Tuesday, December 24, 2019

The s War Making Feminist Sense Of The Iraq War

Cynthia Enloe’s book titled Nimo’s War, Emma’s War: Making Feminist Sense of the Iraq War allows readers to enter the lives of eight women; four American and four Iraqi, in order to better understand the everyday lives of people, their struggles, and the outcomes of war by using particular stories of women to bring together issues present globally. Enloe wrote this book to analyze war from a feminist perspective. Analyzing war through a feminist lens by way of stories makes understanding the war more accessible for wider audiences (Enloe 2010:xii and 218). The use of stories allows for a better understanding of women in both countries and shows that there is no one group of women, whether that be American or Iraqi, there is no monolithic Muslim women or American women (Enloe 2010:xii). In doing so, Enloe (2010) allows for readers of all backgrounds to critically question the gendered aspects of war including the histories, feelings, struggles, and the ways in whi ch women organize and resist war waging (p. xii). Enloe (2010) in both her purpose for writing this book and in the title, does not focus on one group of women which allows for a more serious and balanced engagement with the women in both countries. Enloe connects stories of women from two countries while at war. When women are taken seriously in all of their diversity, and their ideas and actions are explored, the world will better understand how upholding certain forms of masculinity at particular moments in timeShow MoreRelatedIntroduction to Eavan Boland755 Words   |  4 Pagesfor her interest in  feminist  issues throughout her work, in particular the role of women society. In her poetry she expresses a more accurate view on the contributions and achievements of women in Irish history.Bolands early poems were about domestic issues such as marriage and children. Boland also  showed an interest in the role of women in Irish literature and society. In  Child of our time  Boland introduces us to the theme of motherhood and dealing with the evil of war.  The features of theRead MoreA Short Note On Fawziya Mousa Ghanim Iraq1612 Words   |  7 PagesFawziya Mousa Ghanim Iraq In fact, The program will help me to gain new experiences and test my personal, intellectual and educational capacities . I will gain supportive and original information about the subject that I want to write about it. Actually, the program will elevate my skills and abilities. It also will enhance my research tools and methods of teaching. When I return to my country I will hold workshops and sessions for my students benefit and my academic colleagues . They will be theRead MoreEffects Of The Cold War On The American People1709 Words   |  7 PagesKristelle Jadoo Professor Norris HIS 1380 B 12 July 2015 Effects of the Cold War on the American People After World War II came the development of another tension that involved the United States and the Soviet Union and their associated allies. The Cold War produced many dilemmas amongst the American people in terms of how they should comport themselves as a nation. Before World War II the United States had no interest in keeping a strong military system, nor did they send out troops outsideRead More Gender Politics in the Criminal Justice System Essay4043 Words   |  17 Pagesaffects all women. Despite the fact that there have been changes to certain policies and prison regulations, though made with resistance, none of the changes have been for the better. By looking at past and present situations as well as the differing feminist perspectives on the justice system, I hope to offer ways and opinions on how to improve this system and allow women to equally balance their life in the public sphere as well as their life in the private sphere. Before I begin, however, I wouldRead MoreGlobalization Has A Positive Impact On The World Essay2042 Words   |  9 Pagespolitical economic stability. This ongoing phenomena of â€Å"globalisation† was debated in the last three decades, while number of states were growing due to decolonisation in Asia and Africa post-war period, with a further growth at the End of Cold War, when former Soviet states claimed there independence, making the global relationship more complex.In assessing this essay I will outline the success of groups that have opposed globalisation in the world today, with a use of relevant examples and usefulRead MoreMutability of identity in The Road and The Handmaids Tale2648 Words   |  11 Pagesfor a society to be peaceful and effective. The Road and Lord of the Flies share similar representation of how we are controlled by our society. They suggest we have evolved to act in a socially desirable manner and that without control we loose all sense of empath y or moral consciousness. Within The Road and Handmaid’s Tale however there are some positive examples which suggest that although identity is definitely able to be manipulated to a certain extent, expression and communication could bothRead MoreMovie Analysis : Hollywood 3558 Words   |  15 PagesThe Spartans by Paul Cartledge there is not evidence that Ephialtes was in any way deformed – Frank Miller drew this as a way of portraying his soul and Snyder, continued with this visual metaphor as a way of symbolizing Ephialtes moral weakness by making his physically weak a trait that would see the Spartans leave their children on a cliff to die from exposure , this intrigues the audiences and shows off the special effects that Snyder had available to him. In Zack Snyder’s film 300 (2006), the BattleRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesGosse and Richard Moser, eds., The World the Sixties Made: Politics and Culture in Recent America Joanne Meyerowitz, ed., History and September 11th John McMillian and Paul Buhle, eds., The New Left Revisited David M. Scobey, Empire City: The Making and Meaning of the New York City Landscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, HistoricalRead MoreMedia Representation Of Art Crime3638 Words   |  15 Pagesannually to art crimes involving theft, looting, fraud, and trafficking— surpassed only by the drug and gun trafficking trades (FBI). Recent studies have confirmed that many insurgent groups and terrorists organizations—ISIS and Al-Qaeda—are funding their wars through the sales and trade of art and cultural objects. (Haken, National Geographic). When you mix art with criminal trafficking and the underworld associations of the black market, a clear picture of trouble fills the canvas. The aim of this paperRead MoreSocial Power of the News Media12127 Words   |  49 Pagesactions and the minds of (the members) a less powerful group.5 Such power generally presupposes privileged access to socially valued resources, such as force, wealth, income, knowledge, or status. Media power is generally symbolic and persuasive, in the sense that the media primarily have the potential to control to some extent the minds of readers or viewers, but not directly their actions.6 Except in cases of physical, coercive force, the control of action, which is usually the ultimate aim of the exercise

