Tuesday, August 6, 2019

Re-organization and Layoff Team Discussion & Summary Essay Example for Free

Re-organization and Layoff Team Discussion Summary Essay Mismanaged layoffs can go horribly wrong. The effect of mismanaged LAYOFFs on the remaining workforce and the effects, lack of management preparation, the human condition, and lack of mitigation strategies. We think that the problem with this article is that not enough managers or HR personal, know how to let a person go from their employment effectively. They sometimes dont realize the impact that it has on the other employees morals. Also, that sometimes companies dont take a closer look to make sure downsizing will be the answer to cutting costs like they think that it will. Every HR or manager should be let go in their lifetime so that they know what it feels like. I believe that this statement holds tremendous merit because the best lessons in life are learned through personal experience. In order to adequately communicate life changing messages of sorts, it should be done by a seasoned manager. I will be very surprised if any company has a potential layoff learning path that will coach and train the management staff for these kinds of things. It is imperative to be sensitive to the individual being laid off as this will impact their livelihood significantly. I do agree that other options much is explored such as relocating or wage cuts before making the decision to lay off people. The Problem Layoffs create uncertainty in the workforce causing loss of productivity in remaining the remaining workforce. The article addresses that a managers approach is paramount; we dont disagree with this sentiment, but I dont see it as a large of an issue as the author of the article. If a company is at a point where they are laying off employees, all other options should have been exhausted. The author writes the article from the position that managers dont know how manage and that layoff are ineffective. I agree layoffs are not useful, but an amount of respect or approach refinement is  going to make the loss of income any easier; I compare that to putting lipstick on a pig. Trying to make a bad situation easier is often more disrespectful than being direct. Firing is something that is done privately and should be kept confident between the manager and the employee being let go. If a manager is letting, someone go for the right reasons the example should be evident to the employees as cause and effect; being held accountable for their actions. If the Manager is abusing their hiring/firing authority that would affect employee morale; forced silence, uncertainty, etc. Problem Solutions The options that were covered in the group discussion I feel very informative. When it comes to releasing someone, whether it is a termination or a layoff, it was discussed if training for those types of situations would be suitable, or if one could even prepare to carry out something of that delicate nature. You can train someone how to do anything, but that does not necessarily mean it will be conducted in the manner it was taught. I think it all highly depends on the situation and the individual who is delivering the news to the employee. The authors best point is one of the best solutions; transparency. Managers should allow people the autonomy of reacting, working through, and coping with a layoff in their own way. Transparency is the most respectful approach that management can take as it shows them the truth of the situation and explains the steps being taken and why. I would add rather than trying to find another position within the company as suggested (the company is already struggling!?) they could offer employment assistance to other enterprises; communicate with other organizations in the same industry to identify openings that people would fit into well. They could put together a communications package that shows them what benefits are available, assistance programs, etc.

