Sunday, December 29, 2019
The Roman Empires By Chris Dunn - 1909 Words
The Roman Empires By Chris Dunn There have been 147 Roman Emperors including 7 ruling the Gallic empire and 2 leading the British. After 395 A.D. the western empire had 23 emperors and the eastern empire from had 94 (List of Roman Emperors.). There have been a lot of emperors of Rome each one with their strengths and weaknesses and some better then others. A few will be remembered forever and others lost in obscurity. Some of the most famous are, Augustus better known as Octavian who was the first emperor of Rome,. Marius who reorganized the arm, and created the most effective fighting force on the plaint. Julius Caesar who conquered the Gauls and took over Rome as a dictator. Nero the madman of Rome who was most likely insane andâ⬠¦show more contentâ⬠¦Antony tried to form his own senate and was planning to create a eastern empire with Cleopatra. Octavian would not have this happen and declared war. Italy and the western provinces joined Rome and in 31 B.C. Antony and Cleopatra were defeated in a naval batt le but fled back to Egypt. Octavian in 30 B.C. engaged Antony again in Egypt from land and sea and defeated his army. Both Antony and Cleopatra committed suicide. With Egypt now under his control and all the lands he went throw pledging loyalty to him Octavian was now the solo ruler of the entire Roman world. Marius came from humble beginnings and was a military man before marrying Julia, making him the uncle of Julius Caesar. He was not fond of protocol and had himself appointed the commander of all African forces. Looking for soldiers he allowed the Roman poor to become soldiers. This was not the practice of the day but unintentionally set in motion a radical change in the Roman military. He then made quick work of the enemy in Africa with his new professionally trained army using new methods introduced by Marius himself. However the northern border of Rome was failing and Rome looked to Marius to save them. He did this with only two battles and saved Rome from the northern invaders. With the northern threat gone he then created laws to give the veteran soldiers land after there time of service was done. He also allowed Italian to be granted
Saturday, December 21, 2019
Operations Management at Fedex - 4541 Words
Contents 1. Introduction 4 2. Background 6 3. Literature Review 7 3.1. Capacity Planning 7 3.2. Employee Motivation 8 3.3. Facilities location 9 3.4. Scheduling 11 3.5. Quality Assurance 12 5. Questionnaire Analysis 13 6. Conclusion 14 7. Recommendations 15 8. References 16 Appendix A: CUSTOMER SATISFACTION SURVEY FOR FEDEX 17 Appendix B: Customer Survey Results 18 1. Introduction Figure 1: Regional Head Quarters of FedEx Figure 2: FedEx Corporate Logo; courtesy www.fedex.com FedEx Corporation, situated in US, is one of the leading supply chain management solution providers in the world. With annual revenues as high as USD33 billion, the company offers incorporated businessâ⬠¦show more contentâ⬠¦The company incorporated in June 1971 and officially began operations on April 17, 1973, with the launch of 14 small aircraft from Memphis International Airport. It soon became the premier carrier of high-priority goods in the marketplace and the standard setter for the industry it established. With the air cargo deregulations in 1977, the company was able to use larger aircrafts like Boeing 727s to further improve their operational efficiency and performance, leading to rapid growth of the company. By 1980, it had established its position in the industry and had a growth rate of 40% and became the first company to reach the USD 1 billion revenue-mark within 10 years of inception. Following international acquisitions in 1984, Federal Express started its operations in Europe amp; Asia. In 1994, Federal Express official adopted ââ¬ËFedExââ¬â¢ as its primary brand and became a symbol of overnight parcel delivery services. As the acquisitions grew and FedEx diversified its operations, FedEx Corporation was formed in January 1998, after the acquisition of Caliber system Inc. The subsidiary companies of the acquired Caliber Systems and Federal Express composed the original FDX Corp, which was later renamed to FedEx Corp. Today s FedEx is led by FedEx Corporation, which provides strategic direction and consolidated financial reporting for the operating companies that compete collectively under the FedEx nameShow MoreRelated FedEx and Operations Management Essay2128 Words à |à 9 PagesIntroduction Operations management focuses on carefully managing the processes to reduce and distribute products and services. Related activities include managing purchases, inventory control, quality control, storages, logistics and evaluations. A great deal of focus is on efficiency and effectiveness of processes. Therefore, operations management often includes substantial measurement and analysis of internal processes. Ultimately, the nature of how the operations management is carried out inRead MoreNew Service Or Product Development Process1377 Words à |à 6 PagesNew Service or product development process The FedEx Corporation has a main focus on innovation striving to come up with better ideas that will benefit their customers and the organization as well. FedEx s automated shipping system, FedEx Tracking and their electric trucks are a few examples of the innovative products that the firm has implemented in order to give their customers better solutions and services. In 2017, FedEx will launch the use of alternative jet fuels that will be used to turnRead MoreFedex Corporation : The Highest Ethical And Professional Standards1554 Words à |à 7 PagesExecutive Summary FedEx Corporation will produce superior financial returns for its shareowners by providing high-value-added logistics, transportation, and related business services through focused operating companies. Customer requirements will be met in the highest quality manner appropriate to each market segment served. FedEx will strive to develop mutually rewarding relationships with its team members, partners, and suppliers. Safety will be the first consideration in all operations. CorporateRead MoreSwot Analysis Of Fedex And Ups993 Words à |à 4 Pagesaround 13 million packages each day and also helps its customers with supply chain management, logistics, and financial services. The industry offers two basic products that are air and ground deliveries. Three major competitors, FedEx, UPS and USPS, rule both of the product lines. In this comparison we will only be comparing FedEx and UPS because the companies have a strong brand names and are highly competitive. FedEx on the other hand i s a $17 billion global transportation and logistics company,Read MoreIntroduction Of Federal Express ( Fedex )1708 Words à |à 7 PagesIntroduction Federal Express (FedEx) is one of leaders in air delivery and freight shipping throughout the world. They have developed a business model that has kept them competitive in domestic and foreign markets. They ship products within three business days to over 90 percent of the worldââ¬â¢s gross domestic regions. Their air route authorities and transportation infrastructure, combined with information technologies, makes them the worldââ¬â¢s largest express shipping company (n.d., Company informationRead MoreReview Of Fedex Express The American Air Cargo Essay1719 Words à |à 7 Pages FedEx Express the American Air Cargo Company offers speed and dependable transportation method in high volume shipments every official working days a result of the effective practices in supply chain and partially procurement. (Kasarda, J.D., Appold, S.J., Mori, M. and Calgary, C., 2008) This report will illustrate the importance of procurement in air cargo in addition, Classify the best procurement performs and advance technology and effective procurement base to control cost, and increase awarenessRead MoreFedEx Logistics982 Words à |à 4 PagesFedEx logistics FedEx is a leading provider of supply chain management to corporate customers on a global perspective. FedEx is made up of six independent business units; FedEx Express, FedEx Ground, FedEx Freight, FedEx Custom Critical, FedEx Trade Networks and FedEx Services which all complete each in the different sectors of the transportation industry so that they can tailor FedEx services as a whole to fit its customers needs in the best way possible. It boasts of a fleet of aircraft andRead MoreSwot Analysis