Monday, December 16, 2019

Log Mgmt Free Essays

string(92) " have been picked up by the log management system or service and reported upon as required\." Log Management in the Cloud: A Comparison of In-House versus Cloud-Based Management of Log Data A SANS Whitepapers – October 2008 Written by: Jerry Sheen Sponsored by Alert Logic Basic Practices Questions for the Cloud Provider Considerations for In-House Log Management Executive Summary In the 2008 SANS Log Management Survey, 20 percent of respondents who were satisfied with their log management systems spent more than one week each month on log analysis. Most of those companies were in the Global 2000. The remaining small- and medium-sized businesses (SMB) and government organizations spent twine a half-day to five days per month on log analysis. We will write a custom essay sample on Log Mgmt or any similar topic only for you Order Now The survey also showed that, because of difficulties in setup and integration, most organizations have only achieved partial automation of their log management and reporting processes. These difficulties have organizations, particularly SMB, wondering if they should turn over log management to an in-cloud provider†one that provides their log management software and log data storage over the Internet. In January, 2008, Stephen Northup, president of the SANS Technology Institute, wrote that there are pitfalls with putting log management in-the-cloud. On the plus side, he adds, â€Å"you will almost certainly save money. In addition, real experts on log analysis are hard to find†¦ † 1 Recently, vendors began offering log management in-the-cloud (otherwise known as Software as a Service or AAAS), as a way to simplify log management because the provider can dedicate the material resources and retain the talented, focused personnel to do a better Job for less money. This particularly makes sense not only for SMB without the dedicated manpower, but also for enterprises whose IT resources are stretched trying to manage multiple distributed Lana. While IT managers agree that log management is difficult, they are leery about handing over their log data to a third party application provider because the data might not be available when they need it, not to mention the sensitive nature of some of the data that shows up in log files. Before deploying or overhauling log management systems, organizations need to weigh the benefits and drawbacks of each model in context of their business requirements. To simplify the process, this paper presents some questions to consider when vetting those business needs against each (and in many cases, both) of these log management models. Www. Sans. Du/resources/leadership/log_logic_interview. PH Log Management in the Cloud Basic Practices When looking at both models of log management (internally or in the cloud), begin with the end in mind by clearly laying out the reasons you want to collect log data. The following are some pre-selection tenets to keep in mind when considering both models of log management: Identify Your Goals One of the keys to any successful project deployment is identifying the goals before starting. Log management needs are different for each business unit staking a claim in the process. The IT group may be interested in the value of log data for problem solution; the security team may be interested in information management or event management tied into an overall SEEM; and the audit and compliance group is most likely interested in tracking what people are doing in regard to sensitive data. Other possible uses for log data include marketing, forensics and HER accounting. As they identify goals, companies would do well to consider the broader advantages of log management and analysis, and look for systems or services that will allow a migration toward a more complete use of log data in the future. Of importance to all groups is the type of reporting supplied by the service or system. Log management systems often have reporting that is geared toward compliance for PC, SOX, HAIFA and other similar standards. Apart from required reports, log management can generate reports that are helpful for system maintenance, security management and many other purposes. Whether log management is handled in-house or in the cloud, reporting and correlation features should be easy to use and able to meet current and future business goals. Locate Resources Critical to the success of any log management initiative is finding the staff needed to implement, manage and maintain the system. This is particularly difficult for SMB and government agencies that can’t afford top dollar for IT talent. Yet, according to a Gardner paper in May of 20082, compliance drivers are pushing organizations with smaller security staffs to acquire log management systems. In these cases, in-cloud services make sense. Larger organizations with dedicated security staffs and advanced log management processes, on the other hand, are more likely to keep log management functions in-house. But even those organizations might use log management services for branches, or as a part of their larger security or network management operations. 2 GO 56945, Mark Nicole and Kelly Savanna’s. SANS Analyst Program Try Before You Buy The computer industry is fraught with solutions that don’t work nearly as well as they purport. So, testing and trial use is critical to determine whether the system or service suits your needs. Put the search interface through its paces to test for functionality and accuracy. Start off with a few devices sending log data, but also set up as many devices as you are allowed to test during the trial period. Some log management systems work very well for a small amount of data; but as the data feed test larger, the performance goes down quickly†and the systems or services can miss events. A good way to test the system or service is to send some suspicious data to a device that is being monitored. Then go look for that particular data to make sure it’s all there in the logs. One way to do this is to use the Kiwi Slog Message Generators to send messages to the target, for example by using an option in the program to send a simple text message followed by a number. This makes it simple to see if any of the test messages have been picked up by the log management system or service and reported upon as required. You read "Log Mgmt" in category "Papers" If there is a security component to the monitoring service (there usually is), try attacking your server and see how the provider responds. The specifics of how you would do this testing will vary with your goals, but logging in as a user and intentionally mistyping the password enough times to lock the account should get a response from the log service or system. I have actively used this testing approach on some appliances that collected security information and never got a response. If you choose to do this kind of testing, start slowly to get an idea of where the response threshold is. In addition to testing for nationality and security, pay attention to the user interface. In most cases, this will be a Web-based front end. Go through all the options and make sure they work. Also, make sure that responses to the GUI are intuitive. If you have a report that you need regularly, you should be able to get that report reasonably easily, even have it e- mailed to a specified account. Custom reports and specialized reports may be more complicated to receive as a test, but the basic flow of the system should make sense. Finally, make sure that the people who will use the service test the interface before decisions are finalized. Www. Sociology. Com/kiwi-slogged-overview Questions for the Cloud Provider Selecting a log management software service provider is more like cementing a partnership than making a purchase. The service provider will have copies of critical log data†at times they may have the only copies of that data. The table below offers a quick snapshot of what to cover in a Service Level Agreement with a log management cloud service provider. Following that are questions to consider before taking the plunge. AAAS availability No more than 2 minutes of downtime a day and no more than 5 minutes per week. Timeliness of log data showing up in system Individual logged events must be available to a search from the customer portal within 90 seconds of the event. Timeliness of log data analysis Regulatory compliance Alerts must be delivered to the client within 30 minutes of a critical event. The AAAS provider must maintain compliance to changing regulations within 30 days of notification of change. New attack vectors should be applied to the processing system within 24 hours of a new attack being identified. The processing system must be upgraded to support changes and modifications to alerting from supported systems when systems are available for mineral release. Prompt upgrades to support new attack vectors Prompt upgrades to support upgrades to hardware and software 4 When considering cloud-based log management applications, organizations should ask the following questions (most of which can also be applied to in-house log management systems): Is It Safe? Many IT managers are concerned with the safety of their log data, and rightly so: Log data can be dangerous if it falls into the wrong hands. Attackers can get valuable information from reading the logs. For example, they can see if their attacks work, been known to show up in logs). Log data as common as Web or e-mail traffic often contains confidential information. Having control of logs can be useful to attackers who, in some cases, will try to clean the log data to remove any traces of their activity. Therefore, it’s important to look at the safety of log data†whether it’s stored on- or off-site. If the log data is stored locally, it’s often kept on each individual computer producing the data. Larger organizations will have log servers that will store the log data in a centralized attached storage device. Those systems are, in an ideal situation, secured and difficult to break into. In the cloud model, this data storage would be handed off to the cloud provider, which relieves the organization of the hardware, security and HER burdens involved with keeping storage in-house. However, as they lose control of that data, organizations must rely on the cloud service to handle their data securely. The issue of whether a service organization is competent is difficult to determine, and is ultimately based on reputation. Cloud providers must create a trust model as they manage collected log data securely and separately in a multi-tenant environment. This creates the need for additional layers of security to operate multiple tenants from one another on a shared server, while also protecting the data stores from attackers. Firewalls, encryption and data loss prevention are all areas of security that apply to sensitive log data stored in the cloud†a cloud that’s increasingly brutalized. Fertilization, in itself, is not necessarily a negative, as long as proper security procedures are followed within the virtual cloud. The same characteristics of fertilization that make it a concern as a hacking agent also provide a hiding technology that has the potential to make user accounts harder for attackers o access. Already security vendors are developing virtual technologies so that their anti-mallard products can’t be detected and overruled by today’s kernel boot- level rootlets. 