Thursday, October 31, 2019

Christian Louboutin (shoe designer) Essay Example | Topics and Well Written Essays - 2000 words

Christian Louboutin (shoe designer) - Essay Example Christian Louboutin is a prominent French designer whose footwear has entailed shiny, red-lacquered soles, which have grown to become his signature. Christian Louboutin can be regarded as one of the most creative and prominent designers working today. Initially, his unique red-soled shoes were seen as a top secret treasure of an elite circle of Louboutin enthusiasts; nevertheless, sustained media attention has introduced Louboutin to the world and heralded unparalleled levels of popularity. As a result, Louboutin is worn by both fashion insiders and fashion-mindful celebrities and stylish women. The research of Christian Louboutin (shoe designer) is critical and should be understood by designer practitioners who strive to create unbeatable, unique brands. The essay seeks to engage students within a search for and analysis of contemporary design research. Background Louboutin started sketching shoes in his early teen years at the detriment of his academic endeavours. Louboutin had minimal formal training comprising of drawing and decorative arts at the Academie d’Art Roederer. For more than two decades, Louboutin’s designs including boot made from various animal hairs and a towering ten-inch slipper has been a market leader of luxury shoe design. The multiplicity of detail, form, and style are embodied in Louboutin’s shoes and designs can be regarded as reinforcing the allure of his one-of-a-kind creations (Welters and Lillethun 2011, p.511). Louboutin’s success can be partly linked to his love of travel, entertainment, and architecture, which guarantees that no two pairs of shoes are analogous (Craik 2009, p.29). Louboutin entered into the fashion industry in 1982 when he started as an intern at Charles Jourdan. For the subsequent decade, Louboutin learned his craft as he freelanced for high-profile fashion houses such as Yves Saint Laurent and Chanel. It was in 1992 that he launched his first shoe boutique in Paris, a number that has risen to over twenty five boutiques across the globe. Louboutin’s sought to avail his clients with an unbeatable experience, given that for each collection that he produced he would select artisans with certain skills, maintaining that it was essential to have his shoes crafted by skilled craftspeople rather than modern, mass-production machines (Welters and Lillethun 2011, p.512). Louboutin’s unique designs can be regarded as mainly influenced by fantasy, sex, and playfulness (Vartanian 2012, p.8). Discussion Louboutin’s distinct designs and signature features red-sole, high-heeled shoes are highly popular, especially among celebrities. Lo uboutin applies individualized approach when designing his collections to guarantee that he generates consistently innovative and desirable collections. His designs can be regarded to be in different, but highly appropriate design. This reinforces the notion that Louboutin’s shoes are not simple pieces of clothing, but also pieces of art (Renfrew and Renfrew 2009, p.117). Louboutin managed to develop an unmistakable signature by ensuring that all of his shoes featured bright red soles. A characteristic pair of his luxury shoes might also feature a stiletto heel and upper parts of coloured leather or exotic reptile skins. The price of the shoes normally ranges around $800 a pair. Louboutin’s shoes are renowned globally for their remarkably innovative design and distinctive glossy red sole. Louboutin’s lacquered red sole trademark is perceived as a â€Å"subtle status symbol† and can be regarded as highly alluring relative to the overt branding of the big-n ame luxury brands (Rauf and Vescia 2007, p.16). Louboutin contended that his utilization of the red colour mirror his conviction that red colour is a symbol of passion, blood,

Tuesday, October 29, 2019

Discuss the evolution and problems of post colonial african Essay

Discuss the evolution and problems of post colonial african governments. What trends can we dicern What theories have been offered to explain these development - Essay Example Encouraged by the findings of European explorers Livingstone, Pinto, Burton, and Grant in the early 19th century, hordes of Europeans backed by their armies sailed south of Europe and began the work of colonization. It was to avoid the infighting and conflict that the Berlin Conference was organized. The colonization efforts were ruthless and resulted in the near-total destruction of African culture. Africa at the time was a land of more than a thousand tribal kingdoms, each with its specific culture and forms of government, and as is common with peoples the world over, likewise engaged in their own intergenerational and inter-tribal wars involving territory and natural resources. Ravaged by diseases and harsh living conditions, the populations of these African kingdoms were expanding slowly, limited only by their ability to tame nature. This was the continent which the Europeans invaded with "guns, germs, and steel" (Diamond 4) and set quickly to work in ravishing. Another strong influence of the colonists was their belief that Afric... Thus, aside from ambitious explorers, businessmen, and soldiers, the European nations sent Christian missionaries to teach Africans the European ways that the latter deemed more superior. How the combined efforts of material and spiritual colonization affected African culture explains much of what happened after their colonial masters left by the end of the 20th century. The decision that probably caused the most damage was the territorial boundaries established by the European powers in complete disregard for natural boundaries formed by the language, religion, or ethnicity of the Africans. Almost overnight, tribes were split, dividing families and societies. Until 1914, the Europeans divided Africa into fifty states, putting together warring tribes and dividing friendly tribes. This explains the incidents of ethnic violence that continue to explode in recent times in countries like Nigeria, Rwanda, Sudan, and Somalia. In each of these countries, different warring tribes were forcibly put together, continuing the tribal conflicts whenever people from each tribe assumed political power (Shillington 115; Pakenham 174). It is this tribal conflict that is also a prime cause of so much government corruption, because the tribal links are stronger than the artificial sense of nation that decades of colonization failed to achieve. Aside from the forced union of tribes, colonization had as a major objective that of spreading cultural influence through the language, religion, and customs. This is what the French did, and explains why former French colonies like Algeria have better infrastructure such as a functioning education system, government bureaucracy, and are better assimilated with European culture. It also had better telecommunications and transport