Of Fedex And Ups1028 Words à |à 5 Pagesmillion packages each day and also helps its customers with supply chain management, logistics, and financial services. The industry offers two basic products that are air and ground deliveries. Both of the product lines are highly developed and ruled by three major competitors, FedEx, UPS and USPS. In this comparison we will only be comparing FedEx and UPS because the companies have a strong brand names and are highly competitive. FedEx on the o ther hand is a $17 billion global transportation and logisticsRead MoreFedex Apac Hr Shared Services Center in Wuhan1506 Words à |à 7 PagesCC-408-006 FedEx APAC HR Shared Services Center in Wuhan This case was prepared by Prof. Lee, Jean S K and LIU Jia at Case Center of CEIBS. The case was prepared as the basis for class discussion rather than to illustrate either effective or ineffective handling of an administrative situation. Certain names and other identifying information may have been disguised to protect confidentiality. Copyright à © 2008 by CEIBS (China Europe International Business School) No part of this publication mayRead MoreFedex Case Study on Creating Value1256 Words à |à 6 PagesBPSM (FedEx-UPS) Creating Value at FedEx and UPS From the companys founding close to 30 years ago, FedExs strategic competitiveness has been based on an obsession with, and careful nurturing of, delivery speed and reliability as its core competencies. These competencies have been critical to the pursuit of the opportunities that were associated with Frederick W. Smiths early vision of todays fast-cycle global economy. Believing that value could be added to business firms operations if they
Friday, December 13, 2019
Gun Control vs. Crime Rate Free Essays
Jessica Vickers Dr. Jonne Akens Engl 1302 25 February 2013 Gun Control vs. Crime Rate According to the Second Amendment of the Constitution of the United States of America, ââ¬Å"A well regulated Militia, being necessary to the security of a free state, the right of the people to keep and bear Arms shall not be infringed. We will write a custom essay sample on Gun Control vs. Crime Rate or any similar topic only for you Order Now â⬠In this very amendment lies the main issue of gun control. ââ¬Å"To many, the language of the amendment appears to grant to the people the absolute right to bear arms. However, the U. S. Supreme Court has held that the amendment merely protects the right of states to form a state militia. â⬠(Kimberlin) Gun control, or the controlling of firearms, is any act or proposal by any local, state, or federal agency to inhibit, deter, or prohibit the possession of firearms by any law abiding U. S. citizen. Some believe that by controlling the peopleââ¬â¢s possession of firearms, the violent crime rate will decrease. However, this is not the case. The controlling of firearms, also known as an infringement of the second amendment, is irrelevant to the reduction of violent crime. Instead, further investigation into the criminalsââ¬â¢ motives and state of mind will better resolve the rate of crime in our country. The Second Amendment is a mere twenty-seven words long. However, both campaigns of the gun control debate obtain such different interpretations from those words. ââ¬Å"The gun-control campaign interprets the Second Amendment as if it is specifically referring to militias. The Gun-rights supporters say all the other amendments focus on individual rights, as does ââ¬Å"ââ¬Å"2A. â⬠The Second Amendment helps protect what is promised in the other nine and that it is a line the government is forbidden to cross. â⬠(Kimberlin) Kimberlin also states that, ââ¬Å"not many nations have firearms enshrined into their constitutions, but in 1789 the Founding Fathers thought that guns were important enough to deserve one of 10 amendments that make up the Bill of Rights. â⬠If the possession of guns for our personal protection were not an impor tant factor, they would not be included into such an important document to our country. What the Second Amendment means, more than two centuries later, seems to depend on which side of the gun issue you are on. â⬠(Kimberlin) This being so, further investigation of this amendment is necessary to becoming more informed on this fiery debate. Gun control is a very heavily debated topic at this point in time, especially since the shootings at Newtown and Sandy Hook have taken place. But this has been a topic of debate ever since the Prohibition Area of the early twentieth century. However, these mass shootings have triggered new debates on this controversial issue. In the shooting at Sandy Hook Elementary, Adam Lanza entered the school carrying multiple firearms and shot at students, as well as teachers, after shooting his mother at their home in Newtown, CT. These shootings prompted further debate on the rising issue of gun control and have brought a proposal to legislation in which the sale and manufacture of certain semi-automatic firearms and magazines holding more than ten rounds of ammunition would be banned, and reduced access to certain firearms would be enforced. Although this shooting was a very tragic event, are firearms really the problem? Or should we be venturing further and investigating the minds of these criminals before they even pick up a weapon? According to Joe Wicked, ââ¬Å"on the other side of this debate, there are concerns addressing the mental health aspect, addressing the illegal activities associated with firearms and that the law abiding citizens should be left the right to own the types of firearms and magazines that they desire and have the ability to maintain access to both the firearms and/or magazines that they choose. This side of the gun control debate points to a story in which, ââ¬Å"a young man present when a gunman began shooting at the Clackamas Mall in Portland Oregon, Nick Meli, heard the first shots fired and pulled out his concealed weapon and confronted the shooter. He did not fire, as he did not want to risk bystanderââ¬â¢s lives. The gunman then ran and took his own life (Benner, 2012). The latter s ide of the debate shows how civilians are capable of stopping a crime before the police are able to arrive. ââ¬Å"Some even claim that more guns will help to control the crime and prevent mass shootings from occurring. (Wicked) After being subjected to so much information, how is the reader to know which side is right? According to Wicked, ââ¬Å"This can be a difficult question to answer and requires detailed analysis to come to an informed decision. Studies that have been done on the issue of gun control have found many things that gun control affects and many things that it does not affect. One key item that studies have found is that gun control laws affect the use of specific guns in violent crimes, but do not affect the rate of crime itself. The controlling of firearms by either banning the sale, transfer, importation, or manufacture of, as well as controlling the amount of ammunition available and the storage of that ammunition, is irrelevant to the reduction of violent crim e. When debating the effect that a particular law, or ban of item, has on the rate of violent crime, it is beneficial to look back at the effect that laws and bans similar to these have had on the crime rate throughout history. The 1994 Assault Weapons ban which Dianne Feinstein proposed and that of which Congress passed would be a prime example. This ban specifically selected fire arms that looked like the firearms militaries around the world used. These types of weapons are weapons not commonly used in crime. In 2010 handguns comprised 68. 5% of all gun murders in the United States (FBI, 2010). This means that in the remaining 31. 5% of gun murders, shotguns, hunting rifles, and the banned assault weapons. Rifles constituted 0. 6% of all murders by gun. The banned assault weapons make up a subset of these rifles. We know that less than 0. 