Tuesday, August 25, 2020

Assignments essay Essay Example for Free

Assignments exposition Essay |Assessors remarks | |Qualification |QCF Level 7 : Extended Diploma in Strategic |Assessor name |Atif Kauser | |Management Leadership | |Unit number and title |4-Developing corporate culture |Learner name | |Assignment title |Culture, Objectives and improving corporate atmosphere | |Assessment Criteria |Achieved? | |AC 1.1: clarify how models of association culture can be utilized to accomplish hierarchical goals | |AC 1.2: clarify the contrast among authoritative and national culture | |AC 1.3: investigate the corporate social profile in an association | |AC 1.4: examine the effect of an organisation’s corporate culture in accomplishing its destinations | |AC 2. 1: assess the current atmosphere of an association | |AC 2.2: prescribe approaches to improve corporate atmosphere in an association | |AC 2.3: propose a system of hierarchical qualities that meet the particular vital and operational needs of a | |organisation | |AC 3.1: recognize interior and outer partners of an association | |AC 3.2: assess the viability of an organisation’s existing correspondence methodologies | |AC 3.3: grow new correspondence techniques for partners of an association that address contrasts in conviction, | |values, customs andâ language | |Assessor Feedback Action Plan | | |Learner’s Feedback | |Assessor signature | |Date | |Learner signature | |Date | |Assessment Criteria |To accomplish the models the proof must show that the understudy can: | |Task no. | |Evidence | |reference | |AC 1.1, 1.3, 1.4 |Culture: culture as shared qualities; culture at rising levels; sub-societies; proficient | |1 | |cultures | |Models: Charles Handy †power, job, individual and assignment societies; Johnson and Scholes social | |web; connections to authoritative goals | |AC 1.2 |Organizational culture: industry culture; national and supranational culture; | |1 | |models of culture eg Trompenaars’s verifiable express factors, Schein’s three levels | |National societies: techniques for grouping national culture eg crafted by Laurent, Hofstede | |and Trompenaars | | |AC 2.1, 2.2 |Climate profile: how atmosphere is characterized; distinction among atmosphere and culture; | |1,2 | |key parts of authoritative atmosphere eg adaptability; obligation; norms; rewards; | |clarity; group duty; effect of the board rehearses on atmosphere; effect of atmosphere on | |efficiency and viability | |AC 2.3 |Values: qualities or fundamental beliefs as a piece of hierarchical culture; emergency of morals | |2 | |in business and the new accentuation on esteem administration †structure for creating and supporting| | |strong corporate guiding principle | | |AC 3.1, 3.3 |Stakeholders: clients, buyers, representatives; investors; governments; | |1, 2 | |communities, business associations and collusions †the expanding need to participate with | |people from various social groupings (counting convictions, qualities, customs and language) | |AC 3.2, 3.3 |Communicating viably: systems; recognizing likely hindrances and guaranteeing methodologies | |1, 2 | |overcome them; creating mindfulness of own and hierarchical culture; advantages of a | |diverse workforce; cultural assimilation programs; intercultural relational abilities | Task Cover Sheet |Assignment Title |Culture, Objectives and improving corporate atmosphere | |In this appraisal you will have chances to give proof against the accompanying measures. Show the page numbers where the proof can be found.| |Attach work where required. | |Learner’s Name: |Assessor: Atif Kauser | |Date Issue: |Completion Date: |Submitted On: | |Qualification: QCF Level 7: Extended Diploma in Strategic Management |Unit No Title: Unit 4: Developing Corporate Culture | |Leadership | |Learner statement | |I ensure that the work submitted for this task is my own and research sources are completely recognized. | |Learner signature: Date: | |Unit title |4-Developing corporate culture | |Qualification |QCF Level 7 †key administration authority | |start date |01-04-2013 | |deadline |05-05-2013 | |Assessor |Atif kauser | |Assignment title: |Culture, Objectives and improving corporate atmosphere | |Scenario: Suppose you work for a business magazine called ‘The Biz Talk’. The editorial manager has doled out you with the errand of creating the Cover Story for the next| |edition. He needs youâ to compose a nitty gritty article with the title ‘CULTURE, Objectives and Improving Corporate Climate’. | |For this you should pick one association of your advantage, lead an essential and optional examination to assemble statistical data points which will | |support you recorded as a hard copy the article. The article should cover and address the given undertakings and results. | |Task 1 | |Having finished with the essential and optional research, direct a basic assessment to examine the ebb and flow practices of your picked association as a case | |study, and Elaborate and clarify the profile of your picked association by tending to the accompanying errands: | | |Analyse the corporate social profile of your association | |Discuss the effect of your organisation’s corporate culture in accomplishing its destinations | |Explain how models of association culture educated to you in the instructional exercises can be utilized to accomplish authoritative goals for your picked association | |Explain the contrast among hierarchical and national culture by basically watching the nearness of your association in a specific nation/area | |Evaluate the current corporate atmosphere of your association | |Identify the inward and outer partners of your association | |evaluate the viability of your organisation’s existing correspondence methodologies | |Provides proof for: result 1, AC: 2.1, 3.1, 3.2 | |Task 2 | |Based on your examination, propose suggestions and methodologies for additional improvement in the regions characterized beneath: | | |Recommend approaches to improve the corporate atmosphere in your association | |Propose a system of authoritative qualities that meets the particular key and operational needs of your association | |Develop new correspondence methodologies for partners of your association that address contrasts in conviction, qualities, customs and language | |Provides proof for: AC 2.2, 2.3, 3.3 | |This brief has been confirmed as being fit for reason | |Assessor |Atif Kauser | |Signature | |Date | |Internal verifier |Wajiha Daud | Signature | |Date |

