Thursday, October 31, 2019

LLB CONTRACT LAW Essay Example | Topics and Well Written Essays - 500 words

LLB CONTRACT LAW - Essay Example Nash v. Inman, http://www.bcli.org/pages/publications/lrcreports/reports(html)/lrc26index.html According to Law of Contracts, in many ways the contractual capacity of a minor differs from that of an adult. An individual below 18, who is legally a minor, according to Family Law Reforms Act, 1969, cannot enter into contracts easily, because they are grouped under valid, void and voidable contracts and hence, they hold very little legal authenticity. Valid contracts cover necessities and this means, they have to pay for the necessities1 and legally liable to do so, if plaintiff could prove that goods supplied are suitable in minor's station in life and are his actual requirements2 and here, necessities3 and luxuries4 are different and the terms should not be onerous5 and if plaintiff has all these on his side, still he will get only a reasonable price and not a contractual one. Minors are bound by beneficial contracts service, which is usually for their own benefit, mainly termed as beneficial contracts and these include education, training, apprenticeship, and a Court can decide that minor should go through these contracts, even if some of them are not totally beneficial6 for him at the time conflict. Sometimes during the course of time circumstances might prove that a minor does not particularly need those benefits any more7.

Monday, October 28, 2019

The novel Roll of thunder Essay Example for Free

The novel Roll of thunder Essay For my diverse cultures essay, I will be studying and revising different factors of that time period and place for example the weather, the language, religion, politics, gender, lifestyle. The novel Roll of thunder, hear my cry is written by Mildred D. Taylor. This story was set in the 1930s which is after the depression, were the whole of America went into a slump. The novel is about a young, black girl who expresses and learns about the ways of life in the 1930s. The novel was set in the 1930s, which was during the time of, The great depression. It was set in the less prosperous part of America in Mississippi. This was a time and place when thousands of families like Cassie were poor and considered the lower, working-class. As you go through the book, you find that Cassie discusses and questions certain issues; for example racism and growing-up. Generally people think that informal slang speech is wrong, but it is just an alternative version to the English language. The way a person speaks is often a way of revealing how educated a person may be. The general dialect spoken within a community is a part a communitys identity, for example; the cockney language represents the people of southeast England. In the novel the language spoken has a western style to it. The novel consists of two main styles of speech, but the communities speak the main style commonly. The language is the same as Standard English but with many abbreviations. The local dialect shortens and blurs words together. The weather in this novel plays an important part, because this sets the mood of the characters and it is also an indication to show that something will happen, like in the novel the night whispered of distant thunder. It was muggy, hot, a miserable night for sleeping. This indicated that there is something wrong, so Cassie is being kept awake for the problem to occur. Racism was demolished mainly in mid century, so racism was a big factor in the novel as the story was set in the 1930s. Racism came about when the blacks were shipped in to the country for slavery, from then on the whites considered the blacks as a lower class, and thats what Cassie had to come to terms with. Today there is many forms of entertainment like: television, Internet, music, but early on in the century there was not a lot of entertainment but it was still no good as not many could afford entertainment. The community of Mississippi was a rural area, hence the lifestyle for the Logan family and most others was mainly work, and all families did go to the local church on Sundays for community gatherings as well as services. Generally ladies were thought as housewives but in the novel two of the teachers in the local community school Great faith were ladies, one being Cassie Logans mum, and also ladies had no means to educate or be educated. Early on in the century blacks had no law to protect themselves, but to deify convention at the end of the novel T. J Avery was about to get hanged in front of his own family but Mr. Jamison stopped this from happening by telling them that a fair trial will be held. If blacks were to commit crime then this will not be tolerated under no circumstances, and because the blacks have no law for them this gave an open chance to attack the blacks. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Mildred Taylor section.

