Saturday, December 28, 2019
Friday, December 20, 2019
Are Kids at a Disadvantage Growing Up in a Household with...
Itââ¬â¢s a controversial topic that has been discussed, studied and even fought over for many years now. It is a subject that raises many questions with lots of ideas and opinions about it. It is a topic that if you do not carefully read the resources and studies that have been done on it, you may be fooled by the results. The following subject is an ethical dilemma that I chose to write about because I am truly interested in the actual facts, statistics and lives of people that are living through it. Through this paper, I hope to learn more about this topic, and base my opinion with unbiased research findings and facts. Are kids at a disadvantage growing up in a household with same sex parents? Do they grow up developmentally delayed, psychosocially impaired, or morally confused? Is the traditional one mother, one father custom the best way to raise our children and does the role of each parent, mother and father, truly have an impact on the way the child holistically is risen to become. These are all questions that most homosexual couples, orphanage/adoption centers, surrogate mothers, egg donors, social workers, and the general lay people think of. It is quite normal for the general public to have concerns about homosexual couples adapting or having children for it was not till recently till that United States and other countries started excepting homosexual couples as the norm. A plethora of studies and research projects have been and are continuing to be conducted by aShow MoreRelatedThe Problem Of Single Parent Household1307 Words à |à 6 PagesAs this crisis of single parent household conti nues children that are place within BBBSA program are benefited because they receive social support that is able to help them understand gender roles and perform better in school. Amato says that, children in single parent homes are having to deal with the actual effects [single parent households] because they will get less financial support, affection, information, direction, observation, and less role modeling from an adult (Hippmann-West, 2001, pRead MoreSame Sex Marriage Should Be Legal1997 Words à |à 8 PagesMarriage, by definition, is the legally or formally recognized union of a man and a Woman (or, in some jurisdictions, two people of the same sex) as partners in a relationship. In some cases, marriage between two people of the same sex is more commonly known as gay marriage. Here in the United States of America, it is believed that every citizen should have inalienable rights, yet LGBTQ communities are constantly denied of their human rights as an American. Due to their sexual orientation, they areRead MoreSex, Gender, And Gender869 Words à |à 4 Pages Growing up, I always believed that there was not a difference between a personââ¬â¢s sex and gender. Before learning about sex and gender throughout my school career, I would have defined sex as a category in which you are born into based on what reproductive organ you are born with, which is slightly correct. Yet, I would have defined gender in the same manner, using them interchangeably just as most people, not knowing how complicated the terms really are. The appropriate definition of sex referredRead MoreFamily And Communication : The Positive Effects Of Family Communication931 Words à |à 4 Pageskey components to why we act and speak the way we do now. Family communication can have a positive and negative impact on peopleââ¬â¢s lives depending on how he or she has been spoken to as a child and a growing adolescent. Family Communication can have an effect on people depending on who their head parent or guardian is in their life. Family Communication can even affect our identity as human begins on this earth. Within this essay, I will be addressing how Family and Communication affects our livesRead MoreAgainst Same-Sex-Marriage882 Words à |à 4 PagesAgainst Same-Sex Marriage Marriage is the formal relationship between a man and a woman, usually recognized by the law, by which they become husband and wife. In terms of legal recognition and acknowledgement, the majority of states, authorities, and jurisdiction limit marriage to opposite sex couples or two persons of opposite gender. Same sex marriage would weaken the definition and respect for the institution of marriage. When discussing same sex marriage, the true meaning and definition of marriageRead MoreReflective Essay On Identity1749 Words à |à 7 PagesWho am I? What do I value? Am I simply a submissive puppet that has no voice and must be dictated by society s demands? Or because I am a woman I destined to be physically, mentally, and emotionally weaker than my opposite sex, which means I can never be called an equal to counterparts? In society, we are faced with different forms of designations and descriptions that lead to the establishment of a person s identity. These identities include sexu al orientation, gender, race, ethnicity, economicRead MoreThe Right For Co Adoption1515 Words à |à 7 Pagesfit the norm. Legalizing same-sex adoption is moral because it would help complete a family for a child who doesn t have one and for a couple that wants one of their own. Morality is defined as what is good and bad in who we are as humans. The right for co-adoption has prolonged throughout the years and there have been milestones which changed the course of history for the LGBT community. In 1973 was the first known opinion in a Colorado court involving a transgender parent to have a childââ¬â¢s custodyRead MoreSame Sex Marriage Should Be Illegal1135 Words à |à 5 PagesRight? Homosexual couples believe that their relationships are as