Monday, August 5, 2019

Network User Problems

Network User Problems Tiago Garcia Mourà £o (13265) a) Credential, Permission and Rights Problems The user can have this kind of problem when tries to access/alter a host, folder or document and is not able to because they cannot log in, or they do not have that permission. Network Performance If the user or LAN administrator wants to use a wireless connection, it will drastically impact the network communication. This happens because today home-based wireless systems will not produce more than about 54-100 Mbps of transfer. And using a hub instead of a network switch can cause major issues with speed and latency, which means low performance network. TCP/IP Conflicts There are many reasons why this can be an issue, but the most common happens when at least two devices are trying to use the same IP address in the same network. b) By the morning, an user that works in a company, tries to logon into the Windows operational system using the network credentials given by the Network Administrator. But he gets the following error: The relationship between this device and the domain failed. The user tries to restart the computer and logon again, but gets the same error. c) Network Performance If you are using a corporate network, make sure that you are not streaming or downloading music, video or whatever else while working. By doing that, you will be impacting the network performance and like it will make IP phone calls and file sharing, per example, really slow. The Network Administrator has to find a way to lock down this kind of problems, like blocking music/video streaming and files downloads. TCP/IP Conflicts When the Network Administrator faces problems like IP conflicts into the network, the easiest way to fix it would be releasing and renewing the device IP and try to use it again. d) Knowledge base form Name of the company TGM Inc Clients Name Ilson Neves Date and time 01/12/2015 2:50 PM Problem Detail: Users are complaining about devices IP conflicts every day during the usual work. Signature Tiago Garcia Mourà £o Date 01 12 2015 Name of the technician Tiago Garcia Mourà £o Date and Time 02/12/2015 9:30 AM Service Hours 2 hours Proposed Solution Release and renew the IP address in every device and then, check the router in order to adjust the number of available IPs. Signature Tiago Garcia Mourà £o Date 02 12 2015 Resource N/A Costs NZD 200,00 Procedure Personnel I accessed the CMD in every computer and enter the commands ipconfig /release and ipconfig /renew. Then, I checked that the internet connection was working properly in every single device. Then, I checked that the amount of devices accessing the network was smaller than the amount of IPs available. Signature Tiago Garcia Mourà £o Date 03 12 2016 Company contact Address 50, Queen St Information Phone 05 0976394 Website www.tgm.co.nz 1.2 Fileserver problems: a) File Sharing One of the most common problems related to fileservers is file sharing. When users try to access the folder/document in the server, they can get errors like Not authorized access or The file is being used. Data Backup An important action related to fileservers is the backup. The most of companies have files that need to be accessed many times per day and by different users, no matter what. b) A company user created a shared folder on the network to allow other department users read and edit documents. After adding these documents, other users tried to open the documents, but they got the following error: Windows cannot access the document. You do not have the permission to access the document. Contact your Network Administrator to request access. The users restarted the PCs and tried to access the documents again, but still got the same error. c) File Sharing If the users cannot access shared folders or alter shared folders, the Network Administrator has to check the reason. The first step is checking if the folder/file owner has shared it. Otherwise, only him will be able to access it. If it have been done, the next step is checking if the file is being used by another user. After that, the folders/files have to be available for the allowed users in the network. Data Backup If the server crashes or the file is deleted by mistake, the Network Administrator has to get the last backup version as soon as possible, no matter what. d) Knowledge base form Name of the company MG Enterprise Clients Name Carlos Silva Date and time 01/09/2016 4:30 PM Problem Detail: Users are complaining that they cannot access or alter any folders or files into the fileserver. Signature Tiago Garcia Mourà £o Date 01 09 2016 Name of the technician Tiago Garcia Mourà £o Date and Time 02/09/2016 7:30 AM Service Hours 3 hours Proposed Solution Check the fileserver configuration, the folders/files sharing status and the list of allowed users. Signature Tiago Garcia Mourà £o Date 02 09 2016 Resource N/A Costs NZD 300,00 Procedure Personnel First, I tried to access the folder and files into the fileserver using the users PC. I got the same permission error in every single PC. Then, I went to the data center and checked that the fileserver IP was configured properly. Then, I checked that the folders and files sharing option were OK. And the last step was include all the desired users to the sharing list. After that, I tested all the PCs and all of them were able to access the folders and files. Signature Tiago Garcia Mourà £o Date 03 09 2016 Company contact Address 5, Welesley St Information Phone 07 9845672 Website www.mgenterprise.co.nz 1.3 Performance issues: a) Wireless Apart of wired connection, the wireless connection can subject your connection to variable conditions. Because of that, the data delays can bring the transfer performance down. Memory (RAM) The data transfer over the network does not need much system memory usage, but can affect the performance of other OS components. If the system memory is too low, the system has to access the HD more often, and the writing/reading disk performance will be low as well. b) Every week a company leaders need to make a videoconference with another branch for a brainstorm. Both branches use Skype for it, but they are having some problems related to the network. The connection is very slow and the call crashes, even if the computer is connected to the internet using the wire. c) Memory (RAM) In order to increase the network data transfer, the