Saturday, October 26, 2019

Benefits of Linux Operating System

Benefits of Linux Operating System TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Enumerate the various costs associated with the performance, security, support, and maintenance of the Ubuntu within the bank. Answers What is Windows? Microsoft Windows is a series of computer operating systems and GUIs (Graphical User Interfaces) produced by Microsoft Corporation. Windows was the first operating environment introduced by Microsoft in 1985 as an add-on to MS-DOS. Windows was introduced because of the growing interest in Graphical User Interfaces (GUIs). Then Windows dominated the worlds personal computer market, overtaking the Mac OS, which had been introduced previously. Microsoft has introduced two parallel routes in their operating systems. One route is for Home users and the other route is for Professional IT users. The home versions have greater multimedia support and less ability for network and security. But Professional versions have low multimedia capabilities and better networking and security. Windows operating systems are commercial products and we should purchase license in order to use the products. And also the source code of windows products are closed and owned by Microsoft. Linux is a free and open source Operating System referring to Unix-type operating systems originally created by Linus Torvalds with the support of developers all over the world. Linux source code is freely available to everyone and anyone can freely modify and redistribute both commercially and non-commercially. Linux kernel can be defined as one of the best kernels that uses today. And further, many organizations have begun to use Linux based operating systems because of its high security and low cost. Linux is well known for its use in servers. And also Linux can be installed on vast variety of hardware, such as mobile phones, watches, mainframes, supercomputers and etc. Fedora, Suse, Mandriva, Ubuntu, Kubuntu and Red Hat are some popular distributions of Linux. Comparative Features of Windows and Linux Malware Threats Security is a vital feature that every Operating System (OS) should provide. Because operating system is a key requirement of every computer system. Therefore everything depends on it. Malware or Malicious Software is a computer program that is designed by computer criminals in order to damage the systems and theft important information from computer systems. Therefore a network OS should have a thorough security. Without security, the network is vulnerable to larger number of threats. Windows Microsoft Windows OS is the most popular operating system in the world. It runs nearly 90% of desktop computers in the consumer market, and is the main operating system of the vast majority of commercial and institutional users. Therefore this makes windows equipped machines larger target of malware (or malicious software) which is written by computer criminals who want to cause much damage to the system. According to the surveys that conducted by Kaspersky Lab have revealed that more than 11,000 malware programs for windows were discovered just in the second half of 2005. And also nearly one million Windows based computers have been infected with Botnets (Botnet is a small computer program used to control other computers remotely). In windows based computer systems some malware are very hard to remove without using an Anti-Malware program. Linux In year 2006 approximately 800 Linux malware were discovered. Most of the malware are propagated through the Internet. Usually Linux based malware are extremely rare. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. Because of the rarity of malware threats, there is no initial requirement for Anti-Malware programs in Linux based systems. But anti-malware software such as ClamAV and Panda Security are rarely used for Linux servers for more security. Resource Sharing Computer Network is a set of interconnected computers that is used to share resources such as printers, scanners, information, storage and etc. Therefore operating systems should support for reliable resource sharing. Reliable resource sharing increases the networks performance. Linux and Windows belong to two different platforms. Though they provide different facilities, they provide they initial requirements of a network. Usually Linux performs well for file sharing and Windows performs well for Printer, Scanner and other hardware resources sharing. Cost For desktop or home use, Linux is very cheap or free, and Windows is so expensive. For sever use, Linux is very cheap when comparing with Windows. Microsoft allows a single copy of Windows to be used on only one computer. In contrast, once we have purchased Linux, we can run it on any number of computers for no additional change. For instance in year 2005, Windows XP Professional Edition was sold for $200 and Windows Server 2003 Standard Edition with 10 Client licenses was sold for $1,100. But we can download Linux distributions freely from their web sites. Otherwise we can purchase a assorted distributions of Linux in a box with CD and manuals and technical support for around $40 to $80. Bugs All software has and will have bugs (programming mistakes). Linux has a reputation for fewer bugs than Windows. Windows is developed by faceless programmers whose programming mistakes in Windows are hidden from the outside world because Microsoft does not publish the particular source code for Windows. Microsoft believe that their source code as a trade secret. In contrast, Linux is developed by hundreds of programmers all over the world. They publish the source code of the operating system to the world. Therefore it is stronger and less vulnerable for threats. That is why most of the organizations use Linux for their networks. Linux is getting update from many talented programmers all over the world. Network Configuration When comparing with Linux network configuration, Windows configuration is easier. Because of generally Windows is based on GUI (Graphical User Interface). Therefore anyone can understand Windows based network configuration without having much knowledge. But Linux is generally based on Command Line or Terminal and there should have a good knowledge about Linux in order to implement a network by using Linux. File System In Windows based systems the support NTFS, FAT, ISO 9660, UDF and others. But in Linux based systems they use ext2, ext3, ext4, ReiserFS, FAT, ISO 9660, UDF, NFS, JFS, XFS, and others. When comparing with Windows, Linux supports for many file systems. But now Windows has 3rd party drivers for ex2, ex3, ReiserFS, HFS and others. System Stability Windows operating systems based on the NT kernel and it much more stable than the other older versions of Windows. But if we are using unsigned or beta drivers, it can lead to decreased system stability. Linux window manager is a key component of X-Windows based GUI system and can be highly stable. Mechanisms used to terminate badly behaving applications exist at multiple levels, such as Ksysguard and the kill command. If the GUI fails Linux can use a text based system. This feature is a powerful feature in Linux for network stability. Interoperability features of Fedora 12 with Windows Within this task I used Fedora 12 instead of Ubuntu. Windows and Fedora belong to two different platforms. Therefore their mechanisms are different. That is why the feature interoperability is needed. Interoperability can be defined as the ability to work with each other. In order to exchange messages between each different