Tuesday, August 25, 2020

Is Leadership Failing Essay Example | Topics and Well Written Essays - 2500 words

Is Leadership Failing - Essay Example Both these parts of initiatives are talked about. Poor vision is showed from absence of arranging and overlooking greatness. Low degree of trust is clear from the consequences of various examinations and studies leading in the field. From various articles and works of researchers obviously trust is significant factor which is absent in ebb and flow corporate authority. It is prerequisite of current corporate authority to create trust so as to make administration compelling. There is no uncertainty in the capacities and possibilities of authority the things they need are to cultivate trust and show vision. Watchwords: Corporate Leadership, Vision, Trust. Is Leadership Failing? Significance Leadership is the substance of any fruitful endeavor. From national level to corporate level, wherever the significance of initiative needs no delineation. Great initiative is must for the turn of events and development of business. In corporate world there is parcel of accentuation on great adminis tration aptitudes and characteristics. There are parcel of studies and speculations in regards to viable administration. These materials assist us with understanding various patterns and styles of initiative. The inquiry with respect to the nature of authority is one of the oft examined issues of corporate world. There is developing concern with respect to nature of initiative and this worry is included by the discoveries of various overviews and studies. There are numerous issues related with low quality of initiative. ... The worry with respect to declining gauges of administration is certified and there is desperate need to investigate the issue before things gain out of power. Authority is connected with individuals along these lines there is no single hypothesis to clarify pioneers and initiative. Various researchers have attempted to clarify these terms with their own field of study. Improvement of the executives science has contributed a lot in the investigation of administration. The principle focal point of the executives researchers is corporate and business segment. The accentuations of researchers stay on the investigation of authority and its various styles. No single hypothesis is finished in itself yet assist us with understanding various angles. There are numerous parts of authority and elements liable for the decay. The primary focal point of current audit will be on vision and trust. These two characteristics are significant for successful administration and current emergency in initia tive is to a huge degree in light of the low degree of vision and trust. Vision can be characterized as an organized understanding or tendency. It is an envisioned or assumed model of joint prospects to which others can be pulled in, given the fundamental intrigue and driving force with respect to the pioneer who is spreading that vision. Vision of a pioneer makes him not quite the same as others. The capacity to anticipate and afterward act likewise is must for any successful authority. Tragically lion's share of US corporate administration is deficient in vision. They neglect to see future world or they are immeasurably an excess of involved in their commonplace undertakings. Choices are made in present moment and there is little spotlight on long haul and solid arrangement for future. This talks volume of absence of vision. It was absence of vision which is mindful

Saturday, August 22, 2020

Grapes of Wrath Essay: Steinbecks Themes of Strength and Sacrifice

Topics of Strength and Sacrifice in The Grapes of Wrath,   In Steinbeck's tale, The Grapes of Wrath, Ma Joad and Rose of Sharon graphically depict the topics of solidarity and sacrifice.  They are general characters, the individuals who make up the structure holding the system together in each nation.  Through them we comprehend the requirement for solidarity and we feel the franticness of the billions of workers who battle each day just to endure.             Throughout the story Ma is a model of the quality of the human spirit.  For instance, Steinbeck says of her, in the event that she influenced the family shook, and in the event that she ever actually profoundly faltered or gave up the family would fall, the family will to capacity would be gone.  She is the establishment whereupon the remainder of the family stands.  Just as when a solitary driblet of color is dropped into a glass of water and scatters all through, her quality pervades to the remainder of the family, imbuing them with her mightiness.  Also, when the Wilson’s vehicle stalls and Pa proposes separating only for a brief timeframe until the vehicle is fixed she undermines him with a jack handle.  She realizes that all they have on the planet is one another and without one another to clutch they have nothing.& ;nbsp; There is an adage one discovers comfort in numbers anyway for this situation comfort is supplanted with survival.  what's more, close to the finish of the book, when the freight cars have overwhelmed and it appears to be the sum total of what expectation has been lost Ma drives the family to higher ground.  Despite the despondency she believes she defeats it to do what must be done to protect that they get by to live another day.  Her quality gives her the force ascend above adve... ...s of individuals they exploit.  They are in actuality lower than those they think about subordinate. 1.      Your proposal articulation shows up toward the start of your paper.  Thesis explanations for the most part come toward the finish of the early on paragraph.  2.      Be certain to refer to your statements with the name of the creator and the page number on which the specific statement can be found.  â€Å"Blah† (Steinbeck 13). 3.      You have great end paragraph.  You consolidate the quality of the characters and apply it to the present reality. 4.      Overall, you have a solid paper, simply make certain to help your composition with cites from the novel.  You have one great statement yet a statement to help the section on Rose of Sharon would have fortified your paper.   

Thursday, July 30, 2020

Welcome Days!

