Tuesday, May 26, 2020

Soyinka’s Views of Modernity and Tradition in The Lion and...

A common post-colonial struggle shows itself in Soyinka’s The Lion and the Jewel between modernity and the traditional, seen both in a transparent manner as the Western World clearly and gradually influences the play’s village of Ilujinle as well as a deeper way between two of its central characters—Lakunle representing modernity while Baroka represents tradition. However, although the struggle is brought to fruition throughout the course of the play, it seems rather evident for which side Soyinka himself is more of a prominent advocate, obvious by the way he portrays both Lakunle and Baroka, and how they conclude their roles in the play. Lakunle’s follies in the play become his undoing, whereas Baroka’s strength and titular power as the†¦show more content†¦Given the sudden freedom to choose how their country would be run, Nigerians were faced with the fact that much of the New World had its advantages, but it came at the price of affectin g (or even potentially nullifying) their cultural traditions. It seemed difficult to recognize some advantages of one culture when advocating for the other. This led much of the villagers (in both Nigeria and the play’s town of Ilujinle) to be either for modernity or tradition almost exclusively. In the beginning of The Lion and the Jewel, both Baroka and Sidi seem to be strong supporters of keeping with tradition, while Lakunle is the obvious supporter of modernity, seen as he attempts to be a â€Å"Western gentleman† by offering to help Sidi carry her pail of water. However, Sidi refuses his proposal of marriage because Lakunle will not pay the bride-price, a very traditional outlook on the situation. While Lakunle is a strong proponent of a Western romantic engagement, Sidi finds his offers of marriage without a bride-price offensive, saying she does not wish to be â€Å"a cheap bowl for the village to spit† (Soyinka 896). Later in the play, however, Sidi see ms to change her tune when she discovers her own beauty. Finding her picture on the cover of a magazine causes her to rethink her position and refuse Baroka’s offer of marriage, suddenly rejecting the traditional thought of the importance of marrying theShow MoreRelatedSummary Of Wole Soyinkas The Lion And The Jewel1617 Words   |  7 PagesFor my final paper I chose the works of Wole Soyinka and his play The Lion and the Jewel. Throughout this play there is a constant battle between tradition and modernity as well as a post-colonial struggle seen both in a exhibited in the plays village of Ilujinle. Soyinka published this play at the time Nigeria was battling for independence and freedom under the British control around the 1940’s and 1950’s. Due to this, Nigeria was struggling with whether or not it was prepared for independenceRead MoreThe Conflict Between Tradition And Western Influence On Nigeria1665 Words   |  7 Pagesbegan exploring and colonizing the land grounded in tradition and folklore, Nigeria effectively adapted and grew. Even when torn apart, Nigeria has pulled itself back together and grown stronger. There are many aspects to Nigeria’s culture that are worth considering. But one aspect of Nigeria has proven itself to be rich, transformative, and long-lasting: literature. Nigeria has produced rich literature that shows the conflict between tradition and western influence as well as dividing war. Further

