Friday, November 29, 2019

Political Philosophy and Machiavelli free essay sample

Nicolo Machiavelli is a well known philosopher of the Italian Renaissance from the sixteenth century. The return of the Medici family in Florence in 1512 forced Machiavelli out of office, and he wrote The Prince after retiring from the public. The Prince is one of his most famous works, it describes the means by which a new leader may gain and maintain power. His ideas can be applied to new rulers ranging from a new principal to a new president of a new country. While discussing his ideas for new rulers, Machiavelli says Upon this a question arises: whether it be better to be loved than feared or feared than loved? (Machiavelli 98). If a ruler is not able to do both, it is better to be loved than feared. Machiavelli answers his own question through his ideas of what makes a successful ruler. He argues that a prince is much safer being feared than loved. We will write a custom essay sample on Political Philosophy and Machiavelli or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Machiavelli says â€Å" for love is preserved by the link of obligation which, owing to the baseness of men, is broken at every opportunity for their advantage; but fear preserves you by a dread of punishment which never fails. (Machiavelli 99). He says that being loved creates opportunity for being taken advantage of and being feared doesnt fail. Bringing fear to his people with cruelty would make them united and loyal. Most people who are fearful of any authority fear punishment, so they are more inclined to not cross the line of disrespect. Without a doubt, being loved is more desired from the people and has a greater value compared to being feared, even though the perks of being feared can make a leader successful. Since its better to be loved than feared, there are three important characteristics to have to ensure that the new people youre ruling love you; these characteristics are being honest, having respect, and being protective. Honesty is an important characteristic to have because the body of people youre ruling and the way they act is a reflection of yourself. If you make honest and good behavior a key value, your people will do the same. If you dont make honest and good behavior a key value, your people wont trust that you are always doing the right thing and telling the truth. Machiavelli says, Everyone sees what you appear to be, few experience what you really are. (Machiavelli 106). His quote shouldnt be true if youre an honest and truthful leader. Machiavelli says in his quote that a leader does not show his complete self to everyone, that he displays an act of goodness to his people and only reveals what he really is to those who ask for it. Being an honest leader inside and out will only help gain your peoples trust and true love. This quote also ties into the one that reads it is unnecessary for a prince to have all the good qualities I have enumerated, but it is very necessary to appear to have them. (Machiavelli 250). Machiavelli says that a leader must put on a false face to his people and pretend to have qualities that he does not actually have. Its not acceptable to hide yourself from your people because if you say youre going to protect them no matter what and you back out when something bad happens, your people will be disappointed and wont have trust in you. A successful leader who wishes to be loved should be honest to his people for who he really is because it will give him respect. You cant gain respect without giving respect. Respect is one of the most important characteristics to have when being a leader because people always want to be in an environment where they feel valued. A leader isnt going to be successful if their people arent happy and feel as if they arent important. If a leader is genuine with respect, his people will be more willing to give back respect and do as he says. Though, the truth is that it is important to give respect whether they feel the leader deserves it or not. As Machiavelli says, A prince is also respected when he is either a true friend or a downright enemy. (Machiavelli 250). It doesnt matter the relation you have with your leader, whether theyre a true friend or a downright enemy, youre going to respect them just because theyre your leader. Your people may not like what you do, but you will be respected. Its obvious that being respected out of actual love is the better than being being respected out of fear, and that good respect should lead to good confidence within the leader. The feeling of being protected is desired from a lot of people. If youre a new principal, your students and staff want locks on doors and an officer nearby. If youre the new president of a country, your nation wants to know that they have a reliable and strong army fighting for and protecting the country. A successful leader should always be ready for whatever situations may come. Machiavelli says, â€Å"He who does otherwise, either from timidity or evil advice, is always compelled to keep the knife in his hand. (Machiavelli 61). A leader should always be ready for quick action if some situation should arise. Your people will love and admire you if they know youre protecting them and is always cautious for quick problems. It takes great courage and confidence to take full responsibility for your peoples safety and well being. Being honest, having respect, and being protective are characteristics of being a successful but loved leader that have applied to people from before Machiavellis time all the way up to present day. Its easy to spot feared leaders such as Hitler apart from loved leaders like Martin Luther King Jr. Being loved not feared is better to be if you cannot be both because the people youre leading actually like you for who you are and are willing to do what you say, they arent scared into doing it. Martin Luther King Jr. led his people with the same respect they gave him, he was honest and true with his feelings, and he went above and beyond to change the worlds way of how they treated colored people to protect them from getting hurt and discriminated any longer. His people loved and admired him for who he really was, he didnt hide anything. Martin Luther King Jr. was a successful leader because he was loved and possessed honesty, respect and protectiveness.

Monday, November 25, 2019

Technology, Changing our lives essays

Technology, Changing our lives essays The 21st century was never predicted to be what it is by our founding fathers. The truth is nobody ever expected our country to come down to the way we see it today. Computers and technology are now part of our daily lives. Weve come upon to depend on them to function and to live. Today in airports and other facilities we all must go through a metal detector or have someone pass over us a hand-held detector. Who wouldve thought that wed ever have such a thing like hidden cameras, or motion sensors? Nobody expected it, but now its part of us. The fourth amendment protects us as citizens against unreasonable searches and seizures. Probable cause and warrants must be issued before entering a civilians home. However the bill of rights was written in 1787, thats almost 200 years ago. Do the same principles and understandings still apply today? More Exceptions than rules? Justice Lewis Powell has even admitted that certain parts of Fourth Amendment law are intolerably confusing. Some of the cases being presented before our judges today seem unreasonable and confusing. They find themselves making exceptions to the fourth amendment. Some of the things we have today wouldve shocked and scared the hell out of the people who wrote the fourth amendment. Guns and drugs are a big problem to our country and being in the safety of your house may not always prove effective against law-enforcement. Communication technology is very useful for those who want to pass information quickly and effectively. However, what if this is used against the greater good? Criminals can easily set up plans and use technology to their advantage. Also drug dealers with their pagers and cell phones can make quick money in a matter of a few seconds. Did the people who wrote the fourth amendment take these things into account? ...