6% of all murders were by these weapons that were banned. (Wicked) Another way to look at the effectiveness of prior firearm bans, according to Wicked, is to look at the crime rate after the ban was lifted or, as in the case of the 1994 Assault Weapons ban, the ban expired. ââ¬Å"The FBI data from 2010 shows that the five year trend in crime is that it continues to decline. Further drill downs of the data show that on average the crime rates in all categories are on the decline in the United States. If the ban were effective on reducing violent crime, the expectation would be that the crime rates would increase when the ban is lifted or it expires. Crime rates continuing to decline after the lifting of the ban suggests that factors other than the ban are affecting crime rates. (FBI, 2010). â⬠(Wicked) This information further supports the fact that there is no correlation between the controlling of firearms and the reduction of violent crime. Crime rates decreased after the expiration of the 1994 Assault Weapons Ban, and the evidence clearly shows that the banning of a certain weapon, causing that particular weapon to be more difficult to purchase, or causing a firearm to be too expensive to purchase will only ffect which weapon is chosen to commit a crime, not reduce the rate of crime. ââ¬Å"Instead of deciding to ban a weapon as a response to a tragedy, the leaders of our country would better serve the people of the United States by conducting a study into the causes in society which create the situations that lead to violent crime and addressing those root causes, whether it be mental health, violent movies and games, lack of access to proper education, or whatever other root factor. Addressing the causes of the crimes will produce better long-term results in reducing violent crimes. â⬠(Wicked) The shooters in these violent crimes were denied from purchasing firearms and in most cases resorted to taking them from a legal owner. How would gun control laws prevent this situation from happening in the future? Perhaps a mental health screening and identifying there might be a problem with these citizens in a mental aspect would be more effective than further gun laws that already denied the shooter the ability to purchase these firearms. We should be focusing on the mental aspect of this situation rather than the firearms themselves. If someone is planning on killing a massive amount of people, they most likely are not concerned with the legality of obtaining firearms. No laws against or banning of firearms have worked in the past, and they will not work now. Taking the politics out of the issue, and researching the true causes behind the crime while addressing them effectively would best serve both sides of the gun control debate. Jessica Vickers Dr. Jonne Akens Engl 1302 25 February 2013 Works Cited Kimberlin, Joanne. ââ¬Å"The Second Amendment: two interpretations. â⬠Virginian Pilot. 02 03 2008: n. page. Web. 3 Mar. 2013. Wicked, Joe, ed. ââ¬Å"Does Gun Control Reduce Violent Crime? â⬠Cold Dead Hands. Cold Dead Hands, 30 Jan 2013. Web. 2 Mar 2013. How to cite Gun Control vs. Crime Rate, Essay examples
Thursday, December 5, 2019
Income Distribution and Demand Induced Innovations
Question: Discuss about the Income Distribution and Demand Induced Innovations. Answer: Introduction In the financial aspects, demand as well as supply is considered as the most critical elements that impact the cost of an item. These two major concepts demand and supply are measured as the foundation or base of the market economy. Moreover, demand and supply also affect the market harmony in both positive and negative manner. Market harmony is a circumstance where the cost of an item/benefit continues as before. As such, it can be said that, harmony is the cost wherever the sum requested by benefactors would be equivalent to the sum provided by providers. The adjustments in the demand as well as supply of an item will impact the harmony cost and amount of an item. Furthermore, cost is an essential variable that assembles a solid association between these two components of economics: demand and supply. Along with this, this research essay would be useful to portray the central point that affects the demand and supply of an item in the commercial center. Additionally, in perspective of this examination article, Cigarettes is picked as an item to perceive influence of variables on the demand and supply effectually. All in all, this article would be gainful to speak to the connection amongst free market activity successfully. In the area of economics, price of a product or commodity can be considered a major factor that may have an impact on the demand and supply factors of the market economy. Apart from price, there are various variables exist in the economy of a country that influence the demand and supply of an item usually. With regards to this research essay, the most important considerations that would influence the demand as well as supply of chose item Cigarettes are outlined as beneath: Value: Price is a central point that impacts the request and supply of an item in the commercial center. According to the law of interest, the cost affects both request and supply side of the market. For case, if there will be an expansion in the cost of an item then there will be a lessening in the request of the item. In inverse to this, if there will be a decrease in the in the cost of an item then there will be an expansion in the request of the item(Nelson Goel, 2012). Similarly, a drop off in the costs of cigarettes will expand the request and supply of Cigarettes inside the country in a programmed way. Besides, a decrease in the costs of cigarettes will spur to clients to obtain greater quantity of the product. In addition, the diminished costs of Cigarettes will incite providers to supply greater quantity of cigarettes to satisfy the demand of the consumers in a proper manner. The below graph is helpful to show the effect of price on demand and supply of a product: Wage levels of Consumers: Income level is additionally an imperative component that impact the request and supply of an item in the commercial center. For case, an expansion in the salary level/work level builds the request of an item in a nation. It is a direct result of the expanded pay level of individuals makes them proficient so they can purchase an item in the coveted amount. In addition to this, an expansion in the pay level of individuals will expand the request of Cigarettes inside the country. It is outstanding that Cigarettes is a high requested item in the vast majority of the countries and expanded salary level assumes a huge part to satisfy the request of item in a proper way (FOELLMI ZWEIMLLER, 2006). In inverse to this, if there will be a decrease in the wage level of the general population then it will impact the request and supply of Cigarettes in the market. It is a result of all things considered; individuals would not have the capacity to pay cash for Cigarettes and furthermore seek different substitutes of Cigarettes. This factor will deteriorate the supply of Cigarettes in the market. The below graph is helpful to show the impact of income level/wage rate on the demand and supply of a commodity: Substitute Goods' Price: The cost of substitute merchandise or items is likewise a central point that progression the demand as well as supply sides of an item. For case, if the substitute of an item is available at less expensive value then customers will buy the substitute item rather than craved item (Krugman Wells, 2012). It is well-known that e-cigarettes or vapouriser is a noteworthy substitute of Cigarettes in Australia; and expanded costs of Cigarettes will decay the request as well as supply of Cigarettes. It will also improve request and supply of e-cigarettes or vapouriser inside the country in a programmed way. Government Rules Regulations: Government rules as well as regulations are the most important factor that widely influences the demand and supply side of a product. The chosen product Cigarette is injurious for health. The government of the nation makes a lot of policies to restrict cigarette in the marketplace. But, the government of a nation cant fully ban Cigarette in the nation. It is because of these types of products improve the economy of a nation. So, when the government puts ban on cigarettes then it increases the demand of the product immediately. The increased demand of cigarettes directly improves the supply of the product(Bader, Boisclair, Ferrence, 2011). Hence, government rules and regulations is also other major factor that may influence the demand and supply sides of a commodity in the marketplace. The below graph is helpful to show the effects of the government policies on the demand and supply of cigarettes: Inclinations of Consumers: The purchasers' tastes, propensities, traditions, inclinations, needs, goals et cetera are the main considerations that affect the demand as well as supply of an item. Along with this, if