Saturday, January 25, 2020

Benefits of Linux Operating System

Benefits of Linux Operating System TASK 01 Evaluate the benefit of Linux operating system as interoperable and alternative NOS for the company in the form of a feasibility report to include the following: The comparative Networking features of Windows and Linux. Interoperability features of Ubuntu with the existing Microsoft Windows Workstations. You need to install Ubuntu on a machine and configure network services for Windows and Linux mainly for file sharing and printing. Necessary screen shots have to be provided. Enumerate the various costs associated with the performance, security, support, and maintenance of the Ubuntu within the bank. Answers What is Windows? Microsoft Windows is a series of computer operating systems and GUIs (Graphical User Interfaces) produced by Microsoft Corporation. Windows was the first operating environment introduced by Microsoft in 1985 as an add-on to MS-DOS. Windows was introduced because of the growing interest in Graphical User Interfaces (GUIs). Then Windows dominated the worlds personal computer market, overtaking the Mac OS, which had been introduced previously. Microsoft has introduced two parallel routes in their operating systems. One route is for Home users and the other route is for Professional IT users. The home versions have greater multimedia support and less ability for network and security. But Professional versions have low multimedia capabilities and better networking and security. Windows operating systems are commercial products and we should purchase license in order to use the products. And also the source code of windows products are closed and owned by Microsoft. Linux is a free and open source Operating System referring to Unix-type operating systems originally created by Linus Torvalds with the support of developers all over the world. Linux source code is freely available to everyone and anyone can freely modify and redistribute both commercially and non-commercially. Linux kernel can be defined as one of the best kernels that uses today. And further, many organizations have begun to use Linux based operating systems because of its high security and low cost. Linux is well known for its use in servers. And also Linux can be installed on vast variety of hardware, such as mobile phones, watches, mainframes, supercomputers and etc. Fedora, Suse, Mandriva, Ubuntu, Kubuntu and Red Hat are some popular distributions of Linux. Comparative Features of Windows and Linux Malware Threats Security is a vital feature that every Operating System (OS) should provide. Because operating system is a key requirement of every computer system. Therefore everything depends on it. Malware or Malicious Software is a computer program that is designed by computer criminals in order to damage the systems and theft important information from computer systems. Therefore a network OS should have a thorough security. Without security, the network is vulnerable to larger number of threats. Windows Microsoft Windows OS is the most popular operating system in the world. It runs nearly 90% of desktop computers in the consumer market, and is the main operating system of the vast majority of commercial and institutional users. Therefore this makes windows equipped machines larger target of malware (or malicious software) which is written by computer criminals who want to cause much damage to the system. According to the surveys that conducted by Kaspersky Lab have revealed that more than 11,000 malware programs for windows were discovered just in the second half of 2005. And also nearly one million Windows based computers have been infected with Botnets (Botnet is a small computer program used to control other computers remotely). In windows based computer systems some malware are very hard to remove without using an Anti-Malware program. Linux In year 2006 approximately 800 Linux malware were discovered. Most of the malware are propagated through the Internet. Usually Linux based malware are extremely rare. But there may have a possibility of spreading malware to the Linux based systems if they are connected with Windows based systems. Because of the rarity of malware threats, there is no initial requirement for Anti-Malware programs in Linux based systems. But anti-malware software such as ClamAV and Panda Security are rarely used for Linux servers for more security. Resource Sharing Computer Network is a set of interconnected computers that is used to share resources such as printers, scanners, information, storage and etc. Therefore operating systems should support for reliable resource sharing. Reliable resource sharing increases the networks performance. Linux and Windows belong to two different platforms. Though they provide different facilities, they provide they initial requirements of a network. Usually Linux performs well for file sharing and Windows performs well for Printer, Scanner and other hardware resources sharing. Cost For desktop or home use, Linux is very cheap or free, and Windows is so expensive. For sever use, Linux is very cheap when comparing with Windows. Microsoft allows a single copy of Windows to be used on only one computer. In contrast, once we have purchased Linux, we can run it on any number of computers for no additional change. For instance in year 2005, Windows XP Professional Edition was sold for $200 and Windows Server 2003 Standard Edition with 10 Client licenses was sold for $1,100. But we can download Linux distributions freely from their web sites. Otherwise we can purchase a assorted distributions of Linux in a box with CD and manuals and technical support for around $40 to $80. Bugs All software has and will have bugs (programming mistakes). Linux has a reputation for fewer bugs than Windows. Windows is developed by faceless programmers whose programming mistakes in Windows are hidden from the outside world because Microsoft does not publish the particular source code for Windows. Microsoft believe that their source code as a trade secret. In contrast, Linux is developed by hundreds of programmers all over the world. They publish the source code of the operating system to the world. Therefore it is stronger and less vulnerable for threats. That is why most of the organizations use Linux for their networks. Linux is getting update from many talented programmers all over the world. Network Configuration When comparing with Linux network configuration, Windows configuration is easier. Because of generally Windows is based on GUI (Graphical User Interface). Therefore anyone can understand Windows based network configuration without having much knowledge. But Linux is generally based on Command Line or Terminal and there should have a good knowledge about Linux in order to implement a network by using Linux. File System In Windows based systems the support NTFS, FAT, ISO 9660, UDF and others. But in Linux based systems they use ext2, ext3, ext4, ReiserFS, FAT, ISO 9660, UDF, NFS, JFS, XFS, and others. When comparing with Windows, Linux supports for many file systems. But now Windows has 3rd party drivers for ex2, ex3, ReiserFS, HFS and others. System Stability Windows operating systems based on the NT kernel and it much more stable than the other older versions of Windows. But if we are using unsigned or beta drivers, it can lead to decreased system stability. Linux window manager is a key component of X-Windows based GUI system and can be highly