Monday, May 18, 2020

Analysis Of The Movie The Fog Of War - 1472 Words

In the Fog of War, Former Secretary of Defense Robert S. McNamara recounted his experiences when serving for both the Kennedy and Johnson administrations. Throughout the film he shared eleven lessons that he learned as a result of the war and politics. The lessons range from empathizing with one s enemy to the fact we cannot change human nature. This essay will discuss some of McNamara’s lessons and how they illustrated institutions, bargaining, cooperation, power and sovereignty. The film started with McNamara’s first lesson which was to empathize with your enemy. He recounted the events leading up the 1962 Cuban Missile Crisis, also known as the Bay of Pigs. This was a 13-day standoff between the United States and the Soviet Union due the installation of nuclear weapons in Cuba. The Soviet Union had installed the weapons of mass destruction in Cuba as a response to the United States’ decision to install nuclear weapons in Turkey. This was an example of the Security Dilemma discussed in lecture, â€Å"The Source of one’s comfort is the source of another’s worry† (Unit 4). When President Kennedy found out that there could possibly be nuclear weapons in Cuba, he did not want to take a chance and wanted the missiles to be removed from the island. Kennedy received two different types of messages from the Soviet Union. One was a soft message stating that they would remove the missiles if the US did not invade. The other was a ha rd message stating that if the US were to invade,Show MoreRelatedEssay on Fog of War Film Analysis931 Words   |  4 PagesThe Fog of War Analysis Nearly 160 million people were killed during the 20th century, and film maker Errol Morris wished to show the reason for this in documentary form. He interviewed former US secretary of Defense Arnold McNamara and the two discussed and analyzed some defining moments in US history, thus The Fog of War was made. The movie was set up in 11 lessons. However, I only found three to be completely reasonable. The first lesson that is highlighted in Morris film is thatRead MoreThe Love Song of J. Alfred Prufrock Essay1524 Words   |  7 Pagesï » ¿Question: Part A: Analyze the social and historical context of a particular poem Poem: T. S. Eliot, ‘The Love Song of J. Alfred Prufrock The context of any given text whether poetry, novels or a movie is always integral to its understanding. Social and historical context of not only the given text, but the writer’s context and reader’s context play an important role in the interpretation and understanding of the major ideas, issues, values and beliefs within the text. T.S (Thomas Stearns) EliotRead MoreAdvancing the Individuals Knowledge of the Holocaust Essay2289 Words   |  10 PagesBy comparing, analyzing and questioning the validity of Maus I and II, Night, Night and Fog, nonfictional historical accounts and a poem, called Already Embraced by the Arm of Heavenly Solace, found in Europe in the Contemporary World, Schindler’s List and the Return to Auschwitz we may determine to what degree these sources serve to advance humanity’s understanding of the holocaust. The holocaust can be explained as the historical event in which the Nazi’s, who came to power in Germany in JanuaryRead MoreIn Search of the Unknown: Apocalypse Now1584 Words   |  6 Pagesjust understand the theme and plot of the story, but also makes readers look back in the 19th century Colonialism and see how the world worked under Imperialism. The movie, Apocalypse Now also correlates with the book, but this time the setting does not take place in the 19th century, but in the 20th century when United States was at war with Vietnam. Because of the two pieces sharing differences