shoppers pick e-cigarettes in place of cigarettes then it will impact the request of cigarettes contrarily(Dlabay, Burrow, Kleindl, 2008). As such, one might say that there will be a decrease in the request and supply of cigarettes in the commercial center. Likelihood of Price Changes in Upcoming Years: Future expanded costs of an item likewise impact the request and supply of an item. For case, if there is a likelihood that cigarettes cost will increment later on then the buyers will get colossal amount of cigarettes and this will improve the request and supply of cigarettes at that moment (Faith M.Edwin, 2014). On the other hand, the other certainty is that, the future expanded costs of cigarettes will likewise diminish the demand as well as supply of cigarettes in future day and age. Thus, one might say that, these are the main considerations that affect the demand as well as supply side of an item in the marketplace of a nation. Conclusion On the basis of the above discussion, it can be accepted that, there is a solid association between the free market activities of an item/benefit. Furthermore, it is additionally watched that both supply and request have an impact on each other. Both free market activity variables are interrelated and also rely on upon each other. In addition to this, it is additionally examined that there are a considerable measure of elements, for example, wage level, value, customers' tastes and inclinations, substitute merchandise's costs et cetera that have both positive as well as negative impact on the demand and supply sides of the market. Bibliography Bader, P., Boisclair, D., Ferrence, R. (2011). Effects of Tobacco Taxation and Pricing on Smoking Behavior in High Risk Populations: A Knowledge Synthesis. Int J Environ Res Public Health , 8 (11), 4118-4139. Dlabay, L., Burrow, J. L., Kleindl, B. (2008). Intro Ato Business. USA: Cengage Learning. Faith, D. O., M.Edwin, A. (2014). A Review of The Effect of Pricing Strategies on The Purchase of Consumer Goods. International Journal of Research in Management, Science Technology , 2 (2), 88-102. FOELLMI, R., ZWEIMLLER, J. (2006). Income Distribution and Demand-Induced Innovations. Review of Economic Studies , 73, 941960. Harris, R. L. (2000). Information Graphics: A Comprehensive Illustrated Reference. UK: Oxford University Press. Krugman, P., Wells, R. (2012). CourseSmart E-Book for Macroeconomics: A PDF-style E-Book. USA: Palgrave Macmillan. Mankiw, N. G. (2008). Principles of Macroeconomics. USA: Cengage Learning. Nelson, P. M., Goel, P. R. (2012). Global Efforts to Combat Smoking: An Economic Evaluation of Smoking Control Policies. USA: Ashgate Publishing, Ltd.
Thursday, November 28, 2019
Wrath of war an Example of the Topic Literature Essays by
Wrath of war The main component that comes out clearly, is the openness with which the authors foresaw their fate. They expected the occurrence with courage made know that they had gone to war with a vision in mind. They had something they wanted to achieve. That is: - victory, liberation and a peaceful world. For example Lester in his letter to the parents showed what he thought would be his fate when he said. Need essay sample on "Wrath of war" topic? We will write a custom essay sample specifically for you Proceed The letters also showed the different expectations that the authors had towards the war. Some had resolved to die for their country while others hope of going back safe and hence live for it. Generally, the letters bring out an illusion of what the war was, the lives of those involved, their suffering, expectations, excitement, perseverance, conditions, injuries, death and their dedication. Among the facts that have come out in this chapter is love. The love the authors had for their people made some go for the war. This includes the love they had for their wives, spouses or children all in an effort to make them happier and proud. The other fact is suffering and endurance.The war led to the death of many men and the conditions that the soldiers endured were pathetic. They lived for long periods in rat infested houses, mud-soaked and stinking of human waste and rotting corpses. They were in constant fear and anxiety of what the next minute entailed. Lastly, the fact that remains so obvious in this chapter is the dedication with which the soldiers faced the war. Despite the hardships that came their way they remained dedicated to serve despite the fear of death, lack of assurance to live. Work cited Madureira, J. (2008). Docksides: Wrath of War. UK, Matthew Walker Publishers.
Sunday, November 24, 2019
Short Commentary on Othello Act 4 scene 1 lines 1-46 Essays
Short Commentary on Othello Act 4 scene 1 lines 1-46 Essays Short Commentary on Othello Act 4 scene 1 lines 1-46 Paper Short Commentary on Othello Act 4 scene 1 lines 1-46 Paper Essay Topic: Othello The opening scene of Act 4 in Othello succeeds one in which Othello begins to confront Desdemona about Cassio via the loss of her handkerchief. Bewildered by her husbands strange new violent and jealous behaviour, Desdemona, unknowingly, tries even harder to help Cassio. She continually implores that Othello gives him back his position as officer, if just in order to remind her husband of his esteemed position among the society, and in general, of his own sense of honour and morality that she, as his wife, had always seen in and respected of him. Act 4 Scene 1 opens up in media-res of a conversation taking place between Iago and Othello. This scene chiefly introduces to the audience Iago as having gained full control, as we see Othello now to be the one unconsciously repeating after him. Through the use of intimation, imagery and the theme of appearance vs. reality, the audience is convinced of Iagos success and Othellos deterioration.Ã In this scene, the overarching theme of appearance vs. reality is an implied but a recurrent and significant one. Through Iagos character, Shakespeare analogizes materialistic/physical things to the main values explored in the play, successfully conveying to the audience the importance of both, but on a deeper level, how Iago has the ability both to hinder and manipulate them in his acts of double knavery. The handkerchief Othello gives to Desdemona, for example, embodies his love and trust for her, but more deeply his honour in her having accepted him, the moor, the outcast. Thus, the loss of the handkerchief grew to become synonymous with the loss of its value, as is evident from Othellos change in narrative form, as it goes from a form of verse to prose. In addition, Othello says, in line 35 on page 153, Handkerchiefconfessionshandkerchief! To confess and be hanged for this labour. First to be hanged and then to confess. in prose form, and Shakespeares use of it accommodates Othellos use of chiasmus in his speech. Ironically, where chiasmus is used typically as a device to articulate balance or order within a text, the use of it in Othello marks precisely the opposite. Through this Shakespeare conveys Othellos convoluted state of mind both mentally and emotionally, and therefore, Iagos success in his motivations. Furthermore, in pairing both the physical and non-physical things, Iago is also able to draw contrasts between them, as, unlike Desdemonas handkerchief, her honour is an essence thats not seen, thus insinuating her deceit to Othello. Likewise, the reverberation of Iagos use of the word poison throughout several acts reflects his own duplicity, almost as if he chose to name it as such. Poison works slowly but effectively the same way Iagos deception worked on Othello. However, on a deeper level, it also marks Iagos character development as his successes continually accelerate more of his schemes and plans, while at the same time weakening Othello. However, it is the analogy between and a value and a sensual physical action, in an unauthorized kiss in line 3, that epitomizes and conclusively portrays Iagos complete manipulation of Othello, that by combining values of reputation and authority with love and emotion, Othellos weaknesses are used in Iagos power, leaving Othello to seemingly self-destruct. In conclusion, it is Shakespeares use of language and his successful implicit portrayal of themes through characters that allows his audience to unwrap themselves not only the true nature of the relationships between the characters, but also the complementing and contrasting values and ideals that inevitably exist amongst them.