Saturday, August 22, 2020

Analysing data production

Examining information creation The procedure of research isn't just about learning and finding, yet in addition about imparting these revelations to other people, with the goal that society all in all can profit by the endeavors put in by the person. With regards to complex scholarly ideas, the selection of words for how an idea is portrayed can have any kind of effect to how well it is comprehended by others , particularly while moving between look into areas.  Consequently we utilize similitudes and analogies with regards to portraying complex ideas. Tying an idea (for instance, quantum superposition) to a genuine world â€Å"thing† (for instance, a feline in a case ) permits individuals new to the first idea to associate it with something they have understanding of, and gives an establishment which can be expounded on. On the off chance that, upon further assessment, it is discovered that the similarity gets extended mind-boggling, at that point that is worthy, as long as those utilizing it don’t just depend on it as an article of visually impaired confidence. Analogies and allegories require basic reasoning. Logical ideas are figured in human language, and all things considered, are planned to be prepared by the human cerebrum (regardless of whether that mind should be profoundly prepared before it can appropriately get a handle on the ideas being depicted). Logical information, then again, is intended to be machine consumable (just as overwhelmingly machine delivered). Estimations are frequently not helpful without the setting encompassing them. It is one thing to realize that a specific stream level rose by 10cm. It is just by knowing where this occurred, how high the stream was in any case, and how high the ascent would need to be at that area to flood the houses worked there, that we can place the information into setting, and make it helpful. However we despite everything need that information. In the event that a property holder who got overflowed wished to guarantee on their protection for flood fixes, having that information and setting accessible methods they’d have verification that it was waterway flooding that caused the harm, instead of a burst pipe. We likewise need to have the examination information which supports key research discoveries accessible and reasonable, both for reproducibility and to forestall misrepresentation/abuse. Putting forth information usable by others takes attempt and time and is regularly unrewarded by the present framework for increasing scholarly credit. Illustrations and Analogies â€Å"No one illustration fulfills enough key information framework traits and that numerous representations need to exist together on the side of a solid information ecosystem†(Parsons Fox, 2013) Information distribution as an illustration has been tended to broadly in (Parsons Fox, 2013), prompting the statement above. Be that as it may, before we plunge into instances of similitude and relationship in the information space, it is useful to survey what they mean. From (Gentner Jeziorski, 1993): ‘Analogy can he saw as a sort of exceptionally specific comparability. In handling similarity, individuals verifiably center around specific sorts of shared characteristics and disregard others. Envision a splendid understudy perusing the similarity â€Å"a cell resembles a factory.† She is probably not going to conclude that cells are structures made of block and steel. Rather she may figure that, similar to a plant, a cell takes in assets to keep itself working and to create its items. This emphasis on normal social deliberations is the thing that makes relationship illuminating.’ (Gentner Jeziorski, 1993) p448 This activity of focussing on certain shared characteristics and overlooking others is essential when utilizing analogies to represent logical ideas. We can create a relationship that â€Å"a dataset resembles a book†. Shared characteristics incorporate that both contain data, in an organized and arranged way, which is consumable by a client, and both are the result of supported exertion, possibly from a wide scope of entertainers. The contrasts between them make it similarly as simple to state â€Å"a dataset isn't care for a book†, in that a dataset can be continually changing; may not be a physical, however a virtual item; generally isn’t intended for people to peruse unassisted ; and frequently a dataset isn’t an independent unit (as it requires additional data and metadata to make it reasonable and usable). Clearly, it is conceivable to drive analogies excessively far, and have them break. This is bound to happen when clients of the similarity don’t have a decent comprehension of every one of the two things being looked at. In the (Gentner Jeziorski, 1993) quote above, if the understudy didn’t have some other idea of what a cell was, she could without much of a stretch envision that they were minor structures made of blocks and steel, and the relationship utilized would do nothing to address that confusion. It’s additionally critical to recall that similarity isn't causation †if two wonders are undifferentiated from, it doesn't infer that one causes the other. Sorts of allegory and true logical models: Information Publication Information distribution, as a similitude, happened because of the drive for analysts to distribute however many functions as could be expected under the circumstances in whatever number high effect diaries as would be prudent, and the requirement for those associated with making datasets to be given acknowledgment for their work, and their endeavors to make the information findable, available, interoperable and reusable. This brought about strain to crush all exploration yields into shapes that take after distributions, consequently the expansion of the information diary, a spot where analysts can distribute a paper about their dataset, connected by means of changeless identifier to the dataset itself (put away in a dependable archive). The information paper at that point can be refered to and utilized as an intermediary for the dataset when announcing the significance and effect of the researcher’s work. A true case of a dataset that has been distributed in an information diary is the Global Broadcast Service (GBS) datasets (Callaghan et al., 2013), estimations from a radio spread dataset researching how downpour and mists sway signal levels from a geosynchronous satellite reference point at radio frequencies of 20.7 GHz. The information streams connected to the paper, and which the paper portrays in detail, are the consequence of an unequivocal, discrete analysis, bringing about a very much characterized, discrete and completely finished dataset, which won't change later on. The dataset has experienced two degrees of value confirmation: the first was performed on ingestion into CEDA , where the document positions were normalized and metadata was checked and finished. The second degree of value confirmation was proceeded as a major aspect of the logical friend survey process did when the information paper and dataset were submitted to the Geoscience Data Journal for audit and distrib ution. As this dataset is finished, all around recorded and quality guaranteed, it very well may be viewed as a top of the line, reference-capable, logical ancient rarity. There are other companion assessed diary articles which utilize the GBS information as the reason for their outcomes, see for instance (Callaghan et al., 2008) . Be that as it may, datasets can be discrete, finished, all around characterized and for all time accessible without the requirement for the intermediary of an information paper, or some other distribution appended to them. This is of specific worth with regards to distributing negative outcomes, or information that don’t bolster the speculation they were gathered to confirm, however might be helpful for testing different theories. These kinds of datasets are conceivably the nearest thing we have to the â€Å"dataset as a book† similarity, and along these lines are the least demanding to fit into the information distribution form. Sadly, numerous different datasets don't fit as a fiddle. Numerous datasets are dynamic, and are altered or added to as time advances. At that point there are issues with granularity †a few analysts may just need a subset of a bigger dataset for their work, however need to precisely and for all time recognize that subset. Refering to at the degree of all of the subsets brings about reference records that are long and inconvenient, and can make it hard to track down the subset required in a not insignificant rundown of also named datasets. For content based things, for example, books and articles, instruments exist to look at content starting with one case of an article then onto the next, permitting the peruser to be certain that the substance of two occurrences are the equivalent, paying little mind to the arrangement they are in (for instance, an article in printed copy in a diary as contrasted and a pdf). We as of now don't have a method of assessing the logical equality of datasets paying little heed to their arrangement. The straightforwardness with which it’s conceivable to alter datasets (and not track the progressions made) likewise implies that it very well may be exceptionally difficult to tell which dataset is the sanctioned, unique form, or even what the distinctions are. Information distribution can work very well as an illustration, however clients must know that it truly is just relevant to the subset of datasets which can be made finished, all around archived, all around characterized, discrete and quality controlled. Large Iron (industrialized information creation) Large Iron, as characterized in (Parsons Fox, 2013) commonly manages gigantic volumes of information that are generally homogenous and very much characterized yet profoundly powerful and with high throughput. It is an industrialized procedure, depending on huge, advanced, all around controlled, specialized frameworks, regularly requiring supercomputing focuses, committed systems, generous spending plans, and concentrated interfaces. A case of this is the information from the Large Hadron Collider, CERN, yet in the Earth Sciences, the Coupled Model Intercomparison Projects (CMIP) are another. The Intergovernmental Panel on Climate Change (IPCC) consistently gives Assessment Reports, specifying the present best in class of atmosphere models, and their expectations for future environmental change. These reports are upheld by the information from the atmosphere model runs proceeded as a feature of CMIP. Each CMIP is a worldwide joint effort, where atmosphere displaying bases on the world run similar examinations on their diverse climat

Sunday, July 26, 2020

How Women Can Relieve Their Stress

How Women Can Relieve Their Stress Stress Management Effects on Health Print How Women Can Relieve Their Stress By Elizabeth Scott, MS twitter Elizabeth Scott, MS, is a wellness coach specializing in stress management and quality of life, and the author of 8 Keys to Stress Management. Learn about our editorial policy Elizabeth Scott, MS Updated on August 18, 2019 How Stress Impacts Your Health Overview Signs of Burnout Stress and Weight Gain Benefits of Exercise Stress Reduction Tips Self-Care Practices Mindful Living Zero Creatives / Cultura / Getty Images It seems to be common knowledge that women are generally busier and more stressed than men. Its widely believed that they juggle more roles and are constantly rushing. Many women themselves feel that they shoulder the lions share of responsibilities outside of paid work, even when they are working just as many hours as their male counterparts. Perhaps because of this, women are seen as generally more stressed than men. But how true is this perception? Researchers from The University of Arizonas School of Family and Consumer Resources decided to find out. They took a sample of 166 married couples and had each participant maintain a daily diary over the course of 42 days, where they recorded their daily stressors. The results indeed showed that women reported a greater amount of high distress days and fewer distress-free days than men. Interestingly, the differences in levels of stressful days were due to women experiencing more onsets of distress episodes (having stress response triggered), rather than being more likely to continue in a distressed state from one day to the next. In other words, women didnt hold onto their stress more; they just experienced more episodes of being stressed. This brings up some important issues regarding women and stress, that women need to be aware of: Understand Gender Differences in Stress If youre feeling more stressed than your male counterparts, dont take it as a sign that youre not handling stress as well; it might be because youre experiencing more stress. Give yourself a pat on the back for handling what you already are, and move confidently to step two. Eliminate What You Can It seems that people are always asking women (especially mothers!) to help with group projects like organizing office birthday parties or running the PTA. While many of these activities are fulfilling, they can add up to a significant amount of stress just by filling your schedule to the brim. While it can be very difficult to say no sometimes (especially if you tend to be a people pleaser), its vital to your health and happiness that you keep in mind that saying yes to too many requests means saying no to things you need: time alone, hobbies, and other soul-nourishing activities. To maintain a reasonable level of daily stress, women need to get used to the idea of setting priorities and saying no. Alter Your Perspective Much of your experience with stress can be eliminated with a change in the way we look at things. This may sound too good to be true, but it isnt! Altering the way you conceptualize the events you find stressful (viewing them as a challenge instead of a threat, or an opportunity instead of a crisis, for example) can actually make them feel less threatening and stressful. When you dont perceive a situation as a threat, your bodys stress response is deactivated more quickly (or doesnt get triggered in the first place), and youre more able to avoid the effects of chronic stress. Have Some Quick Stress Relievers You cant eliminate all stress in life, and probably wouldnt want to if you could. There are many types of stress that are enjoyable, like the excitement of a first date or the suspense of waiting to hear if youve gotten a new job. Because it may not be possible to stop reacting to stress (even with the most positive outlook), its important to have some fast stress relievers in order to reverse your stress response quickly and prevent yourself from entering a state of chronic stress. Maintain Regular Stress-Relieving Habits You can also prevent yourself from getting into an overwhelmed state (where youre more reactive to stress) by maintaining some regular stress relief activities as part of your schedule. Studies show that those who meditate regularly are less reactive to stressors that occur in their lives. Exercise is also an important option to remember; it can keep you physically and emotionally healthy. Journaling also has many benefits for its users. Adding one of these options to your morning or nightly routine could bring be especially useful.