5 How Is It Transported? Ask the cloud provider for specifics about how the data gets transmitted from your systems to their operations center. Is the data encrypted in transit? What type and strength of encryption is used? Is the encryption proprietary? Be wary of providers that claim their encryption information is confidential or proprietary; instead, look for providers that use proven technologies such as SSL or AES. There are numerous examples of companies that have invested vast amounts of money in creating their own encryption technologies only to find out after release that they missed a critical component. How Are Keys Stored? It would be easier for a log management vendor to use the same encryption secrets client, that attacker can access the accounts of all clients. A different key for each customer account would not only offer better protection against customers accessing one another’s accounts, but also against an attacker cracking a password and getting the keys to the entire kingdom. Logical separation of key storage is also important for the same reasons. How Often Is The Data Transmitted? Most log management systems send data in batch mode. The collection appliance typically waits for either a specified time or amount of data before transmission. In general, a quicker frequency is better because the data is getting processed faster. More frequent transmission minimizes traffic bursts and gives an attacker less time to interrupt or block the transmission of alerts, a technique attackers use in an attempt to avoid detection. What Is The Level Of Compression and Bandwidth Utilization? Bandwidth utilization is a question that you’ll want to keep an eye on as you test your log management service. It is common to get 90 percent compression or better on ASCII (plain text) logs, while binary log compression ratios may be less. If your Internet connection is currently heavily utilized, the log traffic may impede other traffic, and you’ll want to plan for this issue ahead of time. One way to monitor the bandwidth is to capture traffic statistics using Net Flows. If you aren’t monitoring your overall Internet traffic utilization, it’s best to get a handle on that prior to implementing a log management service and use this number as a baseline. What Backup and Redundancy Is Included ? If a cloud provider claims to be set up to handle this type of data correctly, verify that it is, in fact, doing a better Job than you would. The provider should have data stored at multiple locations and secure backups for redundancy. Check, too, with the company that is actually doing storage. In the cloud model, storage could be handed off to another vendor. Ask questions about how stored data is encrypted, how it is transferred, where the tapes or other media are stored, and if there is a process for racking tapes. Find out how long backup data is retained, how it’s destroyed, and what happens to the data if the service is terminated. It will probably be impossible to verify most of this, but the cloud provider should be able to answer questions and provide benchmarks, customer references, service agreements and other documentation. What Are The Responding Options? System. These built-in reports typically cover things like regulatory compliance and common performance and security metrics. Verify that the reports your organization needs are included as overbuilt reports, or that they’re easy enough to customize. Often, reporting is not as straightforward as people would like it to be. Sometimes, the logging application won’t provide the required information directly, but it may be available indirectly. For example, a security manager may want to identify invalid session IDs on a Web site because a high frequency of invalid session IDs may point to an attacker trying to guess a session ID and clone or hijack the session. If the log manager doesn’t report that information directly, it may be possible to get similar information by tracking the number of connections built from any given IP address. How Much Of The Data Is Actively Searchable? In some cases, the most recent data will be more quickly accessible for searching than data that has been removed from an active state. Moving data out of an active part of the database can make databases faster, so some data may be moved into an area that provides slower access. Ask if there are any special requirements to access archived data or whether the only issue is a performance penalty†and request a demonstration. 7 How Much Of The Data Is Stored? If data is moved out of primary storage, is the full log data retained or will recovery of data be limited to searchable data fields and metadata? If some detail is eliminated, determine whether this will cause problems with regulatory compliance, forensics processes and other log management and reporting needs required across your organization. If there are processes that automatically eliminate some data, can those processes be suspended for special circumstances, such as litigation requiring the preservation of data? How long does it take to make such changes? What Log Data Will Be Accepted? What specific devices, operating systems and applications are supported? Several operating systems and hundreds of widely used appliances and devices are critical o today’s diverse organizational IT infrastructures. The number of applications a log manager may be called upon to understand is staggering. Prioritize on all your critical devices and applications. How are they supported by the service provider, and how thorough is that support? How Are Its Instructions For Setting Up Devices? Log management can become more complicated as the number of log-producing for setting up devices, operating systems and applications that need to be monitored. Often, a company will need to deviate from the normal setup procedure, based on the peculiarities of its business that complicate the log data life cycle. As a result, setup instructions should be termed as guidelines, not hard and fast rules. Rules often must be massaged to work with the varying operating systems and applications (including their versions) that an organization needs coverage for. 8 How Are Alerts Determined? If the cloud provider is offering to send alerts for events of interest, find out how they determine what is of interest and compare that to what is of interest to your organization. Are they looking solely at security events or do they include more routine support and maintenance events? If the events of interest include both types f events, how do they distinguish between the two? How much involvement does the log management client have in setting up what alerts are of interest to them? If a drive runs out of space, for example, that can often be Just as big a problem as an attacker compromising a system. Ask, also, if they can correlate related events to give the analysis situational awareness. For example, an administrator logging into a domain controller at 10 a. . And creating a user is quite different from the DNS process starting a command shell and creating a user in the middle of the night. In both cases, a user is being created. In the first instance, the process seems normal; but in the second instance this combination of events could be associated with the RPC DNS exploit as demonstrated in an April, 2007, SANS Webmaster. Cloud (and in- house systems ) should, therefore, include situational awareness to understand when creating a user is a normal event and when, as in the second example, it is not normal. In addition to automated monitoring and alerts, it would be ideal if cloud providers could offer human review of logs as an add-on fee for service. Human review is required under some regulations, and is a good basic best practice for organizations to follow because automated systems don’t catch everything. How Quickly Does Processing Occur? Timing is an important issue with log management that the cloud model is well- suited to address. One typical problem with in-house log management is that events are often found after a problem is noticed. It is, of course, best to detect log events leading up to a critical event in order to avoid the critical event. The question about processing speed encompasses a number of different issues: Once an event has been logged at the local device, how long does it take for that event to show up in the yester? If that event should trigger an alert, how long will it be before the alert is relayed to the client IT department? Is there an option for the vendor to do more than April 24, 2007 Webmaster – www. Sans. Org/websites/show. PH? Beastie=90861 9 How Often Are The Alerts Updated? Operating systems and network devices are constantly coming under new and different attacks requiring new responses. The errors from these devices also change with some upgrades, so it is important for the Log Management provider to conduct regular and timely updates to its system, and respond reasonably when errors occur. How Are System Upgrades Handled? In the cloud, upgrades to the log management system s are handled by the provider, thereby relieving the organization from having to maintain these systems in-house. There is a risk, however, that the upgrades may cause outages in coverage by accidentally introducing new compatibility or protocol problems. It would be a good to ask the cloud provider about how upgrades are handled and how clients are protected during the upgrades. By the same token, how would updates to any internal system log-generating devices affect the cloud provider’s coverage? 10 Considerations for In-House Log Management Many of the same questions that apply to companies offering log management service in the cloud also apply to internally-managed log management systems. The 2008 SANS Annual Log Management survey indicates it is still incredibly difficult to automate log management systems to the degree organizations need. A recent article by Patrick Mueller in Information Week refers to log management as a â€Å"monster. † Just because it’s difficult doesn’t mean log management needs to be outsourced. When weighing in-house log management, consider the following factors: Could A Personal Change Ruin Your Log Management Process? Log management is often the pet project of one person while the rest of the IT staff tries not to get involved. If that person leaves the company, it can be difficult for initiatives. Will Your Staff Monitor The Logs Regularly And Maintain Updates? Log management services have requirements built into their contracts for response time and full-time monitoring. Can your staff live up to those same expectations? One of the issues for log management companies is keeping up with updates to applications, operating systems and regulatory issues. Is your staff able to keep up with the changes? As an example, how did your staff do when Windows Server 2008 changed all its event Ids? At the time, most administrators used a collection of scripts; however, all those scripts, which were working, suddenly became broken. Floggers lashed out about it. For a log administrator who finally has everything working, that sort of a situation can be a demoralizing surprise. Maintaining updates and monitoring logs is complicated by the fact that most companies support a diversity of logging devices. To properly support local log management, an IT group will need to work with different vendors ho use different types of log data. At times, it may be necessary to bring in consultants to assist with tracking down specific issues. Organizations need to consider the associated costs and frustrations of working with multiple vendors and integrators along with the costs of the initial deployment and ongoing internal staffing requirements. 56 www. Informational. Com/story/charities. Jhtml? Articled=208400730 www. ultimate windows security. Com/wick/WindowsServer2008VistaSecurityLog. Sash 11 Roll Your Own Or Buy An Appliance? A big debate in the log management arena is how to deploy log management tools. According to the SANS Log Management survey, the majority of organizations (38 percent) are building home grown solutions through the use of slog servers, custom scripts and applications. The remaining respondents used a combination of commercial software and appliance-based tools or checked â€Å"other. † In either case, organizations are not happy with their level of automated correlation or system coverage, according to the survey. Coverage, automation, correlation and access must all be addressed, maintained and improved upon as needs dictate, regardless of which option is chosen. How to cite Log Mgmt, Papers