Friday, November 22, 2019

Cost and benefit of the London Olympic 2012 Dissertation

Cost and benefit of the London Olympic 2012 - Dissertation Example Additionally, even the Russian government encountered deficits of approximately 9 billion US dollars after organizing the 1980 Olympic Games. Nevertheless from the subsequent Olympic Games that were hosted by Los Angeles in the year 1984, the Olympic Games were commercialised as an event. As a result, Los Angeles earned direct revenues worth 200 million US dollars and indirect revenue of 3 billion US dollars from the 1984 Olympics. With the passage of time and the rapid commercialisation of the Olympic Games, more and more cities have become interested in hosting the event as it produces big fortune for the city and impel the economic growth of the country. In the year 1992, Barcelona hosted the Olympic Games, and earned direct revenues greater than 9.5 billion US dollars in addition to indirect revenues worth 16.4 billion US dollars (Brunet, 1995). This magnitude of profitability and the enduring legacy economic affect on the city owing to the organization Olympic Games, catch the f ancy of a number of big corporate houses who endeavour for the sponsorships. It is evident the financial as well as economic impact of hosting the Olympic Games is anticipated to be extensive, predominantly at the local level and to a smaller degree at the country level. The total financial consequence of the Olympic Games on the city or the nation hosting the Game is generally spread over the years. Hence, the study of economic impacts of the Olympic Games on the host city has been a popular topic of investigation for researchers. The 2012 Olympics is being held in London. It has the potential of generating huge amount of revenues as well as exhibit London on the global platform this year. The Olympic Games is expected to motivate a... The second chapter, that is, Literature Review, would focus on the review and discussion of the findings of prior studies on the benefits, particularly financial and economic, of Olympic Games. This chapter would hence discuss the researches that have been carried out by other researchers in the topic under discussion. For the better understanding of the expected financial benefits of 2012 Olympic Games on the United Kingdom, this segment of the research study would focus on the preceding Olympic Games that were held in Being, Sydney, Atlanta, Barcelona and Athens among others. In this context, the financial and economic benefits that these host nations had enjoyed would be conferred with the help of cost benefit analysis. The thorough study of the impacts of the past Olympic Games on the host nations would endow us with an apparent outlook of the expected financial benefit that the United Kingdom could potentially gain this time.   The Literature Review would also accentuate on th e anticipated financial scenario in the UK, subsequent to the 2012 Olympic Games in London.Chapter Three: Research MethodologyThis chapter would consist of a discussion on the selection of the appropriate methods and approaches for the execution of the research study.   For a better identification of the appropriate research method for this study, this chapter would initially present a comprehensive discussion of all the research methods along with their advantages and suitability. The chapter would also discuss the strategy.

Wednesday, November 20, 2019

CORPORATE STRATEGY (INDIVIDUAL ACADEMIC REPORT) Essay

CORPORATE STRATEGY (INDIVIDUAL ACADEMIC REPORT) - Essay Example The strategy of any business observes an organisation from the viewpoint of their internal strengths and weaknesses and its opportunities and threats that are present in the business environment (James, 2004). Strategies are developed by the management by considering the business environment to gain competitive advantage from the current situation and look for the future growth and development that will benefit the organisation in the long run. There were many schools of thoughts that developed the basics of business strategy that guided the management to develop the strategies based upon these principles. The classical school of thought provided the strategy fundamentals that were based upon the managers’ ability and organisational hierarchy. The processual school of thought provided the fundamentals of business strategy that were based upon continuous development. The philosophy was that the strategy is a continuous process. The evolutionary school of thought provided the fundamentals of strategy that were based upon the concept of business environment (Harfiel, 2011). The business cycle compels the organisations to accept and amend their strategies as the market expands or contracts and any other changes takes place. The management directs the organisations in such business situation through mix business strategies and operational policies to earn revenues and market share along with meeting customers’ needs by means of efficient and effective business operations (Walden University, 2010). Operational strategy is important and organisations need to identify their operations to determine the strategies to gain success. Finding different solutions for operations of the company with different models will allow the management to access the benefit of progression in the business cycle through efficient operations (Walden University, 2010). Cadbury

Monday, November 18, 2019

National Park Essay Example | Topics and Well Written Essays - 500 words

National Park - Essay Example The recent geological fossils discovery inclusive of 11,000 years sloth bones maintains the treasured specialty in the caves of Grand Canyon. Lots of animal tracks and marine fossils are eminent in the rock layers. The Colorado River resulted to Grand Canyon in its flow path hence unfolding more unique features both physically and geologically (Hall 56). The geological formations in this canyon contain precious minerals and metals that hold large historical information on earth formations. The main geological features clearly seen in Grand Canyon are the unique and complete sequence of rocks. There are over 40 layers of sedimentary rocks that are fully exposed in the Canyon. The park dates back between 200 million to 2 billion years ago. Most of these rocks were deposited in shallow and warm seas in North America. Another important geological feature is terrestrial and marine sediments in Grand Canyon (Abbott and Cook 158). Fossilized dunes believed to have an origin from an extinct desert other unconformities are also present in Grand Canyon area. A number of theoretical assumptions come into play when it comes to the formation of canyon geological features like rocks. Climate change, volcanism and continental drift serve as some of the scientific proofs towards formation of rocks. The erosive nature of Colorado River and the wind have resulted to exposure of the sedimentary rocks over a certain period. The reaction of the land to weather conditions over a long period with continuous living of plant and animals is the key behind fossils (Dowling and Newsome 162). The selection of the park is due to the unique feature and wide scope of geological features in the Canyon (Hall 56). Words cannot fully comprehend the speculations about this park hence it worth a visit. In accordance to the experience, there is a lot to see and learn about this spectacular geological ground. Depending on specified time of visit,

