Monday, December 30, 2019

Only a belief in embodied existence after death is...

‘Only a belief in embodied existence after death is philosophically justifiable.’ Discuss. Disagree- There is disembodied existence: Plato, Descartes, Christianity Key points: Embodied existence Life after death Philosophically justifiable Criticisms of embodied existence after death: 2- Long tradition of belief in disembodied existence- Plato believed we have immortal souls that leave body at death. 4- Theory of the Atman- Hinduism 6- ‘My essence consists solely in the fact that I am a thinking thing†¦Ã¢â‚¬â„¢- Descartes Support for embodied existence: 1- Christian belief in resurrection- outline Jesus’ resurrection after death- Link to hicks idea of the replica. 3- The only meaningful way to talk about survival after death is to say that†¦show more content†¦Geach described the idea of a separate soul and body as a ‘savage superstition’ and he believed that the genius of Plato and Descartes had given the superstition an undeservedly long lease of life. Geach, along with many other modern philosophers argue that the idea of a separate body and soul has come from misunderstanding of scriptural language. In his book, ‘What do we think with’, Geach wrote ‘thinking is a vital activity of a man, not any part of him, material or immaterial.’ This shows quite clearly Geach believed that a human is a single entity which needs to think, rather than a body and a separate mind which just happens to have consciousness. Geach believed that the only reasonable theory of the soul was the Aristotelian idea that the soul is the form of a living body. Many would say that Geach’s argument is fairly week as there is little evidence to back it up and he seems to be ‘piggy-backing’ off other philosophers, namely; Aristotle. Reincarnation, or rebirth (afterlife in a physical form),are a key feature at the heart of Hindu beliefs. Hinduism teaches that every person has an essential ‘self’ known as an atman. They believe the Atman to be eternal and something which seeks to be united with God. Hindu’s believe that God manifests himselfShow MoreRelatedOrganisational Theory230255 Words   |  922 Pagesauthors have brought their wealth of experience and understanding and provided the field with an imaginative resource to address the dynamics between theory and practice. Dr Susanne Tietze, Bradford University, UK The key to success for managers is not only to be result oriented but also to be wise in their decision making. This requires that they have a deeper than superficial understanding of management and organization issues. McAuley et al. helps student and managers understand organizational performance

Sunday, December 22, 2019

Definitions of Tourism and Tourists - 1593 Words

According to Smith (1988), an author of a specialist dictionary on tourism, the word ‘tourist’ was introduced in 1800 and the word ‘tourism’ in 1811. However, what exactly is ‘tourism’? Who are ‘tourists’? Researchers and practitioners have produced many definitions for both ‘tourist’ and ‘tourism’ but no definition of either term has become extensively recognised regardless of the fact that both terms have now been part of the English language for over two centuries. As indicated by Smith (1988), he suggests that there â€Å"probably never will be a single definition of tourism† or tourists as economists, psychologists and geographers perceive different things about tourism in their own professional field (Smith 1988 as cited in Leiper†¦show more content†¦Given examples of McIntosh and Goeldner’s economic and Hunziker and Krapf’s holistic definitions of tourism, Stear (2005) developed his own definition as he particularly focuses on a set of specific activities: â€Å"Tourism is travel and temporary stay involving at least one night away from the region of a person’s usual home that is undertaken with the major expectation of satisfying leisure needs that are perceived as being at places outside of, and qualitatively different to, the home region.† This definition specifies tourism as a particular set of activities and some of its key features including the relationship between the tourist and the tourist attraction or icon. One of its advantages is that it distinguishes tourism from social and economic activities, such as commuting, to work or university each day, migrating which obviously has no resemblance with â€Å"satisfying leisure needs†. However, Stear’s definition of tourism contradicts with McIntosh and Goeldner’s economic definition as Stear’s concept limits tourism to satisfying activities and is no t concerned with the tourists’ expenditure. After discussing tourism, the focus now shifts to tourists. Likewise, the term ‘tourists’ has no universally known definition. Every professional field has its own definitions for specific purposes. As Stear (2005) identifies tourism inShow MoreRelatedStears Definition of Tourism948 Words   |  4 Pagesuncommitted time for its gratification. In Stear’s definition of tourism it states that for tourism is undertaken with the major expectation of satisfying leisure needs. The definition from the World Tourism Organization outlines that motives for such travel maybe (1) leisure (recreational, holidays, health, studies, religion, sports); (2) business, family, mission and meeting, from this definition it is evident that there are various travel purposes of a tourist, these include; Leisure and recreation, businessRead MoreTourism Definitions Essay960 Words   |  4 PagesThe Framework of Tourism: Towards a Definition of Tourism, Tourist, and the Tourist Industry ( Leiper, 1979) Find six academic definitions for tourism, tourist or travel. Discuss each of these six definitions and explain the merits and efficiencies of each one, making connections with the points raised by Leiper (1979) where possible. Then provide an overall discussion about which definition is best and for what reason/s. Introduction Six definitions for the term Tourism were found from a varietyRead More The Economic Effects Tourism Has on New Zealand Essay1407 Words   |  6 PagesThe Economic Effects Tourism Has on New Zealand The following report provides an accurate and informative overview of the nature of tourism, its history and growth, the structure of the New Zealand industry and the impact of tourism from a New Zealand perspective. The report will draw a conclusion which Highlights area of consideration in tourism planning. Conclusion and Recommendations For New Zealand tourism has a lot to offer but at the same time, care has to be taken not to mistreatRead MoreTourism in New Zealand1430 Words   |  6 PagesTourism In New Zealand Executive Summary The following report provides an accurate and informative overview of the nature of tourism, its history and growth, the structure of the New Zealand industry and the impact of tourism from a New Zealand perspective. The report will draw a conclusion which Highlights area of consideration in tourism planning. Conclusion and Recommendations For New Zealand tourism has a lot to offer but at the same time, care has to be taken not to mistreatRead MoreDiscuss the Contention That Sustainable Tourism Is, Perhaps, an Impossible Dream.1713 Words   |  7 PagesDiscuss the contention that sustainable tourism is, perhaps, an impossible dream. The definition of sustainable tourism is much debated. However, a suitable meaning can be inferred from the broadly used definition of sustainable development, an economic process to which sustainable tourism is intrinsically linked. Sustainable tourism would be that which ‘meets our needs today, without compromising the ability of people in the future to meet their needs’ (Swarbrooke, 1999, p. 3). These needs wouldRead MoreEconomic and Social Impact of Tourism in the Case of Tourist Destinations in Carrying Capacity Issues645 Words   |  3 Pagespublications (books, reports) related to a variety of issues, including tourism management, environmental, economic and social impacts of tourism in the case of tourist destinations in carrying capacity issues. The subordinate topics of Tourism Carrying Capacity during Kadayawan 2013 in Davao City are: a.) Physical-ecological; b.) Socio-demographic; c.) Political-Economic. Tourism carrying capacity Markusen (1999) defined tourism as a slippery and fuzzy concept. It is quite complex to be defined perfectlyRead MoreTour1000653 Words   |  3 PagesTOUR1000, 2015 TOURISM PRINCIPLES AND PRACTICES EXAM REVISION 2015 Exam Structure Section A: Multiple Choice Questions (15 marks) – answer all questions (worth 1 mark each). Section B: Short Answer Questions (25 marks) - select and answer five questions (worth 5 marks each). 2015 Revision Questions Students should use the following questions to guide their study of the course material. Staff will not discuss these questions with students. The questions are based on lectures, weekly readingsRead MoreThe Inability to Define Cultural Heritage Tourism668 Words   |  3 Pagesï » ¿Among the peculiar cultural trends to crop up during the last few decades, cultural or heritage tourism is perhaps the most socially significant and the most difficult to define. Several factors influence the fluctuating meaning of the catchall term heritage tourism, including the rather haphazard classification of things and elements as heritage because people are not quite sure exactly what this title covers (Poria, Butler, Airey, 2003), and the increased sensitivity expressed by governmentRead MoreNational Trust For Historic Preservation1537 Words   |  7 PagesHeritage tourism is a growing niche in the tourism industry and it is something that most tourists will engage at. By breaking the term is separated into heritage and tourism, the term heritage is mainly associated with the meaning of the inheritance of som ething that is passed on throughout the ages (Nuryanti, 1996). Tourism can be interpreted as the movement to somewhere to experience a contrast to the current way of living (Miller, 2015). The definition that the National Trust for Historic PreservationRead MoreSustainable Development And Environmental Protection1577 Words   |  7 Pagesseeks to develop means of supporting economic growth while supporting biodiversity , reliving poverty and without using up natural capital in the term at the expense of long term development .While many definition of the term have been introduced over the years, the most commonly cited definition comes from the report Our Common Future ,more commonly known as Brundtland Report which states that sustainable development is development that â€Å"meets the needs of the present without compromising the ability

