Thursday, December 26, 2019

Project Evaluation And Review Technique Essay - 714 Words

Project Evaluation and Review Technique (PERT) and Critical Path Method (CPM) decision support systems are widely used for projects management. Traditional PERT relies on engine called stochastic analysis that focuses on managing schedules for stochastic project environment. Therefore, the estimated schedule is highly stochastic. A good approximation in beta distribution is obtained only when cv ≠¤ 0.66. But it is found that 80% of the projects violate the approximation limit that is provided by the beta distribution calculation of PERT. Beta distribution generally reliance on subjective estimates, underestimates stochastic variations. PERT engine with simulation is combined with risk registers to discover disruptive events. Modern project management DSS do not include PERT or CPM in estimating schedule. But PERT still has room for improvement in scheduling. Thus, the improved version of PERT, neglecting all the limitation stated above is proposed in the paper (PERT 21). PERT 21 uses stochastic engine to achieve valid stochastic schedules. PERT 21 do not require excessive user inputs and provides valid risk analysis. PERT 21 ensures calibrated estimation using historical data and models stochastically-dependent processing times by lognormal distribution with linear association. As per Central Limit Theorem (CLT), more random variables yield a perfect lognormal approximation in estimating the sum of independent random variables. But, it provides negative results when theShow MoreRelatedProject Management : Program Evaluation And Review Technique874 Words   |  4 Pagesimportant techniques that a project manager must master is the Program Evaluation and Review Technique (PERT) or Arrow Diagram Method (ADM) as known by the Project Management Institute. This method is one of the most common scheduling models in project management (Meredith Mantel, 2009, p 21). A method that analyzes the probabilities of a project finalizing on time. The PERT identifies the worst, best and most likely case scenarios and aids the project manager in developing a simple project scheduleRead MoreImproving The Poor Estimating Methods Of Using Dummy Variables765 Words   |  4 PagesIn the event there was poor estimating techniques used will cause risk management into the process to have to overcome unknowns. Some techniques to improve the poor estimating techniques is developing the process. According to Kerzner (2013), functional managers typically allocate the possibility additional required time or cost for cushion. The inflation of the allocated time or cost will time to ratify challenges. But in order to prevent poor estimating time in the future our organization can talkRead MoreTechnical Evaluations and Competitive Pricing1467 Words   |  6 PagesPrice Evaluations and Price Reasonableness by for Fall 2013 The need for timely and accurate technical and cost or price evaluations and determinations of price reasonableness of multi-billion dollars bids is a critical part of the public sector procurement process. To determine what is involved, this paper provides a review of the relevant literature concerning the need for technical evaluations and factors to be used in determining the competitive range. An outline of the final evaluation reportRead MoreThe Importance Of A Project Management Skills1117 Words   |  5 PagesThe importance to teach project management skills through this course cannot be emphasized enough as it remains to be the most sought after expertise for organizations across the work force industry. The knowledge imparted through this course has influenced the ability to manage projects by introducing specific frame work customized to the project needs. As the coursework required analyzing projects from diverse industries, it provided an opportunity to assess the projec t cycle with respect to theirRead MoreThe Need For Peer Review Evaluation System1371 Words   |  6 PagesPeer Evaluation System Introduction The need for peer review evaluation system helps in evaluating the work done by different students, who poses the same level of competency. Through this method, it is possible to set out the standards for quality check, which is required for improving the performance. The demand for academic review across different universities has increased. This helps the students to conduct a detailed analysis of the situation or the project that has been carriedRead More Time and Cost Estimating Techniques Essay1233 Words   |  5 Pagesand Cost Estimating Techniques Estimating work times provides several benefits for the project manager. It gives an idea of the level of effort required to complete a project. This information then enables the project manager to produce a realistic plan based upon that effort. Estimating also helps the project manager anticipate the budget for the project. There are many formal techniques available to estimate time and cost for activities. Please refer to the Project Management Reference Read MoreStudy Guide1489 Words   |  6 Pages.......................................................................4 Course Outline ...........................................................................................................................................................5 Evaluation and Grading .............................................................................................................................................9 Study Guide .............................................................................Read MoreThe Need For Intravascular Catheters Are Evidently Clear1480 Words   |  6 PagesACE star model is considered a framework for the systematic integration of evidence into practice. The model is composed of five major stages; discovery, evidence summary, translation into practice recommendations, integration into practice and evaluation. The first stage of the model focuses on gathering knowledge through research and scientific inquiry. Research results are generated through the conduct of a single study, which builds the bulk of research about clinical actions. In the second stageRead MoreWhat I Have Majored And Systems Engineering ( Ise ) For One And A Half Years At Virginia Tech1114 Words   |  5 PagesTravelling Salesman Problem were so similar to problems we met at Tibet. Got inspired by the algorithms, I designed a project named Application of OR Methods to Education Volunteering. This project used Ant Colony Optimization to optimize home visiting routes covering 8 villages, Hungarian method to appoint 14 teachers to different courses, and Program Evaluation and Review Technique to schedule daily activities. During the next year, a volunteering team in Sichuan Province used these methods and theyRead MoreModule Evaluation Survey863 Words   |  4 PagesThis individual report is based on a portfolio of evidence from our group project, from the initial research, through design, development and testing of a user-centred organisational system, in our case a university questionnaire designed to evaluate modules taught at the university, filled by the current students and based on their module-related experience. Aim of the project was to create user-friendly module evaluation survey containing the most relevant student experience data which results

Wednesday, December 18, 2019

The Day Of Diwali Festival - 1087 Words

Assignment#4 Leadership Diwali festival is the most celebrated event in India and Indian migrants living in Corning and nearby town get together every year in this local community. The group is called â€Å"Southern Tier Indian Cultural Association† (STICA). On October 28th, 2015, the first Diwali event team was formed and finalizing the event date of November13th, 2015 and also decided to have potluck dinner format for food instead catering from a restaurant. I took the lead role of putting together food menu and incorporated suggestions received from other event team members. I needed volunteers for contacting and distributing food menu choices to the attendees of the event. The team members who have graciously agreed to help me were Raj Ponnusamy, Nitya Thangasamy, Uma Janakiraman, Sudha Jayaraman, and MalarGunasekaran. The items included in the food menu are the following: Appetizers (Masaal vadai, Kesari), Entrees (Idli, Chappathi, Lemon rice, Sambar satham, Yogurt rice ), Sides (mixed vegetable curry, potato curry, coconut chutney, peanut chutney), and Desert (laddu, payasam, rasa malaai). It should be noted here that there is no meat involved in any of the dishes planned, since we all follow vegetarian food during religious events. The event team members also shared volunteering for communication (phone tree emails), hall decorations and clean up services. The total head count of attendees was collected (60 adults and 12 children) via RSVP by phone andShow MoreRelatedAn Inside Look at the Diwali Festival Essay1235 Words   |  5 PagesDiwali is one of the largest festivals found within Hindu tradition. Jains, Sikhs, and Buddhists also celebrate this festival (Dilwali). It is a festival of happiness celebrated by Hindus all around the world. It is five continuous days, each day having an ideal or thought and being based on a legend. The legends differ based on what part of the world Diwali is being celebrated in (Festival). It is the harmo ny between these five ideas that makes Diwali such a special festival for Hindus (Diwali:Read More DIWALI -THE FESTIVAL OF LIGHTS Essay881 Words   |  4 Pages Diwali rituals Diwali, the festival of lights, is one of the important and widely spread holidays celebrated in India. It is a celebration of lights, and for many, it is truly a sensory experience; some families decorate their houses with all sorts of lights and open up to the neighbors, sharing their love and their food. Those celebrating Diwali spend time with family and friends. They perform religious ceremonies to bring in wealth and prosperity for a new year, cook and eat delicious foodRead MoreA Speech On Indian Festivals1336 Words   |  6 PagesName: Anusha Bontha Topic: Indian Festivals General Purpose: To Inform Specific Purpose: After listening to my speech, my audience will have a better understanding of the scientific and practical explanations behind certain rituals and customs of Indian festivals. I. Introduction A. Many of us identify Indian festivals to be of colorful dresses and rituals, rainbow of food choices and lots of music and dancing. B. Have any of you ever wondered the reasons behind all this pomp and show? C. AccordingRead MoreEssay on Freedom of Speech on Social Networking Sites817 Words   |  4 PagesDiwali festival is also known as Deepawali which is celebrated throughout India with great enthusiasm. Information on diwali includes, Diwali festival is one of the most popular festivals throughout the world. It is celebrated on the Amavasya day, that is the 15th day of the Kartik month. Kartik is the month according to the Hindu calendar that falls in October/November according to the English calendar every year Diwali festival is celebrated as the festival of lights. Throughout the world, DiwaliRead MoreFestival and Its Environment Impact1576 Words   |  7 PagesFestivals of India Indian festivals are both colourful and extremely joyous. People enjoy the festivals with family and friends. The religious significance of the festivals too can hardly be denied. Here are some of the very popular festivals that take place throughout India. There are many festivals in India like Durga Puja,Navratri,Dussehra,Ganesh Chaturthi,Holi,Diwali,etc. In India, festivals do not just offer people a temporary reprieve from their daily grind. Imbued with deep inner significanceRead MoreLakshmi, The Hindu Goddess Of Wealth And Prosperity1101 Words   |  5 Pagesfavorable day to worship Lakshmi is said to be on Friday’s. Diwali is a time where majority of Hindus worship goddess Lakshmi. The festival of Diwali is most famous to be celebrated annually during the months of October or November. Religiously talking the festival symbolizes the â€Å"triumph of light over darkness, knowledge over unawareness, good over evil and hope over misery†. The night before the festival people restore and clean their homes and workplace. On the actual night of Diwali, Hindu worshippersRead MoreSikhism Religion: Gurpurb1683 Words   |  7 PagesMelaas-Swanson LSFY 102-32 31 January 2011 Sikhism Religion: Gurpurb A festival is a celebration of life. Festival is harmonious, rich, varied and colorful. A festival is a celebration which breaks the tedium of life. They bring peace and joy to the multitudes. Festival provide as symbol to the cultural, social and domestic life of the people. There are different kinds of festivals celebrated around this world. There are festivals based on legends or persons believed to be blessed with supernaturalRead MoreHindu Festivals846 Words   |  4 PagesHINDU FESTIVALS Hinduism is the worlds oldest religion. Its roots date back to 4000 BC. Hinduism is widely spread out in India and around South-East Asia. Hinduism is a polytheistic religion, believing in many gods. Most of the festivals in Hinduism are centered on one or more gods. Hindus celebrate thousands of festivals every year at every part of the world. Each of the Hindu festivals is celebrated in a similar manner. They all include chanting prayers to the gods and making sweets or snackRead MoreCelebrations a Waste of Money?967 Words   |  4 PagesCELEBRATIONS Festivals are an occasion for us to spend quality time with our family. Most of us hardly know our first and second cousins, aunts and uncles. Our festivals are designed in such a way that we get to meet everybody and perform rituals together, which in turn promotes social unity and brotherhood. At times, certain expenditures are needed to make a festival lively; this helps us spend quality time with the family. To get the feel of the day and make it different from the normal days, you doRead MoreThe Celebration Of A Festival1986 Words   |  8 PagesDiwali, a festival which has been part of my life for seventeen years was suddenly gone, as soon as I left my country. I always felt I was missing a part of me. Coming from a country where we celebrate different festivals, I felt incomplete witness only few festivals, than I learned to compromise and adjust to the situation. Pretty soon I learned that I was wrong every time I was made to believe that Stonehill is not diverse and it is v ery exclusive bubble. I soon realized that Stonehill has a thirst