platform reliably without any errors or misunderstandings, there should have a common background between each platform. Likewise Windows and Linux (or Fedora 12) also has that kind of common grounds that support for exchange messages between each platform. Samba Samba can be defined as a re-implementation of SMB/CIFS networking protocols. It was developed by Australian Andrew Tridgell. It provides various facilities for file and printer sharing between Windows, UNIX and UNIX like systems such as Linux, Solaris, AIX, and Apples Mac OS X server systems. Samba runs on most systems and now it has become a standard of most of the distributions of Linux (such as Fedora, Redhat, Mandriva, Suse and etc). When we need to share files and printers between different platforms such as Windows and Fedora, we should have to configure Samba. That is how we make interoperability between each platform. DHCP DHCP is short for Dynamic Host Configuration Protocol, a protocol used for assigning dynamic IP addresses to devices on a network. With a dynamic addressing, a device can have a different IP addresses every time it connects to the network. Though some systems and devices are allow to change the IP addresses while it is still connected, DHCP also supports a mix of static and dynamic IP addresses. DHCP simplifies the network administration because the DHCP server keeps the track of IP addresses rather than requiring an administrator to manage the task. I consider that the DHCP is also an interoperability feature because it can assign IP addresses to any platform such as Windows and Fedora. When a LAN network has a mixture of a Windows and Linux based computers, DHCP can assign IP addresses to all computers without a barrier of the platform. X Windows System The X Windows system is a windowing graphical user interface that almost, but completely, entirely unlike Microsoft Windows and the Macintosh. This X Windows System is an open, client/server system that for managing a windowed graphical user interfaces in distributed network. Earlier UNIX based systems used Shell as an interface. Shell is an inbuilt special program that allows users to enter commands in a CLI or Command Line Interface. But the new versions of UNIX-like systems heavily use X Windows as a Windows like graphical user interface. Earlier it was very difficult to work with Windows and Linux through CLIs. Because of Window was completely GUI (Graphical User Interface) and Linux was completely CLI. But now the new distributions of Linux come with the X-Windows capability. Therefore now the both systems can work more reliably and easily as a whole. X Windows is also an interoperability feature that is provided by Fedora 12 in order to work with windows systems much easily. TCP/IP TCP/IP shorts for Transmission Control Protocol and Internet Protocol. Generally it is a protocol suit that is used for the internet. It provides easy communication across different platforms and provide basis for the global internet. And also it can be defined as a basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or extranet). When we set up with direct access to internet, our computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. In an intranet there may have computers with different platforms such as Windows and Linux. But using TCP/IP protocol we can connect these computers. Both Windows and Linux distributions support for TCP/IP. Therefore it can also be considered as an interoperability feature of Windows and Linux. DNS DNS is Short for Domain Name System. DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, theyre easier to remember. The internet is based on IP addresses. Every time when we use a domain name, DNS server must translate the name into the particular IP address. In intranets also some organizations use DNS servers to name their network computers. Though it is a Windows based computer or a Linux system, it carries out its task perfectly. Because DNS also has a interoperability feature to work with different platforms. Enumerate the cost associated with the Performance, Security,Support and Maintenance of Fedora 12 within the Bank. For this Task I used Fedora 12 instead of using Ubuntu. Because Ubuntu do not have an inbuilt a Samba server facilities and it should be downloaded as a third party tool. But Fedora 12 has those facilities for printer and file sharing. Performance Performance is a vital part of a network. The efficiency of a network depends on the hardware and software performance. To the banks network I used one of the distributions of Linux called Fedora 12 as the NOS (Network Operating System). Generally Linux based operating systems are lightweight and need low performances. As the other distributions of Linux, Fedora 12 is also a lightweight operating system that requires low performance hardware. Bank is a place where many transactions are taken place every second across their branches and other networks. Therefore the banks network should be stable and reliable. Due to these reasons a bank should use trusted and reliable hardware and software in order to increase their network performances. Usually the costs of network devices are relatively high in the modern market. And also the network operating systems like Windows are extremely expensive. Therefore by using a free and open source OS like Fedora 12 we can reduce the money wastage. Further it does not need high performance computers for installation and does not consume lots of hard disk space like Windows does. Fedora 12 provides online updations and does not have a limit on installation. One copy of Windows can be installed to a one computer only. Otherwise we have to buy license. But Fedora 12 can be installed to any number of computers without any limitations. According to those above reasons I think that Fedora 12 provides good performances and also it is more cost effective when comparing with Windows. Security Security is a key requirement of a network. Otherwise anyone and any malware can attack and theft the important information from the network. Therefore OS (Network Operating System) developers try to increase OSs security features. If theres no security within an OS, then it is totally fails. Fedora 12 is a distribution of Linux and it is categorized as Free and Open Source Software. Linux based systems and their source codes are freely available to anyone and can be modified as required. Fedora 12 has also been developed by many programmers all over the world and it is a strong operating system. But windows based systems are commercial OSs and they do not publish their source code to the public. Therefore it is developed by limited programmers and there security is also limited. That is why we need third party security tools to protect windows based systems. The third party trusted and reliable Anti-Virus guards or third party security systems are more expensive and it is an additional cost to the windows based systems. But Fedora 12 has a strong in-built security mechanism (but Windows dont have) such as DPI (Data Packet Inspection) and ISD (Intrusion Detection System). Because it is developed by many programmers all over the world. Therefore it doesnt need any third party virus guards. The cost for additional security efforts has reduced in Fedora 12. Therefore Fedora 12 is a cost effective operating system when comparing with Windows. And also it is the best choice for a cost effective banks network system. Support Computer operating systems and other software are not 100% perfect. That is why the manufactures provide support for their products. When