plus you must determine how many tapes will be needed not only to store, but also to be able to retrieve and keep your backups. The next step will be to estimate the size of the tape library your network needs to store your backups and if you need to use robotic library tape slots in order to store your backups. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the  authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also become disgruntled at the heavy security policies making their work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. Mobile phones are another threat to Riordan Manufacturing, because there are people that log on to the companies using their phones and many times they forget to close the account. By leaving this account open the company is vulnerable to hackers getting to the companies account and doing a great deal of damage. To prevent these types of things these part will have to be covered in Training through the company and the company will have to have all of their employees with a certain access to have a company phone and have them use only that phone to access the account if necessary. The phones will be protected at all times to make sure that no hacker is getting in to the account through these phones. Also if for some reason the employee wants to take action against the company and give secret information through the phone this should also be known through the company. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index. Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information. Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. All of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The â€Å"SOX requires publicly traded companies to secure information systems to the extent necessary to ensure the effectiveness of internal controls over financial reporting. † (PowerTech. com, 2010, p. 1) Companies must now take into consideration that IT well trained and educated security support teams must be brought into the process to provide protection any leaks or intrusion in order to meet the compliance deadlines. â€Å"Section: 404 of the Sarbanes-Oxley Act have had the highest impact on Information Technology and Security. The IT related issues that cause problems for SOX compliance in the context of Section 404 are generally related to access control of system users. † (PowerTech. com, 2010, p. 1) Without adequate access controls in place, users can perform functions/activities that are in conflict with their job responsibilities are to modify/corrupt financial data. Controls to initiate/record unauthorized transactions commit fraud and cover their tracks. The Sarbanes-Oxley Act in some ways comes off very vague and open to interpretation leaving companies unsure how to handle compliance. The best way to start is to identify significant and potential high risk problems when going through the process, identifying specific systems, data processors, and control links whose integrity could be compromised. Once these problems within the network have been identified, effective controls must be implemented to address these deficiencies, to record their regularity and frequency, and to evaluate them to ensure that the proper set of controls is kept in place protecting system integrity. The Bill was introduced (and named for) sponsors; Senator Paul Sarbanes (D-MD) and U. S. Representative Michael G. Oxley (R-OH), as a reaction to a large number of various scandals that had exposed excessive wrong doing in the corporate world, costing investors billions of dollars and many companies to collapse. â€Å"The act contains 11 titles, or sections, ranging from additional corporate board responsibilities to criminal penalties, and requires the Securities and Exchange Commission (SEC) to implement rulings on requirements to comply with the law. † (SOX-online, 2012, p. 1). The Constructing new data base network for Riordan Manufacturing will have to take all SOX rules, regulations and requirements  into consideration at each step along the way in order to stay within the guidelines of the law. General Threats to Network and Information Security is the primary concern in e-business. The assets of the e-business services and other electronic services should be protected in order to preserve the authenticity, confidentiality, integrity and availability of the service. Administrators normally find that putting together a security policy that restricts both users and attacks is time consuming and costly. Many users in companies also become disgruntled at the heavy security policies making their work difficult for no discernible reason, causing bad politics within the company. A common attitude among users is that if no secret is being performed, and then why bother implementing security. Malicious attackers can gain access or deny services in numerous ways, for example with Viruses, Trojan horses, worms, password cracking, denial of service attacks, E- mail hacking, impersonation, Eavesdropping, Packet replay, packet modification, social engineering, intrusion attacks, and Network spoofing. Attackers are not the only ones who can harm an organization. The primary threat to data integrity comes from authorized users who are not aware of the actions they are performing. Errors and omissions can lose, damage, or alter valuable data. Users, data entry clerks, system operators, and programmers frequently make unintentional errors that contribute to security problems, directly and indirectly. Sometimes the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, errors create vulnerabilities. Errors can occur in all phases of the system life cycle. Programming and development errors, often called bugs, range in severity from irritating to catastrophic. Improved software quality has reduced but not eliminated this threat. Installation and maintenance errors also cause security problems. There are ways to keeping Riordan Manufacturing safe from all these problems. One way to protect the company is by having Common Access Cards for all employees. With these cards it will have all the employees personal Information and will also protect the employee from identity theft of employees personal information. By having these cards the IT personal will know exactly who the one that used certain computer was and be able to know when they did it. By keeping track of when and where every employee logs in. It is known for human errors to be number one risk for security side. Most of the hacking done by people has to do also because of a mistake of a worker. To reduce all of these things Training will have to be programmed to reduce human mistakes will on the job and after the job. A replay attack occurs when a valid media transmission between two parties is intercepted and retransmitted for malicious purposes. SRTP used in connection with a secure signaling protocol protects transmissions from replay attacks by enabling the receiver to maintain an index of already received RTP packets and compare each new packet with those already listed in the index. Many hackers like to do Spoofing, and this occurs when the attacker determines and uses an IP address of a network, computer, or network component when not authorized to do so. A successful attack allows the attacker to operate as if the attacker is the entity normally identified by the IP address. The largest threat in the Promises study was undocumented or unsecured USB devices. About 13 percent of the surveyed endpoints had them. This isnt just a theoretical concern. A 2005 Yankee Group survey found that 37 percent of the companies surveyed believed USB devices were used to compromise corporate information. Another way the company will be protected from is from unauthorized peer-to-peer (P2P) file-sharing programs that are often forbidden by company policy, 4 percent of the surveyed computers had such applications installed. This problem is getting worse. Not only are more peer-to-peer networks making their way onto corporate networks, but computer criminals have started using them to compromise and take over computers wholesale. Also cyber-attacks are costing the U. S. economy an estimated $8 billion a year. How much money is going from Riordan Manufacturing? This is a problem that has to be taken care of by reducing Human Errors since this is the largest threat to IT Security. Since Most breaches in critical corporate data are not the result of malicious intent. They are the result of mistakes made in the way security is managed and configured across the business especially at the network level. All of these problems are not only costing the company also nearly nine million U. S. residents are victims of identity theft each year. The importance of explicit enterprise security policies and procedures are necessary in a structured network as we currently have in Riordan Manufacturing Inc. and in any other establishment whereas you depend on sending and receiving data over the internet. If no security policy boundaries would be taken seriously, each and one of us would be leaving ourselves vulnerable to malicious computer hackers, corrupted information sent on emails such as; Trojan horses, viruses etc.. As a growing company, we want to protect and ensure that personal information is not compromised and that company policy security awareness procedures are taken. Once a year all employees at Riordan will be required to complete an online assessment of standard procedures for computer use at the facility. If there are any suspicious cyber crime activities occurring, it shall always be reported immediately to the corresponded employee’s supervisor. Mobile work stations have been limited to company issued wireless devices inside the premises, excluding personal cell phones, smart phones, Mp3 players, portable media players, Laptops, tablets, USB drives or external hard drives. All data is classified and is set into four different categories; restricted/proprietary, confidential, sensitive and public. Employees must act appropriately, to prevent unauthorized disclosure of information unless if you have been authorized to access it, if it is utilized as a legitimate business need or shared with other company employees, then it is considered acceptable to the Riordan security policy. Our proposal of upgrading the current switches to the 24 port Meraki Cisco switch and the addition of MR24 Cisco access points will benefit the security policy of networking operations. The Network Security options, Firewalls (2013) website, both pieces of hardware’s have built in firewall management which will assist the network from intruders degrading our system. The purpose of a firewall is to secure the in house network and from non-trusted networks, by blocking content off the internet. Also knows as a choke point, a firewall provides a particular point of contact, enabling users to browse the internet from approved resources located internally or outside the network. It appears as a solitary address to the open public, providing the user access to the non-trusted network through SOCKS, proxy servers and from network address translation (NAT), while keeping the internal networks address private. This technique minimizes impersonating or cyber attack less likely because the firewall maintains the privacy of your internal networks (Network Security Options, Firewalls, 2013). Although firewalls can be limited to what it can protect, such as files that contain file transfer protocol (FTP), telnet amongst the other possible ways of data corruption but it will not necessarily protect them depending on specific destination of the information being transmitted and if the user decides to encrypt the data. When using wireless technology, this can bring several risks to the Network, because hackers can access any unencrypted wireless devices or access points. Having a Wi-Fi protected network will minimize the chances of anyone breaking into the system.