Saturday, December 14, 2019

Ship Masters Business Free Essays

string(140) " of unseaworthiness the burden of proof of due diligence should be on the carrier or the other person claming exemption under this article\." Introduction As per this scenario own vessel was on a voyage charter,if on a voyage charter the ship owner provides the charter party with details of ship particulars,capacity and Registry. The ship shall proceed with reasonable dispatch.Vessel shall proceed with Reasonable dispatch,after this the owner shall undertake to carry the cargo destination. We will write a custom essay sample on Ship Masters Business or any similar topic only for you Order Now A list of expected perils. The charter agrees to pay freight and provides full cargo,as per voyage charterer if the vessel does not arrives at a certain Port on a certain day ,the cancelling clause gives the charter the full right for cancelling the contract. Own vessel loaded a cargo of high grade steel pipes,On loading some steel appeared to be rusty.None of the concerned parties appointed a surveyor. Own vessel also accepted a letter of indemnity from the seller and signed a clean ‘Bill of Lading’(BOL).A clean BOL means that contains no positive defective condition ,The importance of BOL is it is an evidence of contract and it is a receipt of goods carried. It is the duty of master to check cargo practically as stated in the BOL and if it mets the criteria as stated then he should sign the BOL. By signing a bill of lading without checking the cargo the Master has become to party of fraud,Due to this no claim will be covered by the PI,In this case Master should have signed a CLAUSED BOL.Its a BOL that contains a positive notation of a defective condition of the cargo covered,material ,of its packaging Own Vessel sailed out with faulty Navigational equipment(RADAR)and this fault was aware to the Master and also the company.this showed that the Master of own vessel did not exercise due-deligence to make the vessel sea worthy and sailed out for Sea with faulty navigational equipment,which lead to a collision with the container vessel. Due-diligence means all efforts should be made ,So that the vessel meets all the requirements to make the vessel seaworthy. To meet these requirements the vessel shall be properly manned and should have qualified , competent and well trained staff on Board.Ensure that the vessel can proceed to sea without any harm or danger to the Personnel,Property or Marine environment. Ensure that the vessel carries all the necessary equipment as per SOLAS regulations. Also the Equipment, Cargo,Hatches is well maintained and in good condition.Cargo shall be looked and maintained on board until it is finally discharged.This will ensure that the Master and the company has exercised Due-diligence. The container vessel which had sailed out in a seaworthy condition,this vessel was complying with SOLAS regulations and H-V rules when she sailed out for sea.But a day before the collision the vessel was short manned as 2nd officer was Medically evacuated due to serious injury and rest all officers were working short handed,This lead to short manning which eventually caused fatigue to its officers and thereby breached SOLAS regulationsThis made the container vessel unseaworthy at the time of collision. But the MCA Guidelines (MSN 1778 (M)),allows a vessel to sail for shorter voyage ,if in incase of emergency ,in the case of short manning ,on a condition that the remaining officers on board are not undergoing through stress or fatigue,due to short manning and also the ILO guidelines of work are observed(ILO guideline 174),in this case the owner of the vessel could be had liable ,if apart from breaching SOLAS regulations,the guidelines from MCA has not been followed. Apart from these liabilities ,that has caused by the vessel’s owner due to the breach of statutory regulations and requirements,this incident of collision leads to further liabilities,Own vessel besides the liability incurred by the vessel’s owner due to violation of article 3 of Hague rules to provide proper documentations and a seaworthy Vessel. Due to collision and the vessel being towed to port of refuge,Liability will also be incurred due to the delay caused in delivery of cargo on time.Also the vessel was loaded with high grade steel pipes,since the vessel collided and suffered collision damage on N0 1 Hold,due to water ingress might have also caused damage to the steel pipes.Expenses incurred due to damage to a ship and its cargo. Own vessel suffered damage at forward N o 1H-port side,which resulted in partial flooding.The container vessel suffered minor Hull damage forward and several containers were lost at sea and some were being jettisoned to help the vessel to prevent water ingress.Master’s duty is to do whatever,necessary or reasonable,so that he can save the ship and cargo from any loss or damage.This allows him to Jettison the cargo,so that is prudent and safe continuation of the voyage. Both vessels were towed to port of refuge for emergency dry dock repairs. As per Hague Visby rules â€Å" the carrier is bound, before and at the beginning of the voyage, to exercise due diligence†. Make the ship seaworthy. Properly manned, equipped and supply the ship. After receiving the goods into his charge the master or carrier or agent,on demand of the shipper ,issue to the shipper a Bill of lading[1] CONTRACTUAL OBLIGATIONS OF THE MASTER When there is a collision the MASTER shall follow the following steps:- Inform the company,owners,charterers,PI clubs and Port Authorities . EVIDENCE COLLECTION. Details of both the ships. Deck and Engine log books with entries. All the printouts and graphs from bridge equipments. All the navigational charts before and after collision. All navigational equipment in use at time of collision. Weather conditions at the time of incident. At the time of contact the vessels estimated courses and speed. Communications and signals made a the time of collision. Statements from witnesses after collision. Details of VTS or Port Control if any in operation at the time of incident. Mitigate losses to ship owner. â€Å" The owner should exercise burden of proof relating to the exercise of due diligence as the vsls navigational equipment was faulty which eventually led to a collision with the container vessel. Whenever loss or damage has been resulted on account of unseaworthiness the burden of proof of due diligence should be on the carrier or the other person claming exemption under this article. You read "Ship Masters Business" in category "Essay examples" The onus is cast on the carrier in relation to proof of due diligence, until the other party has established that the vessel was unseaworthy and his loss was due to that fact, alternatively the burden of proof should rest with the carrier who is the only party to have access to the whole fact†[2] A prudent Master should act reasonably as per the regulations to mitigate liabilities. So the vessel’s owners has to protect themselves under Marine Insurance at all times and mitigate liability it is necessary to ensure compliance with statutory regulations and requirements. 2. Salvage: â€Å"As per the scenario the master has two possible choices, salvage options under LOF, or consider a contract of towage ,master should make a risk assessment of the situation in consultation with his senior management team, due to the unreliability of the navigational equipmet ,and damage to the vessel master should not consider moving under his own power, he considered contract of towage or to hire a salvor which would result in 4 to 5 times more then the contract of towage, however a prudent master shall inform his owners that he considers it necessary to engage a salvor, The next decision is to accept which salvor services, as there are large number of salvors offering their services , often advise is taken from the shore back up team including the Average adjusters before salvors are hired .The master has to ensure that a careful logging of all events is required thru out the salvage operation, while enroute to the port of refuge he must discuss plan with owners and manage rs how he will handle the first few hours when alongside and he will need full support of his ship management team†[3] Cargo jettisoned for the safety of vsl will be allowed general average, after collision both vsl proceed to a port of refuge, the expenses of entering leaving such a port shall be allowed as general average, as stated in the York Antwerp rule X. Loss of freight due to cargo damaged or lost or allowed to lost shall be covered under general average. when the damaged cargo is sold at a loss, General average allowed will be the difference between the net proceed of sale net sound value General average General average In simple is a partial loss caused by or directly consequential upon a general average act. The General Average as defined in the MIA 1906 s. 66 and York Antwerp rule 2004 rules â€Å"There is a general average act where an extraordinary sacrifice or expenditure is voluntarily and reasonable made or incurred in time of peril for the purpose of preserving all the property imperilled in the common adventure’’[4]. As per GA act damages incurred are usually divided amongst the owner and the shipper,it will depend on the type of charter as to how the expenses will be divided,the Jettisoning of the cargo shall be equally divided between the owner and the shipper. In the given scenario the vessel had to jettison some containers to assist the vessel to prevent the water ingress for the safety of the ship so this sacrifice was for preserving the property hence eligible for G A. Thus all parties interested in the venture, ship – owner, charterers, and cargo owners etc, will proportionally contribute to ship – owner expenses and for port of refuge for emergency dry dock repairs. These are the main five parts which will show whether that act is classed under the GA or not, in fact GA arises when sacrifices have been made for the safety of the ship against cargo and freight, from some peril of the sea or from its effects. The total of such G A allowances is shared between the various parties who stood to lose each contributing in proportion to his percentage of the total values involved. The purpose of G A is to ensure that the owner of the ship or cargo who has incurred an expenditure or suffered a sacrifice of his cargo in time of peril for the purpose of preserving property receives a contribution to his loss from all those who have benefited from the action, G A acts are allowed under the H M repairs,Expenses incurred due to damage to a ship and its cargo and of taking direct action to prevent further damage to the ship and its cargo is taken as Particular Average. Hull and Machinery Insurance The duration of this insurance is for the maximum period of 12 months.this insurance is covered for the damage by herself caused to the vessel due to marine peril. It is the protection of liabilities’s of :- ? ths collision liability : The underwiter agrees to pay the ? of any sum due to the loss:- Damage caused to the other vessel ,also the loss of property and the general average or salvage of other vessel. General average and salvage:-the adjustment made should be according to the law. The insurance covers loss to the ship caused by following incidents:- O Fire and Explosion O Accident during loading and discharging ,shifting cargo . O Jettisoning of cargo O Piracy O Earthquake /Tsunamis O Peril of the sea,river/lake or any navigable water O Boiler bursting ,defect in machinery,shaft breakage. O Barratry of master/officer/crew. O Contact with land conveyance ,dock or harbour equipment. O Contact with helicopter,aircraft or falling object. In this scenario own vessel has sailed with a faulty Radar ,this proves that the master had not showed due diligence and will not be getting any compensation. PI Insurance Charterrs and ship owners are offered various class of coverage by the PI clubs. PROTECTION COVERS FOLLOWING LIABILITIES:- O Collision O Cargo claims ,crew claims O Oil pollution LIMITATION AND PI COVER:- The PI club has a board of directors who decide how to limit and restrict the cover that is given to the members. The towage of the ship may cover if the member is liable under contract of towage. The club covers the pollution liabilities only to the liability that the pollution is an extent to the escape or discharge of oil or any substance. In this case own vessel had an inoperational radar,The marine insurance contract had been breached,so the insurance company may refuse to pay the amount. Due-diligence shall be maintained at all times so that the insurance policy can cover the cargo and the ship against damages at all times. 3. Master’s actions are very crucial to obtain cover under Insurance policies. A prudent Master shall act reasonably with the codes and regulations ,Compliance with the rules and regulation will also reduce the carrier or owner liabilities regarding salvage, Master assess the situation thoroughly whether to take salvage. The right to salvage can only arise in respect of maritime properties. The terms and conditions on which the salver agrees to salve the property is divided into two basis: O The daily hire basis OThe Lloyds open form (L.O.F) The term salvage applies to Othe service performed by a salvor Othe reward paid to a salvor in respect of his successful services. Since there is no formal contract as to the money which the salvor is due on successful completion of the contract such a method is only employed when the marine environment are in grave danger. â€Å"L.O.F’’ is the most widely used â€Å"no cure – no pay’’ salvage contract, in return for salvage services, the salver receives a proportion of the â€Å"salved value ’’the value of the ship, its cargo and bunkers on board the ship. As per scenario own vessel sufferd severe collision damage on the forward end of the No 1 HOLD-Port side,resulting in partial flooding ,Due to this effect vessel was in grave and imminent danger and threat to environment, in shortest time Master decided to take L.O.F to tow the vessel to port of refuge for emergency dry dock repairs. Own vessel was under Llyods open Form Choosing the L.O.F is a matter of getting the best expertise possible in the shortest time, the Master/ owner have insufficient time to arrange a daily hire contract, their need not be a formal signing of the form, the terms and conditions can be agreed on communication the words ‘’L.O.F 2000’’ clearly being spoken during acceptance. In this incident the container vessel suffers minor hull damage and vessel was not imminent danger and not any threat to marine environment so the Master preferred to organize a daily hire agreement. The daily hire agreement would work out more economical and less complicated compare to the L.O.F.The salvage operation and its remuneration are as per the Lloyd’s rules and regulations whereas the towage contract depends upon the rules and regulation entered by the two signatories i.e. the ship owner and the towing company. The time factor is essential for the Master to make a prudent decision contacting the owner who sought advice from H M and P I club to draw satisfactory action plan. H M and P I, insurance policies covered some losses, however, the Master action are extremely important to obtain cover under the different insurance policies. BIBLIOGRAPHY College notes – shipmasters business by STC Carriage of goods by sea by john F Wilson Shipmasters business companion by Malcolm maclachlan MCA