Thursday, November 21, 2019
Crime and Ethical Standards Term Paper Example | Topics and Well Written Essays - 750 words
Crime and Ethical Standards - Term Paper Example The individual is only suspected to be under influence of drugs. Therefore, this crime can be argued to be misdemeanor possession of a controlled substance (Braswell et al., 2005).à An individual who illicitly obtains or uses items coded controlled substances is charged with a crime. It is a criminal offense to possess a controlled substance. In my state, the quantity, the nature of the drugs and the circumstances that one is assumed to possess a controlled substance influence the nature of conviction that one receives. The penalty for this crime depends also on the classification of the drug. An individual is charged with misdemeanor possession of a controlled substance in the event that the very individual is found to be in possession of coded substances below a specific limit (Leighton & Riemann, 2001).à Societal factors influence individualââ¬â¢s behaviors. Societies where social values and norms are adhered to the letter experience less social problems because individua ls are discipline. In the paradigm case, Jonesââ¬â¢ negative behavior that has put him into troubles can be associated with various societal factors. It can be suggested that Jones is brought up in a society where people commonly engage in drug abuse. The first duty of any government is to ensure safety of its citizens. Social contract theory states that government sets rules governing individualsââ¬â¢ behavior that is wholly accepted by rational citizens. The state exists to enforce these rules and laws for positive social living. It is in Jonesââ¬â¢ interests that the law enforcing agencies, police in this case, do not take advantage of their powers and abuse him. This implies that they must adhere to the rules that protect the suspect. It is the responsibility of the government to ensure that the criminal justice system in place is effective to prosecute suspects of crimes while protecting their rights by providing fair trials and rational punishment. Governmentââ¬â¢s duty to offer security and safety is in Jonesââ¬â¢ interest. The government would require law enforcing agencies and the criminal justice system to pursue critical analysis of the condition of the suspect before making any conclusion (Leighton & Riemann, 2001).à Marconi is a police officer hence has a role to ensure that there is law and order in the society. The law requires law enforcing agencies such as police to pursue their duties diligently for the benefit of the citizens. In this event, Marconi has a number of roles to play. He ought to question the suspect before arresting as a matter of procedure. However, this did not happen. The officer has a duty to proof the nature of the crime committed by Jones in order to guarantee far trial and punishment. Police officers are expected to be subjective in their undertakings to avoid prejudicial mistreatment of the suspect as it happened to Jones (Leighton & Riemann, 2001).à The clearest miscalculation by Officer Marconi is his failure to read the suspect (Ms. Jones) her Miranda Rights. Ms. Jonesââ¬â¢ custodial interrogation satisfies her Miranda needs, ââ¬Å"â⬠¦the person in custody must, prior to interrogation, be informed that he [she] has the right to remain silentâ⬠¦Ã¢â¬ (Miranda v Arizona (1966), 384 US 436) and further, anything she says can and will be suppressed by applying ââ¬Å"â⬠¦the product of a rational intellect and free willââ¬
Wednesday, November 20, 2019
Childlink Essay Example | Topics and Well Written Essays - 1500 words
Childlink - Essay Example Yet, sometime despite our best efforts, children and even the parents fall further into social problems with crime, substance abuse, and destructive behavior. This creates questions of how to moderate social crisis in families, and relates to the professional development of my career in counseling and social work. Findings, or discussion: The basis for most foster care placements are deterioration of the family structure through crime, substance abuse, domestic violence, and poverty as they combine to create a situation where a child may be taken from his or her birth family to a safer environment under the auspices of Child Protection Services, a court order, or a recommendation from social welfare. The psychological effects of these family traumas may affect all involved in a profound, life-changing manner, hurting the children the worst in learning how to process emotions born out of abusive or abnormal patterns of family behavior. Because of this, I decided to do a literature rev iew of academic sources in psychology and sociology relating to the foster care experience as it is reported from all of the different perspectives in the relationship, including: the child, the birth family, the foster family, the counselor, social services, and the legal or judicial aspects of the process. In reading the academic literature related to psychology, for example, I became interested in child development stages and also the patterns or reactions of the children as they developed through different responses to the alienating situation. I began to realize that some of the children naturally reacted passively to the situation, and that they were apt to close up emotionally more often when confronted with confusion or emotionally charged situations. Conversely, others were always active and aggressive and more apt to resist violently or irrationally when confronted with conflict. The recognitions of patterns of introversion and extroversion led me to the conclusion that di fferent approaches should be prepared in advance to address the needs of the children uniquely, for example introducing activities to calm or moderate the behavior of the active children while attempting to stimulate a more positive response from the withdrawn children. I feel that further research on this topic can lead to a better understanding of what a counselor needs to do in order to recognize signs in individuals and introduce treatment through unique diagnosis of the psychological issues and personality types underlying the individual cases. The same approach can also be taken with regard to family members who are displaying outward signs of substance abuse, or alcoholism. These two combined are the usual gateway to family destruction, especially when intersecting with the prison justice system. The roots of substance abuse in theory are important to academic research for my work at Childlink and also for further progress in the field of social work and counseling. Substance abuse and alcoholism are the most common problems that lead to the further domestic violence, criminal behavior, and deterioration of the family structure that tragically results in foster care. The question of treatment and recovery for those suffering from long term or chronic alcoholism and drug abuse is an important part of my research at Childlink, as they relate as a key cause to the social and personal breakdowns that create the family
Monday, November 18, 2019
Leadership Failure Position Essay Example | Topics and Well Written Essays - 1000 words
Leadership Failure Position - Essay Example Weiner demonstrates a charismatic and relationship-motivated leadership approach.Indeed, a New York Times article announcing Weinerââ¬â¢s resignation notes that some of his colleagues described him as, ââ¬Å"a publicity seeker unwilling to put in the hard work needed to pass serious legislationâ⬠(Hernandez, 2011). This is seemingly indicative of an individual that is task-averse. To an extent then the actionââ¬â¢s Weiner took may be thematically indicative of his situational approach to other aspects of his career. One also considers if Weinerââ¬â¢s gender may have contributed to his increased scrutiny. Such a consideration has long been a question in prominent sex cases where an older woman engages in consensual relations with a minor. While Weinerââ¬â¢s situation is clearly different, it seems that to an extent the logic could be applied to this situation. In Weinerââ¬â¢s situation, the nature of him sending photos of a sexual nature to a woman seemingly is in dicative of an abuse of power on his part. The nature of such an act is more pronounced when emerging from a male because of both masculine physicalities, as well as the social connotations.While Weinerââ¬â¢s personal responsibility is a prominent element of his leadership failure, itââ¬â¢s also necessary to consider Weinerââ¬â¢s institutional position as Congressman. Clearly, the scandal gained media attention for Weinerââ¬â¢s position as a member of the House of Representatives. One considers that prior to the scandal Anthony Weiner had gained a reputation for bombastic and sensational speeches.