Tuesday, December 10, 2019

Travel Alone-Preventive Measure free essay sample

Certainly, travel is more than the seeing of sights; it is a change that goes on, deep and permanent, in the ideas of living. (Miriam Beard) Nowadays, traveling alone has become one of the favorite recreations for many people. Why traveling alone? The bottom-line still retains on the fact that It Is better than books in terms of accumulate knowledge and experience. In solo travel, we directly come across people of different caste, creed and we may develop the virtues of painstaking, patience, endurance and frugality.However, (Pearce, 1988 p. 8) suggested that concern with personal security Is a major factor In the decision making process through which Individuals make their travel choices. Indeed solo travel still possesses certain perils. Thence, preventative measures for Instance accentuate personal security In accommodations, stash the valuables and learn self- defense techniques are crucial to achieve a tranquil outing.As propose by Change (2009), risks In tourism stem from two mall sources: a lack of knowledge about the tourism destination especially compared to usual place of accidence, and lack of knowledge of future conditions, ranging from the weather to extreme natural or societal hazards. We will write a custom essay sample on Travel Alone-Preventive Measure or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Thereby, do pay attention on personal safeness in accommodations when travel alone because it can seem daunting since away from the comfort home and exposes to various menaces. For example, for single travelers need focus to room locking system which include key card locks due to it is more secure than old fashion keys.In addition, it is encourage to utilize the do not disturb sign on the doorknob whenever take a lift. This can create an illusion that he room is occupied and discourage the wrongdoing of transgressors. Besides that, do approach the concierge regarding the area to avoid. They can assist us to choose the safest and quickest routes for excursions. In short, threats such as murder, abduction and robbery can be lessened during traveling alone by pinpoint the own safety and security in accommodations. All in all, traveling solo do allow for a time of relaxation, introspection and self- indulgence.

Monday, December 2, 2019

The Beginning of Christian Art Essay Example For Students

The Beginning of Christian Art Essay In the first two centuries of Christianity there werent any form of art recorded. Christians meet in small groups in a private phone and conducted simple services. In these services they would eat wine and bread that reminded them of Christ sacrifice on the cross. (Lamm 175) Christian symbols were a major form of art in the earlier years of Christian art. The Egyptian, Greek, and Romans artist had different symbols that represented different things. The Greeks created gods of their own image. For example, Zeus with the thunderbolt. This symbolized that this was the god of power. (176) Some artist am e up with a variety of solutions using biblical stories, parables, and symbols to design Christian art. (177) In the age of Constantine, Constantine proclaimed freedom of religion in the Edict and Milan in 313. For centuries basilicas were constructed by the Romans. The basilicas served as meeting halls, mercantile centers, and halls of justice. There were two basilicas that were built in the early centuries. They were Old St. Peters and St. Pauls. We will write a custom essay on The Beginning of Christian Art specifically for you for only $16.38 $13.9/page Order now The outside walls of St. Paul were destroyed by fire in 1823 and rebuilt in 1854. (180) In 404 Ravenna became the capital of the Western Empire under Honorius. Ravenna fell nder Odoacer in 476, but emerged as the capital of Theodoric Ostrogothic kingdom between the years of 489-526. Ravenna concluded its royal careen as the western capital of Justinians Byzantine Empire during 527-565. (181) Justinian marked the beginning of the Byzantine style from 527-565. It was notable for artistic production and for Justinian legal code. Operating from his capitals of Constantinople in the East and Ravenna in the West, Justinian was the emperor of the Roman and Oriental potentate, in witch later became Byzantine Empire. (183) In 330 Constantine was known as New Rome. The city was very popular. It was the sumptuous of Byzantine civilization for over 1,000 years. The faith of Orthodox was totally dominate in that city. In 532 the Blues and Greens rival chariot-racing joined forces and revolted against the autocratic rule of Justinian and Theodora. The imperial troops put down the revolution by slaying about 30,000 people and most of the public buildings were destroyed, including Basilica of Hagia Sophia (The Church of Holy Wisdom). (185) Because the first Hagia Sophia was destroyed, Justinian hired a mathematician to design another one. The new Hagia Sophia was beautiful. It was nothing like anything the Roman or he Byzantine had ever seen. The empire was flooded with lights and windows everywhere. Twenty-one years after the building was built the dome of it collapsed. Byzantium never produced another structure equal to the one in Hagia Sophia. Now today Hagia Sophia is a museum. (186) Terminating the first Byzantine golden age, Iconoclastic controversy lasted mostly on that off from 726 to 843. Leo III ordered the destruction of all images of Christ, saints, and prophets. A religious issue based on the commandment forbidding graven images, caused a controversy between church and state. In 843 Empress Theodora allowed those images again. The controversy renewed the interest in secular art and late classical motifs. This set the stage for the second Byzantine age of ca. 900-1100. (186) St. Marks of Venice was the most decorated and largest church in the second golden age. One of the master pieces in St. Marks was a plaque of the archangel St. Michael. This colorful piece of art was so typical of Byzantium that it can be used to define Byzantine style. (186-187) The Byzantine style of painting, architecture, and decorated arts moved throughout Balkan, into Russia, and as far West at to Sicily. Byzantine influenced the Western art of the Middle Ages. (187)

Wednesday, November 27, 2019

Mechanical Engineering essays

Mechanical Engineering essays Since I can remember I have always been interested in automobiles. When I was young however I wasnt to sure how I wanted to use that interested and make a career out of it. I juggled around a few ideas: bus driver, gas station employee, taxi driver, etc. It wasnt until I got older however that I realized how low down those jobs were. So I looked around to find a higher-class job that paid more money. My older brother mentioned to me about Mechanical Engineering and designing cars. Of course that would be the perfect career for me, decent pay, easy job, and for me it would be an enjoyable job. Besides designing cars a Mechanical Engineer can do many different jobs. Their takes may include researching, developing, designing, manufacturing, and testing mechanical devices, such as engines, machines, and other mechanical devices. Many times Engineers of this field will use computer programs like CAM and CAD to help them design many of their projects. There are several Engineers working in agriculture, transportation, manufacturing, and government positions. For a person to get into this field it is usually required to go to college for four years or more depending on the exact position you would like. People going into this career path need to have skills in math, science, and be able to work well with you your mind. People in this field need to be able to solve complex problems as well being able to apply math equations. The job outlook from now til 2010 is to grow as machinery becomes more complex and harder to understand. In 2000 Mechanical Engineering held about 221,000 jobs. Most of the positions held were in the manufacturing industry. As far as salary goes it depends on experience and education. It is usually necessary for you to have 5 years experience making it hard to get into this career field. Bachelors degree 48,426, masters degree 55,994, and Ph.D. 72,096. The average salary however ...

Saturday, November 23, 2019

Smoking in Public Places Should Be Banned Essays

Smoking in Public Places Should Be Banned Essays Smoking in Public Places Should Be Banned Essay Smoking in Public Places Should Be Banned Essay Smoking has always been a big tradition among adults. As time passes it is becoming a object that teenagers use for social stability. It is not popular to the teenagers to smoke alone. They need the gratification of other people seeing them smoke. This factor leads them to smoke in public places. They don’t take in consideration how it will affect the other people in their area. I disagree strongly with people smoking in public places. One of many reasons I disagree with public smoking is the health of the people around the smoker. People will light a cigarette anywhere not thinking about how it could affect individuals around the smoker. Many people have very strong allergies toward cigarette smoke. Second hand smoke impacts some people’s health severely. There are cases where a person had difficulty breathing due to someone smoking in a restaurant where the victim was eating. The odor left behind from a smoker is a smell that cannot be changed. The smoke leaves a sticky residue that is nasty. Letting people smoke in restaurants actually downgrades the class of a restaurant. Ashes are another contributing factor that makes smoking in a public place wrong. No one wants to set down and look at the light in a restaurant and see smoke and ashes floating around the food bar and all the other people in the restaurant. Many people will not eat in a restaurant where they allow smoking. Smoking is a habit that should be put out of our everyday life. It is an unnecessary part of culture that has destroyed the health of many young adults. Smoking should be banned from every public place. There should be no designated smoking area in a restaurant, or any other public facility. Pollution is another big issue. Smoking is a cause and form of pollution. There is a lot of research that shows many kinds of gases that are released by smoking are harmful for the environment, such as tar and carbon dioxide. Everyone knows that now the environment is getting worse and worse. Everyone needs to do their part and stop smoking. I want to say there are no reasons left to permit smoking in public places. I think that maybe this is the time for people to quit smoking. Smoking hurts everyone not just the smoker. It has worsened the lives of many people for ever. Banning smoking is not just for us, but for everyone who has to live in this world after us.

