Wednesday, April 1, 2020

Haunting Of Hill House Essays (932 words) - English-language Films

Haunting Of Hill House The Haunting of Hill House is considered a classic to many people. It has a certain sense of feeling missing from today's novels. The Haunting of Hill House has suspense, horror, a little bit of romance, and an ending that will leave you thinking for days. Shirley Jackson is well known for her twisted work. At the beginning of the book, you our introduced to a character that has a major impact on all of its "guests". Hill House. "Hill House, not sane, stood by itself against the hills, holding darkness within." This is just one of the chilling sentences from the opening paragraph. The fear begins to set in. Shortly after, you are introduced to the strong yet cautious Dr. John Montague. He is a doctor of philosophy and has a new study up his sleeve. He is going to rent the "haunted" Hill House and document all that goes on. To accompany him and further the study, are three assistants. After considerable research, three patients are chosen. Eleanor Vance, Luke Sanderson, and Theodora (Theo) are the chosen few. You are first brought into the life of Eleanor Vance. Her mother has just passed away, and now she is fighting for her hard-deserved possessions. Eleanor has never been accepted. She has always been on her own and liked it that way. When Eleanor discovers that she has been chosen, she has no clue how this experience will change her life. Next, we are introduced to Theodora. Her last name is never revealed which gives her a sense of mystery. Theo could be considered any man's dream. She is quite beautiful and has that certain something. Theo gladly accepts the invitation to Hill House, and nothing more is said. Luke Sanderson is the future inheritor of Hill House. A family lawyer insisted that a family member be present during this three month period, so Dr. Montague gladly chose Luke. Shortly after, Eleanor, Theodora, Luke, Dr. Montague, and his secretary arrive at Hill House. They are introduced to the mysterious housekeepers, the Dudleys. Theo and Eleanor quickly form a bond and explore the home. They discover how elaborate and titanic Hill House is. The fireplace, walk out veranda, and library are just some of the things that the girls discover. Everyone loves the house for its beauty and extravagance. Later on in the evening, Dr. Montague tells the long history of Hill House. It was owned by Hugh Crain. He had two children, but their mother was killed in a carriage accident just before she arrived at the house. His second wife died from a fall, possible suicide. Crain's third wife died of tuberculosis. Shortly after, Crain passed away in Europe. His two daughters were left with the house, but many fights occur over who should get it. The older sister dies, and the young sister ends up owning it. She commits suicide, and Hill House is left to the Sandersons. The first night was fine, but many things begin to happen. The following night, Theodora and Eleanor have a terrifying encounter. While sleeping, Eleanor hears a pounding sound. She wakes up. The sound continues, so she rushes to Theodora's room. The room becomes ice cold, and the pounding becomes louder. After an intense amount of time, Dr. Montague and Luke arrive. Another thing is discovered by the guests. Outside of the nursery, a cold spot occurs. Nothing can be explained about the cold feeling, but it occurs every time they walk passed it. Over time, Eleanor sees and feels the presence of a superior "being". The following quotation comes from the chilling moment when Eleanor discovers no one is in her room: "God God-whose hand was I holding?" Over time, Eleanor becomes attached to the house. She feels like the house is talking to her. On one occasion, "WELCOME HOME ELEANOR" was written over Theo's room and clothing. It was written in blood. Eleanor becomes furious, thinking her fellow spouses wrote the frightening message. Then again, she feels like the house is speaking to her. She feels like Hill House is part of her. Later on, this "obsession" goes one step too far. Towards the end of the book, Mrs. Montague arrives at Hill House. With her, she brings planchette. Planchette is a form of the ouija board. With planchette, Mrs. Montague can contact the spirits of the house. In her planchette sessions, the names Nellie, Nell, and Eleanor are brought up many times. This feeds the obsession of Eleanor and Hill House. After

