Monday, January 27, 2020
Estimation of Importance of Web Pages for Web Crawlers
Estimation of Importance of Web Pages for Web Crawlers
Sunday, January 19, 2020
Analysis of Leroi Jones A Poem Some People Will Have To Understand Ess
Analysis of Leroi Jones' A Poem Some People Will Have To Understandà à à à à à à à à à à à à There is an implied threat in "A Poem Some People Will Have To Understand" by Leroi Jones. Ostensibly, there is no intimidation. The poem is confessional, even reflective; the theme is one of mutability and change. However, there is something frightening and ominous in Jones1 vision, which he creates through attention to word choice and structure. Jones' warning is immediately evident in the title through his manipulation of words. The phrase "have to" has two meanings. One the one hand, "have to" is an innocuous statement of the alliance Jones expects to find among his Afro-American readers--these people will "have to" understand the poem because it speaks to their individual, personal lives. On the other hand, there is a more sinister connotation in "have to"--the idea that others will "have to" understand this poem because they will be forced to do so. Beyond the title, Jones creates a forbidding speaker--a man at a crossroads, or rather, at a moment of decision. However, the structure of the first stanza is direct and conservative, almost prosaic. Jones gives us nothing that is revolutionary here. Instead, he lays the groundwork for this piece with the gloomy initial images of "(d)ull unwashed windows of eyes"(1). These eyes are no doubt those of the speaker, and they have been dulled and dirtied by his existence as a black man in the post-segregation 1960s. The "industry" he mentions in lines 2 and 3 is both the industry of the American machine that exploits the underprivileged, and the industry he "practice(s)." The speaker is a self-professed "slick / colored boy, 12 miles from his / home" who practices "no industry" (35). By "... ...The promised "phenomenon" has not come, and it is now up to him to bring it about through violence. Jones does not allow the speaker to lose any of his charm as he politely invites his "machinegunners"--the tools of his new industry--to "please step forward" (26). He is a hustler to the end, a smooth-talker who is now at home in his new ego and his new profession. Jones employs the dynamics of change to his speaker throughout the poem. From an aimless vagrant to a passionate revolutionary, Jones plots his speaker's course using specific words and structural techniques. Through these elements, we witness the evolution of a new black man--one who is not content with the passivity of his earlier spiritual leaders. We are left with a threat--a steel fist in a velvet glove of poetry--and it becomes a poem that we "have to" understand, whether we want to or not. Ã
Saturday, January 11, 2020
Cloud Computing Now and the Future Essay
The use of cloud computing creates a growing interdependence among both public and private sector entities and the individuals served by these entities. This paper provides a snapshot of the advantages of cloud computing and the risk areas specific to cloud services which clients of cloud services should be aware of. The future of cloud computing is certainly exciting, but moving more of our lives online means we will inevitably have to consider the consequences. Cloud computing means dependence on others and that could limit our privacy because of policies to access our information, security could be a big issue and large companies like Amazon and Google could monopolize the market. The cloud is a metaphor for the space on the internet that can store your data, as well as applications to manipulate data. It is not clear when the term cloud computing was first coined. For example, Bartholomew (2009), Bogatin (2006) and several others suggested that ââ¬Ëcloud computingââ¬â¢ term inology was perhaps first coined by Google Chief Executive Eric Schmidt in 2006. Kaufman (2009: 61) suggests that cloud computing terminology ââ¬Ëoriginates from the telecommunications world of the 1990s, when providers began using virtual private network (VPN) services for data communicationââ¬â¢. There is however, agreement on the definition of cloud computing. The National Institute of Standards and Technology defines cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Mell 2009: 9). A computerââ¬â¢s operating system, data and applications are typically installed and stored in the ââ¬Ëtraditionalââ¬â¢ computer environment. In a cloud computing environment, individuals and businesses work with applications