Sunday, December 8, 2019

Non Violence and Will Power free essay sample

Non-violence and Willpower Why does an individual indulge in violence? This question has great importance for one who practices non-violence. Its answer compels us to probe the unconscious. We discover there what psychologists call a repressed desire that drives one to violence. It can be controlled only by strong willpower, which is the same as a strong vrata or vow. It is for this purpose that the Anuvrata movement is going on. The unconscious harbours ego which accounts for the individual getting enjoyment out of thinking very high of himself and very low of others. Discrimination practiced on the basis of race and colour is but one manifestation of mans ego. Irrational insistence too is rooted in ego. Here in also lies the seed of the communal problem. Here it is relevant to recall one of the vows of Anuvrata: I will believe in human unity, will eschew any discrimination based on race, colour etc as well as untouchability. We will write a custom essay sample on Non Violence and Will Power or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page But if we want to develop non-violence, it is not enough to be conscious merely of the present events. We should be equally conscious of the prime instincts causing the events. Thus it is necessary in the present context to work for disarmament and banning wars. But it is not enough, for it is only like fighting a fire without discovering its causes. We have to do both things fight the fire that is raging and, more importantly, find out the factors that have caused it. Likewise, solving the existing problem of violence and discovering the basic cause of violence are equally necessary. People working in the field of non-violence are much less concerned about the latter and this, according to us, is the biggest impediment to the growth of non-violence. Armament, disarmament, war and banning of warall these matters fall within the jurisdiction of various governments. The common man has nothing to do with them. And those wielding power are not likely to listen to the talk about non-violence. We have, therefore, to involve the common people in achieving non-violence. These people, as we have seen, have no role in deciding matters of peace and war or of armament and disarmament, but they undoubtedly have the power to decide the destiny of those who decide the above matters. For achieving it,intense faith, incessant striving and complete devotion are needed. We have reason to believe that these qualities will emerge in those working in the field of non-violence.

Sunday, December 1, 2019

Why should people get married free essay sample

Traditionally men and women are meant to be together as a couple. Back in the old days people wanted to get married because they want to have a bigger family, reproduced their generation. But nowdays, people’s personal views of marriage has changed, thesedays they have more freedom to choose whether they want to get married or not, because more less 10 years ago when someone didn’t get married, they say that it is a big sin and now people are accepted if they choose not to get married. Why should people get married? Many people want their relationship to be legal in front of the government, they want to have babies without anyone talking behind their backs that they didn’t get married, therefore they get married to have their relationship legal in front of the government, some people are forced to marry by their parents and when it doesn’t go well they get divorced. We will write a custom essay sample on Why should people get married or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page People should get married because usually they want to have someone to love when they’re old, someone to talk to and someone to take care of each other. And when they’re single, what can they do? Most people want to get married because they want to create their own generation. To feel how happy it is to be a father or a mother, to see their children grow up, to see how hard they worked for them. Why shouldn’t people get married? Now days, the amount of people divorcing has increased. If they get divorced, growing up with one parent can have a negative impact to the children and when their parents fight, it just makes their children feel depressed, angry and frustrated. Another thing is that many people married because of money, they think that money can do anything and when their husband or wife gets bankrupt, they just decide to leave them behind and not wanting to see them again. Also people shouldn’t get married because they are forced to, because they wouldn’t be as happy as they should. In my opinion people should have their own choices whether to get married or not. It is their decision, though they can make sure that nothing horrible will happen to them so that it wouldn’t affect their children.

