Get help from the best in academic writing.

Houston Community College American Government Civil Rights Discussion

Houston Community College American Government Civil Rights Discussion.

Civil RightsPlease view and take notes on It’s a Free Country Video and/or Professor Patterson’s lecture on Civil Rights and read the Civil Rights chapter in the textbook. After doing so, answer the following questions:Explain the purpose and role of the 14th Amendment to the United States Constitution. How did this amendment change the relationship between the States and the Bill of Rights? What was the context of this amendment? And why is it so significant to equality for all?Discuss one additional action taken by the government to advance equality for all. Which branch was responsible for this advance?In order to receive credit, you are required to:Answer the questions in a discussion thread divided into paragraphs following the aforementioned questions.Penalties for not following this requirement will range from 5 to 10 points.Provide comprehensive answers by using the videos and the textbook as primary sources of information.Penalties for not using the textbook as the primary source of information will range from 5 to 20 pointsSubmit your main response in at least 250 words. Penalties for not following the length requirement for any response/reply will range from 5 to 30 points.Reply to at least three classmates in at least 70 words per reply.In your reply, identify something you had not previously been aware of or something which challenges you to think differently.Each reply will be worth five (5) points.Submit all discussion posts within the due date.No late submission will be allowed or graded unless it involves a documented emergency or accommodation.Avoid copy-and-paste and unnecessary quotations.Use paraphrasing instead of quoting.You should use a quote only when the same idea cannot be stated differently or when doing so would diminish its academic value. The latter is not applicable in our case and the former is rarely needed.Provide, when paraphrasing, in-text citations and references in the APA writing format.Penalties for not providing in-text citations and/or references will range from 10 to 40 points.
Houston Community College American Government Civil Rights Discussion