Welcome Days! College is right around the corner! Its finally time to start packing and planning for your first week at Illinois. Welcome Days is a great opportunity to get acclimated to campus life and for us to introduce you to the wonderful resources and opportunities that Illinois has to offer. Also called Fall Orientation, Welcome Days is from August 22 to 25, 2019. If you’re a planner, here’s ascheduleof all of the events you can attend during Welcome Days as well as New Student Programs’homepagefor first-year students. I would also recommend downloading the Illinois Student Affairs app in order to stay updated on any changes to the schedule. But before you go, let me detail some of the featured events that are happening during Welcome Days! Thursday, August 22 One of the most important and exciting things that happens on the first day of Welcome Days is move-in! If you’re looking for information aboutwhat to bring to college look no further! Once you’re done setting up your room, we have plenty of activities for you to participate in so you can meet new people and make lifelong friends. These includeI-Skate at the Ice Arena and Welcome Days Kick Off! at the State Farm Center. Friday, August 23 New Student Convocation is a ceremony to welcome new students to the University of Illinois and marks the official beginning of your entry into our community! Immediately following, you will head out to the tailgating lots for lunch with your colleges! This is a great opportunity to meet and eat lunch with some of the other students, faculty, and staff who are in the same college as you! On Friday, you’ll also have a chance to meet with your academic community (note: Engineering will meet on Saturday). Make sure to check the Welcome Days calendar to see where and what time your college will be meeting. Another really cool event on Friday is the Illini Union LateNighter. Bring your roommate and new friends to enjoy comedians, a hypnotist, food, games, giveaways, bowling, and billiards. All for FREE! It’s your chance to explore the Illini Union and see why it is the center of campus activity throughout the year. Saturday, August 24 If you want to learn about Illinois traditions, meet players and coaches from our varsity athletic teams, and participate in the iconic Block I class photo, look no further thanIllinois Sights and Sounds. After Illinois Sights and Sounds, you’ll be able to watch a movie at Memorial Stadium with all of your new friends! Sunday, August 25 Illini Union Quad Day is one of the coolest events that happens during Welcome Days, because it’s your chance to get involved on Illinois’ campusbefore classes even start. Over 700 of our Registered Student Organizations (RSOs), campus activities, and community organizations will have booths set up on the Main Quad as well as in the surrounding streets. You can go and check them out in order to see which ones you want to sign up for! It’s a great way for you to make friends with thoseyou already have something in common with, as well as meet peoplewhom you may not live with or take classes with. If all of these activities and events that you’re able to attend didn’t get you excited for Welcome Days, go ahead and checkout thisvideowith some footage from Move-In Day as well as Welcome Days. Now that you’re pumped for Move-In, Welcome Days, and College Life in general, let the countdown begin! admitted college planning Jhonatan Admissions Counselor I was born and raised on the southwest side of Chicago and attended high school at UIC College Prep. My love and passion for the arts led me to the University of Illinois, where I graduated with a Bachelor’s of Fine Arts in Industrial Design.