Friday, May 8, 2020

The Rights Of The United States - 1690 Words

John F. Kennedy once said, â€Å" Let every nation know, whether it wishes us well or ill, that we shall pay any price, bear any burden, meet any hardship, support any friend, oppose any foe to assure the survival and the success of liberty.† Indeed throughout the course of U.S. history, people’s liberty has been emphasized as one of the most important rights of American people. Liberty is understood as a basic right of freedom to which everyone can engage in certain actions without control or interference by a government or other power. Based on that principle, selective incorporation is a process of constitutional law in which some provisions of the Bill of Rights are nationalized to the states through the nationalization of Fourteenth†¦show more content†¦To clarify, Near was accused of violating a law because he revealing wrongdoings of the local government. Moreover, trial judge issued an injunction â€Å"preventing Near from publishing the newspaper in t he future† (â€Å"Near†). As one can see, Minnesota officials felt the need to stop and prevent someone from incriminating their misconducts. But obviously, their decision has violated Near’s freedom of press which states have to obey due to â€Å"Due Process Clause of the Fourteenth Amendment† (â€Å"Near†). At the end, Near appealed the case to the U.S. Supreme Court; finally, the court â€Å"voted 5–4 to declare the Minnesota Gag Law unconstitutional â€Å"(â€Å"Near†). It is important to realize that because of the process of selective incorporation, the federal government has the duty to reinforce states in protecting their people’s liberty. Similar to Near v. Minnesota, selective incorporation had helped Lawrence Robinson win the case of Robinson v. California in which the Supreme Court’s decision regarded of the Eighth Amendment, the cruel-and-unusual-punishment clause. The issue occurs when Robinson was â€Å" searched and questioned† by Officer Brown â€Å"on the streets of Los Angeles† even

Wednesday, May 6, 2020

Banco de Compartamos Free Essays

Any company that decides to go into the stock exchange must exude extra caution before making the bold step to go public. Initial public Offer (IPO) of a company mostly can tell how that company is going to do in the stock markets depending on the number of subscriptions received. It is worthy to note that stock prices keep fluctuating and that the price of a company’s share represents the financial position of the company. We will write a custom essay sample on Banco de Compartamos or any similar topic only for you Order Now Companies with a higher share price in the stock exchange are taken by the public and other stake holders to be doing well. In addition to that, the company’s affairs become public as they are now prone to analyst reports and public shareholders criticism. In this study, Banco de Compartamos, a micro finance bank offers its shares in the Mexico Stock Exchange which arouses a lot of controversies among major shareholders. Can Compartamos still perform their duties to the poor? Is it possible for them to combine these two without deviating from the purpose for which the bank was originally established? Can they handle the pressures presenting themselves to it as a public company? This is a thorough review and analysis of Compartamos’ decision to make the bank a public entity and how it has affected their performance. Banco Compartamos IPO Going public for a micro finance company and in particular Compartamos may prove to be a good thing as well as a bad thing. In the eyes of the public, it may seem like Compartamos is getting too business oriented and that it may lose its focus on helping the low income group that it has been serving. Going public is also a risky endevour because it exposes the business to a lot of external forces. The bank’s performance must now be published and analyst’s comments go far into exposing the company’s weak points which the competitors may take advantage of. Every quarter shareholders, analysts, fund managers and competitors will be waiting to see the financial outcome of the period. This means that the company must work extra hard to maintain positive image or otherwise cause their own downfall. Another note is that Compartamos was doing quite well financially with return on equity (ROE) increasing from 47. 7% to 56. 1% between 2004 and 2006 as compared to others who were averaging at 21. 2% in 2006. In fact, Daniel confirmed that from the operational point of view there was no need to sell the shares. They were only doing it as a secondary offering. Compartamos IPO on the other hand proves to be a good venture from the look of its performance in the stock exchange. As a matter of fact, interest by investors was so high that there had to be several revisions of the share price up to P$40 per share. Compartamos market capitalization was $1. 56 billion dollars which is so much to go for hence my agreement that it was the right choice for them to go public. Most impressive was the high interest investors had in the bank which saw them register thirteen times over subscription. From my point of view, a private sale would have been even worse in terms of catering to the customers’ needs. This is because the buyers may not have the welfare of the low income group at heart which was the largest target for the bank. The choice was also better than taking debts being offered to them by non-financial debtor which were being offered at the investor’s rates. The other thing is that activities of the bank are not going to change as it will continue providing services to the Popular Financial Sector (PFS) which was the main purpose of its introduction back in 1990. Serving the poor and the capital markets demand. It seems like Banco Compartamos has deviated from its objective of serving the poor by getting into the stock exchange. This is according to several stakeholders and analysts such as Richardson of World Council of Credit unions and Chuck Waterfield who thinks the decision is untimely. The question however lies on Compartamos. Can they manage both serving the poor and meeting the capital market demands? So far, Compartamos has been doing very well in the stock market with its the book value of shares rising to $126 million in 2006 from $6 million at the time of the IPO and an internal rate of return of over 100% in only eight years! Most analysts recommended it because of its prospects for growth and high profitability. The co-CEO of Compartamos seems concerned about the clients. They discuss how they can offer better services and hence improve their lives. Apart from GDI (Generadora de Ingresos) or ‘the income generator loan’, they are considering coming up with new products for the people. This means that Compartamos is still committed in its duties improve the lives of the poor. According to ACCION international, Compartamos IPO sent a message that service to the poor can go hand in hand with profits. â€Å"The two Carlos† Strategic options for the future The future of Compartamos looks bright but challenges are never ending in the world of business. The strategies put forth by the â€Å"two Carlos† will have to be met by the end of the year. Client base must be increased to one million, they have to preserve the social mission and at the same time cope with the daily pressures of becoming a public company. The Charlies surely have a great role ahead of them. In order to attain new markets to increase their client base and defend their leading position in the sector coordinated planning is essential. First of all they should lay a good strategy and make plans on how they are going to accomplish their goals. I particularly like that they have set a time limit. This acts as a goal by itself and a motivating factor. With the high rise in competition due to many entrants in the micro finance sector, their strategy should include expanding by coming up with new products that are unique to compliment GDI. A new product will always appeal to customers especially if it comes with an attractive package. Maybe they should consider lowering their interest rates so as to attract new clients and keep the current ones. This would also mean they are helping the poor socially because now they can take cheaper loans hence develop themselves. Compartamos has no market penetration in Mexico as much as it has wide branch coverage. New products will definitely help it in overcoming this challenge. As long as you are a public company, there will always be politics and attacks mostly aimed at breaking the company by presenting a bad name about it. The Charlies know that their bank has not deviated from their original mission. What remains as the challenge is proving it to the public. This can be done by constantly reminding people that they are still committed to serving them while at the same time showing it through action. The best thing for the Charlies is to increase their efforts of serving the poor so that the bad image portrayed by the attackers can be dissolved in the face of the good work that they are doing. It’s about playing with the psychology of the shareholders and its clients to avoid the negative effect that would otherwise result. Before deciding to set up new branches, it should consider the viability of the area and whether the market is promising. Areas outside the country especially if micro finance is not well established in the market are a good opportunity though care should be taken to properly establish expected risks and returns. This can be done through conducting researches before investing there. Mergers and acquisitions should also be performed with extra caution to maintain the quality of services offered. The advantage of mergers is that they add to a company’s competitiveness. If not well calculated though it may lead to the downfall of an otherwise good businesses. The future of micro finance industry. The IPO will undoubtedly attract more players into the micro finance sector and probably other market-led approaches to poverty. For now, Compartamos remains the lead among them all. There is a possibility of new models coming up that may pose a challenge to Compartamos. Compartamos should be the future of the micro finance sector. This is because most junior micro finance organizations will want to emulate its success and in doing so they may consider copying some of its policies. In the past, most micro finance organizations in Mexico have only concentrated on giving soft loans to regular customers as their only business. Compartamos is more advanced giving insurance policies and also engaging in normal bank business activities. The structure of the market however is that it is always dynamic and one can never tell what tomorrow may bring. Mergers may be forged leading to bigger organizations that would overtake Compartamos. Conclusion and Recommendations Banco de Compartamos has led by example. In the hands of Carlos Labarthe and Carlos Danel, it is bound to spring even higher in the micro finance sector after going public. During the IPO shareholders presented the organization with a cheap source of finance that is barely available to other companies of its nature therefore placing them at an absolute advantage. It becomes one of the largest companies in the Mexican Stock Exchange with over $2 billion in market capitalization. I do believe that their bold step into going public has a lot in the benefit package which if used well could see the bank grow outside its boundaries. On the side of helping the poor, they have not failed in that area yet. As a matter of fact, it is a case of logic to see that by they use the obtained finance to expand their business activities and to offer more loans. It is like giving the financially stable a chance to be owners of the bank an in return making them bring their billions to the poor. Furthermore, if more loans are given out, development of the poor is enhanced. Now that Compartamos have entered the league of companies listed in the stock exchange, a lot is expected to change which calls for extra caution. We have already seen them suffering their first challenge with attacks from various shareholders about their decision to enter the stock exchange. However, should their shares in the stock exchange do well; the good public image will work to ensure they always do well financially. It is worthwhile to note that the visibility of the IPO will showcase the superior financial performance of the micro finance sector. This is bound to cause an increase in competition in Mexico. Challenges are more forthcoming now but they should not treat them as problems but as stepping stones to higher grounds. Since Compartamos is confident that it can serve both their clients and the financial sector as well, they should come up with well defined policies to make sure that they do not deviate from their course. It is quite normal for businesses to concentrate more on what is bringing in the most cash but they should always remember the sole objective for which they were set up; to help the poor grow financially. Word Count (1887) References Cuellar, R. G. Chu, M. (2008) Banco Compartamos: Life after the IPO. Harvard: Harvard Business School How to cite Banco de Compartamos, Papers