Friday, November 15, 2019
Network Attacks in Real Time Scenario Over Campus Network
Network Attacks in Real Time Scenario Over Campus Network Amit Mahajan* Vibhakar Mansotra** ABSTRACT This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper discusses about the dependency over the IDS/IPS signatures and proposes for a solution which records the events with raw traffic and visualizes the traffic to give better understanding of the behavior of the traffic flow over the network. Keywords: UTM, Attacks, Visualization, Afterglow, tcpdump. I INTRODUCTION Networks have been under attack from the time Internet came into existence. There is consistently some lack of determination connected with the effect of these attacks. In the present situation of PC innovation, any institution can have enormous machine frameworks of distinctive natures. With the advancement of technology, Organizations have started facing difficulties due to different types of computer viruses and attacks. This resulted in tremendous loss of the internal assets like data and utility of time. Thus there is an urgent need to study these attacks and network breaches by means of which one will be able to devise preventive measures and thereby protect the internal assets. In view of the above objectives one has to understand the networks and how they expand widely. Also one has to understand the attacks and breaches. Mostly the internet is one of the sources of the viruses and attacks but quite often the local network is also a major source of threats for campus networks. Generally administrators and organizations safe guard their networks from outside threats but the internal attacks and breaches are very crucial. The IDS/IPS ( ) are installed over the gateway level to scan the outgoing and incoming traffic. Where these kind of mechanism to study the behavior of internal attacks is vague. One is very much interested in knowing the kind of traffic flow, and its identification etc in the network. This kind of approach will help the user community to adopt preventive measures or in other words one has obtain a solution by studying the internal attacks and network breaches and thereby how to minimize and protect the internal assets . Analysis of the netw ork can be used as a tool to scan the network traffic. The behavior of the network may be understood through penetration tools, simulations etc. Alternatively a tool like IPS having capability of network behavior analysis also can be of great help in understanding the problem. SURVEY OF WORK Asmaa Shaker Ashoor and Sharad Gore in their research differentiated the Intrusion Detection System and Intrusion Prevention System (IDS/IPS) technology which is used in the computer networks. They compare the stability, performance and accuracy wise result of IDS and IPS. They highlighted that the major difference between the IDS / IPS is among their deployments over the network. IDS technology works on out band system which means it is not lined with the network path but IPS technology works on in-line with the system, means it can pass through in between the devices in real time. Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit discusses about the Present run-through for fighting cyber-attacks which are typically used by the Intrusion Detection Sensors (IDS) to inactively detect and block multi-stage attacks. The algorithm, TANDI, helps in reducing the problem difficulty by separating the simulations of the attackerââ¬â¢s capability and opportunity and thus fuses the two to determine the attackers intent. The results of the research demonstrate that the algorithm TANDI predicts that the future attack action precisely as long as it is not a coordinated attack and which contains no internal threats. In the presence of the malicious attack events, the algorithm TANDI, will give alarm to the network analyst for further analysis. This can be further analysed with the help of simulation. Nilima R. Patil and Nitin N. Patil in their paper discussed about the importance of attack graph to check the possible attacks in the network. Using attack graph, analysis can be done effectively. This helps the administrators to further analyze the attack graphs deeply to know where their system weaknesses lie. Accordingly help them to decide what kind of security measures can be opted for effective deployment. They study different ways to analyse attack graphs and to provide future scope for research on these attack graphs. Rosslin John Robbles, Tai-hoon Kim, Seung Lee in their paper have shown that a second level in addition to access control intrusion confinement can dramatically enhance the security especially integrity and availability of a system in many situation. It showed that intrusion confinement can effectively resolve the conflicting design goals of an intrusion detection system by achieving both a high rate of detection and a low rate of errors. Developing a more concrete isolation protocols will further be studied in the future research. Meera Gandhi and S.K Srivastava in their paper highlighted the importance of Intrusion detection in business sector and in active area of research. They describe IDS as important tool for information security. An IDS is intended to identify and fight with some common attacks over the network systems. In such systems log displays the list of attacks to the administrator for ambiguous action. This system works as an observant device in the event of attacks directed towards an entire network. In the light of the above available information a need has been felt to undertake similar type of work in the University of Jammu as well. This will help in study of attacks received by the network of the campus. The network is setup on optical fiber backbone with around 100 distributed switches across the campus. Which also has WI- FI wireless Connectivity with access points around 200 approx. Such an ICT facility available over the network is plays an important role in helping the students, researches, teacher and staff. The number of users in the UOJ campus network appxo 3000. Thus the analysis of the attacks is taken up in this campus. II EXPERIMENTAL SETUP USING UTM University of Jammu is one of the pioneer higher educational institutes in the state of Jammu and Kashmir, India. Whose vision is to be an internationally competitive academic and research institution? To achieve University of Jammu has lot of focus on the information technology. In 2003 university started its initiatives to be an IT enabled university by setting up a university campus network on optical fiber backbone. Later this network was further converged with Jammu University JU Wi-Fi. This facility is playing a very crucial role in order to help the students, teachers, researchers and administrative staff to use the ICT facilities available over the network. University of Jammu is having huge internet bandwidth connectivityââ¬â¢s to cater the needs of the university fraternity. This internet bandwidth connectivityââ¬â¢s constantly keeps on upgrading from time to time. At present university is having 40 mbps Internet bandwidth 1:1 OPTICAL FIBER lease line from reliance an d 1 Giga optical fiber connectivity from National Knowledge Network. Students, researchers and teaching faculty are able to access the scholarly contents online from any location within the campus. There are around 37 departments comprising of teaching and centers other than administrative blocks which are connected through this optical fiber back bone network. All the three girls and boys hostels are also connected through the optical fiber backbone. There are around 100 distributed switches (Cisco and Dlink) and approx. 