Tuesday, November 26, 2019

Animal Cruelty Laws essays

Animal Cruelty Laws essays The current laws meant to safeguard against animal cruelty in the United States do not protect animals used for sport and entertainment. In this essay, I will discuss only animals used for thoroughbred racing, greyhound racing, and circuses. I will not include zoos, farming of animals, hunting, or vegetarianism in this discussion. I will review the inadequacies and poorly enforced laws that are currently meant to protect animals from human cruelty. Neglect and intentional harm constitute the two types of animal cruelty, as categorized by the American Society for the Prevention of Cruelty to Animals (ASPCA) (Animal Cruelty: FAQ, 2002). Both types of animal cruelty are present in the sport of horse racing. Drug abuse, lameness, insufficient veterinary care and long road trips are all indications of animal cruelty, requiring better laws and enforcement in the racing industry. The American Association of Equine Practitioners says 60 to 90 percent of racehorses are significantly lame (Horse Racing: A Losing Bet, 2002). Many of these lame horses are forced to race on fractured legs by being treated with drugs to reduce the pain. Drugs are used to suppress the symptoms without treating the underlying medical problems, which can lead to permanent physical impairments (Horse Racing: A Losing Bet, 2002). Veterinarian Gregory Ferraro states, In general, treatments designed to repair a horses injuries and to alleviate its suffering are now often used to get the animal out onto the track to compete-to force the animal, like some punch-drunk fighter, to make just one more round. Equine veterinary medicine has been misdirected from the art of healing to the craft of portfolio management (Horse Racing: A Losing Bet, 2002). Because of this type of drug abuse, one horse in every twenty-two races was so severely injured that they could not fin...

Friday, November 22, 2019

The best blogs every HR professional needs to ready

The best blogs every HR professional needs to ready Things are changing all the time in the HR world, so if you’re looking for ways to keep current, you can’t go wrong with blogs. But which one? We have you covered, no matter what avenue you want to explore. Here are some of the best, industry-leading blogs that can help keep you in the loop.The HR CapitalistWritten by Kris Dunn, a longtime HR executive with a passion for efficiency, The HR Capitalist focuses on ways to make your work more streamlined and informed. Highlights include everyday tips, interviews with essential pros, book reviews, and thoughtful essays on current trends. Bonus blog: Dunn also runs Fistful of Talent, which features diverse voices writing about trends and news from recruiting and talent management.PandologicBy putting the gamut of HR topics in one place (like recruiting, recruitment marketing, strategy, data and analytics, advertising, and tech trends), Pandologic gives you a checkpoint for all that’s new and developing in your professi onal world. With its focus on fast-moving trends and future development, this blog is geared toward the professional looking to make- or maintain- forward progress in their organization.Ask a ManagerWho doesn’t love a good advice column? Ask a Manager brings Dear Abby into the HR realm, giving insightful advice on real-life issues faced by professionals in the field. The advice here comes from Alison Green, a longtime management and human resources professional. Green’s philosophy is based on practicality and productivity, using communication to solve problems before they become insurmountable or, worse, career-blockers.The Buzz on HRIn The Buzz on HR, human resources manager Sarah Morgan (who has more than 20 years of experience in the trenches) brings her unique insights to leadership and organizational management. If you’re looking for a daily hit of short trend pieces and breaking news, this may not be the place; but if you want thoughtful, perceptive essays on the experiences and challenges facing the busy HR professional, this one is a great blog to add to your rotation.hbspt.cta.load(2785852, '9e52c197-5b5b-45e6-af34-d56403f973c5', {});HR BartenderWhen happy hour feels too far away (when it’s, say, at 10 a.m. on a Tuesday), you can still get the experience of chatting with a friendly voice who understands that HR is a lifestyle (not just a day job) at HR Bartender. HR professional-turned-consultant Sharlyn Lauby gets that the HR world isn’t just recruitment and data- it’s an integral part of a living, breathing workplace, with human interests and concerns. HR Bartender uses a light, practical approach to the issues facing HR pros.HR ExaminerIf you’re looking for insight into the technology that’s shaping the HR world more and more every day, then HR Examiner can help you geek out to your heart’s content. It’s all about the intersection of technology, analytics, and hands-on HR work. T he blog includes in-depth analysis of trends and products, as well as weekly interviews, newsletters, and podcasts to keep you up-to-the-minute on all the latest tech trends.The Undercover RecruiterUndercover Recruiter is a bit different from the rest of the pack because it brings HR-themed content for several different audiences: the employer, the recruiter, and the job seeker. The blog features a diverse array of writers and topics, covering industry trends, tips for strategy and best practices, and news on the latest trends that affect hiring from all angles.WorkologyWorkology is great because it tackles topics meant for HR pros at every level: newbie, midlevel, management, executive, etc. With more than 100 writers providing news and insight into trends and the HR experience, the blog supports the human resources lifer at every stage of their career. The platform also has extensive social media and podcast content, as well as a weekly newsletter to keep you up on all the news yo u need to know.The best HR blogs are ones that not only inform, but also show how vibrant and diverse the HR community is. Each of these is a great resource that can help you grow and thrive in your organization and find your tribe while you learn everything you need to know.