Rosencrantz and Guildenstern Essay Example for Free

Rosencrantz and Guildenstern Essay Gertrude becomes shocked at what Hamlet has just done Oh me, what hast thou done? here she stands in shock. Gertrude cannot really believe that her own son has committed a ruthless murder. This can be interpreted by Gertrude holding her head in her hands and not wanting to look at Hamlet or the dead body of Polonius. Hamlet tells Gertrude what Claudius has done A bloody deed? Almost as bad, good mother, as kill a king and marry with his brother, she does not want to believe Hamlet as she says, As kill a king? Hamlet on the other hand looks at Polonius as a wretched, rash, intruding fool he pities Polonius. This is because he has always tried to get to the top by methods that have not always proved successful or helpful by indirections find directions out. Now Hamlet turns on Gertrude, he forces her down again and accuses her of having no sense of feeling If damni d custom have not brazed it so, that it be proof and bulwark against sense. He also accuses her of not knowing the meaning of marriage vows makes marriage vows as false as dicers oaths. He then compares the two husbands. He does this to show to Gertrude what she had and what she has now so she sees what a big mistake she made by marring Claudius and not seeing his true self. Hamlet regards his father as one of the Gods Hyperions curls, the front of Jove himself, an eye like Mars, to threaten and command; a station like the herald Mercury he also says where every god did seem to set his seal. Followed by him talking about Claudius like a mildewed ear. Like in many publications Hamlet will have the picture of King Hamlet around his neck in a locket and Gertrude will have the picture of Claudius around her neck in a similar fashion. Afterwards he begins to insult Gertrude about her inability to be in command of her sexual desires. Many people believe that Hamlet is so malevolent towards Ophelia because Hamlet sees Gertrude having no control over her life so he thinks that all women are like that and cannot make up their minds. Another reason is that he subconsciously loves his mother and cannot commit in another relationship. At this point Gertrude realises what she has done Thou turnst my eyes into my very soul, and there I see such black and grainid spots as will not leave their tinct. However she does not want to hear any more and repeatedly tells him to stop Oh speak to me no more. These words like daggers enter my ears . daggers is a reoccurring theme as in Act 3 Scene 3 he says I will speak daggers to her but use none. So in actual fact he achieved his goal. When the ghost appears Hamlet goes quiet and speaks peacefully. He does this as he looks up to and respects his father also he is still quite scared of him even though it is his father it is still a ghost. Additionally Hamlet is worried what it might do to him because Hamlet has been offensive toward his mother, which was not part of the plan. The ghost is dressed in armour, as he was when he was living. The ghost reminds Hamlet of his purpose and tells him to comfort Gertrude This visitation is but to whet thy almost blunted purpose. But look, amazement on thy mother sits. Oh step between her and her fighting soul the ghost says this quietly, almost whispering. This statement shows that even though Gertrude married so soon after his death, King Hamlet still cares for her. Immediately after Hamlet comforts her and asks how she is doing, his tone of voice changes completely as if something just wash over him. Very confused by what just happened she asks Hamlet Wheron do you look? this could imply that Gertrude does not care as much for King Hamlet as Hamlet as she cannot see King Hamlet. It could also mean that King Hamlet would rather not appear before of Gertrude, as he still loves her and would not want to startle or upset her. Hamlet eventually convinces Gertrude that in reality he is not mad and asks for her forgiveness. He does this as he feels, on reflection of what the ghost said, that he was very harsh to Gertrude, also he upset her and is afraid of the ghost. Hamlet subsequently requests Gertrude not to sleep with Claudius and tell him about the conversation and his antic disposition. He threatens Gertrude and becomes quite aggressive again but not as much, Gertrude again becomes a little scared of Hamlet. Gertrude subsequently reassured Hamlet that she would not say anything I have no life to breathe what though hast said to me. Hamlet reveals his plot to kill Rosencrantz and Guildenstern. He tells her this as he feels that she is on his side and he would like to remain as honest and loyal as possible to her. At this point Gertrude has been through so much she does not really take this in and so does not make much of a reaction. The scene ends with Hamlet dragging Polonius body out of the room leaving Gertrude in a solitary moment. The lights dim all is quiet and all that is heard is the rain and the scene will end with a flash of lightning and a clap of thunder. This scene prepares us for what is to come as it gives us an insight into what Hamlet is capable of. Additionally this is the first time a murder has taken place besides King Hamlets murder. This scene contains so many emotions that it is practically a play itself. I believe that the Branagh production worked the best as there was much more emphasis on the important parts of the scene although there was too much violence when killing Polonius. Also Gertrude does more to get away from Hamlet in this film than the others do as she turns away much more when he talks to her about Claudius and her failure to control her sexual feelings. His production also had more emotion to it and showed what was happening much more clearly. This play has proved so popular through the ages as it contains something for everyone, as it ranges from romance to murder. Furthermore everyone can relate to it as it has many components of real life situated within the play, this made it, and made it stay so popular. There is also much more room to interpret the script so every time you see Hamlet performed by a different company you can be assured that you will get a new play each time.