user can add more RAM memory to the laptop/PC, making the writing/reading disk faster and avoiding the HD access. Wireless If the user wants to increase the wireless connection performance, the best ways would be getting closer to the Access Point to get a high quality connection or buying a better Access Point, if possible to support more users at the same time. d) Knowledge base form Name of the company GT Ltd Clients Name Bruno Souza Date and time 01/02/2017 8:50 AM Problem Detail: The users are complaining that the wireless connection is too slow and sometimes crashes. Signature Tiago Garcia Mourà £o Date 01 02 2017 Name of the technician Tiago Garcia Mourà £o Date and Time 02/02/2017 4:30 PM Service Hours 5 hours Proposed Solution Check the distance between the Access Point and users; and if it supports the amount of users at the same time. Signature Tiago Garcia Mourà £o Date 02 02 2017 Resource N/A Costs NZD 500,00 Procedure Personnel Using different users laptops, I could see that some users had wireless signal was too poor. To those users who got good signal, I checked the internet access speed. It was extremely slow and crashing several times. Checking the amount of users and APs, I told the IT manager that the problem was that the company needs more APs to spread the signal and to support the amount of users. After installing and configuring some new APs, all the users have fast wireless connection. Signature Tiago Garcia Mourà £o Date 03 02 2017 Company contact Address 10, Quay St Information Phone 09 9756729 Website www.gt.co.nz 2.1 Identify and list any 5 network monitoring tools: Nagios One of the best known free tool. The most important part of the tool is the core and it allows you to build plugins to monitor particular elements. It has a large-scale use. Zenoss This software was created to monitor server, storage, applications, networks and virtual servers. Monitis Focused on small or medium-sized companies, this application can arise as a great network tool. Pandora FMS Its capable of monitoring over 10,000 nodes and monitors servers, networks and applications. It has many alerts, reports and third party integrations, etc. Its network autodiscovery system can find all the network elements in a short time. Zabbix Its known for being easy to configure and for having a very powerful GUI. It has agentless monitoring service can monitor up to 10,000 nodes without performance issues. 2.2 Install network monitoring tools: According to the figure below, during an average websites usage at 3PM, the total traffic size was 4.24MB, the transfer rate was 136.942Kbps and the packets amount was 9,384 (474.000 bytes): (Figure 01: Capsa Free software Summary tab) (Figure 02: Capsa Free software Dashboard tab) After few minutes, a new Youtube tab was opened at 3:03 PM and then the total traffic size was 35.15MB, the transfer rate was 531.204Kbps and the packets amount was 50,292 (732.000bytes), according to the figure below: (Figure 03: Capsa Free software Summary tab) (Figure 04: Capsa Free software Dashboard tab) 2.3 Analyse the bandwidth information: According to the figures above, the usage of network didnt reach its limits. The maximum usage that it reached during the tests was 0.053% of the bandwidth. 2.4 Explain different techniques for LAN performance: Watch everything Users often complain about the network performance, but the most of times, the network has nothing to do with it. One of the best techniques to improve the LAN performance is monitor everything, from network latency and throughput, to CPU and RAM utilization. Monitoring the switches and routers, the network error rates and configuring some logfiles alerts will make the network faster. Know your apps The network is always being consumed by the applications. Even being hard to see exactly what is going on, is possible observing their effects on the infrastructure. The best way to keep your network performance is testing the software in a testing environment before purchasing/installing it in the infrastructure and check the amount of resources is being used. 3.1 Identify and explain security exposures and violations: Former Employees Attacks coming from inside the network are one of the biggest threats to a corporate network. Former employees, especially from IT department, that have the networks, admin accounts and data centers access can spread/sell this information or even hack the company. Careless Employees An employee that forgets files or the cellphone/laptop inside a taxi cab or on a restaurant table could allow a malicious person to use this information or sell it to competitor companies. 3.2 Determine the possible solutions for the CVE: Former Employees In order to avoid this kind of danger, when an employee is about to be dismissed, the Information Security Analyst or the Network Administrator has to fill out a form describing all the access rights to be revoked(systems, servers, data centers, etc) and ask to an analyst do it. Careless Employees Information stealing is one of the most dangerous ways to get corporate information leaked. To avoid it, employees must look after classified documents, cellphones, laptops, etc and keep it safe. Electronic devices must have passwords, per example. 4.1 The sender in a LAN sends 10110110; a hacker alters the data and the receiver receives 10100110. As a network expert analysis to find out the position of error bit: 4.2 Analysis a 10 bit sequence 1010011110 and a divisor of 1011: Viper Plagiarism Scanner Report Data Expedition, I. (s.d.). Data Expedition, Inc. Fonte: Data Expedition Inc: http://www.dataexpedition.com/support/notes/tn0009.html Kosse, T. (s.d.). Tim Kosse. Fonte: https://ftptest.net/: https://ftptest.net/Help Prigge, M. (1 de June de 2010). IDG Communications, Inc. Fonte: InfoWorld: http://www.infoworld.com/article/2627174/network-monitoring/10-tips-for-boosting-network-performance.html Schiff, J. L. (20 de January de 2015). IDG Communications, Inc. Fonte: CIO: http://www.cio.com/article/2872517/data-breach/6-biggest-business-security-risks-and-how-you-can-fight-back.html Shimonski, R. J. (3 de November de 2009). TechGenix Ltd. Fonte: WindowsNetworking.com: http://www.windowsnetworking.com/articles-tutorials/common/Top-5-Networking-Issues-Windows-Clients.html Steve. (2 de January de 2017). Pandora FMS Team. Fonte: Pandora FMS: https://blog.pandorafms.org/network-monitoring-tools/#comparison