Thursday, November 21, 2019

View on the American History Through The Name of War by Jill Lepore Essay

View on the American History Through The Name of War by Jill Lepore - Essay Example The writer intends to make the reader understand how the English people and the Indians survived the King Phillips war (1675-1676) and how the two tribes revived after the war. The writer says that the war was one of the most flaming wars in American history and more casualties than any other war. Indians had attacked twenty-five English towns which were more than half the colonial towns and, as a result, pushed the English borderline back to the Atlantic coast (Lepore 54). In response to this attack, the England natives killed thousands of Indians and surrounded their villages ensuring they starved to death due to hunger and diseases. The natives also shipped away from the survivors into slavery in the West Indies. The writer of the book describes the events in a fascinating manner that captures the readers' mind and prompts the reader to believe her arguments. The war demonstrates the experiences of the British colonialists and the natives that lay the foundation for the competition between the Europeans and the Indians over control of the continent. The writer also criticizes and corrects other histories write when she says that the book is a study of war and also a study of how other people write about war. The target audience if the book is the Native Americans and the Indians and the writer constantly reminds them of the unfinished and parochial nature of memory and history. Jill writes from a theoretically informed perspective although her use of words makes the story very interesting and even prods one to think as if it is from an eyewitness. Her story focuses on the realities of the war as opposed to what people think or what other documentary evidence have shown. Unlike many other historians, she covers the immediate causes of the hostilities that resulted into the war and narrates the story as a neutral party. She reveals that the English were not the victims of the war since they essentially instigated the war (Lepore 147).  

Wednesday, November 20, 2019

Learning Styles Essay Example | Topics and Well Written Essays - 1000 words - 1

Learning Styles - Essay Example In this model there are five ways that our brain processes: Visual, Auditory, Kinesthetic, Gustatory, and Olfactory. According to Ellerton (2003), "these modalities are the primary ways we represent, code, store and give meaning or language (linguistic) to our experiences". (par. 1). However, we work with the Visual, Auditory and Kinesthetic (VAK) areas most of the time, according to this model. The model states that we use more than one of these VAKS, depending on what we are doing. For instance, when we listen to music, we are feeling the music (kinesthetic), listening to it (auditory) and some picture is coming to mind (visual). Usually one of these is a "preferred" mode for a learner to use. Individuals have the ability to move from one to the other easily. According to this model Visual learners tend to be neat because they want to "look good." Their decision making tends to use visualization and they have insights that they share. They remember faces more than names and they want to see the big picture (Ellerton, 2003, par. 8). The auditory learner falls into two categories, either the Auditory Tonal or the Auditory Digital learner. The Auditory Tonal spends time listening to the tone of a persons voice and are paying attention to the total voice inflection. They are verbal processors and like to think out loud as they are working through a problem (Ellerton, 2003, par. 9). Auditory Digital learners usually are more thinkers and tend to work things out in their mind rather than on paper. It is more important for them to memorize "steps, procedures and sequences" (Ellerton, 2003, par. 11). Kinesthetic learners will use their senses of feeling to get in touch with their learning. They learn best by moving, touching and feeling. They also make decisions based on their feelings (Ellerton, 2003, par. 12). The Myers Briggs Type Indicator (MBTI) is a personality test

Sunday, November 17, 2019

Preliminary PDHPE Assignment Essay Example for Free

Preliminary PDHPE Assignment Essay 1) Recount the story of the individual in relation to how the adversity they faced as affected their health status. The individual who I decided to research is now well known for her job hosting the Biggest Loser, Hayley Lewis. At 15 years old Hayley Lewis had won 5 Gold medals at the 1990 Commonwealth Games. She weighed 58kg and never thought anything about her weight at the time as she was fit, healthy and muscular. A magazine came out saying that she was â€Å"a fit 15 year old but a bit heavy legged. † From then on she started to get bigger and bigger. A year later her weight had crept up to 65kg and by the 1992 Barcelona Olympics she weighed 73kg. Hayley was told by her coach to lose weight and the more and more she was told, the more she turned to food for comfort. By being told she was â€Å"heavy legged† from the media and being told to lose weight the more this impacted on her physically, mentally, socially and spiritually. By being overweight this cut short Hayley’s swimming career as she was embarrassed, suffered anxiety and hated being publicly scrutinised. Hayley Lewis also hated getting out of bed because she knew she had to put on her â€Å"togs†. She said that she was racing with girls 20kg lighter and you can’t hide anything when you’re in swimmers. She also said that she used to focus on her weight every time she jumped up on to the starting block instead of focusing on her race. By being judged because of her physical appearance made her quit her swimming career because she felt that she didn’t fit in anywhere. This affected both her mental and spiritual health. Because Hayley Lewis had a negative physical health status this impacted on her emotional health as all the dimensions of health are interdependent on one another and when one area of health is going downhill this can impact on all the other aspects of an individuals’ health status. Hayley Lewis had a low self-esteem and didn’t believe in herself. This was because she was bullied about her physical appearance and the media made her feel shameful about her weight. She didn’t enjoy the success of being a swimmer either because of the shame and guilt she felt about herself and her personal body image. Another factor that could have made an impact on Hayley’s health status is the death of her younger sister as this could have made her turn to food for comfort. Hayley Lewis had to face a 20 year weight battle from when she was 15 until she was 35 when she had her second child. During her pregnancy Hayley gained another 25kg. When she got a phone call from Jenny Craig to become an ambassador she finally realised how overweight she was and decided to do something about it. She lost 4kg in the first week and was finally getting back on track and gaining these precious years of her life back. Hayley Lewis is now the current host of the Biggest Loser and says she can relate to the contestants so well as she knows exactly what they have been through and what they are going through. She hopes to inspire them and become as good a role model as she can so they get to love themselves the way she does about herself now. Hayley Lewis has faced major adversity in her life and it has affected her health status physically, mentally, socially and spiritually. She has finally pulled through and is at a great point in her life, has overcome her weight battles and has made herself proud for where her body has gotten her today. a) Evaluate how the dimensions of health have interacted to construct the health status of the individual. Hayley Lewis’ physical, mental, social and spiritual health have interacted to construct Hayley’s current health status as all these dimensions are interdependent upon one another. If one aspect of health is positive then this will most likely have an impact on all the other aspects of an individual’s health. Hayley’s physical health when she was younger was fairly poor. When Jenny Craig came into the picture this made Hayley become aware and realise just how poor her physical health was. Because of this sudden realisation, this has constructed Hayley Lewis’ current health status in many ways because she finally did something about her poor health. She started to lose weight and the motivation of the Jenny Craig program helped her pull through. She was given meal and exercise plans but as a retired swimmer she was used to having the pre-organised eating and training schedule. She had overcome her previous body image demons and she realised that she had a new focus in life because of becoming a parent. She had to step up and become the best role model she could be for her children. She threw out all the old photos she had of herself as an overweight teenager and returned to the pool in 2000 with a renewed confidence. She still has â€Å"good days and bad days, like everyone† but has learnt to love, admire, appreciate and nurture her body with respect as you only get one. Her previous physical health has now constructed Hayley’s current health status as she is now a size 8-10, lost 20kg and has maintained her weight by eating nutritiously, planning her meals and exercising often. Hayley now has a positive physical health status and hopes to inspire others, such as the biggest loser contestants, with her own personal inspiring story. Hayley Lewis’ emotional health has had a major impact on the construction of her current health status. Mentally, Hayley never used to believe in herself and had a very low self-esteem and body image. Now that she has become aware of her poor health status and has lost 20kg she now has a positive headspace and a positive outlook on life. She has a renewed confidence but still has â€Å"bad days† like everyone. By relating to the current biggest loser contestants this has made her feel proud to where her body and mind has gotten her today and wants to help them out so they can feel how she feels about herself now. Hayley’s new and improved positive emotional health has had a major impact on all the other aspects of her health and has created an overall positive health and wellbeing for herself as the dimensions of health are all interdependent upon one another. When Hayley Lewis was younger her social health suffered because she was overweight physically and didn’t look positive on life because of her poor emotional health. She was bullied, compared to others and was always being judged, if not by the media, by her coach and family friends. She now has a very positive social health as she is now married to a very understanding and cooperative husband and has 2 children. Her confidence is now booming compared to when she was fighting her 20 year weight battle. Her confidence has allowed her to improve her relationships with family and friends and now she can also relate to the biggest loser contestants because they have become her friends. She is very inspirational towards these contestants and has also become very close to them and helping them renew their lives and start fresh. Spiritually, Hayley now feels a sense of belonging and worth compared to the adversity she faced because she has fought and finally won her weight battles. She is now fit and healthy, can relate to and feels apart of the biggest loser family and also has a special family of her own. She now has a very positive headspace and this has impacted on and changed her life in many ways. Hayley’s life changing experience of winning her 20 year weight battled has occurred because she finally became aware of how poor her health was. The 4 dimensions of health, physical, mental, social and spiritual, have all worked together with each other and have constructed Hayley Lewis’ current health status in a very positive way. Because she started losing weight she noticed that all her emotional, social and spiritual aspects of health have benefited her overall health. This is because all these dimensions are interdependent upon each other and construct the overall health status of an individual. b) Evaluate how the relative and dynamic nature of health has impacted upon the health status of the individual. Due to her own personal experiences Hayley Lewis would now rate her health as being optimal. She has battled with her weight for 20 years and has finally overcome that. As well as being at her goal weight by eating healthy, exercising and creating meal plans for herself she has to take into account how the relative and dynamic nature of health has impacted upon her own personal health status. Relative and dynamic nature of health refers to how health can vary from time to time and fluctuate all over the place. Illnesses, accidents, personal experiences, environmental factors or an individuals’ socioeconomic status can have an impact on an individual’s level of health at any point during their lives. These continual changes in a person’s health mean that health is dynamic. Judging where a person is along the health continuum at any point of time is highly subjective as people all over the world have different perceptions about what is optimal or â€Å"normal† health. By overcoming her 20 year weight battle, Hayley Lewis now has a better knowledge of what good health is. She perceives herself in a more positive way and the result of this is that the public and people all around her are perceiving her in a more positive way also. By believing in yourself can affect how others see you and believe that you have potential whereas if you don’t believe in yourself then others will think the same. This is one of the reasons that Hayley Lewis’ confidence has risen over time because now that her self-esteem has risen she realised that people were starting to perceive her, and her health, in different and a more positive way. By being the host of the biggest loser and becoming friends with the contestants has affected Hayley Lewis’ health status. She is now socioeconomically advantaged as she has a permanent job with a high income. This will impact her health status because it can affect her choices such as buying more, but nutritious food, and she now has more money to spend on fitness and recreational resources such as gyms and swimming pools. This can impact Hayley’s health physically, mentally, socially and spiritually as she now feels a sense of control and value over her life.