Less than two years ago the film studio Sony Pictures Entertainment experienced a cyber-attack, which affected the organization greatly. The hack happened in November 2014. The criminals informed the employees that they are “Guardians of Peace” (GOP), placing their name on the computer screens along with the picture of a skeleton. During this attack, a wide range of confidential information was stolen. It was claimed that all received data would be released if the company refuses to satisfy the request, which was not explained at that time and remained unknown. In the next month, GOP threatened the company and urged it to cancel the release of the film “The Interview”. GOP said its release would be the same as a terrorist attack. Sony accepted the demand and did not let the film run on the cinema screens but allowed the representatives of the general public to see this comedy about the intention to kill the leader of North Korea in theaters and online. Intelligence officials who worked on this case tried to find out who the members of GOP were and who sponsored their actions. The research showed that North Korea was involved, but the country denied its responsibility (Peterson, 2014). The media represents this cyber-crime as hacking. Mainly, it happens because GOP broke into the employees’ computers and received access to the personal information. However, it was not only found but also stolen, which proves that the group wanted to exploit the weaknesses of the system. It was also a theft of data with the intention of further release (in case of not meeting the request). Thus, from the very beginning, the purpose of GOP was to steal information. The target of the discussed cyber-crime was the film studio Sony Pictures Entertainment. GOP hacked its computers with the concrete desire to steal information about the employers, employees, and their families. They even informed the victims of the act of hacking for them to realize that it was more than an assessment of vulnerability. The group was paid to stop the release of the film that was made by Sony Pictures Entertainment, and no other organization could be addressed with the same demand. Thus, there were no doubts about GOP getting to the right target. The fact that GOP communicated their request to the employees of the company proves that hacking was committed in order to make Sony meet the demand. Except for that, the data were stolen to threaten the organization and make the request to cancel the release of “The Interview” even more critical. Thus, this firm was selected as a target, and its abolition was the only thing that could satisfy the demand. In particular, Sony made a film and was going to release it while GOP wanted to stop the process and hacked the company. Sony’s system was not efficient enough, which allowed the attack to be successful. Alvarez (2014) paid attention to the “security vulnerabilities in the service, particularly after Sony failed to act on multiple warnings from the culprits” (par. 3). Such opinion was supported by numerous professionals, including Sanchez (2015). It was stated that Sony had not paid enough attention to Internet security and left significant data hardly protected. Its firewalls and system of intrusion detection failed to work efficiently and effectively (Martin-Vegue, 2015). The attackers did not try to hide. They left their name – GOP – on the screens of Sony’s computers. Still, the only information initially available was that they were a group of hackers. However, it was found that they worked under the sponsorship of some individuals or organizations, but intelligence officials did not know who or what it was. The investigation showed the connection with the North Korean government, and the content of the film makes such opinion look well-grounded and decent (Peterson, 2014). Get your 100% original paper on any topic done in as little as 3 hours Learn More However, with the course of time, other versions were also developed. For example, Paganini (2015) reported that at the beginning of 2015 Russian hackers claimed that the attack was made by them. As North Korea does not admit their responsibility, and no authoritative evidence regarding Russia exists, the issue remains unsolved. The fact that Sony experienced the cyber-attack and its confidential information were disclosed affected the organization adversely. First of all, it had to meet GOP’s demand and alter the designed plan of action regarding the film. It dealt with the negative impact on workers’ and clients’ perceptions of the company. It had to restore the brand and re-attract customers. The organization had to implement changes in the security system. It was supposed to assess the situation and cope with vulnerabilities. Sony had to be able to prove its efficiency and security after the attack always because workers, clients, and suppliers would not be likely to cooperate with the organization that could not ensure the safety of the important information. The company needed to find a practice in which it exceeded the competitors to prove that it was still not only good enough to remain in the market but also was one of the leaders in the industry. Sanchez (2015) believes that the attack could have been prevented if Sony implemented Critical Controls that provide an opportunity to reduce such risks. The organization should have conducted Gap Assessment to see its vulnerabilities and then select and implement specific controls. The attention should have been paid to data protection and encryption, wiper malware, use of administrative privileges and audit logs, and implementation of secure network engineering. References Alvarez, E. (2014). Sony Pictures hack the whole story. Web. Martin-Vegue, T. (2015). The Sony Pictures Entertainment hack: Lessons for business leaders. Web. Paganini, P. (2015). Sony Pictures hacked by Russian blackhats, it now emerges. Web. We will write a custom Assessment on Cyber Attack: “Guardians of Peace” specifically for you! Get your first paper with 15% OFF Learn More Peterson, A. (2014). The Sony Pictures hack explained. Web. Sanchez, G. (2015). Case study: Critical controls that Sony should have implemented. Web.

Savannah State University The New Ideal Polis Political Science Question

Savannah State University The New Ideal Polis Political Science Question.

I’m working on a political science project and need support to help me study.

Assignment is due on the 5th of Jun at 11:59Chapter 5, 6, and 7 examine the arguments of some of the great political philosophers of the Western world. Specifically, these philosophers focus on issues of “the good political life.” The philosophers examine ideas like, what should the “good” political system look like? What solutions they offer to ensure the “good political life?” Other scholars like Hobbes and Locke focused on “the social contract.” Or Marx focused on the necessity of overthrowing captialism in exchange for a supposed communist utopia. (Log in information to use the book will be provided after agreeing on the price) The ancient Greek philosophers focused largely on the “polis,” i.e. a Greek city state, or a body of citizens with shared political institutions. That being said, your political community can exist in any time you chose. Students will compose a brief (3 double-spaced pages) essay describing your ideal political state or polis. Relying on your understanding of political science generally, and political philosophy specifically, creatively integrate the following ideas into your response. BE SURE TO CITE EXAMPLES, ETC. FROM THE TEXT!Create a name for your polis.What political ideology would best shape your polis?Describe at least two core values that would guide the polis.Who holds political power? Why?What ideal characteristics would your political leaders have?How would power relationships be structured? How is the structure enforced? Think “games.”Describe here would your polis lie on a spectrum of Equality v. Liberty, and Order v. FreedomWhat role would justice and/or morality play in your society? What would justice and morality look like?Again, be creative! There is no right or wrong. You can design a totalitarian, utopian, fascist, communist, democratic, republic, etc. You may choose any system of government you like, but be sure to integrate references to the readings, lectures, etc.
Savannah State University The New Ideal Polis Political Science Question