Friday, May 15, 2020

The Things They Carried By Tim O Brien - 1146 Words

Jace Marzan Instructor Kucera English 100 15 July 2015 Mary Anne The Things They Carried is a war story based on the Vietnam War. One story the author, Tim O Brien tells is the story of Mary Anne, Mark Fossie’s childhood sweetheart. Mary Anne’s curiosity allows her to acquire knowledge about Vietnam’s culture and language. She wants to learn about Vietnam, the war and what they do. She also isn’t afraid and is eager to aid the casualties. One night she goes out on an ambition with the Green Berets, and the next day she and Fossie become engaged. Eventually she disappears for 3 weeks only to arrive at the special forces hut, and when seen Mary Anne is wearing the same outfit as before, but with a necklace of human tongues around her neck. She says what happened isn’t bad. In the end, she crossed to the other side never coming back, becoming one with the land. Mary Anne symbolizes war soldiers going through the war getting consumed by the darkness of the war. She was this peppy, happy girl who wanted to visit her b oyfriend, Mark Fossie. She would not want to learn how to shoot or wear a necklace with tongues when she first visits. Then, she started changing her appearance, attitude when she began to hang out more with Greenies and learned how to fight and shoot. She lost her innocence and herself because she is not the same girl as she was when she first visited Mary Anne was in Vietnam during the war which â€Å"had the effect of a powerful drug [..] she wanted more, sheShow MoreRelatedThe Things They Carried By Tim O Brien892 Words   |  4 PagesThe Vietnam War was a long, exhausting, and traumatic experience for all of the soldiers and those who came with them. The Things They Carried, by Tim O Brien illustrates the different affects the war had on a variety of people: Jacqueline Navarra Rhoads, a former nurse during the Vietnam war, demonstrates these effects within her own memoir in the book, The Forgotten Veterans. Both sources exemplify many tribulations, while sharing a common thr ead of suffering from mental unpredictability. DesensitizationRead MoreThe Things They Carried By Tim O Brien1377 Words   |  6 Pageslove to have it as good as we do. Tim O’Brien’s The Things They Carried discusses many veterans who experience the burden of shame and guilt daily due to their heroic actions taken during the Vietnam War. The book shows you how such a war can change a man before, during, and after it’s over.     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As I reflect on the many conflicts America has been a part of, none can compare to the tragedies that occurred in The Vietnam war. As told in The Things They Carried (O’Brien), characters such as NormanRead MoreThe Things They Carried By Tim O Brien1457 Words   |  6 Pagesthe theme pertains to everyone regardless of their background. It conveys the same ideas to people from all across our society. Lastly, a classic is timeless, which means it has transcended the time in which it was written. In Tim O’Brien’s novel, The Things They Carried, he offers a new, intriguing way to view war or just life in general and also meets all of the crucial requirements mentioned above to qualify it as a book of literary canon. Though this book is technically a war novel, many peopleRead MoreThe Things They Carried By Tim O Brien1242 Words   |  5 Pagesâ€Å"Tim O’Brien is obsessed with telling a true war story. O Brien s fiction about the Vietnam experience suggest, lies not in realistic depictions or definitive accounts. As O’Brien argues, absolute occurrence is irrelevant because a true war story does not depend upon that kind of truth. Mary Ann’s induction into genuine experience is clearly destructive as well as empowering† (p.12) Tim O’s text, The Things they Carried, details his uses of word choice to portray his tone and bias. Tim O’BrienRead MoreThe Things They Carried By Tim O Brien1169 Words   |  5 Pagesbut are set in the past and borrows things from that time period. A story that fits this genre of literature is The Things They Carried. The story is about Tim O Brien, a Vietnam veteran from the Unite States, who tells stories about what had happ ened when he and his team were stationed in Vietnam. He also talks about what he felt about the war when he was drafted and what he tried to do to avoid going to fight in Vietnam. The Things They Carried by Tim O Brien was precise with its portrayal of settingRead MoreThe Things They Carried By Tim O Brien1004 Words   |  5 Pages Tim O’Brien is a veteran from of the Vietnam War, and after coming home from his duty he decided to be a writer. His work â€Å"The Things They Carried† is about a group of soldiers that are fighting in the Vietnam War. The first part of the story talks mostly about physical items that each soldier carries, and also mentions the weight of the items as well. Though, there is one exception to the list of physical things. Lieutenant Cross is a character of the story, and Tim O’ Brien quickly states theRead MoreThe Things They Carried By Tim O Brien896 Words   |  4 PagesTrouble without a doubt is what First Lieutenant Jimmy Cross c arried around his shoulders because he was out in war, where mistakes happen. Lost and unknown of his surroundings he had to lead his men into safety, while destroying anything they found. First Lieutenant Jimmy Cross only holds onto one thing for hope and that is Martha, the woman who he hopes is a virgin to come back to. Tim O’ Brien introduces symbolism by adding a character that has a meaning of purity and a pebble, which symbolizesRead MoreThe Things They Carried By Tim O Brien Essay832 Words   |  4 PagesSummary: â€Å"By and large they carried these things inside, maintaining the masks of composure† (21). In Tim O’brien’s The Things They Carried, the American soldiers of the Vietnam War carry much more than the weight of their equipment, much more than souvenirs or good-luck charms or letters from home. They carried within themselves the intransitive burdens—of fear, of cowardice, of love, of loneliness, of anger, of confusion. Most of all, they carry the truth of what happened to them in the war—aRead MoreThe Things They Carried By Tim O Brien1369 Words   |  6 PagesMany authors use storytelling as a vehicle to convey the immortality of past selves and those who have passed to not only in their piece of literature but in their life as an author. In Tim O’Brien’s work of fiction The Things They Carried, through his final chapter â€Å"The Lives of the Dead,† O Brien conveys that writing is a matter of survival since, the powers of s torytelling can ensure the immortality of all those who were significant in his life. Through their immortality, O’Brien has the abilityRead MoreThe Things They Carried By Tim O Brien1407 Words   |  6 Pages       Our introduction stated that in â€Å"The Things They Carried,† author Tim O’Brien tells us not directly of the soldiers of Vietnam, or the situations they find themselves in, but about the things they carry on their shoulders and in their pockets. These â€Å"things† identify the characters and bring them to life.   I find that to be true as the author unfolds the stories about war and the uncommon things one carries in to war both inadvertently and on purpose.  Ã‚  Ã‚  As it was noted: Stories about war –

