Wednesday, July 31, 2019

Network Security Plan Essay

INTRODUCTION (Purpose and Intent) The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems. These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA). SCOPE These standards and procedures apply to all information systems and resources under the control of Corporation Tech, including all computers connecting to the Corporation Tech network and all Corporation Tech System employees, contractors, and any other individuals who use and/or administer those systems and computers, particularly those involved with information system management. STANDARD PROVISIONS Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control. User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited  from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or Internet computing resources. In the interest of maintaining account security, passwords will be changed on a regular schedule or anytime the integrity of the account is in question. Corporation Tech IT network or computing resources may not be used for personal commercial purposes, for personal profit or to violate the laws and regulations of the United States or any other nation, or the laws and regulations of any state, city, province or other local jurisdiction in any material way. Use of Corporation Tech resources for any illegal activity may result in loss of network access privileges, official reprimand, suspension or dismissal. Corporation Tech will cooperate with any legitimate law enforcement agency or inquiry in the investigation and prosecution of any alleged wrongful activity. Corporation Tech’s network or Internet facilities may not be used to disable or overload any computer system or network, or to circumvent any system intended to protect the privacy or security of another user. Corporation Tech owned networking and communications equipment, may only be moved by Network and Computing Support staff, or authorized agents. Reconfiguration of network hardware or software, except by designated individuals within IT, is strictly prohibited. Prior to connecting any server, network communication or monitoring device to the Corporation Tech Network, approval must be obtained from Data Center Communications. Attachment of any the following devices to the Corporation Tech network, other than those provided or approved by Network and Computing Support, is strictly prohibited: a. DHCP servers. b. DNS servers. c. NAT routers. d. Network Gateways. e. Packet capturing or network monitoring devices. f. Any device that disrupts or negatively impacts network operations. STATEMENT OF PROCEDURES The procedures for conducting a risk assessment and for the control and mitigation of risks to the Corporation Tech Information Systems include: NETWORK CONTROL Corporation Tech IT has software and systems in place that have the ability to monitor and record network, Internet and computer system usage. This includes monitoring and security systems that are capable of recording network traffic, including traffic to World Wide Web sites, chat rooms, newsgroups and e-mail messages, file servers, telnet sessions and file transfers into and out of our internal networks. This capability is necessary in order to maintain the health of Corporation Tech network operations and diagnose network related problems. Corporation Tech IT reserves the right to perform network monitoring at any time. The information collected may be used by technicians and management to assess network utilization and trends, and may also be provided to upper management or other authorities as evidence as part of any investigation of alleged policy violations. Corporation Tech IT reserves the right to perform periodic port scans, segment sweeps, and vulnerability scans on all network segments. Network operations, functions, and resources, which are not required as part of the normal and approved job duties or projects at Corporation Tech, may be bandwidth limited or blocked by network control devices in order to protect the integrity and availability of the overall system. Corporation Tech IT may suspend network access to any location or system that disrupts normal network operations or systems that violate Corporation Tech policy. In this event, an attempt will be made to contact the responsible individual to resolve the problem. DHCP SERVICES Corporation Tech IT provides centralized and redundant DHCP and DNS services for Corporation Tech. Due to the nature of these services, and because of the potential disruption of service and possible security breaches resulting from incorrect setup of additional systems, attachment of unauthorized DHCP or DNS servers is prohibited. The following guidelines must be followed when requesting or using any DHCP or DNS services: †¢ Systems requiring an IP address must support DHCP and be capable of obtaining DHCP address information from one of the centrally administered University DHCP servers. †¢ Using DHCP, devices requesting an IP address will be assigned a dynamic pool address from the subnet to which the device is attached. Devices with dynamically assigned IP addresses may have their address change. †¢ Static IP addresses needed for server class machines or specialized clients must be  requested from the Data Center Communications Team via a Help Desk ticket. DNS SERVICES User workstations, which have been assigned a dynamic pool IP address, will have an associated DNS name assigned by the network. Any DNS name or domain name that is to be associated with Corporation Tech network, must be requested from and/or registered through Web Services. DNS names ending in corptech.com are made available upon request for Corporation Tech approved services. Requests for assignment of DNS names must be for valid Corporation Tech related purposes. DNS names for domains other than corptech.com, and which are to be hosted by Corporation Tech systems, must be requested from Web Services. Any charges for initial or ongoing registration of the requested name are the responsibility of the requestor. DNS names, not in the corptech.com domain, will be handled on a case by case basis. Corporation Tech IT will work with any user requesting a domain name to identify an appropriate and available name, however Corporation Tech IT has final approval for all DNS name assignments. WIRELESS NETWORK SERVICES Because wireless networks can be used to provide access to the same resources and services as wired network systems, the same basic procedures that are used in a wired network environment can also be applied in a wireless network environment. However, due to the nature of wireless networks, additional security and control mechanisms are needed in order to maintain the security, operation and inter-operability of both traditional and wireless systems. Wireless routers are not allowed on the Corporation Tech network unless they have been approved by Corporation Tech IT. Access to the Corporation Tech Wireless network is limited to individuals who have a Corporation Tech account except in locations where the guest network is available. The Corporation Tech Guest Network is segregated from the internal servers and resources used by authenticated users to keep the network secure. The Corporation Tech Guest Network is only available in approved areas, and require a request to be expanded into any other areas. Users of the Corporation Tech Guest Network are required to provide a valid cell phone number in order to authenticate. Destruction and Disposal of Information and Devices Restricted information must be disposed of in such manner as to ensure it cannot be retrieved and recovered by unauthorized persons. When donating, selling, transferring, surplusing or disposing of computers or removable media (such as DVDs), the proper procedures to make data unreadable on those media will be taken. Acceptable procedures are listed on ISSP-009, â€Å"Medial Disposal.† NETWORK ACCESS Anyone who uses the Corporation Tech computing environment must have appropriate status (e.g. management, employee, staff, or authorized third party) and must be properly authenticated when required. Access will be provided to vendors and or other Corporation Tech partners through the sponsored VIP account process, as described on http://www.corptech.com/it/services/vip.aspx. VIP accounts are reviewed and renewed on six month intervals to see if access is still needed. When an employee leaves the organization accounts will be disabled once TERM status is updated, and individual departments must approve re-activation of account access. USER COMPUTING DEVICES Users are responsible for the security and integrity of Corporation Tech information stored on their workstation, which includes controlling physical and network access to the equipment. Users may not run or otherwise configure software or hardware that may allow access by unauthorized users. Anti-virus software must be installed on all workstations that connect to the Corporation Tech Network. Corporation Tech Computers may not be used to copy, distribute, share, download, or upload any copyrighted material without the permission of the copyright owner. PHYSICAL ACCESS Access to Corporation Tech IT Data Center should be restricted to those responsible for operation and maintenance. Access by non-IT personnel is not permitted unless they are escorted by an authorized IT staff member. Computer installations should provide reasonable security measures to protect the computer system against natural disasters, accidents, loss or fluctuation of electrical power, and sabotage. Networking and computing hardware are placed in secure and appropriately cooled areas for data  integrity and security NETWORK HARDWARE Network hardware are housed behind a locked door to protect physical access to switches and other network hardware. Access is only allowed though card access or with a checked out key. All switches and network hardware are password protected at a minimum via a local account setup on the device itself, these passwords are changed periodically as administrators leave the organization. Subnets allowed to authenticate with switch management will be restricted, to create tighter control of backend administration. Exec level access Timeouts implemented on Console and VTY lines, so that any idle sessions are terminated automatically. All switches are time synced using NTP, so that incidents can be tracked and correlated to the proper timeframe. SERVER ENVIRONMENTS All servers are subject to a security audit and evaluation before they are placed into production. Administrative access to servers must be password protected and use two-factor authentication whenever possible. Servers should be physically located in an access-controlled environment. All internal servers deployed at Corporation Tech must be owned by an operational group that is responsible for system administration. Servers must be registered with the IT department. At a minimum, the following information is required to positively identify the point of contact: a. Server owner contact(s) and location. b. Hardware and Operating System/Version c. Main functions and applications d. MAC address (If not a virtual server) Services and applications that will not be used must be disabled where practical. Access to services should be logged and/or protected through access-control methods to the extent possible. The most recent security patches must be installed on the system as soon as practical. Do not use administrator or root access when a non-privileged account can be used. Privileged access must be performed over secure channels, (e.g., encrypted network connections using SSH or IPSec). EXCEPTIONS All requests for exceptions to these standards and procedures will be handled by request, and will follow these guidelines: †¢ Must be submitted in writing to and approved by the CIO or with the proper authority. †¢ Will be reviewed on a case by case basis. NETWORK SECURITY Corporation Tech network design is built around three principles, Defense-in-Depth, Compartmentalization of Information and Principle of Least Privilege. Our first step was to look at what we are protecting, which is ultimately our business and clients data and information. To ensure a sound architecture we started the design of our network with scalability in mind. It is important that our design is flexible enough to meet future needs. The threats we know about and face today may not be the ones we face tomorrow. While developing security requirements for our IT system resources, we will determine if they are mission-critical or data-sensitive resources. This will allow us to determine where data confidentiality and integrity are the most important