Saturday, November 16, 2019

IVR Cloud Migration Project

IVR Cloud Migration Project INTRODUCTION The primary objective of the IVR Cloud Migration Project is to Lift and Shift their working Applications into the AWS Cloud Environment. The Lift and Shift of the IVR Applications are recommended to have automation the least amount of human interaction to build and deploy onto AWS Cloud. This document will give a step-by-step process to carry out the task of automating the creation and maintenance of the applications. REQUIREMENTS The IVR Applications require the following resources to replicate and automate the on-premise environment onto AWS Cloud. In the Automation Process, the requirement is to have minimal human interaction and have an automation pipeline from creating a build for the application to creating, deploying and configuring until a running application instance is setup. The tools that are required are as follows: AWS EC2 Instances WebSphere Liberty Profile Jenkins Pipeline CyberArk Authentication Ansible Tower AWS CloudFormation AWS Elastic Load Balancers AWS S3 Bucket ELASTIC COMPUTE CLOUD (EC2) Elastic Compute Cloud (EC2) is a virtual computing environment which provides users the platform to create applications and allowing them to scale their applications by providing Infrastructure as a Service. Key Concepts associated with an EC2 are Virtual computing environments are known as instances. Preconfigured templates for your instances, known as Amazon Machine Images (AMIs), that package the bits you need for your server (including the operating system and additional software). Various configurations of CPU, memory, storage, and networking capacity for your instances, known as instance types. Secure login information for your instances using key pairs (AWS stores the public key, and you store the private key in a secure place). Storage volumes for temporary data thats deleted when you stop or terminate your instance, known as instance store volumes. Persistent storage volumes for your data using Amazon Elastic Block Store (Amazon EBS), known as Amazon EBS volumes. Multiple physical locations for your resources, such as instances and Amazon EBS volumes, known as regions and Availability Zones. A firewall that enables you to specify the protocols, ports, and source IP ranges that can reach your instances using security groups. Static IPv4 addresses for dynamic cloud computing, known as Elastic IP addresses. Metadata, known as tags, that you can create and assign to your Amazon EC2 resources. Virtual networks you can create that are logically isolated from the rest of the AWS Cloud, and that you can optionally connect to your own network, known as Virtual Private Clouds (VPCs). WEBSPHERE LIBERTY PROFILE IBM WebSphere Application Server V8.5 Liberty Profile is a composable, dynamic application server environment that supports development and testing of web applications. The Liberty profile is a simplified, lightweight development and application runtime environment that has the following characteristics: Simple to configure. Configuration is read from an XML file with text-editor friendly syntax. Dynamic and flexible. The run time loads only what your application needs and recomposes the run time in response to configuration changes. Fast. The server starts in under 5 seconds with a basic web application. Extensible. The Liberty profile provides support for user and product extensions, which can use System Programming Interfaces (SPIs) to extend the run time. JENKINS Jenkins is a self-contained, open source automation server which can be used to automate all sorts of tasks such as building, testing, and deploying software. Jenkins can be installed through native system packages, Docker, or even run standalone by any machine with the Java Runtime Environment installed. Jenkins Pipeline is a suite of plugins which supports implementing and integrating continuous delivery pipelines into Jenkins. Pipeline provides an extensible set of tools for modeling simple-to-complex delivery pipelines as code. A Jenkinsfile which is a text file that contains the definition of a Jenkins Pipeline is checked into source control. This is the foundation of Pipeline-As-Code; treating the continuous delivery pipeline a part of the application to be version and reviewed like any other code. REQUIREMENTS The Requirements for Jenkins Server includes the following: The size requirement for a Jenkins instance is that there is no one size fits all answer the exact specifications of the hardware that you will need will depend heavily on your organizations needs. Your Jenkins master runs on Java and requires to have the OpenJDK installed on the Instance with the JAVA_HOME path Set. Jenkins runs on a local webserver like Tomcat and requires it to be configured. RAM allotted for it can range from 200 MB for a small installation to 70+ GB for a single and massive Jenkins master. However, you should be able to estimate the RAM required based on your project build needs. Each build node connection will take 2-3 threads, which equals about 2 MB or more of memory. You will also need to factor in CPU overhead for Jenkins if there are a lot of users who will be accessing the Jenkins user interface. The more automated the environment configuration is, the easier it is to replicate a configuration onto a new agent machine. Tools for configuration management or a pre-baked image can be excellent solutions to this end. Containers and virtualization are also popular tools for creating generic agent environments. JENKINS FILE STRUCTURE Jenkins File Structure is a model to automate the non-human part of the whole software development process, with now common things like continuous integration, but by further empowering teams to implement the technical part of a Continuous Delivery. Directory Description . jenkins The default Jenkins home directory. Fingerprints This directory is used by Jenkins to keep track of artifact fingerprints. We look at how to track artifacts later in the book. jobs This directory contains configuration details about the build jobs that Jenkins manages, as well as the artifacts and data resulting from these builds. plugins This directory contains any plugins that you have installed. Plugins allow you to extend Jenkins by adding extra feature. Note Except the Jenkins core plugins (subversion, cvs, ssh-slaves, maven, and scid-ad), no plugins are stored with Jenkins executable, or expanded web application directory. updates This is an internal directory used by Jenkins to store information about available plugin updates. userContent You can use this directory to place your own custom content onto your Jenkins server. You can access files in this directory at http://myserver/userContent (stand-alone). users If you are using the native Jenkins user database, user accounts will be stored in this directory. war This directory contains the expanded web application. When you start Jenkins as a stand-alone application, it will extract the web application into this directory. JENKINS SETUP Jenkins Setup is carried out on a managing server which has access to all your remote servers or nodes. The Process can be demonstrated with a few simple steps. Jenkins has native integrations with different Operating Systems. These are the Operating Systems that support Jenkins are: Solaris 10 Ubuntu Red Hat Distributions Windows UNIX Daemon Docker JENKINS CONFIGURATION The Configuration file for Jenkins is used to make certain changes to the default configuration. The Priority configuration changes are searched by Jenkins in the following order: Jenkins will be launched as a daemon on startup. See /etc/init.d/jenkins for more details. The jenkins user is created to run this service. If you change this to a different user via the config file, you must change the owner of /var/log/jenkins, /var/lib/jenkins, and /var/cache/jenkins. Log file will be placed in /var/log/jenkins/jenkins.log. Check this file if you are troubleshooting Jenkins. /etc/sysconfig/jenkins will capture configuration parameters for the launch. By default, Jenkins listen on port 8080. Access this port with your browser to start configuration.