equivalent as heterosexual couples, so they should be recognized and granted marriage licenses. I see gay marriage as a plague that only brings unpleasant consequences to society. Same sex marriage should be illegal because it alters the definition and the purpose of marriage, has negative effects on children, and is incompatible with sacred texts. According to Genesis chapter 1, the definition of marriage is the intimate union andRead MoreAdvantages and Disadvantages of Growing Up in a Nuclear Family4118 Words à |à 17 PagesA Nuclear Family o A nuclear family is two parents of opposite sex and their children. A nuclear family, named from the idea of it being the family at the nucleus of other family groups, consists of a father, mother and any number of their children. It is defined by blood relation of the parents and children and the marriage of the parents. Because this term does not include other variations of family units, it is becoming antiquated as it is more common to see families that do not fit intoRead MoreCare in Families Essay1444 Words à |à 6 Pagesamp; Lund, 2011). Furthermore mining industries for most of the twentieth century gave men eleven month contracts where they were housed in single- sex compounds and only given four weeks a year to spend with their families this gave very little time for men to spend time with their children and the system led to the opportunity for extra- marital sex which resulted in the further disruption of families and mothers being forced to be the primary caregiver (Budlender amp; Lund, 2011).Statistics South
Thursday, December 12, 2019
Security Concerns and Policy Enforcement Patrician LLC
Question: Describe about the Security Concerns and Policy Enforcement for Patrician LLC. Answer: Scenario: Patrician LLC is working on developing wireless transmission technology. Now the company wants to transfer headquarter and operational unit to Tucson, Arizona and wants to shift in the new building in Cheyenne, Wyoming. The research and development department of Patrician LLC is working on secure microburst technology. The team members are not living in the Cheyenne, Wyoming. The company is located in two buildings of three floors. The design of the network connection has to be created to maintain the proper connection of 32 mbps throughput between the two buildings. The data-centre should be placed on the third floor in the connection of 100 computers. The company is divided into four major sub-divisions which are named as headquarters or administration, sales or customer support, research and development, and information technology. The members of the research and development who are not residing in the city can also be able to connect to the primary data centre. The network design should take file server, external sales server, corporate web servers, database web servers should be taken into consideration. In this paper, we will recommend the solution to convert the system into wireless a. Topology of the network: Topology of the VPN setup: Hardware Support for the network: Transmission Media: Twisted pair cable and fiber optic cable is used for network connection Repeaters: Repeaters works by receiving the electronic signals. The next step is to clean the signal and retransmit the signal to the higher level. Hub: The multiple devices in the network are connected by using the Hub with the help of the cable. Switches: Different devices are connected to switch by using the ports. Bridges: Bridges divide the network into parts to manage the traffic which helps in controlling the congestion. Routers: The communication device which is used to connect two different networks is known as Routers. The routers work by distributing the incoming data to its destination. Wireless routers are used for providing: wireless connection. Gateway: The interface which uses different protocols to connect the network is known as gateway. Modem: The modulation and demodulation of the signal is carried out by Modem. a. Cabling Details: The medium is required for communication between devices. The medium is classified as metallic wires within cables, fiber optic cable, and wireless transmission. The topology diagram gives the detail of cabling where it is needed in the proposed network. Physical Topology: The physical topology diagram gives the clear perspective view of the physical location of the ports, intermediary devices, and installation of the cable. The actual cabling and transmission of data is represented though the physical topology. It represents the physical layout of the network. Logical Topology: The logical topology gives the detail view of devices, IP address scheme and ports. Logical topology gives the detail view of communication between the devices placed on the computer network. This topology also comprised of the network protocols which gives the clear perspective view of movement or flow of the data. Type of Connection for 32 Mbps connection Wired local area network is completely replaced by the wireless technology. The wireless radio frequency communication helps in connecting the research and development department of Patrician LLC with headquarter for exchanging relevant information. For the success of the project, the reliability should be maintained main database of the office. Wireless sensor technologies are should be applied within the firm to provide reliable connection with the main stream of the organization of Patrician LLC. The Proposed solution is based on the principles of outdoor wireless networking technologies. It helps in providing links to the research department members with the primary data centre of the organization which is located in Cheyenne, Wyoming. It helps in providing the 32 mbps