Sunday, August 4, 2019

Teen Crime :: essays research papers

How safe are teens wherever they go? Despite many people's attempts, teen violence is something that hasn't completely come to an end. Recently, 59% of students in grades six through twelve knew where to get a gun if they wanted one, according to the Harvard School of Public Health. The U.S. Surgeon General shows that each year, students spend $5.5 billion on alcohol, perhaps the cause of many violent crimes committed by them. Northeastern University's College of Criminal Justice reports that from 1985 to 1993, murders committed by people between the ages of 14-17 increased 165%. Certain adult crimes on the other hand, have decreased. There are many organizations out there that help prevent teen violence, some which include the National Alliance For Safe Schools, Mothers Against Teen Violence, The National Coalition Against Domestic Violence, and more. Is there anything else though, that we can do to prevent teen violence from escalating to an even higher level? The numbers are getting bigger and bigger. Since 1985, murder arrests of teens have jumped up 92%. In the year 2000, 2,369,400 youth arrests were made. Many which included violence towards others. In 2005, out of the 36,000,000+ inhabitants we have here in California, 2,503 were charged for murder, 9,392 for forcible rape, 114,661 for aggravated assault, and 692,467 for theft. Although crime here in California isn?t as high as it was around the ?90s, it is slowly increasing through the years. Statistics show that something needs to be done. Increasing crime varies on crime type. For instance, between 2000-2004, Larceny has increased. Also, from 1999-2005 vehicle theft and burglary have increased dramatically. On the other hand, forcible rape in recent years is slowly decreasing. This goes to show that crime is unpredictable. It can look as if it is being prevented for a while, and suddenly increase, touching lives everywhere in a negative way. By 1991, crime rate was 313% the 1960 crime rate. Chances of being a victim of crime in 1960 were 1.89%, where in 1996, the chances of being a victim raised to 5.079%. Overall, crime is increasing. It can be local, or even across the nation, but we know that it is there and is on the rise. Approximately 5% of the U.S. population are victims of crime each year. That?s around 13 million people and is unacceptable. But out of all these crimes committed, which ones are of adults and which ones are of teens? Teen Crime :: essays research papers How safe are teens wherever they go? Despite many people's attempts, teen violence is something that hasn't completely come to an end. Recently, 59% of students in grades six through twelve knew where to get a gun if they wanted one, according to the Harvard School of Public Health. The U.S. Surgeon General shows that each year, students spend $5.5 billion on alcohol, perhaps the cause of many violent crimes committed by them. Northeastern University's College of Criminal Justice reports that from 1985 to 1993, murders committed by people between the ages of 14-17 increased 165%. Certain adult crimes on the other hand, have decreased. There are many organizations out there that help prevent teen violence, some which include the National Alliance For Safe Schools, Mothers Against Teen Violence, The National Coalition Against Domestic Violence, and more. Is there anything else though, that we can do to prevent teen violence from escalating to an even higher level? The numbers are getting bigger and bigger. Since 1985, murder arrests of teens have jumped up 92%. In the year 2000, 2,369,400 youth arrests were made. Many which included violence towards others. In 2005, out of the 36,000,000+ inhabitants we have here in California, 2,503 were charged for murder, 9,392 for forcible rape, 114,661 for aggravated assault, and 692,467 for theft. Although crime here in California isn?t as high as it was around the ?90s, it is slowly increasing through the years. Statistics show that something needs to be done. Increasing crime varies on crime type. For instance, between 2000-2004, Larceny has increased. Also, from 1999-2005 vehicle theft and burglary have increased dramatically. On the other hand, forcible rape in recent years is slowly decreasing. This goes to show that crime is unpredictable. It can look as if it is being prevented for a while, and suddenly increase, touching lives everywhere in a negative way. By 1991, crime rate was 313% the 1960 crime rate. Chances of being a victim of crime in 1960 were 1.89%, where in 1996, the chances of being a victim raised to 5.079%. Overall, crime is increasing. It can be local, or even across the nation, but we know that it is there and is on the rise. Approximately 5% of the U.S. population are victims of crime each year. That?s around 13 million people and is unacceptable. But out of all these crimes committed, which ones are of adults and which ones are of teens?

Saturday, August 3, 2019

Canada and Mexicos Viewpoints of NAFTA :: Free Trade Agreements Foreign Affairs Essays

Canada and Mexico's Viewpoints of NAFTA When the Canada/U.S. free trade agreement came into effect, the Mexican's were very impressed by the provision and opportunities that opened for both sides. Mexico then approached the U.S., seeking to form a similar agreement with them. This brought forth a new issue in Canada, should they let Mexico and the U.S. form an agreement without them? Or should they participate, thus transforming their deal with the U.S. into a trilateral agreement including Mexico.   Ã‚  Ã‚  Ã‚  Ã‚  On June 12, 1991, the trade ministers of Canada, the United States and Mexico met in Toronto to open negotiations for a North American Free Trade Agreement (NAFTA). This was an historic occasion. For the first time ever, a developing country agreed to sit down with two industrial countries to craft an agreement that would open its economy to full competition with the other two countries. If successful, the agreement promised to make the whole North American continent into one economic zone and set an important precedent for trade and economic cooperation between the wealthy countries of the North and less developed countries of the South. The challenge before them was both exciting and daunting.   Ã‚  Ã‚  Ã‚  Ã‚  A little more than a year later, the three trade ministers met again in Washington, to put the finishing touches on a new North American Free Trade Agreement. In just over a year the negotiators from the three countries had successfully met the challenge and put together a new trading frame work for North America. The North American Free Trade Agreement (NAFTA) was set to be implied.   Ã‚  Ã‚  Ã‚  Ã‚  The North American Free Trade Agreement often raises questions regarding the new economic trading blocs around the world. The twelve-nation European Community (EC), a Central American free trade zone, and a four-nation South American group, as well as preliminary discussions regarding an Asian trading bloc, all point to the fact that new economic realities already exist. NAFTA promises to have a major impact on the people in all three nations. There will obviously be short-term costs of adjustment, which will certainly hit some industries, regions, and workers harder than others. There will be definite winners in the agreement, and definite losers in the agreement. There even might be disputes. Whether as workers, investors, consumers, or ordinary citizens in all three countries they may be affected. The final verdict on the North American Free Trade Agreement, may in fact not fully be realized for many weeks, months, or even years. However, in the following essay, the advantages to both Mexico and Canada will be analyzed, as well as the disadvantages to Mexico. It is safe to say that the advantages clearly outweigh the

