Sunday, May 17, 2020

Analysis Of The Book Wild Swans By Jung Chang Essay

Family loyalty in China has had a tumultuous past filled with fluctuation between remaining loyal to the state, yet also remaining loyal to blood relatives. In the autobiography that also serves as a biography, Wild Swans, by Jung Chang, this is seen. The book, which outlines the biographies of the author’s grandmother and mother, as well as her own autobiography, gives an interesting look into the lives of the Chinese throughout the 20th century. This book is beyond eye opening, and is truly a raw glimpse into the daily lives of women throughout China, struggling with situations that no human should ever be thrown into. I loved this book and was truly scared about the world that it opened me up to. The book does many things well, but also has its faults. The author consistently and clearly exemplifies the social hierarchy that consumes China, as well as its obsession with cultural stagnancy. The author also gives intense imagery that thrusts the reader into the scene, and creates a new reality showcasing the truths of China. Although both of those things take main stage in the book, there are a few weaknesses in the book. One, asking the question of how she had such clear anecdotes on her grandmother and mother’s life, how did she have such intimate details? The second shortcoming that Jung Chang had a subjective view of China, partly being that she loves China despite the cards it has dealt her. Her life was not short of hardships, but her family was typicallyShow MoreRelatedWild Swans : Three Daughters Of China1153 Words   |  5 PagesWild Swans: Three Daughters of China by Jung Chang provides a thoughtful and beautifully painful chronology of three generations of women through some of China’s harshest periods in history. This book review will proceed in two parts. The first will address the significant themes present in Chang’s novel. The second will go beyond literary analysis and delve into identifying the authorâ €™s own bias, and comment on the structure and perspective of Chang herself. This review will overview the themesRead MoreWild Swans By Jung Chang2008 Words   |  9 PagesJung Chang’s Wild Swans combines a first person narrative and real historical events to create a story that is both compelling and informative. Though the author tells different tales in the three parts of the book, the themes of violence, oppression, and abuse of power remain static throughout. In retelling stories from three generations, Chang depicts the hardships faced by citizens of opposite genders and different ages in twentieth-century Communist China. Through the author’s vivid details,

Wednesday, May 6, 2020

Women During The Ancient World - 1445 Words

In the ancient world, women were generally discriminated and deemed inferior to men. As a result, women in various civilizations were expected to uphold sexist stereotypes, which limited their freedoms and abilities. Two such civilizations were Ancient Rome and Early Modern England. England during the 15th and 16th centuries supported the Anglican faith. Women, by divine belief, were created as subordinates to men; the rationale for this constitutes the creation of Eve from Adam’s rib, suggesting that women were made for man. Sexist bias was also supported in Rome (753 B.C. to 1453 A.D.) where the traditional ambitions of all women were to wed unknowingly, birth abundantly, and serve their husbands unfailingly. These notions†¦show more content†¦The legal rights of married women were similar in Early Modern England and Ancient Rome. In Early Modern England weddings were often arranged to benefit both families in terms of power and wealth.1 As a result, women seldom had a choice in whom they married. However, this was not the case in royalty where marriage was more complicated. An unwedded queen produced no legitimate heirs while the husband of a wedded queen would challenge the power she had. This was because marriage granted the husband ownership of his wife and her rights, yet a queen born from the English crown was to be the authoritative figure. Queen Elizabeth resolved this by not marrying at all, and power was inevitably passed to King James VI of Scotland postmortem.2 In the case of the common peoples, a married woman wasn’t able to make legal contracts, keep her wages, sue, or inherit her husband’s belongings in case of death. A woman was granted the right of separating from her husband under mensa et thoro, which allowed them to live apart but they were still legally married and therefore couldn’t remarry. The husband was given the children.3 As a result, marriage gave the husband the ultimate authority in all affairs relating to his wife. The limited freedoms married women had could’ve even worked against them as the queen risked her authority and her married, female subjects risked