Sunday, October 27, 2019

Online Course Registration And Management System

Online Course Registration And Management System Currently the Microsoft IT Academy in Multimedia University Melaka using the website that hosted in MMU server to provide information regarding the course offered as well as the registration method to enroll on the specific course. As the course registration is still done manually, below is the summary of the problem on the manual method: User : It consumes time as user is not enabling to book the seat if they have not submitted the form manually together with official receipt to the instructor. The user can pay the registration trough many ways, such as Online Banking, but they still have to submit the official receipt taken from Multimedia University finance division. Administrator/Instructor : Administrators have to wait until the number of registrant fulfills the minimum requirement of the course to open class. All registration related must be done manually, as no online system available yet. Financial report must be also done manually in order to keep track of the financial progress of the courses. Project Objective The project objective will be focused on developing an online course registration to ensure the effectiveness of the flow of registration. Moreover the system will offer a complete management system that integrated with the online course registration to help the stakeholder for maintaining the flow process of the course. The registration process can be done online without the need of paperwork anymore. It is also help the student to get more information about the course process while they enrolled. The administrator will get easier way to determine the seat of the courses, keep track of the registration module, and generate report for the year to help them determine the development of the courses. The cores of objectives of the project are followings: To study existing course registration system in Microsoft IT academy of Multimedia University. Analyzing current course registration system, by interviewing the stakeholder of the system. To propose an online course registration and management system. To identify the user requirement for online course registration and management system. To develop an online course registration and management system. To evaluate the online course registration system that been develop. Project Scope The studies will develop an Online Course Registration, specifically for the Microsoft IT Academy in Multimedia University. With this system, it will affect the stakeholder of the Microsoft IT Academy Multimedia University Melaka Campus such as: Administrator /Instructor The Administrator for the system will be divided to several privileges on how they can use the system. Administrator for example, have all the privileges such as adding instructor, adding courses, update information, adding downloadable material, registration module, etc., but Instructor only have several privileges on what they can do and not do in the Online course registration and management system. Student/User Student will get a more accessible way in order to register and booked the seat for the courses. They also can get updates from administrator keep track on the progress of the course. Significance of Project This final year project for intelligence online course registration will not only provide basic feature to the user as well as administrator, but will be also completed with these features: Online Chat Helpdesk Support System The Helpdesk Support System will allow the user to interact with the administrator in case if they have certain question to be asked regarding the course or the registration flow. Security Security of the website is one of the main concerns to be improved as the registration is moving from traditional to online based. The reason is because user will send their confidential data to the system. Some user might use the same login ID or password, and without proper security, the data might be accessed by third party, or the user session is hijacked while sending the data. The security improvement will also provide log to the administrator in case there are some abnormality in the system after some user log in. As the security improved, we are giving the user a better understanding why they should trust our system. Limitation of Project In this project there are 2 objectives to achieve which are developing online course registration and management system for the Microsoft IT Academy Multimedia University Melaka. This project will focused on how to make the registration flow as simple as possible and also automated in the flow process. However there are limitations which is not be covered in this project. Even though the registration for the user will be done online, some flow of the process will be still done manually, such as submitting the official receipt of MMU to instructor. This is because of Multimedia University policy that not allows administrator to access the student financial report. Yet the system itself will allow user to upload the proof of payment trough online registration. Structure of Report This report consists of 5 main chapters. The first chapter, Chapter 1 which is Introduction presents overview of the project, the problem statement of the study state the problem occur on the current system, the project scope, objectives of the study that explain about the project main goals that need to be achieved, and structure of the report as well as the limitations of the project. Chapter 2 which is Literature Review state explains about materials used to study for the proposed system later, literature review also briefly explain some previously system that use same the technology in registration system. Chapter 3 is Methodology; and this chapter explains about the methods and tools that will be used to develop the system. It also gives some explanations why the methods and tools are chosen in the project. Chapter 4 which is the Proposed Solution and Implementation Plan or Design, this chapter presents the plans on how the system developed as well as the design of the system. This chapter mainly consists of diagrams to describe the design of the proposed system and some little explanation about the proposed system. Chapter 5 is conclusion; this chapter will summarize the conclusion of the objective stated. Chapter Summary In this Final year project the main objective is to propose and develop an online registration and management system that will facilitate the user as well as the administrator in order to keep the flow of registration more compact and efficient. This chapter explains the scope of the project which will affect the Microsoft IT Academy in Multimedia University Melaka stakeholder. Moreover in this chapter also describes about the problem that the current system where most of the flows still done manually. Chapter 2 Literature Review Online course registration and management system has become a necessity in order to create simple and accessible way to support today system. The internet has dramatically changed the role of Internet today (Cassidy 2002:1). Internet is the tool or vehicle for many applications, as well as to maintain registration for government, companies, and many events. This is happen as result of the simplicity of internet access in many part of the world. 