Saturday, March 7, 2020

Daddy, Vampires, Black Hearts Essays - Daddy, Sylvia Plath, Plath

Daddy, Vampires, Black Hearts Essays - Daddy, Sylvia Plath, Plath Daddy, Vampires, Black Hearts In the poem Daddy, Sylvia Plath says that there are women who, due to early conditioning, find themselves without the tools to deal with oppressive and controlling men. They are left feeling helpless and hopeless. For some women, the struggle is never resolved, others take most of a lifetime. For a lucky few, they are granted a reprieve. The speaker in this poem is Sylvia Plath. The poem describes her feelings of oppression and her battle to come to grips with the issues of this power imbalance. The poem also conjures the struggle many women face in a male dominated society. The conflict of this poem is male authority and control versus the right of a female to be herself, to make choices, and be free of male domination. Plaths conflicts begin in her relationship with her father and continues with her husband. The intensity of this conflict is extremely apparent as she uses examples that cannot be ignored. The atrocities of NAZI Germany are used as symbols of the horror of male domination. The constant and crippling manipulation of the male, as he introduces oppression and hopelessness into the lives of his women, is equated with the twentieth centurys worst period. Words such as Luftwaffe, panzerman, and Meinkampf look are used to descibe her father and husband as well as all male domination. The frequent use of the word black throughout the poem conveys a feeling of gloom and suffocation. Like many women in society, we know that Plath felt oppressed and stifled throughout her life by her use of the simile I have lived like a shoe for thirty years poor and white, barely able to breath or Achoo. The use of similes and metaphors such as Chuffing me off like a Jew. A Jew to Dachau, Auschwitz, Belson. and I think I may well be a Jew clearly shows the feelings of anguished hopelessness and the ripping agony she must have felt. The agelessness of this poem is guaranteed as there will always be women who feel the same torture that is described. . Strong images are conveyed throughout the poem. The words marble- heavy, a.bag full of God conveys the omniscience of her fathers authority and the heaviness it weighed on her throughout her life. The vampire who said he was you, and drank my blood for a year, seven years if you want to know describe her husband and the ability of male power to strip a person of their own sense of themselves. The poem is written in stanzas of five short lines. These lines remind me of a Mike Tyson jab, short but extremely powerful. An example of this If Ive killed one man Ive killed two The vampire who said he was you. The powerful imagery of these lines overpowers any of the rhyme scheme. The tone of this poem is an adult engulfed in outrage. This outrage,at times, slips into the sobs of a child. This is evident by Plaths continued use of the word daddy and the childlike repitition You do not do, you do not do and Daddy, daddy, you bastard. Fear from her childhood moves her in directions that will take her far from herself. In one line in the poem she brings us starkly into the world of a childs fear. She uses words that sound like the words of a child staring out at us from behind a bardwire snare I have always been scared of you. This poem portrays a bleak picture of life for some women. However, we know that Plath was able to resolve her conflicts. She states Daddy Ive had to kill you and Daddy, you can lie back now. Theres a stake in your big fat black heart Athough it appears that Plath has reached resolution this is not the case for many women who find themselves under the thumb of a male. These women should look to this poem for help. It is a beautiful argument that clearly shows that she climbed from total domination by a male to freedom

Thursday, February 20, 2020

An Unannounced Inspection Case Study Example | Topics and Well Written Essays - 1000 words

An Unannounced Inspection - Case Study Example Likewise, it was noted that the plant manager is not within the premises and the area where the employee who complained works is reported to be currently undergoing a major renovation for a process change for the product in the line. The Questions and Responses How would you act, what actions should you take, and what would you do? According to OSHA inspection standards, employers should be aware that inspections are regularly conducted without the need for advance notice or any presentation of warrant to inspect. In this case, an employee reported a complaint, which is one of the requirements where OSHA would be able to enter and inspect the worksite without obtaining a warrant or even the employer’s express consent. Therefore, the only expected and appropriate action that should be taken is to allow the OSHA inspector to undertake the needed inspection and to address all inquiries or questions regarding the complaint in the worksite under major renovation; with proper advice of the matter from the plant manager. One could call the authorized officer in charge of safety and the plant manager just to formally advise them that the OSHA inspector is currently at the plant and to enable one to effectively assist the inspector, as duly and lawfully required. Should you challenge the validity of the OSHA inspector's request, or their right to enter the workplace? One has not authority to challenge the validity of the OSHA inspector’s request because by virtue of law, specifically relating to â€Å"Section 5(a)(1) of the Act, known as the â€Å"General Duty Clause,† which requires that every working man and woman must be provided with a safe and healthful workplace† (Occupational Safety & Health Administration, 2002, p. 1), the disgruntled worker has the right to forward any perceived concern that could possible endanger his health and safety in the work setting. Or should you request a warrant to enter the workplace, and thereby gain some time to make sure everything is in order back in the plant? There really is nothing to hide at the plant and the OSHA inspector could even assist in recommending the most appropriate methods to ensure that safety and security of the workers are addressed; while the major renovation for a process change for the product in the line is taking place. Can you gain any time to check with your in-area safety supervisor first? Or, should you immediately comply with the request for the inspection? Explain your answers. As previously noted, one strongly believes that the policy of the organization in terms of reporting relevant incidents (including the area safety supervisor and even the plant manager) must be followed and adhered to. Doing so does not mean that one is buying extra time but following protocols and policies in reporting relevant incidents within the organization for proper approval, as needed. Scenario #2: Serious Near-Miss Crane Incident Brief Case Overview Being the EH&S pr ofessiona

