Thursday, October 31, 2019

Network Security Paper Essay Example | Topics and Well Written Essays - 1000 words

Network Security Paper - Essay Example This essay focuses on the increased concern over the effects of the heartbleed bug on the internet security (Codenomicon, 2014). This loophole allows stealing of secured information and data under normal settings, by the SSL/TLS encryption used to protect the Internet. The SSL/TLS covers privacy and communication security for applications found in the Internet such as the web, instant messaging (IM), email and virtual private networks (VPNs). The Heartbleed bug permits any user accessing the Internet to read the systems’ memory secured by the weaker versions of the OpenSSL applications. This jeopardizes the secret keys used to pinpoint the service providers and to encode the movement, the names and passwords of the users and the authentic content. This permits hackers to spy on data, steal information straight from the services and users and to impersonate services and users (Codenomicon, 2014). The Heartbleed bug is listed in the Common Vulnerabilities and Exposures system as CVE-2014-0160. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability Names preserved by MITRE. The technical name, CVE-2014-0160 is named from the line of code that the bug is contained. However, a secure version of OpenSSL was released on April 7, 2014, after the Heartbleed bug was publicly revealed. At the time close to 17% an estimated half a million of the Internets protected web servers licensed by trust authorities were alleged to be exposed to the bug. Hence, permitting the stealing of the servers digital keys used to encrypt data and gain access over users session cookies and passwords (BBC News, 2014). The loophole allows a hacker to gain access of up to 64 kilobytes of server memory. However, the hackers execute the attack repeatedly to access a substantial amount of information. Therefore, a hacker can gain access to users’ cookies from web browsers and servers that keep

Monday, October 28, 2019

Bridgeton Industry, Automotive Component & Fabrication Essay Example for Free

Bridgeton Industry, Automotive Component Fabrication Essay 1.Industry and its relevant characteristics. As the original plant of Bridgeton Industry, Automotive Component Fabrication (ACF) supplies the most components to the U.S automotive industry. The plant has a long history that was established in 1840s and the site developed by several industrial uses. ACF could be the leader of the whole industry because the Big- Three automobile manufacturers are the ACF main customer, which bought the whole production of ACF. 2.Competitive environment  Although there are some competition mainly from local suppliers and other Bridgeton plants in domestic, ACF was still considered to be advantaged as the automotive market and US automotive industry dominated. But it was not that optimistic when the competition from global and domestic loss of market share happened. 3.Products and production processes.  During the 1987 model year, products were analysed and classified to different classes based on their quality, customer service, technical capacity and competitive cost position by a strategic consulting firm and it concluded that: Class I-fuel tanks; Class II-Manifolds, front and rear doors; Class III- Muffler-exhaust systems and oil pants. For producing fuel tanks, firstly six stamping lines from coated sheet metal are used to place those, and they automatically seam welded followed by placing together. Manifolds: a highly automated production process is used to produce stainless steel exhaust manifolds. And the parts are robotically welded after being loaded. The highly advanced system is disadvantaged in cost. Front and rear doors: those are the doors for vans. Four press lines with six presser per line in maximum are used to produce. Muffler-exhaust systems: sheet metal that is bet to shape is used to form those and robotically welded afterwards. Oil pans: it means small steel stampings are produced on two lines with one press each contained. 4. Description of the old cost system.  The overhead was allocated using a predetermined rate of percentage of direct labour cost and it used a single overhead pool. 5. Possible problems with the old cost system. Overhead was allocated using a predetermined rate of percentage of direct labour cost would be subject to some fluctuation. Sometimes it could not reflect the true cost as not every model year has the same percentage overhead of direct labour cost, so end of period adjustment is needed. As ACF’s production is various, using a single overhead pool could not reflect all the cost driven by different cost drivers.