Friday, May 22, 2020

Martin Luther King Jr And Antigone - 1358 Words

Martin Luther King Jr and Antigone were two people who used a nonviolent resistance technique to stand up for a cause they believed in. The technique they used is called Civil disobedience which is the refusal to comply with certain laws in a peaceful, non-aggressive protest. Both Martin Luther King Jr and Antigone were seeking justice for a cause without having to become physically violent with the opposing party. It took strength to go against their oppressors but they were willing to make self-less sacrifices. Martin Luther King Jr and Antigone provides many examples of how they used a similar approach to have a nonviolent confrontation. Both Martin Luther King Jr. and Antigone are fighting inequality and injustice. During an†¦show more content†¦She knew she had to bury her brother and she did just that. Dr. King on the other hand did not approach his circumstances in the same manner. He clarified his actions and explained why he was using a non violent approach. He w rites, â€Å"IN ANY nonviolent campaign there are four basic steps: collection of the facts to determine whether injustices are alive, negotiation, self-purification, and direct action. We have gone through these steps in Birmingham.† (MLK , Pg. 77-78) . He also says, â€Å"All too many others have been more cautious than courageous and have remained silent behind the anesthetizing security of stained-glass windows†(MLK, Pg 77-78). Dr. King and his following had to make strategic steps to achieve the main goal which was to stand up to injustice. Many people, at that time in history, were afraid to stand up against their oppressor because doing so would lead to death. Antigone was not afraid of death. As I read more of the letters Dr. King wrote to the state’s leaders, I believe he also was at the point where he no longer fear. Dr. Kings’ steps began to be more aggressive and strategic but remain nonviolent. In his letter, he writes, â€Å"...the purp ose of direct action is to create a situation so crisis-packed that it will inevitably open the door to negotiation. We therefore concur with you in your call for negotiation. Too long has our beloved Southland been bogged down in the tragic attempt to live in monologue rather thanShow MoreRelatedThe Civil Disobedience of Antigone and the Teachings of Martin Luther King Jr.1402 Words   |  6 Pagesdisobedience†. One of the most well known activists of civil disobedience was Martin Luther King Jr. during the American civil rights movement of the 1960s. King’s theory of a non-violent approach to injustices consisted of a process that promoted dialogue of a peaceful nature in order to gain understanding while reconciling differences. Nevertheless, when the laws made by man attempted to negate the laws of God, King urged people to use creative tension in the form of civil disobedience to establishRead MoreMartin Luther King Jr.s Letter From A Birmingham Jail And Antigone1004 Words   |  5 PagesThe â€Å"Letter from a Birmingham Jail† by Martin Luther King and the play of â€Å"Antigone†, both demonstrate ways in which civil disobedience is used to challenge unfair laws. Although Martin Luther King and Antigone both go against the unjust law, however, they go about it in different ways. For instance, Antigone acts in civil disobedience in order to accomplish a family oblig ation, meanwhile, Martin Luther King Jr. visions civil disobedience as a method to obtain equality for the sake of his communityRead MoreAntigone And Dr. Martin Luther King Jr. s Letter From Birmingham Jail1233 Words   |  5 PagesIn Sophocles’ Antigone and Dr. Martin Luther King, Jr.’s â€Å"Letter from Birmingham Jail†, Antigone and Dr. Martin Luther King, Jr. used resistance against powerful leaders to follow their morals and make a statement. Dr. Martin Luther King, Jr.’s approach towards the reconstruction of society’s cultural understanding of segregation used civil disobedience in a more public and large-scale approach, whereas Antigone’s use of civil disobedience defied the law in a much more private, small-scale way toRead MoreEssay on Antigone: Martin Luther Kings Nonviolent Campaign1041 Words   |  5 Pages Martin Luther King, Jr. defines â€Å"civil disobedience† as a way to show others what to do when a law is unjust and unreasonable. As King stated in the letter from Birmingham, â€Å"Any law that uplifts human personality is just. Any law that degrades human personality is unjust.† When Negros were being treated unfairly, Martin Luther King, Jr. stepped in to show people how to peacefully protest and not be violent. The dictionary definition of civil disobedience is the refusal to comply withRead MoreThe Fight for Social Justice Essay892 Words   |  4 Pagescomes at a great cost to those involved. Through writings such as Dr. Martin Luther King’s â€Å"Letter from a Birmingham Jail† and Sophocles’ â€Å"Antigone†, as well as, lectures such as Dr.Colbourn’s lecture â€Å"Confronting History and the Good Life: Life after Rosewood† it is demonstrated how life, freedom, and a normal everyday life suffer as a cost of fighting for social justice and the common good. To begin with, Dr. Martin Luther King as well as many other African- Americans fought for equality, socialRead More Exploration of Civil Disobedience in Sophocles Antigone, Kings Letter from Birmingham Jail, and Platos From Crito580 Words   |  3 PagesExploration of Civil Disobedience in Sophocles Antigone, Kings Letter from Birmingham Jail, and Platos From Crito Civil disobedience spawns a major and widely debated issue by many who established by well-known intelligent scholars and many examples of civil disobedience become displayed. The acts of civil disobedience can be noted in major works such as Sophocles?s Antigone, King?s ?Letter from Birmingham Jail?, or even from Plato?s ?from Crito?. A specific claim exemplified throughout theseRead MoreAn Inspirational Quote on Adolf Hitler871 Words   |  4 Pagesa result of his actions, more than million lives were lost. In this case, Adolf Hitler is known to be the Tyrant. In the early 1960’s Martin Luther King Jr gave a speech; a speech of what he believed in and what he fought for most of his life. As a result of his phenomenal speech, racism decreased. Black people and white people united together. Martin Luther King Jr changed the world for the better, however died trying to accomplish his goal. Without his words and beliefs the world would not be theRead MoreNon Violent Protest Â⠀" Dr. Martin Luther Kings Moral Disobedience!1563 Words   |  7 PagesVarsha Chawdhary Prof. Hughes Eng 101 Section 811 13th October 2005 Non violent protest Ââ€" Dr. Martin Luther Kings moral disobedience! Dr. Martin Luther King Jr., the issue of non-violence in his letter from Birmingham Jail. He states that any law, which is unjust and inhuman, is not a moral law. Dr. Kings argument for non-violent protest against the authorities is just and moral; because any action taken for the greater good of human beings may be called disobedience by the authorities, but asRead MoreLiterature: A Reflection of Society1764 Words   |  8 Pageswriting style and explore thoughts in various ways, which has different effects on different people. Although not all literature promotes social change, many pieces of literature have had a profound impact on their respective societies, including Antigone by Sophocles, â€Å"Civil Disobedience† by Henry David Thoreau, and Silent Spring by Rachel Carson. Greek theatre was an extremely important part of life in ancient Athens and held much influence over the people because it was a part of the new politicalRead MoreCivil Disobedience, And Martin Luther King Jr. s Letter From Birmingham Jail1018 Words   |  5 PagesHistoric figures such as Rosa Parks, Mahatma Gandhi, and Martin Luther King Jr. all acted civilly disobedience, but society benefitted from their movements. Civil disobedience is the underlying theme of Sophocles’ Antigone and Martin Luther King Jr.’s Letter From Birmingham Jail. The main character of Sophocles’ Antigone, Antigone, acts civil disobedience, just as Dr. King acted civilly disobedient. Both Antigone and Martin Luther King Jr. fought to gain justice for the people who they believed were

Sunday, May 10, 2020

A Guide to Bursitis

Bursitis is defined as the irritation or inflammation of a bursa (fluid filled sacs attached to joints). It most commonly occurs in adults over 40 years of age and results in discomfort or loss of motion in the affected joint.   What Is a Bursa? A bursa is a fluid-filled sac located around joints in the body that reduce friction and ease movement as tendons or muscles pass over bones or skin. They are located around joints and reduce friction and ease movement as tendons or muscles pass over bones or skin. Bursas are found next to all joints in the body.   What Are the Symptoms of Bursitis? The main symptom of bursitis is experiencing pain in the joints in the body — usually occurring in the shoulder, knee, elbow, hip, heel, and thumb. This pain may start subtle and build to extremely intense, especially in the presence of calcium deposits in the bursa. Tenderness, swelling, and warmth often accompany or precede this pain. Reduction in or loss of motion at the affected joint can also be symptomatic of more severe bursitis, such as the case of frozen shoulder or adhesive capsulitis wherein the pain from bursitis makes the patient incapable of moving the shoulder What Causes Bursitis? Bursitis can be caused by acute or repetitive traumatic impact to the bursa, repetitive stress through overuse of the joint, and post operation or injury infections.   Age is one of the primary factors that cause bursitis. Due to prolonged stress on joints, especially those requiring daily use, tendons toughen and become less tolerant of stress, less elastic, and easier to tear resulting in an increased likelihood the bursa could become irritated or inflamed.At-risk patients should use caution when engaging in activities that cause extensive stress to joints, such as gardening and many physically stressful sports, as they have also been known to carry a high-risk for causing the irritation.Other medical conditions that cause additional joint stress (such as tendonitis and arthritis) may also increase a persons risk.   How Do I Prevent Bursitis? Being aware of the strain daily activities have on your joints, tendons and bursas can greatly reduce the likelihood of getting bursitis. For patients beginning a new exercise routine, stretching properly and gradually building up stress and repetition will help mitigate the possibility of a repetitive stress injury. However, since age is one of the primary causes of the ailment, bursitis is not entirely preventable.   How Do I Know If I Have Bursitis? Bursitis is difficult to diagnose as it shares many symptoms with tendonitis and arthritis. As a result, identification of symptoms and knowledge of causes can lead to a proper diagnosis of bursitis. Follow  these tips if you have been diagnosed with a repetitive stress injury and use a visual pain scale to track and identify your pain to help determine if you have bursitis. If symptoms do not alleviate after a couple of weeks of self-care, the pain becomes too severe, swelling or redness occurs or a fever develops, you should schedule a consult with your physician.