Monday, January 20, 2020

Countee Cullen Essay -- essays research papers

Countee Cullen was a prominent American poet and was known as the â€Å"poster poet† of the 1920 artistic movement called the Harlem Renaissance. The Harlem Renaissance produced the first African American works of literature in the United States. There were many leading figures in the Harlem Renaissance such as James Weldon Johnson, Claude McKay, Langston Hughes, Wallace Thurman and Arna Bontemps. Cullen was simply an amazing young man who won many poetry contests throughout New York, published two notable volumes of poetry (Color and Copper Sun), received a master’s degree from Harvard University and married the daughter of W.E.B Du Bois, a founder of the NAACP. Cullen grew up in the â€Å"heart† of New York since he was an adopted son of Reverend Frederick A. Cullen, minister of the Salem African Methodist Episcopal Church. Prior to being adopted his mother, Elizabeth Lucas, abandoned him leaving his paternal grandmother, Elizabeth Porter, to raise him until she died in 1918. Do to Cullen’s childhood confusion many are unaware of his place of birth. According to different sources he was born in Louisville, Kentucky, Baltimore, Maryland and New York. Cullen stated that he was born in New York City but no one is sure if he truly meant it. Reverend Frederick Cullen and his wife gave Countee Cullen wonderful opportunities throughout his entire life. As a young schoolboy, he attended the well-known Witt Clinton High School in Manhattan where he began writing poetry at fourteen years old... Countee Cullen Essay -- essays research papers Countee Cullen was a prominent American poet and was known as the â€Å"poster poet† of the 1920 artistic movement called the Harlem Renaissance. The Harlem Renaissance produced the first African American works of literature in the United States. There were many leading figures in the Harlem Renaissance such as James Weldon Johnson, Claude McKay, Langston Hughes, Wallace Thurman and Arna Bontemps. Cullen was simply an amazing young man who won many poetry contests throughout New York, published two notable volumes of poetry (Color and Copper Sun), received a master’s degree from Harvard University and married the daughter of W.E.B Du Bois, a founder of the NAACP. Cullen grew up in the â€Å"heart† of New York since he was an adopted son of Reverend Frederick A. Cullen, minister of the Salem African Methodist Episcopal Church. Prior to being adopted his mother, Elizabeth Lucas, abandoned him leaving his paternal grandmother, Elizabeth Porter, to raise him until she died in 1918. Do to Cullen’s childhood confusion many are unaware of his place of birth. According to different sources he was born in Louisville, Kentucky, Baltimore, Maryland and New York. Cullen stated that he was born in New York City but no one is sure if he truly meant it. Reverend Frederick Cullen and his wife gave Countee Cullen wonderful opportunities throughout his entire life. As a young schoolboy, he attended the well-known Witt Clinton High School in Manhattan where he began writing poetry at fourteen years old...

Usage of Characterization In Ryonosuke Akutagawa’s Rashomon Essay

Usage of Characterization In Ryonosuke Akutagawa’s Rashomon Despite coming from a different background than most other authors that have so far been studied, Ryonosuke Akutagawa still wrote stories that included similar ideas like internal and external conflict, sacrifice of oneself for a higher cause, murder, human flaws and many others. In addition to that, Akutagawa also used common literary elements like motifs, symbols, point of view and irony. However, one element that is prevalent in almost all of his works is characterization. In two of his short stories, Rashomon and The Martyr, characterization is used to develop their respective themes; in Rashomon, characterization is equally important in building up the theme as in The Martyr. In Rashomon, characterization is used to show the theme that the desperate situations that a person faces can result in the resorting to means that compromise morals, and can even lead to hypocrisy. Akutagawa does this through narration and behavior of the character. At the beginning of the story, the protagonist is faced with the dilemma of either being honest and dying of starvation, or to be a thief and steal from the corpses that were scattered around. However even after much consideration, he was still â€Å"unable to muster enough courage to justify the conclusion that he must become a thief† (Akutagawa 34). Through this, it is evident at this point, the protagonist was still somewhat reluctant to compromise his morals even for survival, and if possible, he would definitely consider other means. With time though, the protagonist does eventually decide to compromise his morals, and he did not even have to â€Å"wonder whether he should starve to death or become a thief. ... ...gh they may have shown approval initially. In the two different stories, characterization is used to prove the themes, and in both cases, they are equally important. However, there are similarities and differences as to how characterization is used. One similarity that they share is the fact that in both stories, characterization is mainly shown through narration. Indeed in both cases character traits can be extracted through speech, but they are more apparent in the narration. On the other hand, one difference is that in Rashomon, there was only a single person that was being characterized to prove the theme, and this character was less of a one-dimensional figure than the characters in The Martyr, whereas in that story, a whole community was being characterized through their actions, as well as through the introspection of one member of the community.