Friday, August 2, 2019

Dreyers Vampyr Essay -- essays research papers fc

Vampyr doesn't play like a horror, or even a suspense film, though there are a few scenes of each. Instead it is a mystery, with information gradually given to the audience. The plot follows an aimless young man, a devotee of the occult, who visits an inn where numerous odd people are about. There is little talking as Dreyer is a visual story teller. Vampyr is the kind of film where dialogue like "the wounds have almost healed" and "why does the doctor only come at night" are given without explanation. We make sense of what is going on as he starts to piece together what is happening and who is causing it. Dreyer effectively establishes a mood by use of shadows of objects and people. The leading actor remains a cipher; if this was a book, it would be entirely in the passive voice. Things happen to the characters; they don't initiate actions (which on initial viewing seem unrelated). The film picks up when a man leaves a book in a room- "to be opened after my death." He is killed and the book is about vampires. Vampire mythology was less well known to audiences than now, and while a Hollywood film would have used dialogue to explain, Dreyer relies on exposition pages from the book. Dreyer frequently shows actions by shadows cast by the characters we already know. This fits with the film's style of indirection with plot by inference rather than by direct narrative. The film is filled with memorable images: a skull turning to watch; a shadow walking over to join its subject sitting in repose; point-of-view filming from inside a glass-topped coffin as the lid is nailed down and then carried out to the churchyard for burial. The story goes that the first few days of filming was damaged by a light leak in the camera, but Dreyer liked the effect so much that he had the rest of the film photographed to match. As a result, the image quality on this picture has never been as pristine as a film from the 1932 could look. Rudolph Mate was one of the finest cinematographers in Europe, and we can be sure that the photography looks exactly as Dreyer wanted it- the sense of a dimly remembered dream. Amidst the fogginess, shots of machinery in a mill are as sharp as a tack. Of special note is that the horror is created, in large part, by suggestion rather than a heavy sledgehammer approach, In the most famous sequence of the film, the man d... ...0 years ago. The film is not so horrific as it is lyrically creepy. There are so many famous images from "Vampyr" which are found in most film history books. I've seen many stills from this film and found that the movie is still full of other images which are just as striking as the famous shot of the vampire looking into the hero's coffin during a nightmare. The camera is rarely if ever stationary. There are many tracking shots which must have been an influence on Scorsese. People enter and leave the shot which may travel from outside and through several rooms of the house. All of this makes the movie fly by as there is little or no static in the movie. "Vampyr" challenges the conventions of movie making. It also challenges the viewer. The small indie film maker would do well to get this film and study it frame by frame. Many lessons on how to stretch the boundaries of the artform are on display. It is ironic that nearly 70 years later, not many filmmakers have achieved what Dreyer did with primitive technology. "Vampyr" is a groundbreaking work of art which should be on everyone's must see list. Works Cited: me, I. Belly busting. (London: 1994.) Dreyer's Vampyr Essay -- essays research papers fc Vampyr doesn't play like a horror, or even a suspense film, though there are a few scenes of each. Instead it is a mystery, with information gradually given to the audience. The plot follows an aimless young man, a devotee of the occult, who visits an inn where numerous odd people are about. There is little talking as Dreyer is a visual story teller. Vampyr is the kind of film where dialogue like "the wounds have almost healed" and "why does the doctor only come at night" are given without explanation. We make sense of what is going on as he starts to piece together what is happening and who is causing it. Dreyer effectively establishes a mood by use of shadows of objects and people. The leading actor remains a cipher; if this was a book, it would be entirely in the passive voice. Things happen to the characters; they don't initiate actions (which on initial viewing seem unrelated). The film picks up when a man leaves a book in a room- "to be opened after my death." He is killed and the book is about vampires. Vampire mythology was less well known to audiences than now, and while a Hollywood film would have used dialogue to explain, Dreyer relies on exposition pages from the book. Dreyer frequently shows actions by shadows cast by the characters we already know. This fits with the film's style of indirection with plot by inference rather than by direct narrative. The film is filled with memorable images: a skull turning to watch; a shadow walking over to join its subject sitting in repose; point-of-view filming from inside a glass-topped coffin as the lid is nailed down and then carried out to the churchyard for burial. The story goes that the first few days of filming was damaged by a light leak in the camera, but Dreyer liked the effect so much that he had the rest of the film photographed to match. As a result, the image quality on this picture has never been as pristine as a film from the 1932 could look. Rudolph Mate was one of the finest cinematographers in Europe, and we can be sure that the photography looks exactly as Dreyer wanted it- the sense of a dimly remembered dream. Amidst the fogginess, shots of machinery in a mill are as sharp as a tack. Of special note is that the horror is created, in large part, by suggestion rather than a heavy sledgehammer approach, In the most famous sequence of the film, the man d... ...0 years ago. The film is not so horrific as it is lyrically creepy. There are so many famous images from "Vampyr" which are found in most film history books. I've seen many stills from this film and found that the movie is still full of other images which are just as striking as the famous shot of the vampire looking into the hero's coffin during a nightmare. The camera is rarely if ever stationary. There are many tracking shots which must have been an influence on Scorsese. People enter and leave the shot which may travel from outside and through several rooms of the house. All of this makes the movie fly by as there is little or no static in the movie. "Vampyr" challenges the conventions of movie making. It also challenges the viewer. The small indie film maker would do well to get this film and study it frame by frame. Many lessons on how to stretch the boundaries of the artform are on display. It is ironic that nearly 70 years later, not many filmmakers have achieved what Dreyer did with primitive technology. "Vampyr" is a groundbreaking work of art which should be on everyone's must see list. Works Cited: me, I. Belly busting. (London: 1994.)