Tuesday, February 4, 2020

Ethics and Law in Business and Society Research Paper

Ethics and Law in Business and Society - Research Paper Example Significant analysis and evaluation of the policies have been conducted to determine the effectiveness of these policies. Lastly, the study will provide some recommendation plans in order to overcome the possible issues and challenges. History of the Act It is important for the government, authorized bodies and employers to take care of the needs of the employees in an organization as employees are considered as one of the major assets of an organization. Significant work performance of the skilled and effective employees helps the business organization to achieve significant growth rate. In addition to this, effective business performs ace of the business units ensures economic growth of a nation. This specific act or program was required in order to cover and support the basic rights of the employees in an organization. This Federal Employees’ compensation act was developed in the year 1916 to ensure social welfare. This act was developed in order o support those employees w ho are physically or mentally unable to justify job responsibility. The major objective behind the development for the acts and programs was basically for a good social cause. It was highly important for the employees who are disabled, retired or physically challenged to get the benefits from the employers or from the federal government or from the authorized bodies to look after himself and his family. These funds can be provided to all the employees who are affected due to the workplace-related issues. In addition to this, several Federal Employees’ Compensation Act programs were started to organize by the federal government in order to improve the scenario of the society. According to this act, an individual can get different benefits based on the eligibility. The elements of the Federal Employees’ Compensation Act program include several aspects. According to this act, each and every mentally or physically affected employee in a workplace can get significant compen sation or service benefits (Ullmann, 2003). It is important for an organization to ensure healthy and safe workplace environment. The federal government of United States of America supported this act and act related programs to ensure the security of each and every disabled employee. Several types of benefit policies are proposed and developed in order to improve the lifestyle of these types of federal employees. However, the policymakers failed to develop the policy measures that created several conflicts and issues in later part. Several differentiated policies were developed and implemented under this Federal Employees’ Compensation Act in the year 1974 due to rising problems and issues in the states. however, the federal government of United States of America and other policymakers somehow failed to fulfill its overall objective due to lack of effective policy measures and i9nadequate development of eligibility criteria.

