Saturday, January 25, 2020

The Cost of the Vietnam War :: Papers

The Cost of the Vietnam War The Vietnam War was the longest and most unpopular war in which Americans ever fought. And there is no reckoning the cost. The toll in suffering, sorrow, in rancorous national turmoil can never be tabulated. No one wants ever to see America so divided again. And for many of the more than two million American veterans of the war, the wounds of Vietnam will never heal. Fifty-eight thousand Americans lost their lives. The losses to the Vietnamese people were appalling. The financial cost to the United States comes to something over $150 billion dollars. Direct American involvement began in 1955 with the arrival of the first advisors. The first combat troops arrived in 1965 and we fought the war until the cease-fire of January 1973. To a whole new generation of young Americans today, it seems a story from the olden times. In 1983, the unfolding of the Vietnam tragedy was the focus of an extraordinary documentary series broadcast on public television. When first aired, the series was recognized immediately as a landmark. It had taken six years to make. Researchers had combed film archives in eleven countries and the result was a stunning record of the conflict as it happened. Program Notes Roots of a War The end of World War II opened the way for the return of French rule to Indochina. Despite the ties he had forged within the American Intelligence community, and his professed respect for democratic ideals, Ho Chi Minh was unable to convince Washington to recognize the legitimacy of his independence movement against the French. French generals and their American advisors expected Ho's rag-tag Vietminh guerrillas to be defeated easily. But after eight years of fighting and $2.5 billion in U.S. aid, the French lost a crucial battle at Dienbienphu - and with it, their Asian empire. America's Mandarin With a goal of stopping the spread of communism in Southeast Asia, America replaced France in South Vietnam - supporting autocratic President Ngo Dinh Diem until his own generals turned against him in a coup that brought political chaos to Saigon. LBJ Goes to War With Ho Chi Minh determined to reunite Vietnam, Lyndon Baines Johnson determined to prevent it, and South Vietnam on the verge of collapse, the stage was set for massive escalation of the undeclared Vietnam War. America Takes Charge In two years, the Johnson Administration's troop build-up dispatched 1.