Friday, November 15, 2019

Slavery During the 1800s :: Slavery Essays

Slavery in the eighteenth century was worst for African Americans. Observers of slaves suggested that slave characteristics like: clumsiness, untidiness, littleness, destructiveness, and inability to learn the white people were â€Å"better.† Despite white society's belief that slaves were nothing more than laborers when in fact they were a part of an elaborate and well defined social structure that gave them identity and sustained them in their silent protest. In their quarters, slaves expressed themselves with some what more freedom from white slave owners. Religion provided a feel of similar freedom and also gave slaves mental support. By attending church, slaves created a Christianity that emphasized salvation for every race, including slaves. To avoid over work slaves tried to work at their own pace and resist speedups. Some of the techniques they used to prevent work were to fake illness or pregnancy, break or misplace tools or fake ignorance. Unless slaves lived near free territory, or near a city where they could blend into a free black population, they knew that permanent escape was unlikely. Only rarely, did a large group of slaves attempt a mass escape and maintain an independent freedom for long periods of time. On numerous occasions groups of runaway slaves either attacked white slave patrollers or tried to bribe them. When slaves became desperate enough, they openly resisted their masters. Numerous examples show how slaves refused to accept punishment and battled with their white masters who were trying to give punishment. Slave resistance was rarely successful because most masters would not tolerate it. Whether slaves physically or verbally opposed a white man it was dangerous. Slave’s masters consistently tried to erase African culture from their slave’s memories. They insisted that slavery had rescued blacks form the barbarians from Africa and introduced them to the â€Å"superior† white civilization. Some slaves came to believe this propaganda, but the continued influence of African culture in the slave community added slave resistance to the modification of African culture. Some slaves, for example, answered to English name in the fields but use African names in their quarters. The slave’s lives were filled with surviving traits of African culture, and their artwork, music, and other differences reflected this influence. Slaves also injured themselves to avoid work, punishment, or sale. They cut off their own fingers, hands, toes, or feet, and disfigured body in various other ways to make themselves less valuable slave property.