Tuesday, April 28, 2020

The Communist Manifesto Essay Research Paper Karl free essay sample

The Communist Manifesto Essay, Research Paper Karl Marx s The Communist Manifesto forecasted the ruin of capitalist economy and the rise of communism. It predicted that the Communist revolution was most likely to take topographic point foremost in Britain or Germany because of their high population of proletarian mill workers. However, he was proved wrong because these factory workers were happy with their conditions and felt no demand to revolt. The Communist Manifesto entreaties largely to the lowest of the lower category, what he called the # 8220 ; proletariat # 8221 ; . The thought of a communist society is that everything is owned by the province. Peoples are paid # 8220 ; from each harmonizing to his ability, to each harmonizing to his demands # 8221 ; ; intending that depending on how many people the salary must back up is the finding factor in the size of the payroll check. This would appeal to the labors because it would set them on equal terms with everyone else. We will write a custom essay sample on The Communist Manifesto Essay Research Paper Karl or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The abolition of a category system benefited them greatly. Marx reasoned that his ideals appealed most to the working category, therefore it would catch on in states with big populations of working category people, i.e. Germany and Britain. The ground that a communist revolution did non take topographic point in Britain is due merely to Marx s timing. The Communist Manifesto was published in 1848, but the thoughts of Marxism did non catch on until the 1870s-80s. When it was foremost published, the British Industrial Revolution had already started. When its popularity began to lift, it did non catch on in England because working conditions in the English mills had improved drastically from what they had one time been. The # 8220 ; oppressed # 8221 ; people Marx was seeking to appeal to in 1848 did non in fact feel oppressed when they were being informed of the Communist ideals, so therefore they had no ground to revolt. They were happy with the manner things were because they had already gotten so much better. In the 1820s-30s, when the English labors felt laden, would hold been the ideal clip for a revolution, but unluckily communism was non in being. In Germany the communist revolution did happen, but non until 30 old ages after the Manifesto s publication. In 1848, the German Industrial Revolution had non even started. The Manifesto was read largely by intellectuals, because the people Marx was seeking to appeal to were illiterate. When the Industrial Revolution occurred, nevertheless, more literacy among the lower categories became necessary to run the machines, which were acquiring more complicated. Now that they were literate, the labors could and did read The Communist Manifesto. The Industrial Revolution in Germany allowed labors to be able to derive power, because category relationships had been simplified to the extreme. They had been kept from power for so long that when they realized that communism would back up their ends for equality, the thoughts of communism began to catch on. The Communist Manifesto forecasted the rise of communism in Germany and Britain, nevertheless at the clip when it was published it did non catch on in either topographic point. In Britain, the Manifesto came excessively tardily ; the window of chance for a rebellion had passed and now the people were happy. In Germany, the Manifesto was in front of its clip. Marx predicted Germany would be one of the first states to follow communism, but in fact it took thirty old ages for the conditions to be right for rebellion.

Thursday, March 19, 2020

Due to the fact that I am an enormous music lover

Due to the fact that I am an enormous music lover, it is anything but irrelevant that I have a favorite band. That band without a doubt is Pearl Jam. The songs Pearl Jam write are so real, that it makes perfect sense why their fans love them so much. Pearl Jams songs tell stories that their fans can either relate to or speak from their own dealings. Led by lead singer Eddie Vedders outstanding lyrical writing and extremely powerful and intense, yet comforting voice, Pearl Jam in my opinion is the greatest band in the world. A week before seeing my sophomore Pearl Jam show, my girlfriend of a little over a year decided it would be best if we broke up. Seeing that I did not agree with her, it made it a little hard looking forward to seeing Pearl Jam for their August 14th show in New Orleans. It did not take long however to be swept into the depths of the emotional waters, and found myself listening to Pearl Jam and Eddie Vedders lyrics over and over again and again. In his voice, I once again found the median to survive, and not just to survive, but to keep going strong, and to enjoy whatever life gives you. So, the show was The original plan was for Adam and Kenny, two of my roommates to accompany myself, along with my precious ex-girlfriend. Well, seeing that as being out of the question, I gave the extra ticket to my remaining roommate Jennifer. We left Hattiesburg around four o clock in order to arrive and to be parked and seated in the New Orleans seven o clock show began. We arrived at the arena and grabbed as much merchandise as possible before the show started. As we sat in the arena, listening to complete noise and static by the opening band, Sonic Youth, we were trying to find the quickest route to Tylenol city when I realized that we could not smoke in the arena. I, sadly enough, being

Tuesday, March 3, 2020

The Story of Dido, Queen of Ancient Carthage

The Story of Dido, Queen of Ancient Carthage Dido (pronounced Die-doh) is known best as the mythical queen of Carthage who died for love of Aeneas, according to the Aeneid of Vergil (Virgil). Dido was the daughter of the king of the Phoenician city-state of Tyre. Her Phoenician name was Elissa, but she was later given the name Dido, meaning wanderer. Who Wrote About Dido? The earliest known person to have written about Dido was the Greek historian Timaeus of Taormina (c. 350-260 BCE). While Timaeuss writing did not survive, he is referenced by later writers. According to Timaeus, Dido founded Carthage as in either 814 or 813 BCE. A later source is the first-century historian Josephus whose writings mention an Elissa who founded Carthage during the rule of Menandros of Ephesus. Most people, however, know about the story of Dido from its telling in Virgil’s Aeneid. The Legend of Dido The legend tells us that when the king died, Didos brother, Pygmalion, killed Didos wealthy husband, Sychaeus. Then the ghost of Sychaeus revealed to Dido what had happened to him. He also told Dido where he had hidden his treasure. Dido, knowing how dangerous Tyre was with her brother still alive, took the treasure, fled, and wound up in Carthage, in what is now modern Tunisia. Dido bartered with the locals, offering a substantial amount of wealth in exchange for what she could contain within the skin of a bull. When they agreed to what seemed an exchange greatly to their advantage, Dido showed how clever she really was. She cut the hide into strips and laid it out in a semi-circle around a strategically placed hill with the sea forming the other side. Dido then ruled Carthage as queen. The Trojan prince Aeneas met Dido on his way from Troy to Lavinium. He wooed Dido who resisted him until struck by an arrow of Cupid. When he left her to fulfill his destiny, Dido was devastated and committed suicide. Aeneas saw her again, in the Underworld in Book VI of the Aeneid. The Legacy of Dido Didos story was engaging enough to become a focus for many later writers including the Romans  Ovid (43 BCE – 17 CE) and Tertullian (c. 160 – c. 240 CE), and medieval writers Petrarch and Chaucer. Later, she became the title character in Purcells opera Dido and Aeneas and Berliozs Les Troyennes. While Dido is a unique and intriguing character, it is unlikely that there was a historical Queen of Carthage. Recent archaeology, however, suggests that the founding dates suggested in historical documents could well be correct. The person named as her brother, Pygmalion, certainly did exist. If she were a real person based on this evidence, however, she could not possibly have met Aeneas, who would have been old enough to be her grandfather.

Sunday, February 16, 2020

Weekly reflection Essay Example | Topics and Well Written Essays - 2750 words

Weekly reflection - Essay Example Therefore, the goals of anyone who is studying business will be to be able to make viable decisions either as an employee, employer, or a manager in a business organization. Studying business enables someone to be of contribution to the economic growth and development of a country. My expectations at the beginning of this unit were that I would be able to understand the most important aspects of business operation and management. However, after going through this subject I am surprised that I was able to know more than I ever expected. Initially I used to imagine that business was all about the process of selling and buying. I never paid much attention to the external factors that might be of effect to the buying and selling processes. I was surprised to come to the realization that there are some underlying factors that influence day-to-day business activities. During the lectures I was able to develop some level of appreciation towards my lecturer and classmates. The lecturer would come and make sure that he explained every detail of the week’s coverage frequently giving us a chance to seek clarification. I would have trouble understanding some of the terms at the beginning, but was able to get conversant with them as time went by. The modules were of high help because they helped me in understanding some of the concepts that I might have not been able to understand in class. The modules sourced from MyBecket also proved to be high importance in understanding the subject. Business can be described as a way of dealing with scarcity. Given the fact that scarcity is a common problem, societies have to find ways through which they can deal with the problem. Business as a process involves inputs being transformed into outputs that are capable of satisfying the wants and needs of consumers. Inputs include things such as land, labour, materials, technology, finance, managerial skills, and many

Sunday, February 2, 2020

Willingness to Pay Essay Example | Topics and Well Written Essays - 250 words - 1