Guidelines-2003 REFERENCES www,google.co.uk www.nortonrose.com Introduction As per this scenario own vessel was on a voyage charter,if on a voyage charter the ship owner provides the charter party with details of ship particulars,capacity and Registry. The ship shall proceed with reasonable dispatch.Vessel shall proceed with Reasonable dispatch,after this the owner shall undertake to carry the cargo destination. A list of expected perils. The charter agrees to pay freight and provides full cargo,as per voyage charterer if the vessel does not arrives at a certain Port on a certain day ,the cancelling clause gives the charter the full right for cancelling the contract. Own vessel loaded a cargo of high grade steel pipes,On loading some steel appeared to be rusty.None of the concerned parties appointed a surveyor. Own vessel also accepted a letter of indemnity from the seller and signed a clean ‘Bill of Lading’(BOL).A clean BOL means that contains no positive defective condition ,The importance of BOL is it is an evidence of contract and it is a receipt of goods carried. It is the duty of master to check cargo practically as stated in the BOL and if it mets the criteria as stated then he should sign the BOL. By signing a bill of lading without checking the cargo the Master has become to party of fraud,Due to this no claim will be covered by the PI,In this case Master should have signed a CLAUSED BOL.Its a BOL that contains a positive notation of a defective condition of the cargo covered,material ,of its packaging Own Vessel sailed out with faulty Navigational equipment(RADAR)and this fault was aware to the Master and also the company.this showed that the Master of own vessel did not exercise due-deligence to make the vessel sea worthy and sailed out for Sea with faulty navigational equipment,which lead to a collision with the container vessel. Due-diligence means all efforts should be made ,So that the vessel meets all the requirements to make the vessel seaworthy. To meet these requirements the vessel shall be properly manned and should have qualified , competent and well trained staff on Board.Ensure that the vessel can proceed to sea without any harm or danger to the Personnel,Property or Marine environment. Ensure that the vessel carries all the necessary equipment as per SOLAS regulations. Also the Equipment, Cargo,Hatches is well maintained and in good condition.Cargo shall be looked and maintained on board until it is finally discharged.This will ensure that the Master and the company has exercised Due-diligence. The container vessel which had sailed out in a seaworthy condition,this vessel was complying with SOLAS regulations and H-V rules when she sailed out for sea.But a day before the collision the vessel was short manned as 2nd officer was Medically evacuated due to serious injury and rest all officers were working short handed,This lead to short manning which eventually caused fatigue to its officers and thereby breached SOLAS regulationsThis made the container vessel unseaworthy at the time of collision. But the MCA Guidelines (MSN 1778 (M)),allows a vessel to sail for shorter voyage ,if in incase of emergency ,in the case of short manning ,on a condition that the remaining officers on board are not undergoing through stress or fatigue,due to short manning and also the ILO guidelines of work are observed(ILO guideline 174),in this case the owner of the vessel could be had liable ,if apart from breaching SOLAS regulations,the guidelines from MCA has not been followed. Apart from these liabilities ,that has caused by the vessel’s owner due to the breach of statutory regulations and requirements,this incident of collision leads to further liabilities,Own vessel besides the liability incurred by the vessel’s owner due to violation of article 3 of Hague rules to provide proper documentations and a seaworthy Vessel. Due to collision and the vessel being towed to port of refuge,Liability will also be incurred due to the delay caused in delivery of cargo on time.Also the vessel was loaded with high grade steel pipes,since the vessel collided and suffered collision damage on N0 1 Hold,due to water ingress might have also caused damage to the steel pipes.Expenses incurred due to damage to a ship and its cargo. Own vessel suffered damage at forward N o 1H-port side,which resulted in partial flooding.The container vessel suffered minor Hull damage forward and several containers were lost at sea and some were being jettisoned to help the vessel to prevent water ingress.Master’s duty is to do whatever,necessary or reasonable,so that he can save the ship and cargo from any loss or damage.This allows him to Jettison the cargo,so that is prudent and safe continuation of the voyage. Both vessels were towed to port of refuge for emergency dry dock repairs. As per Hague Visby rules â€Å" the carrier is bound, before and at the beginning of the voyage, to exercise due diligence†. Make the ship seaworthy. Properly manned, equipped and supply the ship. After receiving the goods into his charge the master or carrier or agent,on demand of the shipper ,issue to the shipper a Bill of lading[1] CONTRACTUAL OBLIGATIONS OF THE MASTER When there is a collision the MASTER shall follow the following steps:- Inform the company,owners,charterers,PI clubs and Port Authorities . EVIDENCE COLLECTION. Details of both the ships. Deck and Engine log books with entries. All the printouts and graphs from bridge equipments. All the navigational charts before and after collision. All navigational equipment in use at time of collision. Weather conditions at the time of incident. At the time of contact the vessels estimated courses and speed. Communications and signals made a the time of collision. Statements from witnesses after collision. Details of VTS or Port Control if any in operation at the time of incident. Mitigate losses to ship owner. â€Å" The owner should exercise burden of proof relating to the exercise of due diligence as the vsls navigational equipment was faulty which eventually led to a collision with the container vessel. Whenever loss or damage has been resulted on account of unseaworthiness the burden of proof of due diligence should be on the carrier or the other person claming exemption under this article. The onus is cast on the carrier in relation to proof of due diligence, until the other party has established that the vessel was unseaworthy and his loss was due to that fact, alternatively the burden of proof should rest with the carrier who is the only party to have access to the whole fact†[2] A prudent Master should act reasonably as per the regulations to mitigate liabilities. So the vessel’s owners has to protect themselves under Marine Insurance at all times and mitigate liability it is necessary to ensure compliance with statutory regulations and requirements. 2. Salvage: â€Å"As per the scenario the master has two possible choices, salvage options under LOF, or consider a contract of towage ,master should make a risk assessment of the situation in consultation with his senior management team, due to the unreliability of the navigational equipmet ,and damage to the vessel master should not consider moving under his own power, he considered contract of towage or to hire a salvor which would result in 4 to 5 times more then the contract of towage, however a prudent master shall inform his owners that he considers it necessary to engage a salvor, The next decision is to accept which salvor services, as there are large number of salvors offering their services , often advise is taken from the shore back up team including the Average adjusters before salvors are hired .The master has to ensure that a careful logging of all events is required thru out the salvage operation, while enroute to the port of refuge he must discuss plan with owners and manage rs how he will handle the first few hours when alongside and he will need full support of his ship management team†[3] Cargo jettisoned for the safety of vsl will be allowed general average, after collision both vsl proceed to a port of refuge, the expenses of entering leaving such a port shall be allowed as general average, as stated in the York Antwerp rule X. Loss of freight due to cargo damaged or lost or allowed to lost shall be covered under general average. when the damaged cargo is sold at a loss, General average allowed will be the difference between the net proceed of sale net sound value General average General average In simple is a partial loss caused by or directly consequential upon a general average act. The General Average as defined in the MIA 1906 s. 66 and York Antwerp rule 2004 rules â€Å"There is a general average act where an extraordinary sacrifice or expenditure is voluntarily and reasonable made or incurred in time of peril for the purpose of preserving all the property imperilled in the common adventure’’[4]. As per GA act damages incurred are usually divided amongst the owner and the shipper,it will depend on the type of charter as to how the expenses will be divided,the Jettisoning of the cargo shall be equally divided between the owner and the shipper. In the given scenario the vessel had to jettison some containers to assist the vessel to prevent the water ingress for the safety of the ship so this sacrifice was for preserving the property hence eligible for G A. Thus all parties interested in the venture, ship – owner, charterers, and cargo owners etc, will proportionally contribute to ship – owner expenses and for port of refuge for emergency dry dock repairs. These are the main five parts which will show whether that act is classed under the GA or not, in fact GA arises when sacrifices have been made for the safety of the ship against cargo and freight, from some peril of the sea or from its effects. The total of such G A allowances is shared between the various parties who stood to lose each contributing in proportion to his percentage of the total values involved. The purpose of G A is to ensure that the owner of the ship or cargo who has incurred an expenditure or suffered a sacrifice of his cargo in time of peril for the purpose of preserving property receives a contribution to his loss from all those who have benefited from the action, G A acts are allowed under the H M repairs,Expenses incurred due to damage to a ship and its cargo and of taking direct action to prevent further damage to the ship and its cargo is taken as Particular Average. Hull and Machinery Insurance The duration of this insurance is for the maximum period of 12 months.this insurance is covered for the damage by herself caused to the vessel due to marine peril. It is the protection of liabilities’s of :- ? ths collision liability : The underwiter agrees to pay the ? of any sum due to the loss:- Damage caused to the other vessel ,also the loss of property and the general average or salvage of other vessel. General average and salvage:-the adjustment made should be according to the law. The insurance covers loss to the ship caused by following incidents:- O Fire and Explosion O Accident during loading and discharging ,shifting cargo . O Jettisoning of cargo O Piracy O Earthquake /Tsunamis O Peril of the sea,river/lake or any navigable water O Boiler bursting ,defect in machinery,shaft breakage. O Barratry of master/officer/crew. O Contact with land conveyance ,dock or harbour equipment. O Contact with helicopter,aircraft or falling object. In this scenario own vessel has sailed with a faulty Radar ,this proves that the master had not showed due diligence and will not be getting any compensation. PI Insurance Charterrs and ship owners are offered various class of coverage by the PI clubs. PROTECTION COVERS FOLLOWING LIABILITIES:- O Collision O Cargo claims ,crew claims O Oil pollution LIMITATION AND PI COVER:- The PI club has a board of directors who decide how to limit and restrict the cover that is given to the members. The towage of the ship may cover if the member is liable under contract of towage. The club covers the pollution liabilities only to the liability that the pollution is an extent to the escape or discharge of oil or any substance. In this case own vessel had an inoperational radar,The marine insurance contract had been breached,so the insurance company may refuse to pay the amount. Due-diligence shall be maintained at all times so that the insurance policy can cover the cargo and the ship against damages at all times. 3. Master’s actions are very crucial to obtain cover under Insurance policies. A prudent Master shall act reasonably with the codes and regulations ,Compliance with the rules and regulation will also reduce the carrier or owner liabilities regarding salvage, Master assess the situation thoroughly whether to take salvage. The right to salvage can only arise in respect of maritime properties. The terms and conditions on which the salver agrees to salve the property is divided into two basis: O The daily hire basis OThe Lloyds open form (L.O.F) The term salvage applies to Othe service performed by a salvor Othe reward paid to a salvor in respect of his successful services. Since there is no formal contract as to the money which the salvor is due on successful completion of the contract such a method is only employed when the marine environment are in grave danger. â€Å"L.O.F’’ is the most widely used â€Å"no cure – no pay’’ salvage contract, in return for salvage services, the salver receives a proportion of the â€Å"salved value ’’the value of the ship, its cargo and bunkers on board the ship. As per scenario own vessel sufferd severe collision damage on the forward end of the No 1 HOLD-Port side,resulting in partial flooding ,Due to this effect vessel was in grave and imminent danger and threat to environment, in shortest time Master decided to take L.O.F to tow the vessel to port of refuge for emergency dry dock repairs. Own vessel was under Llyods open Form Choosing the L.O.F is a matter of getting the best expertise possible in the shortest time, the Master/ owner have insufficient time to arrange a daily hire contract, their need not be a formal signing of the form, the terms and conditions can be agreed on communication the words ‘’L.O.F 2000’’ clearly being spoken during acceptance. In this incident the container vessel suffers minor hull damage and vessel was not imminent danger and not any threat to marine environment so the Master preferred to organize a daily hire agreement. The daily hire agreement would work out more economical and less complicated compare to the L.O.F.The salvage operation and its remuneration are as per the Lloyd’s rules and regulations whereas the towage contract depends upon the rules and regulation entered by the two signatories i.e. the ship owner and the towing company. The time factor is essential for the Master to make a prudent decision contacting the owner who sought advice from H M and P I club to draw satisfactory action plan. H M and P I, insurance policies covered some losses, however, the Master action are extremely important to obtain cover under the different insurance policies. BIBLIOGRAPHY College notes – shipmasters business by STC Carriage of goods by sea by john F Wilson Shipmasters business companion by Malcolm maclachlan MCA Guidelines-2003 REFERENCES www,google.co.uk www.nortonrose.com [1] College notes-shipmaster’s business [2] Carriage of goods by sea by Jhon F wilson [3] Commercial management for ship masters (A practical guide) Robert L Tallack. [4] Shipmasters business by Malcolm Malcalahan How to cite Ship Masters Business, Essay examples

