Monday, January 27, 2020

Computerised Stock Control System

Computerised Stock Control System Introduction The Enterprise Networking assignment is based on the computerised stock control system. This assignment is about how to implement a new online book company called â€Å"Amazing Books†. â€Å"Amazing Books† company is a new online book company that will be selling books via a website. The website represents the books that are in the company’s warehouse. It also contains the information of the books and the information provided to the customers to order the books they want. It is linking with company’s stock control system. The stock will be regularly recorded and updated based upon the sales record. When a customer fills an order form, he or she has to choose the items and the delivery information. When the company receives the order, it delivered the packaged books to the local depot of a courier company. The online book company also implements its computerised inventory control system in the warehouse. This system includes order processing, recording new entry of books, despatching books to the courier firm, and flagging stock reorder levels up. So, the company will investigate the websites of stock control system as sample and implement its own one. Besides, the company will create a local area network (LAN) for in the warehouse by using appropriate media and topology to carry out its processes well. The company also has a plan to deliver the ordered stock items from the warehouse to the delivery company successfully by using suitable vehicles which contains hardware and software for security management. The last plan is to manage a security control system in order to prevent the theft of staff themselves and to regulate the stock reorder level by the time theft occurs. The network administrator or manager of the â€Å"Amazing Books† online book company will be investigating the book websites and computerised stock control system websites of other companies. He or she is also looking forward to finding the delivery management system and security management system on the web. Then he or she will be writing a report (with recommendations) how to implement theirs company in order to successfully set up. Task 1 Amazing Books Company is one that wants to manage themselves as an online book sales company. They will sell their books via the internet. So, they want to develop a website which will display information about their books. Before it is developed, they examine three websites of the online book companies that sell theirs via the internet. The first investigated website is www.bookshopofindia.com. In home page, the pictures of some books are presented. When the pictures are doubled-clicked, the summaries of each book are displayed. It contains other information such as authors’ names, ISBN number, price and numbers of pages. On the left-hand side of the home page, the subjects of the books that are sold in this website are listed. The subjects contain religions, arts, commerce, computer technology, children books and so on. To order the books, customers can send e-mails, but they can only make payment by using bank account of Corporation bank and Punjab bank. The second examined website is www.boomerangbooks.com. In home page, some pictures of normal books are placed on the right side. In the top, some special ones such as books for Mother’s day are put. In the middle of the page, some are advertised by showing pictures, authors’ names, and short descriptions of them. If the pictures are double-clicked to investigate, the pictures of the books’ covers and summaries of them with authors’ names appear. ISBN, format, number of pages, publishers, publish date and languages are also shown. On the right side, normal price and discount price are compared. On the left side of the home page, the site arranges some categories to browse for books according to book categories, bestsellers, books from movies, and book awards, etc. It also places book contents. In home page, it ranges a menu called â€Å"Boomerang Books Bulletin†. If a user signs up in this form, he or she can get a $5 book voucher and 20% discount when discounts days are on. To order the books, the site displays its phone number, e-mail address, and fax number. Thus, customers can order by phone, e-mail or fax but they can pay only Australian dollars. The third one that is observed to get displaying books information is www.cherrythitsar.org . This website is the one where users can get e-books. On the home page, there is a list that describes the categories that users can download. These categories contain Myanmar free e-books, Myanmar novels, Myanmar newspapers and so on. If a customer wants to get them, he or she has to make an account by entering user name and password. Then he or she can get them. After investigating these websites that provide information for online book selling, â€Å"Amazing Books†, the online book company, is implementing their website. On the top of the home page, the photos of the books that are sold for the memorial days will be presented. They will be sold by gifting suitable discounts. On the left-hand side of the home page, the catalogues of the books will be exhibited in order to search books by the categories the customers want. The catalogues will queue the lists of the books according to book categories, bestsellers, books from movies, and book awards, etc. If the photos of the books in home page are double-clicked, the summaries of the books with books’ titles, sorts of books, ISBNs, authors’ names, publishers, publishing date, number of editions, and number of pages, etc. will be shown. Under the every page of site, there will be company’s address and ordering information will situate. Ordering information will include phone numbers, fax numbers and company’s e-mail address. So, customers can order books by ringing a phone call, or making order by fax, or sending an e-mail. To order by e-mail customers must fill chosen items into the shopping basket that is on the right side of the home page. Then they have to enter their phone numbers and addresses (including postal code). They can enter their bank accounts or credit card accounts to order. Task 2 There are many stock items that are stored in the warehouse of the â€Å"Amazing Books† online book store. The stock control system in warehouse is linked with the company’s website so customers can view the books that are in warehouse via the website. If they want to order books, the will their personal information including delivery addresses, postal codes and bank or credit accounts. When customers make books order via website, the company will inform the staff of the warehouse. The warehouse staff checks the level of stock items and reply to the main server. And the server keeps the information update and let the