ÂÂ   Note that the built-in firewall may have to be opened to access this port from other computers. A Jenkins RPM repository is added in /etc/yum.repos.d/jenkins.repo CREATE A JENKINS PIPELINE The requirement for creating a pipeline is to have a repository with the Jenkins file which holds the declaration of the pipeline. STEP 1: Select New Item from the Jenkins Dashboard. New Item on the Jenkins home page src=https://aaimagestore.s3.amazonaws.com/july2017/0020514.008.png> STEP 2: Enter a Name for the Pipeline and Select Pipeline from the list of options. Click OK. STEP 3: Toggle Tabs to Customize the Pipeline to Click Apply. STEP 4: To Build the Job, Click Build Now on the Dashboard to run the Pipeline. ANSIBLE Ansible Tower is the Automation tool used in this project and is a simple tool to manage multiple nodes. Ansible is recommended to automate the deployment and configuration management of the System and its Applications. Ansible Automation can be setup on any machine as it does not require a daemon or database. It will begin with the assigned user to SSH into a host file. This allows the user to run the Ansible script to execute the roles which runs various tasks defined. NOTE: In scope of the IVR applications the ansible script executes multiple roles for the creation of EC2 Instances and the installation of WebSphere Applications. Each of these roles have their very own YAML script to create and populate the instance. REQUIREMENTS The Requirements for Ansible Server includes the following: Ansible Tower Setup requires to be on a Linux Instance (CentOS or RHEL), Linux setup for some basic services including: Git, Python, OpenSSL. Some Additional Requirement: Jinja2: A modern, fast and easy to use stand-alone template engine for Python. PyYAML: A YAML parser and emitter for the Python programming language. Paramiko: A native Python SSHv2 channel library. Httplib2: A comprehensive HTTP client library. SSHPass: A non-interactive SSH password authentication. ANSIBLE FILE STRUCTURE Ansible Playbook is a model of configuration or a process which contains number of plays. Each play is used to map a group of hosts to some well-defined roles which can be represented by ansible call tasks. Master Playbook The Master Playbook file contains the information of the rest of the Playbook. The Master Playbook for the project has been given as Site.yml. This YAML script is used to define the roles to execute. NOTE: The roles in the Master Playbook are invoked to perform their respective tasks. Path = /ivr/aws_env/playbooks/ivr SITE.YML Inventory Ansible contains information about the hosts and groups of hosts to be managed in the hosts file. This is also called an inventory file. Path = /ivr/aws_env/playbooks/ivr/inventory Group Variables and Host Variables Similar to the hosts inventory file, you can also include hosts and groups of hosts configuration variables in a separate configuration folder like group_vars and hosts_vars. These can include configuration parameters, whether on the application or operating system level, which may not be valid for all groups or hosts. This is where having multiple files can be useful: inside group_vars or hosts_vars, you can create a group or host in more than one way, allowing you to define specific configuration parameters. Roles Roles in Ansible build on the idea of include files and combine them to form clean, reusable abstractions they allow you to focus more on the big picture and only define the details when needed. To correctly use roles with Ansible, you need to create a roles directory in your working Ansible directory, and then any necessary sub-directories. The Following displays the Playbook Structure for Ansible. ANSIBLE SETUP Ansible Setup is carried out on a managing server which has access to all your remote servers or nodes. The Process can be demonstrated with a few simple steps. Step I. Login as the Root User on the Instance where Ansible needs to be installed. Use the sudo apt-get install ansible -y command to install the package onto an Ubuntu/Debian System. Use the sudo yum install ansible -y command to install the package onto a CentOS/RHEL/Fedora System. Step II. The Ansible system can connect to any remote server using SSH by authenticating the request. NOTE: Ansible can use ssh-keygen to create a RSA encrypted key and can copy it to the remote server to connect using SSH without authentication. Step III. Create an Inventory file which is used to work against multiple systems across the infrastructure at the same time. This is executed by taking portions of the systems linked in the Inventory file. The Default path for the Inventory file is etc/ansible/hosts. NOTE This path can be changed by using -i which is a recommended option depending on the project requirement. There can be more than one inventory files which can be executed at the same time. The inventory file holds the group names which defines the group of servers that are maintained together. The inventory file needs to be populated with the host IP Addresses that are to be accessed. The inventory file is as follows: Path = /ivr/aws_env/playbooks/ivr/inventory hosts The IVR in the brackets indicates group names. Group names are used to classify systems and determining which systems you are going to control at what times and for what reason. The group name can be used to interact with all the hosts alongside different modules (-m) defined in ansible. Example: ansible -m ping IVR ANSIBLE CONFIGURATION The Configuration file for Ansible is used to make certain changes to the default configuration. The Priority configuration changes are searched by ansible in the following order: Path= /ivr/aws_env/playbooks/ivr/etc/ansible.cfg is the path setup for ansible configuration changes. CLOUD FORMATION AWS CloudFormation is a service that helps you model and set up your Amazon Web Services resources so that you can spend less time managing those resources and more time focusing on your applications that run-in AWS. You create a template that describes all the AWS resources that you want (like Amazon EC2 instances or Amazon RDS DB instances), and AWS CloudFormation takes care of provisioning and configuring those resources for you. You dont need to individually create and configure AWS resources and figure out whats dependent on what; AWS CloudFormation handles all of that. CloudFormation Template CloudFormation templates are created for the service or application architectures you want and have AWS CloudFormation use those templates for quick and reliable provisioning of the services or applications (called stacks). You can also easily update or replicate the stacks as needed. Example Template STEPS TO LAUNCH A CLOUD FORMATION STACK Sign in to AWS Management Console and open the Cloud Formation console at http://console.aws.amazon.com/cloudformation/ From the navigation bar select the region for the instance Click on the Create a New Stack. Choose an Option from a Sample Template, Template to S3 and S3 Template URL Using a template to build an EC2 Instance Enter a Stack Name and Provide the Key Pair to SSH into the Instance. a A Add Tags to the Instance, this also help organize your instance to group with application specific, team specific instances. Review and Create Stack. CloudFormation Stack starts building the stack using the template. In Scope of this Project, IVR Application Instances are build using a Cloud Formation Template and will be triggered using Ansible Role. Simple Storage Service (S3) Elastic Load Balancer (ELB) A load balancer serves as a single point of contact for clients, which increases the availability of your application. You can add and remove instances from your load balancer as your needs