Tuesday, November 12, 2019

Ict Policy and Server Room Proposal for a Small Firm

INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT INTRODUCTION Information and Communications Technology Policy addresses security issues and how to effectively apply and maintain information systems, thereby facilitating protection of critical, valuable and confidential information together with its associated systems. Most people are likely to recognise the impact and severity of the loss or theft of confidential designs for a new product. However they do not always recognise the potential risk, and consequential result, of seemingly ‘innocent' activities, such as copying software or copying the corporate database onto their laptop computer or not documenting changes made to their systems. The purchase and installation of hardware and software requires those involved to consider carefully the Information Security issues involved in this process. Careful consideration of the company's business needs is paramount, as it is usually expensive to make subsequent changes. Analysis of user requirements versus the various benchmarks test results will establish the best choice of server/software to be purchased. Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the IT & T Policy issues are adequately covered. The issue of IT consumables is looked into. These are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. Valuable items should always be kept in a secure environment to avoid damage or loss. OBJECTIVES To develop an Information Communication Technology policy for KPLC Retirement Benefits Scheme that introduces efficient and effective use of IT systems and in turn facilitate the smooth running of the secretariat. MISSION STATEMENT To strive to provide nothing but the best means of data and telecommunications services to the secretariat as a whole. DEFINITION OF ICT POLICY A set of rules, regulations, procedures and plans of action for administration of equipment, resources, and services in the ICT section. TERMS OF REFERENCE The aim of this document is to; ) Analyse procedures and practices that are in use currently and identify those that can be reinforced or changed. ii) Work out a time plan for the smooth transition from the use of KPLC systems and resources. iii) Review implemented policies elsewhere to facilitate broad knowledge and adapt ideas suitable to our environment. TABLE OF CONTENTS INFORMATION COMMUNICATION TECHNOLOGY POLICY DOCUMENT1 INTRODUCTION1 TABLE OF CONTENTS2 PREAMBLE4 IT & T SYSTEM DESCRIPTIONS4 1. 0 PROCUREMENT OF HARDWARE, PERIPHERALS & OTHER EQUIPMENT8 1. 1 Purchasing and Installing Hardware8 1. 2Cabling, UPS, Printers and Modems15 1. 3Consumables16 . 4Working off premises or using out-sourced processing18 1. 5Using Secure Storage20 1. 6Documenting Hardware23 1. 7 Telecommunications equipment25 1. 8Other Hardware Issues28 1. 9 Disaster Recovery Plans30 2. 0 CONTROLLING ACCESS TO INFORMATION & SYSTEMS IN THE SECRETARAIT32 2. 1Controlling Access to Information and Systems32 2. 1. 5 Controlling Access to Operating System Software38 Managing Passwords39 3. 0 PROCESSING INFORMATION AND DOCUMENTS46 3. 1Networks46 3. 2System Operations and Administration49 3. 3E-mail and the World Wide Web57 3. 4Telephones & Fax69 3. 5Data Management73 3. 6Backup, Recovery and Archiving75 . 7Document Handling78 3. 7. 3 Countersigning Documents79 3. 7. 5 Approving Documents before dispatch80 3. 7. 6 Signature Verification80 3. 8Securing Data83 3. 8 . 4 Maintaining Customer Information Confidentiality86 4. 0 PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE90 4. 1Purchasing and Installing Software90 4. 2Software Maintenance & Upgrade92 4. 3Other Software Issues94 5 COMBATING CYBER CRIME95 5. 1Combating Cyber Crime95 5. 1. 1 Defending Against Premeditated Third Party Cyber Crime Attacks95 5. 1. 2 Minimising the Impact of Cyber Attacks97 5. 1. 3 Collecting Evidence for Cyber Crime Prosecution98 5. 1. Defending Against Premeditated Internal Attacks99 5. 1. 5 Defending Against Opportunistic Cyber Crime Attacks100 6. 0 COMPLYING WITH LEGAL AND POLICY REQUIREMENT101 6. 1Complying with Legal Obligations101 6. 1. 2 Complying with General Copyright Legislation101 6. 1. 3 Complying with Copyright and Software Licensing Legislation102 6. 1. 4 Legal Safeguards against Computer Misuse103 6. 2Complying with Policies103 6. 3Avoiding Litigation106 6. 3. 3 Sending Copyrighted Information Electronically107 7. 1 E- Commerce Issues108 7. 2 Structurin g E-Commerce Systems Including Web Sites108 7. 3 Securing E-Commerce Networks109 . 4 Configuring E-Commerce Web Sites110 7. 5 Using External Service Providers for E-Commerce Delivery Channel111 8. 7Cost Considerations116 9. 0 DEALING WITH PREMISES RELATED CONSIDERATIONS118 9. 1 Physical Security of Equipment and Assets118 10. 0 NETWORK SECURITY MEASURES122 10. 1 Data Network devices122 10. 2 System administration123 10. 3 System Auditing129 10. 4 Email Policies130 10. 5 The Internet131 10. 6Computer desktop equipment133 10. 7Human Resource Aspects Policies141 10. 8Security Policy Auditing142 10. 9Incidence Management and Responses146 Reporting an Incident146 What is Cybercrime? 151 10. 0Movement of Telecommunications Equipment155 11. 1Setting Classification Standards157 12. 0 RETIREMENT OF OBSOLESCENCE OR OBSOLETE EQUIPMENT158 12. 1 Setting New Hardware Standards158 12. 2Methods of assessing old and inapt Software/hardware158 12. 3Hardware and software obsolescence160 12. 4RBS Depre ciation Factors for Defining Old Or Inapt Equipment161 13. 0 APPENDIX 1162 13. 1 LIST OF SPARES & ACCESSORIES162 14. 1 GLOSSARY & REFERENCES163 PREAMBLE It is necessary for one to be familiar with the various Information Technology and Telecommunications Systems that the company has acquired and installed over the years. This document provides the description of the systems as well as the policies formulated in regard to these IT & Telecommunications systems. IT & T SYSTEM DESCRIPTIONS 1. Telephony The telephone network for RBS consists of the public interconnected network using automatic branch exchanges (PABX) which connects us to the public network using telecommunication service providers and private branch network (PBX) which is housed in our commercial office premises which help us communicate in the premises through extension numbers. 2. Computer Data systems These are composed of data network hubs and switches which make the Local Area Networks (LAN) and the routers which interconnect the LANs. Each LAN is composed of passive data networks, servers and PCs that use the network thus realised to exchange information and data throughout the enterprise. 3. System Software and Data System software is the general term used to describe the many software programs, drivers and utilities that together enable a computer system to operate. One of the main components of system software is the operating system of the computer e. g. Microsoft Windows ® XP Professional. 4. Data Data in the language of information technology means the individual elements that comprise the information and can be processed, formatted and re-presented, so that it gains meaning and thereby becomes information. Here we are concerned with the protection and safeguard of that data/information which, in its various forms can be identified as Business Assets or Information Assets. The term data and information can be used somewhat interchangeably; but, as a general rule, information always comprises data, but data is not always information. ICT SYSTEMS DESCRIPTIONS DESCRIPTIONS THE OF SYSTEM RBS – Open Retirement Benefits Scheme System The system is used for the administration of employee and employer contributions into the RBS Fund. It has a database for member details together with their dependants. This is used when benefits are to be calculated for deceased persons and withdrawing members. The system also has a pensioners payroll used to pay all pensioners whether retirees or widows and orphans. Group Life for all employees and the issue of Last Expense is also maintained and administered in the system. Database Management Systems The secretariat database is managed using ORACLE database management systems(DBMS). Oracle databases are relational, thus data is stored in them in row-column (table) format. All the company data is stored and managed using ORACLE. WINDOWS NT ENVIRONMENT The Window NT environment operates in domains. A domain is a collection of computers and users defined by the administrator of a Windows NT Server network that share a common directory database. A domain provides access to the centralised user accounts and group accounts maintained by the domain administrator. Each domain has a unique name. Window NT Environment In the current WAN model of KPLC there is a single master domain called KPLCSTIMA. The KPLCSTIMA is also the main account domain and KPLCNET as Internet resource domain. A child domain known as RBS. KPLCSTIMA will be created from the master domain and will have trust relationship with it. This is will give us more control of our systems and semi-autonomy from the KPLC systems. It will be installed with Windows Server 2003 standard edition operating system which will provide the following services at RBS: 1. File and Print sharing. 2. Microsoft Exchange Services – host the resident Staff member’s mailboxes and enable efficient sending and receiving of internal/Internet mail and if need be provide also storage of the mailboxes. 3. Anti-virus Software. 4. Systems Management Server for Network management. 5. Internet Browsing. 6. To allow for faster downloads of the application updates. 7. To enable the efficient installation and periodic updates of the PC anti-virus in the local area network. 8. For faster and seamless primary logon of client PC’s to the network. Our application i. e. RBS system is already running in a stand alone server and will continue that way to ensure system stability and integrity. The new system will also run on its own stand alone server for the same reason. †¢The primary domain controller (PDC) tracks changes made to domain accounts. Whenever an administrator makes a change to a domain account, the change is recorded in the directory database on the PDC. The PDC is the only domain server that receives these changes directly. A domain has one PDC. A backup domain controller (BDC) maintains a copy of the directory database. This copy is synchronised periodically and automatically with the PDC. BDC’s also authenticate user logons, and a BDC can be promoted to function as the PDC. Multiple BDC’s can exist in a domain. Client PCs Currently there are four PCs and two laptops in the secretariat all running Windows XP as the desktop operating system and networked using Windows NT operating system of the K PLC master domain. All PCs have MS Office 2003 – 2007 as an office desktop application. The PCs have between 256 and 512 MB RAM. All the PCs are running on Microsoft TCP/IP protocol and use USER LEVEL access on the network. Microsoft Exchange Server Microsoft Exchange Server is used for electronic messaging in and out of the organisation. Exchange is organised into entities called sites each consisting of one or more servers containing mailboxes and public folders. Mailboxes are where a user’s messages are kept, each user having a single mailbox whereas public folders are like notice – boards, containing information that is shared between multiple users. Intra-site communication has to occur at high speed and with high reliability. Inter-site communication can occur at lower speeds. In addition to local messaging, there is Internet messaging, implemented via the Proxy Server. Anti-Virus Software McAfee’s Total Virus Defence Software is the current company guard against viruses. The software is loaded on all the Exchange server protects against viruses distributed. A group of computers and the server that manages them is called an Anti-virus Domain. The anti – virus server downloads new version automatically from McAfee Website on the Internet. Once the new software version is downloaded, the system administrator configures it for distribution. It also alerts the system administrator to ‘pull’ the latest versions to the Anti-virus Server. Internet Microsoft Proxy Server provides an easy, secure way to bring Internet access to every desktop in an organisation. The proxy server is a gateway between the company’s network and the Internet. A gateway is special software, or a computer running special software, that enables two different networks to communicate. The gateway acts as a barrier that allows you to make requests to the Internet and receive information, but does not allow access to your network by unauthorised users. [pic] 1. 0 PROCUREMENT OF HARDWARE, PERIPHERALS & OTHER EQUIPMENT 1. 1 Purchasing and Installing Hardware This Chapter deals with the Information Technology and Security issues relating to the purchase, use or maintenance of equipment through which information is processed and stored. 1. 1. 0 Procurement of Hardware, Peripherals and Other Equipment Policy Statement All purchases of new systems hardware or new components for existing systems must be made in accordance with Information Security and other organisation Policies, as well as technical standards. Such requests to purchase must be based upon a User Requirements Specification document and take account of longer-term organisational business needs. The purchase and installation of hardware requires those involved to consider carefully the Information Security issues involved in this process. This section covers the key areas to be considered. . 1. 1 Specifying Information Security Requirements for New Hardware The purchase of new computers and peripherals requires careful consideration of the business needs because it is usually expensive to make subsequent changes. |ICT Issues to consider |Action Required | |The system must have adequate capacity or else it may not be |Estimate the current and potential load on the system. | |able to process your data. For critical applications ensure t hat the system is reliable and of | | |high quality. | | |Select a supplier with a proven ‘track record', who is likely to be | | |in business for the life of the hardware. | |Data must be adequately protected; otherwise there is a risk |Determine the type of safeguards necessary for the information | |of loss or accidental / malicious damage. concerned and ensure that the hardware is capable of supporting the | | |required features, e. g. the type of operating system and attached | | |devices. See classifying information and data | |Where hardware maintenance is poor or unreliable, you greatly|Choose a supplier with a proven ‘track record', who is likely to be | |increase the risk to the organisation, because, in the event |in business for the life of the hardware. |of failure, processing could simply STOP. |Enter into a maintenance contract at the time of purchase with a | | |suitable response time in the event of a failure. See service level | | |agreement | |T he system must be sufficiently ‘resilient' to avoid |Determine your organisation’s tolerance to system non-availability | |unplanned down-time, which can have an immediate negative |(seconds, minutes, hours or days? , and approach the design of your | |impact on your organisation |hardware configuration accordingly. | | |Consider the use of mirrored disks to guard against disk failures; | | |duplicate processors in case of processor failure; duplicate | | |configurations; and the use of an Uninterrupted Power Supply (UPS) | | |and standby generators. 1. 1. 