customers know information to the website. Then the company will deliver the books to a delivery team. And then the courier company will deliver books according to the customers’ addresses and postal codes. To carry out these processes successfully, the book store needs a proper inventory control system. So, they gather information for stock control system by exploring the websites which represent their computerised stock control systems. Required information for recommendations The first and second investigated websites show their online stock control systems. They show their product information and other associated one. Customers can search and browse they want and they can order them by e-mails. The company that creates the first website is using RFID (Radio Frequency Identification) readers for recording the new items for the stock. The company also explains its delivery service for ordered items. The second website uses barcode reader. It describes their control system of balance levels of the stock and alerting the flagging up reorder system by using the stock control management software. The third and the fourth one are the websites that sell software applications for computerised inventory control management system. They give the detailed information of how to use their software. Both of them are produced to run the functions of recording customers’ order, purchasing, items entry, auditing, receiving, shipping, transferring, reporting and security management, etc. Among them, the former one is used with barcode reader and the latter one with RFID for recording new stock items for the system. Customers can buy their software by entering their e-mail addresses, and bank or credit account numbers in these websites Methods and hardware for recording stock entry which are in warehouse After investigating four websites, â€Å"Amazing Books† implements its computerised stock control system. First of all, they make purchasing books from many other sources. Then the books are put in containers which contain RFID (Radio Frequency Identification) tags and the containers are carried by suitable vehicles. When they arrived to the warehouse of the company, the RFID tags are checked by RFID readers which transmit the series of digital identities of the books wirelessly. The tag readers detect the packages or containers which contains several book items. The RFID readers can check each entire container simultaneously and enter data into the server computer using special stock control management software for inventory control. So, the right data in database of the server can keep updating. Being linked the server with the website of the company, the information of the books in web pages is automatically updated. (c) Methods and hardware for order processing To order the book items, the customers have to fill the order form. In this form, the customers must fill their information that contains their addresses and postal codes and delivery fees (which price ranges depend on countries) by means of bank or credit account numbers. After that, they can order books via website of the company. When the company receives orders from customers, they register information of customers and orders in Order file. They check concerned master and transaction files to know how many numbers of which stock items are ordered. They also interrogate stock levels in the warehouse using RFID readers and make records of sending items. These records are entered into the server to update stock information. They then display that information in the website that is linked with server of the company. So, customers can see whether their ordered items are sent to them or not. (d) Methods and hardware for recording despatched items Their next procedure is to deliver the ordered books to a local courier company. Before they send, they pick books up from the warehouse and pack them into specific packages or containers which consist of RFID tags which will help the courier firm easy to check them. Then they deliver them to the delivery firms by appropriate vehicles. When the books arrive, the courier companies check the RFID tags of packages or containers by using RFID readers. Then they start delivering them to the customers around the world by using flights or ships or other appropriate vehicles. The delivery firm company sends the items information in order to update data in database of the server of delivery company. They will update the delivery information whenever the items arrive to their braches in different countries until they reach to the destinations. So, the customers can view the information on the website when and where their ordered items are arrived. (e) Flagging up and reorder levels of stock items After sending the ordered item, the website needs to update the item information. To make balance for the reorder level, they use the automatic flagging up system using the stock control software by giving notation on the server of the warehouse. So, the company can check balance level and decide whether they should reorder new books from other sources or not. (f) Required hardware for system To complete the system, they also use some kinds of hardware devices. They use Server for the main control processes for the stock. And they also need to use some kinds of not only security devices for the warehouse security but also special software to control the system and to prevent unauthorized access to data. It describes their balance of the stock and alert the flagging up reorder system buy using stock control software. Task 3 To implement the computerised stock control system used in warehouse the local area network (LAN) is conducted. The major requirements of LAN network are topologies and media. There are many topologies though only some are widely used. The most popular topologies are ring, bus and star topologies. In ring topologies, computers are connected by cables in a circle or ring form. Each computer is directly connected to the next, so no termination is required. In this topology, token passing method is used to transmit data in clock-wise direction. So every computer can transmit data fairly. It can prevent high-traffic and time-critical applications. So it is reliable and highly secure. But it uses fiber optic cables so cost is high and finds difficulties to install. In bus topology all computers are connected via a backbone, a cable segment. In bus topology, signals are sent as electrical parses. When they are sent, they travel along the cable in all directions. So, data collisions can occur when more than one computer transmit data simultaneously. Thus, occupying high-traffic is the major problem; otherwise, cheapness and ease of installation are advantages. In star topology, all components are connected by cable segments to a central device to communicate each other