Wednesday, May 6, 2020

I Discovered A Profound Enthusiasm For Learning About...

After the second year of my undergraduate studies while conducting fieldwork, I discovered a profound enthusiasm for learning about the lives of ancient peoples that has furthered my determination to pursue research and a graduate degree. In the summer of 2015, I already had two years of experience working on the Leon Levy Expedition to Ashkelon, Israel as a volunteer. That year I was chosen to work on a different project; I was part of a small team tasked with excavating the recently discovered Philistine cemetery. During that season and the season that followed, I not only learned about excavating human remains, but I also had the opportunity to study the lives and deaths of the deceased individuals: what they ate, their illness and injuries, their lifestyles, and their relationships with others outside their communities. Even their feelings for each other were sometimes evident. I became fascinated with understanding who the individuals were, what kinds of lives they had, and how they viewed the world, with the last question being the most intriguing. We used the small amount of artifacts buried with the deceased and previous finds from inside the city to paint a picture of their lives, but there is so much still unknown about the context in which the Philistines lived. When I returned to Johns Hopkins University, I maintained my newfound interest in ancient contexts and I began to channel it into my research. Through my classes, I conducted several projects inShow MoreRelated65 Successful Harvard Business School Application Essays 2nd Edition 147256 Words   |  190 Pages Lauren. II. Harbus. III. Title: Sixty...five successful Harvard Business School application essays. HF1131.A1352009 808.06665-dc22 2009012531 First Edition: August 2009 10 9 8 7 6 5 4 3 2 1 CONTENTS Acknowledgments Introduction ix xi I. Defining Moment Stacie Hogya Anonymous Anonymous David La Fiura Anonymous Avin Bansal Anonymous Brad Finkbeiner Anonymous 4 7 10 13 17 20 23 26 29 ii. UndergradUate experience John Coleman Maxwell Anderson Lavanya Anantharman Rosita Najmi Faye