2 Installing New Hardware Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the ICT Policy issues are adequately covered. (See Premises for further detail. ) Policy Statement All new hardware installations are to be planned formally and notified to all interested parties ahead of the proposed installation date. Information Technology and Securi ty requirements for new installations are to be circulated for comment to all interested parties, well in advance of installation. ICT Issues to consider |Action Required | |The equipment must be located in a suitable environment otherwise|Adhere to the specifications and recommendations of the | |it may fail. |manufacturer or supplier, e. g. for operational temperature, | | |humidity etc. | |Adequate safeguards against fire, water and electrical failure | | |should be in place. See Premises | |Any disclosure of your network diagrams, security features, |Ensure that all persons on site, whether from your own | |locations and configurations etc. exposes potential |organisation or not, have completed a Non-Disclosure Agreement | |vulnerabilities, which could be exploited. Although a Non Disclosure Agreement paves the way for legal | | |redress, it cannot protect you against actual commercial damage. | |Leaving tools, utilities and developer's kits on your new system |All new syste ms should be configured for maximum practical | |endangers the confidentiality and integrity of your data |security by the removal of unnecessary utilities, developers' | | |programs, etc. a technique known as hardening. | |Without an installation plan for the new equipment, disruption to|Ensure that all special pre-installation requirements (e. g. air | |operational systems is more likely. |conditioning) have been met. | | |Identify the precise location for the equipment and ensure that | | |the power and network cables are ready. | | |Agree a detailed installation plan with the vendor. | |Anticipate what might go wrong and consider how to minimise the | | |risks. | |Where the installation plan does not include safeguards against |Agree a detailed installation plan and document it. See Project | |the (inevitable) increased security threat resulting from |Plan | |(relatively) ‘open access' to the systems area, accidental or |Monitor progress against the plan. |malicious damage can result. |Only allow authorised persons access to the systems area. | | |To protect all parties never allow engineers to work unattended. | | | | |Breaches of Health and Safety regulations endanger the well being|Ensure Health and Safety regulations are followed when locating | |of your staff and your organisation’s commercial activities. the equipment, peripherals and cables. | | |A periodic visual inspection is beneficial also. | 1. 1. 3 Testing Newly Installed Systems and Equipment Hardware should be tested when new to verify it is working correctly, and then further tests applied periodically to ensure continued effective functioning. Policy Statement All equipment must be fully and comprehensively tested and formally accepted by users before being transferred to the live environment or user sites. |ICT Issues to consider |Action Required | |Where new equipment is not tested for critical functions before |Ensure that all new installations are thoroughly tested after | |being used, it can lead to failure and hence damage to both data |initial set-up and prior to live use. |and other linked systems. |All such tests should be in accordance with a documented test | | |plan. | |Inadequate testing can threaten the integrity and availability of|Check the test outputs to confirm the results. Ensure that | |your data. |all-key components, e. g. hard disk subsystems are included in the| | |tests. | |Devices that are known to degrade with time, e. g. printers, | | |should be tested periodically | |Where testing is performed in a manner that does not simulate |Ensure that the test plan simulates realistic work patterns | |live conditions, the results of such testing cannot be relied | | |upon. | |Poor security procedures during equipment testing can compromise |Ensure that Non Disclosure Agreement have been obtained from all | |the confidentiality of your data. |third party staff involved in testing the equipment. | |Verify that the required security configuration and safeguards | | |have been implemented for the new hardware. | | |If live data is used in the testing process for the new hardware,| | |ensure that it is closely controlled. See Use of Live Data for | | |Testing | Explanatory notes NT servers The analysis of user requirements (client base and mail sizes expected) versus the various benchmarks test results will establish the best choice of server to be purchased. For file and print server only disk space is a key requirement. IT & T Issues |Key Actions | |CPU Board |Dual CPU, redundant system components in many aspects | |Disk & Disk space |Enough storage to cater for expected growth of mail database for the next| | |fiscal year | | | | | |Redundant and RAID-5 capable | |SPEC INT2000 |Compares CPU speeds for various servers. | | | |SPEC CPU2000 |To establish best processors and server performances. | | | | |(http://www. specbench. org/) |To establish best server as per RBS requirements. | | | | | |Do sample analysis based on databases expected or consult database | | |product vendor on system demands. |TPC-C benchmark |The TPC-C benchmark measures the ability of a server to process | | |transactions in a simulated business environment, calculating both the | |See guidelines at http://www. tpc. org/ for |performance of the System Under Test and real world scenario. | |transactions per server | | | |Mail servers should handle 1500 mail user traffic simultaneously in a | | |normal business environment. | | | | |Mail servers should be capable of storing all mails processed in a normal| | |working day. | Routers |ICT Issues |Key Actions | |Router basics |Dual CPU, all redundant system components installed at time of purchase | | |in many aspects | |IOS, RAM and ROM |Latest Cisco IOS e. g. ver 12. X. , 128 MB RAM and suitable flash memory to | | |store all features of IOS. | | | | |VPN and 3-DES features enabled | |IOS compatibility |New routers should Cisco compatible to integrate seamlessly with existing| | |IOS and equipment. | |Number of WAN ports |Decide by local needs e. g. | | | | | |Hub-routers should be preferred for small LANs | |User Management |Manageable by local o r by remote interface, RMON, SNMP or network user | | |interfaces. | Hubs and Switches Item |Action | |Hardware basics |Dual CPU, all redundant system components installed at time of purchase in many | | |aspects | |IOS, RAM and ROM |Latest Cisco IOS e. g. ver 12. X, VLAN and work grouping, bridging possible. | |IOS compatibility |Cisco compatible to integrate seamlessly with existing IOS and equipment. |Protocols |Ethernet enabled | |L | | |Number of LAN ports |Decide by local needs e. g. | | |Hub-routers should be preferred for small LANs | |User Management |Manageable by local or by remote interface, RMON, SNMP or html enabled network | | |user interface. | Modems Item |Action required | |Software Compatible |Supports HyperTerminal for Windows | | | | | |Should be configurable using AT commands | |V90 |Modems should be V90 standard and downward compatible with existing V54 & V42 | | |types, etc. |2 & 4 wire |Supports two wire dialup and 4 wire leased analogue line use. | Data cabinets Equipment cabinets should be properly chosen. The current 6U cabinet is too small for any future expansion or even good workmanship to be carried out. Vendors should provide cabinet of size equal or larger than 12U cabinet. |Item |Action | |Sufficient space for equipment |The cabinet should house all the equipment and accessories at the installation| |See http://www. datacabinets. om/ |time, leave room for future expansion and provide free space for proper | | |ventilation | |Aesthetically chosen for office environment |The cabinet aesthetically coloured to match with general looks in the vicinity| | |free standing or wall mounted and should be equipped with sufficient power | | |blocks. | |Proper ventilation and humidity |The cabinet must have sufficient cooling fans. The fans in these cabinets | | |shall be designed to give minimum noise level expected in a normal office | | |environment and must be designed to keep the humidity level low. | |Designed for equipment therein |The cabinets will be used to house all the active equipment and connection | | |accessories such patch panels, Light Unit Interfaces (LIU). | | | | | |Be lockable and be equipped with some trays. LIUs, cord organisers, cable | | |straps etc. |Grounding and ESD |All cabinet shall be electrically grounded to ensure electric noise and | | |electrostatic discharge is minimised. | Server Room The following items are useful in a server room construction. |Item |Action | |Backup supply |Installation of a central UPS to back up for at least 30 minutes after an | | |outage. | |Conditioned power supply |Installation of spike protectors is necessary to ensure well regulated supply | | |free of surges and dips. |Neat and extensive cable trays |Construction of a technical (false) floor and technical roof (false ceiling) | | |to house all types of cabling and utilities such as fire hydrants, smoke | | |detectors, etc | |No electrostatic discharge (ESD) in computer centre and |Proper grounding and use of anti-static PVC tiles on floor. Each tile must be| |equipment |grounded well. | |Maintain ambient temperature |Installation of a two way redundant air conditioning system. | | |Maintain 16 ? C via room wall. | |Guard against fires and similar hazards |Installation of an automatic fire-fighting system |Use effective extinguishers that are less hazardous to |Use most inert system e. g. Inergen | |human health. |See www. inergen. com/ | |Classify room usage |Partitioning of the computer room | |Proper lighting |Supply and installation of False Ceiling | |Protection against harmful effects of fire hydrants |Supply of Gas Masks | 1. 2Cabling, UPS, Printers and Modems Cabling For best of cabling the following international standards should be incorporated when carrying voice/data-cabling works. |Item |Action | |Scope |Systems Administrator to access scope of requirements. | |Design of cabling plant and premises consideration |According to ANSI/EIA/TIA 568B & 569 standards | | |See www. ansi. org, www. eia. org & http://www. tiaonline. rg | |Implementation and workmanship of cabling works and testing |According to ANSI/EIA/TIA 606 & 607 standards of installing and | | |maintaining data/voice cabling plant. | |Network Active devices |Different vendors have preferred methods of rolling out active | | |devices try this method: | | | | | |Develop | |high-level process flow diagram for deploying new solutions | | |solution hardware requirements | | |solution management platforms | | |solution validation by pilot project | | |full solution deployment | | |document all related information for management, maintenance and | | |future extensions | UPS The following formulas are useful in determining choice of UPS. The UPS are rated in terms of steady power out put and backup time. Steady power rate is given in watts= W Backup time is given in Hours or Ampere-hour of the batteries. = Ah Backup capacity in terms of Ampere-Hour is Ah = (Watt x time) and or is computed to be Ah =3. 6 Mega joules. Power x Time = Energy (joules) Translates to Time =Ah/power E. g. StimaEIS is 7. 2-kVA load. To backup for half an hour it requires (7200 x 30 x 60 x 60)/3. 6 x106 = 216 Ah Given that each small battery is 12V with 9 Ah each then the UPS will have 24 small batteries. Similarly for rest of the computers same formula can be used. 1. 3Consumables Introduction ICT consumables are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. This section deals with the Information Security aspects of IT consumables. 1. 3. 1 Controlling IT Consumables Policy Statement IT Consumables must be purchased in accordance with the organisation’s approved purchasing procedures with usage monitored to discourage theft and improper use. They must be kept in a well-designated store away from working area. Explanatory Notes Examples of consumables are printer forms, stationery, printer paper, toner & ink, ribbons, disks, diskettes, bar-code labels and other accessories. Item |Key Actions | |Pilfering of your consumables results in increased organisational|Safeguard Consumables against petty theft by locking cupboards, | |expense. |maintaining a register, written authorisation prior to removal of| | |items etc. Keys to be kept by the supervisor’s office. | |Consumables may be s tolen with the intent to defraud your |Take special measures to protect potentially valuable pre-printed| |organisation or customers. |forms and account for their usage. Store area should be a | | |restricted area, use gate-passes and authorisation. |Confidential data may be revealed to unauthorised persons from |Ensure that confidential information cannot be identified from | |discarded Consumables e. g. discarded draft printer output and |discarded Consumables, such as printer ribbons and floppy disks, | |test data printer output. |by destroying them. | | |Destroy or shred surplus printout / fiche containing data, | | |whether or not the data appears to be confidential – it may be! | | |See also Classifying Information and Data. | 1. 3. Using removable storage media including Diskettes and CDs Policy Statement Only personnel who are authorised to install or modify software, and staff who are authorised to transfer and update data shall use removable media to transfer dat a to / from the organisation’s network. Any other persons shall require specific authorisation. Explanatory Notes When using removable storage media, there are additional ICT Security risks associated with the portability of the media. Personnel authorised to install & modify software is the system administrator. Personnel authorised to transfer and update data shall be determined by the general manager and systems administrator. ICT Issues |Key Actions | |Loss or ‘disappearance' of disks, tapes, etc. can |Ensure that all media are stored safely and securely. | |compromise the confidentiality of the organisation’s |Make sure that all media are labelled clearly, whether physically and/or | |data. |electronically, and that they can be located easily when needed. | | |Designate key individuals to monitor the storage and use of removable | | |media. | |Damage to media compromises the integrity of your |Follow the manufacturers' recommendations when handling the m edia. | |corporate records. Take protective measures against environmental extremes of temperature, | | |humidity, dust, etc. , appropriate to the importance and sensitivity of the| | |data. | | |Consider carefully the safeguards required for any media being moved or | | |stored off-site; especially backup tapes / disks. | | |In the case of irreplaceable data, you should consider taking security | | |copies, each of which must be properly safeguarded. | |Consider using fire-resistant storage cabinets for such media. | 1. 4Working off premises or using out-sourced processing Working Off-Premises involves a broad range of Information Security risks. In addition to the obvious threat of theft of the equipment there are also significant risks to the information contained on portable equipment. It is necessary to use business centres with great care as confidential information or data can be input onto equipment that is not under your control. 1. 4. 