Monday, January 27, 2020

Network Monitoring And Management System Information Technology Essay

Network Monitoring And Management System Information Technology Essay A  literature review  is a body of text that aims to review the critical points of current knowledge including substantive findings as well as theoretical and methodological contributions to a particular topic. Literature reviews are  secondary sources, and as such, do not report any new or original experimental work. Most often associated with academic-oriented literature, such as  theses, a literature review usually precedes a research proposal and results section. Its ultimate goal is to bring the reader up to date with current literature on a topic and forms the basis for another goal, such as future research that may be needed in the area. A well-structured literature review is characterized by a  logical  flow of ideas; current and relevant references with consistent, appropriate  referencing style; proper use of  terminology; and an unbiased and comprehensive view of the previous research on the topic. 4.1 Domain Research 4.1.1 Network Monitoring and Management system 4.1.1.1 Introduction to the use of Network Monitoring and Management system Whenever there is vital information in an organization there has to be some agent who has to provide security measures to that information. This is because this vital information can be some sort of business plans, customer details or any kind of confidential tenders that is very important to organizational benefit. Any rival company can gain profit if it has accessed to those information by any means. Thus here arise the need and usage of network monitoring system that will be able to monitor the activities of its client. Secondly in every company one can expect there will be one network administrator. But when the number of machine increases it is difficult to manage those machines manually. Suppose one need to install some kind of programs in the client PC, the administrator has to go to that PC and then install. It is literally time consuming to go to each and every PC for initiation and finishing a set up process. Another way to solve this problem is to hire more employees for maintenance of the machines. Now this will be costly affair. So the use of Network Monitoring and Management together forms an important part of organizational computer network in day to life. 4.1.1.2 Network Monitoring and Management System The term  network monitoring  describes the use of a system that constantly monitors a  computer network  for slow or failing components and that notifies the  network administrator  (via email, pager or other alarms) in case of outages. It is a subset of the functions involved in  network management. While an  intrusion detection system  monitors a network for threats from the outside, a network monitoring system monitors the network for problems caused by overloaded and/or crashed servers, network connections or other devices. Effective planning for a network management system requires that a number of network management tasks be performed. The network management system should discover the network inventory, monitor the health and status of devices and provide alerts to conditions that impact system performance. An  intrusion detection system  (IDS) is a device or  software application  that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents.  Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators.   IDPSs have become a necessary addition to the security infrastructure of nearly every organization. Network management  refers to the activities, methods, procedures, and tools that pertain to: Operation deals with keeping the network (and the services that the network provides) up and running smoothly. It includes monitoring the network to spot problems as soon as possible, ideally before users are affected. Administration deals with keeping track of resources in the network and how they are assigned. It includes all the housekeeping that is necessary to keep the network under control. Maintenance is concerned with performing repairs and upgrades-for example, when equipment must be replaced, when a router needs a patch for an operating system image, when a new switch is added to a network. Maintenance also involves corrective and preventive measures to make the managed network run better, such as adjusting device configuration parameters. Provisioning is concerned with configuring resources in the network to support a given service. For example, this might include setting up the network so that a new customer can receive voice service. 4.1.1.2.1 Types of intrusion detection systems [B5][B6] For the purpose of dealing with IT, there are three main types of IDS: Fig: Showing type of intrusion Detection system Network intrusion detection system  (NIDS) It is an independent platform that identifies intrusions by examining network traffic and monitors multiple hosts. Network intrusion detection systems gain access to network traffic by connecting to a  network hub,  network switch  configured for  port mirroring, or  network tap. In a NIDS, sensors are located at choke points in the network to be monitored, often in the demilitarized zone  (DMZ) or at network borders. Sensors capture all network traffic and analyze the content of individual packets for malicious traffic. An example of a NIDS is Snort. Host-based intrusion detection system  (HIDS) It consists of an agent on a host that identifies intrusions by analyzing system calls, application logs, file-system modifications (binaries, password files, capability databases, Access control lists, etc.) and other host activities and state. In a HIDS, sensors usually consist of a  software agent. Some application-based IDS are also part of this category. An example of a HIDS is  OSSEC. Perimeter Intrusion Detection System  (PIDS) Detects and pinpoints the location of intrusion attempts on perimeter fences of critical infrastructures. Using either electronics or more advanced  fiber optic  cable technology fitted to the perimeter fence, the PIDS detects disturbances on the fence, and this signal is monitored and if an intrusion is detected and deemed by the system as an intrusion attempt, an alarm is triggered. 