and data stored and/or maintained on shared machines in a web-based environment rather than physically located in the home of a user or a corporate environment. Lew Tucker, Vice President and Chief Technology Officer of Cloud Computing at Sun Microsystems, explained that cloud computing is ââ¬Ëthe movement of application services onto the internet and the increased use of the internet to access a wide variety of services traditionally originating from within a companyââ¬â¢s data centerââ¬â¢ (Creeger 2009: 52). For example, web-based applications such as Googleââ¬â¢s Gmailâ⠢ can be accessed in real time from an Internet-connected machine anywhere in the world. Cloud computing provides an online environment that is scalable which facilitates the ability to handle an increased volume of work without impacting on the performance of the system. The Cloud also offers significant computing capability and economy of scale that might not otherwise be affordable to businesses, especially small and medium size companies that may not have the financial and human resources to invest in IT infrastructure. Advantages include capital costs and running costs. Companies can leverage the use of large scale resources from cloud service providers and ââ¬Ëadd or remove capacity from their IT infrastructure to meet peak or fluctuating service demands while paying only for the actual capacity usedââ¬â¢ (Sotomayor et. Al. 2009: 14) on a ââ¬Ëpay-as-you-goââ¬â¢ economic model. It can also be significantly cheaper to rent added server space for a few hours at a time rather than maintain your own servers. Rental prices for Amazon Elastic Compute Cloud (EC2), for example, are between US$0.020 and $2.970 per hour in Oregon as an example. Pay only for what you use. There is no minimum fee. On-Demand Instances let you pay for compute capacity by the hour with no long-term commitments. As you can see in the above example the selected usage is 100 hours per month of On-Demand Instances, 10 reserved instances and 1000 GB of storage for 50 IOPS and 100 Snapshot storages. The monthly cost for this company would be $1449.41 per month. This could be much more cost affective for a company than buying the hardware and storing the information themselves. The only question is, how safe is this information that is being stored? The risk of cloud computing could be the security of the information being stored by a large company like Amazon. It is still unclear how safe out-sourced data is and when using these services ownership of data is not always clear. In a study done in 2009, a team of computer scientists from the University of California, San Diego and Massachusetts Institute of Technology examined the widely-used Amazon EC2 services. They found that ââ¬Ëit is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the targetââ¬â¢ (Ristenpart et al. 2009: 199). This demonstrated that the research team was able to load their eavesdropping software onto the same servers hosting targeted websites (Hardesty 2009). By identifying the target VMs, attackers can potentially monitor the cache (a small allotment of high-speed memory used to store frequently-used information) in order to steal data hosted on the same physical machine (Hardesty 2009). Such an attack is also known as side-channel attack. The findings of this research may only be a proof-of-concept at this stage, but it raises concerns about the possibility of cloud computing servers being a central point of vulnerability that can be criminally exploited. The cloud service providers establish the privacy policies to the companies that do business with them. The businesses are faced with their own privacy and confidentiality being determined by the terms of the cloud service providers. Failure to comply with data protection legislation may lead to administrative, civil and criminal sanctions. Data confidentiality and privacy ââ¬Ërisks may be magnified when the cloud provider has reserved the right to change its terms at willââ¬â¢ (Gellman 2009: 6). Some cloud service providers argue that such juridical issues may be capable of resolution contractually via SLAs (Service Level Agreements) and the like. Clients using cloud services could include clauses in their SLAs that indicate the law governing the SLA, the choice of the competent court in case of disputes arising from the interpretation and the execution of the contract. The Cloud Security Alliance (2009: 28) also suggested that clients of cloud services should require their providers ââ¬Ëto deliver a comprehensive list of the regulations and statutes that govern the site and associated