Thursday, November 21, 2019

Reign of Terror in the French Revolution Essay Example | Topics and Well Written Essays - 2250 words

Reign of Terror in the French Revolution - Essay Example The Reign of Terror was the piece de resistance of the French Revolution (1789-1799) and shook the whole of Europe especially Europe's surrounding monarchies. When the haze of smoke of violence settled down, more than 40,000 Frenchmen were guillotined and more died by brutal means such as drowning i.e. 3,500 were victims of mass drowning termed as noyades in Nantes1 and death by mob lynching. The most celebrated head shown to the jeering, cheering mob belonged to Queen Marie Antoinette, the daughter of Queen Maria Theresa of Austria and the sister of Holy Roman Emperor Leopold II. Earlier in that fateful year 1793, her husband, King Louis XVI was butchered via the guillotine for alleged crime of treason together with all those perceived to be "enemies of the revolution". The latter were either guillotined or mass executed by firing squad without due process of law2 . Most of the victims were those from The Reign of Terror was also marked by dechristianization as Christianity was banned temporarily, a result of massive sentiment by the 'enragees' or extremists3 against the clergy for its special privileges such as the the right to tax the feudal estates via the 'dime'or tithe4, its political power (it possessed a third of the voting power of the Estates General) and its possession of untaxed vast landholdings all over France. In its stead, was established the revolutionary religion termed as the Cult of Reason. Hatred against the clergy even caused the Julian calendar to be flung aside in favor of the Republican calendar.5 The Reign of Terror also saw the ascendancy to power of the common people, the peasants, the working class and the disadvantaged who were radicalized by the hunger and famine, the widespread unemployment, the excessive consumption of the royalty in the Versailles palace6, the civic inequality produced by dispensation of special privileges to the aristocracy, the burden of feudal taxation and the surging inflation that went haywire to drive them to bare subsistence. When these sans-culottes' (literally without knee breaches) aspirations were amalgamated with the Mountains' (the radical Jacobins) resolution to abolish monarchy, we had the perfect formula for an explosive group that would ignite and power a radical revolution that would be unparalleled in its cruelty and brutality. This combination jumpstarted the Reign of Terror. By wresting control of the National Convention, which previously abolished the monarchy and convicted King Louis XVI and Queen Marie Antoinette, they were ab le to engineer an extermination of all the enemies of the republic , particularly the counter-

Tuesday, November 19, 2019

International business strategy case Essay Example | Topics and Well Written Essays - 1500 words

International business strategy case - Essay Example Hence, the theory of comparative advantage, which focuses on the fact that a country should produce the goods and services that are of an advantage to business compared to other countries, applies. This is the case with China, since their low cost and highly demanded machinery are of absolute advantage to the country and it is able to attract major nations like Brazil. A country should hence focus on those goods that are demanded for trade by other countries so as to improve on its economy and gain a comparative advantage (Lasserre, 2007). The diversity of a country I terms of competition can also influence whether a firm’s selection decision. The size of a country’s market is also important since it represents the quality of products being produced in that country. A favorable market, should be able to grow fast due to demand of its products and services, implying that it is the best market for business since it has a competitive advantage. The taxes and interest rates are a major concern to multinational firms who want to venture in business in other countries. These firms will always opt for the low interest rates and low taxes on their goods. ... These incentives are offered by foreign countries so as to attract investors (Lasserre, 2007). Absolute advantage theory applies in the case of Brazil, which seems to have been keen on the selection of multinational firms; this occurs when it comes to the advantage of one country compared to another in the production of goods and services (Lasserre, 2007). Countries like china have an advantage of cheap and skilled labor and low interest rates over other countries; in this case, Brazil buys raw materials and components from china like windows, which are reassembled in other firms around the world to produce complete busses. The main aim why Brazil relies on China for its raw materials is because of their friendly price, thus enabling Brazil to make profit on the end product. However, Brazil and China are not the only car manufactures. General Motors was experiencing losses before the year 2007 but suddenly made profits as a result to major sales made in the china market in 2006, wher eby, it was able to invest more than $2million, which resulted to major profits through the sale of 7.2 trucks and automobiles in China. In addition, General motors acquired the second highest market share in China in 2006. Moreover, car manufactures like the Ford, Honda, and Volkswagen produce economy cars that can compete with the china’s current vehicles. It is evident that car manufactures like the GM are a threat to the Brazilian bus maker Marco Polo. Generally, the reason why Marco Polo does not produce complete busses in China is that, there is a requirement of $100 as an investment, which is very difficult for this company to afford. Whereas, the GM car manufactures were able

Saturday, November 16, 2019

Applying Information Security and SDLC Essay Example for Free

Applying Information Security and SDLC Essay Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore. Cite at least five references in your paper. Format your paper consistent with APA guidelines. If you are thinking of joining a fraternity or sorority, take the time to look into what each individual house has to offer. While there are similarities, many houses are different in the types of community service they do, the types of activities they prefer, and the overall attitude they portray. This pack contains BIS 320 Week 5 Applying Information Security and SDLC to Business General Questions General General Questions Resource: University of Phoenix Material: Applying Information Security and SDLC to Business Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore. Cite at least five references in your paper. Format your paper consistent with APA guidelines. If you are thinking of joining a fraternity or sorority, take the time to look into what each individual house has to offer. While there are  similarities, many houses are different in the types of community service they do, the types of activities they prefer, and the overall attitude they portray. This pack contains BIS 320 Week 5 Applying Information Security and SDLC to Business General Questions General General Questions Resource: University of Phoe https://bitly.com/12BDPWw If you are thinking of joining a fraternity or sorority, take the time to look into what each individual house has to offer. While there are similarities, many houses are different in the types of community service they do, the types of activities they prefer, and the overall attitude they portray. General Questions General General Questions Resource: University of Phoenix Material: Applying Information Security and SDLC to Business Write a paper of no more than 3,000 words in which you discuss one of the bookstores, use the SDLC method to implement a new technology into the bookstore, and detail a disaster recovery plan for the bookstore. Cite at least five references in your paper. Format your paper consistent with APA guidelines.

Thursday, November 14, 2019

African Art Essay examples -- argument essay

1. The pottery Seated Male Figure from Mali is an example of a non- frontal figure. This Sculpture displays a man sitting with his right leg bent and his left leg pulled up into his chest. He has his right arm over his heart and his left arm across his shoulder. There are many raised bumps on his body. His face id shifted slightly to the left and he appears to be concentrating. The caption explains that he is communicating with the gods.   Ã‚  Ã‚  Ã‚  Ã‚  2. The Orangun Eps Headdress from the Yoraba is a great example of a human figure with an entourage and a good display of hieratic scale. The ruler is sitting on a horse. Both he and th ehorse are greatly decorated in bright color clothing and the ruler is wearing a hat. In addition he is carrying a sword which is strapped to his arm. His entourage is amde up of numerous peolpe.Wives, children, musicains, messengers, soliders, and singers. this sculpture is a demostration of both social class and spirituality.   Ã‚  Ã‚  Ã‚  Ã‚  3. The Yoraba divination bowl of the mother and the child does have a patina. It is located on the babies entire body, the face of the mother and on her breast. The divination tray also has a patina around the rim on the carved faces of the Esu, the turtle, curled mud fish. and the curled snail.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  4. Many of the works in the gallery are made to display different qualities as a result they are not alwa...