Sunday, January 12, 2020

Discrimination and Children Essay

This Act was put in place to protect individuals so they will not be discriminated against age, gender, disability, race, religion, sex, civil partnership, sexual orientation. We must give a child an equal chance to participate and make appropriate resources available to reach their full potential. Children are unique individuals and have the right to be treated fairly with equal respect. Disability Discrimination Act 1995-2005 When children with disabilities are discriminated against this causes them to loose confidence and are made to feel isolated. This policy was put in place to protect them for being disadvantaged. They should not be treated less favourably that non-disabled student without justification. They are entitled to have adjustment made for the purpose of education and association. 2.3 Evaluate how own attitudes, values and behaviour could impact on work with children and people. In my setting, at Al-Ameen primary school every one has their own values and opinions but share the same belief and this is vital in making personalities. However as professionals working with children we must have a diverse approach. I never make sudden judgement on people or children. I am placid natured so I give children time to shine through and understand the objective. I present myself as a positive role model. As a professional working with children it is important that our attitude reflect our opinion and belief.eg. Children pray after lunchtime and I as a TA I supervise the children when they pray. However I don’t pray at that time so I never discourage them, they choose to for themselves to participate. That is their opinion and belief as an individual. It is also important I do not let my own personal opinion have an impact on the child’s judgment. 2.4 Explain how to promote anti discriminatory practice in work with children and young people. At my setting we have children from different backgrounds and cultures. In every day practice and to avoid anti discrimination we must show interest in learning about other cultures, lifestyles and work on building positive relationships. We also have a student from France who has a language barrier so I would recognise this and make provisions so that he/she is not discriminated in any way such as helping the children to write or draw in their books. Speak slowly, or use French words. When I started in year three I noticed some children were struggling with thick pencil so I made the teacher aware of this and changed to thin pencil and now we notice children enjoy writing. Moving the tables around to give children easy access. Moving the children closer to the board or reading out the questions. I would give some children extra time to complete the set task. This would ensure all children hav e the same opportunity to learn and be included in all aspects of school life. 2.5 Explain how to challenge discrimination The discrimination must always be challenged, according to the school policies, this is done through the behaviour policy, equal opportunity or Anti-bulling policy. Staff must follow the policies and procedures in place for discrimination. It has to be dealt with immediately. This may need to be recorded in a incident book. The discriminatory behaviour and comments may also need to be recorded. Sometimes children may say something without understanding the implication of their comments in such cases they must be made aware that such comments would be reported. They should be reminded that everyone in the school should be treated fairly and respectfully. If I heard a white girl making comments to a black girl such as† you can’t be queen you are black†. I would explain to that child that her remarks are hurtful and that every one has the right to be treated fairly so you should not judge people by the colour of their skin. Three boys tell a girl â€Å"you can’t help build the wall it’s men’s work†. As a TA I would go and talk to the three boys by asking why they think that and where they heard it . I would tell them that every one should be treated equally weather they are a boy or girl because we can all do the same job. Eg. Your mum cooks and she is a women but when you go to restaurants why are there men who are chefs. When you go to hospital there are men who are nurses. 2.1 Explain ways in which children and young people can experience prejudice and discrimination There are many different ways in which children and young people can experience prejudice and discrimination at school. One way might be trying to fit in with the expected appearances and behaviour. They may face discrimination or even be bullied. If a child is deprived of basic necessities like not having the enough food, looking untidy, not correct school uniform then this could lead to the child being discriminated against by other children. Some children may face sexism because boys may not include girls in certain activities eg. When a boy’s play with ball they think girls do not play with a ball. Children from other cultural backgrounds may not play with other children because they should only play with children from same background. Children with disabilities may not be involved in an activity with other children that could mean they have been discriminated against.