stable. Mechanisms used to terminate badly behaving applications exist at multiple levels, such as Ksysguard and the kill command. If the GUI fails Linux can use a text based system. This feature is a powerful feature in Linux for network stability. Interoperability features of Fedora 12 with Windows Within this task I used Fedora 12 instead of Ubuntu. Windows and Fedora belong to two different platforms. Therefore their mechanisms are different. That is why the feature interoperability is needed. Interoperability can be defined as the ability to work with each other. In order to exchange messages between each different platform reliably without any errors or misunderstandings, there should have a common background between each platform. Likewise Windows and Linux (or Fedora 12) also has that kind of common grounds that support for exchange messages between each platform. Samba Samba can be defined as a re-implementation of SMB/CIFS networking protocols. It was developed by Australian Andrew Tridgell. It provides various facilities for file and printer sharing between Windows, UNIX and UNIX like systems such as Linux, Solaris, AIX, and Apples Mac OS X server systems. Samba runs on most systems and now it has become a standard of most of the distributions of Linux (such as Fedora, Redhat, Mandriva, Suse and etc). When we need to share files and printers between different platforms such as Windows and Fedora, we should have to configure Samba. That is how we make interoperability between each platform. DHCP DHCP is short for Dynamic Host Configuration Protocol, a protocol used for assigning dynamic IP addresses to devices on a network. With a dynamic addressing, a device can have a different IP addresses every time it connects to the network. Though some systems and devices are allow to change the IP addresses while it is still connected, DHCP also supports a mix of static and dynamic IP addresses. DHCP simplifies the network administration because the DHCP server keeps the track of IP addresses rather than requiring an administrator to manage the task. I consider that the DHCP is also an interoperability feature because it can assign IP addresses to any platform such as Windows and Fedora. When a LAN network has a mixture of a Windows and Linux based computers, DHCP can assign IP addresses to all computers without a barrier of the platform. X Windows System The X Windows system is a windowing graphical user interface that almost, but completely, entirely unlike Microsoft Windows and the Macintosh. This X Windows System is an open, client/server system that for managing a windowed graphical user interfaces in distributed network. Earlier UNIX based systems used Shell as an interface. Shell is an inbuilt special program that allows users to enter commands in a CLI or Command Line Interface. But the new versions of UNIX-like systems heavily use X Windows as a Windows like graphical user interface. Earlier it was very difficult to work with Windows and Linux through CLIs. Because of Window was completely GUI (Graphical User Interface) and Linux was completely CLI. But now the new distributions of Linux come with the X-Windows capability. Therefore now the both systems can work more reliably and easily as a whole. X Windows is also an interoperability feature that is provided by Fedora 12 in order to work with windows systems much easily. TCP/IP TCP/IP shorts for Transmission Control Protocol and Internet Protocol. Generally it is a protocol suit that is used for the internet. It provides easy communication across different platforms and provide basis for the global internet. And also it can be defined as a basic communication language or protocol of the Internet. It can also be used as a communications protocol in a private network (either an intranet or extranet). When we set up with direct access to internet, our computer is provided with a copy of the TCP/IP program just as every other computer that we may send messages to or get information from also has a copy of TCP/IP. In an intranet there may have computers with different platforms such as Windows and Linux. But using TCP/IP protocol we can connect these computers. Both Windows and Linux distributions support for TCP/IP. Therefore it can also be considered as an interoperability feature of Windows and Linux. DNS DNS is Short for Domain Name System. DNS is an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, theyre easier to remember. The internet is based on IP addresses. Every time when we use a domain name, DNS server must translate the name into the particular IP address. In intranets also some organizations use DNS servers to name their network computers. Though it is a Windows based computer or a Linux system, it carries out its task perfectly. Because DNS also has a interoperability feature to work with different platforms. Enumerate the cost associated with the Performance, Security,Support and Maintenance of Fedora 12 within the Bank. For this Task I used Fedora 12 instead of using Ubuntu. Because Ubuntu do not have an inbuilt a Samba server facilities and it should be downloaded as a third party tool. But Fedora 12 has those facilities for printer and file sharing. Performance Performance is a vital part of a network. The efficiency of a network depends on the hardware and software performance. To the banks network I used one of the distributions of Linux called Fedora 12 as the NOS (Network Operating System). Generally Linux based operating systems are lightweight and need low performances. As the other distributions of Linux, Fedora 12 is also a lightweight operating system that requires low performance hardware. Bank is a place where many transactions are taken place every second across their branches and other networks. Therefore the banks network should be stable and reliable. Due to these reasons a bank should use trusted and reliable hardware and software in order to increase their network performances. Usually the costs of network devices are relatively high in the modern market. And also the network operating systems like Windows are extremely expensive. Therefore by using a free and open source OS like Fedora 12 we can reduce the money wastage. Further it does not need high performance computers for installation and does not consume lots of hard disk space like Windows does. Fedora 12 provides online updations and does not have a limit on installation. One copy of Windows can be installed to a one computer only. Otherwise we have to buy license. But Fedora 12 can be installed to any number of computers without any limitations. According to those above reasons I think that Fedora 12 provides good performances and also it is more cost effective when comparing with Windows. Security Security is a key requirement of a network. Otherwise anyone and any malware can attack and theft the important information from the network. Therefore OS (Network Operating System) developers try to increase OSs security features. If theres no security within an OS, then it is totally fails. Fedora 12 is a distribution of Linux and it is categorized as Free and Open Source Software. Linux based systems and their source codes are freely available to anyone and can be modified as required. Fedora 12 has also been developed by many programmers all over the world and it is a strong operating system. But windows based systems are commercial OSs and they do not publish their source code to the public. Therefore it is developed by limited