Friday, December 6, 2019

Marketing Plan for Catering System †Free Samples to Students

Question: Discuss about the Marketing Plan for Catering System. Answer: Introduction: The purpose of this paper is to sharpen my skills and talents which are required for my future career as project manager. I am going to manage the project of marketing through the platform of social media on the online catering system. The relevant data for the project should be gathered from various online and offline sources like study of social media pages for exploring the campaign or promotion of the products, communication with the catering system of the locality, material required for the success of the catering program, and etc. The study of online web pages of advertisement of the products posted on the social media helps in knowing the details required to be posted on the promotion advertisement for the social media platform like Instagram and Facebook. The advantages and the new features of the catering system should be highlighted for attracting more and more customers towards the online catering system. The review of negative comments posted by the customers helps in the development of innovative and new features to the organization. Social media platform like Facebook and Instagram should be searched for collecting and analysing the required information for the portal. The number of views, likes, and comments helps in measuring the popularity of the system among the target audience.Online marketing strategy of food panda, Business plan presentation for online restaurant, The six dollar catering marketing plan, and Marketing plan for catering system are some of the articles which are referred during the course of action. References: Attias, M. (2012). The six dollar catering marketing plan. Retrieved https://www.restaurantcateringsoftware.com/blog/bid/89951/The-Six-Dollar-Catering-Marketing-Plan choudhary, R. (2011). Business plan presentation for online restaurant. Retrieved https://www.slideshare.net/niranjannahak/online-restron Kumar, R. (2016). Online marketing strategy of food panda. Retrieved https://www.slideshare.net/narnoli/online-marketing-strategy-of-food-panda Lorette, K. (2016). Marketing plan for catering system. Retrieved https://smallbusiness.chron.com/marketing-plan-catering-business-767.html