of the throughput and the data can be exchanged faster between the nodes. The staff of the main office can share resources among themselves. It is better than the traditional network because it provide connectivity with the members who are sited at a distance from the main office. For providing connection between two buildings which are 1000 miles apart involves the placement of bridges, access point, routers, and integrated directional antennas. Wiring Closet The main office and the research and development department are connected wirelessly. The implementation of the wireless networking involves the placement of bridges, access point, routers, and integrated directional antennas. Every nodes should have relevant distance between them With the help of signal strength detector, the optimal position of the wireless devices can be measured. The placement of the robotic cameras which have the capability of TCP/IP should be placed on the top of wireless devices to align the direction of the antennas. The equipments which are needed to connect the two buildings are Alarm system, Ethernet router, patch panels, and wireless access points. These equipments are placed at the top of the building. There will be one wiring closet on each floor of the building. Wireless Technologies: The proposed solution to Patrician LLC problem of converting the system into wireless technology is IEEE wireless radio frequency communication standard. It provides communication between the nodes even if they are widely spread. The signal can be forwarded in multiples of time to provide similar information to every site. Every node is capable of sending and receiving signals. This solution helps in overcoming the physical constraints which comes in the exchanging of message over the network. VPN Setup for the servers: Remote access VPN: This helps in connecting user with the corporate private network. The encrypted connections are maintained between the users and the private network. Intranet VPN: The connection between the branch offices can be implemented by intranet VPN. This makes possible LAN to LAN connection into single network. Extranet VPN: This will provide connection between research and development department with the primary data centre. Logical security Measures: Internet Protocol Security: IPSec helps in securing the transfer of information between the layers of OSI. It provides the facility of authentication, integrity of data, and encryption services for modifying the data. Authentication header and encapsulated security payload are the part of the security mechanism of IPSec. The purpose of the authentication header protocol is to provide authentication of the source and IP packet integrity. The header of the authentication header protocol contains the information such as hash value of the data and sequence number. Encapsulated security payloads provide confidentiality to data, data privacy, authentication to the source and communication between the peers. Symmetric encryption algorithms are used for providing data privacy in encapsulated security payload. Point to point tunneling protocol: It is used by the remote user to access the virtual private network of the organization. The PPP session is maintained by using the non TCP/IP protocol. The PPTP uses protocols named as extensible authentication protocol, Handshake authentication protocol, password authentication protocol, and point to point encryption protocol. Layer 2 tunneling protocol: L2TP is used for encapsulating the point to point protocol. It is used for sending of the frame over the network. By using this protocol, one tunnel is capable of multiple connections. Security measures to stop attackers: Hackers keep an eye on the client machine to take the control of the machine. The Man in the middle is focused on changing the information sent between the communicating devices. The firewalls should be used to strengthen the VPN connection. The intrusion detection and prevention system should be recommended to increase the efficiency of monitoring the system. Installation and updating of anti-virus should be done periodically. Without authentication VPN connection should not be established. Digital certification support should be provided for authentication into virtual private network. Transport layer security and secure socket layer are the cryptographic protocols which are used for providing security to the communication and data transfer on the internet. For ensuring the security to the transmission of data, Leak detection and prevention, information leak prevention, and content monitoring and filtering are used. The attack of virus can be stopped by installing the antivirus pro gram on each computer system, use of firewalls, isolation from the affected drives, scanning of the system regularly, and updating of the virus definition. Penetration testing can be used to find the vulnerabilities. It should be used regularly for internal and external audits. Physical Security VPN hub and Spoke topology: In this topology VPN routers are known as spokes which communicate securely with the primary data centre of the organization. A secured tunnel is maintained between spoke and the hub. In the case study of patrician LLC, the four departments are connected to the primary data centre so the VPN tunnel should be maintained between the departments and the data centre. By using this topology, the staff member can access the primary data center of the main office. VPN Mesh topology: The communication can be securely carried out by using the VPN router among the different nodes. The signal can be forwarded in multiples of time to provide similar information to every site. The VPN mesh topology is relevant for