Wednesday, December 25, 2019

The Bell Jar, by Sylvia Path and Lucy, by Jamaica Kincaid

Women haven’t always had the freedom that they have today. Women were supposed to live a certain life even though sometimes they didn’t want to. They had to tend to their husbands at all time, stay home and do housework while still taking care of their children or being pregnant. Women were abused physically, emotionally, and psychologically. Although women were perceived to act and present themselves in a certain way, some young women went against the cult of the true woman hood not only to be different, but to escape he physical, emotional, and psychological abuse that they will or have encountered. In novels, The Bell Jar, by Sylvia Path and Lucy, by Jamaica Kincaid both young women have the similarity to rebel against the cult of true†¦show more content†¦While at home, Esther becomes into a deep depression when thinking about her experience in New York. She doesn’t want to read, write, or sleep and she stops bathing herself. Her mother sends her to see Dr. Gordon who is her first psychiatrist whom she doesn’t like and doesn’t trust. He is the man with a good looking family, and to Esther he is conceited. He doesn’t help Esther, but only hurts her more. He prescribes her with shock treatment. After this horrifying experience, she decides to kill herself. She tries to slit her wrists, but can only bring herself to slicing her calf. She tries to hang herself but can’t find a place to tie the rope, she tries to drown herself at the beach, but cannot keep herself under water, and then she crawls into a space in the basement and takes a lot of sleeping pills. â€Å"Wherever I sat—on the deck of a ship or at a street cafà © in Paris or Bangkok—I would be sitting under the same glass bell jar, stewing in my own sour air.† (Plath pg. 117) This quote shows how she felt trapped in the bell jar, and her suicidal urges began. She awakes in the hospital to find that her attempt at suicide wa sn’t successful. She is sent to another psychological ward where she still wants to end her life. Esther becomes very paranoid and uncooperative. She gets moves to a private hospital paid for by Philomena Guinea a famous novelist. Esther improves and gets a new

Tuesday, December 17, 2019

Essay about Yaeger’s Critique of Chopin’s The Awakening

Yaeger’s Critique of Chopin’s The Awakening In â€Å"‘A Language Which Nobody Understood’: Emancipatory Strategies in The Awakening,† Patricia Yaeger questions the feminist assumption that Edna Pontellier’s adulterous behavior represent a radical challenge to patriarchal values. Using a deconstructionist method, Yaeger argues that in the novel adultery functions not as a disrupting agent of, but, rather, as a counterweight to the institution of marriage, reinforcing the very idea it purports to subvert by framing female desire within â€Å"an elaborate code [of moral conduct] that has already been negotiated by her society.† A reading of The Awakening that can envision only two possible outcomes for its heroine – acquiescence to her role as†¦show more content†¦Yaeger takes issue with Tanner’s contention that extramarital desire functions in the 18th and 19th century novel as â€Å"an attack† on the rules governing â€Å"the opposed demands of private desire and public law,† rules that are â€Å"mediated† by the institution of marriage. (Tanner 13) While Yaeger agrees with Tanner that adulterous behavior by literary heroines does challenge one expression of patriarchy, Yaeger characterizes this challenge as only â€Å"mildly transgressive,† noting that â€Å"adultery remains well within the arena of permissible social trespass.† According to Yaeger, Edna’s falling in love with Robert Lebrun is an act of social misconduct that is easily imagined by, and indeed is anticipated by, the bourgeois Creole society she inhabits. Thus, Tanner errs when he equates adultery in the novel with â€Å"the possible breakdown of all the mediations on which society itself depends†; rather, Yaeger notes, for Edna â€Å"the thought or practice of adultery†¦is actually a conservative gesture within the larger scheme of things, another mode of social acquiescence.† Indeed,