Friday, November 29, 2019

The settling of the Islam in the Southeast Asia was an extension from the coastal India

Traders and sailors from the Arab origin used to tour the ports of Southeast. This was before they converted into Islam. Trade men of the Indian origin acquired the Islamic culture from their place of origin. The culture adopted by these trade men was spread to other areas of the Southeast Asia. A way was formed due to the collapse of the Buddhist trading empire.Advertising We will write a custom essay sample on The settling of the Islam in the Southeast Asia was an extension from the coastal India specifically for you for only $16.05 $11/page Learn More This took place during the thirteenth century and allowed for more movement into the region. In the south Asia, the conversion of the Indians to Islam started in the seventh century. By the thirteenth century, the Islam had spread well though didn’t manage replacing Hinduism in India. These two religions remained at uneasy equilibrium. At the initial stages of the introduction of Muslim in India t here were conflicts between religious conflicts. The trade men used to travel for long distances during their operations. They had emerged before the Chinese or the Indian religious influences. Also the politics had not gotten any chance to have influence. This was during the start the Christian period. At this time boats and trade had a lot of influence in the south china societies. The boats appeared in most artifacts and in many boat-burial rituals. They also appeared in other Southeast Asian cultural contexts. Even currently the boat symbol appears in many archeological sites of the Peninsula. This is in association with bronze and iron artifacts. These have a representation of the remains of boats used in the south china Asia. According to the research carried out in the 1st millennium there have been trade patterns that has been taking place between the Indian shore and the Southeast Asian. The formation of the Choson dynasty was on the basis of neo-Confucianism This had a com bination of a strong political ideology. It has a practical ethics that insisted on the significance of the family. Neo-Confucianism opposed Buddhism. This is because the monks abandoned their families. Also, they maintained strict celibacy. Also, they were rejected by the intellectuals. Monks were categorized in the same category with the servants. They were not permitted to go to the capital city. This was in terms of the social stratification. During the hard situations, Buddhism became completely sidelined During this time the Buddhist utilized their adverse circumstances. They took it as an opportunity to systematize a harmonized perspective.Advertising Looking for essay on asian? Let's see if we can help you! Get your first paper with 15% OFF Learn More This was used to reconcile the philosophical conflicts among neo-Confucianism. It was claimed that Buddhism had a teaching that offered chances to individuals to pursue different levels of practice. This is accord ing to their capability to the merit-making of the normal individuals. Kihwa had an intention to illustrate the superiority of the Buddhist teaching. The teachings embrace a universality that involves all kinds of people. This is in contrast to the soteriology of Confucianism. This essay on The settling of the Islam in the Southeast Asia was an extension from the coastal India was written and submitted by user Brady W. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Free Essays on Professional Orientation

Professional Orientation to Counseling According to Vacc and Loesch there is no quick and easy way to define or explain the term ‘counseling’, rather they consider the activity of mental health counseling complex, consisting of a number of assumptions. Counselors require a myriad of ‘helping skills’ from what are referred to as intentional and unintentional helping skills. Counselors can use and draw upon helping skills and therapeutic constructs to strengthen and refine their counseling skills. In chapter 4, Helping Skills are elaborated on and described to assist the new counselor. Skills of this nature are useful in all forms of counseling; I found chapter seven, Working with Groups to be interesting and could easily understand how a counselor using ‘helping skills’ could quite effectively facilitate group sessions. Chapter 9, focused on Assessment and Appraisal – again another very interesting topic. Understanding the need for assessments is critical for the new counselor. Assessments are not meant to be used alone, but in conjunction with other counseling methods, which can assist the counselor to understand the needs of the client while being able to choose appropriate counseling techniques. Research in professional counseling was not something I expected to come across at great length, but according to Vacc and Loesch, it is extremely important for counselors. Heppner, Kivlighan, and Wampold (1998) stated that as professionals we have a responsibility to not only promote wellness with our clients, but to stay abreast of human nature and the field of counseling. Traditional research methodology is not necessarily the preferred method of research for professional counselors. It seems that the ‘single-subject’ design is more beneficial in measuring and demonstrating the effectiveness of counseling. The elements of single-subject research are based on measuring change, connecting the change to a charac... Free Essays on Professional Orientation Free Essays on Professional Orientation Professional Orientation to Counseling According to Vacc and Loesch there is no quick and easy way to define or explain the term ‘counseling’, rather they consider the activity of mental health counseling complex, consisting of a number of assumptions. Counselors require a myriad of ‘helping skills’ from what are referred to as intentional and unintentional helping skills. Counselors can use and draw upon helping skills and therapeutic constructs to strengthen and refine their counseling skills. In chapter 4, Helping Skills are elaborated on and described to assist the new counselor. Skills of this nature are useful in all forms of counseling; I found chapter seven, Working with Groups to be interesting and could easily understand how a counselor using ‘helping skills’ could quite effectively facilitate group sessions. Chapter 9, focused on Assessment and Appraisal – again another very interesting topic. Understanding the need for assessments is critical for the new counselor. Assessments are not meant to be used alone, but in conjunction with other counseling methods, which can assist the counselor to understand the needs of the client while being able to choose appropriate counseling techniques. Research in professional counseling was not something I expected to come across at great length, but according to Vacc and Loesch, it is extremely important for counselors. Heppner, Kivlighan, and Wampold (1998) stated that as professionals we have a responsibility to not only promote wellness with our clients, but to stay abreast of human nature and the field of counseling. Traditional research methodology is not necessarily the preferred method of research for professional counselors. It seems that the ‘single-subject’ design is more beneficial in measuring and demonstrating the effectiveness of counseling. The elements of single-subject research are based on measuring change, connecting the change to a charac...

Thursday, November 21, 2019

Jazz Article Example | Topics and Well Written Essays - 1000 words - 2

Jazz - Article Example The video refers to the Miles Davis performance of â€Å"Around Midnight† in Berlin, Germany, which he takes us through a story by the expressions that can be perceived through Jazz music. Miles Davis one of the most famous jazz players worked on the modern jazz musical concepts that have helped to grow this genre to a next level. One of the most interesting aspects of jazz music is the level to which the genre continues to grow and redefine itself long after its heyday of popularity. Whereas the full music of the hippie movement has long since faded into the past, the music of the roaring 20s has been lost from memory, and the music that brought a nation together during the Second World War has been forgotten, jazz continues to maintain a subculture of popularity, continues to be performed by a wide range musicians, and continues to redevelop and reengineer the means by which it sounds on nearly a continual level. The very first jazz melody â€Å"Agitation† gives the l istener a very exotic feeling by using his trumpet. It combines the different aspects from the musical perspectives. The song follows quick transitions with specific background sounds. The background music keeps the flow of the music steady and continuous. The trumpet is used throughout the music owing to its main emphasis on the intensity to the certain point it shows. In much the same way that saxophone is used within other jazz pieces to represent the missing vocalist, the trumpet within this particular piece gives the depth and complexity that a vocalist might give. Miles Davis improvisation in this specific type of Jazz know as Modal Jazz music has helped specifically to stretch out the harmony of the music into certain parts which makes the it more systematic and helps the music to proceed in an organized manner. Miles Davis stretched out certain improvements in different types of Jazz music, such as bebop, hard bop, cool jazz, modal jazz and jazz fusion. This specific piece f rom Miles Davis joins in with different instruments to give the feel of the environment producing a story of its sort. Ultimately Miles Davis exhibits the ability of the genre jazz to continue to reinvent itself and provide new forms of fusion between bebop, hard bop, cool jazz, modal jazz, and jazz fusion. In such a way, the full depth of evolution of this particular genre is aptly demonstrated to the reader. This modal jazz requires knowledge of musical nodes beforehand. Miles Davis, the most well-known protagonist of Jazz Music history had been on top of creating creative method for Modal Jazz. The video specifically has piano to create the specific background rhyme to the music that follows throughout the length of the video. Throughout the video there are specific changes in the chords, which at times follow a certain transition and after a break follow another set of harmonies. What can be understood with regards to jazz is that it has the unique ability to incorporate a range of different ideas concepts and emotions within a single piece and somehow wrap them up altogether so that they work cohesively. This is of course unique as compared to many other forms of music due to the fact that the average three-minute song only has a chorus are melody that exists for the space of about 15 to 20 seconds. Although the purpose of this analysis is not cheap and aspects of popular music that

Wednesday, November 20, 2019

Environmental problems to health, quality of life, and longevity of Coursework

Environmental problems to health, quality of life, and longevity of people - Coursework Example The water vendors escalate the prices of water due to high demand for the commodity. Families have to forego the purchase of food in order to have money to buy water. This has been raising the living standards beyond the reach of many families. Children are under high risks because their bodies are not well adapted to the tough conditions. Many of the children die at very tender age because their bodies cannot adapt to the harsh living conditions. The water is so polluted and contains disease causing organisms. As a result, the children’s disease fighting mechanism is overwhelmed by constant attacks from disease causing bacteria. However, even the adults are at very high risks. This is because they have been exposed to these conditions for a very long time. Although their bodies have adapted to the conditions, they are likely to suffer from diseases, an aspect that affect the financial positions of their

Monday, November 18, 2019

Microeconomic theory Essay Example | Topics and Well Written Essays - 2000 words

Microeconomic theory - Essay Example The diagram above shows that different levels of goods x and y that would yield the same level of utility for the consumers. Just like the demand curve these curves can be shifted rightward or leftward depending on the changes of consumer’s tastes, willingness and other factors. The shift in the curve towards right would mean that the same combination of goods will now yield consumers more utility than what it was yielding before. Similarly, a leftward shift would mean that the same combination of good would yield less utility to consumer than before. There may be a number of reasons for this. The obvious reasons can be income effect, substitution effect or changes in consumers tasted. In the real world things are more complex than first thought. Consumers cannot buy any combination they like. In fact they are faced with budget constraints depending on their income. The real income is what consumers are actually earning and that is what is included in their purchasing analysis . Real income is derived when the income of consumers is adjusted against inflation. The budget constraints of a consumer are reflected by a budget line. This is drawn on the indifference map. The best combination for consumers is the place when budget line is tangent to the indifference map. In other words, the combination of goods where budget line is tangent to the indifference map is the place where the consumer is yielding the maximum utility. At this place marginal utility of both goods are equal and can be represented by the equation: MUx = MUy In the diagram below, it can be seen that the ideal combination or the maximizing utility combination of goods X and Y what the consumer should purchase given his real income is Qx and Qy. This would yield him maximum utility. 3) The income and substitution effect are important concepts explaining the changes in demand. Income affect occurs when the price of a good rises. Since your income is not rising in response to an increase in pr ice of that good, the consumer feels poorer than before. Since the consumer feels poorer, he buys less of that good in order to compensate for the unexpected increase in price that has not synchronized with the income of the consumer. Similarly, when the price of a good falls, the consumer feels richer than before and his ability to buy more has increase and therefore he buys more of a good. This phenomenon is known as income effect. Similarly, when the changes in prices lead you to shift from one good to the cheaper good, it is known as the substitution effect. For example, if there is restaurant that is selling burgers and pizza. If there is a increase in price of pizza, you are more likely to buy more burgers and eat pizza less often than before. If the price of pizza falls, you shift from consuming burgers, to eat pizza more often. This phenomenon is known as substitution effect. However, there are certain goods that follow the opposite income and substitution effects. These are classified as giffen goods. When the prices of designer handbags rise, there are more people in queue to buy them from the richer segments of the society. The reason behind this is that people consider these expensive goods of higher quality and shift from cheaper goods to these goods.