programmers and there security is also limited. That is why we need third party security tools to protect windows based systems. The third party trusted and reliable Anti-Virus guards or third party security systems are more expensive and it is an additional cost to the windows based systems. But Fedora 12 has a strong in-built security mechanism (but Windows dont have) such as DPI (Data Packet Inspection) and ISD (Intrusion Detection System). Because it is developed by many programmers all over the world. Therefore it doesnt need any third party virus guards. The cost for additional security efforts has reduced in Fedora 12. Therefore Fedora 12 is a cost effective operating system when comparing with Windows. And also it is the best choice for a cost effective banks network system. Support Computer operating systems and other software are not 100% perfect. That is why the manufactures provide support for their products. When a problem is taken place in a system, we can get the manufacturers support to solve the problem. And also manufactures provide patches and other updations to reduce the vulnerabilities of their products. Microsoft Windows also provide free updations and online support for their products after they are purchased. Though Windows provides free online support services for their products without any payments, Fedora and other Linux based operating systems do not provide free support services. If we need to get a support from Linux based system, we should pay some amount of money for their service. But they provide 24 hours update service for their products. In Fedora should have to pay for their services. Though the support service is not cost effective for the bank, the OS is totally free for download. Maintenance After installation and Configuration every computer system need to be well maintained. Windows systems are much easy to maintain because it doesnt need well trained persons (compared with Linux). But Linux systems are more complex and cannot install, configure and maintain if theres no knowledge of it. In order to maintain the Fedora system in the bank, the bank needs a well trained personnel or network administrator. Anyone cannot maintain a Linux system; therefore the cost of a Linux based network system administrator is higher when comparing with a Windows Network System Administrator. Manufactures support is always need for system maintenance. But we need to buy the service advices in Fedora form its manufacture. TASK 02 Research and produce a comprehensive project plan for the implementation of a VPN within the company. This should include the following: A brief overview of current VPN technologies (both hardware and software). Design a suitable VPN using appropriate Internet Service Providers (IPS) for the requirements of the bank. Identify and list the hardware and software required to implement the banks VPN. Produce a schedule for the implementation of the VPN, detailing the installation of any necessary hardware, network operating system upgrades and associated applications software required. Write a section of the report on the responsibilities and level of service required from an ISP in order to implement a successful VPN within the company. Answers Although the topic VPN or a Virtual Private Network is a much complex subject in networking field, the basic idea of a VPN is quite simple. A corporation may have a number of officers (or group of officers) in different locations, and each of these locations can have its own local network. In many corporations there are many employees working remotely by connecting to the corporations local network at home or on the road. And also business partners can join together in extranets to share business information. Interconnecting these separate networks and locations over a public network is called a VPN or a Virtual Private Network. The apparent simplicity of VPN makes us think that it is a simple concept. But there is an ever-increasing number of VPN types, and a huge range of technologies for implementing VPNs are available today. This makes us easy to decide the most appropriate VPN solution for our need. The most common way to interconnect sites has been to use ATM or Frame Relay (FR) leased lines supplied by a service provider. The following parts of this task describe the VPN technologies, cost effective hardware and software solutions and responsibilities and level of services required from the ISP (Internet Service Provider). VPN Technologies As I mentioned above, VPN is a complex subject in networking. Therefore different sort of VPN technologies are introduced for different purposes. These technologies provide secure and cost effective solutions for telecommuters, home based workers, road warriors, remote sales people, mobile executives and also for global business. Within this task I expect to provide a short description about the current VPN technologies that are widely used today. I divide these technologies into two major parts such as Hardware Technologies and Software Technologies. According to my perception, I believe that the VPN protocols that are used to establish a VPN connection should also be a part of the software technologies. Because these protocols are created by using specialized algorithms and programming languages. Therefore I consider those protocols as Software Technologies within this task. Software Technologies PPP (Point-to-Point Protocol) PPTP (Point-to-Point Tunneling Protocol) and L2TP (Layer 2 Tunneling Protocol) protocol technologies are heavily based on this PPP (Point-to-Point protocol) technology. PPP was designed to send data across dial-up or dedicated connections. PPP technology is used to encapsulate IP packets within PPP frames and then transmits the encapsulated packets across a point-to-point link. PPP was specially designed to use between dial-up clients and NASs (Network Attached Storage). PPTP (Point-to-Point Tunneling Protocol) PPTP is one of VPNs first protocols built on PPP (Point-to-Point Protocol) to provide remote access for VPN solutions. PPTP technology encapsulates PPP frames in IP datagrams using GRE or Generic Routing Protocol. PPTP uses authentication techniques within PPP. PPTP can be used for remote access and router-to-router VPN connections. The Point-to-Point Tunneling Protocol (PPTP) uses TCP (Transmission Control Protocol) connection for tunnel management and GRE for encapsulation. L2F (Layer Two Forwarding Protocol) L2F was designed to transmit data from corporate sites to their users by using tunnels. This protocol or VPN technology was first implemented in CISCO products. L2F doesnt depend on IP and its the only way that it differs from PPTP. This protocol accepts other authentication mechanisms and allows tunnels to support more than one connection. L2F uses PPP for authenticate the remote user and its done twice at the ISP and then the second at the gateway to the connecting LAN. This is a Layer-2 protocol and handles IPX and NetBEUI as well. L2TP (Layer Two Tunneling Protocol) L2TP is a combination of L2F and PPTP and it exists in the second layer of the OSI reference model. That is why it named as Layer 2 Tunneling Protocol. L2TP is defied for packet media, Frame relay, ATM and X.25. It has its own tunneling protocol and uses PPPs PAP and other advanced mechanisms for authentication. Its encryption method is based on IPSec (Internet Protocol Security). IPSec (Internet Protocol Security) IPSec is a solution for VPN security