Wednesday, December 18, 2019

The U.S./Cuban Showdown and the Cold War - 1556 Words

The 13 days in where the Soviet Union confronted the USA by placing nuclear missles in the island Cuba which is just 90 miles off American mainland is regarded as the closest the two countries came to war in the Cold War period. The short term signifcances were huge, as the world came close to a third world war, but in the long term it actually helped USA and the Soviet Union build a stronger relationship. It led to the Moscow-Washington hotline. However, during the 13 days it proved to many leaders and citizens around the world how fragile a relationship the two countries had, and showed a glimpse into the future that no one wanted to experience. However, what was most significant about the event in the short term was that the outcome seemed to give the USA the upper hand in the cold war. The result of the crises was that the Soviet Union retreated and took all their offensive weapons in Cuba away, whilst the American missiles in Turkey were allowed to stay where they were. Although the Cold War continued for another three decades after, the event led to the decline of Khrushchev, which proves how significant a defeat it was for the Soviets. Opposition had mounted against Khrushchev during and after the crisis and for all his dramatics, bringing the world to the brink of nuclear war for example, he had not delivered any meaningful victories. In the early days of September 1962, American U-2 spy planes detected that the Soviet Union were building surface-to-air launchShow MoreRelatedThe Cold War Summarized Essay1619 Words   |  7 Pagesfollowing the Second World War is known as the Cold War. This period was full of tension and fear that the United States and the USSR would destroy each other and the world with their arsenals of atomic weapons. The seeds of this rivalry were planted nearly a quarter of a century before its actual commencement with the Revolution of 1918 in Russia. The Cold War Rivalry would manifest itself in everything from sports in Olympic competition to science and the Space Race. The Cold War did not only take placeRead MoreCuban Missile Crisis By Bryce Faber999 Words   |  4 PagesCuban Missile Crisis Bryce Faber The Cuban Missile crisis in October of 1962 was the closest the world has ever come to nuclear war. Over thirteen October days, the U.S. and the Soviet Union faced off over Nuclear missile sites found on Cuba 90 miles from the Florida shore. These two world superpowers locked horns in what became known as the Cold War. The Cuban Missile crisis was the climactic showdown in which John F. Kennedy and Nikita Krushchev Made decisions that would affect the fateRead MoreThe Cold War : A Conflict Between Capitalist And Communist Nations Of The World989 Words   |  4 PagesThe Cold War was a conflict between the capitalist and communist nations of the world that lasted from the end of World War 2 into the 1990 s. Problems created by the Cold War still exist today, although many of the combat countries do not directly. Capitalist nations are sometimes referred to as the First world, communist nations are often called the Second world, and the developing nations of Latin America, Af rica, the Middle East, and Asia are often referred to the Third world. The Cold War wasRead MoreEssay on Cold War and Us Diplomacy1701 Words   |  7 PagesThe Cold War and U.S Diplomacy politic 300 07/31/2011 The Cold War Diplomacy When most people think of President Kennedy’s Diplomacy efforts, they will often refer to situations that were resolved using the doctrine of flexible response. This is when the military and White House planners implemented a policy that offered them a range of options to choose from: in dealing with a host of threats. These included: the increased use of conventional forces to small and large nuclear weaponsRead MoreThe United States Air Force1185 Words   |  5 Pagessurrounding these two powers was known as the Cold War, and one incident spiraled the bloodless war to the brink of full scale nuclear war as some thought the strained relationship was at a point of no return. This paper analyzes how the different perspectives through newspapers articles reporting the downing of the U-2 spy plane by the USSR’s domestic surface-to-air missile, and how these fluctuations serve specific geological regions. As the Cold War heightened, more spying by America and SovietRead More Cuban Missile Crisis Essay examples2946 Words   |  12 PagesCuban Missile Crisis The closest the world has come to nuclear war was the Cuban Missile Crisis in October 1962. This was the tense cold war opposition between the United States and the Soviet Union. The Soviet Union had installed nuclear missiles in Cuba, just 90 miles off the coast of the United States The Cold War was the result of a clash between communism and capitalism, two opposing world-views. Another cause of the build up to the Cold War was the intransigent attitude of both sidesRead MoreContainment as U.S. Policy During Cold War Era1889 Words   |  8 PagesContainment as U.S. policy during Cold War Era From after World War II and up until 1991 the foreign policy of the United States was based on Cold War ideology and the policy of containment; to prevent nations from leaning towards Soviet Union-based communism, as first laid out by George Kennan and later used as one of the key principles in the Truman Doctrine (LeCain). As this essay will argue, because of this policy the United States made a commitment to fight communism everywhere in the worldRead MoreContainment As U.S. Policy During Cold War Era Essay1836 Words   |  8 PagesContainment as U.S. policy during Cold War Era From after World War II and up until 1991 the foreign policy of the United States was based on Cold War ideology and the policy of containment; to prevent nations from leaning towards Soviet Union-based communism, as first laid out by George Kennan and later used as one of the key principles in the Truman Doctrine (LeCain). As this essay will argue, because of this policy the United States made a commitment to fight communism everywhere in the worldRead More Cuban Missile Crisis Essay2219 Words   |  9 Pagesinformed the world that the Cold War was perilously close to turning hot, and the world stood on the brink of nuclear holocaust. Almost twenty years since the end of World War 2, after two decades of mounting tension between the Soviet Communist Empire and the Western allies, the dreaded nuclear showdown was underway. America and the Soviet Union were on a collision course. How had this come to pass? Although the announcement came as a great shock to the public, the Cuban Missile Crisis had not occurredRead MoreAmericans Attitude Change in the 60s2293 Words   |  10 Pagesconsequences of this profound attitudinal shift. Question 3: How did official US policy towards Vietnam change between 1950 and 1975? How did American leaders link events in Vietnam to national security interests? How did the American public react to the war in the sixties and early seventies? Answer: These two questions are so intertwined with one another that combining the two answers is the most efficient way of telling the story. Vietnam was a legacy of Kennedy and a primary reason for the split