Willingness to Pay - Essay Example The contingent valuation methodology was adopted in drafting the questionnaires that were used in collecting the data to be used in the analysis. An approximate 72% of all the participants who responded to the questionnaires indicated willingness to pay for the conservation though at varying levels. This therefore pointed out that the public in many instances are willing to contribute towards the improvement of the quality of the environment. The study employed use of logistic regression procedures in comparison of the persons who were willing and not willing to contribute actively in improving the environmental quality. Through the contingent valuation analysis, the use value as well as non-use value of natural resources and environmental quality can be established. This method therefore involves a hypothetical scene to establish the willingness to pay of individuals on such natural resources and quality of environment. Hypothetical case studies are often used in such a situation where after describing such a case to the respondent, he/she is then expected to quote the amount of money he/she would be willing to pay for the environmental quality. Reasons expressed for willingness to pay would therefore form the basis of policymaking especially as regards to legislation on environmental conservation and management. In often cases such as was revealed through the case study, non-use values like existence value were cited most as reasons why many people would be willing to pay for conserving natural environment or such a natural park. This study therefore shows that valuation of gains from natural reso urces and environment would contribute greatly towards efforts and willingness of people to pay for such conservations. Han, F., Yang, Z., Wang, H., & Xu, X. (2011). Estimating willingness to pay for environment conservation: A contingent valuation study of kanas nature reserve, xinjiang, china. Environmental Monitoring and Assessment,