1 Contracting or using Out-sour ced Processing The following issues should be considered if the organisation decides to utsource some or all of its computer processing. Policy Statement Persons responsible for commissioning out-sourced computer processing must ensure that the services used are from reputable companies that operate with accredited information security and quality standards which should include an appropriate Service Level Agreement. |ICT Issues to consider |Action Required | |Inadequate performance can threaten your organisation's |Determine the critical success factors for your organisation in terms of| |information processing and business operations. speed, reliability, response and ability to scale rapidly (if | | |necessary). | | |Document these factors in a Service Level Agreement with penalty clauses| | |for breaches. | |Poor reliability threatens the performance of your |Consider your organisation's tolerance to system non-availability in | |business. |seconds, minutes, hours or days? | | |Ensure that the service provider can meet these needs. | |Document these factors in a Service Level Agreement with penalty clauses| | |for breaches. | |Lack of direct control when outsourcing can compromise |Due diligence should be exercised to ensure that the outsourcing company| |data confidentiality. |is reputable and operates with adequate standards. | | |Obtain a Non Disclosure Agreement from the outsourcing company. | | |Insist on secure transmission methods between your organisation and | | |theirs, e. g. authenticated transmission with encrypted data. | 1. 4. 2 Issuing Laptop / Portable Computers to Personnel Laptops, Portables, Palmtops -or even electronic ‘organisers', which connect to and store your organisation’s data – are included within this topic. Throughout this topic we refer to them collectively as ‘laptops' Policy Statement Line management must authorise the issue of portable computers. Usage is restricted to business purposes, and users must be aware of, and accept the terms and conditions of use, especially responsibility for the security of information held on such devices |ICT Issues |Action Required | |Confidential data disclosed to unauthorised persons can |Be certain that the member of staff has a valid business reason for | |damage the organisation. |using a laptop. Maintain and update the Hardware Inventory with the | | |primary user's name and contact details | | |Ensure that you are always able to trace the physical location of the | | |laptop and that the type and sensitivity of any stored data is known and| | |properly secure. | | |Always use any ‘power-on' password feature as a simple deterrent to | | |opportunistic usage. | | |Ensure the confidentiality and security of backup files. |The use of unlicensed software can subject your |All software used on the laptop must be licensed and comply with both | |organisation to legal action |legal and organisational standards. | |Viruses, Worms, Trojans and other Malicious Code can |Scan the laptop for malicious code and viruses regularly. | |corrupt both data and the system files. |Always scan files before accepting them onto the laptop | |Theft of the laptop exposes the organisation to the threat|Ensure that the holder implements adequate safety procedures against | |of disclosure o f sensitive corporate data to competitors. |theft. | |Consider the use of securing wires or other security devices in open | | |offices. | | |Ensure that the Hardware Inventory contains relevant allocation details | | |of all computers. Insure the laptop against loss, theft and damage. | | |Be aware of any exclusion in cover. Prepare guidelines for issuing | | |portable computing equipment. |Inadequate backup and recovery routines can lead to the |Ensure that laptop computers can have their data safeguarded through | |loss of data. |regular backups. | | |Ensure that the primary user of the equipment recognises their | | |responsibilities in this regard. | Guidelines for Issuing Portable Computing Equipment Those responsible for issuing portable computer equipment must ensure that the following is complied with before issuing such equipment to employees. †¢ Ensure that adequate insurance cover is provided for the portable equipment for use in the home country and abroad. Ensure that suitable virus scanning software is present on the equipment. †¢ Supply suitable network connections and ensure that access procedures are applied if the equipment is to be connected to a network. †¢ Ensure that adequate capacity (hard disk and memory size) is available on the equipment to support business processing. †¢ Ensure that adequate backup and restore facilities and procedures are in place. †¢ Ensure that compatible versions of application software are in place. †¢ Ensure that software encryption and/or physical locking devices are in place. †¢ Ensure that adequate records of the equipment are maintained, and that the issue is authorised and receipted. Ensure that authorisation for use of portable computing equipment is received †¢ Ensure that the Terms of Use are issued and signed. 1. 5Using Secure Storage Introduction It is essential that valuable confidential or critical information or equipment is stored in a secure locati on. This section covers secure storage. Policy Statement Sensitive or valuable material and equipment must be stored securely and according to the classification status of the information being stored. Documents are to be stored in a secure manner in accordance with their classification status. 1. 5. 1 Using lockable storage cupboards & filing cabinets A lockable storage cupboard should be considered for storing sensitive or valuable equipment. A lockable filing cabinet should be considered for secure storage of paper-based files and records, or small but movable items. |ICT Issues |Key Actions | |Unsecured organisation sensitive material may be |Ensure that all sensitive material is secured in a lockable storage | |stolen from the department. |cupboard, cabinet or safe when not required. The more sensitive the | | |material, the more care must be taken in selecting the appropriate storage| | |method. | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a dual| | |control issues process in case the key holder is unavailable or the item | | |is required in an emergency. | |Securely locked organisation sensitive material may be|Ensure that highly sensitive material including computer discs and tapes | |stolen or damaged whilst in store. |are stored in a fire rated storage cupboard, cabinet, or sa fe. Beware that| | |the cabinet itself may survive the fire but the items inside may be | | |damaged irreparably. | | |Ensure that all sensitive material is secured in a lockable storage | | |cupboard, cabinet, or safe when not required. | | |Use a storage unit, which matches the sensitivity of the material. The | | |more sensitive the material, the more care must be taken in selecting the | | |appropriate storage method. | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a dual| | |control issues process in case the key holder is unavailable or the item | | |is required in an emergency. | 1. 5. 2 Using Fire-Protected Storage Cabinets & Safes A fire protected storage cabinet is a good way to protect sensitive material against the risk of being destroyed by fire and possible water damage from fire fighting activities. The use of safes for storage is to be en couraged. The security of the safe itself is just as critical. Policy Statement Items such as backup-tapes, microfiche, microfilm, archives, recovery diskettes, passwords, CDs for software installation shall be considered sensitive and valuable to the organisation and must be stored in fire-protected storage cabinets & safes. |IT & T Issues |Key Actions | |Sensitive data stored in fire-protected cabinets can |Ensure that all sensitive material is secured in a Fire protected | |nevertheless be damaged beyond use. Due to their possible |cabinets & safe when not required. Yearly & Monthly system & database | |additional weight, siting is a key consideration |backups should be kept away from the building | | |Ensure you are aware of who is an authorised key holder to any such | | |storage cupboard, cabinet or safe. | | |Ensure that a second key is available with a trusted key holder via a | | |data control issues process in case the key holder is unavailable or the | | |item is required in an emergency. | |Sensitive data may be lost if stolen or during transit. |Copies of archives should be kept separate from actual database backups. | |A physical log file to control backup data movement to various safe | | |locations to be kept up-to-date both with signature of security personnel| | |and person moving the backups. | | |Data Library to be up-to-date with details of backup date, type, | | |location, type & expiry date | 1. 6Documenting Hardware Introduction This section deals with hardware documentation and manuals, and also hardware inventory. It is es sential that hardware documentation is kept up to date and made available to all users as appropriate. 1. . 1Managing and Using Hardware Documentation ‘Documentation' refers to both the operator manuals and the technical documentation that should be provided by the supplier / vendor. Policy Statement Hardware documentation must be kept up-to-date and readily available to the all staff that may need it. |ICT Issues |Key Actions | |If equipment is operated incorrectly mistakes and |Ensure you receive all operational and technical manuals for each piece | |damage may result. |of equipment. | | |Store the documentation accessibly but safely. | |Systems users must be trained according to the supplier's manuals | |A failure to follow the recommended schedule of |Ensure all regular maintenance is carried out and monitored. | |maintenance runs the risk of system malfunction, which |Adopt procedures which ensure that your operators complete all | |could possibly jeopardise your busines s operation. |maintenance for which they are responsible according to the | | |manufacturer's recommendation | |Failure to operate equipment in accordance with the |Ensure you receive all operational and technical manuals for each piece | |instructions can invalidate the warranty. |of equipment. | |Ensure that such manuals are readily available and form the basis of all | | |training. | |Failure to complete and return the manufacturer's |Complete the warranty card in time and record the details in your | |warranty card may invalidate the warranty and hence |Hardware Inventory Register. | |limit the manufacturer's liability | | ] 1. 6. 2 Maintaining a Hardware Inventory or Register Introduction A register / database of all computer equipment used within your organisation is to be established and maintained. Policy Statement A formal inventory of all equipment should be maintained and kept up to date at all times. ICT Issues |Key Actions | |Theft of equipment is most likely to result in additional |Establish inventory and implement procedures for updating it. | |cost to the organisation and could compromise data security. |Ensure that you have a procedure to advise the acquisition of new | | |hardware, the disposal of old items and any changes of location. | | |Periodically verify the correctness of the inventory by checking that | | |a sample of hardware is physically present. |Inadequate insurance could render your organisation liable |Establish inventory and implement procedures for keeping it | |to loss in the event of a claimable event. |up-to-date. | | |Ensure that you periodically review the adequacy of your insurance | | |cover. | |Shortcomings in the planning of equipment replacement can |Establish an inventory and, in conformance with your IT Plan, ‘ear | |make it difficult to plan ahead for new technology. |mark' equipment for replacement and plan accordingly. | 1. 7 Telecommunications equipment (Procurement, maintenance, practices and design t elecommunications) Procurement of telecommunications system †¢ Manufacturer maintenance (internal & external) †¢ Design criteria of systems †¢ Commissioning & Decommissioning of systems †¢ Fibre optic systems Introduction This chapter deals with the Information Communication Technology issues relating to the purchase, use, maintenance and the design of equipment through which information is processed and transmitted. The systems covered include, Telephony (PAX and PABX) Data Networks Fibre Network 1. 7. 1 System Design ( Engineering) Policy statement ICT system engineering will be based on tested and proven state of the art technology for a given ICT system. Explanatory notes The systems administrator shall from time to time update her/himself with new international standards for ICT systems. She/he shall be required to come up with flexible systems that will meet the company needs at the best. |ICT Issues |Actions | |Technology |System engineering shall be based on the latest technology in the | | |required field such as Telephony. | |Company's needs (Application) |The design shall address the company needs and applications for at least| | |the next ten years. |Flexibility |The system design shall address the equipment flexibility and upgrade. | |Redundancy |The design will state the expected loading and redundancy of the | | |equipment | 1. 7. 2 Procurement Policy Statement In addition to the public and company procurement procedures, the ICT departments will specify in details the functional and capacity requirements of system before any purchase is done. Explanatory notes Before any system acquisition is done, the system administrator will be requir ed to have evaluated the company's needs. This will include system performance; reliability ultimate capacity and staff abilities included proposed training requirements. This will be in the form of Request for Proposal (RFP) documents. |IC T Issues |Actions | |Tender document |Shall have detailed system/equipment description of the performance, | | |reliability and capacity of hardware. The system life expectancy shall be| | |required | |Spares and Support |The system spares will be stated. The system support and staff training | | |clearly be addressed | |Authorised dealership/partnership |The vendor shall be required to state and prove the partnerships with the | | |manufacturer | |Tendering |The type of bidders to be invited shall be stated | 1. 7. 3 Commissioning/ Decommissioning Policy Statement System commissioning will be carried out as stipulated in the manufacture's testing/commissioning sheets for any new ICT equipment. Tests should nclude all the RFP system requirements. System commissioning is necessary to ascertain system performance all the designed parameters will be tested. After the commissioning the system passwords should be immediately changed as a security measure, to protect any data manipulation or corruption from the vendor. |ICT Issues |Actions | |Performance |All tests as per system design and manufacturer's | | |specification/performance shall be carried out. |Drawings |All system drawings shall be submitted ( at least three copies)and kept | | |in safe custody | |Equipment Cabinet keys |The equipment cabinet keys shall be handed over to the functional head | |Decommissioning |System decommissioning shall be carried out once the equipment is no | | |longer in use. | | |Commissioning sheets and drawings shall be used to determine the current | | |connection (Circuit termination) of the system. | | |The decommissioned equipment shall be removed from the Telecom room and | | |all wires/cables not used shall be removed. | |The drawings for decommissioned systems/equipment shall be retired. | 1. 7. 4 Maintenance Practices Policy Statement All ICT systems shall be maintained regularly as per manufacture's recommendations. Where system are placed in harsh environments, system maintenance will be carried out as deemed by the systems administrator. Explanatory notes All system maintenance should be done in house as much as possible. Outsourcing of maintenance (Annual Maintenance Contracts, AMC’s) contrac