2.1. Online Course Registration Johnson and Manning (2010) stated that the two biggest differences between registering online and mailing in your paperwork are time and technology. It can take time when users have to fill in the form, and then submit it in some other places. Instead of taking time, technology has helped us to make the registration procedure into the next level. You can find more information about the courses you want to take and in the same time fill up the form, pay the fees, etc. The staff that receives registration information most probably will process the information in same system, so by using online course registration and management system, we can save time. 2.1.1. Online Course Registration and Management System An Online course registration and Management System is systems that maintained the registration flow for the user and provide extensive capability for the administrator to maintain the content, report, and ability to add, update, or delete the content of a system. Currently there are many applications that have the ability to manage registration online. Some of them are very simple, and more complicated that use current technology. Almost all web based programming language support the capability to make online registration, such as PHP or .NET provide many option to build intelligence course registration and management system. A good system must be able to provide sufficient information and services needed by user as well as delivering extensive report to the administrator (Anggarwal.2003:233). 2.1.2. Existing Online Course Registration and Management System Most of the Online Course Registration and Management System are mostly used in educational institution and professional courses. This is to avoid time consuming of managing numerous users and prevent error from manual method. Based on that, people tend to use Online Course Registration and Management System. There is some Online Course Registration and management System that researched and improves, such as: Wylie Course Registration The C-Registration System will replace the existing mainframe course registration system at Wylie College. The new system will interface with the existing Billing System and Course Catalog Database System as shown in the context diagram below (see Figure 2.1). The C-Registration System will consist of a client component and server component as illustrated in Figure 2.2. The server component resides on the Wylie College UNIX Server. The server component must interface with the Billing and Course Catalog Database Systems on the College DEC VAX Main Frame. This interface is supported by an existing Open SQL Interface. The client component resides on a personal computer. The College PCs will be setup with the client component installed. Any non-college PCs must download the client software from the UNIX Server via the Internet. Once the client component is installed on the PC, the user may access the C-Registration System from the PC through the College LAN or Internet. A valid ID number and password must be entered in order for access to be granted. Figure 2.1 C-registration System Context Diagram Figure 2.2 C-Registration system overview The C-Registration system has many capabilities which will be explained the following table: Table 2.1 C-Registration capabilities Costumer benefit Supporting features Up-to-date course information The system accesses the Course Catalog Database for up-to-date information on all courses offered at Wylie College. For each course, the Students and Professors may review the course description, Prerequisites, assigned teachers, class locations, and class times. Up-to-date registration information All course registrations are immediately logged in the Registration Database to provide up-to-date information on full or cancelled courses. Easy and timely access to course grades Students can view their grades in any course simply by providing their user ID and password. Students may access the registration system from any College PC or from their home PC via the internet. Professors enter all student marks directly into the Registration Database from their PCs. Access from any College PC Students may access the registration system from any College PC or from their home PC via the internet. Installation of the client component of the C- Registration System on a PC is an easy to follow process using the internet Easy and convenient access from your PC at home Students may access the registration system from any College PC or from their home PC via the internet. Secure and confidential A valid user ID and password is required to gain access to the C-Registration System. Student report card information is protected from unauthorized access. Instant feedback on full or cancelled courses All course registrations are immediately logged in the Registration Database to provide up-to-date information on full or cancelled courses. Online Course Registration System for the Faculty of Engineering in University of Peradeniya In the system developed by the University of Peradeniva, there are some necessity in online registration course that should be included in the system, such as: Authentications and Authorizations of users; Administrators should be able to decide time period for the registration (before the start of the semester) and time period for the add/drop period (at the beginning of the semester); Administrators should be able to enter required data into the system such as courses, students, advisers and examination results; Advisers are allowed to view filled registration form of each student and accept/ reject the registration; Students should be able to view current courses and previous results, to register or add/drop new semester courses; Users should be able to change their passwords and personal information; and In the absence of a relevant adviser, the head of the department should be able to accept the online registration forms. All users have their own usernames and passwords to access the system and they have the ability to change their passwords. They will be given separate entry levels to access the system. Figure 2.2 depicts the use-case diagram of the system. Administrators are the staff officer at the Office who is responsible for course registration. They have the authority on deciding time durations, entering required details and finalizing registrations. Figure 2.3 use case of the online Registration in University peradeniya Advisors are all the department heads and lecturers who are assigned as advisers for students. They are capable of viewing courses, student details and results and accepting or rejecting registration forms. Student category contains everyone who has registered for a degree programme in the faculty. They are allowed to view available courses, their details and results, and to complete their registration forms and add/drop forms. The system that being used will be detailed explained in the table below: Table 2.2 system used in Online Course Registration of university peradinya Technology Usage Dream Weaver GUI Design CSS Additional Features in GUI Design ASP.net Programming Design Ajax Client Script Development SQL Server 2000 Database Design IIS Web Server to host the system Crystal Report 9.0 Generate reports. As the system works, it has not only reduced the burden of all parties involved in the course registration process, but also improved the process by reducing errors. Secure Online Application The real test of a secure Web Application occurs when it comes time for users to log in and access your site (Burnett,Mark.2004). Login screen is look simple. User just provide the username and password, the system will authenticate it to access the system. Authentication establishes a users identity. Once this identity is proved valid, the user is authorized (or nor authorized) to access various features of the Web application. 