via it. It can share network resources and send and receive data from the computers in the network simultaneously because it handles multiple connections. So it is useful where high traffic occurs. It supports centralized management and the central server has a complete priority over other computers. But this topology requires a more involved cable installation and high cost. The access of the entire network also loses when the central device fails. To build a network we also need media. There are two groups of media; bounded and unbounded media. In bounded media, there are three types of cables; coaxial cable, twisted pair cable, and fiber-optic cable. Coaxial cable consists of two kinds- thin coaxial (10 Base2) and thick coaxial (10 Base5). There are two types of twisted pair cables; unshielded twisted pair cable (UTP) and shielded twisted pair cable (STP). The optical fiber cable contains two kinds; glass and plastic. The unbounded media or wireless connection technology contains Wi-Fi, and Wi-Max connection. Wi-Fi includes 802.11b and 802.11g at 2.4 GHz frequency and its speeds are between 11 Mbps and 54 Mbps, and 802.11a and 802.11n has 5 GHz frequency and 54 Mbps bandwidth. There are two versions of Wi-Max connection fixed Wi-Max (802.16-2004) and mobile Wi-Max (802.16e). The stock levels displayed in the website are based upon the sales figures which are in warehouse. Updating stock control system regularly can help the stock level. To support the stock control system a LAN network will be created in the warehouse. There are two types of networks; peer-to-peer one and server-based one. The server based LAN network is chosen to implement as it can handle a number of computers, more memory for a large database and extra peripheral devices such as printers; otherwise, peer-to-peer network can handle 10 or fewer workstations. To configure a server-based network, an appropriate topology and a suitable medium are used. The proper one for this network is star topology. Using central devices such as switches connected with cable segments, it supports centralized management for the entire network. It shares resources and access to clients simultaneously without traffic. Unshielded twisted pair cable is used as medium. It ranges into seven categories. Among them, category 5 is chosen because it is designed for 10 Mbps Ethernet whose speed is up to 1 gigabit. It can connect even 1024 nodes and can run 100 meters distance. It also provides ease of trouble shooting all nodes of the network. After configuring topology and medium, a server-based LAN is implemented. Firstly, the OSs is installed in the server computer. Then Active Directory Service (AD) is installed. So, it becomes a domain server which can control client nodes in the workgroup. There will be a network administrator as the authorized user of the server computer. This administrator will control security, access and user accounts of each client-computer user. Being centralized managed network, only server one can share resources but the client cannot. Data can only be updated, or deleted by the administrator who uses the server computer and not by the client. Thus the administrator can check and control the database using the information reported by clerks who provide data concerned with sales figures. Therefore, this database can offer up-to-date information for the stock control system because it is based on the sales figures. The computerized stock control system is being linked with the website via internet. So, regularly updating the data of the stock control system means the website shows the information deal with the status of the books items that are in ware-house. This makes customers easy to find the information they want and to order books by filling order form that displayed in company’s website. Task 4 The company will inform the staff of the warehouse about the information of the ordered books when they received confirmed orders and cost by bank or credit account from customers via their website. They also acknowledge the customers about the confirmation. The voucher numbers of the ordered books and the DNS of the courier’s website are also given. Processing Order in Warehouse After receiving the ordered report, the staff members in the warehouse prepare to deliver the stock items. First of all, they check to ensure whether the quantity of the stock level is complete or not. Then they prepare to send them to the local delivery company. They firstly put and pack the books by means of ordered quantity and titles in the packages or containers. Then they fix an RFID tag which contains an electronic serial number on each container. The information of the sent items is marked by means of an RFID reader which can detect the electronic signals of serial numbers of the books. Then the information is transferred into the server computer to update the data in database. Transferring stock to local courier company Then they transfer containers of books to the local courier firm by taking suitable vehicles which are fitted GPS (Global Position Service) system to point the routes and time taken of them and to acknowledge the company what time where they are. When the containers of books arrive to the delivery team, they are checked with RFID readers again to mark what time the delivery items are received. It makes ensure not only the stocks are prevented by theft of staff but also they are safely arrived and whether they are the correct ones or not. Delivering stocks by Courier Company The delivery team starts the delivered items entry into their website after checking them. Along the paths of wherever they deliver the stock until they reach to the destination, they regularly update information on their website. So, customers can check the delivery information via the website of the courier company if they want to track about their ordered books’ information. The delivery company delivers the ordered stock items according to the customers’ addresses and postal codes. If the addresses and postal codes indicate a customer is in local, the company uses cars to transport them. Otherwise, they firstly send by using shipping delivery to the foreign countries where the branches of their company are situated and they send to their destination addresses and postal codes at last. Updating data Each branch of the courier firm also reports to their main office and the office also return the information to the â€Å"Amazing Books† company until the ordered book items are received by the customers. The online book store company also updated the information in their company’s database in main server. Being linked with the server of the courier company, the information of the books in their website is also updated. So, the customers can see where the items they have ordered and when they will receive them by entering