services and how compliance with these items is executedââ¬â¢. Businesses should ensure that SLAs and other legally-binding contractual arrangements with cloud service providers comply with the applicable regulatory obligations (eg privacy laws) and industry standards, as the may be liable for breaching these regulations even when the data being breached is held or processed by the cloud service provider. Determining the law of the jurisdiction in which the SLA is held is an important issue. It may not, however, be as simple as examining the contractual laws that govern the operations of cloud service providers to determine which jurisdictionââ¬â¢s laws apply in any particular case. Gellman (2009: 19) pointed out that ââ¬Ë[t]he user may be unaware of the existence of a second-degree provider or the actual location of the userââ¬â¢s dataâ⬠¦[and] it may be impossible for a casual user to know in advance or with certainty which jurisdictionââ¬â¢s law actually applies to information entrusted to a cloud providerââ¬â¢. Businesses should continue to conduct due diligence on cloud service providers, have a comprehensive compliance framework and ensure that protocols are in place to continuously monitor and manage cloud service providers, offshore vendors and their associated outsourcing relationships. This would ensure businesses have a detailed understanding of the data storage information to maintain some degree of oversight and ensure that an acceptable authentication and access mechanism is in place to meet their privacy and confidentiality needs. This would also ensure a higher consumer confidence level in the entire cloud computing industry. The future looks bright for cloud computing. Last summer Google made a very large investment in bringing Google Fiber to Kansas City, broadband internet that is 100 times faster than what we currently have today. Faster internet speeds means larger files can be stored and downloaded from the cloud. Netflix says, ââ¬ËItââ¬â¢s the most consistently fast ISP in America.ââ¬â¢ Analysts from BTIG Research visited Kansas City last month and were ââ¬Å"blown away,â⬠by the service (Jeff Saginor 2012: 1). But at itââ¬â¢s heart, ââ¬ËGoogleââ¬â¢s attempt at being its own ISP is much more about forcing the entrenched service providers ââ¬âthe Verizonââ¬â¢s and Time Warnerââ¬â¢s and AT&Tââ¬â¢s of this world ââ¬â to step up their games than it is about making this particular business a raving financial successââ¬â¢. Saginor goes on to say, ââ¬ËWhen I asked the Google spokeswoman what the ultimate goal of all this was, she replied that Google wants ââ¬Å"to make the web better and faster for all users.â⬠The implication is that they donââ¬â¢t want to just do it all themselvesââ¬â¢. Cloud computing means dependence on others and that could limit our privacy because of policies to access our information, security could be a big issue an d large companies like Amazon and Google could monopolize the market. The Cloud provides an online environment that is scalable which facilitates the ability to handle an increased volume of work without impacting on the performance of the system. The risk of the cloud could be the security of the information being stored by a large company. It is still unclear how safe out-sourced data is and when using these services ownership of data is not always clear. Businesses should continue to conduct due diligence on cloud service providers, have a comprehensive compliance framework and ensure that protocols are in place to continuously monitor and manage cloud service providers, offshore vendors and their associated outsourcing relationships. The future of cloud computing is certainly exciting, but moving more of our lives online means we will inevitably have to consider privacy, security and ownership of the information. References Amazon Web Services http://aws.amazon.com/ec2/pricing/ Creeger M 2009. CTO roundtable: Cloud computing. Communications of the ACM 52(8): Bartholomew D 2009. Cloud rains opportunities for software developers. Dice 29 May. http://career-resources.dice.com/articles/content/entry/cloud_rains_opportunities_for_software Bogatin D 2006. Google CEOââ¬â¢s new paradigm: ââ¬ËCloud computing and advertising go hand-inhandââ¬â¢ Zdnet 23 April. http://www.zdnet.com/blog/micro-markets/google-ceos-new-paradigmcloud-computing-and-advertising-go-hand-inhand/ Cloud Security Alliance 2009. Security guidance for critical areas of focus in cloud computing V2.1. http://www.cloudsecurityalliance.org/csaguide.pdf Gellman R 2009. Privacy in the clouds: Risks to privacy and confidentiality from cloud