Wednesday, May 6, 2020

Network Design Project It/230 Final Paper Free Essays

string(68) " and other possible problems in this area are less likely to occur\." Network Design Project Art Meyer IT/230 Pernell Curtis 11/27/2011 Executive Summary The Tri-Corp company is need of a complete networking solution. Tri-Corp has two offices, one in Phoenix, and the other in Tucson. The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. We will write a custom essay sample on Network Design Project It/230 Final Paper or any similar topic only for you Order Now The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications; both offices require data transfer on a daily basis. Each user requires access to the internet and the shared data stored on the nine clients workstations. DSL, cable, and T3 network solutions are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit. The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. Tri-Corps needs a reliable network, with a VPN service to accommodate the needs of traveling executives, upper management, and a growing workforce. Company executives at Tri-Corp have requested a remote access solution as part of their systems upgrade. The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. In order to function more efficiently, many companies across the globe require remote access to their server systems. A remote access solution will provide Tri-Corp with a proven method to retrieve data from remote locations and them with the opportunity for their executives to complete necessary tasks on the go. However, remote access may provide intruders a method to access Tri-Corps secure data. These vulnerabilities may expose the risk of exploitation and have caused irreparable damage to other companies in the past. Successfully implementing Tri-Corps remote access solution requires careful planning to protect their data and avoid unwanted attacks by unauthorized users. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies. While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data to many employees in both locations. Cabling Specifications The shield twisted pair (STP) or unshielded twisted pair (UTP) cable are what connects computers to the switch on the Star Topology network10Base-T is one of the Ethernet standards for cabling in a network environment. 10BaseT uses a twisted pair cable with a maximum length of 100 meters. Standard 10BaseT operates at 10 Mbps. It is commonly used in a star topology. Gigabit Ethernet (CAT6) over twisted pair copper wires is the preferred cabling specification for high speed data transmissions. Transmission rates in this cabling specification may reach speeds of up to 1000 Mbps. CAT5 T/100 base cables will provide adequate data transfer for most other applications. Local Area Network (LAN) Topologies In the star topology, instead of having a direct connection to each other, the systems are connected to a central device, such as a network switch or a router. One definite advantage the star topology provides is network stability. For example, in the star topology, when one system goes down, it does not bring the rest of the network down with it as it does in the bus or ring topologies. The star topology is the most prevalent topology in use today. The physical topology of the star network contains six different classifications; namely point-to-point network, ring network, mesh network, bus network, tree network and star network. Of these six, the star network is one of the most commonly utilized network topologies. According to definition, the term ‘star topology‘, refers to a network wherein all the nodes are connected individually to one common hub (Naik, 2011). Simply stated, the stat topology is a network topology wherein transmission stations connect to the central node in a configuration where the design of the network stations resembles the shape of a star. Essentially, the star topology design may be likened to the spokes on a wheel, all connected to the central hub. In this network configuration, the exchange of date is only possible through an indirect connection to the central node; this connects all other nodes to the network. As with various other types of network topologies, the star topology has its own set of particular advantages and disadvantages. These factors require careful consideration in regards to the feasibility of the network setup. When evaluating this topology, careful comparison to other network solutions and consideration of all available options helped to discover which solution would provide Tri-Corp with the best answer to meet their needs. It is very easy to install and manage star network topology because its functionality is the simplest among the topologies. Because all computers rely on the central hub, troubleshooting a star topology network is much easier, therefore, any problem, which leaves the network inoperable, leaves a direct path to the central hub. This feature simplifies troubleshooting by offering a particular spot for error connection and at the same time, the reliance is very high on that single point. In star topology, the data packets do not have to make their way through various nodes; this ensures that the data transfer is fast. Consequently, the fact that the data packets only make it through three different points also guarantees that the data is safe. Because the nodes do not connect to each other, problems in one node do not affect the routine of other nodes in the network. Since all the computers on the network have independent control of their networks and are only dependant on the central hub computer, failures in transmitting data and other possible problems in this area are less likely to occur. You read "Network Design Project It/230 Final Paper" in category "Papers" In addition, if the hub is safe then every computer in the network is safe. This type of network provides more privacy than any other network. Additions, such as new machines or replacing older units are much easier in the star network topology, since the network will not experience any disruption to facilitate changes. The primary problem with star network topology is the fact that it is highly dependent on the central hub functioning properly. Additionally, network size is dependent on the number of connections available on the hub. This network type requires more cable when compared to other topologies, such as linear bus topology. Therefore, the cost and expense of a star topology runs higher and the expenses incurred are relatively high. Since the performance of the total network depends on the performance of the hub, a slow server will cause the entire network to slow down. As mentioned earlier, the star network topology requires more cable to connect the network together than the usual Bus topology. For this particular network setup, the recommendation is to use is the RJ45 or the Ethernet cables. To be specific, this network setup requires a gigabit 48-port switch and CAT6 base T/1000 Ethernet cabling to both the IT and the graphic design department. The other departments will use CAT5 base T/100 cabling. In a Star Network the entire network is dependent on the hub so if the entire network is not working then there could be a problem with the hub. Since all the computers on the network have independent control of their networks and only dependant on the central hub computer, the failures in transmission and other possible problems in this area are less likely. In addition, if the hub is safe then every computer in the network is safe. This type of network also offers more privacy than any other network. A Star Network Topology is best suited for smaller networks like Tri-Corps and works best when there is limited number of nodes. The primary objective is to ensure that Tri-Corps hub or the central node is always functioning and that all extra security features are added to the hub because it s the heart of the network and the stability of the network relies directly on the stability of the central hub. Wide Area Network (WAN) Design Tri-Corps two offices, one in Phoenix and the other in Tucson require a WAN network to effectively communicate and share data and resources. The main office in Phoenix is a large 4-story building with 50 workstations and 10 network printers. The Tucson office has five separate workstations and three network capable printers. The clients use Outlook exchange web server for their email communications and require minimal amounts of data transfers between the offices. Each user requires access to the internet and the shared data stored on the nine clients workstations. Both DSL and cable internet service are available to the clients. The Tucson clients have a cable internet connection with 8mbps max upload and download limit. The physical layout of the Tucson office is a single story design where the workstations are located in five separate offices in a large building; an unused storage closet is located in a central point in between the offices of that building. The current system in the Tucson office uses a non-commercial five-port router; each computer connects to the router through a Cat5 Ethernet connection. The first step is to discover the bandwidth needs and average user loads. Data from Cisco (Boda, 2009) suggests the average broadband connection generates approximately 11. gigabytes of Internet traffic per month. We will use this figure to calculate the bandwidth needs of this company. Calculating with 10 users and a five-day, forty-hour workweek as our model for the Tucson office, we can calculate average daily consumption to be approximately 5. 