2.2.1 User authentication Threats The primary threats with user authentication are: Account hijacking This involves taking over the account of a legitimate user, sometimes denying the rightful user access to his or her account. Man-in-the-middle Intercepting Web traffic in such a way that the attacker is able to read and modify data in transit between two systems. Phishing A type of man-in-the-middle attack in which the attacker lures a legitimate user to enter a password through a fake e-mail or Web form designed to look like that of a legitimate Web site. Unauthorized access Gaining access to restricted content or data without the consent of the content owner. Information leakage Revealing or failing to protect information that an attacker can use to compromise a system. Privilege escalation Allowing an attacker to gain the access privileges of a higher-level account. Sniffing Using a network-monitoring utility to intercept passwords or other sensitive information that traverses a network. Because the login form plays such an important role in authenticating users, it is important to protect the form itself from flaws. A poorly written login form is vulnerable to password sniffing, information leakage, and phishing. Furthermore, the form itself may be vulnerable to flaws such as SQL injection and cross-site scripting. 2.2.2. Secure Authentication In ASP.NET the IIS provides four standard methods for authentication: Basic authentication Digest authentication Integrated Windows authentication Client certificate mapping Basic Authentication Basic authentication works by prompting a Web site visitor for a username and password. This method is widely used because most browsers and Web servers support it. The benefits are: It works through proxy servers. It is compatible with nearly every Internet browser. It allows users to access resources that are not located on the IIS server. Basic authentication also has some drawbacks: Information is sent over the network as cleartext. The information is encoded with base64 encoding, but it is sent in an unencrypted format. Any password sent using basic authentication can easily be decoded. By default, users must have the Log On Locally right to use basic authentication. Basic authentication is vulnerable to replay attacks. Because basic authentication does not encrypt user credentials, it is important that traffic always be sent over an encrypted SSL session. A user authenticating with basic authentication must provide a valid username and password. The user account can be a local account or a domain account. By default, the IIS server will look locally or in Active Directory for the user account. If the user account is in a domain other than the local domain, the user must specify the domain name during logon. The syntax for this process is domain nameusername, where domain name is the name of the users domain. Basic authentication can also be configured to use user principal names (UPNs) when you use accounts stored in Active Directory. To prevent exposing user credentials to others on the network, it is essential that you always use SSL with basic authentication. Note that basic authentication causes the browser to send user credentials to every page on the same site or within the same realm, not just the login page. If you dont use SSL on every page, user credentials will be visible on the network. One way to prevent these credentials from being sent on unprotected content is to use a unique realm for protected and unprotected content. Digest Authentication Digest authentication has many similarities to basic authentication, but it overcomes some of the problems. Digest authentication does not send usernames or passwords over the network. It is more secure than basic authentication, but it requires more planning to make it work. Some of the similarities with basic authentication are: Users must have the Log On Locally right. Both methods work through firewalls. Like all authentication methods, digest authentication does have some drawbacks: Users can only access resources on the IIS server. Their credentials cant be passed to another computer. The IIS server must be a member of a domain. All user accounts must store passwords using reversible encryption. The method works only with Internet Explorer 5.0 or higher. Digest authentication is vulnerable to replay attacks, to a limited extent. Digest authentication is secure due to the way it passes authentication information over the network. Usernames and passwords are never sent. Instead, IIS uses a message digest (or hash) to verify the users credentials. In order for digest authentication to work, all user accounts must be stored using reversible encryption in Active Directory, which may be a potential risk. After this setting is enabled for a user account, the users password must be changed to create the plaintext copy. Digest authentication does provide more security, but for most Web sites, the limitations of this method outweigh the benefits. One interesting peculiarity with IIS is that when you send authentication headers to a client, it will send the basic authentication header before the digest one. Many Internet browsers use the first header they encounter and therefore opt for the weaker basic authentication. Integrated Windows Authentication Integrated Windows authentication is also a secure solution because usernames and passwords arent transmitted across the network. This method is convenient because, if a user is already logged on to the domain and if the user has the correct permissions for the site, the user isnt prompted for his or her username and password. Instead, IIS attempts to use the users cached credentials for authentication. The cached credentials are hashed and sent to the IIS server for authentication. If the cached credentials do not have the correct permissions, the user is prompted to enter a different username and password. Depending on the client and server configuration, integrated Windows authentication uses either the Windows NT LAN Manager (NTLM) or Kerberos for authentication. You cannot directly choose which one is used; IIS will automatically choose a method based on the server and client configuration. The Web browser and the IIS server negotiate which one to use through the negotiate authentication header. Both Kerberos and NTLM have their own advantages and disadvantages. Kerberos is faster and more secure than NTLM. Unlike NTLM, which authenticates only the client, Kerberos authenticates both the client and the server. This helps prevent spoofing. Kerberos also allows users to access remote network resources not located on the IIS server. NTLM restricts users to the information located on the IIS server only. Kerberos is the preferred authentication method for an intranet Web server. However, the following requirements must be met for Kerberos to be used instead of NTLM: Both the client and server must be running Windows 2000 or later. The client must be using