requirements, or where the priority is continuity of operation (availability). DEFENSE-IN-DEPTH Network safeguards offer the first protection barrier of IT system resources against threats originating outside the network. These threats can be in the form of intruders or malicious code. Our network design offers layered protections. What this means is the security layers complement each other; what one misses the other catches. This will be accomplished by locating security defenses in different places throughout our IT system, as well as not using two of the same types of safeguards. Although this may increase the complexity of our security system and can potentially make management and maintenance more difficult and costly, we believe the safety of the IT system resources should be based on the protection. With defense-in-depth in mind, the first layer of our network security plan starts with our network perimeter security. The principle network security defenses are firewalls, intrusion detection and prevention systems (IPS/IDS), VPN protections and content inspection systems like anti-virus, anti-malware, anti-spam and URL filtering. The traditional first line of defense against attacks is typically the firewall, which is configured to allow/deny traffic by  source/destination IP, port or protocol. It’s very straight forward, either traffic is allowed or it’s blocked. With the advent of Next Generation firewalls, which can include application control, identity awareness and other capabilities such as IPS, web filtering, and advanced malware detection, all of these features can be controlled by one device. COMPARTMENTALIZATION OF INFORMATION Corporation Tech will have IT system resources with different sensitivity levels or different risk tolerance levels and threat susceptibilities. These resources should be located in different security zones. The idea is to hide the data or information and make it available only to those systems where it is necessary for conducting system tasks. Examples of this are: †¢ E-mail, Web and DNS servers are located in the DMZ behind the perimeter firewall. †¢ Databases servers such as SQL servers are located in the Database Zone, within the internal firewall/IPS. †¢ Intranet servers, file servers and user workstations are in the LAN zone within the internal firewall. †¢ The Internet is located in the Internet zone behind the perimeter firewall. Principle of Least Privilege Corporation Tech administrators and users will have minimal privileges necessary for proper functioning within the organization. This rule applies also to data and services made available for external users. An extension to this rule is the â€Å"Need-To-Know† principle which says that users and administrators of Corporation Tech IT system have access to only the information relevant to their role and duties performed. Other points of security that we will address in our network services availability is the single point of failure principle, the separation of duty and job rotation rules. The network paths between users and mission-critical IT system resources, all the links, devices (networking and security) as well as the servers will be deployed in redundant configurations. The goal of the separation of duty and job rotation rule is to limit an employee’s ability to neglect and break the IT system’s security policy. Separation of duty dictates that important tasks/functions should be performed by two or more employees. Job rotation states that there should be rotation of employees in important positions. NETWORK HARDENING For each layer of security, we will ensure they are running the most up-to-date software and operating systems, and that the devices are configured properly. SECURITY ZONES Intrusion Prevention (IPS) devices are responsible for detecting and blocking penetrations and attacks conducted by intruders and malicious malware applications. We recommend an IPS be installed in the network path between potential threat sources and sensitive IT system resources. Attacks through encrypted SSL sessions are a potential vulnerability so we recommend decrypting the sessions prior to it reaching the IPS device in order to inspect unencrypted packets. The IPS will be properly optimized and monitored to catch attackers that have slipped past the first defense (firewall/router). Internal networks will not have direct access to the Internet so a Trojan sent to a user’s workstation through a phishing attack would not allow the intruder to connect to the external network. Internet services are available for internal users only through company email and HTTP Proxy servers. ENABLE SECURE NETWORK ACCESS We will install a VPN that is configured to allow encrypted communication to our network from the outside. Utilizing two-factor authentication, ensuring the integrity of the users making the request. This is external-facing to our network and allows users to tunnel into our LAN from the outside once the appropriate measures are taken to secure access. SEGMENTED DMZ There will be a front-end firewall for the external traffic and a back-end firewall for the internal traffic. Firewall rules will be optimized and tightened on all publicly available systems to allow traffic to only the necessary ports and services living within the DMZ. Firewall rules have been created to only allow the source IP addresses and port to the specific servers and proxies have been added in the network from which administrators are allowed access to the systems. Systems within different VLANs (with a layer 3 switches) have been configured to help isolate and respond to incidents if a server in the DMZ is compromised. Authentication on the LAN is required before access to the DMZ is even attempted. This prevents allowing complete control over these systems at any given time. DEVICE  INTEGRITY All hardware and software will be purchased only from the manufacturer or from resellers who are authorized and certified by the equipment manufacturer. Unused physical interfaces on network devices will be shut down. Access lists that allow only those protocols, ports and IP addresses that are required by network users and services are implemented. Everything else is denied. Network device configuration file are protected from unauthorized disclosure. Steps have been taken to avoid plaintext passwords in the configuration files. This has been accomplished by using encryption and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files. Change passwords/keys immediately if the network device configuration file is transmitted in the clear (or is otherwise exposed) while containing non-encrypted passwords/keys. Secure protocols will be used when transmitting network device configuration files. All unneeded services on network devices must be sh ut down. Log files will be reviewed regularly to gain an in depth understanding of normal network behavior. Any irregularity will be reported and investigated. SECURE MANAGEMENT Only secure protocol standards (SSHv2; IKEv2/IPsec; TLS v1.0+) will be used when performing remote management of network devices. Default usernames and/or passwords will not be used. The network infrastructure security policy should define password length and complexity requirements. Review the network infrastructure security policy. This policy identifies who is allowed to log in to network infrastructure devices and who is allowed to configure network devices, and defines a plan for updating network device firmware at scheduled intervals. PORT VULNERABILITES Port 25 – Is used for SMTP (Simple Mail Transfer Protocol). It uses both tcp and udp protocols. This port used for e-mail routing between mail servers and is susceptible to many known Trojan’s. We are keeping this port in a closed state. Port 80 – Is used for web traffic Hyper Text Transfer Protocol (HTTP). It uses both tcp and udp protocols. Port 80 udp is also used by some  games, like Alien vs Predator. Code Red and Nimda worms also propagate via TCP port 80 (HTTP). Also, a number of trojans/backdoors use these ports. We are keeping this port in a closed state. Port 139 – Is used for NetBIOS. NetBIOS is a protocol used for File and Print Sharing under all current versions of Windows. By default, when File and Print Sharing is enabled it binds to everything, including TCP/IP (The Internet Protocol), rather than just the local network, meaning your shared resources are available over the entire Internet for reading and deletion, unless configured proper ly. Any machine with NetBIOS enabled and not configured properly should be considered at risk. The best protection is to turn off File and Print Sharing, or block ports 135-139 completely. We will leave this port in an open state but will turn off file and print sharing capabilities. Port 1900 – Is used for SSDP, UPnP. UPnP discovery/SSDP, is a service that runs by default on WinXP, and creates an immediately exploitable security vulnerability for any network-connected system. It is vulnerable to denial of service and buffer overflow attacks. Microsoft SSDP Enables discovery of UPnP devices. We are keeping this port in a closed state. Port 2869 – Is IANA registered for: ICSLAP. It uses both tcp and udp protocols and is used for Microsoft Internet Connection Firewall (ICF), Internet Connection Sharing (ICS), SSDP Discover Service, Microsoft Universal Plug and Play (UPnP), and Microsoft Event Notification. We will leave this port in an open state. Port 5357 – Is used by Microsoft Network Discovery, and should be filtered for public networks. It uses both tcp and udp protocols. It is also IANA registered for: Web Services for Devices (WSD) – a network plug-and-play experience that is similar to installing a USB device. WSD allows network-connected IP-based devices to advertise their functionality and offer these services to clients by using the Web Services protocol. WSD communicates over HTTP (TCP port 5357), HTTPS (TCP port 5358), and multicast to UDP port 3702. We will close this port and redirect traffic to HTTPS (TCP port 5358). Port 6839 – This port is not associated with any particular services and should be closed unless it is associated and used. Port 7435 – This port is not associated with any particular services and should be closed unless it is associated and used. Ports 9100, 9101 and 9102 – These TCP ports are is used for printing. Port numbers 9101 and 9102 are for parallel port s 2 and 3 on the three-port HP Jetdirect external print  servers. It is used for network-connected print devices. These ports should remain open to allow print services. There are no listed vulnerabilities associated with these ports. Port 9220 – This port is for raw scanning to peripherals with IEEE 1284.4 specifications. On three port HP Jetdirects, the scan ports are 9290, 9291, and 9292. It is used for network-connected print devices. This port should remain open to allow print services. There are no listed vulnerabilities associated with this port. Port 9500 – TCP Port 9500 may use a defined protocol to communicate depending on the application. In our case we are using port 9500 to access the ISM Server. The ISM Server is used for exchanging backup and recovery information between storage devices. This port should remain open while services are in use. There are no listed vulnerabilities associated with this port. Port 62078 – This port is used by iPhone while syncing. The Port used by UPnP for multimedia files sharing, also used for synchronizing iTunes files between devices. Port 62078 has a known vulnerability in that a service named lockdownd sits and listens on the iPhone on port 62078. By connecting to this port and speaking the correct protocol, it’s possible to spawn a number of different services on an iPhone or iPad. This port should be blocked or closed when service is not required on the device. References BEST: Network Security Policy and Procedures. (n.d.). Retrieved from http://www.ct.gov/best/cwp/view.asp?a=1245&q=253996 Example Security Plan. (2014, November 17). Retrieved from http://www.binomial.com/security_plan/example_security_plan_template.php Hardening Network Infrastructure Security Recommendations for System Accreditors. (n.d.). Retrieved from https://www.nsa.gov/ia/_files/factsheets/Hardening_Network_Infrastructure_FS.pdf Network Security Policy: Best Practices White Paper – Cisco. (2005, October 4). Retrieved from http://www.cisco.com/c/en/us/support/docs/availability/high-availability/13601-secpol.html Paquet, C. (2013, February 5). Security Policies > Network Security Concepts and Policies. Retrieved from http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 SANS – Information Security Resources | Information Security Policy Templates |.