Tuesday, May 5, 2020

Network Security and Cryptography Secure Data Storage and Transfer

Question: Prepare a report on data storage, data transfer, user authentication and network monitoring? Answer: Introduction In this report the existing network of Your Events will be analyzed from the information security viewpoint. There will be security planning for data storage, transmission etc. over the Intranet and Internet, use of different kind of authentication methods for different categories of users. Secure Data Storage and Transfer Currently, the company manages an Intranet, a central data center and related IT infrastructure for their business. They have geographically separated offices at four large cities and the head quarter is in London. At head headquarter, there is a data center for the company. There are file, print and mail servers. The sales staffs sell tickets via telephone and there is a website for the company also. Customers can purchase tickets from the website. Thus there will be transaction of customers personal information, credit card information etc. moreover, the company stores all these information at their web server. There is a backup of these data from web server to the file server. File server data are accessed for accounting activities. Now, the company collects, stores and processes huge amount of personal data and credit card information from the customers. It is the sole responsibility of the company to ensure the privacy of those data when stores and processed by the company. Also there are data protection issues. These data must be protected from all kind of misuse, unauthorized access, damage, modification etc. The security planning for ensuring secure storage and transfer of data are given as, The company should expand its network a bit. It should redesign the architecture of data storage. The web server should be dedicated for website related activities. It handled transactions from customers directly and deals with all web traffic directly. This is not a secure approach. There should be some firewall and proxy server for protecting the web server. Because, in current scenario, the web server contains sensitive credit card information and personal data from the customers. If there is some attack on the web server, then these data will be at risk. Thus there should be some proxy server to deal with all traffic. Firewall will be installed on the proxy server to monitor the traffic. (Arregoces Portolani, 2003) If possible then the company should refrain from storing credit card information of its customers. These are sensitive data and does not help in any business related work or decision making. Storage of such information adds more security issues to the company. Thus, it should not be stored permanently in the servers of the company. There should be proper backup and recovery management process. Instead of keeping back up of data from web server to file server, the company should adopt some proper backup and recovery management. This recovery management policies and infrastructure will save the company from disasters and potential data losses in the face of some fatal security attacks or natural calamities. (Harrington, 2005) While transmitting data from one center to another, there are chances of security attacks like spoofing, eavesdropping and other kind of man in the middle attacks on those data. The company should use proper encryption, decryption of those data while transmitting those. Another alternative is building some VPN or Virtual Private Network connecting all business sites. There should be proper tunneling methods for this infrastructure. (Stewart, 2013) Insider attack is a risk for the data center at head office. The data center itself should be protected. There should be restrictions on entry to the data center and operating on the data center. There should be proper user authentication techniques. The company uses several secure payment gateways for collecting payments from the customers. There are several rules, regulations and best practices to implement and use such platforms and online payment system. The company should confirm to those. Use Authentication There are different kinds of users who interacts with the IT infrastructure, information systems and website of the company. There are visitors and customers who visits the company website, makes ticket purchase over online platform. There are the sales staffs who access the system, checks status of tickets and books tickets on the behalf of the customers who purchases tickets via telephone. There are accounting staffs who access transactional information and file server, to carry on different accounting operation. However, there is lack of proper access control in the current scenario. For example, the data from web server is stored at the file server as a backup. And from there accounting staffs access those data. The backed up data includes personal data of the customers and information such as credit card information. Now, these data will not be needed for accounting. Accounting will need access to the transactional, sales, procurement, payroll etc. related data. In fact, the credit card data will not be required by the business or any other staffs. So, there should be different levels of access control and proper user authentication techniques before granting requests for accessing sensitive business, customer and customers credit card data. The access control and authentication techniques should be, For sales staff there should be limited access to the system. They will not be able to see credit card information or personal information about the customers. Also they wont be able to access accounting or other critical business data. The authentication process can be based on username password along with some CAPTCHA or security question. For accounting staffs they access