Monday, November 11, 2019

Effects in Mass Media Essay

What was the major development in evolution of mass media in the 20th century The mass media included television, radio, newspaper and telephone. Before television, there was morse code, but later the telephone came in to play, people decided that it was much easier than waiting for a telegram. Before the invention of television there was the radio, this was considered the main form of entertainment for a family, the radio contained talk shows and advertisements read over the radio from different stores. Newspapers have been around for ages, they were pretty much the communication for cities, towns and small communities. Everything changed when television made an appearance in 1935. The first television set was black and white, mostly they were owned by people who were considered rich, later it became affordable for more families to own. The three major programs offered were ABC, CBS and NBC, later on the color television set was developed. Later on the computer was developed, they seemed too large for households, so most computers were used by the government, after that Apple developed a computer smaller for household use, more and more companies have developed better technology with the computer, television and the internet. How did each development influence America How did these influence America, The newspaper gave the news, it had no other purpose, but as it developed it was used for other purposes, today the newspaper is used for comments and criticism, this involves social, political and religion, this also vents grievances. The radio became very popular, it became the opportunity to speak to people in their homes, it changed the consumer marketing and was a link for entertainment information and product consumption, another use of radio was the war, they used for the detection of planes and ships which was called radar. By the 1950’s radio was lost to television. Television was the main source of entertainment, when kids came home from school, the first thing they do is turn on the television, people use television for a form of relaxation, especially after a long day at work. Today there are thousands if not millions of television stations, due to technological progress, today televisions stations are available in every part of the world, and has been a very influential part of culture. The telephone has made communication with people better and faster, you can contact anyone, anytime of the day. The first rotary phone was developed in 1923, later on the touch tone phone. A few years later the cordless phone came out, this was great, you could move around your home and still talk on the phone. Then later on a new technology was on the rise, the cell phone, now there was no more setting around waiting on a phone call, after that the internet, the phone had more of an impact than any other technology.

Saturday, November 9, 2019

Compare and contrast the arbitration laws of two countries Essay

The significant increase in the role of international trade in the economic development of nations over the last few decades has been accompanied by a considerable increase in the number of commercial disputes as well. Today rapid globalization of the economy and the resulting increase in competition has led to an increase in commercial disputes. At the same time, however, the rate of industrial growth, modernization, and improvement of socio-economic circumstances has, in many instances, outpaced the rate of growth of dispute resolution mechanisms Keeping in mind the broader goal of exploring links between the quality of legal performance, this assignment is an attempt to critically evaluate arbitration in India as a legal institution and to judge the growth and development of the same and to see the exact footing of India in the international front a simultaneous comparison of the arbitral laws of USA to that of India has also been made. In this assignment, the evolution of arbitration law and practice in India has been explored. This assignment is divided into three parts Part 1 explores the evolution of Arbitral laws in USA and India, the underlying idea behind this is to see the process through which arbitration came into being and how the old is the law and its due development in the respective countries. Part 2 explores the present arbitral laws in light of The Federal Arbitral Act and The Arbitration and conciliation Act. Part 3 compares the laws and arbitral process in India with that of USA this part shows the similarity and distinction of the laws in both the countries and also highlights the common meeting point of both the laws. HISTORY OF ARBITRATION LAW IN UNITED STATES OF AMERICA Native Americans used arbitration as a means of resolving disputes within and between tribes long before Europeans journeyed to America’s Atlantic shores.However the use of arbitration was introduced in America by the revolutionary war by the colonists who had had business experience in Europe. The use of arbitration in the ports of Europe was already known at that time among maritime and trade businesses. The experience of arbitration as a means of dispute resolution which minimized conï ¬â€šict and allowed continuation of the business relationship was brought to Atlantic by the people coming to live and work in North America. In England, arbitration is a much older concept than the common law system, which the United States courts later adopted. In fact, in England arbitration was used as a common means of commercial dispute resolution from as long as 1224. George Washington, the first President of USA incorporated an arbitration clause in his will that basically stated that, ‘ if any dispute should arise over the wording of the document that a panel of three arbitrators would be implemented to render a final and binding decision to resolve the dispute.’ In the ï ¬ rst decade of the 20th Century, several major trade groups applied arbitration beneï ¬ ts of simplicity, speed and minimal enmity. When New York’s The Association of Food Distributors, Inc. (originally known as the Dried Fruit Association of New York) was formed, its bylaws included an arbitration panel for the resolution of disputes. This was done to reduce the risk that its disagreeing members in case of any dispute and after its settlement would find ,themselves unable to resume their business relationship.1 Until the early 1920s, the only law governing arbitration proceedings in the United States came from court decisions, some dating made in the cases in17th and 18th Centuries. In 1925, The Federal Arbitration Act was enacted. It was a recognition of the several beneï ¬ ts of arbitration and it thereby established a national policy which promoted arbitration.It was initially designed to overcome the judicial hostility that was existing towards arbitration which had evolved from the English courts. With the increasing industrialization and growth and development the reluctance of people to adopt arbitration decreased. With the rise in number of disputes mainly involving â€Å" a transaction of commerce† AMERICAN ARBITRATION ASSOCIATION was established by Moses Grossman in 1926 and an era of Alternate Dispute Resolution was started by Charles Bernheimer2 . The National Labour Realtion Act passed in 1930 marked the a steep rise in the concept and usage of Arbitration in USA. The second woeld war was the turning point for arbitration law in America the economic depression and arising conflict led to more and more dispute settlement by means of arbitration by the War Labour Board. A major milestone regarding Arbitration Law was Achieved in the 1970 when when the Uniform Convention on the  Recognition and Enforcement of Foreign Arbitral Awards (The New York Convention)3 became law in the United States by the addition of Chapter 2 to the Federal Arbitration Act.This convention is still effective and provides for International Arbitration Awards which is considered to be more reliable and consistent than the existing court judgement framework in the country. Bibliography LINKS REFERRED: Alternative dispute resolution – Wikipedia, the free encyclopedia Development and Practice of Arbitration in India –Has It Evolved as an Effective Legal Institution? – CDDRL www.uniformlaws.org/shared/docs/arbitration/arbpswr.pdf www.kaplegal.com/upload/pdf/arbitration-law-india-critical-analysis.pdf www.williamwpark.com/documents/Arbitral Jurisdiction IALR.pdf Conflict resolution research – Wikipedia, the free encyclopedia www.utexas.edu/law/centers/cppdr/portfolio/2010 Symposium/Stipanowich New Litigation Final.pdf www.kaplegal.com/upload/pdf/arbitration-law-india-critical-analysis.pdf unctad.org/en/Docs/edmmisc232add38_en.pdf STATUTES REFRRED: The Abitration and Conciliation Act 1996 The Federal Arbitration Act 1925 United States Arbitration Act The Arbitration and Conciliation Act 1940