change, without disrupting the overall flow of requests to your application. Elastic Load Balancing scales your load balancer as traffic to your application changes over time, and can scale to the clear majority of workloads automatically. You can configure health checks, which are used to monitor the health of the registered instances so that the load balancer can send requests only to the healthy instances. You can also offload the work of encryption and decryption to your load balancer so that your instances can focus on their main work. ÂÂ  Setting Up an Elastic Load Balancer Step 1: Select a Load Balancer Type Elastic Load Balancing supports two types of load balancers: Application Load Balancers and Classic Load Balancers. To create an Elastic Load Balancer, Open the Amazon EC2 console and choose Load Balancers on the navigation pane. Step 2: Configure Your Load Balancer and Listener On the Configure Load Balancer page, complete the following procedure. To configure your load balancer and listener 1. For Name, type a name for your load balancer. The name of your Application Load Balancer must be unique within your set of Application Load Balancers for the region, can have a maximum of 32 characters, can contain only alphanumeric characters and hyphens, and must not begin or end with a hyphen. 2. For Scheme, keep the default value, internet-facing. 3. For IP address type, select ipv4 if your instances support IPv4 addresses or dual stack if they support IPv4 and IPv6 addresses. 4. For Listeners, keep the default, which is a listener that accepts HTTP traffic on port 80. 5. For Availability Zones, select the VPC that you used for your EC2 instances. For each of the two Availability Zones that contain your EC2 instances, select the Availability Zone and then select the public subnet for that Availability Zone. 6. Choose Next: Configure Security Settings. Step 3: Configure a Security Group for Your Load Balancer The security group for your load balancer must allow it to communicate with registered targets on both the listener port and the health check port. The console can create security groups for your load balancer on your behalf, with rules that specify the correct protocols and ports. Note If you prefer, you can create and select your own security group instead. For more information, see Recommended Rules in the Application Load Balancer Guide. On the Configure Security Groups page, complete the following procedure to have Elastic Load Balancing create a security group for your load balancer on your behalf. Step 4: Configure Your Target Group To configure a security group for your load balancer 1. Choose Create a new security group. 2. Type a name and description for the security group, or keep the default name and description. This new security group contains a rule that allows traffic to the load balancer listener port that you selected on the Configure Load Balancer page. 3. Choose Next: Configure Routing. Step 4: Configure Your Target Group Create a target group, which is used in request routing. The default rule for your listener routes requests to the to registered targets in this target group. The load balancer checks the health of targets in this target group using the health check settings defined for the target group. On the Configure Routing page, complete the following procedure. To configure your target group 1. For Target group, keep the default, New target group. 2. For Name, type a name for the new target group. 3. Keep Protocol as HTTP and Port as 80. 4. For Health checks, keep the default protocol and ping path. 5. Choose Next: Register Targets. Step 5: Register Targets with Your Target Group On the Register Targets page, complete the following procedure. To register targets with the target group 1. For Instances, select one or more instances. 2. Keep the default port, 80, and choose Add to registered. 3. If you need to remove an instance that you selected, for Registered instances, select the instance and then choose Remove. 4. When you have finished selecting instances, choose Next: Review. Step 6: Create and Test Your Load Balancer Before creating the load balancer, review the settings that you selected. After creating the load balancer, verify that its sending traffic to your EC2 instances. To create and test your load balancer 1. On the Review page, choose Create. 2. After you are notified that your load balancer was created successfully, choose Close. 3. On the navigation pane, under LOAD BALANCING, choose Target Groups. 4. Select the newly created target group. 5. On the Targets tab, verify that your instances are ready. If the status of an instance is initial, its probably because the instance is still in the process of being registered, or it has not passed the Auto Scaling AUTOMATION OVERVIEW There are 2 Parts of the Automation Process which is used To Create a Custom AMI for all IVR Applications To Create Instances for Each Application using the Custom AMI. STEPS TO CREATE THE CUSTOM AMI The process of automating this environment starts from creating a Jenkins Pipeline for code deploy to the application that needs to be build. The Pipeline also needs integration of CyberArk for the Authentication and registering the service account required for the automation. The following process is triggered as part of the Ansible playbook where it performs multiple roles to complete automation of the Application. The Ansible role first calls for a CloudFormation Template. A CloudFormation Template is used to Build a Stack required (EC2 Instance). This template is given the AMI ID of the Verizon standard. The CloudFormation Template after the creation of the Instance triggers a WebSphere Role from Ansible that installs the OpenJDK, WebSphere Liberty Profile, creating a WLP User and Add the Necessary Net groups for the application. An AMI of the Instance at this point is created. STEPS TO CREATE THE APPLICATION INSTANCES The process of automating this environment starts from creating a Jenkins Pipeline for code deploy to the application that needs to be build. The Pipeline also needs integration of CyberArk for the Authentication and registering the service account required for the automation. The following process is triggered as part of the Ansible playbook where it performs multiple roles to complete automation of the Application. The Ansible role first calls for a CloudFormation Template. A CloudFormation Template is used to Build a Stack required (EC2 Instance). This template is given the Custom AMI created for IVR. After the creation of the Instance an S3 Role is triggered from Ansible. The S3 Role Performs the Ansible Role based on the Application Instance. NOTE: An S3 Bucket with folder structure for each application is maintained to keep the updated code and certificates along with other required installation files. IVR Touch Point S3 role fetches the EAR files, configuration files and the certificates in the IVR-TP folder of the S3 bucket and install them on the Instance that is created by the Cloud Formation Role. IVR Middleware S3 role fetches the EAR files, configuration files and the certificates in the IVR-MW folder of the S3 bucket and install them on the Instance that is created by the Cloud Formation Role. IVR Activations S3 role fetches the EAR files, configuration files and the certificates in the IVR-Activations of the S3 bucket and install them on the Instance that is created by the Cloud Formation Role. IVR CTI S3 role fetches the IBM eXtreme Scale Grid Installation followed by Siteminder SSO installation. After the application requirements are fulfilled, the EAR files, configuration files and the certificates in the IVR-CTI folder of the S3 bucket are deployed on the Instance. IVR Work Hub S3 role fetches the IBM eXtreme Scale Grid Installation followed by Siteminder SSO installation. After the application requirements are fulfilled, the EAR files, configuration files and the certificates in the IVR