Saturday, January 25, 2020

Construct A Script By Using Scapy Computer Science Essay

Construct A Script By Using Scapy Computer Science Essay Wireless network generally can be defined as a network which is set up by using radio signal frequency to communicate among computers and other network devices. Wireless networks known as WiFi network or WLAN. As a network grows and expands wireless networks are extremely popular and easy to setup feature and no cabling involved. There are two main components to access the wireless network which are wireless router or access point and wireless clients. Wireless network normally used in 802.11a, 802.11b, 802.11g, and 802.11n standards protocol. Wireless network needs highly security to carry all kinds of confidential data which means at least enabling Wired Equivalent Privacy (WEP) on the access point. Without proper implementation of security measures, any wireless network adapter coming within the range can access the internet without permission. So, it will results in congestion and some of the authorized client cannot access the internet. So, this research will do wireless network auditing by sniffing some of the information within the access point and detect possible intrusions in Faculty of Computer and Mathematical Sciences. 1.1 Background Wireless network is a network which is setup by using radio signal frequency to communicate among multiple stations at one time. In addition, wireless network referred as WiFi network or WLAN. Although we have enable WEP encryption on the access point, there are still some weaknesses which can be easily crack by the users with the right equipment to crack. The attacker can sniff easily with several tools to crack the password to break in as unauthorized person. In order to verify the correct access point settings and detect intrusions in terms of security in wireless network, we construct the complete script to audit wireless networks. 1.2 Problem Statement Nowadays wireless network become a trend in communication. Each wireless system or access point was setup with certain policies. It is hard to verify whether each wireless access point setup correctly or not. Plus, nowadays we need to use many tools to verify the wireless access point status. Furthermore, most of network admin does not check back each wireless access point after its configuration. Moreover, we need some tools to identify the intrusions that come where they are try to access the Internet. Besides that, some of attackers send spoofing frame to try access the wireless network. So, we cannot identify the attackers MAC address. 1.3 Research Objectives The main objective of this project is: To construct a script by using Scapy To sniff and to find possible intrusion on wireless network related with wireless security. 1.4 Scope of the Research This project focuses in Faculty of Computer and Mathematical Sciences that has multiple access points which will enables to sniff all the information on wireless networks. We focuses on Data Link layer 2 to sniff the broadcast frame and identify possible intrusion. The main platform to run the tools:- Ubuntu10.10 We are use two main tools to construct the script which are:- Python2.6 Scapy 1.5 Significance of the Research This project is important to gain knowledge to construct the complete script by using Python2.6 and Scapy script. We can learn the easiest way by using this script with the shorter line compared to other script. This project also helps to learn 802.11 frame structure including beacon frame that has transmitted by the access point. 1.6 Organization of Thesis This project divided into 5 main chapters: Chapter 1: In this chapter, we discussed on the introduction generally of this topic. It includes problem statement, objectives, scope and significance of the research. Chapter 2: This chapter reviewed literature that relate to the topic with previous researches. We include the similar of related studies to our research. Chapter 3: In third chapter, we identify materials and methods that are described in methodology phases in order to get the desired information for the accomplishment of this research. Chapter 4: In fourth chapter, we discusses on the findings of the research. Chapter 5: Finally, the last chapter is focuses on the recommendations and suggestions where it will summarize the conclusion of the research. 1.7 Conclusion This introduction of this chapter had clearly explained the problem statement, objectives, scope, and significances of the research. This chapter gives a clear view of the overall content of the research. CHAPTER 2 LITERATURE REVIEW 2.0 Introduction This chapter examines the previous work done by prior researcher in the field of auditing wireless network, security of wireless network and any other related works. Section 2.1 discuss on main platform to install the tools. Section 2.2 discuss on the tools to be use to construct and run the script. Section 2.3 discuss on standard protocol fro wireless Lan(WLAN), IEE 802.11. Then, sections 2.4 discuss on frame for 802.11, 2.5 Wireless LAN components, 2.6 Wireless Network Sniffing, 2.7 reviews for the related works and lastly 2.8 Summarizations of Literature Reviews. 2.1 Platform 2.1.1 Ubuntu10.10 Ubuntu is a free operating system, developed by small team developers who are established Linux Debian projects. This free operating system was developed to facilitate the use of desktop linux, Ubuntu. It developed based on the Debian GNU/Linux distribution and distributed as free and open source software. Most Ubuntu packages are based on package from Debian. Both distributions are using Debians deb package format and package management tools, Apt and Synaptic. However, sometimes .deb packages need to be rebuild from source to be used in Ubuntu. Ubuntu have variant edition such as GNOME desktop, KDE edition, Kubuntu and server edition. In this project, we use Ubuntu 10.10 as our platform to run all the tools in it. 2.2 Tools 2.2.1 Python Python is the one of the programming language that can interpret in developing the applications such as web applications and integrate the system more effectively. Python can run on Windows, Linux/Unix, Mac OS X. All the Python programs can be packaged into stand-alone executable code for many using various tools. In this project, we use the latest version, Python2.6 tool to construct and run the complete script after install all the Python package in Ubuntu10.10. We use Python as a programming language because it is most powerful language and shorter to write the code than other languages. Compared to other programming languages, Python are readable syntax, intuitive object orientation, very high level dynamic data types, full modularity, supporting hierarchical packages and many more. 2.2.2 Scapy According to Philippe Biondi (2009), Scapy is a powerful interactive packet manipulation program from Python program that be able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery. For this project, we focused on 802.11 standard protocols. Scapy enable to sniff wireless network and generate the packet and can send it to the wireless network. 2.3 Wireless Protocol 2.3.1 IEEE 802.11 IEEE 802.11 is a standard protocol for wireless LAN (WLAN), which is uses RF technology to transmit and receive data over the air. Based on this standard protocol, it communicates between wireless client and a base stations or access point. There are several types of standard protocols which are 802.11a, 802.11b, 802.11g, and 802.11n. Here are briefly about types of standard protocols: 2.3.1.1 IEEE 802.11b IEEE 802.11b standard supports maximum bandwidth 11Mbps in 2.4 Ghz. The advantage of this protocol is lowest. Disadvantage using this protocol is lowest maximum speed because it may interfere if no determined the frequency band. 2.3.1.2 IEEE 802.11a 802.11a supports bandwidth up to 54 Mbps in 5 GHz. The advantage of this protocol is fast maximum speed. Disadvantage using this protocol is the cost is higher than IEE 802.11b 2.3.1.3 IEE 802.11g IEE 802.11g standard supports maximum bandwidth 54Mbps in the 2.4 GHz band in maximum range. The advantage is signal range is better with fastest maximum speed. Disadvantage using this protocol is higher cost than IEEE 802.11b. 2.3.1.4 IEEE 802.11n IEEE 802.11n is developed on previous IEEE 802.11 standards by adding MIMO. IEEE 802.11n offers high throughput wireless transmission at 100Mbps 200 Mbps. It is better performance compared with IEE 802.11g. 2.4 802.11 Frame 2.4.1 Frame header Each  frame  contains  a  standard  header  as  shown  in  Figure  2.1 Figure 2.1 Frame Header from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The  frame header  contains  all  the  information  needed  to  get  the  frame to  where  it  is  going  and  allow  the  receiver  to  understand  what message  the  frame  is  carrying. Frame Control FC contains control information used for defining the type of 802.11 MAC frame and providing information necessary. FC field as shown in Figure 2.2 Figure 2.2 Frame Control Field from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The details of frame control field as follows: Protocol Version Protocol Version provides the current version of the 802.11 protocol used. Type and Subtypes It is determines the function of the frame. There are three main different of type fields which are control, data and management and breaks into multiple subtypes. Three values of type field: 00 Management 01 Control 10 Data 11 Reserved/Unused Breaks into subtype field: 00/0000 Management/Association Request 00/1000 Management/Authentication 00/1100 Management/Deauthentication 01/1011 Control/Request To Send (RTS) 10/0000 Data/Data To DS and from DS Specify  the  addressing  type  of  the frame, either the frame is going to or exiting from the DS. More Fragments   Shows more fragments of the frame, either data or management type. Retry Retransmitted either data or management frame types. Power Management   shows whether the sending station is in active mode or power-save mode. More Data   shows to a station in power-save mode that the AP has more frames to send. It is also used for APs to show that additional broadcast/multicast frames are to follow. WEP   shows whether or not encryption and authentication are used in the frame. Order   Shows that all received data frames must be processed in order. Duration/ID Shows the remaining duration needed to receive the next frame transmission. Sequence Control (SEQ) SEQ used  for  fragmentation  and packet  reassembly. Frame body The frame body contains the data or information included in either management type or data type frames. Frame Check Sequence (FCS) The transmitting STA uses a cyclic redundancy check (CRC) over all the fields of the MAC header and the frame body field to generate the FCS value. 2.4.2 Beacon Frame Beacon frames are identified by the type field being set to 0 (Management Frame) and subtype of 8. Beacon frame are used by access point to advertise its presence and relay information, such as timestamp, SSID, and other parameters based on access point to radio NICs that are within range. Radio NICs continually scan all 802.11 radio channels and listen to beacons as the basis for choosing which access point is best to associate with. According to Robin Wood (2007), people  mostly believe that turning  off  beacons  will  hide  their  network  from  attacks  as  their SSID will no longer be broadcast. Unfortunately, SSID is transmitted in clear text in all management frames and when the network is hidden while there is no data being transmitted, attacker can collect a management frame they can find in network SSID. 2.5 Wireless LAN component 2.5.1 Access point Wireless access point (WAP) is a basically hardware equipment that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. In a wireless network, an access point sends and receives signals to any number of other, local wireless devices. These are usually adapters and routers. The WAP is commonly use in offices, homes and educational institutions. WAP devices use in IEEE 802.11 standards. 2.6 Wireless Network Sniffing Wireless Sniffer is captures the data on wireless network without being detected. Wireless network sniffing works in 802.11, Ethernet as the physical and data link layers which is able of reporting raw packets (RFMON support), which include any prism2 based card (Linksys, D-Link, Rangelan, etc), Cisco Aironet cards, and Orinoco based cards. Moreover, sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections. Sniffing wireless network usually used by the attackers to capture the data and get the appropriate information from the beacon frame. There are several techniques used to sniff the wireless network. Some of them are as follows:- Passive Scanning Passive scanning is the first steps used to sniff the wireless networks. It is turn to mode RF into monitor mode that allows every frame appearing on a channel to be copied as the radio of the station tunes to various channels. A station in monitor mode can capture packets without associating with an AP or ad-hoc network. When the transmission of the data in the form of radio waves starts the attackers can scan the whole data passively and carry on the sniffing process. The so-called promiscuous mode allows the capture of all wireless packets of an associated network. In this mode, packets cannot be read until authentication and association are completed. With the help of this data sniffer can easily decodes the secret information of the wireless networks. SSID Detection After scan the data transmitted, it can detect the list of service set identifier (SSID) in the particular wireless network. The SSID shown in the Beacon frames is set to null in the hope of making the WLAN invisible unless a client already knows the correct SSID.  When the Beacon displays a null SSID, there are two possibilities.   Eventually, an Associate Request may appear from a legitimate station that already has a correct SSID.   To such a request, there will be an Associate Response frame from the AP.   Both frames will contain the SSID in the clear, and the attacker sniffs these.   If the station wishes to join any available AP, it sends Probe Requests on all channels, and listens for Probe Responses that contain the SSIDs of the APs.   The station considers all Probe Responses, just as it would have with the non-empty SSID Beacon frames, to select an AP. Normal association then begins.   The attacker usually waits to sniff these Probe Responses and extract the SSIDs. Otherwise, if the beacon transmission is disabled, the attacker has two choices.   The attacker can keep sniffing waiting for a voluntary Associate Request to appear from a legal station that already has a correct SSID and sniff that SSID.   Collection of MAC addresses After detecting the SSID, sniffer now take steps to sniff the wireless network by collecting the required MAC addresses with the help of passive scanning and also with the help of different types of software. The collected of MAC address used for constructing spoofed frame by using specific tool. In wireless sniffing, there are some reasons why attacker collects all the MAC address. Some of the reasons are the attacker used sniffing to hide his or her identity and their access points. The other reason, access points used in collecting the MAC would not be registered. 2.7 Review of Previous Related Works 2.7.1 Author: David Maynor Title of Paper: Beginners Guide to Wireless Auditing (2006) This paper is a study of how to find the vulnerabilities in wireless devices drivers with specific techniques. The researcher discuss on how to build auditing environment, how to construct tools and finally how to interpret the results. On this paper, although this was done on Dell Latitude D610, the internal wireless card of the machine was not used. The researcher was used wireless card, Netgear WPN511 to set up auditing environment that is supported with madwifi drivers. The combination with LORCON (Loss Of Radio CONnectivity) ability to craft the packet from scratch. Moreover, after setting up the good environment with patch madwifi and LORCON, the researcher construct the script with Scapy to generate a simple frame and inject it. The researcher use Wireshark to see the packets injected. 2.7.2 Author: Shreeraj Shah Title of Paper: Secure Your Wireless Networks with Scapy Packet Manipulation (2007) According to Shreej Shah, Scapy is scriptable and easy to use compared with Kismet and Airodump-ng. This paper focused on intrusion detection by using proven techniques. There are two techniques can be employed which are passive sniffing and active packet injection. The researcher discussed only passive sniffing methodology. In this project, there are several steps are used in passive sniffing methodology as follows:- Set up a station for radio frequency (RF) monitor mode Sniff packets and discover network access points Discover hidden access points and SSID (service set identifier) Harvest MAC and IP addresses Perform ongoing intrusion detection with sniffing. 2.7.3 Author: Robin Wood, Robin and freedomsoftware.co.uk Title: Programming Wireless Security (2007) This paper discussed some programming techniques to build wireless security tools. The researchers construct the script by using Python and Ruby script. There are several techniques that are used by using both scripts including deauthentication attack, sniffing wireless traffic and automating a Four-Way- Handshake capture. All the techniques will be brought together to create an applications to automate capturing an EAPOL handshake which can used to crack the Pre-Shared Key. This paper required several tools including Lorcon, Pylorcon, ruby lorcon and Scruby. Moreover, it also discussed about several issues on Scruby which means Ruby scripts will not work properly as exactly required. 2.8 Summarizations of some Literature Reviews No Author Year Project Title Project Similarities and Differences 1. Peter Seebach 2005 Getting practical about wireless security, Part 1: Building a wireless sniffer with Perl In this paper, lightweight wireless sniffer was build that runs on open source software. This paper show to use open source software by getting information about on wireless network and identified the common security problem. 2. TJ OConnor 2010 Detecting and Responding to Data Link Layer Attacks In this paper, Scapy is used to examine network traffic for data link layer attacks with identifying signatures and anomalies on both wired and wireless networks. 3. Petter Clutterbuck, Terry Rowlands, Owen Seamons 2007 Auditing the Data Confidentiality of Wireless Local Area Networks This paper describes how the software auditing artefact uses on sampled data packets to product a very detailed evaluation of the level of data confidentiality in effect across the WLAN. 4. Mingzhe Li, Mark Claypool, and Robert Kinicki 2005 How to Build and Use an IEEE 802.11 Wireless Network Sniffer In this paper, wireless sniffer is built on computers with Linux operating systems and prism GT-based wireless interface cards. The operating systems tested are SUSE (Novell) Linux release 9.0/9.1/9.2/10.0 and Linux Fedora Core 3 where the kernel version can be either 2.4.x or 2.6.x. The wireless network interface cards, Netgear WG 511 version 1 PCMCIA card and Allnet ALL0271 54Mbit Wireless PCI adapter are used Table 2.1: Summarization of related Literature Review 2.9 Conclusion All the information gathered from this literature review is very useful in order to identify potential information that can make this research more relevant. By understanding the scenario of past implementation, it will give a better view on how to achieve these research objectives and also inspire new ideas to be implemented or added into this research. CHAPTER 3 METHODOLOGY 3.0 Introduction This chapter presents about the methodology being used as a guideline to ensure the project will operate successfully. Methodology consists of hardware, software and method that being used in this research. We need to choose proper hardware and software to meet the research requirement. Methodology is very important part to audit the wireless network with sequence of phases. We need to follow all this phases in order to accomplish the final project with achieving the objective. We divide the methodology of our project to several phases, where every phase will include the important activities and its significant to be done. 3.1 Methodology Phase In this project, there are four phases of method that followed properly. First phase is planning, second phase is development, third phase is testing, fourth phase is result and evaluation and the last phase is documentation. All the flow of the methodology phase will be implementing systematically and efficiently as its role is vital to ensure the process of finishing this project in time. These phases are illustrated in methodology overview in Figure 3.1(i) and Figure 3.1(ii). PLANNING DEVELOPMENT TESTING RESULT AND EVALUATION DOCUMENTATION Figure 3.1 Project Phase (i) Documentation Development Testing Result and Evaluation Planning Problem Assessment Preliminary study of Literature Install OS Install Python package Install Scapy package Construct script Run Scapy script Sniff a list of access point. Sniff Intrusion Detection Writing a report Project Scope Project Objective Project Planning Determine hardware and software used Scapy script completed Result finding Final report completed. Figure 3.1 Project Phase (ii) 3.2 Research Methodology 3.2.1 Planning For planning phase, the activity is to define the objective of project by identifying problem assessment and by preliminary study of literature review. The deliverable of this phase can identify research objective and scope and also project planning. It consists of: 3.2.1.1 Preliminary study of literature review The purpose is to understanding the similar or related project to be done. We need to review and get the idea on how it can be implemented and find the objective, scope and others benefit can get for the project requirement. This preliminary study can review by journals, online resource (internet), articles or book. USER ACCESS POINT USER SNIFF3.2.2 Development Diagram 3.1: Structure of research project 3.2.2 [a] Install operating system We install Ubuntu 10.10 with interactive Graphical User Interface (GUI) on the laptop. It is easier to update the latest package. All the latest package including Python will updated on Ubuntu10.10 [emailprotected]:~# sudo apt-get update 3.2.2 [b] Install tools We install Scapy in Python program where the Scapy is interactive manipulation program that can construct with the shorter script compared to the other script. We install Python program as a main programming language and resides the entire package in it. a. Install Python 2.6 package [emailprotected]:~# sudo apt-get install python [emailprotected]:~# cd /tmp [emailprotected]: /tmp# fetch http://www.secdev.org/projects/scapy/files/scapy-latest.tar.gz [emailprotected]: /tmp# tar xvzf scapy-latest.tar.gz [emailprotected]: /tmp# cd scapy-2.1.0 [emailprotected]: /tmp/scapy-2.1.0 # python setup.py install b. Install python-scapy package [emailprotected]:~# sudo apt-get install python-libpcap c. Install libpcap and libdnet and their Python wrappers. [emailprotected]:~# sudo apt-get install python-libdnet d. Install additional software for special features. [emailprotected]:~# sudo apt-get install tcpdump graphviz imagemagick python-gnuplot python-crypto python-pyx 3.2.2 [c] Construct the script We construct the script with Python program for sniffing and detect possible vulnerabilities. The script will run on Ubuntu 10.10 in root terminal. 3.2.3 Testing Testing phase, the action is to test by sniffing wireless network in an area by running the completed script. Before we run the script, we need to setting up the station for radio frequency (FR) in monitor mode. We illustrates the steps in Figure 3.2 Construct the script Setting up the station for Radio Frequency (RF) to monitor mode Script run Enter the command Get the data from acces point including:- Name of access point SSID channel Radio Type Security Type Signal Collect the data: Intrusion Detection including:- Discovering Rogue Access Point Discovering Dummy Access Point Figures 3.2 Steps for testing 3.2.4 Result and Evaluation In this phase, we come out with the result by running the script. We collect all the information about SSID, MAC address, channel, radio type, security type, signal from broadcast frame that send by multiple access point. Next, we can detect possible intrusion by running other script using a same scripting language. 3.2.5 Documentation In this final phase, all the results and findings will be included in one report. From the documentation, the researcher can determine whether the project achieve the objectives or not. 3.3 Hardware and Software Required To execute this project successfully, some requirement need to be accomplish. Some of the requirement will be involving hardware and software. Hardwares that will be required are: 3.3.1 Hardware This project will used laptop. Processor at least 1 Gigahertz of CPU speed. 3GB of RAM 250 Gigabyte of hard disk space Intel WiFi Link 5100 wireless network interface card Motherboard that support the processor Monitor Network cable 3.3.2 Software This project will be running on LINUX platform: Ubuntu 10.10 3.3.3 Tools Python2.6 Scapy 3.4 Conclusion As a conclusion, this chapter is very important to gather all related and relevant information required. All the information will be used in order to achieve the objectives of this research. CHAPTER 4 RESULTS AND DISCUSSIONS 4.0 Introduction This chapter discusses on the results gathered from this research, which is obtained by implementing the methods in Chapter 3. The result based on running completed script on Ubuntu10.10. It will display all the available information of access point actively in an area after sniffing it. Moreover we can detect all the possible intrusion with display the list of rogue access point and dummy access point. 4.1 Sniff the wireless network First of all we set up Radio Frequency (RF) into monitor mode which is in wlan0 interface. Next, we run the completed script that is already saved in root on Ubuntu 10.10 with the name of file, sniffap.py. Then, we open the root terminal by enter ./sniffap.py wlan0. The result has shown in Figure 4.1 Figure 4.1 Sniff Wireless Networks sniffap.py name of saved file wlan0 monitor mode interface CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.0 Introduction This final chapter discuss about the conclusion of this research. It also discusses the suggestions and recommendations that will help those who want to upgrade or refers to this project in the future. 5.1 Conclusion As you can see, having an effective wireless access policy is critical to the security of any organization that operates a wireless networks. Without appropriate policy, the attacker easily gain access the wireless networks. 5.2 Recommendation This project is hopefully can only use the fully script to get the data from the access point without purchase the tools. Moreover, the admin take the action to get access point more securely and get a better signal for client to access the Internet.