a problem is taken place in a system, we can get the manufacturers support to solve the problem. And also manufactures provide patches and other updations to reduce the vulnerabilities of their products. Microsoft Windows also provide free updations and online support for their products after they are purchased. Though Windows provides free online support services for their products without any payments, Fedora and other Linux based operating systems do not provide free support services. If we need to get a support from Linux based system, we should pay some amount of money for their service. But they provide 24 hours update service for their products. In Fedora should have to pay for their services. Though the support service is not cost effective for the bank, the OS is totally free for download. Maintenance After installation and Configuration every computer system need to be well maintained. Windows systems are much easy to maintain because it doesnt need well trained persons (compared with Linux). But Linux systems are more complex and cannot install, configure and maintain if theres no knowledge of it. In order to maintain the Fedora system in the bank, the bank needs a well trained personnel or network administrator. Anyone cannot maintain a Linux system; therefore the cost of a Linux based network system administrator is higher when comparing with a Windows Network System Administrator. Manufactures support is always need for system maintenance. But we need to buy the service advices in Fedora form its manufacture. TASK 02 Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: A brief overview of current VPN technologies (both hardware and software). Design a suitable VPN using appropriate Internet Service Providers (IPS) for the requirements of the bank. Identify and list the hardware and software required to implement the banks VPN. Produce a schedule for the implementation of the VPN, detailing the installation of any necessary hardware, network operating system upgrades and associated applications software required. Write a section of the report on the responsibilities and level of service required from an ISP in order to implement a successful VPN within the company. Answers Although the topic VPN or a Virtual Private Network is a much complex subject in networking field, the basic idea of a VPN is quite simple. A corporation may have a number of officers (or group of officers) in different locations, and each of these locations can have its own local network. In many corporations there are many employees working remotely by connecting to the corporations local network at home or on the road. And also business partners can join together in extranets to share business information. Interconnecting these separate networks and locations over a public network is called a VPN or a Virtual Private Network. The apparent simplicity of VPN makes us think that it is a simple concept. But there is an ever-increasing number of VPN types, and a huge range of technologies for implementing VPNs are available today. This makes us easy to decide the most appropriate VPN solution for our need. The most common way to interconnect sites has been to use ATM or Frame Relay (FR) leased lines supplied by a service provider. The following parts of this task describe the VPN technologies, cost effective hardware and software solutions and responsibilities and level of services required from the ISP (Internet Service Provider). VPN Technologies As I mentioned above, VPN is a complex subject in networking. Therefore different sort of VPN technologies are introduced for different purposes. These technologies provide secure and cost effective solutions for telecommuters, home based workers, road warriors, remote sales people, mobile executives and also for global business. Within this task I expect to provide a short description about the current VPN technologies that are widely used today. I divide these technologies into two major parts such as Hardware Technologies and Software Technologies. According to my perception, I believe that the VPN protocols that are used to establish a VPN connection should also be a part of the software technologies. Because these protocols are created by using specialized algorithms and programming languages. Therefore I consider those protocols as Software Technologies within this task. Software Technologies PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) protocol technologies are heavily based on this PPP (Point-to-Point protocol) technology. PPP was designed to send data across dial-up or dedicated connections. PPP technology is used to encapsulate IP packets within PPP frames and then transmits the encapsulated packets across a point-to-point link. PPP was specially designed to use between dial-up clients and NASs (Network Attached Storage). PPTP (Point-to-Point Tunneling Protocol) PPTP is one of VPNs first protocols built on PPP (Point-to-Point Protocol) to provide remote access for VPN solutions. PPTP technology encapsulates PPP frames in IP datagrams using GRE or Generic Routing Protocol. PPTP uses authentication techniques within PPP. PPTP can be used for remote access and router-to-router VPN connections. The Point-to-Point Tunneling Protocol (PPTP) uses TCP (Transmission Control Protocol) connection for tunnel management and GRE for encapsulation. L2F (Layer Two Forwarding Protocol) L2F was designed to transmit data from corporate sites to their users by using tunnels. This protocol or VPN technology was first implemented in CISCO products. L2F doesnt depend on IP and its the only way that it differs from PPTP. This protocol accepts other authentication mechanisms and allows tunnels to support more than one connection. L2F uses PPP for authenticate the remote user and its done twice at the ISP and then the second at the gateway to the connecting LAN. This is a Layer-2 protocol and handles IPX and NetBEUI as well. L2TP (Layer Two Tunneling Protocol) L2TP is a combination of L2F and PPTP and it exists in the second layer of the OSI reference model. That is why it named as Layer 2 Tunneling Protocol. L2TP is defied for packet media, Frame relay, ATM and X.25. It has its own tunneling protocol and uses PPPs PAP and other advanced mechanisms for authentication. Its encryption method is based on IPSec (Internet Protocol Security). IPSec (Internet Protocol Security) IPSec is a solution for VPN security and it exists in the third layer of the OSI reference model. IPSec uses number of encryption technologies to provide confidentiality and integrity of data. IPSec allows senders to authenticate and encrypt each packet. There are two modes of IPSec such as Transport mode and Tunnel mode. These two modes depend on the situation of security and traffic. Transport mode authenticates and encrypts the transport segment of an IP packet, and tunnel mode authenticates and encrypts the whole IP packet. VPN Client Software VPN Client software provides protected access to corporate resources via wireless, broadband, and dial-up connections with robust encryption and broad support across multiple connection types. Most of the modern VPN software simplifies the configurations of security policies and management of certificates through its graphical user interface. Microsoft, Netgear, Stone Gate and CISCO are some popular manufactures for VPN client software (But each of these manufactures use different sort of technologies to implement these VPN client software). Hardware Technologies VPN Router In network communication, data are transferred in the form of packets. Usually a