7 gigabytes per day of bandwidth consumption. The current cable internet allows for 28 gigabytes during an eight-hour period (multiply 8mbps x 3600, t he number of seconds in an eight, hour period, and divide by 1024) should provide a stable connection throughout the day as all ten users are rarely on the network at once. The setup of the Phoenix offices is more complex; they require a T3 connection to accommodate the IT and the Graphic Design departments. The third floor houses the IT department, the first floor houses the reception staff, along with lower level management, the second floor houses the graphic design department, and the fourth floor houses the operations staff while the fifth floor houses upper management. The current system in the Phoenix offices uses a network hub and repeaters. Both the IT and graphic design department complain they do not have sufficient bandwidth to meet their needs. Upper management complains that the system on their floor is too slow. The Tucson offices complain they experience difficulty sending and receiving data and email from the Phoenix offices, and connections time out frequently. The current system in the Tucson offices lacks design and will not allow for additional users or adding network printers. Additionally, aside from the firewall provided by the router, no real network security is in place and the workstations cannot communicate with each other in either location. The Phoenix offices need increased speed and greater bandwidth. Both offices require better communications etween the workstations to increase efficiency. The recommendation for the Tucson offices is to install a server system using Windows server 2003, and a VPN; this office will utilize the star topology, thus allowing for growth and easier diagnostics. In addition, failure of one workstation will not affect the entire network and the speed will be optimal. The server software provides several benefits. Multiple applications are available to run in the Server 2003 environment, including financial apps, database programs, and e-mail exchange operations as well as web server and Internet programs. Domain operations are included in the software, something that will become an important resource by adding security and the ability to the local and group policies of the network. Additionally, if Server 2003 is not utilized as a domain controller, then it can run simple network operations using peer-to-peer structures (Garza, 2010). An extensive amount of shielded twisted pair Cat5 cables will be necessary to connect each workstation and the network capable printers. The VPN system will allow the users to connect remotely to their workstations and the company intranet. The Tucson office will utilize the central closet as a server room. The server will handle all applications and house the data storage. The server will have a connection to a primary switch; this switch will also handle the data transfer between the local PCs of each office. The switch accomplishes two tasks; since connections from one port to another are made on an as needed basis (Axia College, 2005), this will eliminate traffic collisions and create faster point to point connections. The switch will be connected to ports on the private network switch allowing for access to the application and data servers, along with the DNS and Active Directory server. Since the data transfer needs are minimal, the switch does not need Cat6 cabling; Cat5 STP will work, gigabit switches will not be necessary. Security from outside traffic will be enforced by closing the ports to outside traffic. Users will access the internet via an Internet Security and Acceleration (ISA) server, which will be connected to the public network. The recommendation for the Phoenix office will also include a new server and the Windows server 2003 platform. Both offices will use the same VPN, however, in the Phoenix offices, only upper management will have access to the VPN from outside the building. The existing network hub will be replaced by T/1000 switches connected to gigabit LAN network interface cards on each of the workstations in the graphic design department as well as those in the IT and upper management. Gigabit LAN adaptors are required on the servers to accommodate the high bandwidth needs of these departments. The reception area, lower management, and Operations will connect to standard switches using a T/100 base, thus eliminating the problem of network congestion in the departments where more bandwidth is required, and limiting the bandwidth where it is not necessary. Cat6 cabling will be utilized on the second, third, and fifth floors to accommodate the bandwidth needs of the high end users. CAT5 cabling will be used throughout the rest of the system and should easily meet the needs of the end users in the other departments. The primary cost of upgrading both systems will be in the cabling; both offices will require an extensive amount of CAT5 and CAT6 networking cables. The server systems and switches will incur the second highest cost; both upgrades are necessary to provide the company with greater ease of use and transitional growth opportunities Updating the current systems and switching to Windows server 2003 will provide both offices with greater stability, efficiency, and increased security. Updating the Phoenix offices from hubs to switches will increase the flow of network traffic and allow for greater communications between both offices and all workstations. The Tucson offices will benefit from less frequent connection time outs and rapid data transfer to and from the Phoenix offices. Additionally, both offices will be more prepared for rapid growth. The Tucson offices will show increased productivity by networking all of the printers. The Phoenix offices will benefit from as the IT department and graphic design will have the necessary bandwidth to meet their needs, while upper management will spend less time waiting on reports and data necessary to make day to day decisions that will affect the company’s long-term growth strategies. Upgrading the current systems is not only a wise decision, it is the only logical decision for a company that is primed to move ahead and take control of the market in its area and expand into more profitable markets in other cities as well. Network Protocols VPN users gain remote access to their LAN through the internet. VPN’s are network links formed by connecting to an ISP and the company LAN. These connections use technologies such as sophisticated packet encryption to secure the data link. This is especially important, as the information is travels across a public network. The advantage of using a public network versus dedicated connections is the cost; many companies take advantage of VPN technology to provide remote access without compromising security. Dial-up networking is the simplest way to connect to the Internet. Computers connect over the phone line using a modem. Users must pay for a subscription to an ISP like AOL. Dial-up connections are much slower than broadband and the speed maxes out at 33. 