connecting four different departments of the organization. The company is divided into four major sub-divisions which are named as headquarters or administration, sales or customer support, research and development, and information technology. Three VPN tunnels will be used for securing the communication between different sites. Direct transmission of the data can takes place between any two communication sites. Connection of Remote user: Access Point: The device which is used to link the wired LAN with wireless network is known as Access point. PC card: The laptop user can connect to the wireless network by making use of PC card. PCI adapter: The desktop user can connect to the wireless network by making use of PCI adapter. It provides communication between the nodes even if they are widely spread. The signal can be forwarded in multiples of time to provide similar information to every site. Every node is capable of sending and receiving signals. Verification of the security measures: In the initial phase, the compatibility of the resources is checked in the wired or wireless network. The next phase focuses on the limit of the equipments with respect to the distance and time. The final phase works in testing the bandwidth in different climatic condition. Justification: Virtual Private Network is the secure mechanism for connectivity between different LANs and remote users. IPSec and PPTP protocols are used for securing the network. This paper focus on the secured communication which takes place between different departments of Patrician LLC and remote site which is named research and development department. The connection between the branch offices can be implemented by intranet VPN. This makes possible LAN to LAN connection into single network. The communication can be securely carried out by using the VPN router among the different nodes. The signal can be forwarded in multiples of time to provide similar information to every site. The wireless transmission technology provides flexibility to the networking of the nodes. The result of the proposed solution helps in monitoring the traffic over the network, security, reduction in the interference, and integration of the data. The proposed solution to Patrician LLC problem of converting the system in to wireless technology is IEEE wireless radio frequency communication standard. It provides communication between the nodes even if they are widely spread. References: Stines, M. (2014). Remote Access VPN - Security Concerns and Policy Enforcement (1st ed.). Retrieved from https://www.sans.org/reading-room/whitepapers/vpns/remote-access-vpn-security-concerns-policy-enforcement-881 Michael, A. (2013). Connecting Remote Offices by Setting Up VPN Tunnels (1st ed.). Retrieved from https://www.cisco.com/c/dam/en/us/td/docs/routers/csbr/app_notes/rv0xx_g2gvpn_an_OL-26286.pdf Cader, Y. (2008). VPN SECURITY (1st ed.). Retrieved from https://www.infosec.gov.hk/english/technical/files/vpn.pdf Brilakis, I. (2007). Long distance wireless networking for site office data communication (1st ed.). Retrieved from https://www.itcon.org/data/works/att/2007_9.content.07653.pdf Singh, A. (2014). Research Issues a nd Challenges of Wireless Networks A (1st ed.). Retrieved from https://www.ijarcsse.com/docs/papers/Volume_4/2_February2014/V4I2-0175.pdf Abhinaya, V. (2014). Case Study on Comparison o f Wireless Technologies in Industrial Applications (1st ed.). Retrieved from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.9307rep=rep1type=pdf Shourbaji, I. (2012). An Overview of Wireless Local Area Networks (1st ed.). Retrieved from https://arxiv.org/ftp/arxiv/papers/1303/1303.1882.pdf Bisht, N. (2015). Analytical study of different network topologies (1st ed.). Retrieved from https://www.irjet.net/archives/V2/i1/Irjet-v2i120.pdf
Wednesday, December 4, 2019
Ethical Dilemma for Damages Dispute- Free Samples to Students
Question: Discuss about theEthical Dilemmafor Apple Patent Damages Dispute. Answer: Introduction Ethical problem is defined as one situation that requires a specific alternative choice or second option for resolving any issues as the first option or process in not capable of resolving the issue and functional measure. In contrast with this fact, this essay is elaborating about the Supreme Court sides with Samsung in Apple patent damages dispute (Balakrishnan, 2017). This assignment is considering the elaboration about significant justification of the case study about selected article with respect to four classical ethical theories such as utilitarianism, deontology, virtue and contract. Discussion Description about the Incident The scenario of the selected case study is reflecting about the following aspect Supreme Court sides with Samsung in Apple patent damages dispute. The study of the case study reveals that the Supreme Court of U.S. victimized Samsung as it was highlighted that they have copied some functionalities from Apple (Balakrishnan, 2017). In accordance with this fact, Apple charged Samsung in the year of 2011 for copying different features of their applications (such as the grid of application icons). Henceforth, two lower courts ruled on about this violation of designing patterns of Samsung from designing standards of Apple. For this incident Samsung had to pay $399 million. In addition to this, this amount was around the amount earned by Samsung for 11 smart phones (Balakrishnan, 2017). In addition to this, this is also identified that the penalty charged to Samsung was according to specific Federal Law that stated that a group that copies patented designing standards to their own products t hen they are entirely liable for the entire profit earned by the organization. Figure 1: Relational Diagram (Source: Created by author) Henceforth, in accordance with this penalty, Samsung came across this fact that the amount they charged for was absolutely inappropriate for their doing. Additionally this aspect is also identified that South Korean Giant also supported this statement of Samsung they ended up with this fact that Apple is not entirely responsible for total profit which gained for copying the designs from Apple (Balakrishnan, 2017). According to the case study of Samsung and Apple it is identified that justice sent the concerned case to the lower court for rest of the proceedings. In contrast with these facts, this is identified that the question that was raised was about the net amount that Samsung needed to pay for copying the designs from Apple on their own products. in contrary with these facts, Apple confessed this fact with CNBC that they will continue for protecting their hard work on their products throughout several years (Balakrishnan, 2017). Utilitarianism Utilitarianism ethical theory refers to the functional aspect that any incident should be measured with respect to their utility and functionalities. Samsung has copied the functional design that has made by Apple for gaining higher competitive advantages over their target market. This aspect was considered wrong according to the approach of Utilitarianism ethical theory. Therefore, justification is made by penalizing Samsung with $399 million (Balakrishnan, 2017). Therefore, this can be stated that the Utilitarianism ethical theory evaluates the effective elements and standards that are highlighted within the case study about Samsung and Apple. Deontology Deontological ethical theory states that the moral values should be put for highest priority in any decision making process (Shaikh, 2015). In contrast with these facts, from the case scenario, it is identified that the moral values are not placed at higher priorities from the end of Samsung as they have copied the designing patterns from Apple and gain profit as per their product name. Therefore, from the point of view of deontological concept the Supreme Court has made justification with the penalization processes. Virtue This ethical theory focus on the fact, which the character, individual or organizations are emphasized for their wrong measures taken into consideration and these characters are taken as one critical element for ethical thinking processes (Murakami et al., 2017). In contrast with this theory this is highlighted that the key element of ethical thinking was about the penalization process done on Samsung for their wrong measures taken against Apple and they have copied their designing patterns for their own products. The Federal law has taken into account for managing this wrong measure. Contract This ethical theory is all about the legitimate standards that are provided by any authority or government of any country for checking the originality of any event or incidents (Feltman, 2015). According to the case study and concern of this ethical theory the lower court penalized Samsung for their wrong doing. According to this theory the higher court and lower court both have signified the wrong measure taken by Samsung and that has penalized for their doing. Recommendations Following are the considered recommendations for resolving the ethical dilemma considered within the concerned case study: Establishment of the policies: Government should be publishing rules against the unethical aspects that are adopted by organizations in order to gain competitive advantages. Training standards: Training standards resulted into the protected values and measures within organizations. Conclusion This can be concluded that the Samsung was ruled and penalized for their copying act from patent designs from the Apples iPhone. In contrast with these facts, these actions were taken by the Supreme Court was completely ethical as copying the patented designs were not ethically correct. In addition to this, the lower court ruled on Samsung and penalized them with the amount $399 million. In contrast with this functional measure it was recognized by Samsung that this decision for penalization was inappropriate for Samsung. In addition to these facts, this can also be concluded that this essay is providing significant development of recommendations in order to resolve issues involved within the concerned ethical issue. References Ale Ebrahim, N. (2014). Citation Frequency and Ethical Issue. Altmann, J. (2013). Arms control for armed uninhabited vehicles: an ethical issue.Ethics and Information Technology,15(2), 137-152. Balakrishnan, A. (2017).Supreme Court sides with Samsung in Apple patent damages dispute.CNBC. Retrieved 5 January 2017, from https://www.cnbc.com/2016/12/06/supreme-court-rules-for-samsung-in-apple-patent-case.html Feltman, D. M. (2015). Re: delivery room research: when does poor quality evidence become an ethical issue?.Pediatrics,135(5), e1368-e1369. Hollingworth, D., Valentine, S. (2015). The moderating effect of perceived organizational ethical context on employees ethical issue recognition and ethical judgments.Journal of Business Ethics,128(2), 457-466. Margulis, A., Boeck, H., Durif, F. (2015, September). The Government-Firm-Society Triad in Ubiquitous Computing: Ethical Issue or Harmonious Chorale? The Case of RFID Technology. InCSR COMMUNICATION CONFERENCE 2015(p. 133). Murakami, K., Sakurai, Y., Shiino, M., Funao, N., Nishimura, A., Asaka, M. (2017). Reply to the letter by Dr Graham concerning ethical and interpretation issues with vonoprazan-containing H. pylori eradication therapy.Gut,66(2), 386-386. Shaikh, A. G. (2015). Emerging Trend of Surrogacy: Legal and Ethical Issue.
Subscribe to:
Posts (Atom)