Airport Security: How the Use of Full-Body Scanners and Other Security Measures at Airports Are Problematic

Introduction Security is the freedom from danger and risk, which provides one with complete satisfaction and safety. Full-body scanners have been in use for various health reasons, but have recently started to be utilized at airports for security measures in 2007. Full-body scanners used for safety purposes are a recently invented technology device that claims to ensure entire safety to travelers at airports by generating a computerized stripped image of passengers boarding flights. Additional security procedures along with full-body scanners are also taken place. This assures that no passengers are carrying any harmful material to prevent the act of terrorism. Although full-body scanners allow airport security to avoid physical frisking, which may arise as a problem to many travelers, personally and religiously, there are many disadvantages as well. According to surveys, even though it is for the sake of security, passengers feel uncomfortable about the fact that they are technologically being viewed bare naked. Also, the personal who specifically view your full body scan can amplify security which creates a reasonable issue of racism and prejudice. Additionally, it has been proven that this â€Å"new and improved† full-body scanner and other security measures in action have not been functioning to satisfy complete safety and security to travelers. Private and religious invasion, discrimination, and inefficiency are three major concerns that regard the use of full-body scanners and other security measures, which are becoming increasingly problematic at airports internationally. It is coherent that these apprehensions must be taken into serious consideration regarding the decision whether or not the use of full-body scanners and other security enforcements should be continued. Private and Religious Invasion It is evident, through religious laws and several personal opinions, that the use of full-body scanners may invade an individual’s religious and personal privacy. Generally speaking, one would undoubtedly feel personally invaded if another has the access to observe their uncovered body unwillingly. This is why a certain population feels strongly against the fact that they are forced to be viewed undressed, through the use of a full-body scanner. Rabbi Bulka states that â€Å"†¦a full body check – you have to be able to have access o every single part of the body, including those we would consider off limits† (MacLeod, 2010). This displays that the private body parts of individuals who pass through full-body scanners are being â€Å"viewed by a screener in a separate room, who doesn’t know the identity of the person†(Gulli, 2010). It is apparent that the passenger being observed by the anonymous viewer will undoubt edly feel that their privacy is being strongly invaded through the use of full-body scanners. Among the lines of privacy invasion, there are other methods to attack a passenger’s boundary to make them feel uncomfortable. On that note, the use of full-body scanners has also broken the religious laws of the population amongst certain beliefs. The author mentions that, â€Å"Passengers who do not wish to pass through the metal detector for religious or cultural reasons can request a pat-down as an alternative. Head coverings, whether religious or not, are also permitted, though they may be subject to a pat-down search or removal in a private area† (Higgins, 2010). This demonstrates that full-body scanners may be a threat to an individual’s religious beliefs by forcing them to remove any religious attire such as a hijab for Muslim women or a turban for Sikh men/women. Additionally, this population would be very sensitive to physical pat-downs in private areas as they have already avoided the use of full-body scanners due to religious terms. Not only does this raid religious belief, but may also invade an individual’s personal space as well. With this information, it is prominent that religious and personal privacy may be invaded with the utilization of full-body scanners. Discrimination Along with religious and personal invasion, the utilization of full-body scanners and other security measures have proven to raise problems of discrimination and prejudice. This causes travelers to wonder whether they are being scrutinized at airports for the safety of others, or for the indignity of their identity and background. It is clear that the background and race of an individual largely alters the way airport security personal treat passengers in relation to full-body scanners. The author, Micheline Maynard, expresses that â€Å"Citizens of 14 nations, including Pakistan, Saudi Arabia and Nigeria, who are flying to the United States will be subjected indefinitely to intense screening at airports worldwide†¦Ã¢â‚¬ (Lipton, 2010). However, she also states that â€Å"†¦American citizens, and most others who are not flying through those 14 nations on their way to the United States, will no longer automatically face the full-range of intensified security†¦Ã¢â‚¬  (Lipton, 2010). This shows that the targeted countries such as Pakistan, Saudi Arabia and Nigeria along with others are clearly being classified under terrorism-related countries. A massive issue is created for the majority of the population from those countries, who are innocent, yet are forced to undergo intense full-body screening for no political reason. Therefore, airport security is proven to produce discrimination in association with full-body scanners against those targeted nations. Furthermore, prejudice along with