computing. http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf Hardesty L 2009. Secure computers arenââ¬â¢t so secure MIT press release 30 October. http://www.physorg.com/news176197396.html Jeff Saginor 2012. What does Google get from supercharging Kansas Cityââ¬â¢s Internet? http://www.digitaltrends.com/opinion-wh-google-will-never-take-its-fiber-national/ Kaufman LM 2009. Data security in the world of cloud computing. IEEE Security & Privacy July/August: 61-64 Mell P 2009. Effectively and securely using the cloud computing paradigm. http://csrc.nist.gov/groups/SNS/cloud-computing/cloudcomputing- Ristenpart T, Tromer E, Shacham H & Savage S 2009. Hey, you, get off my cloud: Exploring information leakage in third-party compute clouds, in proceedings of the 16th ACM conference on Computer and communications security, 07. New Your, NY: ACM Press: 199-212 Sotomayor B, Montero RS, Llorente IM & Foster I 2009. Virtual infrastructure management in private and hybrid clouds. IEEE Internet Computing 13(5): 14-22 Mark D. Bowles (2010). Introduction to Computer Literacy. Retrieved from chapterââ¬â¢s six and seven. (Awl, 2009, p. 52)
Friday, January 3, 2020
An Unwinnable War - 1556 Words
As America find herself in todayââ¬â¢s ââ¬Å"War on Terrorism,â⬠one can easily find a number of similarities between todayââ¬â¢s situation and the war in Vietnam. As the Taliban steadily loses control and power over Afghanistan, it becomes exceedingly important to discuss potential replacement governments. Afghanistan is, like Vietnam in the 50ââ¬â¢s and 60ââ¬â¢s, a very volatile country full of a variety of people speaking different dialects and practicing different religions. It is very important, then, that the government that is installed is one that is capable of maintaining some type of control or authority over its diverse people. On July 7, 1954, Ngo Dinh Diem came to power as the Prime Minister of South Vietnam (Fishel 107). Diem was backed byâ⬠¦show more contentâ⬠¦Of course the irony is that Diem ââ¬Å"took steps to prevent the 1956 unification election,â⬠which is normally a prerequisite for a democracy (Starr 39). He did stage an elec tion for himself, but it was certainly rigged being that ââ¬Å"Saigon with roughly 405,000 registered voters, somehow cast 605,000 votes for Diemâ⬠(Starr 39). Diem was therefore determined to be the best man for the job of preventing communism in S. Vietnam. One reason is most likely because he was ââ¬Å"Westernizedâ⬠being that he ââ¬Å"lived for some time in the Mayknoll Seminaries in New Jersey and New York Stateâ⬠(Genesis 116). He quickly gained the approval of American Catholics such as Cardinal Spellman, which ââ¬Å"certified Diem as an important anti-Communistâ⬠(Scheer 116). Some Americans were skeptical of Diem at the time, but as Secretary John Foster Dulles simply stated, ââ¬Å"the United States could simply not find ââ¬Ëa better manââ¬â¢ to carry out its designsâ⬠and ââ¬Å"Diem is only means US sees to save South Vietnam and counteract revolution. US sees no one else who canâ⬠(Gettleman 133). This is, however, a little unsettling being that it sounds as though the U.S. merely ââ¬Å"settledâ⬠on Diem in lieu of a better candidate. The American people then, perhaps influenced by the media, agreed with their governmentââ¬â¢s approval of Diem. In the June 29, 1959 edition of Newsweek, Diem was deemed ââ¬Å"one of the ablest free Asian leadersâ⬠and his governmentShow MoreRelatedVietnam War : The Unwinnable War1762 Words à |à 8 PagesJacobs Vietnam War: The Unwinnable War Introduction: The Vietnam War was certainly controversial. There were many protests that erupted across college campuses and throughout numerous town and cities. Many individuals viewed the war as unnecessary and unwinnable. The draft was also very widely criticized and seen as a negative point in the war. The draft was forcing young college students to go fight in dangerous territory. The most controversial aspect of the Vietnam War is certainly that itRead MoreDrug Abuse And The Unwinnable War1462 Words à |à 6 PagesDrug Abuse and the Unwinnable War Drugs are not a new thing by any means and have been commonplace in most cultures at one point or another. Throughout the known history of the world humans have used drugs to provide mind and mood altering experiences. Evidence of the production of alcohol can be traced back to the description of a brewery in an Egyptian papyrus as early as 3500 B.C (Fort, J. 1969). On a seemingly primal level, humans have always had some incessant need to alter their state of consciousnessRead MoreAnalysis Of The Unwinnable War : A Nature Of Herbicidal