Thursday, November 7, 2019

Beowulf Monstrous Foes Beowulf Essays

Beowulf Monstrous Foes Beowulf Essays Beowulf: Monstrous Foes Beowulf Essays Justin Krauss Mr. Smithson AP English 4 15 September 2012 Beowulf's Monstrous Foes Beowulf had three monstrous encounters, Grendel, Grendel's mother, and the dragon. These could just be seen as nothing more then acts trying to explain to the reader of how heroic Beowulf was. But they reflected on some of the fears and misunderstandings that society had when the play was originally written that today we can look back and partially try to make assumptions of what they could have been talking about. His first battle against the vicious Grendel could be viewed that he wasn't an actual monster. That Grendel could have just been a disfigured or deformed human that would have been larger then the others or just had unnatural characteristics. Society would have casted them out of population because of their deformity. This would have angered them which would lead to them seeking revenge on those who cast them out. So they would return to kill them and people would view them as vicious monsters. But they would actually only be people. They could not help how they looked an d when society punished them for something uncontrollable they would become furious. Grendel’s mother was a creature that lived at the bottom of a lake out in the middle of almost forbidden forest. We could view this that they could have exiled her for giving birth to such a horrible thing such a Grendel. Then when she became aware of her child’s death, She wanted nothing more then to kill and punish those that did it. So really all she was acting out of was a motherly rage which is still very common today but they would have just made her out to be a monster since her child was a monster and the nature of her killings were so vicious. Beowulf’s final battle against

Tuesday, November 5, 2019

Reading Response to Poem To Waken an Old Lady by William Carlos Williams

Reading Response to Poem To Waken an Old Lady by William Carlos Williams Reading Response to Poem To Waken an Old Lady by William Carlos Williams To Waken an Old Lady is a poem that was authored by William Carlos Williams. The poem essentially focuses on the aspect of old age. Therefore, the writer utilizes numerous bookish tools so as to construct the poem. In my experience of reading the poem I got attracted to the manner in which the author presented the poem the use of literary devices actually affected my experience. The use aspects of content, language and form were of greatest significance in the entire poem. Other literary devices have also been used in the construction of the poem. The elements used greatly affected my response to the poem, in its entirety. The literary devices employed by the author of the poem actually affected my response to the poem. Furthermore, they made me to focus more on one aspect of the poem than the others. I was significantly drawn to the aspect of old age and its prevalent connotations. This is due to the manner in which the author applied the literary elements all through. I cannot deny the great relevance of the above elements on my experience. William Carlos Williams makes great use of several elements in the presentation of the poem. Some of these elements are language, form and content. First of all I was greatly attracted to the aspect of content. The author chose to narrow down to old age as the essential content of the poem. Actually it activated me as I read through the poem. I just appreciate their use through out the reading. The language used by the author was both poetic and simple. This served two purposes at the same time. First was the fact that the poetic language made it possible for the poem to be appealing first as a text and second as a medium of communication. Subsequently, the language was simple enough to be comprehended by the reader. The use of literacy elements by William Carlos Williams in the construction of the poem, To Waken an Old Lady is inherently commendable. The form of the poem was great and played a great role in making my response to the poem. I tended to focus on the nature of the form employed by the author on the presentation of old age through symbolism. This constituted a key cause that manipulated my reading experience as well as my response. It actually changed my perception of the poem. Generally, the application of the several elements in the poem was of great magnitude not merely in the expansion of the poem, but towards the reading experience and response. William Carlos Williams, To Waken an Old Lady is a poem that focuses on the aspect of old age. Having read through the poem, my reading, and response experience was inherently influenced by the numerous literary devices and elements used by the author. As a result, the use of language, form and content were of great significance to the presentation of the entire poem. Actually it made me to focus primary on the prevalence of old age. This was due to the fact that old age was symbolized in several elements that the author employed in the construction of the poem.

Saturday, November 2, 2019

Online booking system for parking Dissertation Example | Topics and Well Written Essays - 5000 words

Online booking system for parking - Dissertation Example Effective utilisation of resources could be attributed to the overall success of projects and avoid instances of projects failing mid-way through. Poor project planning continues to be the greatest and common cause for project failures, in different kinds of projects. Regardless of the projects being undertaken, project planning always targets to ensure efficient and effective utilisation of available resources to enhance project implementation process. The project plan shall provide essential guidelines towards execution of the project. This shall involve providing information regarding resource allocation of the various resources. Through proper resource allocation, management of the resources shall become simplified to ensure successful project execution (Kerzner, 2003). Another planning element for the project shall be ensuring effective control of the allocated resources. Controlling ensures efficacy in the utilisation of the resources through eliminating wasteful resource usage during the project implementation. Through efficient controlling process, the resources allocated for the projects shall be able to complete the execution successfully and smoothly. Project planning ensures proper and efficient utilisation of the resources through control in the use of available resources. ... Most project failures remain attributed to resource wastage, which result in resource shortage, and ultimate project failure. Controlling of the movement and proper resource allocation remains a significant contributing factor towards project success. Project charter The project begins with identification of the various parking zones, which shall be included within the online booking platform. The project aims at identifying the upmarket zones with easy accessibility and whose demand for parking remains high during peak and off-peak durations. This shall be followed by an informed analysis of the available infrastructure and capacity of the identified zones. This analysis remains essential in identifying the necessary infrastructural amendments required by different zones to ensure proper functioning of the intended systems, when installed. Upmarket zones with small parking capacity can be considered for expansion to increase the parking space; hence achieve increased earnings from t he parking sales. The project targets at utilising the parking lots with high capacity hence sustainability of the project implementation. The costs incurred in installing the system shall be recovered from the sales received following ticket sales. The project has various stakeholders being directly or indirectly involved within the project implementation. The most notable stakeholders can be identified as listed below. The local government authorities, who can be identified as the main financiers or sponsors of the project The project management team selected by the local authority. This team holds the overall responsibility of ensuring proper utilisation of project resources. Vehicle owners who shall be using the parking zones where the project shall be