6 Kbps. Some applications will work with satisfactory results; more and more applications require greater connection speeds even when performing simple tasks such as transferring files. Both applications require user name and password login information; that however, is where the similarities end. VPN users benefit from a secure, encrypted connection that is firewalled from intruders and typically monitored by a network administrator to ensure the privacy of the connection is not compromised. Dial up users connect to a public network and may be susceptible to outside attacks. Network Remote Access Company executives at Tri-Corp have requested a remote access solution as part of their systems upgrade. The company desires its employees to have access to the network from their home PC’s and laptops as a method to help improve productivity and eliminate unnecessary travel and paperwork. The company requests that all upper management be granted unlimited access to all files and network resources and permissions. Additionally, they wish to grant access to all mid-level managers, the operations manager, and the entire graphic design department. Support staff and non-salaried associates desire access to the company site for employee benefits and access to daily reports. Tri-Corps enterprise system runs two servers, one in the main branch located in Phoenix; the other in the support branch located in Tucson. Both branches utilize Microsoft Server 2003 software, and a star topology. Outlook is among the programs that are most widely used by the executive branch, Publisher and Adobe Illustrator top the list among the graphic design department. Operations use a simple data storage program that breaks down cost and projects business forecasts. Tri-Corp believes their company will function more efficiently by granting its employees remote access to their server systems. Whereas it is true remote access does provide many companies with a proven method to retrieve data from remote locations and offers their users a chance to complete necessary tasks on the go, Tri-Corp will be at risk; remote access also offers intruders a way in to Tri-Corps secure data. If these vulnerabilities expose the company to exploitation, the damage may prove to be irreparable. Companies who plan to use a remote access solution need careful planning to protect their data and avoid unwanted attacks by unauthorized users. Therefore, the question lays, â€Å"Should Tri-Corp use Dial-Up or VPN to complete their remote access solution? The first step is user control; it is imperative to control which users can access the network from outside the company. Network access should be granted only for users who need it; the likelihood is that not everyone is likely to need network access from outside the company. Whether Tri-Corp decides to use Dial-Up or VPN they must set up remote access accounts for remote users that are separate from their normal accounts, and make these accounts more restrictive than their normal LAN accounts (Axia, 2006). The company executives may believe this security measure to be impractical; however, this strategy is vital, particularly for users who normally have broad security clearance (Axia, 2006). The advantage of using Dial-Up is the Dial-back feature. Dial-back is a feature whereby you securely enter the phone number of the system from which users are calling (Axia, 2006). Users requesting remote access from a fixed location such as a private residence are ideally suited for a Dial-Up remote access connection with the dial-back feature. Once these users connect, they dial the system, request access, and then the remote access system terminates the connection and dials the preprogrammed phone number to make the real connection (Axia, 2006). The home based computer then answers the call and proceeds to a normal connection. This service offers greater security for home based users because any other user who may attempt to gain access will not be allowed access with this feature enabled. One more key advantage of a dial-up remote access server (RAS); RAS solutions require employees to onnect to the corporate network via a direct telephone call to modem banks installed at the network edge (â€Å"Remote Access Vpn Solutions†,  2000). Three key differences separate dial-up and VPN architectures; the first being that direct dial-up does not utilize the internet to avoid incurring long distance phone charges. Next, the corporation setting up the dial-up connection is responsible for providing modem banks (modem bank s are similar to network hubs or switches). Finally, encryption technologies are not required because the network traffic passes through non-shared links. Undoubtedly, granting remote access may increase productivity and effectiveness by giving employees direct access to information from anywhere in the world. One primary example is email access; this factor alone makes a big difference for employees that are constantly on the go and rely on email to communicate from remote locations. The business benefits of using a VPN delivers several advantages versus RAS solutions. VPNs offer two distinct cost advantages; first, Internet connections, which are typically local calls, are much less expensive than toll free or long distance dial-up connections. This consideration typically is what convinces most organizations to apply a VPN rather than an RAS solution. Secondly, the equipment cost of purchasing and maintaining a VPN is much more cost effective than standard RAS equipment. Installation and use of VPN’s may yield a cost savings of up to 70 percent over a standard RAS system. Comparatively, most companies discover that remote access VPNs pay for themselves in cost savings in a relatively short period. By way o f contrast, RAS systems only incur greater cost throughout the course of time, especially if upgrades or adding more users is necessary. The amount of access available is dependent on the scaling system and how the VPN distributes the client’s software. Scaling a remote access may also necessitate increased bandwidth of the company’s Internet connection. As soon as the VPN gateway is operational, the company may change the scaling system to support anywhere from a few hundred to tens of thousands of users. The option of scaling for RAS solutions is not as trouble-free and requires the use of additional hardware and adding phone lines. The widespread use of broadband Internet service now offers VPN clients an inexpensive solution to connect corporate networks by utilizing the World Wide Web to connect from outside the company walls without losing speed and compromising security. This is a very attractive option for mobile users in particular. Dial-up solutions do not always provide the same security and ease of use as this option. In some cases dial-up solutions may very well remain the best solution; many company’s still employ this solution as part of their remote access services for their fixed locations. With proper maintenance, this solution will still serve the needs of a smaller client base. However, if the client base grows rapidly and significantly, they may soon overload the RAS system and discover they need to move on to a different solution. The recommendation for Tri-Corp is to utilize a VPN solution. However, the executive branch will utilize the dial-up service from their fixed locations, such as their place of residence. This will offer greater security by using the dial-back feature to ensure the user is not an unauthorized intruder. This will also remain cost effective as the executive staff numbers only eight individuals. Graphic design, operations, and the rest of the support staff will gain access through the VPN software in Microsoft’s Server 2003 package. However, each department will only have access to the resources that are consistent with their job requirements. Operations will have access to the database and Outlook; the graphic design department will have access to their saved projects files and Outlook. The support staff will only have access to the company human resources sites and limited access to non-confidential company information. The key elements of a successful remote access implementation will include security, performance, high availability, and client management. A meeting with the Tri-Corp company will outline and clearly define their specific requirements in each key area to discover the solution that will serve the company’s needs. Utilizing both dial-up and VPN solutions will offer this company the best of both worlds; security and performance as well as greater productivity and performance without the need for incurring greater cost. Network Business Applications The recommended applications for Tri-Corp will include Microsoft’s Office Professional suite and the Microsoft