and it exists in the third layer of the OSI reference model. IPSec uses number of encryption technologies to provide confidentiality and integrity of data. IPSec allows senders to authenticate and encrypt each packet. There are two modes of IPSec such as Transport mode and Tunnel mode. These two modes depend on the situation of security and traffic. Transport mode authenticates and encrypts the transport segment of an IP packet, and tunnel mode authenticates and encrypts the whole IP packet. VPN Client Software VPN Client software provides protected access to corporate resources via wireless, broadband, and dial-up connections with robust encryption and broad support across multiple connection types. Most of the modern VPN software simplifies the configurations of security policies and management of certificates through its graphical user interface. Microsoft, Netgear, Stone Gate and CISCO are some popular manufactures for VPN client software (But each of these manufactures use different sort of technologies to implement these VPN client software). Hardware Technologies VPN Router In network communication, data are transferred in the form of packets. Usually a router is a hardware device or a computer that looks at the IP packets and decides how to forward it. Routers operate at the network layer of the OSI reference model and that is used to connect networks or connect the networks to the internet. When a packet is received from the NIC (Network Interface Card) card, the router reads the IP address on the packet and forwards it to the appropriate network interface. The packet forwarding depends on the IP address and routing information that contains in the packet header. Even if the network architecture differs, the router has the capability to connect them. Though it can connect different network architectures, I cannot transform data from one data format to another (TCP/IP to IPX/SPX). Software for VPN router functions or normal router functions can be added to a server or a specialized computer that is optimized for communication. VPN Concentrator VPN Concentrator is a device that is used to combine several communications channels into one. And also it is further used to tie multiple terminals together into one line. Although a device called Multiplexor carries out the same function as VPN concentrator, the total bandwidth of the concentrators inputs is not equals to its outputs. The concentrator has the ability to store data temporary but the multiplexor does not have this ability. An Ethernet hub, which is a multiport repeater, is sometimes called as a concentrator. VPN Gateway Although a VPN Gateway can be implemented as both Hardware and Software, I consider this as a hardware technology because for the ease of categorization. VPN Gateway is a device (can be a Hardware/Software) that is used to convert packets from one network protocol to another. Gateway acts as an entry and exit point of data where some kind of processing is done on the information that passes through it. Sometimes the VPN Gateway also called as a router or Layer 3 Switch. Gateway is a device that is used to join two networks together. It can be implemented completely in hardware, completely in software or as a combination of both. VPN Firewalls Firewall can be implemented as both hardware and software or as a combination of both. But I included VPN Firewalls in the VPN Hardware category because for the ease of categorization. Network security is a major need of an organization. Firewall is one such solution that allows the computer to prevent unauthorized access of any application on the computer. Firewalls monitor traffic in the computer or the network. This monitoring can be done by the software in the computer or router. When using a VPN in an organization, the organization has a great requirement of using a firewall solution. Because of there may have a possibility of unauthorized access to the organizations confidential information. By using VPN firewall technology we can reduce the outside threats. Even though the above technologies directly look like just software and hardware, they all have a complex technology encapsulated within them. The above VPN technologies are widely used within the modern VPNs. Description of Banks VPN Due to the requirements of the bank I designed a VPN that provides cost effective networking solutions. The bank needs their agents and branches to connect to the banks network secure through VPN. Therefore I designed a network that provides the above facilities. When designing the banks network I assumed that the particular bank is the head office and the agent is another organization. Although the bank may have many agents and branches, Ive mentioned only one agent and a one branch within this network overview. Banks head office is the place where many of the confidential information about the transactions are stored. Therefore its network should be more secure than any other else. According to my VPN design I connected the banks network to the internet through an ISP (Internet Service Provider) in order to get the VPN access. The bank connects with the ISP directly using a VPN Router (this router is highly configured and cannot be accessed by the unauthorized VPN clients). Then I added a DMZ (Demilitarized Zone) in order to secure the LAN network from the unauthorized access. If the File server was implemented within the DMZ, it may vulnerable to the threats and there may have a possibility of information thefts. Therefore I implemented the File Server far away from the DMZ and its secured with two highly configured firewalls. Though someone can get into the DMZ in order to access the Web Server, he/she cannot penetrate the other firewall without proper authenticate information. All the co mputers within the Banks network can access the WEB server and File server according to their assigned privileges. Other agents and branches have rights to access the banks network (using Router to Router connection). Even though the VPN Routers and Firewalls (Hardware) are much expensive, they provide a great security to the Bank network. In order to reduce the software cost I recommend free and open source software for both servers and clients such as Linux, Open Office and etc. Hardware and Software required to implement the banks VPN According to my VPN design I need several kinds of software and hardware to implement the network. Therefore Ive chosen some products to which supports for VPN. Some products are little bit expensive but provide high security and reliable service to the banks network. When choosing the software to the network implementation, Ive chosen some widely needed software. Hardware VPN Router SMC Barricade VPN BR21VPN Router SMCBR21VPN The Barricade router which has built-in VPN support is an ideal networking solution for VPN. This router consists of load balancing WAN ports, DMZ (Demilitarized Zone) port and a 10/100 LAN port. It has a built in firewall to protect the network from the edge. This router supports protocols such as TCP/IP, VPN connections with PPTP and IPSec. The in-built firewall provides a great protection against DOS attacks (Denial of Service attacks) and also it provides flexible Access Control. This router has the ability to access remote corporate network securely through an authenticated and encrypted tunnel over the internet. Switch NetGear Pro-Safe switch is suitable for high-speed network on a small scale. This switch consists of