more sensitive business information, thus there should be more degree of authentication. There should be biometric based authentication process. While purchasing tickets, or logging in users on the website should be asked to follow some authentication process. It may be similar to the authentication process for sales staff. There should be biometric based authentication while entering and working on data centers. All these authentication will save from unauthorized access to sensitive business data. It will also ensure availability of data to legitimate users. (Apelbaum, 2007) For transmitting data between offices, a secure private VPN channel should be created. It will build a private network for the company over the public Internet. The systems across the business sites will be able to connect to the VPN and can data securely and privately across the VPN channel. There are several benefits of using VPN in terms of security, functionality and management of the network. There will be virtual point to point connections between the systems. Also there will be virtual tunneling protocol for more secured infrastructure. The tunneling process will also help to encrypt the traffic or data transmission across the VPN. The implementation can use technologies like IPSec or OpenVPN. (Snader, 2006) For securing the data transmission from customers or user of the website over the Internet, the company needs to implement security control and implementation like SSL or Secure Socket Layer, HTTPS, Digital certificates, secure payment gateways etc. All transaction at the website will be done through SSL or HTTPS. It will help to transfer information like credit card information securely over the Internet. (Stallings, 2006) There are two cryptographic keys used in SSL. The public key is used by every customer for encrypting their data, on the other hand, the company will use a secret private key for decrypting the encrypted text. SSL creates a secure connection between client and server. On the other hand, HTTPS sends each message from user to the receiver securely. Thus SSL and HTTPS are complementary to one another. (Ciampa, 2011) The company can use digital signatures and use the same for sending any message to the customers or staffs. This will ensure that the company is sending the message, not any other person. This will help to ensure the identity of the company to its customer. For example, after sharing a credit card details, the customer need to be sure that whether the details have been reached to the company or not. The acknowledgment message and digital certificate from the company will help to ensure that. Even is worse cases, if the credit card information have been stolen from midway and used by any other attacker, then the company can prove that. Because the attacker can disguise as the company but wont have the digital certificate. (Speciner, et al., 2002) There are other kind of security mechanism for data transmission over the network for example PKI or Public Key Infrastructure. This also helps in securing data transmission over the Internet. There is also a pair of encryption keys and digital certificates. But PKI is basically used for email encryption. As the company does not use email based communication with their customers, so this technique is not very much applicable for them. (Ciampa, 2011) Vulnerability can be there in any information system or information technology infrastructure. Identification and safeguarding the vulnerabilities is a part of securing the network. It needs a constant monitoring process. There are various benefits from these vulnerability monitoring and scanning processes. Some of the benefits are, It protects the network by conducting comprehensive network monitoring and scanning. It updates the IT resources whenever needed. And the process is automated. It helps in IT auditing and reporting about the unmatched cases. The cost for data protection is reduced. There are lots of automated tools and techniques to make the network secure from hackers. Also there are different types of vulnerability scans. Vulnerabilities can come from the network of the customer or from Internet. There can be External and Internal scans that refers to scanning of private ports and LAN of the customer respectively. On the other hand there is range scanning for all external ports of a system. It checks all well-known ports, unused IP addresses etc. and finds if there is any exploitation of the vulnerabilities. (Manzuik, et al., 2006) Comments The processes, techniques etc. discussed in the report will help the company to make their current infrastructure secure for present and future. While preparing the report, it helped to learn about the networks and IT infrastructures used by the organizations, what are the different kind of threats faced by these organizations etc. Along with that, it helped to understand different countermeasures for the security risks, how those can be mitigated etc. References Apelbaum, Y., 2007. User Authentication Principles, Theory and Practice. s.l.:Fuji Technology Press. Arregoces, M. Portolani, M., 2003. Data Center Fundamentals. s.l.:Cisco Press. Ciampa, M., 2011. Security+ Guide to Network Security Fundamentals. s.l.:Cengage Learning. Harrington, J. L., 2005. Network Security: A Practical Approach. s.l.:Elsevier. Manzuik, S., Pfeil, K. Gold, A., 2006. Network Security Assessment: From Vulnerability to Patch. s.l.:Syngress. Snader, 2006. VPNs Illustrated: Tunnels, VPNs, And IPSec. s.l.:Pearson. Speciner, M., Perlman, R. Kaufman, C., 2002. Network Security. 2nd ed. s.l.:Pearson . Stallings, W., 2006. Cryptography And Network Security. 4th ed. s.l.:Pearson . Stewart, J. M., 2013. Network Security, Firewalls and VPNs. 2nd ed. s.l.:Jones Bartlett Publishers. Tipton, H. F. Krause, M., 2007. Information Security Management Handbook. 6th ed. s.l.:CRC Press.