router is a hardware device or a computer that looks at the IP packets and decides how to forward it. Routers operate at the network layer of the OSI reference model and that is used to connect networks or connect the networks to the internet. When a packet is received from the NIC (Network Interface Card) card, the router reads the IP address on the packet and forwards it to the appropriate network interface. The packet forwarding depends on the IP address and routing information that contains in the packet header. Even if the network architecture differs, the router has the capability to connect them. Though it can connect different network architectures, I cannot transform data from one data format to another (TCP/IP to IPX/SPX). Software for VPN router functions or normal router functions can be added to a server or a specialized computer that is optimized for communication. VPN Concentrator VPN Concentrator is a device that is used to combine several communications channels into one. And also it is further used to tie multiple terminals together into one line. Although a device called Multiplexor carries out the same function as VPN concentrator, the total bandwidth of the concentrators inputs is not equals to its outputs. The concentrator has the ability to store data temporary but the multiplexor does not have this ability. An Ethernet hub, which is a multiport repeater, is sometimes called as a concentrator. VPN Gateway Although a VPN Gateway can be implemented as both Hardware and Software, I consider this as a hardware technology because for the ease of categorization. VPN Gateway is a device (can be a Hardware/Software) that is used to convert packets from one network protocol to another. Gateway acts as an entry and exit point of data where some kind of processing is done on the information that passes through it. Sometimes the VPN Gateway also called as a router or Layer 3 Switch. Gateway is a device that is used to join two networks together. It can be implemented completely in hardware, completely in software or as a combination of both. VPN Firewalls Firewall can be implemented as both hardware and software or as a combination of both. But I included VPN Firewalls in the VPN Hardware category because for the ease of categorization. Network security is a major need of an organization. Firewall is one such solution that allows the computer to prevent unauthorized access of any application on the computer. Firewalls monitor traffic in the computer or the network. This monitoring can be done by the software in the computer or router. When using a VPN in an organization, the organization has a great requirement of using a firewall solution. Because of there may have a possibility of unauthorized access to the organizations confidential information. By using VPN firewall technology we can reduce the outside threats. Even though the above technologies directly look like just software and hardware, they all have a complex technology encapsulated within them. The above VPN technologies are widely used within the modern VPNs. Description of Banks VPN Due to the requirements of the bank I designed a VPN that provides cost effective networking solutions. The bank needs their agents and branches to connect to the banks network secure through VPN. Therefore I designed a network that provides the above facilities. When designing the banks network I assumed that the particular bank is the head office and the agent is another organization. Although the bank may have many agents and branches, Ive mentioned only one agent and a one branch within this network overview. Banks head office is the place where many of the confidential information about the transactions are stored. Therefore its network should be more secure than any other else. According to my VPN design I connected the banks network to the internet through an ISP (Internet Service Provider) in order to get the VPN access. The bank connects with the ISP directly using a VPN Router (this router is highly configured and cannot be accessed by the unauthorized VPN clients). Then I added a DMZ (Demilitarized Zone) in order to secure the LAN network from the unauthorized access. If the File server was implemented within the DMZ, it may vulnerable to the threats and there may have a possibility of information thefts. Therefore I implemented the File Server far away from the DMZ and its secured with two highly configured firewalls. Though someone can get into the DMZ in order to access the Web Server, he/she cannot penetrate the other firewall without proper authenticate information. All the co mputers within the Banks network can access the WEB server and File server according to their assigned privileges. Other agents and branches have rights to access the banks network (using Router to Router connection). Even though the VPN Routers and Firewalls (Hardware) are much expensive, they provide a great security to the Bank network. In order to reduce the software cost I recommend free and open source software for both servers and clients such as Linux, Open Office and etc. Hardware and Software required to implement the banks VPN According to my VPN design I need several kinds of software and hardware to implement the network. Therefore Ive chosen some products to which supports for VPN. Some products are little bit expensive but provide high security and reliable service to the banks network. When choosing the software to the network implementation, Ive chosen some widely needed software. Hardware VPN Router SMC Barricade VPN BR21VPN Router SMCBR21VPN The Barricade router which has built-in VPN support is an ideal networking solution for VPN. This router consists of load balancing WAN ports, DMZ (Demilitarized Zone) port and a 10/100 LAN port. It has a built in firewall to protect the network from the edge. This router supports protocols such as TCP/IP, VPN connections with PPTP and IPSec. The in-built firewall provides a great protection against DOS attacks (Denial of Service attacks) and also it provides flexible Access Control. This router has the ability to access remote corporate network securely through an authenticated and encrypted tunnel over the internet. Switch NetGear Pro-Safe switch is suitable for high-speed network on a small scale. This switch consists of five auto-speed-sensing 10/100/1000 Mbps UTP ports. And also this it has the capability to handle huge workloads (this feature is more useful because of the Web Server is connected to this switch within my VPN design). This switch can move large files across the network instantly and let devices to connect to the network painlessly. The metal chassis protects the interior working parts from physical damages. Hub Cisco FastHub 424 Ethernet Hub (WS-C424M) The CISCO FastHub 424 10/100 of high-performance Fast Ethernet repeaters deliver unmatched flexibility and low-cost managed connectivity to the desktop. The FastHub 424 10/100 provides ultra low-cost 10/100 autosensing desktop connectivity where dedicated bandwidth is not required. The FastHub 424 will be deployed as a high-performance solution for providing 10/100 Fast Ethernet connectivity to the desktop. This hub provides dedicated connections over extended distance (up to 2Kms) to upstream switches or routers. Firewall NetGear ProSafe FVS338 Firewall supports for 50 VPN Tunnels for Encrypted Remote Access. This VPN firewall with 8 Port 10/100 switch and Dial Back-up is an SNMP-Manageable, High Performance network solution that furnishes multidimensional security. Broadband capable VPN firewall comes with connection ins