Comparing Old And New Technologies And Their Impact On The World Business Essay

python assignment help Comparing Old And New Technologies And Their Impact On The World Business Essay. Technology is a broad concept that deals with human as well as other animal species usage and knowledge of tools and crafts, and how it affects a species ability to control and adapt to its environment. [1] Technological change has become the driving force of innovation, productivity, growth and development of the economy.[1] Technology is all about using the technical and scientific knowledge we have to help solve problems (or) to make life better. Now a day’s technology that is already available and being used for example the internet, mobile phones and computers (or) you can also develop new technology. Developing new technology may be more difficult to do, but if you have an idea for this and it can be used to make public services also. [1] Examples to compare the Old and New technology: Laser printers vs. inkjet printers, landline services vs. cell phones etc. Our study analyzes industry equilibrium in a model with an incumbent and an entrant that have heterogeneous product offering capabilities: the incumbent can offer either or both types of products, while the entrant can only offer new products. Firms make capacity, pricing, or quantity decisions that maximize their ex-ante profit. Within this framework, we analyze deterministic games with perfect information and stochastic games with uncertain valuation of the disruptive technology.[2] New technology separates into two types: Sustaining technology Disruptive technology Sustaining Technology: Sustaining technologies tend to maintain a rate of improvement; that is, they give customers something more (or) better in the attributes they already value. It also relies on incremental improvements to an already established technology.[2] Disruptive technology: Disruptive technology means a new technology that unexpectedly displaces an established technology and lacks refinement and performance problem because it’s new technology.[3] A new technology that has a serious impact on the status quo and changes the way people have been dealing with something. The most disruptive technologies in history have been the telephone, computer and the Internet. [3] First, disruptive products are simpler and cheaper; they generally promise lower margins, not greater profits. Second, disruptive technologies typically are first commercialized in emerging or insignificant markets. And third, leading firms’ most profitable customers generally don’t want, and indeed initially can’t use, products based on disruptive technologies.[3] Theory: New technology which radically changes the way things have been done in the past is commonly referred to as ‘disruptive technology’. Whilst disruption has negative connotations, if understood and evaluated early on, such innovations can also provide tremendous breakthrough opportunities to invest in paradigm shifting technology, to drive growth and the Establishment a powerful future position.[4] Disruptive technology and disruptive innovation are terms used in business and technology literature to describe innovation that improve a product or service in ways that the market does not expect, typically by being lower priced or designed for a different set of consumers.[4] Disruptive innovations can be broadly classified into low-end and new-market disruptive innovations. A new-market disruptive innovation is often aimed at non-consumption, [4] whereas a lower-end disruptive innovation is aimed at mainstream customers for whom price is more important than quality.[4] Disruptive technologies are particularly threatening to the leaders of an existing market, because they are competition coming from an unexpected direction. A disruptive technology can come to dominate an existing market by either filling a role in a new market that the older technology could not fill or by successively moving up-market through performance improvements until finally displacing the market incumbents.[4] Disruptive technology Introduce a very different package of attributes from the one mainstream customer historically value, and they often perform far worse along one or two dimensions that are particularly important to those customers. As a rule, mainstream customers are unwilling to use a disruptive product in applications they know and understand. At first, then, disruptive technologies tend to be used and valued only in new markets or new applications; in fact, they generally make possible the emergence of new markets.[4] In general, old products based on sustaining technology are perceived to be superior to the new ones based on disruptive technology. However, the latter have distinctive features that allow them to attract an exclusive set of customers.[4] Examples: 1. UPS is example of how new technologies can help a company to improve its operating performance. However it is using advanced technology to improve the way it operates its primary business and to leverage those skills and infrastructure to move into other related lines of business. UPS has developed software applications and mobile devices with the support of wireless networks for shipping and tracking services. Its software applications work on a common platform with a single database, enabling it to optimise the route and load plans faster in order to surpass its competitors. [5] UPS software applications generate reports for managers that allow them to better plan and control the delivery routes. Better planning and route control result in time saving and more efficient use of resources. 2. A team of robotics engineers have developed a system that makes pneumatic artificial muscles much quieter than those used in labs today.[6] Annoying noise produced by air pumps or electric motors in human-like robots is among the factors hampering their entry into consumer market. Researchers at the University of Nevada in Reno came up with an idea how to make artificial muscles work silently.[6] Instead of an air compressor the pressure is supplied by a sealed capsule with a metal hydride powder. The material can absorb and release large amounts hydrogen gas if heated and cooled down. The property makes them of much interest for hydrogen motor researchers, since safe storage of the explosive gas is one of the biggest challenges for the industry.[6] These are the examples for the Impact of Disruptive Technologies for Technology Businesses. Disruptive technology is significantly cheaper than current and is much higher performing, greater functionality and more convenient to use.[7] Disruptive technologies are scientific discoveries that break through the usual product (or) technology capabilities and provide a basis for new competitive paradigm Discontinuous innovations are products, processes, and services that provide exponential improvements in the value received by the customer much in the same vein. The definitions used by different authors to describe the business strategy focus they used to define disruptive technologies. These definitions are classified by a number of business strategy parameters used to describe disruptive technologies.[7] Disruptive technologies and discontinuous innovations present a unique challenge and opportunity for RComparing Old And New Technologies And Their Impact On The World Business Essay