4.1.1.2.2 Comparison with firewalls Though they both relate to network security, an intrusion detection system (IDS) differs from a firewall in that a firewall looks outwardly for intrusions in order to stop them from happening. Firewalls limit access between networks to prevent intrusion and do not signal an attack from inside the network. An IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system. This is traditionally achieved by examining network communications, identifying heuristics and patterns (often known as signatures) of common computer attacks, and taking action to alert operators. A system that terminates connections is called an  intrusion prevention system, and is another form of an  application layer firewall 4.1.1.3 Components of Network Monitoring and Management System The network monitoring system basically contains different modules with the help of which proper functioning is carried out. The following are the list of modules and processes: Initial Set-Up: This is the first step while setting up a network monitoring tool. The machines must be physically connected. IP addressing should be properly carried out. Network Mapping: The system sends out a command across the network along with usage of various components to get the minimum knowledge on the model in which the network is functioning network. This model is useful for documenting the network configuration. Machine Pooling: Now the map is prepared, and the system sends the current status request to the components that are in the network. With this process the system would able to get the knowledge of any potential failures that exist in the network. Alarms Notification: The application can detect the potential failures in the existing network. Like if any system has gone out of LAN due to any cable fault or any type of other failures it will send notification to the administrator. Information about errors can be displayed centrally or even sent as an SMS message to a mobile phone Notification can be through e-Mail, SMS or Pager. Reporting: The log-sheet with the help of the command can be very useful for the system administrator to generate the idea of the type of error that has been frequently occurring. By undergoing a thorough research the developer has found out that certain processes like filtering of client, listing of process, managing clients and their processes are the basic functionalities that must be present in a network monitoring system. 4.1.1.4 Network based Application Architecture Network based application architecture can be described as the software architecture of the network based application. It provides an abstract view and the model for comparison of the architecture that is going to be used to build the system. It explains how system components are allocated and identified and how these components interact with the system. Also provides information on the amount and granularity of communication needed for interact. Along with it also gives idea on the interface protocols. 4.1.1.4.1 Client/Server Architecture [W2][W3] The client-server model distinguishes between applications as well as devices. Network clients make requests to a server by sending messages, and servers respond to their clients by acting on each request and returning results. One server generally supports numerous clients, and multiple servers can be networked together in a pool to handle the increased processing load as the number of clients grows. C:UsersJAYESHPicturesfeatures-client-server.jpgC:UsersJAYESHPicturesclient_server_architecture.jpg Fig- A Client-Server Network The  client-server model  of computing is a  distributed application  structure that partitions tasks or workloads between the providers of a resource or service, called  servers, and service requesters, called  clients.  Often clients and servers communicate over a  computer network  on separate hardware, but both client and server may reside in the same system. A server machine is a host that is running one or more server programs which share their resources with clients. In most cases, client-server architecture enables the roles and responsibilities of a computing system to be distributed among several independent computers that are known to each other only through a network. This creates an additional advantage to this architecture: greater ease of maintenance. For example, it is possible to replace, repair, upgrade, or even relocate a server while its clients remain both unaware and unaffected by that change. Client/Server architecture with respect to domain research 4.1.1.4.2 Network monitoring protocols [W12] Website monitoring service can check   HTTP   pages,   HTTPS,   SNMP,   FTP,   SMTP,   POP3,   IMAP,   DNS, SSH,  TELNET,  SSL,  TCP,  ping,  SIP,  UDP, Media Streaming and a range of other ports with a variety of check intervals ranging from every four hours to every one minute. Typically, most network monitoring services test your server anywhere between once-per-hour and per-minute. SNMP is the most well known protocol used to manage networked devices. It was to facilitate the exchange of management information between networked devices operating at the application layer of the ISO/OSI model. A collection of network management stations and network elements are implicit in the SNMP architectural model. Network management stations monitor and control network elements by executing management applications for Network devices such as hosts, gateways, terminal and servers which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP) is used to communicate management information between the network management stations and the agents in the network elements. SNMP is most commonly used for remote management of network devices. SNMP is moreover known for its flexibility. Adding network-management functions to the existing system is very easy. An SNMP-managed network typically consists of three components: Managed devices Agents Network management systems A managed device can be any piece of equipment that sits on your data network and is SNMP compliant. Routers, switches, hubs, workstations, and printers are all examples of managed devices. An agent is typically software that resides on a managed device. The agent collects data from the managed device and translates that information into a format that can be passed over the network using SNMP. A network-management system monitors and controls managed devices. The network management system issues requests and devices return responses. 4.1.1.5 HCI (Human Computer Interaction) Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them. Association for Computing Machinery As Smart Whistle Blower- a network management and monitoring tool completely functions according to the user. That is why developer tried to implement peoples interaction with computers and to develop the computers for successful interaction with human by the concept of HCI (Human- Computer Interaction). The developer used following main parts of HCI: User Computer Interaction The developer implemented HCI with the aim of improving the interactions between humans and computers by making computers more usable and receptive to the users needs. Usability can be defined as the extent to which the system can be learnt and used by the users. So the developer measures the usability of the system by analyzing the following points: Easy to learn Effective to use Efficient to use While developing a system using HCI principles the following factors must be considered by the developer: Organizational Factors Environmental Factors Health and Safety Factors Comfort Factors People System/Network Administrator Supervisor Advisor HCI now is being used in a wide range of fields which are shown in the diagram below: Fig: Showing related modules to HCIU Source: http://images.google.co.in/imgres?imgurl=http://www.deepamehta.de/docs/images/talk/39-middle.png 4.1.1.6 Market Research 4.1.1.6.1 Similar software available in market There are numerous monitoring tools available in the market, some of which are listed below: Application Monitoring Performance Monitoring Database Monitoring Security Monitoring Environment