Internet Explorer 5 or later. The client and server must be in either the same domain as the IIS server or in a trusted domain. Integrated Windows authentication has a few limitations: It works only with Internet Explorer 3.01 or later. It does not work through a firewall. The client will use the firewalls IP address in the Integrated Windows hash, which will cause the authentication request to fail. Client Certificate Mapping Client certificate mapping is the process of mapping a certificate to a user account. Certificates can be mapped by Active Directory or by IIS. Both of these methods require Secure Sockets Layer (SSL). There are three types of certificate mappings: One-to-one mapping Many-to-one mapping UPN mapping Certificate mapping is the process of linking a certificate to a specific user account. Normally, if we wanted to give a user authenticated access to the intranet; we would either create a user account or allow the user to log in using his domain account. Creating duplicate accounts is time-consuming, yet if users use their domain accounts, there is the concern that their domain passwords could become compromised. To provide better security and reduce the administrative workload, we could choose to issue each user a certificate. Certificates can be used to verify a users integrity. It is actually more efficient to use a certificate than a user account because certificates can be examined without having to connect to a database. It is generally safer to distribute certificates than user accounts. Furthermore, it is much easier to guess or crack someones password than it is to forge a certificate. Chapter Summary This chapter discusses the material research as well as basic understanding of the online course registration and management system. The material provided is to help and understand the project, and how the system can improves the registration and management system. Chapter 3 Methodology 3.1. System Methodology It is important to understand that an information system has a life cycle, just as living system or a new product has. System analysis and design constitute the key stage of system development life cycle (ISRD Group, 2007). System Development Life Cycle has several phases which are planning, analysis, design, implementation, and maintenance. Figure 3.1 System Development Life Cycle 3.1.1. Planning Planning is the first phase in the System Development Life Cycle, in this phase the necessity of the system has to be identified (Hoffer, et al., 2005). The objective, scope and the main reason to develop the system has been explained in previous chapter. 3.1.2. Analysis The second phase is the analysis phase, which during this phase an analysis on the system requirement is being held (Hoffer, et al., 2005). The output of this phase is a description of the recommended solution by determining the problems and requirements. In this phase information regarding of the project is gathered, the information gathered then can be studied to help the understanding about the project. In this project analysis phase determine what method used to build the system later on. In this phase, we interview the stakeholder of Microsoft IT Academy Multimedia University (see appendix for detail) In analysis phase, we determine: Detailed evaluation of current system Data Collection User Requirement 3.1.2.1 Current System Evaluation Figure 3.2 System flow of the system Figure 3.2 show the current system flow of the MSITA. The flow show that some part still done manually, such as filling form and registration (student have to download form from website, pay the course fees to MMU finance, and submit the official receipt to the instructor). The website that being used now is using ASP.NET as programming language, but there is no online registration capabilities. The website is used for content management system only. All the registrant will be input manually by the instructor. 3.1.2.2. Data Collection To ensure that we understand the flow of the current system, we need to identify the stakeholder of the system, such as: Table 3.1 Stakeholder No Stakeholder Name Stakeholder type Roles 1 Instructor Instructor of Courses Provide Course material, provide place/lab for the course exercises , manage registration for user 2 MMU Finance division Registration Payment Submission Receive Payment from Costumer, Issue Official Receipt for registration 3 Student User/Costumer Register for the course, submit receipt for registration, participate in course as scheduled, take certification exam From the stakeholder above, we already identify that the most influence entity are the User and Instructor of the course. We will then identify the problem on the current website. Function of Microsoft IT Academy Website As main website for student for : Check latest/available course offered by MSITA team. Check schedule for the course Check registration procedure (Download Registration Form) Download notes/material for the course (only for registered user) Technical Detail of Microsoft IT Academy Website Technology Used : ASP.NET Other Items considered Course material is given trough the class Registration of the course still done manually (student have to download form from website, pay the course fees to MMU finance, and submit the official receipt to the instructor). The reason why the registration still done manually : Sometimes there are changes in registration procedure (e.g. minimum requirement for the number of the student to open the courses, some courses is added/removed). Need the proof of payment to confirm student registration. Figure 3.3 MSITA website details 3.1.2.3 User Requirement As the main concern of the development in MSITA website, we need to make the registration process and also maintenance of the website online; these are the requirement of the proposed solution: Table 3.2 User requirement User Side Administrator Side User can register in the MSITA website as website member as option before they register to the course Administrator panel Student registered as website member need to fill course to take in future/next trimester in order to keep track the estimated number of course offered. Add/Remove course Student can fill the registration form trough MSITA website. Automatic Email to all student registered Student can upload scanned proof of payment trough registration form Registration module for administrator Student can fill option to take exam after course registration in order to get exam voucher Financial Report of the year 3.1.3 Design Design Phase required us to determine the logical and physical design of the system. We need to determine the system features and all other necessary requirement for the system. Later on in the next phase of the project we will transform the logical design into fully working system. 3.1.4 Implementation The fourth phase is implementation. In this phase the physical design of the system will be programmed into a working system (Hoffer, et al., 2005). In implementation coding, testing, and installation will be included. In coding, the system will be programmed to a working system. After it programmed the system will be tested to find errors and bugs in the system. Lastly, during installation the system will be installed and ready to use. In the phase 1 of the project implementation of the system is not going to be built. The implementation phase will be held during the second phase of the p