Tuesday, July 30, 2019

Globalization as Neo Colonialism Essay

When in the 1950s and 60s, most colonized countries and territories across the world threw off the yolk of colonialism, there was tremendous hope and anticipation that a new era of hope, independence, freedom and self – determination was about to unfold. In most cases, it was with great reluctance that the colonial masters granted independence to their erstwhile colonies from where they had for generations held the total control that had enabled them to exploit human and material resources and perpetuate themselves in the social economic and political lives of their subjects. In Kenya and Algeria for instance, it was with extreme violence that independence was won. Thus, the Mau-Mau Movement of Kenya and the Algerian War of Independence remain to this date, significant watersheds in the movement for independence especially among African countries. However, independence has not always resulted in the anticipated changes. In some countries, once the common enemy in form of the colonial masters was rid of, local differences manifested, sometimes resulting in bitter wars. The 1947 Indo – Pakistani war is a case study. There are many other instances including Congo, Nigeria, Malaya, and even recently in Western Sahara, Eritrea and East Timor, among others where the fight for independence and independence itself has resulted in wars and strife. Sometimes, independence has come along with baggage of grief, blood and a plethora of painfully crushed hopes. Some thinkers argue that the colonial powers put in place mechanisms to ensure that the new states fail, or to allow them to continue to control the newly emergent countries even after independence. The close social, political and economic ties and relationships between former colonies and former colonial powers seem to favor this argument. Thus, 44 years after independence, Britain is still one of Nigeria’s biggest trading partners. The close ties between France and Francophone Africa, and even the US and say, Philippines lend credence to this theory. One can hardly dispute this view in light of overwhelming evidence. However, as the world continues to experience changes, the concept of neo colonialism is fast fading out of fashion. Newer and more sophisticated, yet more subtle movements are taking over, the most important of which is Globalization. The mass movement of capital, aggregated by effortless flow of human and material resources across seamless borders represents new and more challenging phenomena especially in a uni-polar world characterized by the opening up of new markets and the rise of global terror as the powers that control the global media would want us to imbibe.(Maybe Mercuse should rise and produce a new edition of his ‘One Dimensional Man’ Or Toffler should write on ‘One Dimensional Mind’). While the poorest countries in the world (usually African), are yet to be fully integrated into the emergent global market that has not stopped the negative impact of colonialism from being felt. African countries are faced with increased marginalization in the global economy and poverty is on the increase. Reports have indicated that sub Saharan Africa is the only region in the world where the living standard has actually fallen over the last 20 years or so. In the world of today, control of human and material resources is not done through forceful domination of people through military subjugation, even though President (Professor?) Bush is working hard to disprove that fact. But it remains that the new form of control is spearheaded by international finance organizations aimed at consolidating a global economic structure that very often has its head offices in New York, London, Tokyo, Paris, Frankfurt, and other investment hubs across the world. (The Chinese have just discovered this ice cream and have set about claiming their share with characteristic speed). The Gatlin guns are frozen. There are no more massacres like the 1904 Maji – Maji Revolt in Namibia where German troops systematically gunned down an estimated 60 – 80, 000 Africans. The Berlin Conference of 1884 – 1885 that partitioned Africa has been replaced by GATT, and in today’s parlance, the World Trade Organization. These days, African tribes do not need to be set upon each other while the colonial masters mop up colonies from where human and material resources were exploited. (We can do that all by ourselves, as we have demonstrated in Rwanda). The world has gone beyond such crudity. We call it free trade, and the final arbiter is the World Trade Organization whose aim is seemingly to allow a few rich countries and corporations dominate global capital and global resources. The colonial powers of today do not need military might and occupation to control the lives and destiny of billions of people in their former colonies. Perhaps in the not too distant future, Microsoft or Citi Group will have a seat on the United Nations. After all, these two companies alone generate more wealth every year than all of Africa’s 700 million people. Incidentally, the globalization of capital and other related resources is a continuation of a historical process that began with the mercantile era or indeed, is as old as man. The Dutch East Indies and the Royal Niger Company of 200 years ago are the HSBC, Barclays, USB and other multi nationals like Coca Cola, McDonalds, Exxon Mobile, Royal Shell, Sony, Philips and many others whose goal seems to be the aggregation of capital in as few hands as possible. No need to send a Cortez or a Columbus or a Drake or Cook on expeditions for huge profits. This is the Global age and a few computer screens will tell you exactly what is going on across the globe in an instant. (Remember Wall Mart’s Global Screens?) So for those who may think that colonialism is a thing of the past, it is time to think again. Imperialism and dialectical materialism as envisaged by a certain famous philosopher might not have come to pass, or at least, not as he predicted. But the sad fact remains that today, more than at any age in thousands of years of human domination through occupation and colonialism is witnessing the concentration of more wealth in the hands very few. Recent figures show that the top 5 percent control about 70 percent of global resources. And this was facilitated by Globalization. So the fact should be accepted that Globalization is another (digital?) form of Colonialism. It is good thing that most of us do not realize it.

Analysis of Surrealism

You will have every lesson for the next two weeks to complete this SAC. Your final piece of work is to be submitted, along with any hand-written notes you have taken, no later than Friday June 10th. PART 1: The Surrealist Movement Using the knowledge you have gained in class, as well as your own further research, discuss the historical context in which the Surrealist movement emerged and flourished. (hint. Analyses the relationship between The Surrealist Movement and the political, social and economic developments of the period.Examine and discuss the work (in general) of The Surrealist Movement. Describe the aims, methods and achievements of the Surrealists throughout the early twentieth century. PART 2: A surrealist Artist Choose ONE (and only ONE) Surrealist Artist and profile them. How did they and their work personally contribute to The Surrealist Movement? Consider the response to or the effect of their work at the time it was produced. What impact did this work have on the soc iety in which it was produced?Are their works still significant today? Examine and discuss the work (in general) of your chosen Surrealist Artist. Describe the aims, methods and achievements of this artist throughout the early twentieth century. Identify to what extent the themes of disillusionment, loss of confidence, anxiety or a celebration of the modern or of a political belief are present in these works. PART 3: surrealist Art Choose ONE (and only ONE) piece of art (painting, sculpture etc. ) from your chosen Surrealist Artist. Into – include a copy of this piece, as well as the title, artist, materials (egg. Oil on canvas, iron sculpture etc. ) and year it was created. Give a detailed analysis of the subject of the piece of art. What statement was your chosen artist making by producing this work? How was it received by society at the time it was produced? Is it viewed differently today than what it was when it was first produced? Why/how? What impact did this work have on the society in which it was produced? Is the piece still significant today? Why/why not?

Monday, July 29, 2019

Gangs and the Criminal Justice System Essay Example | Topics and Well Written Essays - 750 words

Gangs and the Criminal Justice System - Essay Example As per the recent news even the cargo ships were robbed by gangs near the territories of Somalia and hence the subject and gang and criminal justice system is more prevalent under present circumstances. Gangs have been in existence for as long as there have been inhabitants of this world. The history of criminal gangs can be traced back to even the biblical times. Such gangs are a part of history for thousands of years and their roots run deep into America’s past and culture. â€Å"The birth of America’s gang problem can be traced to the dawn of the country, a time when many Europeans migrated to the East coast with the intent of making a better life. After arriving, their savings was quickly depleted and many were forced to take out loans with local merchants and colonization companies, who charged steep interest rates. Life for many was more difficult than they imagined and death due to poverty and disease was common. There were many who died orphaning their children. With no money to send the children back to their homeland and with no relatives to care for them in America was a common problem in many cities†. ((Jared L. A wide variety of historical gangs, such as the Muslim Assassins, Adam the Leper s gang, Indian Thugs, Chinese Triads, Japanese Yakuza, American Old West outlaw gangs and Italian Mafia crime families have existed for centuries. Throughout the 19 th century, America was troubled with the gangs and gagsters like The James Gang, Billy the Kid, Irish gangs like the Whyos, Dead Rabbits, Plug Uglies, Jewish gangs like the Monk Eastman Gang, Five Points Gang etc. The Five Points Gang, led by Italian immigrant, Paolo Antonini Vaccarelli, was the most significant street gang to form in the United States, ever! The Five Points Gang became the Major League to many young street gangsters and a farm club for the Mafia. The most notorious recruit into the