Thursday, October 24, 2019

The Christian Bible, the Hebrew Scripture, The Muslim Koran Essay

The Christian Bible, the Hebrew Scripture, The Muslim Koran: Words are Not Important, Our Actions Are Matt 13:3 "He told them many things in parables. 13:10 "Why do you talk to them in parables?" That's the crucial question: Did God, should God, have intended direct and final communication with us? If so, Jesus certainly failed his mission. There is little evidence that Jesus' appearance cleared anything up or gave us God directly. Wittgenstein, who wanted our language to be clear, knows well enough that neither the Hebrew nor the Christian God's words could fall within his constructed linguistic net. They would always come from outside, from "the mystical." Thus, where our clarified language is concerned, "never the twain shall meet." Then, was Jesus really a proto-Wittgenstein? Did he use parables as an obscure vehicle for speech which alone might bridge the gap for us between our languages and the mystical always outside of it? The Christian Bible, the Hebrew Scripture, The Muslim Koran - or any religion's sacred texts for that matter, will remain controversial but still important avenues for divine communication. Somehow all religious faith lies locked up in non-direct discourse. How, then, can we claim to "hear the word of God or gods," as many claim to do? Well, in the first place, we know that we will never all hear exactly the same sacred speech, interpret it in unison, or respond to it in the same way. For all that our enlightened scholars of sacred texts may provide—and there probably are more misreadings of a text than can be recognized—the Modern-Enlightenment goal to clear up all variant interpretations of a text will fail, due to the impossibility of confining living gods to our attempted literal interp... ...nce. "I created through my word; I communicate spiritually through inspired words; but the creation of the universe and your world could only be accomplished by the release of power and love as directed by my word. However, now words can be just as deceptive as insightful, and so I judge much more by the acts of love—or of evil—released on others by your words of love or hate. At the end of time, you may also judge me, not so much by words, since there comes a time beyond which words are not decisive or effective. Judge me, then, not by the words heard from any religious seer or prophet, no matter if they have been crucial in guiding you in the path of righteousness, but by my powerful acts that will recast the world, bring evil under final control, and so grant new life to the deserving who have held the faith and tried to act as instructed." Thus saith the Lord

Wednesday, October 23, 2019

Advise the UK government on which primary energy resources would be best to develop over the next 20 years