Friday, October 25, 2019

Essay --

Robyn Hode Old English folklore dates back to the beginning of American literature. A protagonist among many, Robin Hood (Robyn Hode in Old English manuscript) is introduced into many books and playwrights. Some may argue that Robin Hood's strategies for balancing society were unethical, but this theory could be strongly argued against, and furthermore disproven. Robin Hood could be considered a hero because of his excessive generosity, his ability to see every person as an equal individual, and his overall success to better society. To accurately view Robin Hoods motives, one must look past the rules and laws set aside for the lower class made by â€Å"higher officials†, and understand that, even more so in a less developed time period, that right and wrong does not depend on what the rich and powerful say is right and wrong. Robin Hood looked past all of this, identified the true, moral decisions that needed to be made, and took charge. By doing so, and taking a small portion of the rich's wealth and distributing it among the poor, is considered (arguably) one of the most notable heroes of the folklore literary era. In all of the tales written of the infamous Robin Hood, the characteristics illuminated most is his excessive generosity. â€Å"Despite being declared an outlaw, Robin Hood is a good and generous person at heart, and is beloved by the townspeople for his deeds.† (Jurns) While thieving and causing (occasional) mishap, Robyn Hode kept one motive in mind, and that was to take from the undeserving, (fat and rich), and give to the needy, (the poor). This obviously biased by assuming that all the rich are greedy and all the poor are hopeless and deserving. In fact, in most cases people work hard fo... ...orth a sort of balance in society, one in which that needed to be presented. Because all the unfortunate people were too afraid to demand this equality in society, Robin Hood's bravery to go in and fight for what he stood for was admired among the people. This is how he was presented the hero title, and why ballads and playwrights are told about him to this day. Robin Hood's strategy to better the society became a success. By stealing from the rich, to give to the poor, he not only set an example for people to follow his role as a hero, but it also created a balance within the social classes. But today, taxes are distributed among the the country that are arguably fair. In Robin's time, the wealthy placed harsh and unfair taxes among the people, many of them who could not afford to pay them. Failure to pay these taxes resulted in imprisonment, or even worse, death.

Thursday, October 24, 2019

Describe China’s consumption of goods and services. What shortcomings have accompanied China’s economic growth?

The economy of the People's Republic of China is the second largest in the world after the US when measured on a purchasing power basis. With a booming economy and 1. 3billion people, it is now the world's largest consumer of grain, meat, coal and steel. China is no longer just a developing country. It is an emerging economic superpower and is one that is writing economic history. China has witnessed a rapid growth in consumption in recent years. Their purchasing power enables them to buy more, meaning more of basic necessities that the previous generation was not privileged to have. Yet this also means that the rapid rise in demand creates a multitude of problems as the country continues to hungrily gobble up the resources in and out of the country that could be allocated for other countries/markets. China is likened to a hungry giant whose insatiable demand for commodities heralds a new era of permanently higher prices–a commodities super cycle. Its soaring demand for commodities has exerted a powerful pull on global commodity markets. It has a major impact on major segments such as the following: energy, the hard commodities such as metals, and the soft commodities such as agricultural products. But on the other hand, the demands of China's stunning economic growth in recent years have had a complex and uneven effect on global prices for energy and other commodities. Although different industries all over the world also benefit from the huge market and profit, there are numerous problems that arise because of the huge consumption of the country. China's massive appetite for goods ranging from grain to platinum places it at the centre of the world raw materials economy. Other countries find themselves â€Å"competing† with China for a share in commodities. And even China finds itself in a ditch. Because China's insatiable demands are putting ever more pressure on the country's natural resources. The huge consumption and growth mean more wastage. Its population’s impact on the environment can only grow stronger and yet even today, it is already very evident in their own surroundings. The impact of the cumulative waste of over a billion people is astounding. A huge majority of Chinese is still dependent on coal for their energy production. Coal is the number one cause for climate change. A big number of their waters are almost turned into open sewers due to the wastage from many factories and cities. Ill-planned projects may have also destroyed natural habitats and have displaced animals and plants. Respiratory and heart diseases related to air pollution are the leading cause of death in China. And this is only the beginning of a few problems that have begun to arise as China slowly climbs to the top. China's role in global commodity markets will only grow more important in the next 20 years. The solution to the continuing arising problems from their inevitable growth would be, to develop schemes that regulate their pollution and wastage and to create international relations and foreign policies that will positively affect poorer (or richer) economies. The Chinese government should implement the schemes rigidly as the negative effects will eventually catch up on each individual as it affects their health. The government should strengthen and improve the work of existing and emerging organizations (whether it may be local, national or international) through intensive training, demonstration of new approaches, international exchange, and strategic communication.