Monday, December 9, 2019

Problem Action-Consequence Technique for Launch- myassignmenthelp

Question: Discuss about theProblem Action-Consequence Technique for Early Launch. Answer: Introduction The main issue, which is being faced in the selected YouTube video, is that a software would be delivered to the client without any encryption implemented in the software. This prospective can be termed as an ethical aspect as this can lead to consequences which can be not appropriate from the point of view of the organization who is using the software. What are the ethical problems you identified in your chosen YouTube video? The main ethical problem, which is being encountered in the YouTube video, is that a software due to deadline issue is being delivered to the client without any proper encryption implemented in the software. The project director who does not want to delay the delivery of the software and want to deliver the software without any proper security aspect involved in it is forcing this (Ding et al., 2014). Why are these ethical problems? The problem, which is being seen in the video, is an ethical problem due to the factor that a software without any proper encryption can be a problem in the near future. If a software does not have proper encryption, it would be very much easy to hack the software and achieve the data from it (Chen et al., 2016). The hackers who use them for their own purpose usually achieve the data. Who is responsible for these problems? In the stated context, the person responsible for the action is the project director. The project director is the head of any project and he or she has to make the main call regarding what has to be done and what should not be done. In this case, the project director has made a call to deliver the project without proper encryption (Kumar, Khan Khan, 2015). The decision is taken mainly to deliver the project on time to abide with the term and condition with the client. Who is affected by these problems? The group who is affected by the problem is the client or the person to whom the software would be delivered to. The client when using the software in a live environment can face different sort of problem. The problem may range from hacking of the data or inappropriate access to the software by unauthorized users. This can affect the overall working of the organization and affect them in the end. The private data of the organization can be exposed and this would affect the working of the organization (Pires et al., 2016). What project management strategies could have prevented these problems from arising in the first place? There are different types of project management approaches that can be involved in the any project. The implementation of the appropriate form of project management tool depends upon the need of the project. For example taking into account a software development project named waterfall model can be used (Sadeghi et al., 2017). This model directly incorporates the different requirement, which are needed in order to provide a proper development of the software. There are other methods that can be used for example agile method, spiral model, V shaped model and others. Which of the three actions in your chosen YouTube video is better? Why? Among the three options, which are stated in the video, the best option should be the project director should ignore the project managers recommendation. This can be stated as the most appropriate option due to the factor that in the future the total alteration of the software (implementation of the encryption in the software) would depend on the project director. Appropriate testing and the necessary details can sometimes be ignored which directly reinforces the reputation of the organization (Scott-Hayward, Natarajan Sezer, 2016). What action, other than the three in your chosen YouTube video, can best resolve the problems? The problem in the stated video can be resolved by speeding up the development process. This can be implemented by more developers involved into a single project for pacing up the development phase. This can be directly be beneficial due to the factor that the deadline issue would be meet by involving more developers and the issue of the implementation of the encryption can also be incorporated in the software. Due to which the reputation of the organization would also not be hampered and other projects, which are in the pipeline, would not be directly affected (Sadeghi et al., 2017). Who should take the best action? Why? The best action in this case should take by the project director. The project director has the overall knowledge of the project and he should know that should be done in order reach of expectation of the client. The project director should know what all the software should consist of and the main requirement of the client and what the software is intended to perform. According to this, the main framing of the project should be done so the satisfaction of the client is reached accordingly. What are the implications of the best action on the projects time, cost and quality? Project time: The project time may be altered few days taking into consideration the involvement of more developers or workers into one project, which is trending towards the deadline. This can be few consequences as well but it would not be so much hampering as delivering the project without proper encryption involved into the software. Cost: The cost of the project may remain the same or may alter a bit taking into consideration not reaching the deadline issue. The cost factor is a very much issue when relating to development of the software. Quality: In accordance to the action, which is selected for course plan, the quality of the product would not be altered. This is due to the factor that the quality of any software is the main issue, which is directly related to the reputation of the organization. The project director should always consider taking the preventive measures during the implementation of the project that compromise in the sector of quality is not being reinforced. What are the consequences of the best action on the project stakeholders? The stakeholders would be somehow disturbed because the project would not be delivered at the predefined time framework. On the other hand, when one projects deadline would be missed it would directly affect the working of other projects, which are in the pipeline. This would result in alteration of all the deadline aspects, which would not be beneficial for the organization. The project manager and the project director are directly answerable to the stakeholders for the reason due to which the projects are not being delivered at the pre estimated time framework (Sadeghi et al., 2017). References Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X. (2016). Software-defined mobile networks security.Mobile Networks and Applications,21(5), 729-743. Ding, A. Y., Crowcroft, J., Tarkoma, S., Flinck, H. (2014). Software defined networking for security enhancement in wireless mobile networks.Computer Networks,66, 94-101. Kumar, R., Khan, S. A., Khan, R. A. (2015). Revisiting software security: durability perspective.International Journal of Hybrid Information Technology (SERSC),8(2), 311-322. Pires, R., Pasin, M., Felber, P., Fetzer, C. (2016, November). Secure content-based routing using intel software guard extensions. InProceedings of the 17th International Middleware Conference(p. 10). ACM. Sadeghi, A., Bagheri, H., Garcia, J., Malek, S. (2017). A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software.IEEE Transactions on Software Engineering,43(6), 492-530. Scott-Hayward, S., Natarajan, S., Sezer, S. (2016). A survey of security in software defined networks.IEEE Communications Surveys Tutorials,18(1), 623-654.