Friday, January 17, 2020

Information security Essay

Most organizations today are adopting and integrating technologies in their production with an aim of improving production, efficiency, profitability and the competitive advantage in the market. This has been accelerated by the increasing globalization and innovation of new technologies which pose a major competitive threat to many organizations. Also, formulation of environmental standards as well as increased expectation on the standards and quality of goods and services by both the government and customers has also necessitated adoption of new technologies to ensure this is met. New technologies in use today like the web 2. 0 and also the new internet as well as wireless technologies have led to increased efficiencies as well as increased productivity for most organizations. However, despite the advantages which accrue from introduction and use of new technologies in organizations, they pose major security threats to an organization. Data hijack by criminals as well as terrorism threats are some of the challenges that organizations are facing during new technology implementation processes (Bazelon, Choi & Canady, 2006). Security issues in regard to new technologies implementation in an organization Security is a top concern for most business since it may lead to destruction of a company’s reputation thus affecting the competitiveness of an entity. With increased globalization and increased terrorist threats, security risks have increased posing a major threat to most organizations. One of the major threats that companies face while implementing information technologies are the risk of losing or protecting sensitive data. Information technologies especially via internet and other wireless technologies are accessible globally which poses a major threat to an organization. Organizations hold private and sensitive information regarding their employees, production processes and also marketing strategies which are vital for competitive advantage. However, with technology implementation, and the dynamism in technology, such data may be accessed by unauthorized individuals causing a business great harm in terms of profitability. This also exposes the employees as well as an organization’s customers’ at risk of fraudulent activities via technologies. Information security experts insist that just like information networks operate or cross borders with no regard for the provincial and national boundaries, also security vulnerabilities and threats pass in the same way thus necessitating greater and stern security measures to ensure that the threats are minimized (Hinojosa, 2005). Another threat that organizations are facing is terrorist attacks and threats. Currently, there are many terrorist groups which operate globally and they employ high technologies to carry out their tasks and to harass businesses and employees as well as the customers. An increase in global terrorist organizations in the world that are connected via the new technologies poses a major security threats to most organizations in the world. Terrorists may not only be interested with soliciting the financial and production processes of an organization, but also the structural and day to days activities of an organization with an aim of identifying weak areas or points which could be used to attack an organization. This is made possible by new technologies which enable then to tamper the security measures taken by an organization to ensure that it is protected (Sussman, 2008). Phishing and data mining is also another information security risk that is faced by organizations during implementation of technologies in an organization. Phishing refers to the unauthorized use of personal information of another person which is obtained through networks. It also involves alteration of an individual’s computer software with an aim of obtaining the computer owner’s personal information by scrupulous individuals and for the purposes of defrauding the person or harming their reputation or career. With implementation of new technologies in an organization, the entity is enabled to sell its goods and services online and all the transactions are carried without having to meet the customer or the client. While making the payments, a client gives his private financial data depending on the mode of payment which he or she uses. Computer criminals have a way of tampering with or gaining access of such information which they can manipulate to make purchases while pretending to be the clients. The business thus faces a risk of being sued by a client on such grounds and for lack of adequate protection measures. This has increased the cost of implementing technology especially with different cases of security breach being reported today. Organizations are supposed to ensure that the private information of their clients and employees are well protected and that their privacy is upheld despite the cost this may involve (Ena, 2008). Risk of loss of important documents by an organization has also been a major security issue while implementing information technology. Apart from the risk of terrorist threats and phishing, an organization also faces the risk of losing vital information through dangerous programs such as the viruses which are transmitted via the internet and other networks. If such programs find their way to the computers and other technologies in a company, a company may risks losing most of its vital information as these programs corrupts the whole network system in an area. This could be dangerous for and organization as it may lead of reduced productivity, increased costs and reduced earnings (Blankespoor, 2005). With increased awareness of information security threats increasing in the world, the attackers have changed their tactics posing even a major threat to an organization. Most of the attackers are usually professional information technologists who invent new methods of accessing data from an organization despite the security measures taken. As mentioned earlier, technology is changing at a very high speed and so are the security threats to an organization. The dynamism of technology is a risk which cost organizations heavily as they try to keep pace with it. While implementing new technologies, organizations are also faced with the problem of testing the validity of the technology. Most of the cases involving security breach end up being the problem in an organization. IT companies exonerate themselves by arguing that lack of adequate security policies in an organization are the major causes of any cost that an organization may incur (Wallace, Lusthaus. & Kim, 2005). Conclusion Information technology is a major strategy that has enabled most of the businesses to perform well in terms of growth and expansion. New technologies have been on high demand in the recent past especially as most organizations go global which necessitates networking. Technology improves the efficiency, effectiveness and the overall productivity of an entity. However, it poses major threats to the privacy of a company as well as its clients and employees. Stern security measures should be taken to ensure that technology implantation in an organization does not turn out to be more costly. This can be done though formulation of technology security policies and procedures to ensure privacy is upheld.

Wednesday, January 8, 2020

The Diet Of A Baby Girl Named IIce - 1825 Words

Introduction Parents Joseph and Silva Swinton had their first child a baby girl named IIce. IIce was delivered at home without a doctor, nurse or midwife present. IIce was born 3 months premature, weighing only 3 pounds and suffered from respiratory difficulties. Still she received no medical attention. Silvia Swinton had once weighed more than 300 pounds. She dropped to the normal weight by committing to a strict vegan diet. The diet consisted of vegetables, fruits, grains and nuts; but eliminated meats, fish, milk and cheese. Joseph Swinton also adapted this vegan diet and they mutually decided to place IIce on the same diet. They believed the diet improved their health and prevented chronic conditions associated with obesity.†¦show more content†¦The doctors placed her on a medically prescribed diet. Later both children were given physician approved vegetarian diets. The Queens District Attorney’s Office charged the Swinton’s with first-degree assault, claiming the parents knew or should have known the diet would endanger IIce’s life. Also they had failed to seek medical attention. The opposing side’s lawyer argued that IIce being premature was the main cause of IIce’s medical state. The Swinton’s argued they did care for their child, they did not intentionally harm her and should not be deprived of their parental rights. The jury of the New York Supreme Court found the Swinton’s guilty of first-degree assault as well as lesser charges of reckless endangerment and endangerment of the welfare of a child to the first-degree. At the age of three years old, IIce was well nourished and was beginning to develop more than normally. However, IIce suffered from permanent neurological damage due to prematurity and malnutrition. Ethical Principles The ethical principles involved include: Autonomy, Finality, Justice, Non-maleficence, Utility, Tolerance and Rationality. These principles can be applied to the case as a whole or to specific events that unfolded. In respect to IIce, non-maleficence was violated when she was in the care of her parents. Her parents refused to seek medical attention when they found out she was premature, had respiratory difficulties, or did not respond well to the vegan