the voucher numbers of them on the website of the courier company. After the ordered books are transferred from the delivery company to the customers, the firm also reports to their main office again. The main office of the company also replies to the online book store company. And then the book store renews the data in database of the server in order to check the balance stock levels by means of automatically flagging up system. Task 5 â€Å"Amazing Books† online book company keeps in a large amount of book items in the company’s warehouse. The stock items in the warehouse are kept by staff members of its. To secure the warehouse and the books in it, a security management system is needed. This system is also required to prevent unauthorized access data of the company. The company should also think about the theft or access data without permission done by staff members of the company themselves. (a) Methods to prevent theft and monitor the staff To implement the security management system of the warehouse, both hardware and software are needed. At first, the local area network (LAN) will be created using Star topology to control the centralized management of the company’s LAN network. Furthermore, the network administrator should also manage the specific working hours, authorized access, and login passwords, etc of an individual staff. So, unauthorized access that aims getting company’s important data in database of the server dishonestly can be overcome. It can also prevent the fraud of staff. Moreover, there should be some plans to detect and prevent the theft of stock items in warehouse. The most appropriate thing to monitor inside the warehouse is CCTV cameras. They will let the administrator or manager watch inside the warehouse all the time. He or she can immediately know if theft is occurred. Besides, there should be some limitations at the entrance and exit of the warehouse. Using retina scanner at the entrance is a proper method. The scanner will sense the retina of each staff to separate if the person has the permission to enter into the warehouse or not. It will make the record of each and it will alarm if something doubtful is happened. An EAS (Electronic Article Surveillance) should be fixed at the exit of the warehouse and everybody must be through when they leave the warehouse. It will detect each person using radio frequency technology and alarm when the staff takes the book items out without registering for despatched processes. (b) Adjusting the stock levels when theft occurs Before implementing the security management system of the warehouse, the stock levels of the books should be checked to ensure that the quantity of the stock before they are stored in it. When the books which are bought from different sources arrive to the warehouse, they are checked with RFID readers. Then the information of the books is transferred into the server computer as unique serial numbers of each. This event makes update the data in database. The server then stores the information of the books which includes quantity, books’ titles, and ISBN, etc. When the books are delivered, they are packed in containers which have an RFID tag and are rechecked with RFID readers again. Then checked data and data in database of the server are compared to confirm. If they are not same, the administrator can know the books are thieved by staff and he or she should review the security records. Automatic flagging up system also alerts when the quantity of books are less to acknowledge the administrator. So the administrator can check the balance level of the stocks and reorder new books from sources if necessary. Task 6 The report is produced in order to describe the recommendations of how to set up the computerised stock control system of the â€Å"Amazing Books† online books company. The summarising reviews for each procedure are as follows: Reviewing Task 1 The company investigates three online books websites via internet. They examine the features of the websites in details, i. e, the presentations of the books, selling and order information, delivery information, and discount information, etc. Then they will implement their own by using the facts which are based on the recommendations. Reviewing Task 2 The company explores four computerised stock control system websites. Then they set up their own computerised inventory control system in the large warehouse of the company. First of all, they will record the stock information by using RFID readers when the stocks arrive to the warehouse. Then they will transfer that information to the database of the server of the warehouse in order to update the data. The information in website will also keep updating because it is linked with the server of the company. When customers want to order books via website, they have to fill the order forms which contain the information deal with their addresses, postal codes, and bank or credit card account number. Then they will transfer the stocks to local courier company by appropriate vehicles. After that, they will update the information of books delivered in database of the server again. In the warehouse of the company, there will be an automatically flagging up system. They will fix this system to auto check the balance level and quantity of the stock. It will alert the company when the new stocks should be reordered. Reviewing Task 3 As the third step to implement the company’s stock control system, they will create a local area network (LAN) in the warehouse using suitable media and topology. The LAN will be set up as a server based one in order to centralized manage the whole network. The website of the company will be linked with the server so the information in website will always keep updating. Reviewing Task 4 After receiving the containers that contain books, the courier company will check stocks’ RFID tags with RFID readers and make records the books information. This information will be transferred into their company’s server computer to update data in database. As it is also linked with the website of their company, the delivery information will also update. The delivery company will always update the delivery information whenever the stocks arrive to their branches which are in foreign country. They will keep updating until they reach to their destination addresses. Customers can view what time at where their ordered books are via the website of the courier company. Reviewing Task 5 There will also be a plan to prevent thefts done by staff while the company is setting up their online book selling system and computerised stock control system. To prevent those events, the administrator will monitor the staff by using CCTV cameras. He or she will also use retina scanner at the entrance and EAS (Electronic Article Surveillance) system at the exit of the warehouse. To prevent unauthorized access, the administrator will manage the specific working hours, authorized access, and login passwords, etc of an each staff member. The stock levels are record by RFID readers when they reached to the warehouse. That information will be transferred into server of the warehouse. When the books are delivered to the deliver firm, they are rechecked with RFID readers again and transferred into server in order to update the data of stock levels. There will be an automatic flagging up system to alarm to acknowledge the administrator. So the administrator can check the balance level of the stocks and reorder new books from sources. Reference Websites http://www.bookshopofindia.com http://www.boomerangbooks.com http://www.cherrythirsar.org http://www.isisasset.com http://www.trakersystems.com http://www.controlelectronic.com http://www.rfid-library.com http://www.dhl.com Books Title Guide to Networking Essentials ISBN 14188-3718-0 Author Name Greg Tomsho, Ed Tittel, David Johnson