Saturday, October 26, 2019

Development of Intrusion Detection System Software

Development of Intrusion Detection System Software INTRODUCTION Heavy reliance on the Internet and worldwide connectivity has greatly increased that can be imposed by attacks plunged over the Internet against systems. It is very difficult to prevent such attacks by the only use of security policies, firewall or other mechanism because system and application software always contains unknown weaknesses or many bugs. In addition, complex, often unforeseen, interactions between software components and or network protocols are continually exploited by attackers. Successful attacks inevitably occur despite the best security precautions. There for intrusion detection system has become an essential part of the system because they can detect the attacks before they inflict widespread damage. Some approaches detect attacks in real time and can stop an attack in progress. Others provide after-the-fact information about attacks and can help repair damage, understand the attack mechanism, and reduce the possibility of future attacks of the same type. More adv anced intrusion detection systems detect never-before-seen, new, attacks, while the more typical systems detect previously seen, known attacks [1]. MOTIVATION The speed of growth of Internet is very fast without any end. With this growth the threat of attacks is also increasing. Because as we all know that theft can be occurred over the Internet from all over the world. So we require a system which can detect the attack or theft before there is some loss of information and reputation of organization or any individual. There are many solutions has been provided by the researchers and from many companies like firewall, intrusion detection system and IPS to stop the attacks. But still it is very hard to detect the attacks like DoS and worm propagation before they widespread, because regularly thousands of attacks are being developed and for a signature based intrusion detection system it is very hard to detect these kinds of new attacks with perfect accuracy. Mostly intrusion detection system generates many false alarms. These false alarms can affect the other processing of the network. If somehow any attacker gets to know that there is an intrusion detection system in the network then, the attacker will want to disable the intrusion detection system. His/her first target will be the intrusion detection system before attacking the network. So there should be proper security policies for deploying the IDS to take proper advantages of it. PROJECT OBJECTIVES Security is the main concern for any network. Every day thousands of attacks are created so that alarms and logs should be generated properly for reducing their effect. intrusion detection system and IPS are mostly used devices for providing these kinds of solutions. But there are many issues like performance and accuracy. So the main objective of the project is to develop a signature based intrusion detection system for DoS attacks with better scalability and performance i.e. intrusion detection system with minimum false alarms and with better throughput. In this study the example of TCP SYN flood attack will be taken for implementing and evaluating the performance and scalability of the developed intrusion detection system. Second Objective of this study is to discuss the policies for implementing the intrusion detection system securely. And these policies shall also be evaluated. Intrusion detection system intrusion detection systems (IDS) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems. As network attacks have increased in number and severity over the past few years, intrusion detection systems have become a necessary addition to the security infrastructure of most organizations [2, 48]. There are many different types of intrusion detection system and they can be characterized by different monitoring and analysis approaches. Each approach has different advantages and disadvantages. All approaches can be described in terms of generic process model for intrusion detection systems. Many intrusion detection systems can be described in terms of three fundamental functional components information source, analysis, and response [2]. OVERVIEW Chapter 1 In this chapter we will give a brief introduction of whole project, what is the motivation for selecting this project. What are the main objectives of this project? And what is the main problem which will be considered in this project. Chapter 2 is all about the literature review. In this chapter many different aspects of the intrusion detection system will be discussed like why we require intrusion detection system, different type of intrusion detection system, need for intrusion detection system, about attacks different types of attacks and many other different facts about intrusion detection system which can help to improve the knowledge about intrusion detection system. Chapter 3 will focus on the analysis and designing part of the intrusion detection system. How a computer system can be designed. What s the system engineering and different type’s models will be discussed. CHAPTER 2 NEED FOR INTRUSION DETECTION SYSTEM Internet is carrying more traffic than ever before and still growing in the size without any end. Along with the explosive growth comes an increased threat from Internet related attacks. The Internet allows theft to occur from anywhere of the world [14]. Many threats impact on the operation of your computer network. Natural threats such as flood fire and tornadoes, causes unexpected disruptions. Most companies have well-defined procedure to handle these natural attacks. Security procedures designed to combat hacker attacks, an unsecured network will definitely be attacked. The only question is when the attack will occur [14]. COMPUTER ATTACKS AND VULRANABILITIES intrusion detection systems have been adopted by many organizations because the organizations know that intrusion detection systems are necessary component of the security architectures. But still intrusion detection system is not too much popular, most organizations lack experienced intrusion detection system operators. intrusion detection system can be most effective if the human operates it. But before developing a signature based intrusion detection system the knowledge of the attacks is must. Signatures is a set of rules that sensor uses to detect typical intrusive activities. These rules are based on various criteria i.e. IP protocol parameters, transport protocol parameter and packet data [12]. THE PHASES OF THE ATTACKS Attack can be divided into three different phases. The first phase is defining the goal for attack. The second phase is the reconnaissance attack, also known as the information gathering. After collecting the information the attacker proceed to the third phase, the attacking phase [12]. FIRST PHASE: GOALS OF ATTACK Before attacking a network or system, an attacker sets her goals or objectives. When attacking network the attacker can have various goals: Data manipulation System access Elevated privileges Denying availability of the network resources MOTIVATION Revenge Political activism Financial gain Attackers attempt to disrupt network to discredit the particular organization’s image [12]. RECONNAISSANCE BEFORE THE ATTACK Collecting the information is the attacker’s second step in launching an attack against the network. Successful reconnaissance is also important for successful attack. Attackers use two main mechanisms to collect the information about the network. Public data source Scanning and probing An attacker sometime starts his knowledge search by examining public information available about company. By using these kind of information the attacker can determine that where the business is located, the business partners, the value of the company assets and much more. And through scanning, the attackers use remote reconnaissance to find specific resource on the network. The goal of the information gathering is to pinpoint weak points on the network where an attack is likely to succeed. By pinpointing specific weakness on the network, the attacker can launch an attack in the future that generates minimal traffic or noise on the network. This greatly reduces the likelihood of detection during the actual attack [12]. For example: ping sweep, vertical scan, horizontal attack, DNS query, block scan and many more. THE ACTUAL ATTACK After an attacker maps the network, he researches known vulnerabilities for the system that he detected. The attacker’s goal at this stage is to gain access to resources of the network i.e. Unauthorized data manipulation, system access, or privilege escalation. ATTACK METHODOLOGY Regardless of the motivation or personal preferences, an attacker has several attack methodologies from which to choose [12]: Ad hoc (random) Methodological Surgical strike (lightning quickly) Patient (slow) AD HOC (Random) An ad hoc attack methodology is unstructured. An attacker using this methodology is usually disorganized and those types of attacks frequently fail. It is difficult to comprehensively locate targets on the network. METHODOLOGICAL It provides a well-defined sequence of steps to attack a network. First, the attackers use the reconnaissance to locate the targets. Next the attacker locates the exploits for known vulnerability on the target. Finally when he satisfies with his toolkit he starts attacking system on the target network. SURGICAL STRIKE (Lightning Quick) Many times the attacker uses an automated script against a network. The entire attack is completed in a few seconds. Before the system administrator or security analysts have time to react and make any decision. PATIENT (Slow) It refers to how quickly the attacker executes his attacks. Usually the one uses a patient (slow) methodology to avoid detection. Many intrusion detection systems have difficulty detecting attacks that occurs over long period of time. BACK DOORS Viruses and worms provide a vehicle for an attacker to wreak havoc on your network and potentially the Internet. However, the spread of viruses and worms is much harder to determine in advance. Viruses and worms are much harder to determine in advance. Trojan horse program enables an attacker to establish back door on systems. However Trojan horse requires some type of transport vehicle [12]. DENIAL OF SERVICE TECHNIQUES The purpose of DoS attacks is to deny legitimate access to the network resources. These attacks include everything from simple one-line commands to sophisticated programs written by knowledgeable hackers. There are different types of DoS attacks some of them are- Network resource overload Host resource starvation Out-of-band attacks Distributed attacks NETWORK RESOURCE OVERLOAD One common way to deny the network access is by overloading a common resource necessary for network components to operate. The main common resource that can be attacked in the network bandwidth in several ways generating lots of traffic, distributing the attack across numerous hosts, and using a protocol flaws that amplifies the attack by soliciting help from many different hosts on the target [12]. Example- Smurf and Fraggle attack. HOST RESOURCE STARVATION The resources available at the hosts are also known as the attack point as well. One such resource is the buffer that a host uses to track TCP connections. OUT-OF-BOUNDS ATTACKS The first out-of-bounds attack category uses over-sized packet, it overflows the allocated buffer and causes the system crash. An over-sized packet attack is ping of death. DISTRIBUTED ATTACKS The latest trend in DoS attacks is for an attacker to compromise numerous hosts and then use all these compromised hosts to provide a massive against a specific target. These types of attacks are known as the distributed denial of service attack (DDoS). DISTRIBUTION EFFECT To disrupt the victims communication very badly, the attacker must compromise an agent machine that has more network resources than the victim. Locating and breaking into such a machine may prove difficult, if the target of the attack is well-provisioned site [16]. Distribution brings number of benefits to the attackers: By using distribution techniques, the attacker can multiply the resources on the attacking end, allowing him to deny service to more powerful machines at the target end [16]. To stop a simple DoS attack from a single agent, a defender needs to identify that agent and take some action that prevents it from sending such a large volume of traffic. In many cases, the attack from a machine can be stopped only if the machine’s human administrator, or network operator, takes action. If there are thousands agents participating in the attack, however, stopping any single one of them may provide little benefit to the victim. Only by stopping most or all of them can the DoS effect be palliated [16]. If the attacker choose agents that are spread widely throughout the Internet, attempts to stop the attack are more difficult, since the only point at which all of the attack traffic merges is close to the victim. This point is called aggregation point. Other nodes in the network might experience no telltale signs of the attack and might have difficulty distinguishing the attack traffic from legitimate traffic [16]. In DoS attack executed from a single agent, the victim might be able to recover by obtaining more resources. For example, an overwhelmed Web server might be able to recruit other local servers to help handle the extra load. Regardless of how powerful a single agent might be, the defender can add more capacity until he outstrips the attacker’s ability to generate load. This approach is less effective in defending against DDoS attacks. If the defender doubles his resources to handle twice as many requests, the attacker merely needs to double the number of agents- often an easy task [16]. TCP-SYN ATTACK The SYN-flooding attack is a Distributed denial-of-service method disturbing hosts that run TCP server processes. The attack take benefit of the state retention TCP performs for some time after receiving a SYN segment to a port that has been put into the listen state. The basic idea is to utilize this behavior by causing a host to retain enough state for bogus half-connections that there are no resources to establish new genuine connections [51, 52]. A TCP implementation may allocate to LISTEN state to be entered with either all, some, or none of the pair of IP addresses and port numbers specified by the application. In many common applications like web servers, none of the remote host’s information is pre known or preconfigured, so that a connection can be established with any client whose details are unidentified to the server ahead of time. This type of â€Å"unbound† LISTEN is the goal of SYN flooding attacks due to the way it is typically implemented by operating systems [51, 52]. For success, [51, 52] the SYN flooding attack relies on the victim host TCP implementation’s behavior. In particular, it assumes that the victim allocates state for every TCP SYN segment when it is received and that there is perimeter on the amount of such state than can be kept at any time. The [51, 52] SYN flooding attack does not attempt to overload the networks recourses or the end host memory, but merely attempts to exhaust the backlog of half-open connections associated with the port number. The goal is to send a quick barrage of SYN segments from IP addresses (often spoofed) that will not generate replies to the SYN-ACKs that are produced. By keeping the backlog full of bogus half-opened connections, legitimate requests will be rejected. Three important attack parameters for success are the size of the barrage, the frequency with which barrages2 are generated, and the means of the selecting IP addresses to spoof. Usually, [51, 52] systems implements a parameter to the typical listen () system calls that allows the application to suggest a value for this limit, called the backlog. 1 To be effective, the size of the barrage must be made large enough to reach the backlog. Ideally, the barrage size is no larger than the backlog, minimizing the volume of the traffic the attacker must source. Typical default backlog values vary from half-dozen to several dozen, so the attack might be tailored to the particular value determined by the victim host and application. On machines intended to be servers, especially for a high volume of the traffic, the backlogs are often administratively configured to higher. Another aspect makes both DoS and DDoS attacks hard to handle: Defenses that work well against many other kinds of attacks are not necessarily effective against denial of service. For years, system administrators have been advised to install a firewall and keep its configuration up to date, to close unnecessary ports on all machines, to stay current with patches of operating systems and other important software, and to run intrusion detection system to discover any attacks that have managed to penetrate the outer bastions of defense [16]. Unfortunately, these security measures often will not help against denial of service. The attack can consist of traffic that the firewall finds acceptable. intrusion detection systems are of limited value in dealing with DoS, since, unlike break-ins and thefts, DoS attacks rarely hide themselves [16]. WHAT IS INTRUSION DETECTION SYSTEM? intrusion detection systems gather information from a computer or network of computers and attempt to detect intruders or system abuse. Generally, an intrusion detection system will notify a human analyst of a possible intrusion and take no further action, but some newer systems take active steps to stop an intruder at the time of detection [4]. The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all—they only identify evidence of intrusions, either while they’re in progress or after the fact. Such evidence is sometimes referred to as an attacks â€Å"manifestation.† If there is no manifestation, if the manifestation lacks sufficient information, or if the information it contains is untrustworthy, then the system cannot detect the intrusion [5]. intrusion detection systems are classified into two general types known as signature based and heuristic based. Pfleeger and Pfleeger describe signature-based systems as â€Å"pattern-matching† systems that detect threats based on the signature of the attack matching a known pattern. Heuristic based systems, which are synonymous with anomaly-based systems, detect attacks through deviations from a model of normal behavior [6]. intrusion detection systems that operate on a single workstation are known as host intrusion detection system (HIDS), while those that operate as stand-alone devices on a network are known as NIDS. HIDS monitor traffic on its host machine by utilizing the resources of its host to detect attacks. NIDS operate as a stand-alone device that monitors traffic on the network to detect attacks. NIDS come in two general forms; signature based NIDS and heuristic based NIDS [7]. PROCESS MODEL FOR INTRUSION DETECTION SYSTEM intrusion detection systems can be described in terms of three fundamental functional components [2, 48]: Information Sources the different sources of event information used to determine whether an intrusion has taken place. These sources can be drawn from different levels of the system, with network, host, and application monitoring most common. Analysis the part of intrusion detection systems that actually organizes and makes sense of the events derived from the information sources, deciding when those events indicate that intrusions are occurring or have already taken place. The most common analysis approaches are misuse detection based (signature based) and anomaly detection. Response the set of actions that system takes once it detects intrusions. These are typically grouped into active and passive measures, with active measures involving some automated intervention on the part of the system, and passive measures involving reporting intrusion detection system findings to humans, who are then expected to take action based on those reports. INFORMATION SOURCE The most common way to classify intrusion detection system is to group them by information source. Some intrusion detection systems analyze network packets, captured from network backbones or LAN segments, to find attackers [2]. It can be describe by dividing three different parts. NETWORK BASED INTRUSION DETECTION SYSTEM NIDS are intrusion detection systems that capture data packets traveling on the network media (cables, wireless) and match them to a database of signatures. Depending upon whether a packet is matched with an intruder signature, an alert is generated or the packet is logged to a file or database [8, 48]. Network-based intrusion detection systems often consist of a set of single-purpose sensors or hosts placed at various points in a network. These units monitor network traffic, performing local analysis of that traffic and reporting attacks to a central management console. As the sensors are limited to running the intrusion detection system, they can be more easily secured against attack. Many of these sensors are designed to run in â€Å"stealth† mode, in order to make it more difficult for an attacker to determine their presence and location [2, 48]. HOST INTRUSION DETECTION SYSTEM  or HIDS Host-based intrusion detection systems or HIDS are installed as agents on a host. These intrusion detection systems can look into system and application log files to detect any intruder activity. Some of these systems are reactive, meaning that they inform you only when something has happened. Some HIDS are proactive; they can sniff the network traffic coming to a particular host on which the HIDS is installed and alert you in real time [8, 48]. These types of intrusion detection systems run on host to reveal inappropriate activities on these hosts. The HIDSs are used for detecting the attacks from the inside and outside network. They provide snap shot about the existing system files and connect them to the previous. If the important system files were modified or deleted, the warning is sent to the administrator for inspection. The HIDS example is notice able on the machines with significant task; these machines do not expect the change of their configuration [9, 48]. APPLICATION-BASED INTRUSION DETECTION SYSTEM Application-based intrusion detection systems are a special subset of host-based intrusion detection systems that analyze the events transpiring within a software application. The most common information sources used by application-based intrusion detection systems are the application’s transaction log files. The ability to interface with the application directly, with significant domain or application-specific knowledge included in the analysis engine, allows application-based intrusion detection systems to detect suspicious behavior due to authorized users exceeding their authorization. This is because such problems are more likely to appear in the interaction between the user, the data, and the application [2, 48]. INTRUSION DETECTION SYSTEM ANALYSIS There are two primary approaches to analyzing events to detect attacks: misuse detection and anomaly detection. Misuse detection in which the analysis targets something known to be â€Å"bad†, is the technique used by most commercial systems. Anomaly detection, in which the analysis looks for abnormal patterns of activity, has been, and continues to be, the subject of a great deal of research. Anomaly detection is used in limited form by a number of intrusion detection systems. There are strengths and weaknesses associated with each approach, and it appears that the most effective intrusion detection systems use mostly misuse detection methods with a smattering of anomaly detection components [2, 48]. ANOMALY BASED DETECTION Anomaly detection uses models of the intended behavior of users and applications, interpreting deviations from this â€Å"normal† behavior as a problem. A basic assumption of anomaly detection is that attacks differ from normal behavior. For example, we can model certain users’ daily activity (type and amount) quite precisely. Suppose a particular user typically logs in around 10 Am., reads mail, performs database transactions, takes a break between noon and 1 Pm., has very few file access errors, and so on. If the system notices that this same user logs in at 3 Am., starts using compilers and debugging tools, and has numerous file access errors, it will flag this activity as suspicious. The main advantage of anomaly detection systems is that they can detect previously unknown attacks. By defining what’s normal, they can identify any violation, whether it is part of the threat model or not. In actual systems, however, the advantage of detecting previously unknown attacks is paid for in terms of high false-positive rates. Anomaly detection systems are also difficult to train in highly dynamic environments [5]. MISUSE DETECTION Misuse detection systems essentially define what’s wrong. They contain attack descriptions (or â€Å"signatures†) and match them against the audit data stream, looking for evidence of known attacks. One such attack, for example, would occur if someone created a symbolic link to a UNIX system’s password file and executed a privileged application that accesses the symbolic link. In this example, the attack exploits the lack of file access checks [5, 10]. The main advantage of misuse-based systems is that they usually produce very few false positives: attack description languages usually allow for modeling of attacks at such fine level of detail that only a few legitimate activities match an entry in the knowledge base. However, this approach has drawbacks as well. First of all, populating the knowledge base is a difficult, resource intensive task. Furthermore, misuse based systems cannot detect previously unknown attacks, or, at most, they can detect only new variations of previously modeled attacks. Therefore, it is essential to keep the knowledge base up-to-date when new vulnerabilities and attack techniques are discovered. Figure 2 shows how the misuse detection based intrusion detection system works is [11]. RESPONSE OPTION FOR INTRUSION DETECTION SYSTEM Once intrusion detection systems have obtained event information and analyzed it to find symptoms of attacks, they generate responses. Some of these responses involve reporting results and findings to a pre-specified location. Others involve more active automated responses. Though researchers are tempted to underrate the importance of good response functions in intrusion detection systems, they are actually very important. Commercial intrusion detection systems support a wide range of response options, often categorized as active responses, passive responses, or some mixture of the two [2]. IMPORTANCE OF THE INTRUTION DETECTION SYSTEM Usually we place a burglar alarm on the doors and windows of our home. We are installing an intrusion detection system (intrusion detection system) for our house. The intrusion detection systems used to protect our computer network operate in similar fashion. An intrusion detection system is a software and possibly hardware that detects attacks against our network. They detect intrusive activities that enter into our network. We can locate intrusive activity by examining network traffic, host logs, system calls, and other areas that signal an attack against our network [14]. There are different benefits that an intrusion detection system provides. Besides detecting attacks, most intrusion detection systems also provide some type of response to the attacks, such as resetting TCP connections [14]. DESIRABLE CHARACTERSTICS OF INTRUSION DETECTION SYSTEM There are different characteristics for an ideal intrusion detection system, which are listed below [many references]: An ideal intrusion detection system must run with minimum human supervision. An ideal intrusion detection system must be easy to deploy. An ideal intrusion detection system must be able to detect attacks intrusion detection system must not produce false negative alarms. intrusion detection system must not produce false positive alarms. intrusion detection system must report intrusion as soon as possible after the attacks occur. intrusion detection system must be general enough to detect different types of attacks. An ideal intrusion detection system must be fault tolerant; it must be able to recover from crashes and must restore previous state, either accidental or caused by malicious activities. An ideal intrusion detection system must impose minimal overhead on the system. An ideal intrusion detection system must be configurable to implement the securities policies of the system. THE PERIMETER MODEL AND DoS The perimeter model is an architecture commonly used by today’s organizations to protect critical infrastructures. This security model divides network architectures into two distinct groups; trusted and entrusted. The trusted group is often the finite internal infrastructure, whilst the entrusted group consists of infinite external networks. In this model two types of devices are used; firewall to control the traffic entering and leaving the trusted domain, and intrusion detection system to detect misbehavior of trust with in the trusted area boundary [18]. WHERE IDS SHOULD BE PLACED IN NETWORK TOPOLOGY Depending upon network topology, the intrusion detection system can be positioned one or more places. It’s also depends upon what type of intrusion activities should be detected: internet external or both. For example if the external intrusion activities should be detected, and only one router is connected to the internet, the best place for an intrusion detection system may be just inside the router or firewall. If there are many different paths to the internet, then the intrusion detection system should be placed at every entry point. However, if the internal attacks should be detected then the intrusion detection system should be placed in every network segment 2. Placement of the intrusion detection system really depends upon security policies 3 [8]. Note that more intrusion detection systems mean more work and more maintenance costs. Which defines that what should be protected from the hackers [8]? IDS AGAINST DENIAL-OF-SERVICE ATTACKS (DoS) The goal of a DoS attack is to disrupt some legitimate activity, such as browsing, web pages, an on line radio and many more. The denial of service is achieved by sending message to the target that interferes with its operation and makes it hang, crash, reboot or do useless work [16]. A denial-of-service attack is different in goal, form, and effect than most