Server 2003 software for the local servers. Outlook will replace the exchange server provided by Microsoft. This will provide Tri-Corp with more flexibility and aid in the ease of adding new email user accounts. POP3 and SMPT will require proper configuration to enable this service. In addition to the Enterprise system upgrades, Tri-Corp needs to design and implement a disaster recovery plan and review system security policies. While some disasters are unavoidable and vary in type and magnitude, system security attacks are avoidable when companies enforce their information policies and protect their resources. Tri-Corps offices may contain vulnerabilities because they offer remote access to company data to many employees in both locations. Network Security We will first address the issue of Enterprise Security and best practices. Microsoft has developed a four-part checklist, which focuses on the following key points: Assessing the environment, protecting the network, protecting servers and clients, and finally, monitoring the environment (Microsoft 2011). Using this guide will help increase Tri-Corps security and reduce the risk of outside attacks. Assessing the environment requires learning all of the components within the infrastructure. Tri-Corp needs to identify all assets and security issues while continually monitoring the quality of the security program (Microsoft 2011). Their first step will be to partner upper management with the IT staff so they may both focus on establishing an ongoing process to classify and examine all security risks. Failure to establish this vital communication will absolutely place the company at risk with the largest security problems. Next, protecting the network; Tri-Corps server system will utilize both Secure Socket Layer (SSL) encryption, and a Public Key Infrastructure (PKI) to aid in maintaining network security. Secure Sockets Layer (SSL) encryption is one of the leading technologies used today to secure web sites, intranets, extranets, and other server-based applications (IT Observer, 2009). Using SSL along with special server digital certificates will provide the security handshake and the data encryption to prevent eavesdropping and secure the integrity of data transmissions (IT Observer, 2009). Although SSL and PKI will help provide network security, additional security measures are necessary to protect the servers and clients. Tri-Corps server will utilize a software firewall such as Zone-Alarm, and must maintain up to date anti-virus and Trojan protection software such as Kasperksy, Norton, or McAfee. Next, the IT department must ensure every security patch for all operating systems and applications are applied as soon as they become available. The final focus point in network security, monitoring the environment, entails the weakest link in all network security, people. Monitoring the environment is more than watching and reacting; Tri-Corp must establish a proactive strategy to audit the network and discover poor practices and configurations. Password rules are a primary example; passwords must contain both upper and lowercase characters and one symbol. Only secure messaging through company provided and monitored email accounts will be allowed, no instant messaging or chat rooms; all emails must pass a virus scan before the recipient will be granted access to view the message. With a detailed information policy in place, proper training, consistent, proactive monitoring, Tri-Corp will protect its data and avoid the mess and disruption of security leaks. Once this policy is in place, Tri-Corp will need to move on to its disaster recovery plan. Tri-Corps needs to have a disaster recovery plan in place, to return to normal after disaster has struck. Defining disaster means an abrupt disruption of all or part of its business operations, which may directly result in revenue loss (Cisco, 2008). To reduce disaster losses, it is imperative to have a first-rate disaster recovery plan for every business subsystem and operation within Tri-Corps walls. Backup and Disaster Recovery Every time a business encounters a disaster, the company always points to one or more causes and effects. The causes may be anticipated, or a result of human, or mechanical origin, and can range from events as miniscule as a minor hardware or software components malfunctioning to commonly recognized events such as earthquakes, fire, and flood (Cisco, 2009). These disasters may cause small interruptions or may lead to total business shutdown for days or months. Occasionally, these disasters have proven to be fatal to unprepared businesses. Forming a disaster recovery plan begins by recognizing the root cause and effect, followed by a detailed analysis of probability and severity, and ranking them in terms of their business priority. The outcome is an official evaluation of threat and a disaster recovery plan that takes into account all available recovery means. In simpler terms, Tri-Corps IT staff needs to determine what types of disasters are most likely to occur and rank them in order of probability. Afterwards, Tri-Corp must create an action plan that encompasses detailed steps to return business to a state of normalcy in the event of the given disaster. Finally, Tri-Corp must form a Disaster Recovery Committee to assume responsibility for rehearsing, carrying out, and improving the disaster recovery plan on a continual basis. Tri-Corps disaster recovery plan must include a data backup plan in the event the company’s database is compromised. The recommendation is to use IBM’s Tivoli software. IBM’s backup and recovery service provides companies with a backup and disaster recovery solution that includes cloud backup, remote office, unified recovery, and virtual server protection. Their Tivoli Storage Manager received the 2011 CRN Channel Champions Award because of the quality, reliability, support, and scalability of their solution. Many other companies offer backup and disaster recovery solutions, however, based on my research IBM offers the most complete and reliable solution. IBM’s backup and recovery service provides companies with a proven solution for managing their storage needs with a central backup solution. This service uses smart data movement and smart data store technology; together, these technologies complete backups and restores quickly and efficiently while still providing the client with the flexibility to change and adapt. Additionally, the IBM Tivoli suite of storage products supports more than a dozen OS platforms, along with several network connectors, and more than 500 storage devices. (Art W Meyer,  2011,  para. 2,4) Using these two key components will ensure Tri-Corp will complete the necessary preparation to survive disaster and avoid external attacks. Additionally, this plan will ensure that the resources required to keep the business going are available to key personnel. The questions regarding what to do, how to do it, and the ever- present need for communication to critical data is a key component in maintaining Tri-Corps success. However, no amount of planning provides the desired effect without a thorough understanding of the organization and its inner workings. Tri-Corp must incorporate its processes, people, and systems with precise, exacting detail to aid in a seamless transition. Following the preceding recommendations will help assure Tri-Corp does not fail because of ignorance. This recommendation will protect Tri-Corps valuable data assets and help the company to keep moving forward. References . Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Axia College. (2005). Networking, a Beginners Guide, Fourth Edition. Retrieved from Axia College, IT/230 website Agility Recovery Solutions. (2009). Retrieved from http://blog. agilityrecovery. com/disaster-recovery?   k=disaster%20recovery%20solutionsamp;_kt=b63adcc1-e0cf-4e52-b042-bbffd8dddc96 Art W Meyer. (2011). Backup and Disaster Recovery. Retrieved from Art W Meyer, IT/230 website Backup and Recovery. (ND). Retrieved from http://www-01. ibm. com/software/tivoli/solutions/backup/ Backup amp; Recovery. (2011). Retrieved from http://www. sonicwall. com/us/products/Backup_Recovery. html Boda, K. (2009). Forums gt; Cisco: Average Connection Consumes 11. 4 GB Per Month. Retrieved from http://www. dslreports. com/shownews/Cisco-Average-Connection-Consumes-114-GB-Per-Month-105086 Cisco. (2008). Disaster Recovery: Best Practices. Retrieved How to cite Network Design Project It/230 Final Paper, Papers