Sunday, November 10, 2019

The Ship of Theseus

ABSTRACT: Endurantism and perdurantism are theories that describe how objects can persist through time. These theories will be used in an effort to solve a puzzle that has been dated all the way back to the first century: the Ship of Theseus. It will be determined that the two theories fail in solving the Ship of Theseus puzzle. According to Brian Garrett of Australian National University, metaphysics is concerned with the nature and identity of objects. 1 In order to increase understanding of the identity of objects, puzzles of constitution and identity are used by philosophers.There is a puzzle common in metaphysics: the Ship of Theseus, which was believed to be recorded by Plutarch in the late first century2. It is complex puzzle that consists of three different scenarios. The first scenario depicts a ship being dismantled and then rebuilt. The second scenario portrays the ship being completely remodeled. The third scenario is a mixture of the previous ones that have the ship bein g completely remodeled, but the removed planks are used to construct another ship. In order to solve this puzzle, one must be able to identify which ship is the Ship of Theseus.Philosophical theories can be used to solve philosophical puzzles such as this one and there are two theories that exist that help one understand how objects persist through time: endurantism and perdurantism. According to endurantism, ordinary objects are wholly present at each moment of time at which they exist3. In perdurantism, objects are four dimensional entities that consist of temporal and spatial parts and these objects persist by having different temporal parts at different times4. Once one has knowledge of endurantism and perdurantism, the theories can be used to solve puzzles such as the Ship of Theseus.However, in this paper, it will be shown that the puzzle of the Ship of Theseus cannot be solved using endurantism and perdurantism. This is because attempts made by endurantists and perdurantists result in unintuitive consequences. This will be done first by explaining and assessing endurantism and perdurantism. Then it will be shown that the two theories fail in solving the Ship of Theseus because of problems that are encountered. After that, the Extensionality Principle will be discussed, which is used by perdurantists as a criterion for identity.It will be determined that this principle is also flawed and is also unable to give an account for the identity of objects. Firstly, endurantism is the view that physical objects are three-dimensional and move through time. They are wholly present at each moment of time at which they exist. For example, if a man was born in 1975, attended kindergarten class in 1980, and graduated from high school in 1993, endurantists would claim that this man was wholly present at each of those different times. He will continue to wholly exist in the future as well.Primary motivation for this theory is that it is a more conventional view and is m ore in conjunction with believed upon ideas about the world. For example, when a woman is talking to someone, she believes that she is talking to that person as a complete object, wholly present; as opposed to just a temporal part of an object. The theory of endurantism has been explained. It must be noted, however, that this theory holds that two numerically distinct, but wholly present objects can co-exist for some of the time or at all times.Brian Garrett says that this hinders the authenticity of endurantism because the statement is strange5. Perdurantism does not have this problem. The theory of perdurantism is the view that ordinary objects are four-dimensional and are composed of temporal parts. An object is not wholly present at every possible time at which it exists because only its temporal parts exist. In the previous example, when the man is born, or attends kindergarten, or graduates from high school, the man is not wholly present according to perdurantism.Instead, it i s the man’s temporal parts that existed during those events; the man itself exists as a four-dimensionally extended whole. Primary motivation for perdurantism is that this theory is able to account for change within a physical object because the objects are four-dimensional. On the contrary, endurantism does not have this luxury. Perdurantism is also primarily motivated by how it better accommodates Albert Einstein’s theory of special relativity. There are problems that arise if both endurantism and special relativity are true. According to Steven D. Hales and Timothy A.Johnson of Bloomsburg University, â€Å"it would be misguided to argue† for endurantism because special relativistic effects â€Å"are negligible at human speeds†. 6 The theory of special relativity does not allow for endurantism because of how it requires objects such as humans to move through time at a slower speed than the speed of light. Given that special relativity is a widely accept ed theory, perdurantists have strong motivation to prove their view7. Secondly, even though endurantism and perdurantism help explain the persistence of objects over time, neither view is able to solve the puzzle of the Ship of Theseus.In the Ship of Theseus, there are three different scenarios. In the first scenario, the Ship of Theseus is dismantled and then rebuilt with each plank being returned to its original location— we’ll call this ship Y1. In the second scenario, the ship is completely remodeled with an entirely new set of planks— we’ll call this ship X1. In the third scenario, two ships are involved. The ship from the second scenario (now called ship X) is present, but an entirely different ship that is being constructed out of the planks that had been removed (called ship Y) is also present.In order to solve this puzzle, the Ship of Theseus must be identified. However, flaws in endurantism are shown by how the endurantist must deny that Y1 is e qual to Y. This is done in order to respect the necessity of identity and non-identity which states that if x = y, then necessarily x = y8. However, what this entails is that one could claim that if the removed planks had not been replaced in the third scenario, then ship Y would not have existed and instead ship Y1 would have existed. This means that the existence of ship Y or Y1 entirely depends on whether or not the removed planks were replaced.Brian Garrett refers to this consequence as â€Å"strange† because â€Å"we don’t think that the existence of a particular ship (or of anything else in space and time) depends on what happens in a region of the universe which exerts no causal influence on it†9. This is a flaw for the endurantism theory because it denotes that an object’s existence is dependent on an event that has no direct influence on it. Furthermore, perdurantism also fails in correctly solving the Ship of Theseus. According to perdurantism, the third scenario involves the presence of two ships prior to the repair of the Ship of Theseus.They are overlapping one another. This represents that the ships have a common temporal segment where they are basically one and the same ship. After the repair, the two ships separate with one being ship X and the other being ship Y. The problem, however, is that one cannot think that there are three possible outcomes anymore. One cannot think that the future of the Ship of Theseus will be the same as that of the ship in the first scenario, the ship in the second scenario, or the ships in the third scenario because each of the ships are distinct from one another.This is a problem, according to Garrett, because people â€Å"could sensibly wonder† if the future for the Ship of Theseus will be like any of the three scenarios when it is being constructed10. He means that ordinary people should be able to think about the Ship of Theseus and think about what future it might behold. How ever, the theory of perdurantism must deny that three possible futures are available for the ship. As a result, we are left with either believing that people are not able to wonder about the ship’s future (which cannot be true) or perdurantism is unable to solve the puzzle of the Ship of Theseus.Moreover, perdurantism fails in solving the puzzle because of the name: ‘Ship of Theseus’. It has been discussed that the Ship of Theseus has a temporal part where there are two overlapping ships. However, which of the two overlapping ships is the actual Ship of Theseus when the name is being called? This is a problem because both ships cannot be called the Ship of Theseus. Perdurantism cannot account for this confusion. This shows that perdurantism is unable to solve the puzzle of the Ship of Theseus.Overall, the theories of endurantism and perdurantism have been explained and it has been shown that both theories are unable to solve the puzzle of the Ship of Theseus. How ever, there are criterions for identity that exist that could provide a criterion of identification for objects through time. One criterion for identity that will be talked about is the Extensionality Principle; it is used by perdurantists because it is a criterion of identity for four-dimensional objects11. The Extensionality Principle, according to Garrett, states: if x and y are objects with the same proper parts, then x=y.This means that if two different objects have the same properties, then the two objects are the same12. However, there are flaws in the Extensionality Principle that causes it to fail in providing a criterion of identification. According to Lecture notes, in order for objects to be identical, it is not enough for the object to have all the same parts. This is because the parts of identical objects must be related to each other or arranged in a certain order13. Therefore, a problem arises regarding temporal parts of an object. How do the temporal parts have the proper order?As a result of this problem, the Extensionality Principle must be revised. But if it is revised, according to lecture notes, the principle will no longer be an extensional principle14. Furthermore, there is no explanation as to why time would provide the correct order for temporal parts of an object. These problems show that the Extensionality Principle fails in providing a criterion of identification; and this harkens back to how the puzzle of the Ship of Theseus cannot be solved. It has been shown that the puzzle of the Ship of Theseus cannot be solved.This was first determined by explaining the theories of endurantism and perdurantism and revealing the primary motivation for each of them. These theories depict how objects persist through time; yet, the theories cannot be used to correctly solve the Ship of Theseus puzzle. Lastly, the Extensionality Principle was described and it was shown that the principle was unable to solve the Ship of Theseus puzzle. As one can s ee, the Ship of Theseus is a difficult puzzle to solve and it has been around since the late first century. Will there ever be a theory that correctly identifies the Ship of Theseus once and for all?