Thursday, October 24, 2019

Chaucer’s Canterbury Tales: Exploring Injustice in the Knights Tale E

In "The Ending of 'Troilus,'" E. Talbot Donaldson writes in response to the conclusion of the "Knight’s Tale," one of Chaucer’s Canterbury Tales, "What it does suggest†¦is that Providence is not working justly." Though Donaldson correctly points out the fact that the "Knight’s Tale" ends in injustice, he confuses the role of sin in the injustice with the role of God. He asserts that God is to blame for the injustice in the "Knight's Tale" rather than exploring the role of human sinfulness. The Knight, an honorable, generous, courteous, and noble member of a party of twenty-nine people on a pilgrimage to the English town of Canterbury during the Middle Ages, tells his tale as part of a storytelling contest the pilgrims’ host holds. The "Knight’s Tale" takes place in Ancient Greece and relates the story of Arcite and Palamon, two cousins who risk their lives to win the love of Emily, Duke Theseus' beautiful sister-in-law. Originally, Arcite and Palamon come from Thebes, a rival of Athens, but Theseus captures and imprisons them during a war. During their incarceration, the cousins notice Emily. Her beauty causes pain in their hearts, as their detention prevents them from roaming about and getting to know fair Emily. Arcite explains, "The freshness of her beauty strikes me dead" (Coghill 49). The cousins’ obsession with Emily’s beauty, which they incorrectly describe as love, leads the two to go to battle against one another to determine which of them will gain the privilege of marrying this woman who "fairer was of mien/Than is the lily on its stalk of green" (Coghill 47). Though Arcite wins the battle, his horse gets spooked and he falls off and dies, thus transferring the right to marry Emily to Palamon, who lives happily ever... ...y situation that will ever occur. Humans cannot know God’s reasons for the way things turn out. People must trust Him to do what’s right. Donaldson’s entire argument revolves around the false expectation that, since God loves the world, nothing bad should happen and He should always deal out justice. Though Donaldson correctly realizes that prayers are not always answered and justice is not always carried forth, he blames the conclusion on God, rather than where it is actually due – on sin in the world. Works Cited Bible (King James Version). Grand Rapids, Michigan: Wm. B Eerdman's Publishing Co., 2003. Coghill, Nevill. Introduction. The Canterbury Tales. By Geoffrey Chaucer. Trans. Coghill. London: Penguin, 2000. Donaldson, E. Talbot, â€Å"The Ending of ‘Troilus’,† Chaucer’s Troilus: Essays in Criticism ed. Stephen A. Barney Hamden, CT: Archon Books, 1980