Saturday, November 16, 2019

The Libertarian Manifesto By John Hospers Philosophy Essay

The Libertarian Manifesto By John Hospers Philosophy Essay The Libertarian Manifesto by John Hospers is something that is equated with the ethical problem surrounding the distribution of wealth, amongst other things. Hospers (1996) argues that when it comes to the distribution of income, people should fend for themselves. He opposed arguments such as an admonition to feed the hungry because in the libertarian world, hunger simply would not happen (Hospers, 1996). Hospers (1996) begins his article by noting the definition of libertarianism, which is that people have a right to make their own decisions and lead their own lives, as long as their decisions do not interfere with anyone elses life. There is a problem as it respects the distribution of wealth, but for the libertarian it is not a problem. The individual has a right to decide what he or she wants to do. Hospers (1996) ideas, and the ideas of many libertarians, are equated with the concept that every man can fend for himself, and in the end, everyone will get exactly what they want. Hospers (1996) believes that the right to private property is basic. On some level, one might equate his ideas to natural rights ethics. Clarke Linzey (1996) write: The idea of natural rights implies that there is an essential human nature which determines this status and a moral order government the relations of human beings as such, independently of the laws of all particular societiesà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ã‚ ¦ (598). The ethical rule used by Hospers (1996) in respect to wealth distribution would be that it is permissible to follow ones desires and not to worry about others in society. This is because they have their own paths. That is, it is not an obligation for society to take care of everyone in its midst. The duty is for the individual to be accountable to himself. Yet, it is also true that there are interactions between people. Hospers (1996) provides examples of situations in respect to how one should act, and certainly, the society is accountable to the individual on some level not to influence things too much. For the libertarian, it is scant government that is the best government. Hospers (1996) writes: Government is the most dangerous institution known to man (27). The factual claims made by Hospers (1996) are associated with observational and historical facts. Nothing he says can be proven, but anecdotal evidence is used to support the authors points. A student asks whether or not Hospers position meets the fourth criteria for valid theory, which are consistency and coherence, rational justification, plausibility, and usefulness. First, it should be said that the theory is coherent, and while it is largely consistent, it is difficult to be completely consistent with the notions in libertarianism. There are exceptions. Hospers (1996) writes about freedom where people have a right to do and say as they like, but even freedom of speech has limits. He writes: Indeed, the right to property may well be considered second only to the right to life. Even the freedom of speech is limited by considerations of property (Hospers, 1996, 25). He goes on to explore other issues and provides examples of when people cannot say what they like (Hospers, 1996). While the theory is consistent, there are exceptions to everything and this muddies the waters. One can take things further by examining contemporary examples. For instance, people believe that they have the right to free speech. Hospers (1996) says that people cannot shout obscenities in a church because the property is not designated for that purpose. Enter property rights. Yet, in society today, people do have a right to their opinions. At the same time, with the political correctness movement, people are not entitled to utter certain things without their rights being challenged by the law. If someone utters a derogatory racial remark and ends up in a fight, he can be charged with a hate crime. On some level, this is thought control. As abhorrent as ones thoughts might be, the idea to outlaw certain forms of speech and not others imposes limits, thus challenging some pure libertarian notions. While this idea does not take away from the validity of the position, it certainly challenges its consistency. Is the position rational? It is a reasoned argument. In fact, the article provides much support for the premise, and the support is based on logic. Ethical criteria are included and the author does make a sound ethical arguments that are also plausible. While the points are well reasoned, the argument at the end of all of this is whether or not someone can allow poverty to exist in a world of plenty. The libertarian provides a what if argument. In other words, the libertarian claims that if things were a certain way, there would be no poverty, but the world is not completely libertarian so the point is moot. Poverty persists, so while the argument may be sound in this what if scenario, it does not address solutions for the status quo. What does one do with the poor today? Usefulness is another issue. If one is not operating in a libertarian world, the theory is only useful if the world were that way. Theoretically, Hospers (1996) provides an excellent paradigm, but it may not be possible to achieve his ideas in reality. In the United States, different ideas are supported and compromises are made. Hospers (1996) brand of libertarianism could not flourish in this sort of situation. Similarly, in totalitarian regimes, there is much too much force in play to go from such a model to one of complete freedom. Libertarianism is a sound theoretical model, but it is unknown whether or not it could ever be successfully implemented.

Wednesday, November 13, 2019

A Speculative View of American History to 1876 :: Essays Papers

A Speculative View of American History to 1876 Those who do not study history are doomed to repeat it. Human nature is one of curiosity; we are not content with the superficial faà §ade of our existence. Rather, we need understanding. We need to know not only know how we have come to be who we are as a people, but more importantly why we are, and where, as a society, we are destined to end. The answer to our relentless question of existence lies in our past. We must look beyond the mere factual account of events which comprises our history, and take on a more speculative approach, and analyze the philosophy of history: in our case, American history. The world has seen many different historical philosophies throughout time. Two contrasting extremes of historical philosophy were those of ancient Greece and Rome, who subscribed to the Stoic cyclical view of history, and Immanuel Kant’s idea of Progress. Karl Marx, in the eighteenth century, established his socialist ideas in a volume he co-authored, The Communist Mani festo. The historical philosophy, however, which best explains the first half of American history, from its birth in Europe, to the civil war, is that of Augustine. Augustine’s theory of history can be detected in his major work, The City of God, in which he explains his concept of the City of Man versus the City of God: â€Å"Accordingly, two cities have been formed by two loves; the earthy love of the self, even to the contempt of God; the heavenly by the love of God, even to the contempt of self. The former, in a word, glories in itself, the latter in the Lord.†1 As Ronald Nash elaborates: Augustine explains that the two cities will coexist through human history, even within the bounds of professing Christendom. Only at the last judgment, which brings human history to an end, will the two cities finally be separated, in order that they may share their appointed destinies of heaven and hell. What accounts for people’s placement in one or the other city is the object of their love. People belong to the City of God by virtue of their love of God; the rest of humanity belongs to the City of Man because of their â€Å"love of self, even to the contempt of God.†2 This monumental work3 originally began as a response to the accusation of Rome’s Christian conversion ultimately contributing to its sack by Alaric and his Goths.

Monday, November 11, 2019

Byzantium is short for the Byzantine Empire

Byzantium is short for the Byzantine Empire. It can also be used to refer to the capital city of the Roman Empire, later renamed Constantinople after Emperor Constantine who rebuilt the city into a modern capital of Christianity at the time. Byzantine was heavily influenced by Greece and the Greek culture. With that came the Greek mythical gods and icon culture representing ones religious beliefs. Constantinople also became the seat of the pope of the Catholic Church (â€Å"History of the Byzantine Empire†).Icons can be defined as representations of deities, saints or sacred scenes such as the crucifixion of Christ. In the Byzantine Empire these were very popular and were made from any medium including gemstones, wood, stone, marble, enamel, precious metal, and mosaic. Additionally, they ranged in size from small to huge and were even painted on walls as murals (Brookes). It was believed that these icons would bring success in battle and were often carried when troops were goi ng to war. They were also believed to bring healing to the sick and good fortune.By being in contact with the icons, it was said that one was able to directly communicate with the deity or saint represented by the icon (Brookes). As the culture of creating icons grew, it began to clash with the teachings of Christianity which had taken root as a major religion in the Byzantine Empire. The first commandment in the 10 commandments given to Moses clearly stated that there should be no graven images made as this would make the people prone to the worship of idols. As such, iconoclasm took root. The term iconoclasm means ‘image breaker’ which referred to the habit of breaking images for political or religious reasons.In ancient times, if a ruler was conquered by another, any image of that ruler was quickly broken by their successor or conqueror, hence the term. In Byzantium, iconoclasm referred to a theological debate that spanned about a century between the state and the ch urch (Brookes). As Christianity grew, the creation of icons was barred by the state and the cross was promoted as the only representation of the church. The main motivation for this was so the people would stop looking to the icons as the source of their healing, good fortune and success and start looking to Christ and by so doing discourage veneration of the icons.The issues surrounding the icons were that whereas one faction saw the icons as a representation of their faith and salvation, the other group saw them as mere idols. Their argument being that the only representation of Christ given to the church was the holy Eucharist, or Holy Communion (Trakakis). The iconoclast found a dilemma in the icons in that an image of Christ was supposed to capture the humanity of Christ without taking away the divinity. However, the Godhead could not very well be represented by an image of Christ.The Iconophile, saw it as not trying to capture the divinity or humanity of Christ but the person of Christ, which then tied the human and divine together. To the Iconophile, the fact that Christ had come in a human body made a depiction of him possible. Therefore whereas Iconoclasts were bent on depicting the spirit as superior to matter, the Iconophile so the created matter as a perfect means to see God in the created matter thus deifying the said matter. This became the crux of the controversy (Trakakis).Procopius’ book â€Å"Secret History† had been hidden for centuries until it was discovered in the Vatican library and printed in 1623 AD (Glenn). Procopius was a famous historian in the time that Justinian ruled Byzantium. Having written other texts on the Roman Empire in the 6th century, he wrote this secret book that gave the details of how Justinian and his wife Theodora a former courtesan plundered Rome and murdered millions of people. Justinian is said to have forced people into the Christian faith, while his actions remained decidedly contrary to its teac hings.He and Theodora made people pay for Justice, belittled their needs and robbed Roman citizens of their property and money. Justinian would side with priests who stole and murdered and even took property from citizens to give to the church thinking that he would have favor with God for doing so (Altwater) This book is significant because it reveals a different side of the history of Byzantium in the time of Justinian, unlike the official annals of history written for the empire. In the Byzantine Empire, Pagan art was seen as leading people to false gods. It was mainly based on the polytheistic Greek gods and was figural.As such, it was shunned by the growing Christian population. Due to the iconoclasm controversy, much of the art of the Byzantine Empire did not reflect one figural scene to avoid the said controversy. Because of the persecution that followed Christians who supported icons, Byzantine religious art shrunk to focus mainly on the cross and symbolic birds and plants ( â€Å"The Byzantine Empire†). The Byzantine Empire is an intriguing time with tales like no other. Ranging from the amphitheaters to the arena where offenders where crucified to death or torn to pieces by wild animals.The religious mix was no less intriguing and the rise of Christianity in the Byzantine Empire brought with it many controversies. Justinian became an enforcer of Christianity in the empire causing its spread, but at the same time going against the tenets of the faith according to the ‘Secret History’ by Procopius. Additionally, because of the first of the Ten Commandments, there arose a controversy as to whether icons were graven images, which were forbidden, or not. This in turn affected the way the people of Byzantium perceived pagan art, which was mainly based on pagan gods, goddesses and symbols.As such, Byzantine religious art was narrowed down to include the cross and other symbols that bespoke Christianity without compelling veneration. Works Cited Atwater, Richard. â€Å"Procopius of Caeasrea: The Secret History. † Ann Arbor: University of Michigan Press, 1961. 10 Mar. 2009 Brooks, Sarah. â€Å"Icons and Iconoclasm in Byzantium†. In Heilbrunn Timeline of Art History. New York: The Metropolitan Museum of Art, 2000. 10 Mar. 2009 Glenn, Joshua.â€Å"A Brief History of Secret Histories. † 2008. 10 Mar. 2009 â€Å"History of the Byzantine Empire. † 24 Feb. 2009. 10 Mar. 2009 â€Å"The Byzantine Empire: The Roman-Byzantine Period. † 10 Mar. 2009 Trakakis, Nick. â€Å"What was the Iconoclast Controversy About? † Theandros. 2 vols. 2004-2005. 10 Mar. 2009