Friday, January 17, 2020

Educational Principles Essay

Jean Piaget’s theories continue to have a major impact on both teacher training and classroom practices. This essay will discuss the three educational principles derived from his theory and also discuss the limitations of preoperational thought from his point of view. The first educational principle is discovery learning. In this principle, children are encouraged to discover things for themselves by interacting with the environment (Berk, 2010). Teachers provide them with things that will promote development thru their imagination and exploration. By providing a variety of materials like art supplies, books, building blocks, musical instruments and more, teachers are offering opportunities to widen their creativity and enhance their learning (Berk, 2010). Through their exploring and thinking students are taking on an active role in their learning and knowledge building. According to Castronova (n. d), â€Å"Piaget was the first to show that children were not â€Å"empty vessels† to be filled with knowledge, but active builders of knowledge. With our current access to so much on the internet and through technology, there are many more opportunities for teachers to introduce children to discovery learning. Another principle is sensitivity to children’s readiness to learn. In this theory, teachers introduce new activities that build on their current skills while challenging their incorrect ways and allowing them to practice those new skills. They do not push them before they are ready (Berk, 2010). It is ok to allow children to experiment and search out answers for themselves. Teachers should assess and identify a child’s strengths and weaknesses. This is where Piaget saw the teachers as facilitators and there to guide the students (Ginn, n. d). Children need to make mistakes and be able to learn from them. The third educational principle is the acceptance of individual differences. Piaget’s theory assumes that children develop at different rates, but in the same sequence, so teachers must plan activities for small groups and individuals (Berk, 2010). This theory’s implication is that instruction should be adapted to the development level of the learner and that the content is consistent with that level of learning (Piaget, n. . ). A child needs to be compared to their own previous level of development. The limitations of preoperational thought from Piaget’s point of view are described by him as what they can’t understand (Berk, 2010). The term preoperational suggests that he compared them to older, more competent children (Berk, 2010). One of these limitations is egocentrism. Piaget assumes that the egocentric child assumes that other people see, feel, and hear exactly the same way that they do (Berk, 2010). This is responsible for animistic thinking that inanimate objects have lifelike qualities (Berk, 2010). Children also have the inability to conserve. That is, something stays the same in quantity even though it’s appearance changes. For example, two children have identical boxes of raisins, but when child 1 spreads their raisins on the table, child 2 is convinced that they have more (Berk, 2010). Preoperational children also have the inability to reverse steps. They can’t mentally go through steps in a problem and reverse direction to the starting point (Berk, 2010). Lastly, they have difficulty with hierarchical classification. This is the inability to organize objects into classes and subclasses based on their differences and similarities (Berk, 2010). In conclusion, according to McLeod (2010), Piaget drew a number of conclusions about the limitations of preoperational thought: (1) Understanding of these situations is ‘perception bound’. Child is drawn by changes in the appearance of the materials to conclude that a change has occurred. (2) Thinking is ‘centered’ on one aspect of the situation.  Child notices change in level of water or in length of clay without noticing that other aspects of the situation have changed simultaneously. (3) Thinking is focused on states rather than on transformations. Child fails to track what has happened to the materials and simply makes an intuitive judgment based on how they appear ‘now’. (4) Thinking is ‘irreversible’ in that the child cannot appreciate that a reverse transformation would return the material to its original state. Reversibility is a crucial aspect of the logical (operational) thought of later stages.