Wednesday, October 23, 2019

Identification of food constituents in milk Essay

Objective †¢To compare and analysis the composition of two different types of unknown milk, K1 and K2. †¢To determine the differences of the fat content in milk samples, K1 and K2. †¢To compare the reducing sugar in the both samples of milk, K1 and K2. †¢To compare the protein concentrations in the both samples of milk, K1 and K2. Introduction Milk provides a useful dietary source of calcium, which is vital for the growth and maintenance of bone and tooth. Milk is the first source of nourishment as it played an important role in human nutrition. The constituents in milk that are vital in food preparation are enzymes, vitamins, pigments, salts, sugar, fat, and proteins. Different milk samples which contain different food constituents will have a different nutritional value respectively. Sudan (III) is fat-soluble dye used for staining of triglycerides (fat). It is used in the experiment to detect for the presence of fatty acids. It will appear as red globules if fatty acids are present in the milk sample. Benedict’s reagent is used to test for the presence of reducing sugars. The solution will form a brick-red precipitate when the milk sample contains reducing sugar (glucose, maltose, lactose.) Sugar that can form an aldehyde and ketone in the presence of an alkaline solution is known as reducing sugars. The Biuret test is used to test for the presence of protein. The biuret test is based on the ability of Cu (II) ions to form a violet-coloured chelate complex with peptide bonds (-CONH-groups) in alkaline conditions. In Biuret’s test (consist of sodium hydroxide and copper (II) sulphate solution),the solution will turn to purple when the proteins are present in the milk sample. Proteins are organic compounds important for growth and repair. Protein molecules are composed primarily of amino acids linked together through peptide bonds. Materials Copper(II) sulphate solution, unknown milk sample (K1,K2), cooking oil, distilled water, salad oil, Sudan(III), full cream milk, Benedict reagent, 10% potassium hydroxide, 0.5% copper(II) sulphate Apparatus Test tubes, plastic pipettes, cork, water bath Methods (A) 1. A clean test tube is filled until 1cm of the top with copper (II) sulphate solution. 2. A small amount of K1 is pipette into a clean plastic pipette and a drop is gently released into the copper (II) sulphate solution as shown in Figure 3. Another drop of milk is further released. 3. Then the pipette is withdrawn slowly without disturbing the copper (II) sulphate solution. The movement of K1 is observed carefully and the observations are noted. 4. The procedure above is repeated using new, fresh copper (II) sulphate solution, new clean glass apparatus and the sample of K2. Observations on the movement of K2 are recorded and any differences in the behaviour of the drops of K1 and K2 are noted carefully. (B) 1. 6 test tubes are obtained and numbered them from 1-6. 2. The materials listed in Table 1 are added. 3. The contents of each tube are mixed thoroughly. 4. The colour changed of the tubes contents are recorded. TUBETUBE SOLUTION 1.1ml cooking oil + 1ml distilled water 2.1ml salad oil + 5 drops of Sudan III 3. 1ml full cream milk + 5 drops of Sudan III 4. 1ml distilled water + 5 drops of Sudan III 5.1ml distilled water + 1ml cooking oil + 5 drops of Sudan III 6.1ml cooking oil + 5 drops of Sudan III (C) (i) Reducing sugar test 1. 2cm3 of K1 obtained is poured into a test tube and added by 2cm3 of Benedict’s reagent. The reagent with the K1 solution is mixed thoroughly. 2. The test tube is shaken occasionally when placed in the water bath with the temperature of 94á ¶ ¿c and left for 5 minutes. 3. The colour changed is observed and the observations are recorded. 4. Procedures 1-3 are repeated with another sample of milk, K2. The observations are recorded. (ii) Protein test 1. To 2cm3 of K1 obtained in a test tube, 2cm3 of 10% potassium hydroxide solution is added into it and the tube is shaken to mix the contents. 2. 0.5% copper sulphate solution is added a drop at a time and the tube is shaken continuously. The drops added did not exceed 10 drops. 3. Procedures 1 and 2 are repeated using another sample of milk, K2 in place of rest solution. Results A.(i) Type of unknown milkObservation K1Milk droplets sank in the CuSO4. (ii) Type of unknown milkObservation K2Milk droplets floated on the top of CuSO4. B. TubeTube solutionDescription of reaction BeforeAfter 11mL cooking oil + 1mL distilled water2 layers solution formed, oil floated2 layers solution formed, oil floated 21mL salad oil + 5 drops of Sudan III2 layers of oil and Sudan III droplets formed2 layers solution formed (slightly red), Sudan III floated 31mL full cream milk + 5 drops of Sudan III2 layers of milk and Sudan III droplets formedSlightly pink milky solution formed 41mL distilled water + 5 drops of Sudan IIITransparent slightly red solution formedTransparent slightly red solution, small black precipitate formed 51mLdistilled water + 1mL cooking oil + 5 drops of Sudan III3 layers solution formed, Sudan III at the top while oil at the middle2 layers solution formed (slightly red), oil floated 61mL cooking oil + 5 drops of Sudan III2 layers of oil and Sudan III droplets formedSlightly orange solution formed Table 1 Questions: 1.What is the rational of Sudan III is used in this experiment? Sudan III in this experiment is used for staining lipids or fats. Sudan dyes are a group of lipid soluble solvent dyes called lysochromes. Sudan III also used to color the protein bound lipids in paraffin sections. 2.Which test tube is i.Positive control? Test tube 1, 2, 3, 5, and 6 are positive control. ii.Negative control? Test tube 4 was negative control. 3.Describe the chemistry of liquid test using Sudan III. Sudan III is used to determine the presence of lipids. It will stain the fat cells red. Sudan III is usually using in lipid test. First, the liquid being test and water are filled to a test tube about half full. 3 drops of Sudan III are added to test tube and being shaken gently. There will form a red-stained oil layer separate out and float on the water surface due to the presence of fat. C.(i) Reducing sugar test Types of unknown milkObservation K1Orange precipitate is formed. K2Yellow-orange solution is formed. (ii) Protein test Types of unknown milkObservation K12 layers solution of darker slightly purple milky solution and white colour milk is formed. K2Slightly purple milky solution is formed. Discussion In the part A experiment, milk droplets of K1 and K2 are released into the copper (II) sulphate solution gently. After released, both of the droplets are not dissolved in it. The K1 droplet slowly sank in the copper (II) sulphate solution while K2 droplet slowly floated on the top of copper (II) sulphate solution due to the different density. The density of K1 was higher than the density of K2 and copper (II) sulphate solution while K2 was lower density than CuSO4 solution. This experiment is used to determine the fat contained in different types of milk by the movement of milk droplets in CuSO4 solution. The higher the density of milk, the lower the fat contained. The results showed that K1 contained less fat compared to K2. Therefore, K1 was low-fat milk while K2 was full cream milk. In the part B experiment, cooking oil, salad oil, full cream milk, and distilled water were mixed with Sudan III in different test tubes for determining the lipid. Lipids are insoluble in polar solvent s for example water and can dissolve in non-polar solvent. Lipids are less dense than water and will float on the surface of solution. Sudan III in this experiment was used to colour the lipids. It stained the fat cells to become red colour. If lipid was presented, Sudan III will stain it and form red-stained oil. In test tube 1, cooking oil floated on the water surface after being shaken. In test tube 2, slightly red solution being observed after shaken showed that salad oil contain lipids. In test tube 3, the white colour full cream milk became slightly pink milky solution after added with Sudan III due to the fat presented in it. In test tube 4, distilled water formed a transparent slightly red solution after Sudan III was added to it. Sudan III was dissolved in distilled water but water is always negative control because there are only H2O molecules in it. In test tube 5, 3 layers solution became 2 layers solution that cooking oil at the surface. Oil became slightly red and Sudan III dissolved in oil. Sudan III is much more soluble in oil than in distilled water, so the distilled water still clear after experime nt because of Sudan III was absorbed by the oil. The last test tube which is test tube 6, the observation was similar to test tube 2 but it formed slightly orange solution which also contained lipids. Test tube 1, 2, 3, 5, and 6 stained red showed the presence of fat while test tube 4 was the only sample liquid that did not stained by Sudan III which fat absent. In reducing sugar test, Benedict’s reagent was used. Samples of milk, K1 and K2 became orange colour solution when tested with Benedict’s solution and heated. The observation showed that there was reducing sugar presented in both two milks. The solution added with Benedict’s reagent will change colour from green to red depend on the concentration of sugar provided. Before heating, K1 and K2 were bluish milky solution because added with blue colour Benedict’s solution. The colour of the milk changed during heating in the water bath. During the heating section, both of K1 and K2 were changed to green colour and finally orange colour solutions were formed. K1 produced darker colour of orange than K2 and precipitate formed in K1 showed that the sugar concentration of K1 was higher than K2. The biuret test is based on the ability of Cu (II) ions to form pink or purple colour when attached with peptide bonds in alkaline conditions. This was used to test protein in milk K1 and K2. In protein test, both of two samples of milk formed slightly purple milky solution as a result of reacting with potassium hydroxide and copper (II) sulphate solution in Biuret’s test. The solution turned purple in the end of experiment indicated that milk contained protein. After 0.5% copper sulphate solution added to K1, it became 2 layers solution of slightly purple milky solution at top and white colour milk at the bottom. The different concentration of protein can show by observing the different level of purple colour formed. The slightly purple colour formed in K1 was darker than K2 showed that higher protein concentration presented in K1. Precautions: 1.Released the drop of milk inside plastic pipette at the center of CuSO4 solution to avoid affection of movement of milk droplets in part A. 2.Shook the mixtures with Sudan III by using stopper as it is toxin. 3.Carried out the Biuret test for proteins at room temperature as it will cause negative results. 4.Added 0.5% copper sulphate solutions not exceed 10 drops as it will cause negative results. 5.Handled potassium hydroxide carefully as it is caustic. Washed affected area immediately if it contacted with the skin. Conclusion The experiment identified the major food components in different sample of milk. The part A experiment indicated that K2 milk sample contained more fat compare to K1 milk sample. K1 was low-fat milk while K2 was full cream milk. The part B experiment was conducted to determine the presence of lipid by adding Sudan (III) into different test tubes. Sudan III will stain it and form red-stained oil. The result showed that Test tube 1, 2, 3, 5 and 6 contains fat while test tube 4 did not contain fat. When tested with Benedict’s reagent, K1 milk sample produced darker colour of orange than K2 milk sample and the precipitate formed in K1 showed that the sugar concentration of K1 was slightly higher than K2. K1 milk sample formed more slightly dark purple solution than K2 when conducted in Biuret’s test. Therefore, it can conclude that K1 contained more protein compare to K2. References Websites †¢The chemical constituents of living matter. 2009. Retrieved October 27, 2012 from: http://voices.yahoo.com/the-chemical-constituents-living-matter-3856864.html †¢Analysis of the Chemical Components of Milk. 2000. Retrieved October 27,2012 from: http://uncw.edu/chem/Courses/Reeves/OnLineLabs/NonScience/9-milk%20lab.pdf †¢Experiment 3: Identification Of Food Constituents In Milk. 2012. Retrieved October 27, 2012 from: http://www.markedbyteachers.com/as-and-a-level/science/experiment-3-identification-of-food-constituents-in-milk.html