Monday, December 9, 2019

Quick Survey on Cloud Computing †Free Samples to Students

Question: Discuss about the Quick Survey on Cloud Computing. Answer: Introduction: Cloud Computing has able to grab the attention in the market by the business organization. The trend of the Cloud Computing has been increasing among the operational management of the business organization. This have helped in implementing the cloud services in the business organization. The concept of the cloud computing has been discussed with its benefits in the business organization (Almorsy, Grundy Ibrahim, 2014). Various cloud models are properly explained with diagrams. However, development of the cloud services have given rise different cyber threats in the business organizations. This security threats are discussed with proper solution to it. Cloud Computing is a set of resources, which is in demand in the market. Different new ways of business and services are proposed by the Cloud Computing. Therefore, this innovation have provided various opportunities and changes in the operation of the business organization. It has provided distributed data centers all over the world. The cloud computing have helped in creating a virtual world of services and proper delivery of it. Different companies are providing cloud-computing services including Google Engine, Oracle Cloud, Amazon Web Services and Office 365 (Almorsy, Grundy Muller, 2016). These companies have successfully provided cloud services to different organizations and users in all over the world. Cloud computing have created a web based network that initializes different online services to customers and organizations all over the word. Cloud Computing is distributed architecture, which helps in centralizing server resources on scalable platform and provide on demand com puting resources. Cloud computing helps in providing in demand service to the customers. The hackers access databases in cloud environments with the help of hacking techniques including session hijacking and network channel eavesdropping. Cloud computing has accelerate the growth of the company by empowering the workforce and transforming the business operations. The solutions have been developed by the cloud computing that signifies the vision of the company with maximum flexibility and minimum risk (Au, Fung Tses, 2016). Most of the business organizations are using the cloud services to meet requirements of the clients and employees of the company. There are has been logical progression in demand of cloud computing in market. Features of Cloud Computing There are various features of the cloud computing that are discussed below: The cloud computing has able to provide on demand services to the customers. The availability of cloud services have helped in meeting the requirements of the customers in market. The cloud computing services are available and accessible from any part of the world. Therefore, it helps in providing location independent services all over the world. The resources of the cloud computer can be accessed from anywhere on the demand of the user. The cloud computing have able to provide elasticity in its services by scaling up and down to minimize the time required for availing the resources of cloud computing. The cloud services that are shared with public and can be modified and accessed by any user is known as public cloud (Almorsy, M; Grundy, J; Muller, 2016). The data and information stored in the pubic cloud can be used by any user in the organization. Therefore, the security in the public cloud is preferably less than other cloud types. This type of the cloud provide the most secured services to the customers. The data and information stored in the private cloud is not shared with other parties (Hussain et al., 2017). This cloud might be organized by an organization for storing their private and important documents and information over the cloud. The private cloud is an expensive service due to its high security systems. Hybrid cloud is combination of different cloud architecture including public, private and community cloud. Different organization use this type of cloud according to their needs. Some data and information are shared with the customers and employees that are stored in the public cloud (Abdallah et al., 2017). The confidential data and information are stored in private cloud. Therefore, organization have flexibility of using their own cloud architecture according to their needs. The community cloud deals with the sharing of the cloud services between the organizations of the same community. This cloud is maintained by third party or by organization (Demchenko et al., 2017). The community cloud infrastructure can be internally and externally fixed that helps in providing the cloud services to the community. Community cloud consumers look for economies of scale while at same time minimizing costs related with private clouds or hybrid clouds and public clouds Service Model of Cloud Computing Cloud computing services models helps in providing various services to the customers and organization according to their needs and requirements. The common service models of cloud computing are discussed below: User used to avail all the infrastructure of the computer system through internet. This service is known as Infrastructure as a service (IaaS). There are various web based databases and architectures provided by cloud computing that helps in meeting the infrastructural requirement of user and organization (De Carvalhoet al., 2017). Therefore, the cloud computing has able to provide database, backups, networks and other infrastructural facility to the companies through internet. This has increased the versatility of the cloud computing in the computer organization. The benefit of the IaaS is that the user only pay for actual use of infrastructure. Platform-as-a service (PaaS) helps in providing platform where any software can be made, modified and executed for testing purpose. This platform can help in operating the entire life cycle of the software. The service model is suitable of application developers, testers and administrators in an organization. PaaS includes the environment for developing, compiling, testing and programming languages for modifying the required changes in the software (Perez Kumar, 2017). Therefore, the cloud computing us able to provide these services to the companies at a low cost online. Therefore, the company can use these services online from any server and place. This is one of the most used services used by the users and organization in the market. Various software are costly in the market that a business cannot afford for use. Therefore, cloud computing helps in providing this costly software at a low cost for rent. Various software and applications are rented on a monthly basis as per the requirement of the company in the market. Therefore, this reduces the initial