De Anza College Social and Gender Hierarchies in the Neolithic Societies Questions

De Anza College Social and Gender Hierarchies in the Neolithic Societies Questions.

Directions: Each answer must be at least 200 words. DO NOT use any other sources, as I have linked your submissions to turnitin.com.Please do not copy books or websites, please summarize in your own words. It need submissions to Turnitin.com.Q1:How did social and gender hierarchies develop and how did this affect Neolithic societies? Do you see any similarities in present-day issues? Q2: Extra Credit: What would my personal law code be called? (A few words)Note:Please, Think about “How, When, Who, What happen” more detailsThere are have Sample question in Word.Please log in :https://macmillan.vitalsource.com/#/user/signin Chapter 1: The Earliest Human Societies to 2500 BCE Neolithic Society (ca. 9000 BCE) Social Hierarchies and Slavery Gender Hierarchies and Inheritance Trade and Cross-Cultural ConnectionsChapter 2: The Rise of the State in Southwest Asian and the Nile Valley Writing, Cities, and States Written Sources from the Human Past Cities and the Idea of Civilization The Rise of States, Laws and Social Hierarchies Mesopotamia from Sumer to Babylon Environmental Challenges, Irrigation, and Religion Sumerian Politics and Society Writing, Mathematics, and Poetry Empires in Mesopotamia
De Anza College Social and Gender Hierarchies in the Neolithic Societies Questions

University of the Cumberlands Week 15 Change Initiative Part One and Two Papers

University of the Cumberlands Week 15 Change Initiative Part One and Two Papers.

You should use fully developed paragraphs and include supporting references related to course concepts and your personal change initiative (where appropriate). The paper should be formatted following APA 7 professional style guidelines, including a title page, proper spacing and headings, citations, and references. An abstract is optional for this submission. Your final product for Week 3 should have at a minimum, five paragraphs providing thorough assessment and reflection.
Assignment is in 2 part, 
Part 1: 
Describe your change initiative (Minimum of two page)
Provide an overview of the change initiative by addressing, at minimum, the following areas.

Geographic setting (include information about where the institution or organization is located, its culture, and demographic characteristics)
The organizational mission
What prompted the change initiative(s)?
Who initiated the change?
What was the goal of the change?

Course Topics (Minimum of one page and minimum of one paragraph per topic)

Assess at least three topics covered in this course and relate them to your change initiative.
It is not necessary to include every course topic in your paper–only those that are most relevant.

Conclusion (Minimum of one paragraph)

Summarize the initiative and reflect on the outcomes, both positive and negative.
If you are reflecting on a current initiative, reflect on the current status and your predictions.

University of the Cumberlands Week 15 Change Initiative Part One and Two Papers