Friday, November 8, 2019

India-Now And Then Essays - Indian Caste System, Caste, Free Essays

India-Now And Then Essays - Indian Caste System, Caste, Free Essays India-Now and Then My report is on India. India is a place very different from ours. Not many have deeply explored this culture and yet we desire more. I hope to clear up and explain the history, religion, and culture of India. As I have researched. The history of India is a long and proud one. Though the nation in quite poor it has been able to withstand the tests of time. Then it developed the caste system. A sytem of dividing people into groups. Well, it is still around today but we will discuss that later. The country started by poeple migrating to it. Many of the old customs developed back then like you are not truly part of a family or caste until you marry and have a child still remain today. There are two major religions practiced in India. They are Buddhism and Hinduism. Yet, you are aloud to worship any god you please and are encouraged to. And this right is garaunteed under their constitution. And people mostly group and talk among one another with their own religion. Wich is sad stoping people from bonding with others of other religions. The culture of India differs very much from ours. Especially the caste system wich was explained above. There are rules that go along with being in a caste. Some are you may not eat with a person of higher or lower caste, you may not sit with a person of higher or lower caste, you may not marry a person of higher or lower caste, and you can not have a child with someone of a higher or lower caste. Also the highest caste has to be generous to the lower castes while the lower castes have to be very generous to the higher caste. In closing I hope you now explain a little more about India and it people, customs, culture, and religion.

Wednesday, November 6, 2019

The Best Amendment Essay Example

The Best Amendment Essay Example The Best Amendment Essay The Best Amendment Essay Which Amendment? The freedom of speech, religion and press seems like an everyday activity, right? But imagine if you were not allowed to speak your opinion or practice your choice of religion, or even write about facts or opinions that interest you. What if you had to keep all your thoughts and opinions to yourself except for the ones that you were allowed to express or you would be in trouble. That would be like torture. That is why Amendment number one of the Constitution is the most important one and we need to keep it, because without those rights the voice of America would not be heard. If the citizens of the United States didn’t have the freedom of speech, they wouldn’t be able to vote or give their opinions to politicians. Not being able to vote and choose the nations next President would be unfair. Everyone should have a say on who’s in office and what they are going to do to help America. Most likely, if the President was a random guy that nobody voted for or had no experience with the government, America would be sent down the toilet. Without amendment number one we wouldn’t have the freedom of religion making people argue about what holidays to celebrate and if churches should be built. We need the freedom of religion because without it people would fight and disrespect each other and we would go to war. As Americans, we need the right to press because without it we wouldn’t be able to print facts or opinions that were unpopular, and we wouldn’t be able to share information with others to help them vote for change. We need the freedom of press or our minds would explode. America needs the first amendment or else everyone would go insane. Nobody would be able to speak even the basic truths like which ice cream they like the most, because they wouldn’t have the right to voice their opinion. America needs to maintain its voice and let the citizens of the United States choose Americas next step. Without amendment number one America would be silent, even worse, dead.

Monday, November 4, 2019

Environmental Studies Of The States Climate Essay

Environmental Studies Of The States Climate - Essay Example The monthly temperature ranges from 91.5Â °F to 30.0Â °F. Snow fall is a rare phenomenon and the highest record is only 13 inches on March 12-13, 1993 at Birmingham. Tornados and hurricanes are very common around Birmingham and Mobile due to turbulent wind patterns. Hurricanes of wind speeds 145mph caused the worst tornado disaster the Dixie Tornado outbreak in April 27, 2011 in which 50 tornados claimed more than 238 lives. Alaska The state Alaska is known for its high snow falls but is also hot in the summer. The highest mean annual temperature is 51.4Â °F recorded at Annette, AP and the lowest average annual temperature is 0.9Â °F recorded at Umiat. The mean annual rainfall is the highest at Whitter at 185.2 inches and the most snowfall occurs in the month of January at Valdez WSO as much as 65.1 inches with a snow depth of 31 inches. The extreme northern part of Alaska is Arctic with long and very cold winters and there is snow almost year around here. The wind speeds at the costal parts of the Gulf of Alaska are as high as 40 to 45 kmph and major natural disasters in Alaska are due to storms. Arizona The climatic conditions in this state are dry with little rainfall. The highest temperature recorded was 128Â °F at Lake Havasu City, 1994 and the lowest temperature recorded was -40Â °F at Hawley Lake, 1971. The average annual maximum temperature is 76.3Â °F recorded at Lake Havasu City and the lowest is 38.3Â °F at Sunrise Mountain. The highest average annual precipitation is at Hawley Lake 38.2 inches, and the lowest is 2.67 inches. The highest average annual snowfall is at Sunrise Mountain recorded as 243 inches. The state is more prone to storms and there are large temperature swings between the day and the night temperatures due to the dry climatic conditions relevant in the state. Arkansas Due to the location close to the Gulf of Mexico, Arkansas has a humid subtropical climate. The lowest temperature was recorded at Pond in 1905 as –29Â °F and a record high of 120Â °F was recorded on 1936 at Ozark. Average yearly precipitation is approximately 45 inches in the mountainous areas and greater in the lowlands; for example Little Rock received an annual average of 50.9 inches. Snowfall in the capital averages 5.2 inches a year and the northern part of the state gets more snowfall during the winter. The state is prone to natural disasters like thunderstorms, hails, snow storms and ice storms. A tornado with wind speeds as high as 180 to 200 mph damaged Atkins where 12 people were killed. California Most of the areas in the state of California have a Mediterranean climate, while some have a subarctic climate that is colder winters and hotter summers. The maximum average yearly temperature was recorded as 91Â °F at Death Valley. The lowest average annual temperature was recorded at Squaw Valley Lodge as 27.3Â °F. The mean rainfall was recorded the highest at 104.2 inches at Honey Dew and the lowest was recorded at 2.7 inches at Brawley. Snowfall is nil at most areas and the highest snowfall of 287.7 inches was recorded at Big Ben Ranger Station. The wind speeds range from 4.5 mph to 13.3 mph. Flood due to heavy rain, tornados, thunder storms and firestorms are common in this state.

Saturday, November 2, 2019

Project Analysis St. Mary Shopping Centre Thornbury Assignment

Project Analysis St. Mary Shopping Centre Thornbury - Assignment Example This essay describes a proposal, that was made to demolish the existing Thornbury library building at St. Mary Street, Thornbury BRISTOL, South Gloucestershire, to facilitate the erection of a three storey building to form a new library. The new library was also proposed to provide retail space, office space, and associated car parking in the form of a town centre. The proposal was considered by the Development Control Committee. After due consideration of the opinions and views of all interested parties and after a full deliberation the Committee refused the proposal of the development planning. This essay examines the circumstances under which compulsory purchase of land can be ordered by the city council or other local authorities and also the policies of the government with respect to local planning and development. The researcher of this essay also aims to present an alternative development plan for the land under question. Since the proposal for redevelopment of the site is not accepted by the Thornbury Town Council, it is proposed to demolish the building and construct a shopping centre in the place for renting out office space. The details of the project are listed elsewhere in this paper. However, the researcher concludes that before examining the commercial viability of the proposed shopping complex, it would be of interest to study the details of the provisions, that are related to the compulsory acquisition of land and also about the local planning policies of the government.... Thornbury Library St. Mary Street - a Background The proposed site is located in St. Mary Street, Thornbury Town in South Gloucestershire County and the proposal was to make the shopping centre with the name and style of St. Mary /shopping Centre. The town is situated about 14.5 miles north of Bristol city centre. The site is in the ownership of South Gloucestershire Council and can be leased on a long term basis. The Town centre in Thornbury is dominated by the High Street. St. Mary Street where the site is located is full of remnants of old and historic Thornbury building blocks. Since the proposal for redevelopment of the site is not accepted by the Thornbury Town Council, it is proposed to demolish the building and construct a shopping centre in the place for renting out office space. The details of the project are listed elsewhere in this paper. However, before examining the commercial viability of the proposed shopping complex it would be of interest to study the details of the provisions relating to the compulsory acquisitio n of land and also about the local planning policies of the government. Compulsory Purchase of Land Compulsory acquisition is the process by which local and national governments obtain land and premises for development purposes which they consider is to be done in the best interests of the community. The law relating to compulsory purchase is far too complex in that it includes a provision to allow an owner of an interest in land to make a request to the local authority concerned to take possession of the land if that land is affected by a planning decision of the local authority. The basic principle behind the law is that the land suitable for development which will benefit the community may be

Thursday, October 31, 2019

Mythological strategy Essay Example | Topics and Well Written Essays - 250 words

Mythological strategy - Essay Example Stories of lovers, who are not able to consummate their love in this world because of hindrances like economic or racial differences, die and become flowers or other things finally finding the freedom to express their love to each other helps explain the hope one can have in the afterlife despite the difficulties experienced in this world. The reality that is difficult to understand and accept in such a tragic event which is observed in real life brings a reader to feelings of hopelessness especially when he is experiencing similar situations. However, the consummation of a love in another world gives hope and lets a person understand the meaning of such circumstances. In mythological strategies, archetypes offer help to the readers in understanding further what is commonly observed in real situations. If a story has a hero who conquers all difficulties and villains, one is also present in real life. As villains are common in stories, life is not lacking of them. Characters and event s one could always relate to in trying to figure out life, are parts and parcels of archetypal analysis which are commonly used in mythological strategies.

Tuesday, October 29, 2019

Cross Cultural Leadership Essay Example for Free

Cross Cultural Leadership Essay Leadership is the process of getting work done through others. A leader encourages and motivates others towards accomplishment of certain pre-defined organizational goals. The management maintains the status quo whereas the leadership is responsible for predicting fresh solutions and methodologies. The leadership is responsible for motivating people to bring out their best. The modern leader must be multicultural because corporate success, profit, and growth depend increasingly on the management of a diverse work force. Cross-cultural leadership is a term that identify the diversity of work culture, the fact that the leader (or leaders) may come from social, linguistic, ethnic, or cultural groups but work would be remain same for all. Working with people from different countries, conducting meeting, dealing with clients, entertaining, negotiating and corresponding with colleagues or clients can be a beneficial to the employee to understand the intercultural differences. Understanding intercultural difference ultimately breaks down the barrier and helps to build trust and increase good relationship which yields concrete results in terms of business success. Few key components of cross cultural leadership skill are: Attitudes towards time, Commitments, Success Status Authority Accountability Planning Negotiation Rewards Teamwork Personal boundaries and social interactions Effectively managing a multicultural business requires at least a basic knowledge of employee’s culture and traditions. Familiarity with both is essential because each has a bearing on an employees every day behavior. Whether we realize it or not, culture and tradition are powerful principles we always carry with us. Culture is always with people even though people are unaware of it.