cost of the company for stating the business (Burns et al., 2017). For example, Gmail is a SaaS provider that helps in providing free storage up to a limit for the users. SaaS helps in eliminating all the possibilities of installing and maintaining software and application for organization. Therefore, it helps in reducing the cost of the software for organization in the market. Market Size of the Cloud Computing Cloud computing has been enhancing among business organization in the market. According to the study reported by Forbes, global market of enterprise cloud-based services have grown from $12.1 billion in 2010 to $ 35.6 billion in 2015. Growth rate has been 43 % in 2011 and decreased to 13 % over the next five years (Cloud Security Alliance, 2017). SaaS have 70 % revenue in 2010, 30% is related with the IaaS. As per the report of the IDC, revenue from public IT cloud services exceeded $ 16 billion in 2009 to $ 55.5 billion in 2014. The worldwide spending on the pubic cloud services has grown up to 19.4 %. The Compound Annual Growth Rate has been nearly $70 billion in 205 to more than $141 billion in 2019 (Luitinfotech, 2017). Worldwide Public IT Cloud Service Revenue in 2018 is predicted to be $127B. SaaS and PaaS portion of cloud hardware and infrastructure software spending are projected to reach $55 billion in 2026. Cloud Security Issues The use of the cloud computing have helped in development of organizations. However, it has faced various security issues over the internet. Some of the main security issues are discussed below: Confidentiality refers to set of rules and regulation that monitors the working and functionality of the tools and techniques used in the cloud computing these of the security measures for securing data and information has been continuously lacking in case of cloud computing. Therefore, confidentiality refers to securing data and information of customers and organizations in the market. The use of personal information of users is not acceptable in the organization. The security of data and information of customer is the prior thing for organization (Cimler et al., 2015). The cloud computing has helped in storing the personal data over the cloud storage. However, there have been many cases of data breach from the cloud storage over the internet. The security protocol of the cloud computing has been attacked by the hackers over the internet. The cloud computing consist of three layers including Software layer, Platform layer and Infrastructure layer. The Software layer provides interfa ce for user to use services of cloud computing. The platform helps in providing platform and environment for executing software by developer (Coppolino et al., 2017). The infrastructure layer helps in providing the hardware components including network and storage. Therefore, the hackers can attack at any of the three layers for accessing the data and information of the company over the cloud. The storage of the data an information at the remote location with the help of cloud computing might causes issues in the organization. The location of the data and information is only known by the data owner. Therefore, in the absence of the data owner, data and information is unable to access by the organization in emergency cases (Coughlin, Keller Wustrow, 2017). Therefore, threats to availability of the data and information is prevailing in the organization with use of cloud computing. The cloud computing is responsible for providing on demand services to the customers. Therefore, in the absence of the data owner, it can fulfill the requirement of the clients that violates the Service level Agreement for the cloud computing. The integrity of the data and information is an important in maintaining the database of the cloud. It is good process for storage of data in a secure way persistent data storage, which can be, reclaim or retrieved in same layout, as it was stored later (Dang-Pham, Pittayachawan Bruno, 2017). Therefore, integrity and monitoring of the data and information for minimizing data corruption and data crash in the server. Virtualization and multi tenancy Virtualization and multi tenancy are the two basic factors in use of the cloud computing in the business organizations. The traditional way of hosting applications involves the use of operating system on physical layer. Therefore, thus type of traditional hosting method has been used for creating a functional efficient cloud. These can be achieved with the help of linking multiple servers using Virtual LAN (VLAN) (Dave et al., 2017). However, this process is insecure and inefficient for long term, as huge part of physical hardware is not used. Therefore, Virtualization has helped in maintaining these issues in the cloud computing the Virtual Machine Monitor (VMM) has been created for a single physical server that can host multiple server at a time in the operating system (Mohammad, Kak Alam, 2017). Therefore, a single server can act as multiple processing server at a time. It has enhanced the efficiency of the hardware and enhancing its performance. The virtual layer is also known a s hypervisor. Two ways of using this hypervisor for running virtual machines (VM) (Krishna et al., 2016). These are known as full virtualization and paravirtualization. A VM deployed using full virtualization has emulating BIOS and drives of the OS, in addition to the other functions. There are two architectures for deploying virtual machines hosted architecture. The hosted architecture, the virtual layer is handled by server. The application is charged for keeping up the virtual machines in the operating system. However, the hypervisor architecture skips operating system and runs directly on hardware. Multi tenancy helps in allowing multiple sharing if the computing resources in logical separation of the users in the tenant of a system. In the context of cloud computing, each virtual machines are consider as a tenant of the system (Lin Liao, 2017). Multi tenancy is not limited to the multiple virtual machines that are running in the same hardware. Software and applications are able to use multiple tenants for enhancing the efficiency of the virtual machines in the operating system. In IaaS cloud models, users create new drives on virtual machines and store data on those drives (Luna et al., 2017). However, data in all three-cloud models can be accessed by unauth orized employees and external hackers. Data Encryption Schemes Various security issues discussed in the earlier sections. However, there are some solutions for mitigating the issues in the cloud computing related to security of the data and information. The Proxy Re-encryption is cryptographic scheme that translate cipher texts from one encryption key to another key. After that, PRE forwards encrypted messages without showing clear text to the potential users. A proxy re-encryption algorithm translates a cipher