Monitoring Network Traffic Monitoring PC Monitoring Protocol Analyzing 4.1.1.6.2 Comparison Chart [W13] [W14] [W15][W16][W17][W18][W19][W20] Fig: Showing Comparison Chart between ten software and Smart Whistle Blower A Brief Analysis On a comparison with 10 network monitoring system it has been found that the proposed software i.e. Smart Whistle is providing many such facilities that the current network monitoring system do not have. The comparison has been done on nine different features that network monitoring and management software must have. The features commonly are as follows: [Æ’Â  ] Logical Grouping [Æ’Â  ] Distributed Monitoring [Æ’Â  ] Hardware Intrusion Detection [Æ’Â  ] WebApp [Æ’Â  ] Auto discovery [Æ’Â  ] Triggers/alerts [Æ’Â  ] Live Screening [Æ’Â  ] Chat enabled [Æ’Â  ] Support Network Management System 4.1.2 Security management recommendation Security Management for networks is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from  hacking  and  spamming. Small homes A basic  firewall  like COMODO Internet Security or a  unified threat management  system. For Windows users, basic  Antivirus software  like  AVG Antivirus,  ESET NOD32 Antivirus,  Kaspersky,  McAfee,  Avast!,  Zone Alarm Security Suite  or  Norton Antivirus. An anti-spyware program such as  Windows Defender  or  Spybot Search Destroy  would also be a good idea. There are many other types of antivirus or anti-spyware programs out there to be considered. When using a wireless connection, use a robust password. Also try to use the strongest security supported by your wireless devices, such as WPA2 with AES encryption. Enable MAC Address filtering to keep track of all home network MAC devices connecting to your router. Assign STATIC IP addresses to network devices. Disable ICMP ping on router. Review router or firewall logs to help identify abnormal network connections or traffic to the Internet. Use passwords for all accounts. Have multiple accounts per family member, using non-administrative accounts for day-to-day activities. Disable the guest account (Control Panel> Administrative Tools> Computer Management> Users). Raise awareness about information security to children. Medium businesses A fairly strong  firewall  or  Unified Threat Management  System Strong  Antivirus software  and Internet Security Software. For  authentication, use strong passwords and change it on a bi-weekly/monthly basis. When using a wireless connection, use a robust password. Raise awareness about  physical security  to employees. Use an optional  network analyzer  or network monitor. An enlightened administrator or manager. Large businesses A strong  firewall  and  proxy  to keep unwanted people out. A strong  Antivirus software  package and Internet Security Software package. For  authentication, use strong passwords and change it on a weekly/bi-weekly basis. When using a wireless connection, use a robust password. Exercise  physical security  precautions to employees. Prepare a  network analyzer  or network monitor and use it when needed. Implement  physical security  management like  closed circuit television  for entry areas and restricted zones. Security fencing  to mark the companys perimeter. Fire extinguishers  for fire-sensitive areas like server rooms and security rooms. Security guards  can help to maximize security. School An adjustable  firewall  and  proxy  to allow authorized users access from the outside/inside. Strong  Antivirus software  and Internet Security Software packages. Wireless connections that lead to  firewalls. Childrens Internet Protection Act  compliance. Supervision of network to guarantee updates and changes based on popular site usage. Constant supervision by teachers, librarians, and administrators to guarantee protection against attacks by both  internet  and  sneaker net  sources. security via firewall Large government A strong  firewall  and  proxy  to keep unwanted people out. Strong  Antivirus software  and Internet Security Software suites. Strong  encryption. White list authorized wireless connection, block all else. All network hardware is in secure zones. All hosts should be on a private network that is invisible from the outside. Put web servers in a  DMZ, or a firewall from the outside and from the inside. Security fencing  to mark perimeter and set wireless range to this. 4.1.3 Service and Technology Growth in India As India emerging as one of the major IT leaders of the world, more and more IT companies are establishing in the present scenario. With the increase in IT companies more competition will arise in the market, as a result there will be increase in business politics and hence everybody will try to win this race of competition in the market. Thus there is high risk of hackers intruding into company database and taking away vital information and selling them to rival company. So here the importance of Network Security arises. As a result more and more number of Network Monitoring and management systems is being developed. On a detailed research it has been found that the number of cases of cyber crime is increasing every year. With practical guidance  delivered by expert speakers  an organization named as e-Crime  India is the premier networking and knowledge initiative for security, IT, fraud, investigations, CERT, audit, forensics, and compliance professionals who are responsible for  protecting against existing attacks and emerging threats.   Major IT companies in India like the Infosys, TCS, and Wipro etc. are having separate department to develop software related to network security. Hence one can say the importance of developing such a system because this type of software is ever- demanding with the increase and development of technology. 4.2 Information and Resources Networks Networking Concepts Computer Networks and Internets with Internet Applications, 4th International Edition, Douglas E Comer, Ralph E. Droms, ISN:013123627X, Publisher: Prentice Hall, Copyright: 2004 Behrouz Forozuan, (2004) Introduction to Data Communication Networking, 3rd Edition, McGraw-Hill Tanenbaum, Andrew S. (2003) Computer Networks, 4th Edition, Prentice Hall Stallings, William (2006) Data and Computer Communications, 7th Edition, Prentice Hall Books Leslie Ann Robertson, 2003, Simple Program Design, 2nd Edition , Boyd and Fraser Shelly, G.B., Cashman, T.J. Rosenblatt, H.J. (2005) System Analysis and Design, 5th or 6th Edition, Course Technology OConnell, F. (2001) How to Run Successful Projects III: The Silver Bullet. Addison Wesley, ISBN: 0201748061 CCTA (2002) Managing Successful Projects with PRINCE2. The Stationary Office Books, Cleland, D. (2001) A Guide to the Project Management Body of Knowledge 2000. PMI. ISBN: 0113308914 White Paper and Journal Parnas, David,  A rational design process and how to fake it (PDF)  An influential paper which criticises the idea that software production can occur in perfectly discrete phases. Royce, Winston (1970),  Managing the Development of Large Software Systems,  Proceedings of IEEE WESCON  26  (August): 1-9 Web Site www.onestoptesting.com/sdlc-models/waterfall-model/ http://www.freelancer.com/projects/by-tag/projects-socket-programming-based-multi-client-server-architecture.html