Sunday, July 28, 2019

Food Safety College Essay Example | Topics and Well Written Essays - 750 words

Food Safety College - Essay Example The government at all levels has a role to oversee the enforcement of laws and regulations which are created for food safety. Although there are various agencies which take note of the health and safety of the public especially when it comes to the food they take, the presence of enforcement programs at the local health department is necessary. It can more far-reaching since it would be very well supervise whether everyone concerned adheres with it and violators can be easily identified. However, even with the presence of these enforcement programs, there are still many cases of food-borne diseases. This turns the focus to the food handling practices. Food handling practice may be the main cause of the persistent cases of food-borne illness. In many food establishments in the country, food handling training with particular mention to sanitation procedures has been inadequate because it is usually done quickly. This result to dangerous food handling practices related to temperature control, personal hygiene and prevention of cross-contamination. This makes effective training programs very important. The FDA Food Code recommends the certification of food safety managers as a way of demonstrating food safety knowledge. Studies have shown that sanitation in food service establishments are greatly affected by food safety training and certification (Almanza et al., 2004). In addition, the behavior of food handlers also determines food safety. If they be careless in preparing the food, it can result to contamination. Many food handling practices and sanitation procedures however can be learned through food safety training. This highlights the significance of food safety training as a very effective approach to food safety. Thu s everyone working in food establishments should undergo adequate food safety training and must be certified before they are allowed to work with food. Food safety must be ensured at all times. Since consumers may get sick with improperly prepared or contaminated foods, all food employees must undergo proper and adequate training with regards to food handling practices and all food establishments should deem it necessary. Mosquitoes are the most common vectors of many pathogenic microorganisms. A mosquito bite can sometimes result to a fatal disease. Hence, it is important that the community has enough knowledge on how to reduce the risk of acquiring these diseases. West Nile virus (WNV) is a group of disease-causing viruses usually carried by a female Culex pipiens mosquito. Each bite of this mosquito can transmit the West Nile virus. Worse is that people who become infected does not show symptoms. Only few show signs of fever and body aches but can further infect the brain and the spinal cord making it life-threatening. In places where it its endemic, it was observed that not all mosquitoes becomes infected and infection does not occur with all that individuals that are exposed to mosquitoes (Bren, 2003). According to Jesse Goodman, M.D., M.P.H., director of the Food and Drug Administration's Center for Biologics Evaluation and Research, West Nile virus can be transmitted through organ transplant and blood transfusion. Aside from that, a September 2002 case in Michigan suggests that breast milk can transmit WNV. These cases however are rare. The common cause though is

Saturday, July 27, 2019

Are the Internal E-mails The Bast Way of Communication within Research Paper

Are the Internal E-mails The Bast Way of Communication within Organization - Research Paper Example The use of internal e-mails as a communication tool in modern organizations is explored in this paper. The benefits and disadvantages of internal e-mails are critically discussed using also examples of organizations that use the specific tool of internal communication. Moreover, alternative internal communication systems are suggested, at the level that they have fewer disadvantages compared to internal e-mails. It is proved that despite their gradual replacement by other internal communication systems, internal e-mails are still used for internal communication purposes by firms in various industries; the limited risks related to the use of these internal communication tools, as analyzed below, seem to be the key reason for their expansion in organizations globally. 2. Internal e-mails in modern organizations 2.1 Benefits of internal e-mails Internal e-mails have been extensively used in modern organizations for supporting internal communication. The role of internal e-mails as a too l of internal communication can be made clear only if the context of internal communication is explained. ... A similar issue is highlighted in the study of Griffin and Moorhead (2011). According to the above researchers, employees in all organizations are likely to prefer systems of internal communication that are easy to be managed; internal e-mail is considered as a favorite tool of communication for most employees since their guidelines in terms of use are quite simple even for employees who do not have experience in IT systems (Griffin and Moorhead 2011). Another important benefit of internal e-mails has been the following one: internal e-mails, as also e-mails in general, can be used for exchanging files of various formats (Kline 2011). The specific feature of internal e-mails is particularly important, especially in large firms. Saving time and money has been also used as reasons for supporting the use of e-mails as internal communication tools (Kline 2011). More specifically, through the e-mail employees can send or accept documents that are critical in certain organizational tasks; if another means was used for developing this activity, then the cost would be significant, especially if a courier service would be used instead of fax (Kline 2011). Moreover, using the e-mail an employee need not exit from his office for retrieving documents or information required in the tasks assigned to him; he can use the internal e-mail for communicating with a colleague in regard to this material (Kline 2011). In this way, time is saved for working on the organizational tasks, a fact that increases employee performance.

Friday, July 26, 2019

Exampaper Essay Example | Topics and Well Written Essays - 1500 words

Exampaper - Essay Example Irigaray, Nozick and Delaney have attempted to articulate this idea in more modern terms. However, William Shakespeare’s Sonnet 116 presents this concept quite eloquently. The idea that love can have a somewhat illusory nature was put forward by Rorty when she used Spinoza’s to help illustrate her concept. She argued that indulging in fantasy and unrealistic expectations of love are potentially dangerous because they distort our perception of love. Instead of an authentic experience, idolatrous love offers an illusion. Over the centuries humanity has developed certain romanticized ideas of idealized male and female roles in relation to romantic love. Simone de Beauvoir and Marilyn Friedman, in particular, discuss the dangers of such romantic ideology and their relation to male chauvinism. We live in an increasingly â€Å"cyberized† world. The Internet and social media have allowed â€Å"cyber-relationships† to become increasingly more frequent. However, Zygmunt Bauman and Hubert Dreyfus underscore the need for traditional, face-to-face interactions in building more lasting and exclusive relationships. They warn that online relationships run a very high risk of more ephemeral and promiscuous interactions, precluding lasting and substantial relationships from developing. Montaigne presents the idea that a perfect friendship emphasizes as an essential aspect of the friendship. He goes further to describe such a friendship as one characterized by such unconditional openness and trust that each individual’s need is met by the other. However, Montaigne is careful to distinguish such an ideal from homosexual love. Possible modern interpretations of this â€Å"perfect friendship† could be the ideas of â€Å"bromance† and â€Å"womance† that have become more prevalent nowadays. Touch is one of the most concrete ways in which we express love and affection for one another. Although sexual intimacy is

Thursday, July 25, 2019

Business LAw 2 Assignment Example | Topics and Well Written Essays - 1000 words

Business LAw 2 - Assignment Example Introduction General partnership is a business organization in which two or more persons come together to form a business with the aim of realizing profits. In opting for this form of business organization, we considered several factors in the formation of businesses and opted for this form of business given the several flexibility associated with the business. These include; during the formation of the business, the legal requirements are not tedious and lengthy (Dobson, & Stokes, 2008). One undergoes few legal formalities and the business will be granted the permission to legal exist as opposed to other forms of business organization like the limited companies. In the partnership, the partners are directly involved in the daily running of the business and have the opportunity to acclimatize with the requirement of the business and ensure efficient and smooth running of the business (Fletcher, 2002). In addition to these, there are also different expertise brought together in runnin g of the business hence specialization and division of labor. Policies of the Company during Formation During the formation of the company (partnership), we will have to form the reference policies that will be used for the daily running of the business. ... In this sense, the profit or losses realized in the business will be shared according to the assets and capita contributed during the formation of the business. II. Division of Duty and Responsibilities The duties in the partnership will be equally divided given the number of the partners in the business. In the business, there will be no dormant partner and expenditures incurred following outsourced labor will be considered liabilities of the partners of the business (Gage, 2004). III. Dissolution of the partnership Partnership will be in existence until such a time that the following hypothetical situations stipulated in this agreement realized; death of a partner, when the business run into bankruptcy, and when declared by court of law as engaging in unscrupulous business (Hall, 1984). During the dissolution f the partnership, the business assets and the profit or losses will be shared according to the stipulation given by the clause describing Capital and profit sharing. IV. Inco rporation of the new Partners The partnership will remain open for the incorporation of new partnership given they make asset and capital contribution equivalent to those already in the business. The contribution of each partner will be proportionately be determined and profit and losses shared according to the proportion made in the contribution (Lowe, 1999). Policies on the Breach of sale and Purchase of Products In the partnership business and just like any other business, there are sales and purchase of products. These operations in the business require that certain terms and conditions be made and the parties have to adhere to them, failure to

Wednesday, July 24, 2019

Inventions and Discoveries Term Paper Example | Topics and Well Written Essays - 1000 words