Tuesday, October 22, 2019

Essay on Understanding PovertyEssay Writing Service

Essay on Understanding PovertyEssay Writing Service Essay on Understanding Poverty Essay on Understanding PovertyBased on the information presented in this chapter, to what degree are poor people in the United States responsible for their poverty?In the United States, poverty is one of the major social problems. This fact means that it is not a new phenomenon in the global context as there are many poor people in one of the wealthiest nations in the world. However, the most important issue that is closely connected with this social problem is â€Å"who is responsible for poverty in the United States?† Social scientist, historians, economists and politicians have been interested in the study of the poor. To what degree are poor people in the United States responsible for their poverty? In order to find the answer to this question, it is necessary to understand the culture of people who live in poverty, as well as to have an understanding of the reactions of the privileged classes in American society toward the poor.In the United States, there is the largest g ap and inequality between the rich and the poor. People who live in poverty in the United States â€Å"lack or have insufficient basic necessities, such as food, water, clothing and shelter to provide a sense of well-being, both material and psychological† (Clancy, 2013, p. 36). In fact, those people who are in the lower class are responsible for poverty, as well as the U. S. government with its failures, such as unemployment, inflation, lack of effective social support. According to researchers, â€Å"these people are poor because they are not personally responsible, and the evidence of their lack of personal responsibility is that they depend on public assistance† (Young, 2011, p. 23). This fact means that poor people are not strong enough to fight for the better life.On the other hand, the U.S. government is responsible for poverty because the U.S. government plays an important role in developing economic and social policies aimed at assisting the U.S. citizens. The major goal of any government is to use the proper strategies to eliminate poverty rate. For example, private industry should be focused on preventing unemployment and promoting anti-poverty programs. Actually, the issue concerning the government’s responsibility is a debatable one, and it requires the adequate research. Some people state that the federal government is primary responsible for poverty reduction, others believe that the major responsibility for the growth of poverty lies on people. According to researchers, â€Å"if one thinks of poverty as resulting from a lack of opportunities empowerment and social protection, it is clear that the government is not solely responsible for filling that lack† (Moreno-Dodson Wodon, 2008, p. 4). Private sector provides massive opportunities for poverty reduction, including credit and employment opportunities, and the promotion of all society members and protection of all citizens. Private sector contributes to poverty red uction not only through independent initiatives, but also in close partnership with the government.At the same time, poverty is the state for many countries and nations, not only the United States. It would be wrong to blame poor people for their social status. Some of them are really lazy people; others have made poor decisions that led to poverty. However, they cannot be solely responsible for their troubles. It becomes clear that the governments are responsible for the poverty of poor people to a far greater degree. Some governments have pursued social, economic and political policies that actually harm successful development of their citizens. These policies create the major causes of poverty and inequality.Thus, it is necessary to conclude that poor people in the United States are responsible for their poverty to a lesser degree, while the U.S. government is responsible for their poverty to a far greater degree. Because of the inadequate policies, poor people have less access t o education, health, and other services. They face the problems of hunger, malnutrition and various diseases. Besides, poor people face inequalities in all spheres of human activity.Investigate resources for people who are living in poverty.   What are the resources and how do they help people.Social inequality in modern society is associated with the negative consequences for the quality of life of the poor. The phenomenon of poverty is not a new one. In order to investigate the major resources for people who are living in poverty, it is necessary to refer to the study of the conditions of life of the poor. The term â€Å"the poor† can be defined as â€Å"persons, families and groups of persons whose resources (material, cultural and social) are so limited as to exclude them from the minimum acceptable way of life in the society they live in† (Atkinson   Marlier, 2010, p. 7). There are many resources for people who are living in poverty, including education, hous ing, social contacts, employment, cultural traditions and customs, religion, medical care, etc. These resources affect the poor, their decisions, their lifestyles, etc. Moreover, each of these resources can help the poor to overcome various obstacles in their lives, including inequality, discrimination, prejudices, low self-esteem and other obstacles that affect human life to a great extent.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Education is one of the major resources for human beings, no matter how rich he or she is. Education has a positive impact on human life, providing massive opportunities of individual development and career growth. Job training helps the poor to find a good job and solve the problem of unemployment. Human service training programs and technical and community colleges guarantee positive outcomes. Another important resource is housing. For poor people, housing is essential. Today the U. S. government provides special housing for the poor – tempora ry shelters, including night shelters and battered women’s shelters. Social contacts are one of the most important resources that affect human life and individual development. Employment is another significant resource that can help the poor to improve the quality of their lives and become more independent. Today many anti-poverty programs developed and launched by the federal government that are necessary for poverty reduction. Expanded employment opportunities for the poor can change poverty outcomes. The U. S. government has generated employment opportunities for the poor through rural development and through the creation of the â€Å"credit to the enterprising poor† (Sharif, 2007, p. 141). Cultural traditions and customs can be viewed as a significant resource for the poor. Researchers state that â€Å"third world poverty is the result of traditional values† (Blackwell et al., 2008, p. 79). In the United States, poor people also face serious problems connect ed with the lack of following cultural traditions and customs. Many poor people are undeveloped, demonstrating â€Å"technological retardation linked to cultural flaws† (Blackwell et al., 2008, p. 79). This fact means that their culture is not focused on modern technology. These people live in the world of the so-called â€Å"outdated traditional values† (Blackwell et al., 2008, p. 79). The poor people should overcome these values and become more independent, innovative and flexible to new technological changes. Religion is an important resource that can help the poor to become more self-confident and develop human values. Christian teaching regarding the possession of wealth helps the poor to assess the meaning of life and find the proper solutions to the existing challenges. Medical care is a crucial resource for the poor. Today the federal government has developed effective health care settings to assist the poor, including â€Å"free medical clinics, community hea lth centers and obstetrics clinics associated with hospitals† (Templeton, 2011, p. 45).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Thus, it is necessary to conclude that various resources affect the life of people who are living in poverty.   These resources help people to become more developed and enjoy equal rights in human society, avoid prejudice and discrimination. These resources include education, housing, social contacts, employment, cultural traditions and customs, religion, medical care, etc. People without resources have limited opportunities to achieve the established goals in their lives. People with resources have more chances to become successful in their lives. The U. S. government should promote the proper resources to facilitate the life of poor people.The global recession that began in December 2007 has been described by U.S. Federal Reserve Chairman Ben Bernake as one of the most difficult financial and economic episodes in modern history. According to r esearchers, â€Å"the current global recession is certainly the worst economic crisis that has afflicted the international system since the Great Depression†(Tellis, 2009, p. 3). The recession that was identified in the United States in 2007 can be defined as a financial crisis, which was based on failing subprime mortgages, and which later was expanded into a â€Å"larger recession† that had a strong impact on the U.S. economy. Later it was expanded at the global level.Millions of people not only in the U.S., but also in many other countries of the world have either lost their jobs and/or have had hours and benefits cut. Besides, millions people have lost a large portion of their retirement funds and in most cases have also lost significant equity in their homes. Meanwhile, as has been reported in the media, Chief Executor Officers (CEOs) of the world’s largest companies continue to receive extravagant bonuses even though their company profits have plummeted an d many of their employees have been laid off or fired due to the â€Å"bottom line†. According to researchers, the banking sector has been influenced by the global economic recession, as well as many other fields. Nevertheless, their financial results were good enough. Based on the findings provided by the Fair Economy, â€Å"despite the looming economic recession, CEOs of the largest 500 companies in America earned an average of US $10.5 million, 344 the pay of typical American workers and 866 times as much as minimum wage employees† (Sun et al., 2010, p. 233). These findings demonstrate impressive numbers.Undoubtedly, this situation is unethical. Actually, the recession was partly caused by the unethical behavior of American investors. This situation places emphasis on the importance of ethics and its role in the country’s economy. The recession of 2007 involved unethical and illegal action of the leaders of large corporations. Unethical profits of large compa nies have negative impact on population.There is a necessity to use the proper strategies to improve the situation, e.g. the federal government should step in and regulate pay. According to researchers, later in 2009, â€Å"the president Obama maintained general support for his handling of the economy for seven months, despite a severe recession†( Sun et al., 2010, p. 89). In 2007, many Americans blamed the US President George Bush for the lack of support in the economic recession. Researchers state that there were at least four categories of the government’s mistakes. These mistakes produced the crisis. First, monetary policy and global imbalances affected the economy of the country. Second, different government policies promoted subprime mortgage related risk taking by all types of financial institutions. For example, the Congress pressured the enterprises, sponsored by the federal government, etc. These policies contributed to the promotion of the underestimation of the existing subprime risk.   Third, the U.S. government failed to guarantee prudential regulation of commercial banks operating in the U.S. This mistake led to the crucial problems connected with measuring bank risks. Fourth, the government failed to regulate subprime ratings inflation and provide the regulatory reliance on ratings.Thus, it is necessary to conclude that the global recession that began in December 2007 had a negative impact on the U.S. economy and on the lives of all Americans. Millions of jobs had been destroyed. Nevertheless, the recession of 2007 provided an example of the so-called flat world, because it had been spread worldwide, affecting global economy as well. Many large businesses used the recession to improve their positions on the market. Their unethical profits should be addressed by the government policies, through pay regulation. Actually, the deep recession that began in 2007-2008, revealed the failures and effects of the government’s inadeq uate regulation of banks and financial institutions. Millions of people could not sustain their mortgage loans and the government did not make steps to regulate payments. So, reviewing the financial crisis of 2007-2008, it is necessary to pay due attention to the role of the government in this situation, including its failures- deregulation and lack of the oversight of the banking system.

Monday, October 21, 2019

Gallipoli essays

Gallipoli essays Gallipoli (Feb 19 1915 Jan 9 1916) was an Allied campaign to capture the Turkish capital Constantinople and wrest control of the strategically invaluable Dardanelles straits, thus allowing supply lines to run through the the cut-off Russians. The first planned attack was a British/French naval assault on February 19 1915. It bombarded Turkish artillery along the coast but had very little effect. A new attack was launched on March 18 targeting a bottleneck in the Dardanelles. It suceesfully destroyed many Turkish artillery targets, but the fleet ran into an uncharted minefield and lost three battleships, prompting the allies to withdraw their naval force. After the deemed failure of the naval campaign, the allies decided to attempt a land invasion. Australian and New Zealand soldiers stationed in Egypt formed the Australian and New Zealand Army Corps, and were sent to land on a point approximately one mile north of Gaba Tepe. However, poor planning caused them to land a mile and a half further north than planned, in a cove today known as Anzac Cove. The Anzacs were faced with a difficult battle from the onset cliffs and ravines forming the terrain made it difficult to progress. They were beaten to the high ground by Mustafa Kemals reinforcements, who launched a counter-attack. The Anzacs were pinned on the beaches and lost a third of their forces, but maintained their position. Soon enough, trenches were established and both sides quickly began to reach a stalemate. The soldiers daily routine included breakfast, rifle and ammo cleaning, patrol and trench maintenance, and then a midday meal. Afterwards, the soldiers concentrated on sanitation, and then an evening meal. During the night when soldiers patrolled enemy positions, repaired or extended barbed wire, or dug new trenches, Turkish snipers were most active. During the day, it was risky for soldiers to raise their heads above the parapet line ...