Wednesday, November 13, 2019

Global Warming :: Greenhouse Gases Climate Change

For decades and decades, human factories and cars have discharged billions of tons of artificial greenhouse gases into the atmosphere, and the climate has begun to show many signs of global warming. On the other hand, some people want you to believe that global warming does not exist. There are many people who are only out for personal gain and are outright liars. According to a scientist at NASA "Global warming is the single largest threat to our planet"(Weier 2002). Over the past two hundred years we have seen significant changes in the effects on our environment, primarily due to humans and both their lack of awareness, or their total disregard for the effects that their actions have on the environment. Global warming is one of our toughest environmental challenges. It threatens the health of people, wildlife and economies around the world. The problem is carbon dioxide and other heat-trapping pollution. This pollution mainly comes from cars, power plants and other industrial sources that burn gasoline, coal and other fossil fuels. This matter collects like a blanket in our atmosphere. As a result, the planet gets warmer. We can say that the amount of radiation from the sun that reaches the earth each year has been fairly consistent from year to year and century to century until recently. Thirty percent of the total solar energy that strikes the earth is reflected back into space by clouds, atmospheric aerosols, reflective ground surfaces, and even ocean surf. Seventy percent of the solar energy is absorbed by the land, air and oceans.  ¡Ã‚ °The absorbed light is mostly in the form ultraviolet and near infrared solar radiation ¡Ã‚ ±(Weier 2002). Absorption of this solar energy makes life on this planet possible. The energy does not stay bound up forever. If it did our planet would wind up being hotter than the sun. Instead, when the rocks, air, and sea heat up, they give off thermal radiation, which escapes into space and allows it to cool down. This radiation is invisible to our eyes, but our hands can feel it radiating from a fire or a car engine. What we should be worried about now is that over the past 250 years, we have been artificially raising the concentration of greenhouse gases in our atmosphere. Factories, power plants, and cars, burn coal and gasoline and spit out a seemingly endless stream of carbon dioxide. Power plants are the largest contributors to global warming.