discrimination is evidently exists in the process of airport security measures other than full-body scanners. As Rafi Sela, the president of AR Challenges, a global transportation security consultancy, speaks about the body and hand-luggage check, he states that â€Å"†¦they’re not looking for liquids, they're not looking at your shoes. They're not looking for everything they look for in North America. They just look at you† (Kelly, 2009). This quotation is an ideal example of prejudice present at airport security. As prejudice refers to an unfavorable opinion, Rafi Sela explains that the traveler at the body and hand-luggage check will be judged based on his/her appearance as opposed to making sure that the passenger is not carrying any harmful substances for the flight. Finally, it is apparent that discrimination and prejudices have been established as a method of the security system at airports, which is wrongful in a countless number of ways. Inefficiency Another problem that arises from the use of full-body scanners is that they do not provide complete efficiency to bring forth entire safety. Also, trained dogs are a more enhanced component of the security system that tends to function superior to full-body scanners. Moreover, full-body scanners may not perform as effectively to deter deadly weapons that a terrorist may have possession of. Cathy Gulli says, â€Å"†¦body scanners probably won’t pick up explosives concealed in body cavities or consumed, which still leaves bombers with the ability to get explosives onto the plane† (Gulli, 2010). This clearly displays that using these full-body scanners can o be claim to be highly effective, are proven wrong. As using these machines is putting a risk and danger to lives of travelers internationally, there is a major flaw in the system and may become very problematic. As Rafi Sela says, â€Å"†¦if you have a gap in security, you have no security† (Gulli, 2010). On the other hand, having a canine is a more effective security method as it provides a supplementary and a serviceable protection to travelers worldwide. â€Å"Cliff Samson, president of the Canadian Police Canine Association, believes dogs are ‘every bit as effective’ as machines at detecting explosives, and they can seek them out in a way that huge, stationary equipment can’t† (Gulli, 2010). This evidence supports the fact that using trained canines for security purposes as opposed to ineffective and risky full-body scanners, there is also a financial advantage as well. Mr. Samson also mentions that â€Å"†¦a dog can cost a police department $12,000†¦Ã¢â‚¬  whereas a security expert states that â€Å"†¦body scanners, each worth $250 000, at Canadian airports†¦ † (Gulli, 2010). Not only does this give airports an opportunity to increase security for a positive cause, but also allows airports to capitalize financially. Conclusively, inadequacy in the functioning of full-body scanners has proved to be problematic security factor without bringing complete security that even dogs can outsmart. Conclusion Various apprehensions that are becoming increasingly problematic as time passes regarding the doubtful airport security systems include invasion of privacy and religious laws, discrimination and prejudices, as well as ineffectiveness of full-body scanners. It is extremely important for the public citizens across the world to act towards bringing a much safer security system that is capable of accommodating the various respected religions internationally without the process of determining whose security should or should not be intensified based on their ethnic background and race. It is also important for everyone to acknowledge that it is just as important to defend ones rights and beliefs as it is to protect an airline flight without physically or religiously violating an individual’s space. This is why it is an excellent idea to create a universal security system that is convenient in use, unbiased and respected of physical and religious liberty. It is the responsibility of every person to contribute towards the creation of a precious and needed system that potentially holds the lives of many as it will largely donate towards the prevention of terrorism. With the rapid developing technology witnessed in the past decade, there is absolutely no excuse to live without a safety scheme most needed around the world. Not only should this worldwide security system be used for the isolated purpose of airport safety, but should also be utilized at public locations such as theme parks, subway and bus terminals and sea ports as well. This way every country, city, and community across the world will be satisfied and secure of any danger and risk. Since our current security structure clearly cannot handle the situations faced today, a more effective method of security will serve its purpose to protect every valuable individual globally. References Gulli, C. (2010). The scary truth about airport security. Maclean’s (2), 18. Retrieved February 02, 2010, from ProQuest database. Higgins, M. (2010). Security ahead? pack patience:[travel desk]. New York Times, p. TR. 3. Retrieved March 14, 2010, from ProQuest database. Kelly, C. 2009, December 30). The ‘Israelification’ of airports: high security, little bother. The Star. Retrieved March 15, 2010, from http://www. thestar. com/ Lipton, E. (2010). Strict airport screening to remain for citizens of 14 nations; [foreign desk]. New York Times, p. A. 3. Retrieved February 16, 2010, from ProQuest database. MacLeod, J. (2010). Full-body scans ok to save lives, rabbis say. Canadian Jewish News, p. 3,15. Retrieved March 14, 2010, from ProQuest database.