Sunday, October 20, 2019

Quotes From The Notebook

Quotes From The Notebook The movie The Notebook is an adaptation of the novel by the same title. This romantic story is told by an old man, Duke, reading to an old woman in a nursing home. The  emotional roller coaster ride of the movie makes us laugh and cry along with the lead characters, Allie and Noah, who fall in love but are separated by her parents. Years later Allie meets a wealthy soldier, Lon, and becomes engaged to him. When Noah returns, she has to choose between the two men. These quotes from The Notebook focus on the miraculous power of love. Duke   It was an improbable romance. He was a country boy. She was from the city. She had the world at her feet while he didnt have two dimes to rub together.Look guys †¦ thats my sweetheart in there. Im not leaving her. This is my home now. Your mother is my home.He [Noah] got the notion into his head that if he restored the old house where they had come that night, Allie would find a way to come back to him. Some called it a labor of love. Others called it something else. But in fact, Noah had gone a little mad.I am no one special. Just a common man with common thoughts. Ive led a common life. There are no monuments dedicated to me and my name will soon be forgotten, but in one respect Ive succeeded as gloriously as anyone who ever lived. Ive loved another with all my heart and soul and for me that has always been enough. Young Noah   Now you know that I want to give you everything you want. But I cant  because theyre  gone... Theyre broken.Its not going to be easy. Its going to be really hard. And were going to have to work on this every day, but I want to do that because I want you. I want all of you, forever, you and me. Noah The best love is the kind that awakens the soul; that makes us reach for more, that plants the fire in our hearts and brings peace to our minds. Thats what I hope to give you forever.I wrote you 365 letters. I wrote you every day for a year. It wasnt over ... it still isnt over.Stop thinking about what I want, what he wants, what your parents want. What do you want?   Allie I want a white house with blue shutters and a room overlooking the river so I can paint.Do you think our love can make miracles?It was real, wasnt it? You and me. Such a long time ago, we were just a couple of kids. But we really loved each other, didnt we?   Allies father Well, in theory, were both millionaires, but in reality, we live with a bunch of whores. Allies Fiancà ©Ã‚   The way I see it, I got three choices. One, I can shoot him. Two, I can kick the crap out of him. Or three, I leave you. Well, all thats no good. You see, cause none of those options gets me you.  [about Noah]

Saturday, October 19, 2019

INTRODUCTION TO INTERNATIONAL BUSINESS GLOBAL MAKETING Case Study

INTRODUCTION TO INTERNATIONAL BUSINESS GLOBAL MAKETING - Case Study Example This resulted into a provision of year round contributions of products, services, technology and resources in terms of finances. As opposed to the 1990’s broadcasting was significantly on the rise though the award of the same seemed complex. Never in the past had a single negotiation resulted into a multi-game broadcasting and though the percentages of Canada in terms of viewers decreased in 2006 as compared to 2002, was the overall success with regards to the same commendable. For the 2006 winter Olympics, there was a representation in terms of sponsorships in three main categories that is the main sponsors, official sponsors and official suppliers. Among the three levels The Torino Organizing Committee was able to get 57 companies and 63 brands a number which included 5 main sponsors and 17 official sponsors and number which were quite significant in the success of the Olympics (Glasurit set for 2006 Olympics. (Final Coat) (Brief Article). (2005, November 1). To realize this success the sponsors undertook huge investments. The investments by the sponsors through the Olympics of 1998, 2002 and 2006 in terms of partners increased from 26, 53 to 57 in 2006 while the revenue and support was $163 million, $494 million and $348 million in the last year due to minor challenges faced at that time(Elam and Curt). The ticket and licensing took a twist where over 540000 products were sold to commemorate the 2006 winter Olympics through 32 official licenses for 35 products groupings bringing revenue of $17 million which was way ahead by 10% above the set target. Among the licensed products involved a higher percentage of Torino 2006 brand images. Another success was witnessed in rising of the awareness of the Olympics. An increase of percentage from 87% in 2004 to 94% in 2006 of awareness was recorded and hence a boost in all the remaining aspects (Elam and Curt). 2. What worked well, and what did not? In terms of worldwide sponsorship as a longer term marketing p rogram aimed at promoting prolonged sponsorship of the Olympic Games, the 2006 winter Olympics which falls in the year category 2005-2008 recorded 12 TOP sponsors which became the sixth TOP cycle since the advent of the program hence we call it TOP VI (Elam and Curt). The future still needs to look for more sponsorship to strengthen the financial base of the organization. This will be realized through stronger legislations which direct the management of funds required for the same (Glasurit set for 2006 Olympics. (Final Coat) (Brief Article). (2005, November 1). Despite the fact that the 2006 Olympics was a success it is hard to say that it is the best Olympic so far witnessed as those for Lillehammer of 1994 and that for Salt Lake City of 2002 can still be ranked above them for the reasons of a few setbacks. This is despite the right things that happened of the sponsorships and the tickets sales and licensing acts which all lead to the creating of the independent of the IOC due to the increased revenue. The other partners like NOC and OCOG also benefitted from the money resources collected (Elam and Curt). There are though a few things which did not happen right and need to be corrected which include; the difficulty experienced in the comparison of the winter games. Such clarity must be distinguished so that monies such as those used for broadcasting and even other advertising can be rightly and transparently accounted for. Lack of such

Friday, October 18, 2019

BIO Essay Example | Topics and Well Written Essays - 250 words - 4

BIO - Essay Example For example, research reveals that the soil is mostly polluted by release of heavy metals by vehicles. It occurs is a number of ways such as fluid leakage, combustion and corrosion of metals. Another issue is marine and coastal pollution. These causes of this problem are human activities, oil spills and sewage (Aslam et al. 316). The third issue is the development of artificial islands; it has been a big concern to environmentalist because of impacts on marine life. The artificial islands in Dubai are likely to damage the growth of reefs and affect native habitat. Additionally, material used to construct the islands affect the water; the water gets dirty (Butler). The UAE is well aware of the mentioned issues, and they are working together with international agencies to curb such issues. Companies operating quarries are regulated by Dubai Municipality. The municipality also measures the quality of air throughout UAE. Pollution from automobiles will be reduced by introduction of cleaner compressed gas. The gas will be available for trucks, buses, and taxis that have been the main contributors to air pollution (Mills). Aslam Junaid, Khan Saeed Ahmad and Khan Sheba Haque. â€Å"Heavy metals contamination in roadside soil near different traffic signals in Dubai, United Arab Emirates.† Journal of Saudi Chemical Society 17 (2013): 315–319.

Psychology of Violence Essay Example | Topics and Well Written Essays - 1500 words - 1

Psychology of Violence - Essay Example Though the article does not state Mr Clementi suffered from bullying, humiliation and invasion of privacy as a sex offense, Mr Ravi delegitimized him by taking all levels of privacy out of his hands. It is considered a sex offense because he broke the solitude Mr Clementi was after, by having the room until midnight, the intimacy of having a sexual relationship with anonymity and the reserve to decide under what terms. These four types of privacy were established by Mr Westin.(DeCew) As the police had already established that Mr Ravi had been bullying Mr Clementi since August, he will be tried for a bias crime. Behavioral Psychology is a theory that all behaviors are gained through conditioning: classical & operant. Conditioning occurs through interaction with the environment. Classical conditioning have two elements, the conditioned stimulus and the conditioned response. Operant Conditioning is the association between the behaviour and the consequence for that behaviour. From this conditioning, the learning theory was developed. Negative behaviour can be eliminated by taking away the benefit. A persons behaviour is learned by the consequences which can be external forces. His conscious is changed by the rewards he receives. Mr Ravi is an insecure young man as a new student; as psychologically needing to break his roommate; and who needs to make a place for himself in the dormitory. His name is Indian, so he has suffered prejudices for half of his life in the US. . He might also be questioning his own sexuality which could be common but not part of his own culture. Did he bully Mr Clementi because of his sexual orientation; or would he have done so to any roommate? The questions is his satisfaction in wanting to torture another individual. In putting the streaming of his encounter on the internet, was he showing his jealousy in Mr Clementis ability to perform on stage. Both acts represent the most

Managing of Energy Assets Essay Example | Topics and Well Written Essays - 3000 words

Managing of Energy Assets - Essay Example In wind power generation, there are no harmful by-products left over since no chemical processes take place. Also, with wind power, pollution that can contaminate the environment is avoided. Since wind generation is a renewable source of energy, we will never run out of it. Farming and grazing can still take place on land occupied by wind turbines which can help in the production of biofuels. Wind farms can be built off-shore like that in Germany and at some states of the United States of America. Wind energy harnesses the power of the wind to propel the blades of wind turbines. A turbine is a machine powered by rotating blades. The rotation of turbine blades is converted into electrical current by means of an electrical generator. In the older windmills, wind energy was used to turn mechanical machinery to do physical work, like crushing grain or pumping water. Wind towers are usually built together on wind farms. Now, electrical currents are harnessed by large scale wind farms that are used by national electrical grids as well as small individual turbines used for providing electricity to isolated locations or individual homes (Layton, 2006).   History of Wind Power Technology In the beginning, wind power production did not have any impact on the power system control. When it started in the 1980’s production was a few tens of kW, and today, multi-MW range wind turbines are being installed. This also means that wind power production in the beginning did not have any impact on the power system control, but now they have to play an active part in the grid due to their size. The technology used in the past wind turbines was based on a squirrel-cage induction generator connected directly to the grid. With that, there is no control of the active and reactive power, which typically are important control parameters to regulate the frequency and the voltage. The power pulsations in the wind are almost directly transferred to the electrical grid. As there is a n increase in the power range of the turbines, the control parameters become more important and likewise, necessary to introduce power electronics as an interface between the wind turbine and the grid. The power electronics is changing the basic characteristic of the wind turbine from being an energy source to be an active power source. The electrical technology used in wind turbine is not new. It has been discussed for several years but now the price per produced kWh is so low, that solutions with power electronics are very attractive (Blaabjerg & Chen, 2005) . Wind Turbines Stored energy is referred to as potential energy, while energy in motion is called kinetic energy. Kinetic energy can be captured, just like the energy in the moving water that can be captured by the turbine in a hydroelectric dam. In the case of a wind turbine, the turbine blades are designed to capture the kinetic energy in wind. Modern wind turbines fall into two basic groups; the  horizontal-axis  varie ty, like the traditional farm windmills used for pumping water, and the  vertical-axis  design, like the eggbeater-style Darrieus model, named after its French inventor. Most large modern wind turbines are horizontal-axis turbines. In any wind-energy turbine, the three crucial parts are the rotor blades, the shaft, and the generator (Sudrai & Chindris, 2005). The rotor blades act as barriers to the wind, such that when the wind forces the blades to turn, kinetic energy is

Thursday, October 17, 2019

Sesame Street Ganstas Reflection Essay Example | Topics and Well Written Essays - 250 words

Sesame Street Ganstas Reflection - Essay Example The image which is taken in a street setting depicts as a character who always finds his way. He is shown in the episode demonstrating his ball-juggling ball skills. He as well challenges the other characters, including a baby to catch the ball. As a way of frustrating his subjects, he at one time deflates a fellow character, a football, leaving it formless and without the ability to bounce. In a crooked way, Elmo also slowly and skillfully blows a golf ball into the hole, just for him to win. He best seems to apply the principle of the end justifies the means. In the fictitious streets of Manhattan city, the characters, Elmo finds himself in trouble in the hands of gangsters. He is sandwiched between weapon-bearing gangsters. In the episode on balls, Elmo appears to dominate his world. Even when in the arms of these gangsters, he still appears as one who is fearless and is seen struggling to free himself. The gangsters in their street where Elmo seems to have trespassed in his quenc h for adventure seem to be much determined to hold him captive. The gangsters and the poor Elmo appear to be in a big struggle. The image, therefore, portrays Sesame as a street with a mixture of characters, who are out to challenge each other. This makes the image most suitable for children since it creates a complete satire of the Sesame Street, in a way which is humorous and educative. It prompts the children to be wary of the dangers likely to be encountered in the streets. The image is also suitable to adults. This is because apart from entertaining them, it also brings out the reality that caution should never be thrown to the wind especially when in the streets. The image raises the societal issue of the real world where gangsters in the streets is a real problem. It leaves the audience with the information that, caution should never be ignored especially