200 indoor wireless access points (Linksys and Dlink) and 18 outdoor access points (Dlink) which are installed at the various locations of these departments / blocks of the university. All the equipmentââ¬â¢s are connected through optical fiber backbone to the control room campus network of the university with Cisco catalyst switches 4507R, 4506. In order to maintain such vast network and ICT Facilities University has deployed a UTM device in the network. This UTM device helps the university it administrators to maintain the university campus network more efficiently. UTM installed at the university is a product from worldââ¬â¢s top IT security company Cyberoam. This UTM is installed almost all the major academic institutes of the country. The UTM device has multiple solutions in a single box. It comprises of load balancing of internet bandwidths, Antivirus and anti-spam scanning at the gate way level, User identity based firewall rules, gateway level IDS and IPS scanning and AAA authentications etc. This UTM device is installed between the ISPS Routers and Cisco catalyst switches so that the whole traffic gets scanned through the UTM device. All the policies are applied on the firewall rules as per the requirement of the University network. Figure: 1 UTM Deployment in Gateway Mode With the increase in the University network and ICT facilities over this network, it is observed that the ratio of attacks also gets increased. These attacks reduce the performance of the University Network and other ICT facilities available. Thus to study the kind of attacks, their significance and a solution how to reduce them is proposed in this paper. UTM device installed in the University network is considered for collecting the IPS attacks data. Since it has the ability to produce the Attack reports, this will help the University IT administrators to see the trend of the attacks how they are generating and affecting the system. The critical IPS attacks will be studied over a time to find the patterns of the attacks and their significance over the network applications and ports to which they are associated. This study will help the university and other institutes which are using the same UTM to fine-tune the rules and other parameters so that network bandwidth and other services performance does not get affected with the attacks and users of the ICT facilities should have performance oriented service. III DATA COLLECTION AND ANALYSIS USING UTM As described in the previous about the network system university campus. The information on the number of IPS attacks has been collected since 1 July -2013 to 2-dec -2013 (22 weeks). The total number of attacks is 1301567. Out of these the type of attacks having frequency more than approx 100 is 1299646 lakh. These 13 lakh IPS attacks have been classified into 5 categories broadly example HTTP/ HTTPS, ICMP, UDP, FTP, TCP based on the signatures. The display of the number of IPS attacks belonging to each category is shown in figure-2: Figure -2 Classifications of Attacks Out of the above 13 lakh of the attacks the top 14 critical attacks from the five major categories have been identified to 162810 by the IPS and them display is shown in figure-3: From the figure-3 it may be noted that the prominent attack having a frequency greater than equal to 4.38% are 6 types (responses 403 forbidden type is 45.62% , 17.38 % web misc handler access 8.57 % is https/ssl renegotion , 7.38% web php , 7.34% web cgi count , 4.38% info ftp bad login) . While rest of the 16 attacks less than 10 % are having very small frequencies. The percentage of attacks each of the 22 weeks is shown in the bar diagrams in figure series: Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week7 Week 8 Week 9 Week 10 Week 11 Week 12 Week13 Week 14 Week15 Week 16 Week 17 Week 18 Week 19 Week 20 Week 21 Week 22 Out of 22 weeks, the percentage of Attack Responses 403 Forbidden is the most dominant one. Forbidden attack response is the highest attacks with 45.62% overall in the 22 weeks, this incidence is generated when a 403 error response code is returned to a client by a web server, which indicates that an effort is made to take an unauthorized access to a web server or an application running on a web server. The 400 series error messages indicate an error on the part of the browser client making the request to a web server. The 403 response shows a request for a forbidden resource which cannot be gain access to even with authentication identifications. Many events can show a determined effort to exploit vulnerability on the victimââ¬â¢s server. Certain applications do not perform strict checks when confirming the credentials of a client host linking to the services offered on a host server. It can lead to an unauthorized access and probably escalated rights to that of the administrator. Information stored on the machine will be compromised and trust relationships established between the victim server and the other hosts that can be exploited by an attacker. In such Attack Scenarios; attacker can access the authentication mechanism and provide his/her own credentials to gain access. On the other hand the attacker can exploit the weaknesses to gain the administrator access without any exploit code.While the other prominent attacks are:- ICMP trace route: This attack is generated when a Windows trace route (tracert) is detected. A trace route is be used to discover live hosts and network topologies. A Windows trace route command uses an ICMP echo request with a lower than normal Time to Live (TTL) value to identify live hosts and network topologies. Web- MISC handler Attacks: this attack is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server. The other attack which has very high severity level is the SNMP attack. From the figure- 4 shown below , it is noted that there is a peak in the number of attacks in the 8th (19-0ct-2013 and 9th week).It may be noted that this peak is due to SNMP attack responded by UDP with application whose activity is pronounced. Figure: 4 shows16 different types of attacks out of 22 attacks per week are shown Figure ââ¬â5 different types of major attacks per week Figure: 5 Shows 16 different types of attacks out of 22 attacks per week are shown over the entire period. Of these 6 are found to be more conspicuous: ATTACK-RESPONSES 403 Forbidden (ATK-RES403F) 71067, ICMP trace route (29205), WEB-MISC handler access (13959), SNMP request UDP (11954), SNMP public access UDP (11952), HTTPS/SSL Renegotiation DoS (7062) IV FRAME WORK FOR EVALUATION AT THE GATEWEY LEVEL TO STUDY THE ATTACKS USING