Wednesday, October 23, 2019

Sartre’s Existentialism

Existentialism is frequently misunderstood for its deceptive complexity. In reality, existentialist provisions are rather simple to understand. They were exemplified in Sartre’s No Exit, in which the author presented his vision of human identity. This paper is centered on evaluating and re-considering existentialism in Sartre’s No Exit. Sartre’s Existentialism Introduction Existentialism has become the result of the fruitful creative work of Jean-Paul Sartre. His works are extremely philosophic, and one sometimes needs to undertake several reading efforts to understand the implications of Sartre’s works. It not a secret, that his No Exit is the bright representation of existentialist ideas. Sartre was capable of including everything he thought about life into this short play. He did not need too many characters, or too many scenes to carry the most important philosophical messages to the reader. This was the proof of his talent and the desire to change people’s ideas about their inner motives and identities. The play takes place in the small room with old furniture and somewhat strange style. The three people: Garcin, Estelle, and Inez are closed in that room. The question what these three people do there is simple to answer: the room is Sartre’s representation of hell. The three people are the three dead souls who appeared in hell after their deaths. Each of them possesses their own character, and each has something to tell. However, there are profound implications in their constant interaction, bearing in mind that they have no other way out, and they cannot be as free as they used to be in their earth lives. We will find almost all existentialist ideas expressed in this small but extremely complex piece of writing. It is even more interesting to consider each of them separately. â€Å"Man is responsible for what he is. Thus, the first effect of existentialism is that it puts every man in possession of himself as he is, and places the entire responsibility for his existence squarely upon his own shoulders† (Sartre 1989, p. 132). The role of Sartre’s existentialism has initially been in the attempt to explain the positive sides of that philosophical trend. Sartre was aiming at proving that existentialism was not a negative notion in the society; moreover, he also wanted to show that existentialism did not mean neglecting human values and leading immoral way of life. On the contrary, he positioned existentialists as those who had to create themselves and to be responsible for what they were (Heter 2006, p. 29). Was this true? Yes, it was, and No Exit proved it. The examples of Garcin and Estelle only support these assumptions. We can understand why these two people found themselves in hell but yet we come to understanding that Sartre describes hell only with the help of indirect hints found throughout the play. It is even more interesting, that while Sartre justified a person for being a human, and displayed the importance of a person creating oneself without outside help, we also see the changing attitudes of Estelle and Garcin towards their earth lives. These changes are viewed in the gradual process of their revelation and recognizing the terrible realities of their previous lives. Meeting Garcin and Estelle for the first time, we become aware of their stories, but these stories are shown in their personal interpretation: â€Å"I lost my parents when I was a kid, and I had my young brother to bring up. We were terribly poor and when an old friend of my people asked me to marry him I said yes. He was very well off, and quite nice. My brother was a very delicate child and needed all sorts of attention, so really that was the right thing for me to do, don’t you agree? My husband was old enough to be my father, but for six years we had a happy married life. Then two years ago I met the man I was fated to love. † (Sartre, 1944) Only reaching the end of the play we come to understanding that Estelle’s story had not been as innocent as she tried to depict it. Moreover, she had left its most significant part beyond the limits of our consciousness. What she had to tell later terrified the reader, yet helped to realize that Sartre was right in his existentialist provisions: people create themselves as they want to; they have their will, they are conscious, and they have to be fully responsible for what they do (Flynn 2005, p. 8). The fact that Garcin and Estelle appeared in hell was the expression of that responsibility, or rather, the consequences of the responsibility all of us have to carry for our actions. Garcin had to recognize the fact that he had tortured his wife: his open adulteries, alcohol, and total indifference to her as a human being had not pushed him to a thought that he had been doing something wrong. He forgot that each of us is not only responsible for ourselves, but for everyone around us. I am thus responsible for myself and for all men, and I am creating a certain image of man as I would have him to be, in fashioning myself I fashion man† (Sartre 1989, p. 137). The profound truth of this idea is also displayed through Estelle’s and Garcin’s conduct. In being so indifferent towards his wife, Garcin has also made his choice about her, putting her into a tragic position of â€Å"always waiting for him† (Heter 2006, p. 30). He had to admit that â€Å"she never cried, never uttered a word of reproach. Only her eyes spoke† (Sartre, 1944), but it was not only her choice. That was the choice of Garcin, too, and they both contributed enough to create the picture of a never happy family. Estelle made her choice, too, and it is impossible but to admit that she had also been responsible for at least the two lives next to her: the life of her small child, and the life of her lover. Surely, she wanted to avoid ethical conflicts in her life, and she was proud to state that her husband never knew the truth. Yet she forgot to mention that the lives of her lover and her child were also dependent on her. She became the cause of their death, either direct or indirect. In any case, the hell has become her refuge, her revelation, and the proof of her inner responsibility for her deeds (Flynn 2005, p. 51). No matter how hard we may try to conceal our real feelings, we cannot escape inner moral tortures for what we have once performed. This is why the inventiveness of Sartre’s hell is in not showing it with traditional attributes: fire, tortures, Satan, etc. We are the tortures to ourselves, and our consciousness tells for us. Hell is the mere representation of our fears, and it does not necessarily have to be in the form of the burning fires. In this existentialist analysis of Estelle and Garcin we have forgotten about the third participant of the discussed events. It is not surprising: Inez also had her sins and had to confess she had become the reason of the