Implementation of Lsb Steganography and Its Evaluation for Various File Formats

Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) 868 Implementation of LSB Steganography and its Evaluation for Various File Formats V. Lokeswara Reddy Department of CSE, K. S. R. M. College of Engg. , Kadapa, A. P. India Email: [email  protected] com Dr. A. Subramanyam Dept. of CSE, AITS, Rajampet, Y. S. R. (Kadapa) Dist.. A. P. Dr. P. Chenna Reddy Dept. of CSE, JNTUCE, Pulivendula, Y. S. R. (Kadapa) Dist.. A. P. ———————————————————————ABSTRACT————————————————————-Steganography is derived from the Greek word steganos which literally means â€Å"Covered† and graphy means â€Å"Writing†, i. e. covered writing. Steganography refers to the science of â€Å"invisible† communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB Embedding technique and Presents the evaluation for various file formats. Keywords: Steganography, Least Significant Bit (LSB), GIF, PNG, BMP. ——————————————————————————————————————-Date of Submission: 24, August 2010 Date of Acceptance: 08 November 2010 are transferred through unknown cover carriers in such a manner that the very existence of the embedded messages is undetectable. Carriers include images ; audio, video, text or any other digitally represented code or transmission. The hidden message may be plaintext, cipher text or anything that can be represented as a bit stream. II. IMAGE STEGANOGRAPHY Image compression techniques are extensively used in steganography. Among the two types of image compressions, lossy compression and loss less compression; lossless compression formats offer more promises. Lossy compression compression may not maintain the original image’s integrity. Lossless compression maintains the original image data exactly, hence it is prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless compression formats are GIF[3] and BMP formats. We have used an 8-bit image size for implementation of our steganography. Improvement in stegnographic techniques is make it possible to apply the Detecting LSB Steganography in Colour and Gray- Scale Images which were confined to gray scale images in the initial stages The difficulty in colour images control is solved later on in many techniques such as the analysis of the variation of the gradient energy. The secret message embedded in the target image is detected in both gray and colour images, and the length of the embedded message is estimated [5, 6]. ——————————————————————————————————————-I. INTRODUCTION Digital content is now posing formidable challenges to content developers, aggregators, distributors and users. Th e destruction, extraction or modification of the embedded message is required to develop more robust systems so that the digital content processing and organization becomes easy. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. The shift from cryptography to stegnography is due to that concealing the image existence as stegno-images enable to embeded the secret message to cover images. Steganography conceptually implies that the message to be transmitted is not visible to the informal eye. Steganography has been used for thousands of years to transmit data without being intercepted by unwanted viewers. It is an art of hiding information inside information. The main objective of Steganography is mainly concerned with the protection of contents of the hidden information. Images are ideal for information hiding[1,2] because of the large amount of redundant space is created in the storing of images. Secret messages Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) III. HIDING METHODS IN IMAGE STEGANOGRAPHY In Image Steganography, There are a variety of methods using which information can be hidden in images. Least Significant Bit Replacement Technique: In image steganography almost all data hiding techniques try to alter insignificant information in the cover image. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image. For instance, a simple scheme proposed, is to place the embedding data at the least significant bit (LSB) of each pixel in the cover image[7,8,9] . The altered image is called stego-image. Altering LSB doesn’t change the quality of image to human perception but this scheme is sensitive a variety of image processing attacks like compression, cropping etc. We will be emphasizing more on this technique for the various image formats. Moderate Significant Bit Replacement Technique: The moderate significant bits of each pixel in the cover image can be used to embed the secret message. This method improves sensitivity to modification, but it degrades the quality of stego-image. Experiments have shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision. IV. THE LSB TECHNIQUE The least significant bit i. e. the eighth bit inside an image is changed to a bit of the secret message. When using a 24bit image, one can store 3 bits in each pixel by changing a bit of each of the red, green and blue colour components, since they are each represented by a byte. An 800? 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. As an example, suppose that we have three adjacent pixels (9 bytes) with the RGB encoding. 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 11001011 When the number 300, can be which binary representation is 100101100 embedded into the least significant bits of this part of the image. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed) 10010101 00001100 11001000 10010111 00001110 11001011 10011111 00010000 11001010 Here the number 300 was embedded into the grid, only the 5 bits needed to be changed according to the embedded message. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximum cover size. Since there are 869 256 possible intensities of each primary colour, changing the LSB of a pixel results in small changes in the intensity of the colours. The human eye cannot perceive these changes – thus the message is successfully hidden. With a well-chosen image, one can even hide the message in the LSB without noticing the difference[10]. Fig. 1 Block Diagram for implemented Logic of LSB embedding V. DESIGN DETAILS This section focuses on algorithms Steganography and Steganalysis[10] A. Algorithm for Hiding (Steganography) 1. 2. 3. Read the original image and the image which is to be hidden in the original image Shift the image to hide in the cover image by X bits. And the original image or cover image with 240 which is 11110000 So four MSB’s set to 0. Because of this only four LSB’s considered further. The shifted hidden image and the result of step 3 are bitored. This makes changes only in the X LSB bits so that the image is hidden in the original image. of LSB 4. In MATLAB we convert it to unit8 format. This image can be called as the stego image B. Algorithm for Steganalysis 1. The stego image is bit shifted by 4 bits since it was shifted by 4 bits to insert it into the original image. 2. The image is the ANDED with 255 i. e. , 11111111, which gives the original image. It is ANDED with 255 because initially all the LSB’s were made 0. Now it is recovered back. 3. To get it to Unit8 format we, convert it back to unit8 which is the extracted image. Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) that a message is being passed is being achieved. C. LSB in GIF 870 Fig. 2: Block Diagram for Steganalysis VI. IMAGE ANALYSIS A. LSB in BMP The BMP file format also called bitmap or DIB file format (for device-independent bitmap), is an image file format used to store bitmap digital images. Since BMP is not widely used the suspicion might arise, if it is transmitted with an LSB stego. When image are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value. A BMP is capable of hiding quite a large message. LSB in BMP is most suitable for applications, where the focus is on the amount of information to be transmitted and not on the secrecy of that information. If more number of bits is altered, it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of Steganography is to pass a message to a receiver without an intruder even knowing that a message is being passed is being achieved. B. LSB in PNG Portable Network Graphics (PNG) is a bitmapped image format that employs lossless data compression. PNG was created to improve upon and replace GIF. Since PNG is widely used the suspicion might not arise if it is transmitted with an LSB stego. When images are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value . A PNG is capable of hiding quite a large message. LSB in PNG is most suitable for applications where the focus is on the amount of information to be transmitted and not on the secrecy of that information. If more number of bits is altered