Sunday, January 19, 2020

Critical Analysis of Mark Antony’s Funeral Speech Essay

Of all Shakespeare’s works , Julius Caesar is a play that hinges upon rhetoric – both as the art of persuasion and an artifice used to veil intent. The most striking of Shakespeare is his command of language. In Mark Antony’s funeral oration for Caesar, we have not only one of Shakespeare’s most recognizable opening lines but one of his finest examples of rhetorical irony at work. The speech could serve as a thematic synopsis to Julius Caesar. One of the most important and significant parts in the play is the funeral speech given by both Brutus and Mark Antony. At first, the funeral speeches seem to have no true significant meaning. However in further investigation it is established that the speeches ultimately serve as the basis for the final outcome of the play. By exploring the speeches of both Brutus and Mark Antony we are able to focus on the important details which alter one from the other. Through this analysis we are also able to realize why Brutus’s speech becomes one of his justifications and explanations, while Antony’s becomes one of manipulation and skill. It is known that both Brutus and Antony desired to appeal to the common people. However, the way in which each man went about it differs drastically. Not only did it influence the outcome of the play, but each speech also offers a unique insight on each of the speakers. Brutus’s speech Brutus’s speech becomes one of acquittal, not only for the people of Rome, but for Brutus himself. He uses his â€Å"honor and nobility† as a shield to defend and justify his actions to the crowd. Brutus states that he has carried out this horrendous act because of his love for Rome, and for the good of the people. â€Å"This is my answer, not that I have loved Caesar less, but that I love Rome more†¦ (3. 2. 21-22). In his speech he requests that the people use their â€Å"reason† to judge him. Although this seduces the crowd, it is not until after one of the common people cry â€Å"Let him be Caesar. † (3. 2. 51) that it is realized the speech is â€Å"merely too good for them. † Brutus begins to realize that liberty is not what the people wanted, but rather that they desire a powerful leader. Although his speech serves the purpose for its practical effectiveness, Brutus later comes to discover that his lack of insight of human nature aided in the apparent hopelessness of his cause. In comparison Mark Antony fully understands human nature and uses his awareness of it in his speech. Antony appeals to the passion and the grief of the people. What Brutus failed to recognize in the people, Antony used to his best interest. He realized that the people of Rome were completely incapable of acting with â€Å"reason† and he employed this inability to manipulate and control their emotions and actions. By using Brutus’ own explanations for Caesar’s death to begin his speech, Antony proves his validity to the crowd. By questioning Caesar’s ambition, yet never actually humiliating the conspirators; He succeeds in purposely leading the crowd away from any rational defense provided by Brutus. Antony uses his own grief along with a series of lies to remove the sympathy of the people. Through his powerful and honest speech he is able to cast a shadow of doubt into the minds of the people, and the crowd begins to gaze at the true motive behind Caesar’s murder. Antony understands the needs and wants of the people and uses this to prey upon their emotions and passions. He dangles Caesar’s Will in front of the people and then quickly puts it away again, knowing that the crowd will demand that it be read. Antony also recalls memories of the cloak Caesar now wears, while revealing his bloodied body, fully aware of the havoc it will reek, but unrelenting in his quest for revenge. Antony’s Speech Antony’s performance on the bully pulpit came as no surprise. To be sure, Antony does not have it easy. He is already a man distrusted by the conspirators for his friendship with Caesar. Brutus lets him speak at Caesar’s funeral, but only after Brutus,a great orator in his own right, has spoken first to â€Å"show the reason of our Caesar’s death†. Burtus makes it very clear that Antony may speak whatever good he wishes of Caesar so long as he speaks no ill of the conspirators. Obviously Antony has two advantages over Burtus: his subterfuge and his chance to have the last word. It is safe to say that Antony makes the most of his opportunity. He even mocks the senators and merely sets the table for dissent. He progressively hits upon the notes of ambition and honourable in a cadence that soon calls both terms into question. Friends, Romans, Countrymen, lend me your ears; From a rhythmic perspective, the trochaic feel of this opening immediately commands attention. The succession of hard stresses is also Shakespeare’s way of using the verse to help Antony cut through the din of the crowd. Antonoy also echoes the opening line that Brutus uses [â€Å"Romans, countrymen and lovers†],but conspicuously rearranges it; where Brutus begins with â€Å"Romans† to reflect his appeal to their reason, Antony begins with â€Å"friends†, which reflects the more emotional tact he will take throughout the rest of his speech. Remember also that Antony has entered the Forum with Caesar’s body in tow and will use corpse as a prop throughout his oration. Antony follows with a line of straight iambic pentameter punctuated with a feminine ending [ â€Å"I come to bury Caesar, not to praise him]. Here is the first irony of Antony’s speech, in that he is unequivocally here to praise Caesar. Antony is, in fact, lying. Come I to speak in Caesar’s funeral,Antony returns to the actual predicate of his statement with innocuous metrical regularity. The line is all but a throway; Antony doesn’t want the crowd dwelling