Sunday, January 19, 2020

Experiencing Different Cultures Essays -- Personal Essays Papers

Experiencing Different Cultures Discussing different cultures with people of another country can help give you an idea of how different America is from other places. Sometimes Americans only think about America and not how other countries do things. Talking to someone of another country gave me more respect for them. You learn how different they live and it makes you appreciate their way of living. I spoke with a person I work with. He grew up in Mexico with his two brothers and his parents. He and his family moved to Ohio when he was fifteen, about eight years ago. He told me the biggest difference in the cultures was that his family lived a lower class life in Mexico. His parents had jobs, but they did not make enough to have a great life. The reason they came to the United States was for better job opportunities. "Coming to the U.S. let us live a better life." He told me that he is not rich, because he moved to the United States, but he lives a middle class life. He had never experienced a life like this before. He experienced culture shock when moving from Mexico to the U.S, because he did not speak English. He had begun high school not knowing any English. It took him several years to know the English language decently. It was still hard to have a conversation with him; I had to listen very carefully to understand everything. Discussing these thoughts with my group members helped me learn about new cultures and helped them out as well. One of the ladies in my group spoke about herself, because she was from Puerto Rico. She had a lot to say about the cultures. She also experienced culture shock due to the climate and the individualistic life in America. She said that the weather in Puerto Rico was tropical and i... ...I quit. I decided that people ask that question just to be nice and for a proper greeting. It is not a question to be truthfully answered. Imagine if everyone did that, we would not get anything done in our day. The experiences gained from each of these exercises helped me to have a better sociological view on things. I felt as if I experienced many cultures in just one exercise. I noticed that America's culture, values, and beliefs are not like any other. We live a totally different lifestyle than most people all over the world. I also noticed that American society does not make time to listen to one another. We ask questions to be polite, but not to listen. Overall, both of these exercises help me to understand cultures, one was not American culture and the other was. It was interesting to see if they related to each other at all, but I found that they did not.