it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of steganography i s to pass a message to a receiver without an intruder even knowing Graphics interchange format also known as GIF is one of the machine independent compressed formats for storing images. Since GIF images only have a bit depth of 8, amount of information that can be hidden is less than with BMP. Embedding information in GIF images using LSB results in almost the same results as those of using LSB with BMP. LSB in GIF is a very efficient algorithm to use when embedding a reasonable amount of data in a grayscale image. GIF images are indexed images where the colours used in the image are stored in a palette. It is sometimes referred to as a colour lookup table. Each pixel is represented as a single byte and the pixel data is an index to the colour palette. The colours of the palette are typically ordered from the most used colour to the least used colours to reduce lookup time. Some extra care is to be taken if the GIF images are to be used for Steganography. This is because of the problem with the palette approach. If the LSB of a GIF image is changed using the palette approach, it may result in a completely different colour. This is because the index to the colour palette is changed. The change in the resulting image is noticeable if the adjacent palette entries are not similar. But the change is not noticeable if the adjacent palette entries are similar. Most applications that use LSB methods on GIF images have low security because it is possible to detect even moderate change in the image. Solutions to these problems could be 1. Sort the palette so that the colour difference between consecutive colours is minimized 2. Add new colours, which are visually similar to the existing colours in the palette. 3. Use Gray scale images. In a 8 bit Gray scale GIF image, there are 256 shades of gray. This results in gradual changes in the colours and it is hard to detect. VII. EXPERIMENTED RESULTS Following experimental results highlights on 8 bit LSB Steganography. A. Results for . png image 8 bit stego image Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) 871 B. Results for . bmp file 8 bit stego image PSNR is measured in decibels (dB). PSNR is a good measure for comparing restoration results for the same image, but between-image comparisons of PSNR are meaningless. MSE and PSNR values for each file format is shown in table 1. Table 1: Image quality metrics for bmp file Cover image 224. 948 24. 6100 Stego image 244. 162 24. 2540 Cover- Stego image 69. 826 29. 690 MSE PSNR Stego Recovered IX. EVALUATION OF DIFFERENT TECHNIQUES There are many steganographic algorithms available. One should select the best available algorithm for the given application. Following characteristics are to be evaluated while selecting a particular file format for Steganography. Steganography says that the secret message is to be hidden and it should result in an distortion less image. The distortion must not be visible to the human eye. The amount of data embedded in the image also plays an important role. The algorithm decides how much amount of data could be embedded in the image resulting in a distortion less image. Steganalysis is the technique of detecting the hidden information in the image. The algorithm for Steganography must be such that the steganalysis algorithms should fail. i. e the Steganography algorithms must not be prune to attacks on steganalysis. During communication the intruder could check the original image to remove the hidden information.. He/she may manipulate the image. This manipulation may include cropping or rotation etc of the images. The manipulations done may cause the image distortion. Steganographic algorithms chosen must be such that it overcomes such manipulation and the steganographic data reaches the destination in the required format. VIII. EVALUATION OF IMAGE QUALITY For comparing stego image with cover results requires a measure of image quality, commonly used measures are Mean-Squared Error, Peak Signal-to-Noise Ratio[3] and histogram. A. Mean-Squared Error The mean-squared error (MSE) between two images I1(m,n) and I2(m,n) is: M and N are the number of rows and columns in the input images, respectively. Mean-squared error depends strongly on the image intensity scaling. A mean-squared error of 100. 0 for an 8-bit image (with pixel values in the range 0-255) looks dreadful; but a MSE of 100. 0 for a 10- bit image (pixel values in [0,1023]) is barely noticeable B. Peak Signal-to-Noise Ratio Peak Signal-to-Noise Ratio (PSNR) avoids this problem by scaling the MSE according to the image range Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) Table 2: Comparison of LSB technique for various file formats LSB LSB LSB In BMP in GIF In PNG Percentage Distortion less High Medium High resultant image Invisibility Steganalysis detection Image manipulation Amount of embedded data Payload capacity Independent of file format X. CONCLUSION Since BMP uses lossless compression, LSB makes use of BMP image. To be able to hide a secret message inside a BMP file, one would require a very large cover image. BMP images of 800? 600 pixels found to have less web applications. Moreover such uses are not accepted as valid. For this reason, LSB Steganography has also been developed for use with other image file formats. Although only some of the main image steganographic techniques were discussed in this paper, one can see that there exists a large selection of approaches to hiding information in images. All the major image file formats have different methods of hiding messages, with different strong and weak points respectively. LSB in GIF images has the potential of hiding a large message, but only when the most suitable cover image has been chosen. High Low Low High High Low Medium Low Low Medi um Medi um Low Medium Low Low Medium Medium High Authors Biography 872 Steganography: Seeing the Unseen†, Computer Journal, February 1998. [5] Li Zhi,Sui Ai Fen. , â€Å"Detection of Random LSB Image Steganography† The IEEE 2003 International Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings, 2004. [6] Jessica Fridrich, Miroslav Goljan, and Rui Du. , â€Å"Detecting LSB Steganography in Color and GrayScale Images†, – IEEE Multimedia. [7] F. Collin,Encryptpic,† http://www. winsite. com/bin/ Info? 500000033023. [8] G. Pulcini, Stegotif,† http://www. geocities. om /SiliconValley/9210/gfree. html. [9] T. Sharp, Hide 2. 1, 2001,†www. sharpthoughts. org. [ 10] Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs â€Å"Implementation of LSB Steganography and Its Evaluation for Various Bits† Digital Information Management, 2006 1st International conference. pp 173-178,2007. V. Lokeswara Reddy did his M. Tech (CSE) from SRM University, Chennai in the year 2005. He did his M. C. A from S. V. University, Tirupati in the year 2000. He is pursuing his Ph. D from JNTUA, Anantapur. He has a total of 09 years of experience in teaching. Currently he is working as Associate Professor at K. S. R. M College of Engineering, Kadapa. He has presented 2 papers in International and National Conferences. Dr. A. Subramanyam received his Ph. D. degree in Computer Science and Engineering from JNTU College of Engineering, Anantapur. He has obtained his B. E. (ECE) from University of Madras and M. Tech. (CSE) from Visweswaraiah Technological University. He is having 17 years experience in teaching. He is currently working as Professor & HOD in the Department of Computer Science and Engineering of Annamacharya Institute of Technology & Sciences, Rajampet, Y. S. R. (Kadapa) Dist. A. P. He has presented and published number of papers in International and National Conferences, International and National Journals. He is guiding few Ph. D. s. His research areas of interest are parallel processing, network security and data warehousing. Dr. P. Chenna Reddy did his B. Tech (CSE) from S. V. University College of Engineering, Tirupati in the year 1996. He did his M. Tech from JNTU, Anantapur. He completed his Ph. D from JNTU, Hyderabad. He has a total of 13 years of experience in teaching. Currently he is working as Associate Professor at JNTUA College of Engineering, Pulivendula, Y. S. R. (Kadapa) Dist. , A. P. He has number of publications to his credit. References [1] Pfitzmann Birgit. Information Hiding Terminology, First International Workshop, Cambridge, UK, Proceedings, Computer Science, 1174. pp. 347-350, May–June. [2] Westfield Andreas and Andreas Pfitzmann, Attacks on Steganographic Systems, Third International Workshop, IH'99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999. [3] Moerland, T. , â€Å"Steganography and Steganalysis†, Leiden Institute of Advanced Computing