on the idea that he is speaking here by permission. The preceding parenthetical insertion of Brutus and the rest being â€Å"honourable men† displace his emphasis and lessens the impression that Brutus holds sway over him. In doing so, Antony effectively obeys the letter of his agreement without yielding to its spirit. But Brutus says he was ambitious; Antony contrasts his experience with what Brutus has said. The obvious implication is that Brutus and Antony have different views of Caesar. The more subtle implication is that since both men have claimed him as their friend, they have equal authority to speak on the subject of Caesar’s disposition. Antony, however, has the advantage of not needing to justify his actions. Instead, Antony can focus on sawing the limb out from under Brutus’s argument. And Brutus is an honourable man. At this point, Antony is still ostensibly speaking well of Brutus—at least to the crowd. A plebian might think that at worst, perhaps, either Antony or Brutus has made an honest mistake in his judgment of Caesar. On the other hand, the words says, ambitious, and honourable are becoming impossible to miss. Yet Brutus says he was ambitious; This is the third time in this speech that Antony utters this refrain. Every time he says this, it draws Brutus in an increasingly harsher light. The recurring repetition amplifies the question in the mind of the audience, There is a rather obscure rhetorical term for this technique; it’s known as repotia, which describes using the same phrase with minor variations in tone, diction, or style. My heart is in the coffin there with Caesar, The regular iambic rhythm of the line and the feminine ending both help soften this line’s tone, which contrasts the high fervor of â€Å"O judgment! † It’s a simple metaphor that holds up well four centuries later. To Antony’s credit, the sentiment is grounded in his love for Caesar; it’s also quite telling of the character that he’s able to use this emotion in such a cynical enterprise. Throughout his speech Antony calls the conspirators honorable men. He then says, â€Å"You [the crowd] all did love him once, not without cause. What cause withholds you then to mourn for him? † This question goes against Brutus by questioning his speech when he betrayed Caesar. Now the crowd is starting to turn against the conspirators and follow Antony. Even though in his speech Antony never directly calls the conspirators traitors, he is able to call them â€Å"honourable† in a sarcastic manner that the crowd is able to understand. He starts out by citing that Caesar had thrice refused the crown, which refutes the conspirators’ main cause for killing Caesar. He reminds them of Caesar’s kindness and love for all, humanizing Caesar as innocent. Next he teases them with the will until they demand he read it, and he reveals Caesar’s ‘gift’ to the citizens. Finally, Mark Antony leaves them with the question, was there ever a greater one than Caesar? which infuriates the crowd. He then turns and weeps. Antony then teases the crowd with Caesar’s will, which they beg him to read, but he refuses. Antony tells the crowd to â€Å"have patience† and expresses his feeling that he will â€Å"wrong the honourable men whose daggers have stabbed Caesar† if he is to read the will. The crowd yells out â€Å"they were traitors† and have at this time completely turned against the conspirators and are inflamed about Caesar’s death. Antony uses the â€Å"Ceremonial† mode of persuasion in order to convince his audience that Caesar is not worthy of honor and praise. Antony must use â€Å"pathos† in order to appeal to the emotion of the audience. He must understand the disposition of the audience in order to successfully persuade his audience that Caesar truly was an ambitious man. â€Å"†¦ Bear with me; / my heart is in the coffin there with Caesar, / And I must pause till it come back to me. † (JC III ii 47) Marc Antony’s speech at Caesar’s funeral was so cunning and powerful that it caused the crowd’s loyalties to sway. Prior to Marc Antony’s oration the crowd favored Brutus and the conspirators. However, Marc Antony’s compelling discourse caused the plebeians to support him, and not Brutus. Marc Antony used three literary devices during his funeral oration, rhetorical question, sarcasm, and repetition, to successfully persuade the crowd. Although the crowd was supportive of the conspirators after Brutus’s speech, Marc Antony’s use of sarcasm in his funeral oration caused them to rethink who they should support. Conclusion Although both of Caesar’s funeral speeches seem to serve the basic purpose of appealing to the people, their dissimilarity serves as a great significance. Brutus’ speech, which appeared to be, honest becomes a speech of symmetrical structure, balanced sentences, ordered procedure, rhetorical questions and abstract subject matter, and ultimately became a speech of utter dishonesty. This along with Brutus’ lack of human insight aided in his inevitable downfall. Mark Antony’s speech on the other hand, for all its playing on passions and all its lies, proved to be at the bottom a truly honest speech because of Antony’s unconditional love for Caesar. To that extent Antony had truth on his side, making him concrete and real rather then abstract, and with this aided in his successful victory.

Friday, January 10, 2020

Divorce Rates in America

America’s Divorce Rates: Why Are They So High? The sanctity of marriage is a tradition that has been entered by generations over the past thousands of years. In the United States alone, 2,200,000 people choose to enter the lifetime commitment of marriage every year. Yet, less than half of that population is expected to keep that commitment. In a 1999 Rutgers University study, it is said that only 38 percent of Americans consider themselves happy in their married state, which has decreased from 53 percent 25 years ago.With the current, alarming statistic of over half of marriages resulting in divorce, there is much reason to take notice of how these numbers got so high. Although I personally have not grown up in a divorced household, I sought to understand why so many other people have, and in turn possibly gain knowledge to avoid becoming a part of the divorced population as well. In Steven Nock’s article, â€Å"America’s Divorce Problem,† he encloses the important point that â€Å"Divorce is not the problem, but rather a symptom of the problem† (1 Nock).With varying symptoms such as the feminist movement in the 1960s, an increase in financial dependence, increased career mobility, and the overall changed perception of marriage, the divorce rates have increased rapidly since the 1960s and deserve further explanation. The overall family structure has been challenged, and fault lines in American families have widened since the 1960s and the 1970s, which is when the