Energy is a fundamental part of our lives; however, can we continue to rely on fossil fuels? By 2030 global energy demand will be 40% higher and there are also growing concerns over increased greenhouse gas emissions and the resultant warming of our planet which causes us to ask questions about whether our current energy supply is truly sustainable. The UK is running out of energy, without massive investment in new power plants there will be regular black outs in 10 years. There are several factors to consider when evaluating different primary energy resources; these include economic, environmental, political and social implications. However, the most important factors to consider would be economic viability (which is particularly significant due to the UK’s current economic situation) and environmental sustainability. In this essay I will be looking at these factors in order to try and come up with the most sensible solution to the growing energy problem in our country and therefore what primary energy resource should be developed to solve it.Government Regulation on Media in America Natural Gas Natural gas is a major source of electricity generation through the use of gas turbines and steam turbines. It burns more cleanly than other hydrocarbon fuels, such as oil and coal, and it also produces less carbon dioxide. For an equivalent amount of heat, burning natural gas produces about 30% less carbon dioxide than burning petroleum and about 45% less than burning coal. Gas from the North Sea has provided Britain with a regular supply since the mid 1960s when the first discoveries were made. However, UK supplies from the North peaked in 1999, since when production has fallen by around half (see graph to the right). The trade secretary says that the UK is now a net importer of gas – this growing dependence on imports means increasing vulnerability to rising prices and instability in gas-producing regions. Also the CO2 emissions are still significant so you can’t consider this energy resource as completely ‘clean’. Gas fracking in the UK is a very contro versial issue, especially after the recent earthquakes at test drilling sites near Blackpool. Coal 33% of our current energy sources come from coal; it is well established, cheap and reliable. However economically viable UK coal will run out in 10-15 years and is already expensive to mine. Half the coal used in the UK is now imported. The huge environmental implications involved with coal also remain to be a concern – there are high emissions of CO2 and SO2 (which causes acid rain.) Earlier this year the government invested  £1 billion in cleaner technologies, in particular carbon capture technologies which prevent CO2 from escaping into the atmosphere. â€Å"The potential rewards from carbon capture and storage are immense: a technology that can de-carbonise coal and gas-fired power stations and large industrial emitters, allowing them to play a crucial part in the UK's low carbon future† says Ed Davey, Energy and Climate Change Secretary. However this still remains to be a controversial strategy as some say that carbon capture and storage (CCS) technology is in i ts infancy and does not work yet. Nuclear Power Nuclear power is the use of sustained nuclear fission to generate heat and electricity – it provides about 20% of the UK’s energy, utilising 16 operational nuclear reactors at nine plants. Nuclear power is the primary source of electric power in France; 76% of France’s electricity comes from nuclear power, the highest percentage in the world. France's nuclear power industry has been called â€Å"a success story† that has put the nation â€Å"ahead of the world† in terms of providing cheap, CO2-free energy. The main positive environmental implication is that it creates minimal CO2 emissions after construction and therefore it isn’t contributing to global warming however this shouldn’t indicate that it is environmentally friendly; there are high levels of radioactive waste involved and the Chernobyl (1986) and Fukushima (2011) incidents raise concern over nuclear disasters. After the 2011 Fukushima incident, the head of France's nuclear safety agency said that France needs to upgrade the protection of vital functions in all its nuclear reactors to avoid a disaster in the event of a natural calamity, which will inevitably increase the cost of electricity. There are further negative economic implications as there are high costs of building and decommissioning reactors. Planning and building a power station takes at least 10 years so this will not help meet Kyoto agreements. However a positive economic implication is that Nuclear energy is not as vulnerable to fuel prices fluctuations as oil and gas. There are several pros and cons to nuclear power which makes it a controversial matter; all of the above points would have to be considered if this resource would be developed over the next 20 years. Hydropower This is the most widely used form of renewable energy, accounting for 16 percent of global electricity consumption but just over 2% of the UK’s current consumption. Natural flow hydro is reliant on rainfall and vulnerable to drought which is ideal for the UK. There are no CO2 emissions involved and no vulnerability to fuel prices or political instability and is very cheap once the dam has been built. In theory this sounds like the ideal option for the UK to develop over the next 20 years however in practice there are several negative implications involved. For instance, hydropower projects on mega dams in China have caused species extinction and serious water pollution issues. The three gorges dam in China has had many negative impacts; huge areas of land has been flooded resulting in a large scale relocation of people, villages etc. This case study indicates that a large scale hydropower system within the UK would not be completely sustainable. The Three Gorges Dam Oil Oil only accounts for 1.2% of the UK’s energy consumption and although it is a reliable technology and well established it has many negative implications with it. It is a finite stock resource – many oilfields are depleting; meaning production has peaked and prices will rise (price instability). This has also led to searching for unconventional reserves of oil e.g. in the Arctic. There could be 16 billion barrels of oil in Alaska and big oil TNCs are keen to extract it from this fragile wilderness which causes many harsh environmental impacts. The oil industry has a large dependence on politically unstable regions which causes many problems; the recent Arab spring conflict in Libya meant there were no exports of oil from this major producer. As well as creating a lot of CO2 emissions which contributes to global warming a major environmental implication is oil spills; the deep water horizon oil spill disaster caused extensive damage to marine and wildlife habitats and to the Gulfs fishing and tourism industry. Biofuels Biofuels are crops or organic matter such as agricultural wastes which can be used as fuels. They are defined as renewable because they are based upon plants which have trapped the sun’s energy during photosynthesis and converted it into chemical energy. In the UK it accounts for 0.6% of energy consumption – there are only a few facilities burning Biofuels such as waste wood products and straw that are already operating. Energy crops could be grown in the UK, but some will not be cost effective unless yields improve. These energy costs are considered to be carbon neutral because carbon released when crops are burned is balanced by carbon absorbed from the atmosphere during growth. One of the main issues concerned with Biofuels is that it uses up a lot of land which could be used for other things such as growing crops – there is a link between the spread of Biofuels across the world and rising food prices. Brazil is considered to have the world's first sustainable Biofuels economy and is the Biofuel industry leader; the UK could learn a lot from Brazil’s 37-year-old ethanol fuel program which is based on the most efficient agricultural technology for sugarcane cultivation in the world. This program has led to there no longer being any light vehicles in Brazil running on pure gasoline which has huge environmental benefits. However, again Biofuels cannot be considered completely environmentally friendly as you need to take into account the direct and indirect effect of land use changes; Brazil and other developing countries convert land in undisturbed ecosystems, such as rainforests, savannas, or grasslands to Biofuel production. Some experts call bioethanol â€Å"deforestation diesel†. Wind Wind is a key renewable resource that is not vulnerable to fuel price fluctuations. Turbines are emission free and quick to build, with the costs of building them decreasing. The UK is very suited to wind farms – some say that the UK has the best wind resources in Europe. The UK is ranked as the world’s eighth largest producer of wind power; at the beginning of March 2012 the installed capacity of wind power in the United Kingdom was 6,580 megawatts with 333 operational wind farms and 3,506 wind turbines. However, even though it is a leading producer, wind power only accounts for 0.5% of our energy consumption therefore there is a large amount of room for development. There are several issues with this source of energy to be considered; it uses up a lot of land which inevitably leads to NIMBYISM issues – there is local opposition and concerns about the noise pollution and the impact on the landscape. This energy source is also intermittent as wind levels fluctuat e. Solar Solar is also a key free and renewable energy source. It can generate electricity from photovoltaic cells, be used to heat water directly, or be maximised by good building design. Spain is one of the most advanced countries in the development of solar energy however it is one of the European countries with the most hours of sunshine. This suggests that this source of energy would not be right for the UK as the UK sunshine is unreliable and limited. Solar power is also confined to daylight hours unless photovoltaic cells are used to store power in batteries. The solar power industry within the UK is developing however the potential may not be big enough for it to be developed further in the UK in my opinion. Wave and Tidal This has large potential in some parts of the UK and is a key renewable resource. However there are large development costs and it is still in the research stage with technology not being completely developed yet. There are also environmental issues involved with wave and tidal power; the barrier will act as a physical barrier to fish movements to spawning grounds etc. The wave and tidal barriers will also detract from the visual beauty of the coastline. Conclusion In this essay I have evaluated the pros and cons of several forms of primary energy which have the potential to be developed within the UK over the next 20 years. I have considered the environmental, political, social and economic implications of each in order to try and come up with the most sustainable option for the UK’s future. Forms of renewable energy seem to be the most obvious choice to be developed in the UK with the ever increasing concerns over global warming and climate change. The environmental impacts involved with using natural gas, coal, nuclear energy and oil all seem to be too big for them to be considered. The political impacts concerned with oil in particular is a strong indication of an energy resource that should be avoided by the UK; oil is already making a small and declining contribution to electricity generation in our country. With the focus being, in my opinion, on renewable energy it leaves the controversial decision over what particular primary energy source should be developed. At first glance, maximising the potential of hydropower seems to be the most sensible option as this is already having the largest contribution to our energy consumption out of all the renewables. However, much of the UK’s hydropower potential has already been exploited with large scale future development unlikely. I also believe that solar power isn’t the right renewable energy to go for as the UK’s climate is simply not suitable enough for it to have a large impact on our growing energy consumption. Wave and tidal energy does however have large potential in the UK however I am worried that due to its early stage in development it would need massive investment for it to reach its potential; this I believe would not be economically viable in the UK considering our current economic climate. This leaves me with wind power. I believe that this should be the energy resource that should be further developed over the next 20 years for several reasons; it is currently the fastest growing renewable in the UK and there is already heavy government backing to support it. There are little environmental impacts to be considered and with costs falling it is also economically viable. NIMBYISM objections can also be solved with the development of off-shore wind farms further out to sea, for example the world's biggest offshore wind farm off Kent with the 100 turbines being expected to generate enough electricity to power 200,000 homes. The success of this particular development will in my opinion become a catalyst for further development of more wind farms in the UK and will hopefully help solve the growing energy problem in our country.