five auto-speed-sensing 10/100/1000 Mbps UTP ports. And also this it has the capability to handle huge workloads (this feature is more useful because of the Web Server is connected to this switch within my VPN design). This switch can move large files across the network instantly and let devices to connect to the network painlessly. The metal chassis protects the interior working parts from physical damages. Hub Cisco FastHub 424 Ethernet Hub (WS-C424M) The CISCO FastHub 424 10/100 of high-performance Fast Ethernet repeaters deliver unmatched flexibility and low-cost managed connectivity to the desktop. The FastHub 424 10/100 provides ultra low-cost 10/100 autosensing desktop connectivity where dedicated bandwidth is not required. The FastHub 424 will be deployed as a high-performance solution for providing 10/100 Fast Ethernet connectivity to the desktop. This hub provides dedicated connections over extended distance (up to 2Kms) to upstream switches or routers. Firewall NetGear ProSafe FVS338 Firewall supports for 50 VPN Tunnels for Encrypted Remote Access. This VPN firewall with 8 Port 10/100 switch and Dial Back-up is an SNMP-Manageable, High Performance network solution that furnishes multidimensional security. Broadband capable VPN firewall comes with connection ins

Friday, January 17, 2020

Goodbye To All That Essay

In the autobiography, Robert Graves stated how his life has been influenced by the two sides of his family. He had a very strong drive to succeed and possessed great intelligence, which basing on his statement, were his father’s greatest influence in him. Good thing that Robert Graves have decided to write a novel of his account in France, because if he did not, there will be no compilation of stories that war-related story readers will be spending time with. On Arrival In France This chapter is a detailed anecdote about the intensity felt by the public during the First World War. He provided a clear depiction of what took place during the war, and gave a narrative visualization of the images prevalent in a war zone and the feelings that haunted the people – including the threats of explosions and the fear of death which were rampant during the period. As a poet, he worked hard to enable himself in providing a clear depiction of the war stories, however, his capacity is only limited to what he had seen and experienced. Being a journalist is an entirely different profession from a poet, however, Grave proved the mutual intention and passion of both profession. In this light, I would make a comparative analysis between the works of Robert Graves and Joseph Lee Galloway, an American newspaper columnist, who was the only civilian present in the Vietnam War. Both of the two writers had proven their courage as civilians living amidst the war. The life of Galloway, as depicted in the movie â€Å"We Were Soldiers† was a clear narration of the entire war scene, the feelings that were involved as he experienced violence in the middle of the war. On the other hand, Graves’ autobiography successfully touched his readers’ minds in his poetic way of stressing out the value of life, especially when under grave threats against life during the war era. His courage was most tested at times when he had to stick to his decision that he ought to pursue his passion and continue fulfilling his profession even if it meant risking his own life in the middle of the war. Though he wasn’t literally fighting, he acted as a soldier in such a way that he was fighting for his life just to enable himself in providing the people with the most dangerous pieces of information and valuable lessons that were taught during war experiences. Also in this chapter, he showed a distinct psychological capability of a poet in carefully observing the natural tendency of the soldiers to act calmly while their insides were rattling at the commencement of the war. He justifiably narrated the real feelings of the soldiers as they faced the dangers implicated during the war. â€Å"They never sang out of tune†¦ † was an emotional attack to a reader’s heart (Graves, Robert, Goodbye to All That). After Grave said that the soldiers were a bit frightened or nervous at the moment, they never sang out of tune. He asserted the justifiable manner at which the soldiers’ courage were supposed to be appreciated. He magnified the idea that though these soldiers were indeed afraid and trembling at the threat of dying, and the hollow future of their families at the pain of losing, still these soldiers didn’t back off at the brink of danger. Instead, they continued fighting notwithstanding the fears, pain and danger that were accustomed to their jobs. Guns in the Distance The battlefield was a mere case of â€Å"survival of the fittest†. All around, soldiers were ready for the battle and all of them kept hold of their only partners during the war – guns, ammunitions, bombs, grenades and other destructive weapons that were used by both sides. As the mere sound of explosions caused the soldiers to feel the danger and seek for refuge, they had learned all the tactics to preserve their lives. Consequently though, they were able to transform the fear into something that was fun, and something that calmed them down rather than causing even more threats and disturbance in them. The Trench Danger was everywhere and the trench was their only refuge. It served as their only shelter against all the atrocities and dangers from the enemies. However, the tranquility they felt in the place wasn’t enough to keep them from all the dangers of the war. Death was a presence though least welcomed, most prevalent in the war zone. And neither the shelter provided by trenches was enough to secure the soldiers from dying. The trench gives a soldier a chance to live longer, but he must suffer the consequences of being with it. He has to be strong enough to soak his feet to the wet and slippery trench. He has to be careful of the holes right and left, to the low and high wires of the field telephones and to the deep areas in the trench. He must be alert, cautious and apprehensive of all the bullets coming from anywhere, because bullets does not choose who to kill. It does not know who it wants to land on, to whose body or head or face. It just blows inside you and stops you from thinking, and feeling, and breathing. Moreover, the life in trench though provided a home for the soldier, was the least safe and comfortable amongst all the places disrupted by war. It would not keep them away from bullets, shells and other explosives that endangers human life. And though there were discomforts within the trench that had seemed to devoid the place of its tranquility, the trench was a place to hide – even though it danger itself is inculcated within its borders. Battalion Headquarters There lies a great difference between the battalion headquarters and the trench. Wherein trench did not provide them enough protection and shelter from bullets and explosions, coupled with the discomfort within the area; the battalion headquarter was a comfortable place wherein the menace of the war was less visible and felt. However, ordinary soldiers did not experience comfort and luxuries that the place could offer. Rather, high ranking military officials were the ones who enjoyed the luxury of such place. It was a clear irony. The soldiers who were fighting face to face against death lived with fear, exhaustion and restlessness. They lived through the war with a miserable condition – poor shelter, less time to feed themselves, and even lesser time to allow their bodies and minds to rest. And the foods they eat were not nicely cooked. Soldiers lived with all the discomfort, difficulties, inconvenience and troubles. While on the other hand, those high ranked military officials who are not facing the dangers of the open war enjoyed all the luxury and favors that they could avail of. They are not suffering the fear of dying because they were sheltered safe from all the atrocities of the war. The irony lies in the mere fact that those who are risking their lives and facing bullets and bombs most of the lives suffered from discomfort and danger; while there were those military officials who did not fight amidst the battle were the ones enjoying the favors that life could offer them. There is also an acquainted thought about how soldiers in the battle and the soldiers out in the battle behaves in front of the officers. When Graves narrated the time when they have passed through the group of men in the battalion headquarters, he is sure that the group were aware that they were officials, but they did not make any recognition. In the trenches, soldiers know how to honor them. They even call Graves â€Å"Sir†, and gives recognition to the officers. They are well-disciplined, and yet, they are those in the danger zone. Did the war zone discipline them? If it did, then maybe it is better to put this group of soldiers in the battle field to cultivate a disciplined attitude. How was that? The Only Survivors Only the survivors of the battle were the ones who gained honors and established good reputations for themselves because they had the capability of passing their stories onto other people. They were able to narrate how they have lived their lives during the onset of the war. However, people had forgotten those who heroically died during the battle. Commemoration of the soldiers who died in the battlefield had been less probable because during this time, only those who survived became the center of attention amongst the civilians. And the tasks of remembering the courageous acts of those who did not survive were only left amongst the families of the non survivors. The heroism of these people had become a mere representation of a distinct part of the history, rather than heroism remembered and commemorated. Then how to survive in the battle anyway? When in the trenches, it is cold, no good foods, no rest, no peace of mind†¦ how are they about to survive in that kind of living? Does the survival of the fittest also mean surviving from cold, bacterias and viruses? We all know soldiers do not mind how far they could be dirty or gross, because all they have in mind is to stop the enemy from fighting and to battle against them. It is not part of their mission to have a sensitive stomach when they joined the military. If they need to eat the soil, they will, in order to survive in the battle. Half of the soldiers were lost because of coldness. They suffer severe rheumatism, or being frost-bitten. But those sufferings will not be acknowledged when they died. Only those who survived will get the great reputations. Only the fittest has the right to be accustomed. Those who died will just be part of the history. How sad†¦ Our Timetable Two hours? Is that a sleep or just a nap?. In this chapter, Graves illustrated the dedication those soldiers had for the sake of their duties. Their lives at the middle of the battlefield was spent with rifles, grenades, bullets, bombs and other ammunitions; with little time left for eating, sleep and rest. They have to work all day and night, with only two hours of sleep. Yes, they still have two hours to rest their minds and bodies, but do we think they could really rest in that situation? No, because they should be always alert in anything to happen because their lives are always at the risk and danger. In addition, the scarce time left for them to rest was spent in more desolation and increased vigilance that rendered them the incapability of spending that scarce amount of time for the rest needed by their body. Thus, rest became an abstract concept for them. For resting shall render them complacency that might induce more danger for their lives and the cause that they were fighting for. They could not rest for once, for there is a tendency that they will never wake forever. A Soldier’s Death This chapter was highlighted by Graves’ anecdotes on the deaths of particular soldiers. The deaths by these soldiers were far worse than the deaths in the middle of the war. These deaths were more tragic. Soldiers decided to end their agony by suicide. The whole depiction of the battle was more engrossed in the mere fact that most of the soldiers faltered and lost their hopes. And it was more awful that these incidents were not properly documented and reported. Military officials didn’t have much of the courage to honestly admit that the emotional burdens caused by the war was far worse than the physical exhaustion that it imposed amongst the soldiers. Thus they made false accounts and fake letters and reports that were given to the families of the soldiers who committed suicide. How many soldiers have those kinds of stories? We do not know. We can not guess. Kill the Lice The life of the lice is like the life of the soldiers. Just as invaluable and ambiguous. Which was better to kill, the young ones or the old ones? Just like them, soldiers were killing soldiers of the enemy. But they did not care who they had killed, young or old. What only matters was that they were able to defend their cause. Killing has been their lives. Humans are like lice, living in the world, from birth to death. It matters not who shall die first, the same way that a longer life was only out of sheer luck. For normal people who does not understand the lifestyle of the soldiers, life is not compared with lice’s life. Being a human is far different from being lice. But for a soldier who lives like lice, there is a great similarity. Seems like there is nothing different between them. Live today, die tomorrow†¦ with any cause, nice or worst. In the life of a soldier, their life is ambiguous. Just like lice’s†¦ Gas, Sir, Gas! It was such a sudden false alarm. For the lower ranked soldiers, every sign of enemy’s attack meant danger, and they were supposed to do something about it. But on the part of the high-profiled officers, everything was just common scenario. The gas alarm was not a thing to apprehend the officers, because they knew how to analyze the situation. Their knowledge and experiences in every battle taught them how to react on such situations. For the common soldiers, it was panic; but for the officers who could sense the attack, there wasn’t any reason to get alarmed because they were ready for it. Thus, I would say that Robert Graves is a very intelligent writer. His writings really made sense and I do not doubt why he had become a legendary figure in the world of literary. â€Å"Goodbye To All That† was a great success in touching the lives of his readers and generating a dramatic empathy towards anyone’s emotions. He wrote all his war anecdotes because he wanted to forget and let go of all the disturbing experiences of the war. He discovered secrets, experienced many difficulties, he was a witness on many painful suffering and deaths. And as such, he wanted to forget these experiences, but he wanted to share everything that he was has learned through all these experiences.