Inventions and Discoveries - Term Paper Example A brief description of each discovery will be included in this discussion as well as how each discovery has challenged traditions and changed society for the good. Telescope Telescope is a device used to form magnified images of distant objects. Telescope is undoubtedly the most important investigative tool in astronomy. Galileo was the first person who used the telescope to study extraterrestrial bodies (Encyclopedia Britannica, 2011). The exact history about the invention of telescope is still unknown and controversial. However, it is believed that the first practical telescope was invented in Netherlands in the 17 th century. Astronomy and astrophysics developed a lot after the discovery of telescope. Heliocentric Model The Heliocentric Model was originally discovered by Nicolas Copernicus in 1543. The model assumed the Sun lies at or near the central point while the Earth and other bodies revolve around it (Encyclopedia Britannica, 2010). Copernicus was able to prove that all the planets are revolving around the sun in fixed orbits. He assumed that in the solar system, sun remains as the nucleus and the planets are rotating around the sun. The centripetal force towards the nucleus exerted by the sun was keeping the planets in their orbits. This model was in opposition of Claudius Ptolemy’s Geocentric Model which asserted the Earth was the central point. Ptolemy’s Geocentric Model assumed that Earth was at the nucleus and all the other planets and sun were rotating around the earth. He assumed that we are seeing sun at the east in the morning and at the west in the evening because of the rotation of the sun around earth. With the development of the telescope, Galileo was able to question the above belief and confirmed that Copernicus’ Heliocentric Model was accurate. The discovery that the Earth was not the central point of the universe would prove to be epic and would go on enhance human understanding of nature. The model challenged the Protestant and Catholic positions as well as the geocentric view of the universe. The long-standing societal tradition was that the Holy Bible super ceded all in regard to human discovery. The discovery of the Heliocentric Model certainly challenged this tradition. After all, the word written by God himself was recorded in the Bible, how could God’s word be wrong? The question â€Å"is the Bible is wrong or not† is debatable. It is not necessarily that the Bible was wrong; it is certainly plausible that its contents may have been misinterpreted or taken out of context. Nevertheless, the discovery forced a resistant society to examine how the Bible was interpreted and it also challenged previous assumptions made about the universe up to that point. Earlier, people believed that earth is stationary whereas sun is rotating. However after the discovery of telescope, Galileo assumed that sun remains stationary whereas earth is rotating. In Bible, there is a contradictory s tatement against the above belief. The Israeli leader Joshua once asked the sun to remain stationary in order to defeat the Palestine in an ongoing war. Bible says that because of Joshua’s prayer, the sun remained stationary for 24 hours in order to help Joshua in defeating the Palestine. After Galileo discovered the telescope, the above words of Bible were

Imagination & Identity Essay Example | Topics and Well Written Essays - 750 words

Imagination & Identity - Essay Example From the time that one is young, there is a perception and specific reality that is created in terms of identity. Imaginary worlds and friends are some of the main concepts that are applied to this and which create a specific sense of what it means to belong to a specific identity or group. â€Å"Most under – sevens have an invisible friend, and children create their imaginary playmates not out of trauma but out of a serene sense of the possibilities of fiction – sometimes as figures of pure fantasy, sometimes, as observations of grownup manners† (Gopnik, 253). The ability to create an identity and sense of reality through imagination and by mimicking the identity of others is one which can then be expected to stay with children while growing older. This reality and vision is one which is combined not only with ideas of fiction but also with expectations of what one is to become. â€Å"We were always about becoming, not being, about the prospects for the future, not about the inheritance of the past† (Lapham, 45). Both of these articles agree that there is the need to create something from the imagination and to keep depicting that specific reality. The fiction then becomes a sense of identity that one grows into, either by imagining something, mimicking adult behaviors or by believing what one should be. The concept of building a reality out of imagination then leads into the capacity of creating identity. The creation of identity moves beyond the labels in which one holds, such as being a New Yorker or a scientist. More important, are behaviors and mannerisms that are associated with the identity and labels which one believes they have. For instance, when defining New Yorkers, the identity becomes: â€Å"New Yorkers are busy for obvious reasons: they have husbands and wives and careers and children they have the Gauguin show to see and their personal trainers and

Tuesday, July 23, 2019

International Marketing Environment Research Paper

International Marketing Environment - Research Paper Example Evidently, all these constraints affect the flexibility of doing international trade. A country while exporting its domestic products is benefited by the foreign exchange income as well as by the new employment opportunities. On the other hand, while importing goods from other countries, a ‘consumer surplus’ is being created when the consumers are benefited by the availability of better products at a lesser price. Utilizing the both benefits, government has the ethical responsibility to facilitate international trade to those who are willing to invest in the international markets. However, when considerations about the local market come to the surface, the introduction of the international trade becomes a job that is easier said than done. To illustrate, the victims of the international trade are the local businesses that are not able to compete with foreign products. In such situation, the role of the government becomes more critical on taking appropriate actions which will not badly affect both the groups. The foremost five levels of economic integration are Free trade area, Customs union, Common market, Economic union, and Political union. As the international trade is widening and more countries are ready and willing to invest in it, the level of economic integration has to be refurnished between various groups of nations. It is not practicable to think that all countries would follow the precise pattern of economic integration, but we can expect for the development of basic arrangements such as lowering and abolishing the hurdles to trade and creating an economical environment. New economic integration techniques must be brought up to cope up with the new international trade needs. As Holden (2003) points out, a most mentioned example for this is the European Union, which has evolved from a collection of autarkical nations to develop into a completely integrated economic unit. At the outbreak of globalization, economic integration had been one of the forces behind the international trade making. We can sort that fact out from the performance of the multinational organizations that have developed into the most profitable business concerns in the recent years. An organization must be aware of the culture and language of the country where it is going to make its huge investment. With the successful take off, international business will rely more towards the economic integration for its future achievements on the global scale. II. Economical and Cultural elements of International Marketing Environment Economic, cultural, political, technological, social, and legal elements are most important for the international marketing environment (The legal, political/ trade environment). Many write down the importance of economic element as, â€Å"With money all things are possible, without money many things are impossible†. The economic element plays a vital role in the international marketing environment. A technologically adv anced industrial product requires a technologically advanced buyer. In the same way, luxury products are not meant to be sold to low-income consumers. Therefore, international market for high-priced luxury items of food, furniture and durable products need large support of consumers who have the capacity to make large purchase from these hypermarkets. However, the global economic growth today has been at pace comparing to that of the previous year.

Monday, July 22, 2019

Poverty and Pollution Essay Example for Free

Poverty and Pollution Essay Determine the ethical implications of business polluting in third world country. Explain your rationale. The Third World refers to the poorer and undeveloped countries of the world. Often, these countries have extremely poor environmental situations. Countries in Latin America, Eastern Europe, Africa, and Asia are the greatest victims of this environmental inequality. In addition to problems created by development and industrialization, poorer nations also suffer environmental difficulties caused by poverty and war, among other causes. Many environmental problems arise in the Third World. Air pollution, water pollution, deforestation, desertification, soil erosion, and poisoning of the environment are among the largest of these. (pollution problems on third world , 1999) The businesses that are polluting in a third world country are the businesses that think that because the third world countries are poor and under developed. They do not have the restriction that the U.S. does to prevent business from doing everything that they can to the environment, These countries are left with making decision on whether are not to eat are having clean environment. What do you think they are choosing to do? We sometime take advantage of people because of the situation they are in at the time. The Western countries take advantage of these Third World countries. They dump their trash and other hazardous waste into these Third World countries. The First World companies will go into these countries and build plants, which will pollution the air, in Third World nations to not have to deal with the regulations that they would face at home. Some of the transnational corporations that produce hazardous chemicals look at as overly dangerous in the First World find an acceptable market in the Third World. There, governments cannot restrict usage of these chemicals. They are trying to provide a way for its citizens to make a living. How can this be fair? How can these business live with themselves. What I have stated time and time again it always comes back to money. Suggest the reasons a business may conduct operations in a third world country and disregard any standards of pollution control. We see the pollution problem affecting the whole world. Industries are going overseas because the cost of labor is a lot cheaper. Therefore all they want to do is make a big profit by paying less and acquiring quality goods and services. (pollution problems on third world , 1999) Industries don’t care about the employees never the less about the environment. Laws and regulations a lot different in third world countries and there is a lot of corruption too; with this been said if anyone complaints money is the solution. Also as I mention before countries of the Third World struggle with population growth, poverty, famines, and wars, their residents are discovering the environmental effects of these problems, in the form of increasing air, water, and land pollution. Industrialized nations often dump wastes in developing countries where there is little or no environmental regulation, and governments may collect considerable fees for accepting their garbage. And not only that some of this garbage can be hazards not only for the environment but to the individuals leave close to this dump sites this third world countries would accept garbage for money this is hard to believe. This industries move to third world countries because there is not pollution controlled laws. Therefore industries are not allowed to manufacture of produce certain things their only option is to move if they want to still be in business. (gale, 2005) It has been said that pollution is the price of progress. Assess the connection between economic progress and development, on the one hand, and pollution controls and environmental protection, on the other. The optimal level of pollution is supposed to be the level at which the costs to the company of cleaning up the pollution equal the cost of environmental damage caused by that pollution. If the pollution charge is equivalent to the cost of environmental damage then the theory says that the company will clean up its pollution until any further incremental reduction in pollution would cost more than the remaining charge, that is until it is cheaper to pay the charge than reduce the pollution. This might seem to be less than optimal solutions to the community but economists argue that the polluter is better off than if it had paid to eliminate the pollution altogether and the community is no worse off because it is being compensated by the firm for the damage through the payments to the government. In theory the payments made by firms in the form of charges can be used to correct the environmental damage they cause. (beder, 1996) Support the argument that human beings have a moral right to a livable environment regardless of the country they live in. Every person in every community has the right to health, and to a safe and healthy environment. Unfortunately, these rights are often not respected. Many people suffer from serious health problems caused by a scarcity of basic necessities and an excess of harmful substances. The most vulnerable people are those who have low status because of race, ethnicity, religion, gender, class, caste, poverty, or for other reasons. They usually suffer first, and worst. The struggle to live in a healthy, safe, productive, and enjoyable environment by communities whose rights are not well respected by people in power is sometimes called the struggle for environmental justice. As part of the human rights; each human being has a moral right to life and to a livable environment. Also is not fair for these individuals from third world countries to suffer from more things they’re already struggling and then u have industries polluting their environment. Everyone should be able to have a good environment to live in. Also something that caught my attention is the even though here in the United States of America we have good environment individuals don’t not how to take care of it. For example people throwing garbage out their cars windows or disposing of chemicals in their back yard. This types of thing can cause damage to our environment. Take a position on whether nations have an obligation to provide poorer nations with, or help them develop, greener industries and sources of energy. Explain your rationale. Although some of this nations are poor they can also be rich because of natural resource for example oil, gold and expensive minerals. Many third world countries have been able to be successful because of natural resources. I think that if a nation is wealthy and individuals are happy, then it should help other nations because today for them and tomorrow for us. We never know when we are going to need someone’s help. Therefore it is not an obligation to other nations but it’s good to show support. The United States of America is known for helping others but I know there is always an interest or a agreement to repay the USA. Also increasingly, through globalization, many countries have become dependent on each other. While some countries are endowed with better quality resources, others have to be satisfied with current resources. History has shown that the poorer countries are usually those more vulnerable to disasters (economically and socially) and are less equipped to overcome these disasters. Rich countries, therefore, are consistently required to support those poorer countries through international aid. However, the right type of aid is more important than the quantity of aid. Rich countries should invest in the human capital of poor countries, provide defense against wars, and help develop the skills of the people instead of simply providing donations. There should be agreements and follow-ups on how the aid is being used. Propose a plan for uniform global pollution control standards and how you would enforce them. It’s hard to say how something can be done about this the procedures and norms are in place now. I think pollution is always going to be an issue and it’s going to be too late when individuals try to help with the problem. The only thing I can suggest is to maybe have dump sites in out of space and if the garbage tries to enter earth of other planet it would burn anyways. But to enforce new regulation it’s going to be a challenge hopefully they can come out with a solution soon. Industries are not going to stop producing thing while the demand is high. And if we told inviduals that this is harmful for the earth that they need to stop they would just laugh References Pollution problems on third world . (1999). Retrieved from http://library.thinkquest.org/26026/Economics/pollution_problems_in_the_thir.html Beder, S. (1996). charging the earth: the promotion of price- based measures for pollution. Retrieved from http://www.herinst.org/sbeder/enveconomics/economics.html