and similarities, the audiences are able to get a richer understanding of Conrad’s novella. Marlow tellsRead More Comparing Apocalypse Now and Heart of Darkness Essay1489 Words   |  6 Pageshusband Franciss film, Apocalypse Now, as being loosely based on Joseph Conrads Heart of Darkness. Indeed, loosely is the word; the period, setting, and circumstances of the film are totally different from those of the novella. Yet, a close analysis of character, plot, and theme in each respective work reveals that Conrads classic story of savagery and madness is present in its cinematic reworking. The story of Heart of Darkness is narrated by its central character, the seasoned marinerRead MoreDocumentary Films Have Played an Important Part in Determining the Way We Construct History and Memory. in What Ways Do Documentary Films Dealing with the Holocaust Determine Contemporary Understandings of That Historical Event?2956 Words   |  12 Pagesdocumentary footage of the Holocaust was shot as Allied troops entered the camps of Bergen-Belsen and Dachau, but this footage was archived by British Ministry of Information, wary of the political and social repercussions of such explicit imagery in a war-torn and divided Germany. These censorious tendencies, leading to what is often phrased as a voluntary and collective ‘social amnesia have traditionally followed such culturally cataclysmic events as the Holocaust. As Todorov examines in his seminalRead MoreAnalysis of the Unforgettable Movie No Mans Land Essay3233 Words   |  13 PagesNo Man’s Land is a heartbreaking ant i-war movie which is played in the background of the Bosnian war. The movie is a fable; it was also the first writing by its writer Tanovic. It was co-produced by many companies belonging to different countries like Bosnia-Herzegovina, UK and others. Two injured soldiers, a Bosnian and other the Bosnian Serb, are entrapped with their lines in the attempt for survival. They face each other in the trench where they allow time to pass for darkness to prevail. TheyRead MoreRacism in Pocahontas1552 Words   |  7 Pagesanother point in the story, when John Smith and Pocahontas meet for the first time. John Smith is standing on a rock, and the film places no particular emphasis on any aspect of his body. By contrast, Pocahontas is standing in the midst of swirling fog, and the scene contratres on her dark, and comparatively exotic eyes. The juxtaposition of these two main characters established John Smith as the default, normal character, while Pocahontas is the exotic, new Indian. P ocahontas exoticism is onlyRead MoreEssay Dimensions of Night of the Living Dead1606 Words   |  7 Pagescreated by a team of movie business outsiders from Pittsburgh (IMDb.com). The Image Ten, as they were later known, led by George Romero, created a horror film unlike any that had come before. Although the horror film had been around for nearly as long as the cinema, Night of the Living Dead was revolutionary in its production, its subtext as understood in historical reference, and its lasting effects on the horror genre. The British Film Institute’s Benjamin Hervey provides an analysis of the film as understoodRead MoreThe Content Of The Cult Film They Live2044 Words   |  9 Pagestribulations. However, the film can mean something deeper when fully delving into the content of the work, whether it is cultural, political or ideological in its message. These elements presented give the work depth thus allowing deeper discussions and analysis of a work that may seem simpl e on a surface level. Student filmmakers have always strived to implement these points in their work. With the aim of improving their practice, it is considered a necessity to include these elements in order to fully