Thursday, January 9, 2020

The Legacy Of Abraham Lincoln - 1728 Words

According to Martin Luther King Jr., â€Å"Human progress is neither automatic nor inevitable step toward the goal of justice requires sacrifice, suffering, and struggle; the tireless exertions and passionate concern of dedicated individuals†. Slavery was a struggle that America had to overcome in the 1800s in order for America to progress. At the time, slaves were also going through hard times by getting separated from their families and going through excessive hard work on the plantations. Even though it was a struggle for the north, and the slaves, but not for the south since it was a benefit for them. In 1860, Abraham Lincoln was put into the Presidential office and would have a major impact on our nation by affecting slavery forever. One of the major conflicts in America s rise as a nation was slavery. President Abraham Lincoln started to be concerned about the direction of slavery in America, and was determined to abolish it forever. Slavery was a negative and positive c oncept, since it got work done for all the Confederates who owned slaves. For example, slavery helped with labor, but the north disagreed with this, since it was unfair. In Eric Foner’s, â€Å"The Civil War and Slavery: A Response†, he states notes that, â€Å"Actions of slaves decisively shaped the politics of the Confederacy† (93). By having the slaves, â€Å"decisively shaped the politics† shows that Confederates are starting to depend on slaves to do their work for them in the South. For example, slaves are mostlyShow MoreRelatedThe Legacy Of Abraham Lincoln1958 Words   |  8 PagesLeadership and Legacy: Background Research Paper Abraham Lincoln By:Audrey Knight Introduction Great leader and main topic Abraham Lincoln lived in the 1800’s where he accomplished many things in his 54 years of life. He lived in the U.S. through several major events in history and left a legacy that will never be forgotten. As the 16th president of the United States he brought about the emancipation of slavery, preserved the Union during the Civil War, and served the people. His heroic leadershipRead MoreThe Legacy Of Abraham Lincoln933 Words   |  4 PagesSynopsis Regarded as one of the United States of America greatest heroes, Abraham Lincoln is famous for his unique appeal and incredible impact on the nation. He was the United States 16th president. His story is an astounding one rising from a humble background to become the most powerful man the land. However, at the time when his country needed him most, a tragic and sudden death strikes him. He is assassinated. He left a legacy that endured due to his unique humane personality as a leader of the unionRead MoreThe Legacy Of Abraham Lincoln Essay2383 Words   |  10 PagesReport Name Abraham Lincoln paved a path of equality and freedom for slaves and people of the 1800s as well as having a major impact on society and government; Abraham Lincoln s engagement with the public people skyrocketed his career as being a president and a suitable leader to the people of the United States of America. Born on February 12th, 1809 in Hardin County, Kentucky, Abraham Lincoln in his later years would be known as one of the most influential leaders of all time. Abraham Lincoln was bornRead MoreThe Legacy Of Abraham Lincoln1217 Words   |  5 PagesAbraham Lincoln was born in the year 1809 on February 12th in the town of Hardin County, Kentucky to Thomas and Nancy Lincoln. Growing up Lincoln had no proper education, consequently he read books and educated himself. During Lincoln’s young adult years, he worked a various number of jobs as a shopkeeper, surveyor, and a postmaster. In 1832, Lincoln became a captain of the Hawk War against the Native Americans. Shortly after the war was over, he began his political career and was elected to theRead MoreThe Legacy Of Abraham Lincoln1817 Words   |  8 Pagesmore than any of these other men: Abraham Lincoln, the man who freed the slaves. Abraham Lincoln, born February 12, 1809 in Hodgenville, Kentucky, is widely considered to be one of the greatest presidents to have ever been in office. During the course of his presidency, Lincoln not only lead the Union during the Civil War and tried to unify the nation through a harsh time of crisis, conflict, and bloodshed: through his beliefs, his example and his legacy, Lincoln freed the slaves, gave them the rightRead MoreThe Legacy Of Abraham Lincoln Essay2382 Words   |  10 PagesAbraham Lincoln paved a path of equality and freedom for slaves and people of the 1800s as well as having a major impact on society and government; Abraham Lincoln s engagement with the public people skyrocketed his career as being a president and a suitable leader to the people of the United States of America. Born on February 12th, 1809 in Hardin County, Kentucky, Abraham Lincoln in his later years would be known as one of the most influential leaders of all time. Abraham Lincoln was born intoRead MoreThe Legacy Of Abraham Lincoln1826 Words   |  8 Pages Abraham Lincoln’s victory in the 1860 presidential election, was a beacon of hope for many slaves in America. Becoming the 16th president of the United States serving from 1861 to 1865, Abraham Lincoln is one of America’s most celebrated heroes. Holding office during the years of the American Civil War, Lincoln preserved the Union, while creating a new era that consisted of emancipated African American slaves. After winning a victory at the Battle of Antietam on September 17, 1862, he issuedRead MoreLegacy Of Abraham Lincoln s Legacy Essay1582 Words   |  7 PagesLegacy Leader: Abraham Lincoln A legacy leader is someone who has left a positive and lasting impression in society due to his or her leadership qualities and/or traits. Abraham Lincoln is a prime example of a legacy leader due to the leadership traits he displayed throughout his presidency. Abraham Lincoln was the 16th President of the United States. He exhibited great leadership qualities such as integrity, duty, and selfless service. Abraham Lincoln’s Emancipation Proclamation and hisRead MoreThe Legacy Of Abraham Lincoln1500 Words   |  6 PagesAbraham Lincoln has been studied more than any other in American history. In fact, over 15,000 different books have been written about our 16th president. Throughout the pages of these books, President Lincoln is affectionately referred to by many different names, such as the Railsplitter, Honest Abe, and the Great Emancipator. A vast majority of these written works honor Lincoln as one of our greatest presidents. Not everyone feels that way, however. Charles Adams, in his book, When in the CourseRead MoreThe Legacy Of Abraham Lincoln1292 Words   |  6 PagesAbraham Lincoln has been called the greatest president in all of American history. His principles were dedicated to the survival of the United States during one of the most gruesome and bloody wars in the country s history, the American Civil War. During his presidency, he fought for the emancipation of slaves because he believed the institution of slavery was morally unjust. His ideals, which appealed to the founding principles of the country, energized and mobilized the union and kept it alive

Wednesday, January 1, 2020

Sports Journalism Essay - 1872 Words