Saturday, October 26, 2019

Secure Corporate Network Infrastructure Development

Secure Corporate Network Infrastructure Development Pop Quiz! VPN stands for†¦ A.1 VPN stands for Virtual Private Network or Virtual Private Networking. A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only virtually private, however, because this data actually travels over shared public networks instead of fully dedicated private connections. Introduction I have a strong point of view that MCC has been fostering is dear students from all computing courses since its establishment. With the intention of uplifting the education standard in Computer Technology, MCC has collaborated with NCC of Greenwich College in London to set up the Joint Program of International Diploma in Computer Studies (IDCS). I have given my best effort and attention and I also obtained priceless knowledge and experience in developing and implementing the cost-effective VPN extranet infrastructure for National Bank for Rural Development. Overview The construction of the Rural National Development Bank brought great prosperity to an area where previously had tremendous hardship in making monetary transaction. Being in a rural area like this, we cant have hefty load of budgets invest in for the normal operation of the bank. The bank has currently been using Microsoft Windows operating system as client machines and also the network is window-based. The bank wants to create a corporate network infrastructure to connect their agents and branches securely. The bank preferred to use NOS for Ubuntu Linux for they will reduce the overall cost dramatically when compared to Microsoft Server Version. All of these multi-functioned organisations and personnel need to have a medium to communicate for the smooth flow of their work. As the new networking advisor for this project, I have thought out the plan to implement such medium on less costly basis. The aim of this project is to investigate the currently favourable means for building a secure corporate network infrastructure that consists of servers, extranet, preferred form of internet connection and clients. This report will contain recommended methods and a sample of a network security design with a clearly labeled diagram. Also, the source and references of information and excerpts in this report will be acknowledged and can be found at the end of this documentation. Prototype for the Extranet VPN for NBRD There are altogether 500 computers and 100 peripheral devices in the main office bank. There are tens of departments and hundreds of staff ranging from front-office to auditor. VPN actually is a private network for delivering of important data and facts within the organisation via the secure use of the public network like Internet or Wide Area Network. The internet source is coming from ISP which provides high-speed Asynchronous Digital Subscriber Line. The main office is a very sophisticated infrastructure and the daily normal operation of the bank is very much dependant on four servers-VPN Server which is a must in all VPN configured network, Print Server, File Server and Database Server. The computers and peripheral devices are connected from the four servers via multi-purpose switch (to regenerate signals). The outlet of the main office building has router in place for connecting separate logical networks to form an internetwork. And then comes the Gateway to convert Microsoft Ma il to Simple Mail Transport Protocol (SMTP) for transmission over the Internet. Although routers work at the Network layer and can route packets of the same protocol (such as TCP/IP) over networks with dissimilar architectures (such as Ethernet to token ring), gateways can route packets over networks with different protocols. And then comes a firewall. A firewall is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules. The data then travels on the VPN tunnel by using IPSec Protocol. It is the most popular method for encrypting data as it travels through network media. IPSec works by establishing an association between two communicating devices. An association is formed by two devices authenticating their identities via a preshared key, Kerberos authentication, or digital certificates. Suburban branch has 300 computers and 50 peripheral devices and has varieties of de partments and large numbers of staff for its daily normal operation and performs the same task mentioned above. National Bank for Rural Development has 50 computers and 5 peripheral devices. It also has departments and staffs but it depends on VPN server for its normal operation. Business partners and agents are connected to the VPN via remote access. Brief biography of Ubuntu is an open source (can change the source computer code at your desire) operating system version is upgraded every six months desktop, server and ultimate editions are available Can be used wih wide ranges of computers and hardwares:-(Intel x86 (IBM-compatible PC), AMD64 (Hammer) and PowerPC (Apple iBook and Powerbook, G4 and G5) architectures) Supported by Canonical Ltd. is GNU/Linux (comprises of many programs and most essential one is ‘kernel which is linux in (GNU/Linux) and it combines with other GNU programs to boot up the system) and if an error occurs and the Kernel becomes corrupted, a different copy can then be used instead. debian-based Linux is the system descended from Unix GNU/Linux was put into existence by Free Software Foundation in 1984 is free-of-charge and totally aimed at programmers and developers The first Linux kernel was invented by Finland-national Computer Science student ‘Linus Torvalds Because of its alluring advantages such as being free of charge, compatible with many software programs, not easily hanged or freezed, multi-tasking, and more safer than other OS make Linux more popular among business partners and individual person hide the user from browsing the registry keys that have important information more effective in hindering the spread of viruses and executing of malicious programs and threats Ubuntu can be downloaded from this site: http://www.ubuntu.com/getubuntu is compatible with ‘Intel and AMD and the compatibility with hardware parts can be checked in this site: http://www.tldp.org/HOWTO/Hardware-HOWTO/ http://www.linux-laptop.net/ (For laptops) The minimum requirements for Ubuntu 700 MHz x86 processor 384 MB of system memory (RAM) 8 GB of disk space Graphics card capable of 1024768 resolution Sound card A network or Internet connection CD/DVD Drive For visual effects and graphic 1.2 GHz x86 processor 512 MB of system memory (RAM) Supported graphics card Note: the above descriptions are only minimum requirements and better processor and system memory will certainly enhance the performance of Ubuntu. For downloading software for disk partition by using disk management of windows: http://www.partition-tool.com/personal.htm Task 1- 50 Marks Your Bank currently has network client machines based on the Microsoft Windows Operating System. The Bank decides to evaluate the benefits of the open source Linux operating system, preferably the latest Ubuntu Linux distribution version 9.10 server edition (freely downloadable from http://www.ubuntu.com) Evaluate the benefit of Linux operating system as Interoperable and alternative NOS for the company in the form of a feasibility report to include the following: 1.1) The comparative Networking features of Windows and Linux. (10 Marks) Comparative Networking Features of Windows and Linux Windows Operating System Internet Connection Firewall (ICF) acts as a shield from unauthorized access to home networks and computers. It had come with the window installation package and it enables automatically in its default settings when the Network Setup Wizard is run and is compatible with most networks. ICF has manual switch on-off modes which can be done through the Network Connections folder. Wireless LAN provides Ethernet and Wireless Security with its improved standard IEEE 802.1X which has been developed with the combined effort of Microsoft, Wireless LAN dealers and PC dealers. Former version is highly inefficient in lacking security control with a key management system. The IEEE 802.1X is a port-based network access control and can be used with Windows XP via access points. Network Setup Wizard acts as a novice guideline in setting up the network can be utilised to configure the Internet Connection in networked computers, and also network adapters (NIC Card) can be used to enable Internet Connection Firewall (ICF), Network Bridge if appropriate, sharing resources such as files and printers and naming of computers. Network Diagnostics Features Diagnosing network features by using the following tools: The Network Diagnostics Web Page and NetSh helper Network Connections Support Tab Network Connection Repair Link Task Manager Networking Tab Updated Command Line Network Diagnostics Tool Internet Connection Sharing (ICS) A single internet connection from the source computer can be shared to all the other computers in a home or small office network. ICS is enabled in the source computer and gives out all the physical and IP addresses and translates these for all the networked computers in the organisation. Linux Operating System acts as a forbidder for all incoming connections but opens up for outgoing connections. When in ‘high mode, it allows for all outgoing connections and restricts to limited number of high ports for point-to-point applications. When switch to ‘medium mode, still permits outgoing connections, selected applications for incoming ports plus point-to-point application. When change to ‘none mode (â€Å"get out of my face†), it denies all incoming and outgoing connections. Only in the ‘laptop mode, the firewall does activate without giving any alert to an Interface (GUI). Protocols Linux supports IPv6 and SSH but Windows is not. 1.2) Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. (10 Marks) Interoperability refers to the capability of the system ranging from hardware and OS to work in multi-platforms. Windows and Linux are both OS and of x386 architecture. Open Office in Linux which is similar to MS Office in Windows is java based application. All of us know java -based applications will work in any platform. OpenOffice.org can be used to open and save Microsoft Office formats, such as PowerPoint, Word and Excel documents. Ubuntu can share files with Windows with ease, and can connect with current e-mail servers even Microsoft Exchange. Ubuntu support plug-n-play hardware, wireless networking, printing and other graphical and multimedia software. Connecting from Linux to Windows With the use of network, we can control Windows computer from Linux: enable â€Å"remote administration† on the Windows host make sure you reach the computer from your Linux box ping windows_computer connect to the computer rdesktop windows_computer Connecting from Windows to Linux The following can be used to have control over Linux computer from a Windows box: Vnc Xdmcp NX X-Servers for Windows puTTy (command-line only) Exchanging files between Linux and Windows When having two hard disk partitions but running on one OS, in case want to access a Linux partition when running Windows and vice versa, the following can be done: When on a Linux host and want to access a Windows drive Winhost has been assumed as Windows computers hostname in this case (the hostname can be checked by right clicking on My Computer Icon and select Properties). Open the Explorer windows on Windows computer. Right-click on the folder and choose â€Å"Sharing and security† from the drop-down box. Name it â€Å"share1†. Then, on Linux computer, open the file explorer either Konqueror or Nautilus and type smb: //winhost/share1 in the address bar. All the files and folders can be seen in that share. With just double-click, you can open and view them. Want to share When on a Linux computer and want to make the folder accessible on Windows machines over the network, need to run SAMBA service on Linux computer. Right-click on a folder in favourite file explorer like Nautilus and choose â€Å"Sharing Options†. Click and name the share. Nautilus will require a password without prior enabling of the Windows folder sharing and after that install the service. It now requires you to log out and log in again. Windows computer should be available with the share. When on a Windows host and want to access a Linux drive WinSCP is used and SFTP protocol should be chosen. The login procedure and password are same as when log in locally. Firewall should be shut down and openssh service should be installed on Linux computer. Want to share a folder By using normal Windows sharing procedures can share files with Linux. By using samba, the Linux host can access these files. NTFS (New Technology File System) is the Microsoft Window default file system. It is readable as well with Linux and more than 2GB of files can be stored. 1.3) You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Installation of Ubuntu Server Edition 9.10 During the ongoing installation process of Ubuntu Server Edition, LAMP which is a combination of Linux, Apache, and MySQL and PHP servers can be used instead. It is excluded from the Ubuntu Server Installation Package and can easily be used during the time of installation. The LAMP option does not require individual installation and integration separately of each of these components which can take prolonged period of time and need a help from an expert who is skilled in this particular installation. The overall cost can be greatly reduced due to the enhanced security performance, requiring lesser amount of time to install and any possibility of misconfiguration can be reduced. Flexible installation can be carried out with the Ubuntu Server Cloud computing server as varieties of servers like Mail Server, Open SSH Server, Samba File Server, Print Server, Tomcat Java Server, Virtual Machine Host, Manual Package selection, LAMP and DNS options work jointly with cloud computing node and P ostgreSQL Database options. These versions can be installed by Ubuntu LAMP server. Ubuntu 9.10 (Karmic) Apache 2.2.12 Mysql 5.1.37 PHP 5.2.10 Ubuntu 9.10 (Karmic) LAMP Server Installation is successfully completed and all applications installed will support apache, mysql and php. Ubuntu server 9.10 edition static ip address configuration The command [sudo apt-get install vim-full] can be used to install vim editor TCP/IP utilisation in a corporate or enterprise network needs the devices to be configured in detail, assigned addresses and the destined machines they were assigned need to be kept track of. Dynamic Host Configuration Protocol (DHCP) is used to make this process easier. Through Dynamic Host Configuration Protocol Ubuntu installer has arranged our system to acquire its network settings. But we need to switch it to static IP address by editing setup: Edit/etc/network/interfaces and the detail data of your ip address needs to be entered. For instance, IP address 173.20.9.10 is used in this case. The command [sudo vi/etc/network/interfaces] is entered and the file is saved and exit by using the procedure â€Å"In vi, ESC, and then ZZ to save and exit†. The chief network interface auto eth0 iface eth0 inet static address 173.20.9.10 netmask 255.255.255.0 network 189.18.9.3 broadcast 198.34.8.9 gateway 167.8.2.3 Now the command [sudo/tec/init.d/networking restart] is used to restart network services When DHCP is not in use, manual setting up of DNS servers in resolv.conf file is needed with command [sudo vi/etc/resolv.conf] In resolv.conf file the one similar to below should be added. search domain.com nameserver xxx.xxx.xxx.xxx File Sharing configuration in Ubuntu server 9.10 edition Sharing File by using NFS which is the *nix systems default networking protocol inclusive of Ubuntu Linux. File sharing by using Samba protocol Samba File Sharing Samba client permits easy and smooth networking with Windows-based networks except firewall is in place at the ports. Ubuntu Jaunty comes originally installed with Samba client. Samba server When Samba server is not installed by default, the instructions below can be used to configure a Samba server. In this way, files can be shared seamlessly between windows Samba network computers to other Samba clients. Install Samba with the command [sudo apt-get install samba samba-tools system-config-samba] Samba-tools and system-config-samba are not compulsory Samba settings can be altered by:- Method 1 System>Administration>Advanced>Samba This method can only be performed only if system-config-samba is installed Method 2 Needs User Authentication to connect to File Sharing Server and it is highly recommended because of its reliability The instructions below should be carried out to share files on the machine. Current user should be added to Samba by command [sudo smbpasswd- a username] The login username should replace username. Samba config file is opened by command [sudo nano/etc/samba/smb.conf] The directories is to be added at the far end by using the format Path=/home/username/ (The username is to be replaced with your own username and with the folder to be shared) CTRL+ X is pressed and later Y to save Samba is restarted by the command[sudo/etc/init.d/samba restart] The format[\192.168.x.x] is used to access the folder in Windows Explorer. In this instance, \192.168.x.x is used as a sample IP address and the actual IP address of the server in which folder exists should be replaced. The format[smb://192.168.x.x] should be typed in Konqueror or Nautilus of Linux. In this instance also, 192.168.x.x should be replace with the actual IP address of the server in which the folder exists. In case of bug when sharing in KDEs System Settings panel, erase out any situations concerning with these two lines (â€Å"case sensitive† and â€Å"msdfs proxy†) in /etc/smb.conf. Workgroup changing in Windows network workgroup Change your Windows network Samba workgroup by the command [sudo nano/etc/samba/smb.conf] and search out for this line â€Å"workgroup= WORKGROUP† change the setting according to your LAN workgroups name. Print sharing configuration in Ubuntu server 9.10 edition Printers Many printers can be recognized by the new CUPS interface. The Linux Foundation OpenPrinting database provides instructions to install particular types of unrecognized printers. Printer configuration System>Administration>Printing>New Printer>New Printer Usually the printer connected and switched on will be detected automatically. My network printer was configured with IP address at 192.168.10.23 and it was correctly installed at socker://192.168.10.23:9100. Through Samba printers on a Windows system and on other networks can be chosen plus directly connected printers. 1.4) Enumerate the various costs associated with the performance, security, support and maintenance of the Ubuntu within the bank. Cost associated with security of the Ubuntu within the bank A Linux-based operating system, Unix-like and open source make the Ubuntu more secure than any other OS. Translation into higher quality code makes it less prone to spyware and viruses than other OS. Rather strict and hyperactive security policy prevents the effects as a result of open ports or misconfigured software. It is truly multiuser operating system with it allowance in users to accomplish their tasks without giving any harm to the system. In Ubuntu, the user never logged in with an administrator account instead log in as a simple user and can change settings concern only with the user but for modifying settings that can somehow affect the system, the user required to type in administrator password. Cost associated with maintenance of the Ubuntu within the bank LTSP thin client technology makes Ubuntu deployment and management simpler and easier. With only a single server, over 50 workstations can be setup, manage and administrate. Ubuntu can therefore reduce the amount of time spend in administrating computers. Ubuntu is and will always be free to obtain, use and upgrade. No license fees or upgrades expenses are cost even if 100 or more machines are to be installed or can install on computers only having specific programs. Ubuntu also assist in saving hardware costs by allowing redeploying older machines as thin clients using LTSP technology. Cost associated with support of Ubuntu within the bank Ubuntu support can be getting from Ubuntu communities. Authors of the Ubuntu can get in touch directly through mailing lists and IRC channels including Ubuntu developers. Wide varieties are support are available, on mailing lists, wiki websites, IRC channels and bug trackers. Canonical who finances Ubuntu development can give help in any paid work. The community at the back of Ubuntu attracts people to the use of operating system. Linux community people are largely ex-Windows users and they have exact feelings the newness of an operating system and they are willing to help. In the Linux environment the best community support is offered by Ubuntu. Cost associated with performance of Ubuntu within the bank Program calls Synaptic offers access to most applications available to Ubuntu and by clicking the program wanted and it will install without needing to accept agreements several times pre-installation. Just select the program and click OK and it is finished. Ubuntu will download the installation files, install them and start the application on its own. That makes Ubuntu easier to install new programs. Ubuntu is fast and does not take up a lot of resources. Performance will not even slow down in prolonged use. Everything will be opened in a short time after clicking the icon and closes immediately when click the icon X. Ubuntu gets update every six months. Everything about Ubuntu is free. Even they will dig their pockets to pay postal charges if you ask them a free copy of the operating system. The software installed is free including all the software that can be downloaded, any help and support is free. Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: Performance of VPN within the bank VPN has other indirect cost savings advantages over other communications methods such as lesser requirements in training and staff, flexibility and scalability has been greatly increased. The largest benefit to utilising VPNs is money savings. The amount spent will be significantly reduced when compared to dedicated leased line options. Remote users can connect locally to an ISP and tunneling that connection to a VPN device on the destined network. Therefore, reduced technical help is required to install, configure, and manage networking equipment. With the use of a single WAN interface, it can carry out multiple functions so the expenses on WAN equipment installation and maintenance is no longer needed. Organisations can extend their network and capacitate their performance by setting up more accounts to control the increased demand. This will facilitate the answers to market demands or organizational challenges and is also time-saving. Therefore enterprises and corporate organisations can be linked from different locations into the network without the need of complex infrastructure, delays and tremendous expenses in joint with connection across borders. The wide area networking costs are cut down via telecommunication costs. Support of Ubuntu within the bank Technical help resources are sharply reduced with the emergence of VPNs. This is as a result of dependability on one type of Internet protocol (IP) from mobile users to an ISPs POP and security needs are standardised. If taking the help of the service providers to set up VPNs, they will take most of the support tasks for the network. Security of Ubuntu within the bank Fewer networking experts are required to control security features of the VPN as the ISP manages the WAN equipment. Hidden costs associated with distribution of VPN client software. Some adopters are finding that simple tasks not unique to VPNs, such as distributing and installing client software to remote users, pose a bigger challenge than ever imagined. Managing security and authentication systems require realising that complex skill sets not available in-house. Cost-VPN often requires a substantial up-front effort for configuration and software deployment. 2.1) A brief overview of current VPN technologies (both hardware and software). Components needed with VPNs With the effect of high security performance, VPNs are originally complicated. Typical components needed for an effective VPN include: Gateway devices Routers Dedicated servers Firewalls Client software Public-Key infrastructures (PKI) and associated key-management strategies Hardware-based encryption accelerators X.509 digital certificates Certificate Authority (ies) Directory services Servers with these features: Load balancing Failover Redundancy Network-transport communication mechanisms Typically, VPN components connected to the Internet include these: -Certificate Authority (CA) system -Managed ISP to support remote employees Corporate VPN gateway with these indispensables: -LDAP server -Registration Authority (RA) system Firewalls help in accomplishing three goals: Restrict accessing to certain segment of a network Block services requests that are thought to be insecure or unnecessary Interpret network addresses to conceal real device addresses from other segment of a network and is called Network Address Translation, or NAT VPN evaluation Certificate Authority (CA) support: If youll be handling more than a handful of users who possess digital certificates for authentication, youll need robust support for an external provider of CA services. Logging: If youre requiring information logs from the VPN, can they integrate into your existing logging mechanisms and reporting systems? Selective encryption: If youre thinking about adding a VPN to an existing firewall, you may want to encrypt only certain traffic- or risk bringing your firewall to its knees with an overload of overkill. VPN-management modules: Can you integrate your VPN into your existing enterprise networks monitoring system? If you cant, then how will you monitor its uptime? In your evaluation of VPN gateway products, look for these features: X.509 digital-certificate support LDAP support IPSec-compliant Encryption types supported Performance (Mbps) Maximum number of interfaces Maximum number of connections Quality of Service support Clustering (SMP) support Custom-application support Support for High-Availability (HA) features EAL/ITSEC/TCSEC Level In evaluation of VPN client products, look for these essentials: Thin-client support Fat-client support Network-mapping support Dynamic Host Configuration Protocol (DHCP) support NT Domain logon support 2.2) Design a suitable VPN using appropriate Internet Service Provider (ISP) for the requirements of the bank. 2.3) Identify and list the hardware and software required to implement the banks VPN. The infrastructure of existing network should be supported by a server. A server should serve as a domain controller, DNS server, Certificate authority and DHCP (Dynamic Host Configuration Protocol) server. The next step is to set up a certificate authority. A VPN server should be kept separate for the sole purposes of security threats. A firewall should be placed at the outlet of VPN server to only permit flow of VPN traffic into this server. Two NICs cards are needed to connect to the internet and the private corporate network. Identification of the remote users identity when trying to access the private corporate network is also necessary. The Server operating system comes with RADIUS- Remote Authentication Dial In User Service and IAS- Internet Authentication Service to do authentication process. VPN hardware products also do the authentication process. The Web Server (HTTP server) responds to HTTP requests for HTML pages that it delivers to customer browsers over the Internet. Its the only server that sits in front of the firewall and allows direct controlled access to the public internet. Its on this server you may want to store static Web page content and graphic images. All information processing that the Web server needs from applications or Database servers can only be accessed through the Firewall. Application Servers store, manage, and operate those software components relevant to the business, including Merchant server software, back-office accounting systems, customer information systems, order entry and fulfillment systems. You many opt for multiple application servers as your needs dictate. Any links to other legacy systems (such as mainframe-based systems0 may be made through the application servers as well. Database Servers store your product, purchase, and customer data in addition to all other distributed processing data already in place. They may use Object-Oriented Database Management products, traditional relational database products, or hybrids of the two. Choices of Database Server software include these: Oracle MS SQL Server Sybase DB/2 Informix Firewalls control the access to the internal (back-office) corporate networks. They serve as the mechanism under which the Web server accesses applications and data that is found behind them. These Firewalls will typically run monitoring software to detect and thwart external attacks on the site, and are needed to protect internal corporate networks. Common Firewall services are implemented as routers that sit in between two domains (subnets), and are selective about IP addresses from which it receives packets before it permits their routing to the other domain (subnet). These select IP addresses are considered as trusted hosts. Mainframe systems, If youve got them, can a