Sunday, July 21, 2019

Present And Future Of Electrical Engineering

Present And Future Of Electrical Engineering ABSTRACT The report is all about the past, present and the prediction of the future of electrical engineering in the branch of electronics which plays an important role in the improvement of electronic devices as well as the new technology, electronic engineering is a broad and challenging discipline because it is composed of different kinds of electrical components such as electron tube, transistors, integrated circuits etc, therefore from all these electronic components the most vital components are transistors as they have amazing characteristics compared to other components, transistor sizing is the most challenging when electronic engineers start to design thing like computers, electronic machine etc. Basically transistors make electronics engineering to become more efficient when it comes to the production of electrical appliances because from the past until nowadays, the usage of transistors had been increasing rapidly which shows that electronic engineers always makes life become easi er. 1. INTRODUCTION Electronic engineering in the past was not interesting because during that time it was hard to invert electronic material because there was scarcity of resources that was taking control over humans life. Electronics today is taking a lead because the economy and society benefits from electronic engineering, as this is seen by anyone living on this planet. Many companies use electrical appliances such as computers, laptops, telephones etc. which lead to a good profit to their companies and thus this result in a huge growth of the economy worldwide. Electronic components are more easily to be improved and this predicts that in the future things like plasma, laptops, internet are going to disappear because the electronics creates new technological devices every second and the way electronic engineering functions create hope of amazing changes that people might not believe because things such as Identity documents for the next years will be regarded as useless papers. The society also be nefits from electronic engineering because nowadays many health services uses electronics for example such X-rays and other electronics devices to detect for other diseases. Professional electronic engineers have good ethics because they also create strong educational activities by creating fair regulations that must be followed strictly to ensure that protection is sustained towards peoples life. 2. ELECTRONIC ENGINEERING CHARACTERITICS Electronic engineering is a branch of electrical engineering that deals with the implementation of applications, principles and algorithms by using non linear and active electrical components such as transistors, diodes and integrated circuits to produce electronic machines, televisions etc which is more related to other field, for example radio engineering, telecommunication, control system and many other [1, 2].The transistors are the best electronic components that has become more useful after they had been inverted and transistors have different function because of their size. They have different physical characteristics. 2.1. Design and application of transistors in circuits Transistors may have N-P-N or P-N-P structure which function as a switch both N-P-N transistors and P-N-P transistors consists of three regions: collector, base and emitter. The base is the transistors main lead, without it, the transistor wont function, the collector is the positive lead and the emitter is the negative lead. Therefore the N-P-N and other transistors are may be used to control the flow of electrical current, power flow through the transistors from the power supply to the relay controlling the flow of electricity. Sometimes NPN transistors may usually work as amplifiers by controlling large amount of current [3]. Figure is on the appendix. 2.2. Electronic components There are many electronics that are widely used in electronic engineering to invert special electrical appliances. Symbols of some electronic components are represented on the appendix. 3. BACKGROUND OF ELECTRONIC ENGINEERING 3.1. The past of electronics Electronic engineering has evolve from technological improvements in the telegraph industry long time ago in the late 19th century , Transistor is a well-known electronic component that is inverted in 1948 at the Bell Telephone Laboratories followed by integrated circuits in 1960, electronics is often considerable to have started when Lee De Forest inverted the first vacuum tube in 1907 within 10 years, all of his electronic device was found in radio, transmission and receivers as well as system for long distances telephone cells [1, 2],electronic engineering was interesting because many things that are inverted during the 19th century are now improved to produce better materials that are very useful. Electronics play a significant role when it comes to telecommunications because the beginning of electronics is more likely based on communication and it is also improving because after the invention of radio, telegraphy and other past electronics appliances the first purely electronic television is inverted in 1928 by Philo Farnsworth [2], therefore this trend shows accurately that electronics always strive to progress from generation to another. During 1930s television had become more popular because it was recognized by millions of people to the best thing that was transferring information easily. During the past the computers that was inverted they were not programmed like the one that are being used now because they were very big and it hard to find because they only found at the laboratory of High institution and these computers was using big transistors that was storing less resources, therefore the most benefit from early computers is that they were better in terms of information transmission when compared to televisions. During the First World War electronic applications had tried to play a vital role by creating electronic weapons for defence but the most successful electronics weapons are the one that was produced when Second World War take place[5]. Hence electronics had created a wonderful social awareness by providing people with strong electronic weapons to protect their life against their enemies. 3.2. The present of electronics Electronic engineering nowadays is a challenging field because there is a lot of competency for producing desirable electrical appliances which benefit the whole world. Electronic engineering is the best because many things that are being used all over the world to create peace, economic growth, excitement and employments are produced by electronic engineers. Information technology today is based on electronics because information is transferred from one place to another by using electronic materials such as cell phones, digital computers, advanced television such as plasma and other useful electrical appliances, therefore all of this benefit the country because it maintain peoples rights. Electronics is more useful for health services and educational purpose because today at universities they are using computers, power point during the lecture time and this help students to adapt, gain knowledge and skills in the electronic and technological environment. People all over the world ar e getting proper health care because there is variety of electronic applications on medicine e.g. X-rays, Ultrasound detectors, medical research and expands other diagnostic test which save human lives. Since the invention of radio television in the past other previous century the electronics industry has been increasing drastically with the beginning of computer technologies and cell phones the electronics industry is regarded as the world largest and fastest growing manufacturing industry. Therefore this flowing of electronics it release hazardous material that affect the environment because when electric product become cheaper they tend to rapidly become more useless and some of these materials are dumped everywhere which lead to pollution [6]. 4. THE PREDICTION OF THE FUTURE OF ELECTRONIC ENGINEERING Electronic engineering will always proceed to develop amazing things because educational level of electronics is improving each year which means that the economy will succeed more toward the following years because many people who are studying will invert new things that can become more useful than the present electronics devices. Technology is also faced with a huge change because electronic engineers are always trying to improve their skills. Cars the next following years they might use electronic components and electricity to move because petrol and other oils are regarded as dangerous pollutant on the environment. Electronic engineering it might be bad when it comes to domestic employment because the many things that are created by electrical engineers makes life easier to a specific person even other professionals might lose their jobs because the engineers work it shows accurately that one day an electronic doctor can be inverted to save doctors from their work because other di sease might infect during the working times. Therefore any person must try to be preparing for the next electronic generation because new desirable things are coming such as cell phones that can be used to drive cars. Laptops will be replaced by electronic engineers because they are big when compared to cell phones. 4.1. THE TREND OF ELETRONIC ENGINEERING The diagrams representing the trend of electronic engineering 5. CONCLUSION Electronic engineering in the past was poor but it has evolved rapidly. Nowadays people are used to electronic systems, therefore this shows accurately that electrical engineering as whole it will dominate toward the next four years because without electrical engineers lot of things will disappear like a mist for example the economy depends on electronics to fulfil its profit which means that when electronics drop the whole process all over the world will subside resulting in lack of employment, poor health care and other technological system will disappear. Electronics for the next twenty years it might program people to function as electronics because the introduction has already began by computers e.g. people are using computers to improve their thinking capacity and to get lot of information. Really electronics is the best thing that symbolise peoples intelligence because amazing things are taking place because of electronics e.g. the night is changed by lights which symbolise th at everything it might be created by electronic devices. 6. REFERENCES 1. F.K. Manasse, J.A Ekiss and C.R Gray, Modern transistor Electronics Analysis and Design,Englewood Cliffs, N .J,prentice-Hall, Inc, 1967,pp ix-1. 2. Electronic engineering-wikipedia, the free encyclopedia.mht, last accessed 10 May 2011. 3. J.G. Linvill and J.F Gibbons, Transistors and active circuits, New York: McGRAW-HALL, 1961, pp 91-97. 4. http://www.clker.com/clipent-11203.htm,last accessed 10 May 2011. 5. http://www.cl,cam.ac.uk/~rja14/papers/SE-16.pdf,last accessed 09 may 2011. 6. B ward, Transistors Ignition systems handbook, Britain, August 1963, pp 92-100.