Warfare1512 Words à |à 7 PagesChristopher Nguyen J301 Research Paper The Unwinnable War: A Nature of Herbicidal Warfare Mostly consisting of thick costal mangrove, the dense forest spread high across a wet, humid plateau in the countryside of North Vietnam. For centuries its environment provided raw natural resources such as nutrient-rich soil ideal for cultivating rice and flowing streams, providing a reliable water supply to the native people of the region. Now, on a summer day in 1961, it was under attack. Following directRead MoreEssay on The Solution to the Immoral, Unwinnable War on Drugs 1668 Words à |à 7 Pagespolicy has received sharp criticism from members of the law enforcement, as well as groups of parents and other constituencies who believe that the government should pursue the goal of a ââ¬Å"drug-freeâ⬠society. The solution to the immoral, unwinnable war on drugs Key recommendations: â⬠¢ All currently illegal drugs should be decriminalised. â⬠¢ Up to a set quantity, possession of such substances would result in a misdemeanour charge. Education and rehabilitation would be offered as alternativesRead MoreWhy Has American Stopped Winning Wars?810 Words à |à 4 PagesIn his article, ââ¬Å"Why Has American Stopped Winning Wars?â⬠Dominic Tierney discusses some of the topics in his recent book, ââ¬Å"The Right Way to Lose a War: America in an Age of Unwinnable Conflicts.â⬠The book, unlike the article, provides recommendations for how America can adapt to a new era of warfare. Having said that, Tierneyââ¬â¢s article published in the The Atlantic, provides no such recommendations nor does it provide adequate reasoning to support his argument, rather he leaves the reader emotionallyRead MoreWas the War in Vietnam Justified?804 Words à |à 3 PagesWas the war in Vietnam justified? The Vietnam War was the longest war in the history of the United States it lasted from 1959-1975. Billions of dollars was spent trying to win and unwinnable war. Countless of lives were lost and America failed to achieve its objective. The origins of the war stem from the Indochina wars that occurred in the late 40s and early 50s. After many years of colonial war, the Viet Minh a communist group led by Ho Chi Minh sought independence for Vietnam. The French wereRead MoreThe Vietnam War A Long And Hard Battle1069 Words à |à 5 PagesAnalysis two 4/20/2015 The Vietnam War a long and hard fought battle that lasted from November, 1954 and ended on April 30, 1975, but the United States didnââ¬â¢t get involved until June of 1965. (Vietnam War Statistics) The likely collapse of the South Vietnamese army and the fear for the spread of communism is why America joined in on this war, but joining the war was extremely controversial. Many people believe that the United States involvement In the Vietnam War should never have happened. I believeRead MoreEffects Of The 1968 Tet Offensive On American Policy And Public Opinion About The War1310 Words à |à 6 PagesThe Vietnam War plunged the United States in an ever-increasing dilemma of how to exit what seemed to be an unwinnable war against a formidable foe without losing honor and respect in the global community. In a comparison of two essays regarding Americaââ¬â¢s involvement in Vietnam, the authors offer different perspectives on the war and what led to an America defeat. In the first essay, the effects of the 1968 Tet Offensive are examined and what impact it had on American policy and public opinion aboutRead MoreWas the Vietnam War Winnable1210 Words à |à 5 PagesWas the Vietnam War Winnable? The war in Vietnam waged by America was unwinnable through the type of warfare that was used by the US . If they had concentrated on certain key aspects they may have prevented the spread of communism to South Vietnam and achieved their ultimate goal. Americas inability to obtain the ââ¬Å"Hearts and Minds ââ¬Å"of the Vietnamese led to a continual supply of fighters. The US was unable to fight against an ever-increasing civilian army. In Vietnam the US relied tremendously onRead MoreTraffic : The Post Modern Civil War1639 Words à |à 7 PagesKevin Holcomb Pepe Zerda PSC 201-B01 22 September 2014 Traffic: The Post-Modern Civil War Traffic is a film written by Simon Moore and Stephen Gaghan, directed by Steven Soderbergh, and released in 2000 by USA Films. The movie tells three different stories. The first story is of two Mexican police officers, which become entangled in the Mexican cartel war, during a drug bust of one of the cartels. The second story in the movie is about a conservative federal judge in Ohio who has been appointed
Subscribe to:
Posts (Atom)