Saturday, January 11, 2020

Grievance Redressal System Essay

Broadly, a grievance can be defined as any discontent of dissatisfaction with any aspect of the organization. It can be real or imaginary, legitimate or ridiculous, rated or unvoiced, written or oral, it must be however, find expression in some form of the other. Discontent or dissatisfaction is not a grievance. They initially find expression in the form of a complaint. When a complaint remains unattended to and the employee concerned feels a sense of lack of justice and fair play, the dissatisfaction grows and assumes the status of grievance. Usually grievance relate to problems of interpretation of perceived non-fulfilment of one’s expectation from the organization. Aggrieved employees usually manifest defiant behaviour. The grievance procedure can be divided into two parts:- †¢ A formal grievance redressal process and †¢ An informal process of grievance handling All the employees of the Corporation fall under the broad purview of the grievance redressal system. Handling grievances There are three formal stages in which any grievance can be redressed. Each stage has a ‘form’ which is numbered according to whichever stage it belongs to. A grievance can be of any type ranging from problems regarding promotion to discharge and dismissal, and suspension but it is mandatory that the grievance should be work related and not personal. It is required that the grievance must fall under the following category to be considered one: 1. Amenities 2. Compensation 3. Conditions of work 4. Continuity of service 5. Disciplinary action . Fines 7. Leave 8. Medical benefits 9. Nature of job 10. Payments 11. Promotions 12. Safety environment 13. Super Annuation 14. Supersession 15. Transfers 16. Victimisation The list is indicative and not comprehensive. The apparent because or sources of grievances may always be the real ones. There is need for deeper analysis of the policies, procedures, practices, structures and personality dynamics in the organization to arrive at the real causes of grievances. Grievances stem from management policies and practices, particularly when they lack consistency, fair play and the desired level of flexibility. Grievances also may arise because of intra-personal problems of individual employees and union practices aimed at reinforcing and consolidating their bargaining, strength. The absence of proper two-way flow of communication can indeed be a fertile ground for breeding grievances. Individual or Collective (Group) Grievances The International Labour Organisation (ILO) defines a grievance as a complaint of one or more workers with respect to wages and allowances, conditions of work and interpretation of service, condition covering such areas as overtime, leave, transfer, promotion, seniority, job assignment and termination of service. The National Commission on Labour observed that â€Å"complaints† affecting one or more individual workers in respect of their wage payments, overtime, leave, transfer, promotion seniority, work assignment and discharge would constitute grievances. It is important to make a distinction between individual grievances and group grievances. If the issue involved relate to one or a few individual employees, it needs to be handled through a grievance procedure, but when general issues with policy implications and wider interest are involved they become the subject matter for collective bargaining. Reasons for grievances Grievances occur for a variety of reasons: Economic Wage fixation, wage computation, overtime, bonus Employees feel they are getting less than what they ought to get Working Environment Poor working conditions, defective equipment and machinery, tools, materials. Supervision Disposition of the boss towards the employee perceived notions of favoritism, nepotism, bias etc. Work Group Strained relations or incompatibility with peers. Feeling of neglect, obstruction and victimisation. Work Organisation Rigid and unfair rules, too much less work responsibility, lack of recognition. Effects of Grievances Grievances can have several effects which are essentially adverse and counterproductive to organizational purposes. The adverse effects include: a. Loss of interest in work and consequent lack of moral and commitment b. Poor quality of production c. Low productivity d. Increase in wastage and costs e. Increase in employee turnover f. Increase in the incidence of accidents g. Indiscipline h. Unrest, etc. Do’s and Don’ts in Grievance Handling – Check Lists All the points are not applicable to every case, but if the supervisor is familiar with all of them and observe them in his handling of grievances, he will be prepared for almost any kind of case that may arise.