three deaths, including her own, but in Sartre’s play she better served a kind of a mirror, in which the sins of the other two were reflected: â€Å"Suppose I try to be your glass? Come and pay me a visit, dear. Here’s the place for you on my sofa. † (Sartre, 1944) The concept of God is even more interesting to be viewed through the prism of existentialism. Sartre was keeping to the so-called atheistic existentialism. This did not though mean that Sartre was denying existence of God at all; he rather explained the connection of God, his absence in human imagination, and as a consequence, the absence of moral and ethical standards according to which a person should act. â€Å"The existentialist is strongly opposed to a certain type of secular moralism which seeks to suppress God at the least possible expense. † (Sartre 1989, p. 138). However, existentialist vision of God is rather contradictory and remains that in the discussed play. First of all, can we suggest that there is no God, if Sartre depicts Estelle, Inez, and Garcin in hell? Hell is initially a well known antipode of paradise, and it is possible to suggest that if hell exists, there is also paradise. As a consequence, if those who used to deny usual moral standards in their lives appear in hell, doesn’t this mean that those who led positive way of life could appear in paradise? Second, Sartre was very rigid in terms of morality as it is: he used to assume that we could not follow moral standards from outside (Flynn 2005, p. 52). According to existentialist ideas, moral standards are brought to us from the depth of our souls, and what we have to do is to realize, what our inner identity tells us. All characters of the play have ultimately proved what Sartre wanted to show: there were no God, but there were also no human values. This is why all three appeared in hell. Existentialism is not the denial of God; it is the set of ideas according to which people should be responsible for their passions. In this sense existentialist teaching is very similar to Christianity, how strange this may sound. â€Å"The existentialist does not believe in the power of passion. He will never regard a grand passion as a destructive torrent upon which a man is swept into certain actions as by fate, and which, therefore, is an excuse for them† (Sartre 1989, p. 41). There is no need to repeat, that Estelle, Garcin, and Inez are Sartre’s embodiments of this interesting idea. Their passions have led them to hell and they are meant to spend eternity in the room with weird angles and strange furniture, behind the door which is never opened, and with no sleep, as their eyes do not have eye lids. Garcin had a passion towards women and entertainment; he had passion towards pacifism and did not think of its possible negative consequences. Inez’s passions resulted in the death of the three persons, and Estelle’s passion led to the death of her child, and later, her lover. The man is responsible for his passions, and we can easily see the conjunction of the responsibility for passions, and responsibility for other people. Actually, these are similar expressions of the same philosophical interactions, or these can be built in a logical line: we are responsible for our passions, which impact the lives of other people, and thus through our actions we are also responsible for others. None of the three characters will be able to escape the inner responsibility for the lost lives. This realization becomes even brighter, caused not by physical tortures as we traditionally imagine them in hell, but by conversations between Estelle, Inez, and Garcin, in which they make each other reveal their truths. As a result, hell is not outside and not in physical pain; it is inside us and it eats us from inside. Moreover, hell is in people who direct us towards seeing the truth about ourselves. As far as we are what we want to be, people around us create an image of ourselves which we have to accept. Hell is in being objective towards ourselves; Sartre recognized the human nature, and the difficulty with which we recognize our identities (Sartre 1989, p. 131). This is why this recognition is the embodiment of hell for us. Estelle is a bright representation of existentialist vision. As long as Sartre’s ideas related to the human opportunity to choose, she had clearly proved the importance and possibility of human choice. Of course, killing one’s child is possibly the human choice in its most radical form, but it seems that Sartre had to use this complex context to make existentialist vision more understandable to the reader. There is surely, the risk that the reader might misunderstand the purpose of this tragic plot, but it is more probable that Estelle’s actions will not be misinterpreted. While conventional reader will try to judge Inez, Estelle, and Garcin through the prism of widely accepted moral norms, these are the existentialists who state the absence or the small role of the external societal standards (Heter 2006, p. 35). There is no common morality which could push us towards these or those actions. As a result, depicting three negative personalities is the means of clarifying the basic existentialist provisions: responsibility for actions, responsibility for passions, and the absence of God and general moral standards. This work is not meant to judge whether existentialism in Sartre’s works was negative or positive. The meaning of existentialism is in trying to view ourselves through Sartre’s viewpoint, and to think whether we can accept his vision of our lives. Conclusion Contrary to many traditional opinions, Sartre’s existentialism is absolutely humanistic. When we read his No Exit, we may conclude that the play is absolutely negative and absolutely immoral: open adultery, suicides, and child’s murders constitute a brief but colored picture of the play. However, these are the backgrounds, without which it would hardly be possible to notice the humanism, about which we speak. Existentialism is directly connected with humanism; â€Å"if people condemn our works of fiction, in which we describe characters that are base, weak, cowardly and sometimes even frankly evil, it is not only because those characters are base, weak, cowardly or evil† (Sartre 1989, p. 142). The importance of existentialist humanism is not in pushing us towards the thought that our cowardice or our passions are the results of some external societal factors. The humanism of existentialism is in showing human responsibility for these evils and actions. As a result, cowardice and evil are determined not by some external attributes (for example, being a coward means being bad), but by the actions of people (for example, when certain passions cause the death of an innocent child). No Exit is the example of short and consistent existentialist vision of our lives, our identities, and the consequences of our reasonable choices.