divorce rate doubled.In the magazine article, â€Å"The Pursuit of Autonomy,† Alan Wolfe states that â€Å"the family is no longer a haven; all too often a center of dysfunction, it has become one with the heartless world that surrounds it. † While this statement may be a slight exaggeration of the family perception, reasons remain for the rapid increase of 30 percent in the divorce rate since the 1960s. Discussed in Barbara LeBay’s article, †Å"American Families Are Drifting Apart,† there are supposedly four main societal changes that occurred in the 1960s, which have greatly impacted today’s traditional family structures in America.Such societal changes include the sexual revolution, women's liberation movement, states' relaxation of divorce laws, and mobility of American families and are said to be responsible for many of our family alienations. During this time frame, society’s youth fled from the confines of family, while other family members sought to keep them close and as a result, it is said that there were most likely more problematic issues between children and parents during the 1960s and early 1970s than ever before.More importantly, the women's liberation movement in the workplace played a large role in changing the values and perceptions of family structure in America. Before this time, men were the assumed leader of each household and were given the largest responsibility of advancing i n their careers to make a living, while women were for the most part financially dependent upon them. However, starting in the 1960s women with a college degree could live independently and establish a life for themselves.There was a new recognition in society that civil rights meant equal rights for everyone, including women (243 Finsterbursch). Women sought sexual equality, which included a wider range of career opportunities and promotions that were once available only to men. By having this form of financial independence, women also had more of the freedom to break away from destructive or unhappy marriages. Although this movement is an important and productive one, it also impacted the traditional notions of marriage.Marriage had suddenly become a â€Å"choice,† rather than a â€Å"necessity,† and the entire concept of divorce became less of an issue. Another great change during this time period was the increase in mobility of families in which many family members were no longer living in the same household with one another. Men and women began to move to wherever they could advance in the corporate ladder in the shortest amount of time. Despite how far it was from where they grew up, college students took more jobs away from home, jeopardizing family unity.People needed to invest lots of time and energy to recreate their lives without the support of their family with these relocations, and still today many are willing to sacrifice their family relationships in order to advance in their careers. Barbara Lebay makes the important point that strangely, the more financially independent people become, the more families scatter and grow apart and tolerance levels decrease as their financial means increase (1 Lebay).In relation to this observation, Joseph Ducanto makes a similar point about the financial effects of divorce on poverty, along with the idea that while fixing the divorce system will not eliminate the future of poverty, certain changes can help to bring the problem into an easier resolution. In the article, â€Å"Divorce and Poverty are Often Synonymous,† there is praise for the concept of prenuptial agreements due to the fact that in recent years, prenuptial agreements have been adopted by many states of the Uniform Premarital Agreement Act.The adoption of this Act is said to â€Å"significantly strengthen the legal basis for acceptance and enforcement of these agreements within marital proceedings† (90 Ducanto). In today’s society, the need and importance of prenuptial agreements signifies our priority of finances being a common theme to marriage termination. Often times, who makes the money in the family and just how much can determine whether a marriage will stay together or not, an issue that was not common before the 1960s. The accumulation of marriage and divorce laws over the years are also said to have affected our increasing divorce rates.Since the 1970’s, all states have had access to what are called â€Å"no-fault divorces,† with the only real restriction being a waiting time limit of a few months to a year. The motivation for this concept came from the movement of people who felt this would benefit women and children who were stuck in verbally or physically abusive marriages. However, in Steven Nock’s article, â€Å"America’s Divorce Problem,† he discusses that many believe that the facility of this idea has also created somewhat of a â€Å"divorce culture† to the United States in which the traditional sanctions of marriage are no longer respected as much.Others also disapprove of the no-fault divorce saying that it often leaves women dependent, harms the interest of the children, and deteriorates the general social welfare (1 Nock). Although I personally have not grown up in a divorced household, I sought to understand why so many other people have, and in turn possibly gain knowledge to avoid becoming a part of th e divorced population as well.With varying symptoms such as the feminist movement in the 1960s, an increase in financial dependence, increased career mobility, and the overall changed perception of marriage, the divorce rates have increased rapidly since the 1960s and 1970s. During this time, there came the beginning of what some would describe as a â€Å"divorce culture† for America in which divorce was not seen as such a serious matter, with even the electing our first divorced President of the United States, Ronald Regan.Although events and movements of this era such as women’s empowerment in the workplace are very important to history, they have also impacted the traditional notions of marriage. Marriage has become a â€Å"choice,† rather than a â€Å"necessity,† and the entire concept of divorce is much less of an issue. This new attitude on divorce has clearly prevailed to current times and will hopefully correct itself throughout more changes in ev ents to our society. Works Cited Ducanto, Joseph N. â€Å"Divorce and Poverty Are Often Synonymous.   American Journal of Family Law  24. 2 (2010): 87-94. Academic Search Premier. EBSCO. Web. 19 Apr. 2011. Finsterbusch, Kurt. Taking Sides: Clashing Views on Social Issues. New York: McGraw Hill, 2011. Print. LeBey, Barbara. â€Å"American Families Are Drifting Apart. †Ã‚  USA Today Magazine  130. 2676 (2001): 20. Academic Search Premier. EBSCO. Web. 20 Apr. 2011. Nock, Steven L. â€Å"America's Divorce Problem. †Ã‚  Society  36. 4 (1999): 43-52. Academic Search Premier. EBSCO. Web. 19 Apr. 2011.