Sports Journalism nbsp;nbsp;nbsp;nbsp;nbsp;For my career research paper I have chosen to delve into the world of the sportswriter, and take a closer look at what that occupation may hold for myself. I have chosen to research this form of journalism because I consider myself to be a sports fanatic, and would very much enjoy spending the rest of my working days writing about the conditions in the world of sports. During the last year or so I have taken a period of time everyday to relax and read over sports articles from baseball and football at some of my favorite websites, such as espn.com or nesn.com, or to sit down and watch Sports Center on ESPN. I also seem to have an ability to remember statistics and rosters of players and†¦show more content†¦Writers are found in their office in the morning, and they have afternoons off unless there is a game or interview that they are supposed to cover. Nights are spent covering an event or interview and then writing the article for it afterwards that night (Heitzman 44). Sports journalism can be a difficult occupation at times, but it can also be very rewarding. To help cover games better writers get tickets for excellent seats at all events they are assigned to, they meet with sports stars and coaches (if they are not a writer in a small town newspaper), and sometimes you travel abroad to cover events (Heitzman 44). nbsp;nbsp;nbsp;nbsp;nbsp;A sportswriter in a small town newspaper would be one of two employees in the sports section. The other employee is the editor. The small town newspaper sportswriter collects information about local teams and games and writes about them. National stories are often taken from acclaimed papers such as The Associated Press (Heitzman 44). In a larger city’s newspaper, the sports department may have 10 employees. All of these employees have a certain sport that they excel in writing about, such as football, baseball, hockey, basketball, golf, or high school sports (Heitzman 44). nbsp;nbsp;nbsp;nbsp;nbsp;Sportswriters oftentimes will work odd hours. Writers for morning newspapers will work in the afternoon and evening five days a week including Saturday. ThatShow MoreRelatedSports Journalism : Career Goals1669 Words   |  7 PagesCareer in Sports Journalism Sports journalism consists of a few different writing jobs. The tasks at hand faced daily by a writer, qualifications that need to be met, and opportunities with pursuing a career in sports journalism. I am focusing more on the job of a sports writer. A career in sports journalism would be a good career for me because sports are intriguing to me, I view this career as an achievable career, and the job fits my lifestyle. Per Shelly Field, sports writers can work for localRead MoreSports Journalism : Sports And Physical Education956 Words   |  4 Pages Sports journalism does not only include sport and physical education, but also all the public events. These events can have an economic, political, cultural character and thus have a certain sporting value, to generate interest among the audience of sports media. Often enough it is difficult to differentiate which would be the best to carry a number of phenomena that are directly related to the sport, but at the heart of its existing principles other adjacent spheres of social life. As an eloquentRead MoreEssay about Gender and Sara Maratta808 Words   |  4 Pagesdiscusses a controversial issue of women are becoming more accepted into the sports world, not only as fans and players but also as voices in sports journalism. However, men still dominate on all levels. Why? Some argue because of stereotype. From this perspective, who really cares why women are not receiving the same equality as men? Are women being used as sex symbols, are they really being accepted in the sports world o r is the sports world just creating balance. According to Sara Maratta, there areRead MoreThe Hockey World Is An Integral Field Of Sports Journalism1062 Words   |  5 PagesThe hockey world is, and, remains an integral field of sports journalism. This essay will focus on the complexity of the National Hockey League, or the NHL, for short, is both a league and a corporate enterprise. This piece will examine the enduring practice of traditional journalistic representations of hockey and demonstrate the obstacles many journalists face when writing a comprehensive article. The task becomes difficult especially when candidates wholly adhere to a type of hockey lingo-rhetoricRead More The Lack of Womens Sports Coverage Essay example1826 Words   |  8 PagesThe Lack of Womens Sports Coverage   Ã‚  Ã‚  Ã‚   Can womens sports establish itself as a topic of on-going media and journalism curiosity?   Currently TV stations do minimal coverage of womens sports, while newspapers and magazines do just a little bit better.   In a recent interview with Gary Webb, a sports writer for The Spectrum, he says that the people have demonstrated that there is an audience that loves hearing about women athletes.   After all, they are somebodys kids, sisters, and momsRead MoreWomen in a Man’s World: Why it’s Hard for Women to Get Ahead in Sportscasting1257 Words   |  6 Pages When they tallied up how many women were staffed at both television and print journalism organizations who were hired as sports journalist, the number falls drastically to a mere 14.6% (Women’s Media Center). These numbers are troubling, because although they are most likely more than there were 20 years ago, the percentage is lower than 15%. And even so if it is growing, instead of counting women sports journalist by craft, they are measured in the â€Å"sexiness,† or â€Å"hotness,† which IRead MoreThe Coexistence of the Media and the Government Essay examples702 Words   |  3 Pagesmagazines, films, television, radio, and books. With every aspect of our media culture now fair game for commercial exploitation, we can look forward to the full-scale commercialization of sports, arts, and education, the disappearance of notions of public service from public discourse, and the degeneration of journalism, political coverage, and childrens programming under commercial pressure. This concentration of media power and attendant commercialization of public discourse are a disaster. An informedRead MoreThe Top Ten Most Twitter1474 Words   |  6 Pagesexposed to the media than their followers and are part of the intermediate layer. Around half of the information originating from the media passes to the masses indirectly through the opinion leaders (Wu, Mason, Hofman, Watts, 2011). Automated journalism is an important way technology will change reporting. Algorithms have been able to automatically produce news from structured data. Currently, algorithms can generate news for earthquake alerts, company earnings reports, and crime reporting. TheRead MoreJournalism : An Objective And Ethical Way1218 Words   |  5 PagesJournalism is defined as the activity of gathering, assessing, creating, and presenting news and information. (American Press Institute) It is the process of finding out what is going to be important to the general public and presenting that information in an unbiased and ethical way. The number of journalists in 2014 was 54, 400. Journalism could be described as the office job for people who don’t want to work in an office. Reporters are in constant motion and they report on a variety of topicsRead MoreThe Informational Model Of Journalism Essay1679 Words   |  7 Pages1. What are the drawbacks of the informational model of journalism? First, we may be producing too much information. With developments in media technology, we have created an â€Å"information glut† that makes news and information â€Å"a form of garbage.† Scientists, technicians, managers, and journalists pile up so much information that adds to problems and anxieties of everyday life. There is too much unchecked data and not enough thoughtful discussion. In addition, the amount of data that comes from media