text under a public key PKa to cipher text PKb along with re-encryption key RK A B. In this encryption scheme, IP address or email addresses can be used to formulate public keys for users. The sender uses recipients identity as the public key to encrypt messages in identity based encryption technique. The proxy requires proxy keys, or re-encryption keys, to perform translations without being reading original message (McCormac et al., 2017). The IBE technique has various practical applications including attribute-based delegations, secure email forwarding, and access control in networked file storage. This encryption scheme deals with a proxy server that helps in maintaining additional information that can be transform into cipher text under various attributes into a new cipher text on the same message. Therefore, the data provider might get the original text that helps in sharing the cipher text in the message. In this scheme, private key user has an asset of attributes that helps in providing encrypted cipher text that might specify an access policy (Modi et al., 2013). In this scheme, the data is encrypted in the storage on various server that helps in maintaining back up for the original text and message. In a key private PRE, the proxy and set of users are never derived by message recipient from cipher text and public keys. This scheme helps in helps in providing key privacy for proxy re-encryption schemes in which proxy performs all translations that cannot distinguish the identities of participating parties (Mishra, 2017). It can be concluded that the use of the cloud computing in the business organization have helped in maintaining the development of the organization. The benefits of cloud computing has been discussed properly. The growth of cloud computing in market has been rapid due to its on demand services provided to the customers. The use of the cloud computing has helped in maintaining the business goals and objectives of the company in market. The security and privacy of the data and information has been properly maintained by the cloud computing by using various strategies. The virtualization technique in the operating system has helped in enhancing hardware of the computer system. The use of the virtualization process has helped in maintaining the performance if the operating system in the computer system. Various encryption technique has been discussed in the assignment for mitigating the security issues in the cloud computing. References Abdallah, E. G., Zulkernine, M., Gu, Y. X., Liem, C. (2017, July). TRUST-CAP: A Trust Model for Cloud-Based Applications. In Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual (Vol. 2, pp. 584-589). IEEE. Almorsy, M., Grundy, J., Ibrahim, A. S. (2014). Adaptable, model-driven security engineering for SaaS cloud-based applications. Automated software engineering, 21(2), 187-224. Almorsy, M; Grundy, J; Muller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107. Au, C. H., Fung, W. S., Tses, A. (2016). An investigation on the relationship between control self-assessment, cloud security, and cloud-related business performance-using partial least squares. In Industrial Engineering and Engineering Management (IEEM), 2016 IEEE International Conference (pp. 1879-1883). IEEE. Behl, A., Behl, K. (2012). An analysis of cloud computing security issues. In Information and Communication Technologies (WICT), 2012 World Congress (pp. 109-114). IEEE. Burns, A. J., Posey, C., Courtney, J. F., Roberts, T. L., Nanayakkara, P. (2017). Organizational information security as a complex adaptive system: insights from three agent-based models. Information Systems Frontiers, 1-16. Cimler, R., Matyska, J., Balk, L., Horalek, J., Sobeslav, V. (2015). security issues of mobile application using cloud computing. In Afro-European Conference for Industrial Advancement (pp. 347-357). Springer, Cham. Cloud Security Alliance (CSA)s Security Guidance for Critical Areas of Focus in Cloud Computing (2012). CSA, April 2012. Available Online at: https://cloudsecurityalliance.org/csaguide.pdf. Coppolino, L., DAntonio, S., Mazzeo, G., Romano, L. (2017). Cloud security: Emerging threats and current solutions. omputers Electrical Engineering, 59, 126-140. Coughlin, M., Keller, E., Wustrow, E. (2017). Trusted Click: Overcoming security issues of NFV in the Cloud. In Proceedings of the ACM International Workshop on security in Software Defined Networks Network Function Virtualization (pp. 31-36). ACM. Dang-Pham, D., Pittayachawan, S., Bruno, V. (2017). Why employees share information security advice? Exploring the contributing factors and structural patterns of security advice sharing in the workplace. Computers in Human Behavior, 67, 196-206. Dave, D., Meruliya, N., Gajjar, T. D., Ghoda, G. T., Parekh, D. H., Sridaran, R. (2017). Cloud security Issues and Challenges. In Big Data Analytics (pp. 499-514). Singapore: Springer. De Carvalho, C. A., de Castro Andrade, R. M., de Castro, M. F., Coutinho, E. F., Agoulmine, N. (2017). State of the art and challenges of security SLA for cloud computing. Computers Electrical Engineering. Demchenko, Y., Turkmen, F., Slawik, M., de Laat, C. (2017). Defining Intercloud security Framework and Architecture Components for Multi-Cloud Data Intensive Applications. In Cluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM International Symposium (pp. 945-952). IEEE. Hussain, S. A., Fatima, M., Saeed, A., Raza, I., Shahzad, R. K. (2017). Multilevel classification of security concerns in cloud computing. Applied Computing and Informatics, 13(1), 57-65. Krishna, B. H., Kiran, S., Murali, G., Reddy, R. K. (2016). security Issues In Service Model Of Cloud Computing Environment. Procedia Computer Science, 87, 246-251. Kshetri, N. (2013). Security and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), 372-386. Lin, I. C., Liao, T. C. (2017). A Survey of Blockchain security Issues and Challenges. IJ Network security, 19(5), 653-659. Luitinfotech. (2017). Cite a Website - Cite This For Me. Luitinfotech.com. Retrieved 23 November 2017, from https://www.luitinfotech.com/kc/what-is-cloud-computing.pdf Luna, J., Taha, A., Trapero, R., Suri, N. (2017). Quantitative reasoning about cloud security using service level agreements. IEEE Transactions on Cloud Computing. McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M., Pattinson, M. . (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, 151-156. Mishra, A. (2017). Cloud Computing Models: Background, Data security, security Issues. Journal of Web Development and Web Designing, 2(1,2). Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. Mohammad, A., Kak, S. M., Alam, M. A. (2017). Cloud Computing: Issues and security Challenges. International Journal, 8(2). Perez, M., Kumar, S. (2017). A Quick Survey on Cloud Computing and Associated Security, Mobility and IoT Issues. Journal of Computer and Communications, 5(12), 80.