Cloud Computing Online Spatial Delivery System

Question: Describe about the "Online Spatial Delivery System". Answer: Introduction Online Spatial Delivery System (OSDS) has to be migrated to a cloud provider through PaaS model. PaaS provides the platform and environment to build the applications upon the same ("What is PaaS?", 2016). Each and every entity plays a crucial role and a phased approach needs to be followed for achieving the best results out of them. The six components that would have a significant involvement are discussed further. Remote Administration Remote Administration perform the administration tasks and activities to be done from a location that is remote (cbigconsulting.com, 2016). The use of Remote Administration is however, discouraged owing to the shortcomings that it comes with. There are multiple tools that do not scale properly. It becomes tedious for the administrators to simultaneously work upon the network with varied speeds and that too in a secure manner. Multi-platform support is another issue that is seen with the implementation of Remote Administration in the architecture. Organizations make use of different operating systems such as Linux, Windows, iOS and many other and all of them need to be supported in an efficient manner. Mobile devices are also being used by most of the organizations and the OS of those devices need support too. Use of varied tools and devices with different platforms and operating systems is difficult to manage by the remote administrator. Regulatory requirements such as encryption, authentication and access controls also appear as an issue in the implementation of remote administration (sans.org, 2016). Resource Management Resource Management is the next in the list for successful implementation and migration of the services and applications on the cloud. There are multiple resources across various departments that are associated with OSDS. The key resources are as listed below. Business owners Database admin and team Operations head and team Development team Design team Network team Network admin Support and maintenance team DSI needs to develop strategies to efficiently mannage resources and other departments. The basic step in achieveing the same is to find answers to the following list of questions. Is there an already implemented resource tagging strategy in place? What is the internal resource management team that is associated with DSI and how does it link to the overall company model? What is the process that is used in the allocation of resources to a particular project or department? Is the metadata that is available with the company sufficient or further additions are required? (s3.amazonaws.com, 2016) There are a number of advantages for this component as: There is an automated and centralized repository where all the information and the resources and their management is contained ("Project Resource Management Benefits | Innotas", 2016) There is a transparency that is formed between the employee and the employer It becomes easier to manage the change along with the time sheets (Singh, 2013) A bridge is formed connecting the employees and the employer with the goals that have been set ("Human Resource Management (HRM) - duties, benefits", 2016). There is an improved resource utilization that leads to increased productivity and efficiency. SLA Management Service Level Agreement (SLA) Management is a contract that is signed between the service user and the service provider. In case of OSDS, the service user is DSI and the service provider is the cloud provider. Levels of SLA in SLA Management OSDS has its base as cloud computing. Shared access is the prime feature of the technology (Bose et al., 2011). The following factors play a crucial role in OSDS: The services that have been confirmed and have attained go-ahead between OSDS and the cloud provider The team that deals with supply chains and its management The assigned roles and designated responsibilities of each and every team member The role of internal partners in every service Every minute detail around the service such as description and cost High level flow chart depicting the major and critical factors Performance indicators (mitsm.de, 2016) Application Resilience Every application and service has a set of requirements and specification that have a higher priority and are critical for the same. There are High Availability (HA) requirements that are present in OSDS and it is necessary to fulfill these without any failures. It is suggested that a planned business strategy covering the below mentioned points should be set up for attaining best results: An application that is fault tolerant in nature which means that availability and reliability are maintained at all times Use of best practices and techniques Supreme measures for data storage Cloud architecture Data Storage and Backup Big Data tools and databases such as NoSQL can be used for efficienct storage and backup of the information associated with OSDS. NoSQL is the database that performs the Big Data Analytics with extreme ease. It provides rich visualization for creation of reports and documents that support the analytics results. It allows the flexible mode of exploration that is on the basis of various parameters such as time, geographical locations, revenues, quantities and many more. Predictive analysis with powerful and advanced algorithms such as classification, regression and exploration is also possible with the help of NoSQL (Pentaho, 2016). NoSQL consists of thousands of APIs as well. (Goes, J. 2016). Here are some of the examples of NoSQL databases: MongoDB It is an open source agile database that offers scalability, supreme performance and high availability. Elasticsearch It is the database that provides the much in demand RESTful web interface on a multitenant-capable full-text search engine. CouchDB It is a document storage database that is used to query the indexes through web browsers with the use of HTTP. MarkLogicServer It is an enterprise level database that provides a unified solution to all the analytics requirements. Terrastore It is an advanced database that promises consistency along with the scalability and supreme performance in the document and data storage and indexing (Big Data Made Simple - One source. Many perspectives., 2014). Disaster Recovery There are a number of risks that are associated with the cloud services and the measures need to be adapted such that the impact of harm in occurrence of such an event is minimum and the services are brough back to normal in a quick turnaround time. These are the measures that should be adopted to avoid the risks at the first place and recover from the same. Preventative These are the primary points of security that must be present in any organization and its architecture such as use of anti-virus, set up of firewalls and physical security measures such as guards at entry points and use if an identity check. Reactive These come in the picture when the event has already taken place. Detective Measures such as intrusion detection and motion detection fall in this category of countermeasures Administrative There are always a defined policy or a set of guidelines that is associated in the business strategy. These measures make sure that all the processes adhere to the same. Disaster Recovery (DR) in cloud computing is the method to have proper backup and recovery strategy in place which focuses upon management of data on the cloud. DR would allow the recovery process to be enabled in multiple locations (Kiblin, 2011). There are a number of strategies that have been developed in order to have a correct DR procedure (aws.amazon.com, 2016). Cloud for disaster recovery is a viable option for DSI both from the financial perspective and from the control perspective as well (Dix, 2016). Conclusions Opportunities and Risks OSDS is a collection of web services and application that is based on the PaaS model of cloud computing. In order to migrate OSDS to a cloud provider, there are six components that play a crucial role in deciding the success of the migration process. The first in the list is remote administration that does suffer from certain shortcoming such as inadequate multi-platform support. Resource management and SLA management are also significant to manage the asserts and agreement at the service level. Application resilience revolves around the High Availability (HA) requirements and there are also measures to correctly store and recover the data in case of a disaster. Cloud suffers from certain potential and probable risks as well that mainly revolve around data protection and information security. These risks include loss of data, accessing of the data by an unauthorized user, denial of services, attack of malicious software, spoofing, phishing and inadequate due diligence. Such risks possess a threat to the confidentiality, integrity and authneticty of the information, Use of authorizations measures along with proper access controls are mandatory to protect the data belonging to OSDS. The data associated is private and confidential in nature and the landing of the same in unauthorized hands could be extremely adverse for DSI. ("Risks of cloud computing | Queensland Government", 2016). References Bose, S., Pasala, A., Ramanujam A, D., Murthy, S. and Malaiyandisamy, G. (2011). SLA Management in Cloud Computing: A Service Provider's Perspective. Cloud Computing, pp.413-436. A deep dive into NoSQL: A complete list of NoSQL databases. (2014). Big Data Made Simple - One source. Many perspectives.. Human Resource Management (HRM) - duties, benefits. (2016). Referenceforbusiness.com. Retrieved 21 May 2016 Kiblin, T. (2011). How To Use Cloud Computing For Disaster Recovery. CRN. Retrieved 21 May 2016 mitsm.de,. (2016). Mitsm.de. Retrieved 21 May 2016 Pentaho and NoSQL Databases. (2016). Pentaho. Retrieved 21 May 2016.