Monday, December 2, 2019

Voyager System Essays - Library Automation, Voyager, Library

Voyager System Section A This report contents information about the Voyager System used by the Access Services Department of Harvey A. Andruss Library. The computerized system function as an integrated library animation that depends on a network support service. It is linked to a main server in Shippensburg. This server enables the library to share information with the seven Pennsylvania state universities. So, the students, staffs, faculties and Pennsylvania residences can have access to educational materials. The focuses of the report are to describe the configuration of the voyager system and its operations, not forgetting the possible suggestion to improve the system. The Harvey A. Andruss Library is essentially responsible to provide services in the form of adequate resources of information. It mainly consists of over 300,000 volumes of Library collection within the range of Governmental Reports to periodical data. In addition to the general collection, the library has several hundreds periodical online and on its shell. For example, it has periodical of journals and magazines. They are updated as frequent as possible to issue that the information are current. Moreover, it has been estimated that the Library obtains close to 1700 current periodicals but hold stock of several thousands more. Anybody can have access to these periodical by checking the periodical holding list. This List is available to users on the computer stations, the Circulation Desk or the Reference Desk. Some of the documents are reserved on microfilm. The most common form of documents in this category is the congressional Records. For example, the American statistical Index and other form of information sources in the Library are the news bank, Newspapers, reserves materials, oversize books, career guidance collection, musical scores, sound recordings and Loan period. The organization and maintenance of the Library information are handled by the voyager system. The voyager system is an integrated library system. This system runs under Microsoft Windows operating system. It is a window driven program that was designed independently by The Endeavor Information Systems, Inc. However, it was configured to meet the requirements of Access Services Department. Since the circulation system is used to provide current periodicals upon request, a Local Area Network (LAN) links the voyager system to a mainframe computer in Shippensburg. The mainframe computer serviced as a server for the Library to have direct connection to the seven Pennsylvania state Universities. Since it has been made clear about the development and the intended purposes of the voyager systems, it will be necessary to consider the following questions. How was the voyager system configured to meet the requirement of the Library? How was policy groups created? How are the securities levels created and maintain? These questions responses lead to a complete understanding about the system configuration and specific functions. Now, let me respond to the configuration question. The voyager system was setup by a system administrator. The system administrator, who services as a supervisor, has to configure the system by entering the administration module and selecting system-wide. Then a viewing window will appear in which there are several option of icons. One of which is the location. A location is any specific branch of the voyager system. Its definition has to be unique and specify so that it can be a requirement of the circulation Services. For instance, the circulation Desk is a location, which has patron policy groups. The members defined in these groups are the undergraduate, graduate students, faculties and professors. They have to be identified in the configuration process so that an operator can have access to them. Although the definition of each location on the voyager system is important, each of the locations names, codes, and items have to meet the voyager software requirements. At the end of the definition of a location, it is now ready to be added to the voyager system. The administration module window is used to add all newly created location. Once it is inserted into the system, the location automatically put in the administration security profile. Even thought I have identified the method used to add a location to the system, I intend to describe the three locations types-the storage location, the happening location, and the print location. These locations have specific functions that correspond to their definition. The storage