Monday, November 11, 2019

Barack Obama 2004 Keynote Speech Essay

During his keynote speech at the 2004 Democratic National Convention, Barack Obama introduced himself as a skinny kid with a funny name. The rising star of Illinois politics was elected to the U. S. Senate three months later. His delivery, using rhetoric, was full of fervid sentiment that reminds us of what we love about the United States of America. His passionate speech inspired Americans to renew their faith in their country and persist their individual dreams and yet still come together as one American family. On July 29, 2004, Barack Obama gave the keynote address at the Democratic National Convention in Boston. He was received by thousands of enthusiastic delegates, waving blue and white campaign signs and reciting his name. As the keynote speaker, Obama set the tone for the Democratic manifesto, outlining the principles of the party. His speech concerned the unnecessary and artificial divides in American politics and culture, emphasizing the importance of unity in our country, not just red states for Republicans and blue states for Democrats. Obama retreats this approach by saying a quote; â€Å"We worship an awesome God in the blue states, and we don’t like federal agents poking around our libraries in the red states. We coach Little League in the blue states, and yes, we’ve got some gay friends in the red states. There are patriots who opposed the war, and patriots who supported it. We are one people, all of us pledging allegiance to the Stars and Stripes, all of us defending the United States of America. † He effectively uses the Stars and Stripes as a metaphor for our American flag. The general theme of Barack Obama’s keynote address was the American Dream. He says â€Å"My parents shared not only an improbable love, they shared an abiding faith in the possibilities of this nation. He spoke of his international and interracial heritage as his father is from Kenya and his mother is from Kansas, and stressed the power of education in our society, distinguishing his attendance at Harvard Law School in spite of his family’s financial hardship. He also criticized poor black youths in America who believe that reading a book is acting white. He exclaims as a proud American â€Å"In no other country on Earth is my story possible† describing his successful career in politics and law and raising a family at the same time. Going along with his theme of the American Dream, Obama identified himself as â€Å"a skinny kid with a funny name who believes that America has a place for him, too. † His speech was an extremely emotional and passionate addressed that spoke to millions across the country. He spoke of national unity as one of the most important and unique characteristics of the United States, and how unity is one of the most important things that our country could have in 2004, in light of 9-11 and the war in Iraq. The allotment in the speech in which he made the simple phrase â€Å"there’s a United States of America a rallying cry of unity and togetherness was simple and powerful. † By stating that there is a United States of America he does not simply mean that there is a USA. He means that we are a united country, united as one as the United States of America. Obama’s rhetoric was deeply felt and was more reproducing, splashing with patriotism: â€Å"We are one people, all of us pledging allegiance to the stars and stripes, all of us defending the United States of America. He criticized the Iraq war, saying â€Å"we should never ever go to war without enough troops to win the war, secure the peace, and earn the respect the world. † This statement follows the Democrat’s extreme goal: to earn the respect of the world. The criticism reflects his attitude on the war: we need more troops. It appeals to the opinion of the world but also with a confident yet offensive shade: â€Å"The world should respect us, because when we confront an enemy we do it right. † Emotionally, the highest point of the speech was his statement that â€Å"We worship an awesome God in the Blue States. By saying this he denied the assumption that the Democrats are the secular party, and did it in unashamed language. Faith was a alternating theme throughout the speech, from near the very beginning when Obama said â€Å"faith in simple dreams, the insistence on small miracles. † Notice how Obama uses the terms â€Å"simple† and â€Å"small† utilizing emotions to connect with the â€Å"regular guy† of America, the blue collar worker. This is language that Democrats do not often use, and it makes the speech more accessible to many people and gives more support to other themes. Obama connected Democratic social programs with the one and only Golden Rule.

Saturday, November 9, 2019

Explorers essays

Explorers essays Colonial - Civil War History M-W 6:00 Within Europe in the 15th century thru the 17th century exploration became a prominent part of life. Several adventurers left to find a faster trade route to Asia. Many of the spices of Asia were very desirable along with luxury items such as, jewelry gems, and silk. Because of the find of the New World many explores ventured out across the Pacific Ocean, they became adamant with founding land and gaining wealth, and tortured people who got in their way. Christopher Columbus is probably one of the most famous explorers and is generally credited with the find of the New World. Columbus first tried to convince the king and queen of Portugal to give him funding, but they said no. In 1485, he asked King Fernando and Queen Isabella of Spain for funding and after six years, they said yes. Columbus got three ships on his first voyage. Their names were the Nina, the Pinta and the Santa Maria. He was given 90 men. He navigated by using the stars and compasses. He would drop a log into the water to measure the speed of the ship. Columbus eventually landed on an island, which he named San Salvador for Holy Savior. Columbus thought that he was in the West Indies. He called the people there Indians obviously because of his belief that he was located in the Indies. Columbus was looking for the gold and riches and the great cities of Asia, but he didn't find them. He was disappointed because there weren't any cities of gold. Another Spanish explorer was Hernando Cortes. Cortes fought under Governor Diego Velazquez in a Cuban expedition that began in 1511. In 1518, Velazquez selected him to lead an expedition to the Yucatan Peninsula of Mexico, then a center of Maya civilization. Before Cortes could leave Cuba, Velazquez canceled the expedition, fearful of the voyage's expens e and distrustful of Cortes's ambition. Cortes disobeyed and sailed for Yucatan in 1519, ...