Analyze report grading rubric Assignment Example | Topics and Well Written Essays - 750 words

Analyze report grading rubric - Assignment Example Training is important because it helps equip the learners with the correct skills, attitudes and orientations towards work, helping them feel satisfied with their work (Price, 2000). The training is being performed in order to equip the supermarket personnel with the necessary skills of handling supermarket operations which include: customer service skills, inventory skills, managing skills and reporting skills. When the supermarket staff is recruited, they come from different fields which necessitate training in order for them to understand the operations of the supermarket. The problem comes as a result of deficiencies that result from their different training backgrounds. None of these people are trained in supermarket operation except for the top management that have specialized roles. The other people are sourced from around the community and thus may lack essential skills that are necessary in performing the tasks in the supermarket. The content of the training program is divided into four: customer service, inventory handling, managing and reporting. All the staff must go through the four topics exhaustively in order to be termed ready for placement within the supermarket chains. In the content, the staff learns practical and analytical skills which they are expected to use at the supermarket. The content will be delivered by way of direct instructions. In other instances depending on the nature of the topic, the content delivery mode will be experiential. This is true for customer service training as the people need to know how to handle the prospective customers. The program will take 6 months to be considered complete. Within the six months, one month will be assigned for assessment. The training will be conducted to young people between the ages of 20 to 30. This group is specifically considered by the management as appropriate to engage in the operations of the company. The group to be trained has

Wednesday, October 16, 2019

Managing of Energy Assets Essay Example | Topics and Well Written Essays - 3000 words

Managing of Energy Assets - Essay Example In wind power generation, there are no harmful by-products left over since no chemical processes take place. Also, with wind power, pollution that can contaminate the environment is avoided. Since wind generation is a renewable source of energy, we will never run out of it. Farming and grazing can still take place on land occupied by wind turbines which can help in the production of biofuels. Wind farms can be built off-shore like that in Germany and at some states of the United States of America. Wind energy harnesses the power of the wind to propel the blades of wind turbines. A turbine is a machine powered by rotating blades. The rotation of turbine blades is converted into electrical current by means of an electrical generator. In the older windmills, wind energy was used to turn mechanical machinery to do physical work, like crushing grain or pumping water. Wind towers are usually built together on wind farms. Now, electrical currents are harnessed by large scale wind farms that are used by national electrical grids as well as small individual turbines used for providing electricity to isolated locations or individual homes (Layton, 2006).   History of Wind Power Technology In the beginning, wind power production did not have any impact on the power system control. When it started in the 1980’s production was a few tens of kW, and today, multi-MW range wind turbines are being installed. This also means that wind power production in the beginning did not have any impact on the power system control, but now they have to play an active part in the grid due to their size. The technology used in the past wind turbines was based on a squirrel-cage induction generator connected directly to the grid. With that, there is no control of the active and reactive power, which typically are important control parameters to regulate the frequency and the voltage. The power pulsations in the wind are almost directly transferred to the electrical grid. As there is a n increase in the power range of the turbines, the control parameters become more important and likewise, necessary to introduce power electronics as an interface between the wind turbine and the grid. The power electronics is changing the basic characteristic of the wind turbine from being an energy source to be an active power source. The electrical technology used in wind turbine is not new. It has been discussed for several years but now the price per produced kWh is so low, that solutions with power electronics are very attractive (Blaabjerg & Chen, 2005) . Wind Turbines Stored energy is referred to as potential energy, while energy in motion is called kinetic energy. Kinetic energy can be captured, just like the energy in the moving water that can be captured by the turbine in a hydroelectric dam. In the case of a wind turbine, the turbine blades are designed to capture the kinetic energy in wind. Modern wind turbines fall into two basic groups; the  horizontal-axis  varie ty, like the traditional farm windmills used for pumping water, and the  vertical-axis  design, like the eggbeater-style Darrieus model, named after its French inventor. Most large modern wind turbines are horizontal-axis turbines. In any wind-energy turbine, the three crucial parts are the rotor blades, the shaft, and the generator (Sudrai & Chindris, 2005). The rotor blades act as barriers to the wind, such that when the wind forces the blades to turn, kinetic energy is

Tuesday, October 15, 2019

Analyze report grading rubric Assignment Example | Topics and Well Written Essays - 750 words

Analyze report grading rubric - Assignment Example Training is important because it helps equip the learners with the correct skills, attitudes and orientations towards work, helping them feel satisfied with their work (Price, 2000). The training is being performed in order to equip the supermarket personnel with the necessary skills of handling supermarket operations which include: customer service skills, inventory skills, managing skills and reporting skills. When the supermarket staff is recruited, they come from different fields which necessitate training in order for them to understand the operations of the supermarket. The problem comes as a result of deficiencies that result from their different training backgrounds. None of these people are trained in supermarket operation except for the top management that have specialized roles. The other people are sourced from around the community and thus may lack essential skills that are necessary in performing the tasks in the supermarket. The content of the training program is divided into four: customer service, inventory handling, managing and reporting. All the staff must go through the four topics exhaustively in order to be termed ready for placement within the supermarket chains. In the content, the staff learns practical and analytical skills which they are expected to use at the supermarket. The content will be delivered by way of direct instructions. In other instances depending on the nature of the topic, the content delivery mode will be experiential. This is true for customer service training as the people need to know how to handle the prospective customers. The program will take 6 months to be considered complete. Within the six months, one month will be assigned for assessment. The training will be conducted to young people between the ages of 20 to 30. This group is specifically considered by the management as appropriate to engage in the operations of the company. The group to be trained has

Best Practices and Strategies Essay Example for Free

Best Practices and Strategies Essay Ex: functional, conglomerate, and divisional. For this list of practices we will use the divisional design. a. Divisional Design aka M form (the M stands for multidivisional): Is made up of separate, semi autonomous units or divisions and each division has its own goals to accomplish. 6) Culture: Refers to the set of values that helps its members understand what the organization stands for how it wants to accomplish what it wants to accomplish, and what it considers important. 7) Human Resource Strategy Implementation: Requires an understanding of undamental individual and interpersonal behavioral process. b. Individual Process: Psychological Contracts; Personality; Motivation; and Stress. c. Organizational system and Process: Understanding of the causes of stress, the process by which stress affects individuals can cope better with stress in organizational settings. d. Interpersonal Group Process: Group Behavior; Leadership; and Communication. Select one (1) the corporate strategies discussed in Chapter 4 and formulate a human resource strategy that will support the corporate strategy. Cost leadership strategy is one that focuses on minimizing the cost as much as possible. This strategy allows the firm to charge the lowest possible prices for its products, thereby presumably generating an overall level of revenue. A human resource strategy that will support this corporate strategy would be: a. Efficiency Ratio: keeping expenses low with earnings being high. b. Learning Curve: maintaining training and continues training of employee’s. c. Good Purchasing approach: acquiring goods or services to accomplish the goals of the firm. . Maintaining latest technology: helps maintain inventory control, which in return helps ensure products to customers. e. Strategic marketing mix to help ensure market leadership f. Superior customer service: series of activities designed to enhance the level of customer satisfaction. Competitive or above average pay, employee advancement, and employee incentivizes. g. Product leadership: concept which describes delivering state of the art products in the market. Discuss the Fruit Guys business strategy. Identify three (3) other businesses that could use the five (5) questions the Fruit Guys used to determine effectiveness and identify three (3) businesses in which the business strategy would not work well. Provide a rationale for your answer. The business strategy that the Fruit Guys uses is the defender strategy. Defender strategy: works best when a business operates in an environment with relatively little uncertainty and risk and high degree of stability. The goal of the defender is to identify for itself a relatively narrow niche in the market and then to direct a limited set of products or services at he niche. After reviewing the website of the Fruit Guys, their niche is to provide fresh â€Å"healthy brain food† as the fruit guys refer to it as such to the premises of the workplace. As healthy foods to the office â€Å"can boost productivity, improve wellness and help companies improve their bottom line†. The Fruit Guys fills thousands of business of businesses in America with seasonal fresh fruit varying from small family businesses, to major Fortune 500 companies. With their customers sharing their idea on health, and the environment, this helps bring stability to the company, while their employees bring in pride, giving high productivity levels. The five questions that the Fruit Guys have based their strategy on is: I. Have we been respectful to the people we work with employees, coworkers, and customers? II. Have we been responsible to their needs? III. Have we been realistic with them about what we can or cannot do? IV. Can we take personal responsibility for the situation? V. Are we going to be remembered positively? Three companies that could use the five questions to work for their businesses are: a) Car Dealerships (especially Used Car dealerships) b) Construction Companies c) Cleaning Company Three Companies that would not benefit from the use of the five questions are: a) Jc Penny’s b) Walmart c) BJ’S Wholesale Club (ex: Costco) My reasoning behind my choices for the use of the five questions are these companies are more hand’s on with their companies, and actually rely on word of mouth business and repeat business. Without these referrals and repeat business these companies would have to rely a lot on marketing and advertising strategies. My reasoning behind my choices for these businesses that would not benefit from the five questions is because these companies are very well expanded. With many stores in many different locations of one state and through-out many states these companies do not rely on word of mouth or repeat business. As their marketing strategies, advertising strategies, and sales are what continuously brings in repeat customer, and new customers.