Sunday, December 1, 2019

Story of my life Essay Example

Story of my life Essay The Story of My Life Interesting enough, my life began on a Thursday night, on December 17, 1987 In Atlanta Georgia, where I was delivered at 9. Pm to my mother, Ruth Dye and father, Tony Jiffies. I was the second child for my father and the third for my mother. I Just didnt know anybody or where I would end up In life after that moment. As I grew up, my life changed at each milestone In a person life. I had a rough and very fun childhood. I remember playing outside with family and friends, eating around the dinner table with my family and sleeping with my grandmother until I was 15 years old. My life was filled with more great memories than the bad, even though lived in poverty stricken neighborhood. My grandmother never once, made it seem that way because she made sure we were fed, bathe and had clean clothes and shoes on our feet. Even though, neither my mother nor my father was in my life, when I was younger, my father decided to change that when I was 15 years old. He wanted me to be more than cousins that had three kids on their hips and one on the way. He told me, If you are ready to leave, you can go with me, right now. I was hesitant at first, but I decided this might be my chance to get out of the situation I was In. At that point, my grades had started slipping, I started not to go to school, but I know I TLD want that for myself. I took that leap of faith and I went with my dad and the rest Is still writing its story. We will write a custom essay sample on Story of my life specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Story of my life specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Story of my life specifically for you FOR ONLY $16.38 $13.9/page Hire Writer