Wednesday, November 6, 2019

Economic Reasons For American Independence Essays - Stamp Act

Economic Reasons For American Independence Essays - Stamp Act Economic Reasons for American Independence Eleven years before America had declared it's independence there was 1,450,000 white and 400,000 Negro subjects of the crown. The colonies extended from the Atlantic to the Appalachian barrier. The life in these thirteen colonies was primarily rural, the economy based on agriculture, most were descended from the English, and politics were only the concern of land owners. Throughout these prosperous colonies, only a small portion of the population were content with their lives as subjects of George III. Most found it hard to be continually enthusiastic for their King sitting on his thrown, thousands of miles away. Despite this there were few signs of the upcoming revolution. The occasional call for democracy and liberty were written off by loyalists. Among the upper class feelings of loyalty to the crown were strong and eloquently expressed. The attitudes of the common people mirrored their counterparts in England. They had a combination of indifference and obeisance. To the present day American this is quite difficult to believe. However, all of this can be explained by Benjamin Franklin, "I never had heard in any Conversation from any Person drunk or sober, the least Expression of a wish for a Separation, or Hint that such a Thing would be advantageous to America." However all of this did not last for long. In the summer and fall of the same year, the colonists gave up their habits of submission and a new people emerged. The Stamp Act ignited the furies of the colonists. The people refused to pay, especially the colonial upper class. The match that had been lit was put out was put out by the repealing of this act. The match, however, did not go out. Many historians have pondered upon the events and forces that drove the American people to rebellion against their mother country. This was important but it still eluded the historians to find out what made this people ripe for rebellion, or, more exactly, what was there about the continental colonies in 1765 that made them so willing to engage in open defiance of a major imperial policy? One of the proposed answers, arguably the best known, was volunteered by one of the causes of the revolution, John Adams in 1818. "The Revolution was effected before the was commenced. The Revolution was in the minds and hearts of the people. . . . This radical change in the principles, opinions, sentiments, and affections of the people, was the real American Revolution." Adams, in a sense, argued that even before the first shot of war, there had existed a collective outlook called the American mind, whose chief characteristics were self-reliance, patriotism, practicality, and the love of liberty, with liberty defined as freedom from alien dictation. It was the dictation of shortsighted ministers of an equally shortsighted king that pushed the American mind to assert itself boldly for the first time. Adams had not found it necessary to describe in detail the forces that had produced this mind. A reason for this had been the extraordinary student of political relations, Edmund Burke had already given a perceptive description. In his speech on conciliation with the colonies, Burke singles out "six capital sources" to account for the American "love of freedom," and strong sense of liberty. These capital sources were: their English descent; their popular forms of government; "religion in the northern provinces"; "manners in the southern"; education; and "the remoteness of the situation from the first mover of government." In his and Adam's praise was a recognition that this liberty rested on firm and fertile ground. All of this was rounded off by Alexis de Tocqueville. He revealed the unique nature of the American Republic: "The great advantage of the Americans is that they have arrived at a state of democracy without having to endure a democratic revolution" or to stare the thesis in terms of 1776, the Americans already enjoyed the liberty they were fighting for. The first ingredient of American Liberty was the peoples heritage from England. Burke had acknowledged this "capitol source". He explained that the colonists were the descendants of Englishmen, a people who respects their freedom. The first colonists had brought over both good and evil of their mother country

Monday, November 4, 2019

Judaism Assignment Example | Topics and Well Written Essays - 250 words

Judaism - Assignment Example The Holocaust can be construed as generating the same kind of spiritual and psychological upheaval that it did during the time of the 597 BC exile, generating the same intense scrutiny of the Jewish faith and Jewish purity in relation to that covenant (Hooker, 2013). ‘What you believe follows only after what you do’ is a moral prescription, and a guide for judging what is right and wrong. This is another way of saying that actions are the true things, and that it is our actions that determine whether we are moral or not. It is another way of saying that we ought to do what is right, and that belief is only secondary to how we act. This places emphasis on right action as a key feature of Judaism. There is the sense that while Judaic beliefs and customs may seem complicated, in fact the crucible of moral judgment focuses on actions and in a way the effects of those actions on people. Jewish customs being the subject of rediscovery means those same customs being found to have relevance in the lives of modern-day Jews (Tippett,

Saturday, November 2, 2019

Why Did Vietminh and NLF Win the Vietnam War Essay

Why Did Vietminh and NLF Win the Vietnam War - Essay Example Unfortunately, the Vietnamese side of the conflict is persistently disregarded. Why and how the Vietminh and National Liberation won the Vietnam War remains obscured from the public. Nevertheless, the success of the Vietminh and the NLF during the Vietnam War can hardly be overestimated. The party and the Liberation Front greatly contributed to the success of the political and military operations against the United States. That the Communists won the Vietnam War was both remarkable and unbelievable: active propaganda, local support, sophisticated military strategies and the undisputable leadership capacity of Ho Chi Minh altogether laid the groundwork for advancing the victory of the Communists during the Vietnam War. It should be noted, that the fact of the Communist victory during the Vietnam War remains one of the most remarkable elements of modern history. Needless to say, before and even during the Vietnam conflict, the United States could not even suspect that the Vietnamese co mmunists would have a chance to outperform Americans, in all senses. Andrew Jon Rotter writes that â€Å"the most significant fact about the Vietnam conflict is not that the United States lost but that the Communists won† (180). In this sense, the most confusing is the fact that the main factors responsible for the Communists’ victory during the Vietnam War often remain beyond the scope of historical analyses. One possible reason is that, for many years, the United States did not want to shed light on the Vietnam War controversies that could affect its political image. It is also possible that more than one factor was responsible for the Communists’ victory, making the overall historical analysis extremely complicated. It is widely established that not the errors made by the United States in Vietnam but the actions made by Washington’s adversaries in Hanoi were at the heart of the Communists’ military and political achievements in Vietnam (Rotter 1 80). From the very beginning to the very end of the war, an interplay of factors created conditions needed to support Vietnam in its fight against the U.S. These factors included political propaganda, local support, effective military strategies, and the unprecedented authority and leadership of Ho Chi Minh. Historically, the Vietminh was created by one of the most outstanding Vietnamese leaders, Ho Chi Minh, in 1945 (Spartacus International). Later, in 1960, the National Liberation Front (NLF) was established (Moise). It is interesting, that the NLF was initially established with the goal of leading the guerilla against Vietnam’s Prime Minister Diem (Moise). South Vietnamese professionals, including artists, youth leaders and peasants, organized the NLF (Levy 19). At that time, the growing corruption in the country and the lack of positive political and economic changes raised the wave of public dissatisfaction with the prime minister’s actions and decisions. That was also the time when the NLF could not yet anticipate that it would play a crucial role in the Communists’ victory over the U.S. Political propaganda became one of the most important factors driving the NLF’s popularity and the public opposition to the actions of the U.S. in Vietnam. It is no secret that the NLF propagandists were well trained to work with the local population. Propaganda schools were scattered widely across the Southern regions of Vietnam, which helped to spread the NLF’s ideology against the United States (Friedman). The public messages sent to the local people were full of optimist about the future victory over the