Saturday, January 4, 2020

What Is It Like Living In A Home With Low Income Poverty

What is it like living in a home with low income? Poverty is the state of not having enough money to meet basic needs such as food, clothing, and shelter. What affects does it have on children? Children living in low income homes face more challenges than others. The have to endure the pain of not having family members at home when they need them. Children living in poverty have to cope with the stress of taking care of themselves as well as their siblings at times, while trying to maintain satisfactory grades in school. In this paper I will discuss the effect of poverty on a child’s social development, academic performance, and health conditions. Children who live in poverty have impaired social development throughout their entire life.†¦show more content†¦The children who live in poverty tend to do worse in school than other students. When they are in school and at home they are not concerned about what the teacher is teaching but about where their next meal is co ming from. They do not get the help they need at home because their parents are at work and they have to take care of their siblings. If the child has a learning disability they do not get the proper help or even know about it because they do not have the money to get someone who can teach the child how to perform well with this disability. . They will get placed in a classroom where instead of the teacher teaching them, they call them stupid and don t teach them anything. They also tend to hate the teacher because they are downgrading them.In the movie freedom writers it tells the story of a school who had a class just for underprivileged children. They hated the teacher when she came because they felt like she was just like they other teachers. When they saw that she actually cared they began to listen to what she was teaching. The schools they attend are low funded school. These schools underpaid teachers and make them feel like they don t have to teach to their full potential. They books the children receive are torn, have missing pages, and are so old they have outdated information. The health conditions the child has are very poor. Many people who live in poverty do not have a car and have to ride the bus to get to places. They do notShow MoreRelatedPoverty And Children : The Challenges That Welfare Workers Face1497 Words   |  6 Pages Poverty and children: the challenges that welfare workers face Hope Kriegel Paper Outline 8/7/16 Children in Poverty Approximately 15 million children in the United States are living below the federal poverty threshold. Research shows that families need an income of twice the amount of the federal poverty threshold (NCCP, 2014). Sadly 44% of children live in low-income families here in the United States. Poverty is the greatest threat to children’s well-being (NCCP, 2014). Public PoliciesRead MoreFamilies in Poverty1728 Words   |  7 PagesCurrently I am learning about families in poverty. In the first week of my class I learned that over 15% of the United States population is living in poverty (Bumpus). The United States has one of the highest poverty rates for being a developed country. Poverty can affect a family in so many ways for example financial stress, health problems, behavioral issues, and poor schooling or education. One of my main focuses is the poor schooling and education. I am currently an Elementary Education majorRead MorePoverty Affects Child Development And They Experience More Social Problems Essay1370 Words   |  6 Pagesurban areas is poverty. Children who live in poverty are impacted with many negative effects physically or mentally. Some of these issues related to poverty are substandard housing, inadequate nutrition and food insecurity, inadequate child care, lack of access to health care, unsafe neighborhoods, and unde r resourced schools. Studies show that â€Å"poverty affects child development and they experience more social problems† (Curley). According to the National Center for Children in Poverty, â€Å"nearly one-thirdRead MorePoverty in Our Own Backyard1677 Words   |  7 PagesPoverty in Our Own Backyard Poverty has many faces, it can be the sad face of a little girl that sits next to your child in class who doesn’t have enough money to buy lunch again, the woman with a haunted stare, standing next to you on the elevator who has an overdrawn bank account and the bank is threatening to foreclose, and it could even be the family of five that lives next door that doesn’t have enough money to put supper on the table again tonight. There is the pleading veteran dressed in dirtyRead MorePoor Living Conditions Essay976 Words   |  4 PagesIndia Belton Essay 2 English 1010 July 27, 2013 Professor Long Poor Living Conditions Affects Children While most people live their day to day life, there are some children living in poverty. Living in these types of living conditions can influence the mental health of a child. Children living in poor quality environments can be a lasting effect on their life. Adults are often affected by poor living conditions because of the financial strain on them; not being able to provide for their familiesRead MoreEssay on Poverty in Gwinnett County, Georgia1120 Words   |  5 Pagesonce said, Overcoming poverty is not a task of charity, it is an act of justice. Like Slavery and Apartheid, poverty is not natural. It is man-made and it can be overcome and eradicated by the actions of human beings. Sometimes it falls on a generation to be great. YOU can be that great generation. Let your greatness blossom† (Make Poverty History, 2005). Gwinnett county is third in the country when it comes to a high poverty rate, with 14% of the population living below poverty (Family Promise ofRead MoreRe search Question. . Through My Research I Have Found That1599 Words   |  7 PagesQuestion Through my research I have found that most suburbs do not have the proper infrastructure to help those in poverty. The amount of pre-existing resource centers is small in number and also spread out sparsely throughout the town unlike within a large city where resource facilities are higher in number and geographically concentrated within the core. In Oakville, low income housing is tucked away, further exacerbating the problem by keeping it hidden within the otherwise wealthy communityRead MoreHow to Overcome Child Poverty with Education Essay1552 Words   |  7 Pageschildren in the United States has the misfortune of living in a family whose income is below the official poverty threshold (Borman and Reimers 454). Poverty has harmful effects on a child’s academic outcomes, general health, development, and school readiness. The impact of poverty has on a child depends on many factors for instance community features ( crime rate in neighborhood and school characteristics) and the individuals present in the child’s life like their parents, neighbors, or relatives. It isRead MoreThe Lives Of Rural Poverty823 Words   |  4 PagesFamilies, especially children, who are living in rural poverty are by the very definition isolated from others. Not only are they isolated physically from their peers and resources they are also isolated from the research community. Their very existence is only recognized by those who happen to have direct contact with them: the few hundred people that live in their town, the 50 students in their school or the family members who reside under one-roof (which often is well above the â€Å"traditional† familyRead MoreWhat is child poverty, its causes and impacts? Essay1057 Words   |  5 Pagesï » ¿What is child poverty, its causes and impacts? The word poverty means being poor. This means luck of capital in both income and wealth. However they also suffer from education and good health. Families and groups in the population can be said to be in poverty. However people who are in poverty will have fewer opportunities like others and less chance to participate in the community. Therefore we help those children by fundraising, to transform UK’S more vulnerable children. There are certain people