Tuesday, October 22, 2019

Financial Performance of Ramsay Health Care Essay Example

Financial Performance of Ramsay Health Care Essay Example Financial Performance of Ramsay Health Care Paper Financial Performance of Ramsay Health Care Paper The firm chosen, Ramsay Health Care, is a group of companies that primarily focus on providing medical attention in a large portfolio of hospitals.   Their main aim is offering a service of utmost quality to their targeted clients.   The hospitals of this corporation are located in Australia. Financial Performance of Ramsay Health Care The profitability ratios adopted indicate that the profitability of Ramsey Health Care Limited and its consolidated entities improved from 2005 to 2006. :    The efficiency in the utilization of the firm’s resources to generate profits increased by 13%.   A high percentage in the return on capital employed is always desirable because it provides a margin of safety to the organization from unforeseeable changes, like economic downturns, new competitive products and more. Presently the return on capital employed of 25.59% is high to acceptable standards to sustain the aforesaid margin of safety. References: Lewis R.; Pendrill D. (1996).   Advanced Financial Accounting.   Fifth Edition.   London: Pitman Publishing. Ramsey Health Care. Annual Report 2006 (on line). Available from: ramsayhealth.com.au/rhc/investors/docs/Market_Briefings_24102006104934.pdf (Accessed 3rd April 2007). Randall H. (1999).   A Level Accounting.   Third Edition.   Great Britain:   Ashford Colour Press Ltd.