Wednesday, May 6, 2020

Getting to Know Christopher Columbus - 911 Words

Christopher Columbus, as we now know he accomplished a lot during his life. Although many are disputed and questions have been raised as to why we celebrate Columbus Day. One could find the when, how and where of Christopher Columbus an interesting subject for discourse. After all, we are talking about the man who discovered the land we now call America. We will not even consider the people, the Native Americans who lived here first as discovering America. Maybe it should be taught just a tad differently and instead say that Columbus discovered American for Europe. In the year 1451, Genoa, Italy, Christopher was born to Domenico and Susanna (Fontanarossa). Christopher was the oldest of five brothers. Genoa was a seaport city located on the northwest coast of Italy. Completing his education at an early age Christopher began sailing on trading trips. As the years passed, Christopher moved to Spain, where he eventually changed his given name Cristoforo Colombo to Cristà ³bal Colà ³ n since He began a map making company with his brother Bartholomew in 1476. By 1479 Christopher had met and wedded Felipa Perestrello Moniz a daughter of a Portuguese Island Governor. Felipa gave him a son Diego in 1480 shortly before she passed away. In 1488 his second son Fernando was born to Beatriz Enriquez de Arana. Now that we are ready to begin our own voyage of discovery about the man himself Christopher Columbus. Northern Africa was controlled by the Turkish Empire in the late 1400’s, whichShow MoreRelatedEssay on Christopher Columbus? Or Not Christopher Columbus?1329 Words   |  6 Pages On Columbus Day students across the nation will learn how Columbus discovered the New World and about his fantastic travels to the New World. Children will learn poems, stories, songs and rhymes about his travels and about himself as well on this day. When introduced to Columbus as a young student he is portrayed as a respectful gentleman and as a hero, when in reality he is a selfish man who takes advantage of lesser people and schools should be teaching their students about who Columbus reallyRead MoreChristopher Colombus1074 Words   |  5 PagesAs the great explorers Christopher Columbus and James Cook were recognized and honored in having great explorations in the world history. They encountered some Natives of countries in their individual explorations and in this essay I will compare and con trast the Columbus’s and Cook’s views of the natives they encountered. Christopher Columbus discovered native people from North America and Captain James Cook discovered them from Hawaii. They both kept journals of their experiences so now we areRead MorePlagiarism : Playing With Fire Essay1523 Words   |  7 PagesAlbert Dominguez Dr. Grubic Comp and Rhet. 23 October 2016 Plagiarism: Playing with Fire Accuracy is one of the main aspects that makes people take information seriously. Without accuracy one will never know the truth. Some teachers can go from saying Christopher Columbus did not find America to saying he found America and raped and killed numerous of Indian women. Or some people may state that the President does not have executive powers to instead declaring the President s ability to bypassRead More3 European Explorers839 Words   |  4 PagesThe life amp; times of three European explorers Introduction: In this essay you will be reading about the legacy of three explorers during renaissance. Firstly you will be reading about Marco Polo secondly about Christopher Columbus and lastly Ferdinand Magellan. These explorers have all changed the world by adding to the world map and proving things that no one else has discovered or seen before Marco Polo Marco Polo was a voyager, born in Venice, Italy. He was born on September 15thRead MoreChristopher Columbus : A Hero Of The American Eyes906 Words   |  4 PagesChristopher Columbus is a person that all of America is thankful for because he is looked at as a hero in the American eyes, because he was the one that founded our land. Through well-known stories about Christopher Columbus, children learn of an explorer with an amazing imagination who stumbled upon America in a pursuit to prove the world is round; however, the true story would not allow Americans to portray Columbus heroically. Introduce Sources. Research reveals that Christopher Columbus is notRead MoreThe First Day Of School994 Words   |  4 Pagesold time. As we started on the first day of school I did not think I would learn so much in such a little amount of time. For example , I did not know that the people that make school books doesn’t need a degree , which mean almost anyone can be a member of the school board in Texas. The head of the Texas school board is a dentist, the man does not know how public school function and yet we the people are the one that votes for them. According to the class notes, historian first writes our booksRead MoreEssay on The Voyage Of Christopher Columbus1497 Words   |  6 PagesAmerican History I Christopher Columbus Voyage to North America Spanish exploration first began with a series of revolutions. First, the Commercial Revolution generated economic stability. Second, the Intellectual Revolution generated interest in the Earths composition and the pursuit of exploration. Europe then called for a political revolution to end the disorganized and disorderly rule of its government. This revolution returned order and stability to the government and renewed interestRead MoreIs Christopher Columbus A Good Man?990 Words   |  4 Pagestaught throughout our lives is. Our History classes lacked genuine information about our History, we were really taught only what they wanted us to know and not exactly what had happened in the past. This semester we talked about many subjects that our education system has failed to talk about accurately. For example we talked about Christopher Columbus, the Pilgrims, Slavery, the Civil War, the Progressives, the Gilded Age, World War II, the Cold War and The Vietnam War. With each topic we eachRead MoreA Man Named Christopher Columbus1238 Words   |  5 PagesA man named Christopher Columbus, as we all know as a superb sailor and navigator. We find him more human like and interesting in the book then what we thought of him while reading our history text books. Christopher was a happy cheerful, confident man, he was always so sure he would succeed. He had such good focus when he was sailing, also having no doubt that the world was round. He commanded a fleet of three smaller caravels, The Nina, the Pinta, and the Santa Maria. Leaving on the date of AugustRead MoreThe Voyage of Christopher Columbus1541 Words   |  7 PagesAmerican History I 07/08/05 Christopher Columbus Voyage to North America Spanish exploration first began with a series of revolutions. First, the Commercial Revolution generated economic stability. Second, the Intellectual Revolution generated interest in the Earths composition and the pursuit of exploration. Europe then called for a political revolution to end the disorganized and disorderly rule of its government. This revolution returned order and stability to the government and renewed interest