Saturday, July 20, 2019

The Prevention Of Computer Viruses Computer Science Essay

The Prevention Of Computer Viruses Computer Science Essay What is a computer virus? A computer virus is a computer program that can copy itself[1] and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. How are viruses transmitted can be transmitted person to individual by bodily fluids like HIV. Viruses approaching the common cold can be transported through the upper air we breathe. Viruses can also be transferred from your pets to you. Fortunately our body has an immunodefense workings that is intricately designed to row these pathogens. How do you prevent viruses? List the softwareà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s name. The internet is an amazing place that allows each and every one of us easy access to a wide variety of resources. Unfortunately, there is an increasing amount of viruses, worms, spyware and spam that can easily infect your computer. Your computer in fact may already be infected and you may not even know it. If your computer is unusually slow or crashes periodically, it may be infected. In fact, if you do not address the problem with this computer it may in fact infect other computers on your network. The result of a virus or worm attack can include an inability to access the internet, missing icons on your desktop, missing files and many other potential problems. There are ways, however, that you can fight back. Of course before making any changes to your computer, it is always a good idea to make a backup. FIGHT BACK 1. Run Microsoft Windows Update often. With new viruses and worms constantly being created, it is important to keep the Microsoft Windows operating system up to date. Go to http://windowsupdate.microsoft.com and follow the instructions on screen. By installing the critical updates found on the Windows Update website, you are greatly reducing the chances of your computer from becoming infected. 2. Update the virus pattern of your Anti-Virus software frequently. Almost all Anti-Virus software programs update automatically, but you will want to check to make sure that this process is taking place. If a new virus is introduced and your pattern file is out of date, you will not be adequately protected against this new threat. I highly recommend the use of Trend Micro PC-Cillin. Unlike other antivirus software programs, it does not tap your system resources by taking up a lot of memory. It also works in a very transparent fashion with continuous pattern updates. 3. Remove Spyware and Adware. When you visit websites or install new software, you may be inadvertently installing Spyware and Adware onto your computer. Spyware and Adware allows third parties to: (a) monitor the use of your computer over the internet and (b) market specific products to you on the internet based upon the use of your computer. Go to http://www.download.com in order to download and install: (1) Ad-aware and (2) Spybot Search Destroy. Properly updated, both of these programs will remove all known Spyware and Adware. 4. Prevent Spam. A large number of worms and viruses are distributed through spam email. The first step in preventing spam is to not post your email address on a website. If you need to provide a means for contacting you via email, you will want to create a submission form that does not display your MAILTO in the code/page source of your webpage. You may need to contact a web designer in order to properly implement this process into your website. Another method is to use the Master Spambot Buster which works just like a MAILTO link but without displaying your email address in the code for bots to pick up. In addition, you should always use Private Registration when registering a domain name for a website. If you go to http://www.netsol.com and do a WHOIS on your website, you do not want to see your email address publicly displayed in your domain record. Automated programs called robots regularly crawl websites such as this looking to pick up email addresses for use by companies that spam. If robots on the internet have already picked up your email address, you will of course want to use some form of spam prevention. Many web based mail programs already allow you the ability to prevent spam. However, many mail clients on business networks do not have this functionality. There are a variety of products in the marketplace to address this problem, but one of the most popular is http://www.spamarrest.com. By using Spamarrest.com, you manage who you allow or do not allow to receive email from. When someone sends you an email for the first time, they must verify that they sent you an email. If they do not, the email is placed in your unverified folder on Spamarrest.coms web servers. All blocked mail is then placed in Spamarrest.coms spam folder. Meanwhile all approved mail is sent as it normally would directly to your computers Inbox. CONSULT A PROFESSIONAL Although the software described here is easily used, different hardware and software configurations can lead to unexpected results that may damage your computer. If you are experiencing difficulties with viruses, worms, spyware or spam, you may want to consult a professional. How do you know that your computer is infected by a virus? If you suspect or confirm that your computer is infected with a computer virus, obtain the current antivirus software. The following are some primary indicators that a computer may be infected: The computer runs slower than usual. The computer stops responding, or it locks up frequently. The computer crashes, and then it restarts every few minutes. The computer restarts on its own. Additionally, the computer does not run as usual. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. You cannot print items correctly. You see unusual error messages. You see distorted menus and dialog boxes. There is a double extension on an attachment that you recently opened, such as a .jpg, .vbs, .gif, or .exe. extension. An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted. An antivirus program cannot be installed on the computer, or the antivirus program will not run. New icons appear on the desktop that you did not put there, or the icons are not associated with any recently installed programs. Strange sounds or music plays from the speakers unexpectedly. A program disappears from the computer even though you did not intentionally remove the program Why virus-scanning software needs to be updated regularly ? computer virus is a computer program that can copy itself[1] and infect a computer. The term virus is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.[2] Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[3][4] As stated above, the term computer virus is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer systems data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves. The Academic Integrity and Plagiarism Policy: You should be ready to prove the authenticity of your work. If any form of plagiarism/reproduction of answers/work discovered, you will be awarded zero mark. Late submission of the assignment: If any late submission of your work, mark will be reduced. Your are expected to cover the following outcomes Outcome 4. You are expected to practice the skills that are related to the following graduate attribute: Recognize the importance of lifelong learning and are committed to self development Declaration by student (Hand written) TO MY LECTURER Mr. Sheik Mohammed I CERTIFY THAT ALL OF THIS WORK IS: (a) DONE BY MYSELF (b) PRINTED BY MYSELF Students signatureMahmood Khalfan Ali.. Submit ion Date: ..22j1047

The Black Death Essay -- essays research papers

A plague is a bacterial infection that can take on more than one form. One of the greatest plagues that have stricken mankind throughout history was the Black Death. The Black Death was the outbreak of the bubonic plague that struck Europe and the Mediterranean area between 1347 and 1351. This plague was the most severe plague that hit the earth because of its origin (the spread), the symptoms, and the effects of the plague.   Ã‚  Ã‚  Ã‚  Ã‚  Scientists and historians are still unsure about the origins of the bubonic plague. Medieval European writers believed that it began in China, which they considered to be a land of almost magical happenings. Chroniclers wrote that it began with earthquakes, fire falling from the sky, and plagues of vermin. Like medieval travel literature, these accounts are based on a number of myths about life in areas outside of Europe. It now seems most probable that infected rodents migrated from the Middle East into southern Russia, the region between the Black and Caspian seas. The plague was then spread west along trade routes. Plague moved quickly along the major trade routes. From Pisa, where it had arrived early in 1348, it traveled to Florence and then on to Rome and Bologna; from Venice it moved into southern Germany and Austria; and from Genoa it crossed the Tyrrhenian Sea to Barcelona in Spain and Marseilles in France. It continued through the towns of southern Franc e, reaching Paris. From there the contagion spread to England and the Low Countries. Parts of Europe were initially spared the epidemic. Milan was almost unique among the major Italian towns. The lord of the city closed the gates to travelers coming from plague areas, and few people died. Many parts of Germany and Eastern Europe also escaped the epidemic in 1348 through 1351. Probably because of their relative isolation, Bohemia, Poland, and central Germany experienced no plague before the 1360s and 1370s. The people from these vast countries did not know this was carried by vermin, so they were scared of what they could do and could not have done to acquire the plague. This made the disease spread easily.   Ã‚  Ã‚  Ã‚  Ã‚  In bubonic plague, the first symptoms are headache, nausea, vomiting, aching joints, and a general feeling of ill health. The lymph nodes of the groin or, less commonly, of the armpit or neck, suddenly become painf... ... destroyed people and not possessions, the drop in population was accompanied by a corresponding rise in per capita wealth. Large increases in spending in the towns at this time are well documented. Profits, however, for landlords and merchants declined as they found themselves having to pay higher wages and getting less when they sold their products. Governments were forced to adjust to the social disruption caused by plague. First local governments, and then in the case of England, the monarchy, attempted to regulate the movement and price of foodstuffs as well as wages paid to laborers. The English Statute of Laborers of 1351 tried to hold wages at preplague levels. Similar statutes were passed in various parts of France, Germany, and Italy. Landlords tried to collect higher fees from tenant farmers as a way to increase declining incomes. Unrest among the peasants was one of the major causes of the English Peasants' Revolt of 1381. The English rebels objected to high payments to landowners and legal limitations on the rights of some peasants. Economic and political unrest occurred in most parts of Europe during the second half of the 14th century.  Ã‚  Ã‚  Ã‚  Ã‚  