Monday, October 14, 2019

Role of Technology in Travel Management

Role of Technology in Travel Management TRAVEL INDUSTRY CURRENT PRACTICES INTRODUCTION In this chapter I will take an overview of the travel industry in order to better understand the context about which I am writing. Consideration of the value of the business travel spend, the role of Travel Management Companies and the role of technology in its operation and future vision, are the relevant issues in this regard. An outline of the various managerial approaches used by private industry will help inform my analysis of travel management in the public sector and what lessons can be learnt. VALUE OF BUSINESS TRAVEL In 2013 Hermes Consultancy Management produced a white paper on ‘Corporate Travel Management in Western Europe: Opportunities and Challenges’. The research was commissioned by Amadeus (a Global Distribution Service provider) in order to better understand how organisations manage their travel activities and to identify saving opportunities for travel managers. The white paper calculated that in 2011, business travel in Western Europe amounted to almost â‚ ¬ 200 billion, concentrated in five countries: Germany, UK, France, Italy and Spain. Hermes (2013). Eleven corporations in the UK, France, Belgium, Ireland and the Netherlands took part in the research study and numerous travel mangers, executives and travellers from these companies were interviewed. The Central Statistics Office tells us that in 2011, the Irish business travel spend was â‚ ¬548 million on 698,000 business trips (CSO 2013) of that public sector travel under the Government air travel contract was : â‚ ¬5.9 million for 18,358 trips and in 2013 it increased to â‚ ¬6,972, 477 for 25,902 trips. The increase in volume can be attributed to Ireland Presidency of EU during 2013. Business travel is a substantial and growing sector with a significant travel spend. As globalisation continues apace, companies and governments will reach out to newer markets for their goods and services, at the same time as continuing to consolidate traditional markets in a challenging economic climate. Figures from the Global Business Travel Association (GBTA) indicate that spending on business travel within the UK, Germany, France, Italy and Spain is forecasted to climb by 6% next year, an increase which may be set to come about as a result of improvements to the global economy. Government travel is predicted to increase by 4.9% according to GBTA, who believe that the slightly lower percentage for government travel might be because governments have already successfully cut travel spend, while corporate business is enjoying an uptick as it starts and continues to hire new employees who travel. Government business in Europe accounts for 4.7% (â‚ ¬940 mil) of all business travel demand compared with 5% globally. The Director of Operations with GBTA McGavock believes that, that share is expected to increase for at least the short term. â€Å"While 2012 was a difficult year, by the end of 2013 we predict an upturn, and in 2014 we believe we will see extensive growth. The next five years should see a bounce back in business travel among all of Western Europe’s major markets.† The European Commission predicts that the 27 countries it represents will emerge from recession in the fourth quarter of 2013, with its overall economy growing by 1.4% in 2014, Eurostat (2012). Accompanying this growth will be an increasing requirement for corporate travel and this expansion will require robust and innovative management in order to control costs and spend. TRAVEL MANAGEMENT COMPANIES Travel Management Companies are the medium through which organisations use to implement and manage their business travel requirements. They should not be confused with the work of a traditional Travel Agency which provides travel to the leisure traveller on behalf of suppliers, airline, hotel, car hire companies. Most travel agencies have a separate department that deals with business travel, and some travel agencies specialise in commercial and business travel only. This department would trade as a travel management company and implement the organisations travel policy. They procure travel on behalf of the organisation according to its policy on the class of travel permitted to fly, negotiate corporate fares/rates with airlines and hotels as well allowing the organisation use its corporate credit card to procure flights online via their online booking tool. According to the Buying Business Travel magazine (2013) the top five (5) TMC’s operating in Europe based on their European spend are: CarlsonWagonlit Travel (CWT), ( £1,157m) HRG Travel, ( £1,000m) American Express, ( £958.1m) Capital Travel and Events ( £525m) BCD, ( £480m) FCM Travel Solutions ( £428) All of the above have a presence in Ireland through either partner agreements or wholly owned. The current provider for the Irish Government travel contract is CarlsonWagonlit Travel. The previous government providers were; HRG (Club Travel) and FCM Solutions. Due to the size of the Government spend approximately â‚ ¬6 to â‚ ¬9 mil annually it is not surprising that the top TMC’s have continually competed for the business. In addition as it is a centralised contract, a large sized company would be required to deal with the volume of transactions generated by Irish Government travel. Each of these companies use a global distribution system (GDS) which provides a network whereby TMC’s can access fares from the various airline reservations systems and facilitates online transactions. This in turn provides a portal for clients of TMC’s to procure their air travel through the use of online booking tools OBT). The most popular GDS providers are, Travelport, Galil eo, Sabre and Amadeus, public sector has had access to Travelport through KDS OBT licensed by CWT and Galileo OBT licensed by HRG. ECONOMIC CLIMATE The impact of the global economic downturn has resulted in an increased emphasis on generating savings, as companies strive to operate within an ever decreasing resource envelope. This is relevant to all organisations and Travel Management Companies in particular. Economic stringency has allowed travel managers to take a more prominent role within their companies, and has made travel management, as a profession, an important element of a company’s strategic planning. According to the Global Business Travel Association (2014), travel managers have been asked to lead company-wide efforts to reduce travel costs, track relevant savings, and report them back to senior management. The knock-on effect of this to TMC’s is increased competitiveness within the travel management sector. The natural ambition of business organisations is specifically the transformation of inputs (resources) into outputs (goods or services) (Worthington Britton, 2006: 4). In the context of a TMC, th e company employs the relevant staff to carry out specialised travel advisory duties, and provides the necessary booking systems to their staff in order to maximise their input to output ratio; in the current economic climate this is becoming more and more challenging. So the drive is on in every sector to achieve greater value for money. TECHNOLOGY In Chapter 2, I looked at technology in relation to the procurement of travel; here I will examine it as it impacts on the business environment, in which TMC’s operate. In terms of external environmental factors, Thomas Davenport (2013) indicated that technological change is one of the main issues currently impacting TMC’s, with the potential of completely transforming the way in which the companies operate. Davenport ( 2013) and a number of other authors including Fred Gebhard (2013), highlighted that the travel industry is at a ‘Big Data’ crossroads, and that complex, large volume and unstructured datasets are beginning to reshape and transform the industry. Additionally, Davenport suggested that big data will require the industry to address a number of challenges, in order to unlock its potential: technological complexity; data accuracy and rights of use; business and technological alignment. At the corporate buyer level gaining access to accurate travel reporting data is a major factor in the effective management of air travel and presents opportunity to identify where savings can be achieved. This is very important for both the buyer and supplier of air travel. It is interesting to note that technological developments pose both an opportunity; and a threat to TMC’s. The opportunities for the companies may involve ensuring the company is up to date with technological advancements within the industry in order to remain competitive. Conversely, if TMC’s are slow on the uptake of embracing and implementing new technology in their organisation, they may be at a disadvantage within the business travel market. Overall, the rapid advancements in technology alone present a significant challenge to the travel industry, specifically to TMC’s. Voice BASED AND MOBILE TECHNOLOGY A key writer on the travel industry, Scott Gillespie (2012) identified various technological changes which he emphasised are a ‘tipping point’ for the corporate travel industry. Some of those changes mentioned include the technological advancements of voice-based user interfaces from Apple, Google. Gillespie asserted that these new interfaces may be a threat to company policy compliance, due to the convenience of using such interfaces for travellers; which may in turn cause them to purchase travel outside of company policy direction. If the traveller does not book through the proper channels directed within company policy, there is no way for the TMC or corporation to track the traveller’s whereabouts or provide them with services in an emergency (West, 2013) In Chapter 2 we looked at ‘M’ technology and the growth of that market and its increasing importance in the procurement of air travel. CarlsonWagonlit Travel has invested in this area in its rece nt acquisition of Worldmate a leading mobile technology company. This will bear fruit in CWT’s mobile app ‘CWT TO GO’. Airlines are slowly moving towards mobile phone app technology which will replaces the requirement for printing of electronic tickets and boarding passes by using mobile phone QR code (barcode) technology to check in for flights. The ongoing evolution of technology emphasises the importance for TMC’s to keep up to date with it in the provision of procurement systems for clients which are not only economical, efficient and effective but contemporary and convenient to use. CORPORATE SOCIAL RESPONSIBILITY (CSR) The concept that organisations should be held accountable for the effects of their actions on people, their communities and the environment is known as CSR. There are many aspects of CSR which impact on the travel industry and consequently their end users. There are increasing concerns for rising carbon emissions; this coupled with rising costs naturally leads organisations to seek alternatives to air travel. These alternatives include video conferencing and webinars, however, it has been emphasised that face-to-face meetings still remain an important aspect of business negotiations (Forbes, 2009). This affects the competitive environment of TMC’s, since a threat of a substitute method to conduct meetings is available. Travel Management companies need to maintain their relevance in a rapidly changing business environment. And Government travel needs to be particularly vigilant as penalties are imposed on increasing carbon emissions under the Kyoto Protocol. MODELS OF TRAVEL MANAGEMENT It is not feasible to produce a definitive list of air travel procurement models, but in general they fall under the following categories; INHOUSE CENTRALISED MODEL TMC; This model is one where all travel is procured from a centralised office within the company in association with a TMC, who provides online and offline bookings. This model allows greater control over travel policy and spends and is used by both private and public sector. Business travelers would feel this model is too restrictive and doesn’t allow flexibility but that is mute point when it comes to controlling spend. INHOUSE DECENTRALISED MODEL TMC This model is one where travel can be procured by the individual employee either directly with the TMC for offline booking or online through the corporate booking tool. This model allows greater control to the individual and is favored by high-tech or internet based companies, E.G. EBay, Google, independence over their booking. This model tends to be accompanied by an incentive programme, whereby travelers can gain perks by purchasing travel within company policy and in this way costs can be controlled. INHOUSE CENTRALISED AND DECENTRALISED TMC This model is a mixture of the two above and is a very inefficient model of travel procurement as it is very difficult to control travel expenditure and policy compliance. It is generally adopted by organisations where there is little senior management buy in to control the travel spend. INHOUSE TMC IMPLANT. This model allows a staff member of the TMC to reside within the organisation to procure all of the travel requirements of the organisation. This can be an expensive option unless travel policy is strictly enforced. INHOUSE GDS IMPLANT( verify with Volker in Amadeus/ Microsoft ) This model allows for the provision of a staff member of the GDS provider to be embedded within the organisation to assist the procurement of all travel requirements of the organisation. This can be a very efficient option as it eliminates the ‘middle man’ charges of the TMC in the procurement of air travel as it procures direct with the GDS provider. Some organisations who favour this method also have a TMC contract for the provision of VIP or specialised travel only. In the public sector in Ireland government travel is purchased through a centralised contract but managed and procured in many different ways by each of the Government Departments, bodies and agencies with varying usage of online and offline methods. Some use the contract to procure only air travel, others use it for air and hotel (Brussels hotels only as per the contract) and car hire. More and more private companies are using a travel expense management system (OBT) where all expenses related to travel; air, hotel, car, and subsistence/entertainment are captured on the same system, in this way making it more transparent and easier to control and analyse travel expenditure. SUMMARY The world of business travel is a valuable, innovative and technologically evolving industry. The opening up of new markets and the drive to expand business into new frontiers is a reality. Coupled with this is the requirement to develop new business relationships which must be nurtured though face to face meetings thus giving continued impetus to this sector. We have reviewed the role and function of TMC’s and technology in the travel industry and the future challenges they face. The various models of travel management gives us an insight into how the travel industry operates and provides a framework that can be compared against the research findings when examined in more detail and assist in establishing what can we learnt by both the private and public sector in the management of air travel