Data Encryption of WiMax Networks

Question: Describe about the Data Encryption of WiMax Networks. Answer: Wimax: Nowadays wireless technology is the most important thing in our daily life. Wifi is most common used technology in busy life. Basically, wifi is the data transmitting signal which is transmitting the radio wave instead of wire means it is wireless technology. WiMAX is similar to the wifi technology but it has the much bigger scale and faster speed. Wimax gives services to the enterprises and residential for its economic growth. For any wireless technology, security is a very important thing and it must be addressed. Encryption is the process of enciphering data or messages in such a path that only authorised persons can read it. Encryption is the secret communication services used by military and government for a long time. Nowadays it is very common services. Many company and enterprises will begin to utilise WiMAX for communicating from office to office, relative near to each other, gives campus wireless connectivity to the employee (Nuyami, 2007). Wimax is successful because it is easy to use and high speed and range relatively low cost. The intent of encryption is to secure that only the authorised person can read the data. WiMAX utilises 3DES and AES for encrypting their data transference on the network. The Triple Data Encryption standard (3DES) utilises three different keys with a length of 56 bit each. The utilisation of three keys causes for a slower execution in some software. The main encryption technology is used by WiMAX is the AES (Advanced Encryption Standard). AES gives support for 128-bit, 192-bit, or 256-bit for encrypting keys (Nuaymi, 2007). AES is the very popular algorithm used for encryption. AES is faster and widely used encryption standard than 3DES.AES is very easy to use and utilises very little memory. Except all of this 3DES is the main data encryption technology in Wimax. There are two types of secret writing is used nowadays one is Symmetric or secret key cryptography and another one is asymmetric o r public cryptography. The most important for data encrypting was a symmetric algorithm which is known as Data Encryption standard. DES is 64-bit encipher which means it encrypts 64 bit of data. Data encryption enciphers and most of the major symmetric encipher are based on a encipher is known as the Feistel block encipher. It was invented by the IBMs cryptography researcher Horst Feistel in the early of 70s. Triple data encryption gives us a simple method of growing the key size of DES to protect against attacks. It uses a key bundle that constitutes the three DES keys each of 56-bit ((Labiod et al., 2006). The encryption algorithm is given below: Enciphertext = Ek3(Dk2(Ek1(plaintext))) Methodology: That means DES encrypt with k1 then decrypt with k2 ad then encrypt with k3. Each triple encryption can encrypt one block of 64 bit of data. Some diagram is given below for understanding the 3DES encryption used by WiMAX network 2. Research the security challenges for any two examples of WPAN technologies? WPAN and Security: Two examples of the WPAN technologies are Bluetooth and IEEE 802.15, these two particular technologies are used. Bluetooth is a standard which is used to enable wireless communication between mobile computers, phones and other portable devices we use in our day to day works. Bluetooth does not require a line of sight for establishing a connection between two devices which supports Bluetooth. A typical range of 10 meters is possible and with some arrangement the range could be extended to 100 meters. Specification: Bluetooth 2.4 GHz v1.1: 720 Kbps; v2.0: 10 Mbps 10 meters (30 feet) to 100 meters (300 feet) Automatic device discovery; communicates through physical barriers. Security challenges: There are different security related challenges which the Bluetooth device generally faces. Denial of service: The Bluetooth devices may face malware attacks from the hackers and intruders. They can crash or hack the devices that are connected to the Bluetooth. In 2003, Bend and Adam from A.L digital Ltd discovered some serious flaws in the security of the Bluetooth connectivity as per their research the personal data security can be compromised. MAC spoofing attack: Among all the attack the most frequent attack is the MAC spoofing attack. Attackers can perform MAC spoofing while the PIN is being generated by the Bluetooth device for connection. With the help of some specialized hardware, intruders can alter the flow of data between two devices (Saleem, Ullah, Kwak, Kwak, Sup, 2011). IEEE 802.15: IEEE 802.15 is developed by the IEEE for short-range wireless communication between devices. It has the same goal as the Bluetooth to connect two portable devices without using any cable for the connectivity between them. The 802.15 WPAN group was formed in the year 1999 as a part of local and metropolitan Area network standard committee of IEEE. The 802.15 specifications are aimed to update the Media access control and physical layer of Bluetooth (Saleem, 2011). Specification: IEEE 802.15 2.4 GHz 802.15.1: 1 Mbps 802.15.3: 20-plus Mbps 10 meters (30 feet) to 100 meters (300 feet) Uses Bluetooth as the foundation; coexistence with 802.11 devices. Security Threat: Layers DoS Attacks Defenses Physical Jamming Tampering Tamper-proof, hiding mapping, the mode change Link Collision Unfairness Exhaustion Rate limitation Network Misdirection Black holes Authorization, monitoring, redundancy Transport Flooding Authentication Reference: Nuaymi, L. (2007).WiMAX: Technology for broadband wireless access. United States: Wiley, John Sons. Labiod, H., Afifi, H., De Santis, C., Labiod, H., Hossam, A., de Santis, C. (2006).Wi-Fi, Bluetooth, ZigBee and WiMax(11th ed.). Dordrecht: Springer-Verlag New York. Saleem, S., Ullah, S., Kwak, K. S., Kwak, Sup, K. (2011). A study of IEEE 802.15.4 security framework for wireless body area networks.Sensors,11(2), 13831395. doi:10.3390/s110201383 Bluebug.The home of the trifinite.Group. Retrieved September 16, 2016, from https://trifinite.org/trifinite_stuff_bluebug.html