Friday, July 19, 2019

The Process of Baseball Season Preparation :: Expository Process Essays

The Process of Baseball Season Preparation Baseball has always been America’s natural past time. Many fans love watching baseball but do not realize how hard it is to prepare for a season. Most fans think the players just show up on the first day. I think this belief is completely false. I feel that preparing for a baseball season requires much preparation. The preparation I use includes working on my swing, working out, and studying other people’s ideas on hitting. These steps are necessary for me to have a successful season. These steps have proven to be a valuable aid in helping me to prepare for the season. I believe these steps are the basic steps to becoming a great baseball player. Developing my swing is the first step I use in preparing for the upcoming season. There are a few different techniques I use to work on my swing. The first way is to take hitting lessons. I learn much of my knowledge about hitting from taking hitting lessons. My usual routine consists of taking lessons three times a week. This allows me to be evaluated by a professional. I took hitting lessons from the same coach for five straight years. His teachings have helped me become a much better hitter. Another way I develop my swing is by practicing daily. Even though I take hitting lessons, I still need more work. I am lucky enough to have access to a facility that has hitting cages. This allows me to work in the winter and during inclimate weather. By going to work on my swing on my own, I am able to work on the skills that my hitting instructor has taught me. This seems like it would take a long time, but it does not. I carefully plan out my time, and this allows me to use my time wisely. I allot times to work different aspects of my swing. By doing this, I am able to cover all aspects of my swing. I also videotape my swing, and this allows me to view myself afterwards. Since I videotape my practice sessions, I can go over my sessions afterwards. I have caught and fixed many mistakes my carefully watching my swing on the recordings. Developing my swing is the first of three main steps I use in preparing for the upcoming season. Next, I work out using weights to improve my chances for success in the upcoming season.

Thursday, July 18, 2019

Information System

1. 4. 4 Information Systems for the Banking & Financial Sector: Audit is one of the major controls for monitoring management activities in the banks and financial institutions. In a computerized environment, IS audit is a very effective and necessary activity. Usually the IT implementation in the banking and financial organizations is done by adopting a mix of different methodologies – internal development and deployment and third party product development and deployment. In case of internally developed and deployed IT systems, IS audit will require to be done by a team of specially trained internal or external auditors.However, it is preferable to have the IS audit conducted with the help of suitable external agencies with the required skills and expertise to ensure independent nature of audit. In case of development and deployment of the IT systems by third parties, the IS audit requires to be conducted by trusted auditor/s with skills and expertise, required for the purpose . IS audit assumes greater significance because a large number of critical and strategic financial operations in the banking and financial sector are wholly or partly being handled by the computerized systems.There is a significant need for determining the role of IS in banks. This would assure the top manage- ment that the IS development is in the right direction. This would also help in exploring the intended and the real role of IS in banks. The knowledge of the real role of IS in banks would help IS managers in managing information systems by judging the business needs of the IS projects, associated risks, importance and ranking of IS managers in organizational hierarchy, need for innovation and flexibility in IS planning approach, etc.The IS practitioners may use the variables used here for self-evaluation and for deciding about the IS development. It has been well recognized that IS plays different roles in different industries. However, there is limited research examining the differences in the role of IS within a single industry. This study empirically explores the differences in the role of IS among public, private, and foreign ban. ks. Results indicate that while, at present, only private and foreign banks have obtained strategic advantages using IT, public sector banks, although late, have also realized the importance of IT.It has been empirically proved that the future impact of IS does not vary significantly with the banking groups. This suggests that IS efforts put in by the public sector banks are in the right direction and can be expected to give them a strategic advantage in future. Foreign and private banks, though in the strategic group today, have to constantly harness IS for strategic advantage to maintain their position. Sustaining competitive advantage is very difficult, because IS managers have to continuously evaluate the bank's applications portfolio with respect to technology and their competitors.Public sector banks have to search f or ways to shift from support group to the strategic group in order to enjoy a strategic advantage from the use of IS. In order to achieve this objective, they may have to formulate a different IS strategy so as to make them competitive enough to survive. Future research could evolve suitable IS strategies for all the three sectors. This paper has tried to locate the banks on the Strategic Grid. However, the level of computerization of various branches of a bank may be different and hence their dependency on IT may be different.Future research may involve locating the various branches and departments of a bank on the Strategic Grid and suggesting a suitable strategy for the branch. This study has the limitation that data are collected only from key IT executives. Perceptions of the bank's business executives may be different from that of the IT executives. Therefore, future research could also attempt obtaining and analysing the opinion of bank's business executives and looking for perceptual differences, if any.Another interesting area of future research could be to unearth the reasons for adopting a particular role of IS and to explore facilitators and inhibitors in using IS for strategic use. Uses of information technology in banking Write your abstract here. Applications of Information Technology in Banks in India While computer by itself is the most cherished invention that man has ever accomplished, its union with communication technology which is at its pinnacle, has brought yet another amazing extension to its already fabulous capabilities.From the period of Marconi to this day , the improvements that have taken place in the television , have literally brought the entire world into an individual’s bedroom. Joining this powerful communication environment , the IT has opened flood gates for global economic activity. The contribution of economic and political changes that have so far taken place to encourage international trade will bear fruit only when banking and the associated services can catch up with the new trends. The modern IT has enough capabilities to enable banks, financial institutions and others to bring about the desired changes.Banking sector reforms introduced a decade ago in 1992-93 , have been based on five fundamentals: 1. Strengthening of prudential norms and market discipline. 2. Appropriate adoption of International benchmarks. 3. Management of organizational change and consolidation. 4. Technological upgradation. 5. Human resource development. The Financial Reforms that were initiated in the early 90s and the globalization and liberalization measures brought in a completely new operating environment to the Banks that were till then operating in a highly protected milieu.Services and products like â€Å"Anywhere Banking† â€Å"Tele-Banking† â€Å"Internet banking† â€Å"Web Banking† , e-banking, e-commerce, e-business etc. have become the buzzwords of the day and the Banks ar e trying to cope with the competition by offering innovative and attractively packaged technology-based services to their customers. Reserve Bank of India constituted a committee under the chairmanship of Dr. C. Rangarajan. The main task of the committee was preparation of a plan for computerization for the period 1990-1994 ( for 5 Years ).For the purpose of computerization , the committee selected the important areas relating to customer service , internal-decision-making process , productivity and profitability. The committee furnished its report on November 9, 1989 with the following recommendations- 1. The branches having daily average level of vouchers at more than 750 should be computerized . 2. Computerization on branch level should be achieved on any of the following basis- (i)Selected branches will have on-line terminals with micro and mini-computers which will be linked with central main-frame computer to provide counter service and other office-services. ii)Personal compu ters will be installed at counters which will be linked with local area network. (iii)For third option , the banks will have to depend on Telecom line. 3. The banks should gradually use developed devices such as- Photocopier , FAX , Duplicator , Microfilm , Signature Storage , Scanners etc. 4. Non-computerized branches can take the services of other local computerized branch / office in case of important task. 5. The customers should have the facility to route their business to any branch of the bank. 6. All-Bank Credit Card should be issued. . Computers should be made bilingual and proper training arrangements should be made to provide training to staff members. 8. The regular customers should be offered On-line facility. 9. Like some European countries , there should be a system of credit clearing. 10. BANKNET should be used for interbank and intra bank applications. 11. All Regional offices and Zonal offices to be computerized in a phased manner. Rangarajan Committee – 198 9: A Statistical Analysis Rangarajan Committee ( 1989 ) has focused its stress on computerization of banks.A statistical analysis was also made in the report of committee. In this analysis ,it was mentioned that following jobs can be rapidly and easily performed at Regional Office/Zonal office level. 1. To ascertain the bad and doubtful debts and to make provision for them. 2. To claim the amount under Credit Guarantee Schemes of DICGC. 3. To communicate , analyze and forecast the data for trade-plan. 4. To make action plan for recovery of advances. 5. Personnel Information System. 6. Credit Information System. 7. Checking of figures of priority sector advances. . Consolidation of statements/figures to be sent to the RBI. Present level of Computerization: Based on the norms worked out by Rangarajan Committee (II), 7827 branches of the Public Sector banks were identified for full branch computerization up to March 2000 of which around 4620 were computerized as on March 99. Meanwhile, the networking of the already-computerized branches also assumed urgency and some of the Banks have started inter-connecting their computerized branches using leased telephone lines or Very Small Aperture Terminals (VSATS).This is meant to provide a more comprehensive service to customers and at the same time give banks better centralized control over the branch operations. As of now, New Private Sector and Foreign Banks have an edge over Public Sector Banks as far as implementation of technological solutions is concerned. However, the latter are in the process of making huge investments in technology. Source:  http://www. shvoong. com/humanities/1748375-applications-information-technology-banks-india/#ixzz2ONAVoUdI