Thursday, January 9, 2020

Biography of Rafael Carrera - Rafael Carrera Profile

Guatemalas Catholic Strongman: Josà © Rafael Carrera y Turcios (1815-1865) was the first President of Guatemala, serving during the turbulent years of 1838 to 1865. Carrera was an illiterate pig farmer and bandit who rose to the presidency, where he proved himself a Catholic zealot and iron-fisted tyrant. He frequently meddled in the politics of neighboring countries, bringing war and misery to most of Central America. He also stabilized the nation and is today considered the founder of the Republic of Guatemala. The Union Falls Apart: Central America achieved its independence from Spain on September 15, 1821 without a fight: Spanish forces were more desperately needed elsewhere. Central America briefly joined with Mexico under Agustà ­n Iturbide, but when Iturbide fell in 1823 they abandoned Mexico. Leaders (mostly in Guatemala) then attempted to create and rule a republic they named the United Provinces of Central America (UPCA). Infighting between liberals (who wanted the Catholic Church out of politics) and conservatives (who wanted it to play a role) got the best of the young republic, and by 1837 it was falling apart. Death of the Republic: The UPCA (also known as the Federal Republic of Central America) was ruled from 1830 by Honduran Francisco Morazà ¡n, a liberal. His administration outlawed religious orders and ended state connections with the church: this enraged the conservatives, many of whom were wealthy landowners. The republic was mostly ruled by wealthy creoles: most Central Americans were poor Indians who did not care much for politics. In 1838, however, mixed-blooded Rafael Carrera appeared on the scene, leading a small army of poorly armed Indians in a march on Guatemala City to remove Morazà ¡n. Rafael Carrera: Carrera’s exact date of birth is unknown, but he was in his early to mid-twenties in 1837 when he first appeared on the scene. An illiterate pig farmer and fervent Catholic, he despised the liberal Morazà ¡n government. He took up arms and persuaded his neighbors to join him: he would later tell a visiting writer that he had started out with thirteen men who had to use cigars to fire their muskets. In retaliation, government forces burned down his house and (allegedly) raped and killed his wife. Carrera kept fighting, drawing more and more to his side. The Guatemalan Indians supported him, seeing him as a savior. Uncontrollable: By 1837 the situation had spiraled out of control. Morazà ¡n was fighting two fronts: against Carrera in Guatemala and against a union of conservative governments in Nicaragua, Honduras and Costa Rica elsewhere in Central America. For a while he was able to hold them off, but when his two opponents joined forces he was doomed. By 1838 the Republic had crumbled and by 1840 the last of the forces loyal to Morazà ¡n were defeated. The republic sundered, the nations of Central America went down their own paths. Carrera set himself up as president of Guatemala with the support of the Creole landowners. Conservative Presidency: Carrera was a fervent Catholic and ruled accordingly, much like Ecuador’s Gabriel Garcà ­a Moreno. He repealed all of Morazà ¡n’s anti-clerical legislation, invited the religious orders back, put priests in charge of education and even signed a concordat with the Vatican in 1852, making Guatemala the first breakaway republic in Spanish America to have official diplomatic ties to Rome. The wealthy Creole landowners supported him because he protected their properties, was friendly to the church and controlled the Indian masses. International Policies: Guatemala was the most populous of the Central American Republics, and therefore the strongest and wealthiest. Carrera often meddled in the internal politics of his neighbors, especially when they tried to elect liberal leaders. In Honduras, he installed and supported the conservative regimes of General Francisco Ferrara(1839-1847) and Santos Guardiolo (1856-1862), and in El Salvador he was a huge supporter of Francisco Malespà ­n (1840-1846). In 1863 he invaded El Salvador, which had dared to elect liberal General Gerardo Barrios. Legacy: Rafael Carrera was the greatest of the republican era caudillos, or strongmen. He was rewarded for his staunch conservatism: the Pope awarded him the Order of St. Gregory in 1854, and in 1866 (a year after his death) his face was put on coins with the title: â€Å"Founder of the Republic of Guatemala.† Carrera had a mixed record as President. His greatest achievement was stabilizing the country for decades at a time when chaos and mayhem were the norm in the nations surrounding his. Education improved under the religious orders, roads were built, the national debt was reduced and corruption was (surprisingly) kept to a minimum. Still, like most republican-era dictators, he was a tyrant and despot, who ruled mainly by decree. Freedoms were unknown. Although it is true that Guatemala was stable under his rule, it is also true that he postponed the inevitable growing pains of a young nation and did not allow Guatemala to learn to rule itself. Sources: Herring, Hubert. A History of Latin America From the Beginnings to the Present. New York: Alfred A. Knopf, 1962. Foster, Lynn V. New York: Checkmark Books, 2007.

Wednesday, January 1, 2020

The Invention of Radio Technology

Radio owes its development to two other inventions: the telegraph and the telephone.  All three technologies are closely related, and radio technology actually began as wireless telegraphy. The term radio can refer to either the electronic appliance that we listen with or to the content that plays from it. In any case, it all started with the discovery of radio waves—electromagnetic waves that have the capacity to transmit music, speech, pictures, and other data invisibly through the air. Many devices work by using electromagnetic waves, including radios, microwaves, cordless phones, remote controlled toys, televisions, and more. The Roots of Radio Scottish physicist  James Clerk Maxwell first predicted the existence of radio waves in the 1860s. In 1886, German physicist  Heinrich Rudolph Hertz demonstrated that rapid variations of electric current could be projected into space in the form of radio waves, similar to light waves and heat waves. In 1866, Mahlon Loomis, an American dentist, successfully demonstrated wireless telegraphy. Loomis was able to make a meter connected to a kite cause a meter connected to another nearby kite to move. This  marked the first known instance of wireless aerial communication. But it was Guglielmo Marconi, an Italian inventor, who proved the feasibility of radio communication. He sent and received his first radio signal in Italy in 1895. In 1899, he flashed the first wireless signal across the English Channel, and two years later received the letter S, which was telegraphed from England to Newfoundland (now part of Canada). This was the first successful transatlantic radiotelegraph message. In addition to Marconi, two of his contemporaries,  Nikola Tesla and Nathan Stubblefield, took out patents for wireless radio transmitters. Nikola Tesla is now credited with being the first person to patent radio technology. The Supreme Court overturned Marconis patent in 1943 in favor of Teslas. The Invention of Radiotelegraphy Radiotelegraphy is the sending by radio waves of the same dot-dash message (Morse code) used by telegraphs. Transmitters, at the turn of the century, were known as spark-gap machines. They were developed mainly for ship-to-shore and ship-to-ship communication. This form of radiotelegraphy allowed for simple communication between two points. However, it was not public radio broadcasting as we know it today. The use of wireless signaling increased after it was proved to be effective in communication for rescue work at sea. Soon a number of ocean liners even installed wireless equipment. In 1899, the United States Army established wireless communications with a lightship off Fire Island, New York. Two years later, the Navy adopted a wireless system. Up until  then, the Navy had been using visual signaling and homing pigeons for communication. In 1901, radiotelegraph service was established between five Hawaiian Islands. In 1903, a Marconi station located in Wellfleet, Massachusetts,  carried an exchange between President Theodore Roosevelt and King Edward VII. In 1905, the naval battle of Port Arthur in the Russo-Japanese war was reported by wireless. And in 1906, the U.S. Weather Bureau experimented with radiotelegraphy to speed up notice of weather conditions. Robert E. Peary, an arctic explorer, radiotelegraphed  I found the Pole in 1909. A year later, Marconi established regular American-European radiotelegraph service, which several months later enabled an escaped British murderer to be apprehended on the high seas. In 1912, the first transpacific radiotelegraph service was established,  linking San Francisco with Hawaii. Meanwhile, overseas radiotelegraph service developed slowly, primarily because the initial radiotelegraph transmitter was unstable and caused a high amount of interference. The Alexanderson high-frequency alternator and the De Forest tube eventually resolved many of these early technical problems. The Advent of Space Telegraphy Lee de Forest was the inventor of space telegraphy, the triode amplifier, and the Audion, an amplifying vacuum tube. In the early 1900s, the development of radio was hampered by the lack of an efficient detector of electromagnetic radiation. It was De Forest who provided that detector. His invention made it possible to amplify the radio frequency signal picked up by antennae. This allowed for the use of much weaker signals than had previously been possible. De Forest was also the first person to use the word radio. The result of Lee de Forests work was the invention of amplitude-modulated or AM radio, which allowed for a multitude of radio stations. It was a huge improvement over the earlier spark-gap transmitters. True Broadcasting Begins In 1915, speech was first transmitted by radio across the continent from New York City to San Francisco and across the Atlantic Ocean. Five years later, Westinghouses KDKA-Pittsburgh broadcasted  the Harding-Cox election returns and began a daily schedule of radio programs. In 1927, commercial radiotelephony  service linking North America and Europe was opened.  In 1935, the first telephone call was made around the world using a combination of wire and radio circuits. Edwin Howard Armstrong  invented frequency-modulated or FM radio in 1933. FM improved the audio signal of radio by controlling the noise static caused by electrical equipment and the earths atmosphere. Until 1936, all American transatlantic telephone communication had to be routed through England. That year, a direct radiotelephone circuit was opened to Paris. In 1965, the first Master  FM Antenna system  in the world, designed to allow individual FM stations to broadcast simultaneously from one source, was erected on the Empire State Building in New York City.