The Things They Carried By Tim O Brien - 1112 Words

Memories and stories swarming the mind and twisted by imagination are the only glimpse of humanity a man can hold on to while at war. Through stories, men at war can share their thinning humanity with one another. The deafening silence of war defeats the human spirit and moral compass, thus it is not only man against man but man against sanity. Tim O Brien s â€Å"The Things They Carried† provides a narrative of soldiers in the Vietnam War holding on to the only parts of themselves through their imagination. O’Brien employs symbolic tokens, heavy characterization, and the grueling conflict of man to illustrate how soldiers create metaphorical stories to ease the burden of war. Each man carries with him at least one token that represents his internal monologue during war. Soldiers are called to bear unimaginable burdens, not only physically but also emotionally. O’Brien notes, â€Å"there was at least the single abiding certainty that they would never be at a loss for things to carry† (1023). The items represented much more than a lucky token as they personify themselves as a character in a play. Each man’s item represents a different tragedy of war. From Dave Jensen s toothpaste and assorted hygienic supplies to Ted Lavender’s tranquilizers and high quantities of dope; these items represent each man’s ideal paradise. Formed by their imagination, the tokens help them play in the desolate setting of war. Rat Kiley’s paradise is in the form of comic relief in his many articles ofShow MoreRelatedThe Things They Carried By Tim O Brien892 Words   |  4 PagesThe Vietnam War was a long, exhausting, and traumatic experi ence for all of the soldiers and those who came with them. The Things They Carried, by Tim O Brien illustrates the different affects the war had on a variety of people: Jacqueline Navarra Rhoads, a former nurse during the Vietnam war, demonstrates these effects within her own memoir in the book, The Forgotten Veterans. Both sources exemplify many tribulations, while sharing a common thread of suffering from mental unpredictability. DesensitizationRead MoreThe Things They Carried By Tim O Brien1377 Words   |  6 Pageslove to have it as good as we do. Tim O’Brien’s The Things They Carried discusses many veterans who experience the burden of shame and guilt daily due to their heroic actions taken during the Vietnam War. The book shows you how such a war can change a man before, during, and after it’s over.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As I reflect on the many conflicts America has been a part of, none can compare to the tragedies that occurred in The Vietnam war. As told in The Things They Carried (O’Brien), characters such as NormanRead MoreThe Things They Carried By Tim O Brien1457 Words   |  6 Pagesthe theme pertains to everyone regardless of their background. It conveys the same ideas to people from all across our society. Lastly, a classic is timeless, which means it has transcended the time in which it was written. In Tim O’Brien’s novel, The Things They Carried, he offers a new, intriguing way to view war or just life in general and also meets all of the crucial requirements mentioned above to qualify it as a book of literary canon. Though this book is technically a war novel, many peopleRead MoreThe Things They Carried By Tim O Brien1242 Words   |  5 Pagesâ€Å"Tim O’Brien is obsessed with telling a true war story. O Brien s fiction about the Vietnam experience suggest, lies not in realistic depictions or definitive accounts. As O’Brien argues, absolute occurrence is irrelevant because a true war story does not depend upon that kind of truth. Mary Ann’s induction into genuine experience is clearly destructive as well as empowering† (p.12) Tim O’s text, The Things they Carried, details his uses of word choice to portray his tone and bias. Tim O’BrienRead MoreThe Things They Carried By Tim O Brien1169 Words   |  5 Pagesbut are set in the past and borrows things from that time period. A story that fits this genre of literature is The Things They Carried. The story is about Tim O Brien, a Vietnam veteran from the Unite States, who tells stories about what had happ ened when he and his team were stationed in Vietnam. He also talks about what he felt about the war when he was drafted and what he tried to do to avoid going to fight in Vietnam. The Things They Carried by Tim O Brien was precise with its portrayal of settingRead MoreThe Things They Carried By Tim O Brien1004 Words   |  5 Pages Tim O’Brien is a veteran from of the Vietnam War, and after coming home from his duty he decided to be a writer. His work â€Å"The Things They Carried† is about a group of soldiers that are fighting in the Vietnam War. The first part of the story talks mostly about physical items that each soldier carries, and also mentions the weight of the items as well. Though, there is one exception to the list of physical things. Lieutenant Cross is a character of the story, and Tim O’ Brien quickly states theRead MoreThe Things They Carried By Tim O Brien896 Words   |  4 PagesTrouble without a doubt is what First Lieutenant Jimmy Cross c arried around his shoulders because he was out in war, where mistakes happen. Lost and unknown of his surroundings he had to lead his men into safety, while destroying anything they found. First Lieutenant Jimmy Cross only holds onto one thing for hope and that is Martha, the woman who he hopes is a virgin to come back to. Tim O’ Brien introduces symbolism by adding a character that has a meaning of purity and a pebble, which symbolizesRead MoreThe Things They Carried By Tim O Brien Essay832 Words   |  4 PagesSummary: â€Å"By and large they carried these things inside, maintaining the masks of composure† (21). In Tim O’brien’s The Things They Carried, the American soldiers of the Vietnam War carry much more than the weight of their equipment, much more than souvenirs or good-luck charms or letters from home. They carried within themselves the intransitive burdens—of fear, of cowardice, of love, of loneliness, of anger, of confusion. Most of all, they carry the truth of what happened to them in the war—aRead MoreThe Things They Carried By Tim O Brien1369 Words   |  6 PagesMany authors use storytelling as a vehicle to convey the immortality of past selves and those who have passed to not only in their piece of literature but in their life as an author. In Tim O’Brien’s work of fiction The Things They Carried, through his final chapter â€Å"The Lives of the Dead,† O Brien conveys that writing is a matter of survival since, the powers of s torytelling can ensure the immortality of all those who were significant in his life. Through their immortality, O’Brien has the abilityRead MoreThe Things They Carried By Tim O Brien1407 Words   |  6 Pages       Our introduction stated that in â€Å"The Things They Carried,† author Tim O’Brien tells us not directly of the soldiers of Vietnam, or the situations they find themselves in, but about the things they carry on their shoulders and in their pockets. These â€Å"things† identify the characters and bring them to life.   I find that to be true as the author unfolds the stories about war and the uncommon things one carries in to war both inadvertently and on purpose.  Ã‚  Ã‚  As it was noted: Stories about war –