RAW PACKETS GENERATED BY THE NETWORK To study the attacks more affectively, a frame work was deployed using open source software like Ubuntu, tcpdump with visualizing software like afterglow to capture real time at the core switch. This will help to monitor and analyze the network traffic in real time scenario. Data was evaluated for two hundred thousand packets captured using tcpdump ââ¬ânnelr data.pcap l wc ââ¬âl at the root. This will capture the raw traffic for two hundred thousand packets for data analysis and visualization. The data captured by the tcpdump will be converted to a csv file with all fields. Tcpdump-vttttnnelr ju.pcap|./tcpdump2csv.pltimestamp sourcemac destmac sip dip sport dport flags len proto ttl id offset tos ipflags > ju.csv. The Csv file is then exported to Mysql database. load data infile ââ¬â¢ju.csvââ¬â¢ into table analysis fields terminated by ââ¬â¢,ââ¬â¢ lines terminated by ââ¬â¢nââ¬â¢ (timestamp, sourcemac, destmac, sourceip, destip, sourceport, destport, proto, tcpflags, length, ttl, ipid, iptos, ipflags, offset); Further, ju.csv file was converted to dot file, which was converted to png file. tcpdump -vttttnnelr Ju.pcap |./tcpdump2csv.pl|./afterglow.pl-c color.properties > Ju.dot Cat Ju.dot | neato -Tpng ââ¬âo Ju.png Figure 6 shows Whole Traffic captured for network Figure-6 shows that the outgoing traffic is greater than incoming traffic, which states that traffic is compromised. Therefore there is need to identify the port 80 traffic and identify the machines which are compromised. From figure 7 we identify visually that the out traffic on port 80 is very high. Therefore, needs to identify machines which are compromised. Figure 7 shows the out going traffic of port 80 Figure -8 shows ATTACK from IP 192.176.2.25 Figure-8 Shows visualization of machine with IP 192.176.2 25 that is connected over the network which is compromised and sending malicious traffic outside. This helps the administrators to identify the machine irrespective of any signatures within the IPS database. Similarly other machines can be identified. V CONCLUSION AND FUTURE SCOPE IDS/ IPS are installed in almost every organization but they are designed to work on signatures. To study attacks which exist other than signatures, we need to further do the analysis through the frame work created with high end hardware which is required to capture and analyze the traffic for longer duration. So that fine tuning of the IDS/IPS as per the campus network requirement will be done to further increase the network performance. VI REFERENCES [1] Paxson. Bro: A System for Detecting Network Intruders in Real- Time. In Computer Networks, volume 31 (23ââ¬â 24), pages 2435ââ¬â2463, 1999 [2] G. Stein, B. Chen, A.S. Wu, and K.A. Hua, ââ¬Å"Decision Tree Classifier for Network Intrusion Detection with GA- Based Feature Selection,â⬠Proc. 43rd ACM Southeast Regional Conf.ââ¬âVolume 2, Mar. 2005. [3] Schwartz, Matthew, ââ¬Å"Beyond Firewalls and IPS: Monitoring Network Behavior.â⬠February 2006, available on http://esj.com/articles/2006/02/07/beyond- Firewalls-and-ips-monitoring-networkbehavior.aspx [4] S. J. Yang, J. Holsopple, and M. Sudit, ââ¬Å"Evaluating Threat Assessment for Multi-stage Cyber Attacks,â⬠in Proceedings of IEEE MILCOM: 2nd IEEE Workshop on Situation Management (SIMA), Washington, DC, Oct 23-25, 2006 [5] Z. Yu and J. Tsai, ââ¬Å"An efficient intrusion detection system using a boosting-based learning algorithmâ⬠. International Journal of Computer Applications in Technology, Vol. 27 (4), 2007, 223-231. [6] Meera Gandhi, S.K.Srivatsa ââ¬Å"Detecting and preventing Attacks using network intrusion detection systemsâ⬠International Journal of Computer Science and Security, Volume (2) : Issue (1) June 2009 [7] Asmaa Shaker Ashoor, Prof. Sharad Gore, ââ¬Å"Intrusion Detection System (IDS) Intrusion Prevention System (IPS): Case Studyâ⬠. International Journal of Scientific Engineering Research Volume 2, Issue 7, July-2011 [8] Rosslin John Robles, Tai-hoon Kim,SeungLee,â⬠A Study on Intrusion Confinement for Internal Networkâ⬠, Journal of Security Engineering), vol.5issue no1, P73, 2008 [9] Patil, Nilima R.; Patil, Nitin N, â⬠A comparative study of network vulnerability analysis using attack graphâ⬠World Journal of Science Technology; 2012, Vol. 2 Issue 3, p91 *University of Jammu, e-mail id :[emailprotected] , **University of Jammu, email id: [emailprotected] 1
Wednesday, November 13, 2019
Essay on Diomedes, the True Hero of Homerââ¬â¢s Iliad -- Iliad essays
Diomedes, the True Hero of The Iliad In The Iliad, written in a 3rd person omniscient point of view, Homer gives a very serious account of the tenth and last year of the Trojan War.Ã It was in Homer's account that the very idea of becoming a legendary hero reached its pinnacle; the choice of the better hero was not decided on the events they participated in, but rather by their characteristics.Ã The ancient Greeks had strict criteria for individuals to follow if they were to be seen as heroes. Above all, a man needed to be a skilled warrior, but this was not the only requirement. To be a hero, a warrior had to respect authority, both governmental and religious. The Greeks gave heroes no room for pride. These men were to be modest, not only giving credit to their culture and the gods for any great deeds they had done, but also accepting everything that happened as Fate, not scenarios they had created for themselves. In other words, they did not make themselves what they were; rather, they had been predestined to be come it. The final requirement of being a hero was coolness. Heroes were not permitted to be blinded by rage or have mood swings. In The Iliad, two Greeks are presented to the reader as heroes. They are Achilles and Diomedes. Although they are both good contenders for the title of hero, Diomedes is by far the better of the two. Diomedes is one of the finest and bravest of the Greek warriors. He is respectful to all authority figures and has little or no pride. Always wise and reasonable, he may be the vision of the perfect nobleman. Both Achilles and Diomedes easily meet the first requirement, that a hero must have skill on the battlefield. Throughout The Iliad, Homer tells of their incredible (though usually go... ...kill in battle, respect for authority, humility, and coolness under fire. Not many men met all requirements, including Achilles, but they were still viewed as heroes. Between Achilles and Diomedes, Diomedes was the better choice for the title of hero. He was one of the finest Greek soldiers. Diomedes was respectful of authority, humble about his successes, and was very levelheaded. Achilles had great fighting skill as well; however, he had trouble respecting authority and keeping his cool, both results of his excessive pride. If Achilles had not been so prideful, he could have been a much greater warrior and hero, perhaps achieving status equal to the gods. He simply had too much pride. Diomedes was humble; therefore, it was easier for him to respect authority and keep a level head. Works Cited: Fagles, Robert, trans. The Iliad. New York: Penguin Books, 1990.
Subscribe to:
Posts (Atom)