Wednesday, April 29, 2020

Mother Tongue Essay free essay sample

I believe the message that Amy tan was trying to convey, is that language is not the best determinant to gauge intelligence of an individual. And perfect English is not the only English. There are multiple ways of expressing one’s thoughts? multiple â€Å"Englishes. † Vocabulary can describe but language can express. Language can paint a more vivid picture with critical minutiae. Words are just the icing on the cake, although, the true meaning behind your thoughts lies in your language. As Amy Tan says towards the end of the essay: â€Å"I wanted to capture what language ability tests can never reveal: her intent, her passion, her imagery, the rhythms of her speech and the nature of her thoughts. † Tan was attempting to prove that descriptive words have limited potentiality. Language is meant to â€Å"pick up the slack† of where words fall behind. Language gives you the feeling that you are actually there. We will write a custom essay sample on Mother Tongue Essay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Emotions and feelings only become palpable through language. Only then, are you capable of accessing and understanding the true content of an essay, book, or article. People frequently become preoccupied with vocabulary choice, they often lose focus on what truly matters? the message. . There are plenty of ways to convey your message, I just believe it’s most important that your message is totally understood. Tan realized that people often disregarded the power of language so she decided to compose â€Å"easy to read† books to not only reach a larger audience, but to allow the relationship she had were her mother to become tangible through language. In conclusion, I thought this particular essay was easy to understand, but had a deeper underlying message, which could be easily overlooked. Amy Tan taught me that as a writer, through language, I could then expand my horizons. I learned that, being able to articulate with the use multiple â€Å"Englishes† is paramount to becoming an eloquent writer. I thought Mother Tongue was very interesting. That is why I think that there is a big significance to talk to someone over the phone than in person because feelings and emotions can be felt and over heard and my effect the listeners disposition. For example, when you send a text message, no one knows exactly how you feel and in terms of making your emotions tangible we are very limited. Including smiley faces, excessive uses of exclamation marks, and intense capitalization can only do so much. Texting is too indirect. TFacial expressions coincided with language create a deadly match to allow people to understand. That is why personally why I hate talking over the phone. Because there may be some descrepencies with truly comprehanding my emotions. I feel that face to face contact is crucial. For example, if I call customer service a specific issue and I begin to yell my frustrations are transfered into lack of sanity. That is why I feel that use of automated machines that answer your questions whenever you call should be prohibited. If I call about an issue with my MacBook, my frustrations about my MacBook wont be taken seriously if there is no emotion behind it. If someone sees that I am immenlsy frustrated with the issues I am having with my laptop then it may be looked at as a capital priority. On the other hand, if Im talking to a computer (as if it isnt already crazy enought) and I begin to yell at it then it wont understand why I am trying to say.