Thursday, January 2, 2020

Ethical Issues Of Securing Data Security - 1682 Words

Name: Yesu Devendra Kumar Meruvu CUW ID: F00439850 Assignment: Term Project - Project 3 1. Topic: Data Security 2. Working Title: Ethical issues in Securing Data 3. Thesis Statement: In this paper the primary motive is to provide the ethical issues related to data security. This paper provides the ethical issues facing by the individuals even the security of the applications is so high. 4. Abstract: Ethical issues are the major concern in todays secured data communication and electronic commerce. Though the applications are robust, secure and reliable, the users are concerned about their personnel information and sensitive information being misused. These days’ web applications and electronic commerce applications collect user’s personnel information and banking information. These applications are so abstract that the end-user has no idea whether this information is collected by a genuine party or they are being trapped. In this paper the primary motive is to provide the ethical issues related to data security. This paper provides the ethical issues facing by the individuals even the security of the applications is so high. 5. Background: 5.1. Introduction Data Communication acts as the backbone in e-commerce and when data is being transferred over the wire there is a threat associated with it. Not only we are concerned about the threats we get while transferring the information but also some major questions arise like whom are we sharing the data with? Is it safe toShow MoreRelatedQuestions On Electronic Health Records1710 Words   |  7 PagesHealth Search databaseSearch termSearch Limits Advanced Journal list Help Journal ListPerspect Clin Resv.6(2); Apr-Jun 2015PMC4394583 Logo of pclinres Perspect Clin Res. 2015 Apr-Jun; 6(2): 73–76. doi: 10.4103/2229-3485.153997 PMCID: PMC4394583 Ethical issues in electronic health records: A general overview Fouzia F. Ozair, Nayer Jamshed,1 Amit Sharma,2 and Praveen Aggarwal1 Author information ââ€" º Copyright and License information ââ€" º Go to: Abstract Electronic health record (EHR) is increasingly beingRead MoreTechnology And The Internet Of Things1487 Words   |  6 Pagesstoring this data that we use, and the IT industry just comprehends it. With more physical objects being mapped in the real world, the IT industry will need more people to help control all of the systems and data that is being used. An example of this is if a company lacked a certain product then that problem would be reported to the company and further deliveries would be conducted (Weber, Pg. 23) This fast growing industry is remarkable, and the developments of the legal, social, ethical, and securityRead MoreSecurity of the Database System1236 Words   |  5 Pagesthe constructs of a database Management system (DBMS), data model as well as database. And a database is described as an organized pool of logically-related data. There are issues related to database system such as security, legal, ethical and privacy issues. Database information can be leaked in different ways. One of them being SQL injection which involves sending unexpected data to a web server making it interact with the database. The data is capable of being sent in different methods after beingRead MoreEthical Considerations of Health Information Management1711 Words   |  7 Pages Ethical considerations of health information management Health information management Introduction For better internalization of ethical considerations of health information management, it is vital to comprehend how medical institutions perceive their interpretation of health information. It is also essential to intercede how these institutions practice managerial ethics towards the notion. Information is a representation of data in a manner, which is in the form of symbols (Meadow et alRead MoreCyber Surveillance And Cyber Security1297 Words   |  6 PagesCyber security analyst help stop cyber attacks from occurring, they help businesses protect their networks from hackings, viruses, and cyber threats. They aid to keep our personal information private from hackers. Cyber security analyst is a growing field due to the number of cyber attacks and online threats. â€Å"Cyber security analyst’s main responsibility is to plan and lay out security procedures for the protection of organization’s computer systems and networks. With the daily increase in cyberRead MoreTh e Ethical Hacking Program On Pluralsight.com1488 Words   |  6 Pagesthe class had begun. After looking at a few possible projects and subjects for a thirty page thesis I decided on going through the Certified Ethical Hacking program on Pluralsight.com. Over the past fourteen weeks I watched the lectures on Pluralsight.com, took quizzes on skillset.com, read chapters and took chapter review tests in the Certified Ethical Hacker version 9 book by Sean-Philip Oriyano. I watched approximately sixty-one hours of lectures, spent several hours taking assesments andRead MoreEthical Ethics And Ethical Hacking968 Words   |  4 Pagesdevelopments and issues that have arisen in regards to the internet. One development and issue is ethical hacking. To understand ethical hacking one must be able to define what it means to be a hacker. â€Å"A hacker is an individual who intends to gain unauthorized access to a computer system† (Laudon Traver, 2015). Oxford Dictionaries defines an ethical hacker as â€Å"a person who hacks into a computer network in order to test or evaluate its security, rather than with malicious or criminal intent† (Ethical HackerRead MoreThe Influence of Ethical Issues on Information Technology Usage1165 Wor ds   |  5 PagesThe Influence of Ethical Issues on Information Technology Usage Use of computers poses a new challenge for privacy. Privacy is a state of mind, specific place freedom from intrusion or control over the exposure of self of personal information (Czar, 2013). In this day and age, many new rules come into play on how to protect the privacy of the patient. The purpose of this paper is to discuss the importance of ethical use and the unethical issues faced with the use of technology, as well as theRead MoreCreating A More Secure Business Environment1540 Words   |  7 PagesWhen you have a website you need the best Website security because you don’t want to hear these words â€Å"your website is down† â€Å"Data is lost† all because a hacker corrupted the website. The nightmare happens all too often with hackers in this day and age because it seems like everything gets hacked. Having a website hacked can mean loss of sales especially when it’s with an online grocery store. The business world is increasingly dependent on technology to supply information and communications facilitiesRead MoreThe Security Breaches Of The Target Store Corporation Essay1306 Words   |  6 Pagesensure that data are secure for the Northcentral University. This paper will summarize the security breaches of the Target Store Corporation over the previous year and make recommendations in the form of information technology security best practices to strengthen the University’s infrastructure. Summarize Major Security Breaches The Target Corporation was exploited in December 2013 and then again in 2015. These breaches included customer’s personal identifying information and retailer’s data. This