Thursday, August 1, 2019

Indian Festivals Essay

India is a country of colours and festivals. It is said that there are seven days in a week but nine festivals. They mark the grand, gay and happy occasions in the life of Indian people. These are celebrated with gay abandon. Great preparations are made well in advance to observe festivals. These are the occasions of family gatherings, exchange of greetings and sweets, joy, praying, fasting and feasting. People visit temples, holy places, worship gods and invoke their favors. Festivals come round the year and add colour, joy, happiness, variety and spice to life. Man is a celebrating being. He celebrates birth, marriage and even death. In India there are a number of festivals, fairs, and days of celebration. Celebration and festivity is in Indian blood and psyche. These have close links with our religion, myths, changes of season, harvesting and anal events. Most of the Indian festivals follow lunar religious calendar. Festivals in India are of great social, cultural and national value. They help people to forge greater and stronger national and cultural ties with one another. Festivals are a great factor to unite such a large population into one country and nation. Their mass recreational appeal is irresistible. The people are in their best clothes on this occasion. Even the poor get new clothes sewn for festivals. Their enthusiasm and preparations are seen to be believed on festive occasions. There are various communities in India. They have their respective festivals but they all participate in one another’s festivities with much delight and jest. Holy, Deepavali, Janmashtami, Dessert, Christmas, Id, Muharram, Mew Year are the main festivals celebrated on a vast scale. Besides, there are scores of other local and regional festivals. 15th August and 26th January are the national days of celebration and festivity. Holy, the most colorful festival marks the advent of spring and ripening of crops. It is also the most boisterous occasion. During the night bonfires are there, and then the next day there are a lot of singing, dancing and throwing of colours on one another. Sometimes the reveling is too much which turns into hooliganism, mud throwing and singing of obscene songs. However, it is an occasion when people of all classes mix-up with one another freely and enjoy singing and exchange of greetings and sweets. It is a special occasion in Gould, Matura and Barman, the places closely associated with the life of Lord Krishna and his consort Radar. Dessert is another great festival of India. It is celebrated to mark the victory of good over evil. It was on the Vijayadashmi that Rama defeated the ten-headed demon King Ravenna. During these days of festivity, the epic Ramayana is presented in dance-drama form on the stages all over the country. It is popularly called Camilla. On the final day of the festivities, the huge effigies of Ravenna, and his brother Kumbhkarna and son Meghan are burnt and there are fire-works. It is followed by Bharat Mila, an occasion of family reunion. In Mysore, a great royal and colorful procession is taken out on this occasion. In Kula also a special festival is celebrated on this day. In West Bengal it is observed as Durga Puja festival. Next comes the Deepavali, the festival of lights and fireworks. At night, earthen lamps and candles are lit to illumine the dark night of Amanas, the night before the new moon. Greetings and sweets are exchanged and Lakshmi, the goddess of wealth is worshipped. The businessmen close their old accounts and open the new ones. It is believed that Rama was crowned on this day after his triumphant return to Aloha from Lanka, foemen people also indulge in gambling on this occasion. Houses are cleaned, repaired and white-washed, and people wear new and colorful clothes on this day. 26th January is a major national Day when spectacular parade is held in Delhi along the Rajah. In state capitals also the day is celebrated with much enthusiasm and joy. Folk-dances are performed, processions taken out, parades held, and the National Flag is hoisted on this day. Then in the night there are fire-works and illumination of government buildings. It was on this day that our constitution came into being and India became a Republic. It is the most celebrated occasion for the Muslims in India. It comes after the month long fasting and praying of Raman. The Muslims visit mosques and Ideas to offer their prayers in their new and {east clothes. They embrace one another, exchange greetings and sweets, give alms to the poor and enjoy feasts. On Christmas, the Christians celebrate the event with much joy, jest and festivity, and exchange greetings and sweets. Special prayers and Teases are held in the churches on the occasion. New Year is celebrated with much jest, joy and enthusiasm by the people of all communities. Batsakis, Rachis, Roth Yare, Panama, Oman, Ganesha festival are some of the other important festivals of India.