Tuesday, December 24, 2019
Mahatma Gandhi The Hero Of The Indian Independence Struggle
Mahatma Gandhi, the hero of the Indian Independence struggle, was the architect of a form of non-violent civil disobedience that would influence the world. Mahatma Gandhi studied both law and religion and advocated for the civil rights of Indians, both at home under British rule and in South Africa. Gandhi became a leader of Indiaââ¬â¢s independence movement, organizing boycotts against British institutions in peaceful forms of civil disobedience Born on October 2, 1869, in Porbandar, India, Gandhi grew up worshiping the Hindu god Vishnu and following Jainism - a morally rigorous ancient Indian religion that supported non-violence, fasting, meditation and vegetarianism. In 1888 Gandhi sailed for London, England to study law. While in London he struggled with the transition to Western culture, and he started to read a variety of sacred texts to learn more about world religions. He returned to India in 1891 and practiced as a lawyer. In 1893, he sailed to Durban, South Africa to practice law. When Gandhi arrived in South Africa, he was quickly taken aback by the discrimination and racial segregation Indian immigrants had to face at the hands of white British and Boer authorities. This unjust treatment that the colored people received caused him to become determined to devoting himself to fighting the ââ¬Å"deep disease of color prejudice.â⬠From that time onwards, Gandhi would grow into a giant force for civil rights. Gandhi continued to study world religions during his years in SouthShow MoreRelatedEssay on The Life of Mahatma Gandhi695 Words à |à 3 PagesAs a child, Mahatma Gandhi (October 2nd, 1869 ââ¬â January 30th, 1948) he was a shy, quiet boy and considered an average student. He did not show any exceptional qualities, but that made the world that much more intrigued when he became the one of the worldââ¬â¢s most respected religious figures. Like the rest of us, Gandhi wasnââ¬â¢t perfect. He experimented with smoking, stealing and eating foods such as meat that were frowned upon in his religious upbringing. By the age of 13, he married his wife KasturbaRead MoreProfile Of A Positive Leader1124 Words à |à 5 PagesProfile of a Positive Leader ââ¬â Mahatma Gandhi Mohandas Karamchand Gandhi, addressed as ââ¬ËBapuââ¬â¢ or ââ¬Ëthe father of the nationââ¬â¢ in India, was born on 2nd October 1869 in Porbandar district, in the state of Gujarat. He is known to be one of the most influential leaders in the history. As a child, Gandhi was very curious and intelligent. As a result, he was accepted to study at the University College London where he successfully completed his degree in law and became a barrister. He then returned to IndiaRead MoreGandhi was an admired social and political reformer worldwide535 Words à |à 3 Pages Mahatma Gandhi was many things. He was a son, a husband, a lawyer, but he was admired worldwide as a great social reformer, political leader, and thinker. Through a unique method of nonviolence, he won civic rights and eventually independence for Indiaamp;#8217;s people. Mahatma was born Mohandas K. Gandhi in 1869 in Porbandar, India. He lived there until 1888, when he left to study law at University College in London. In 1891, after having been admitted to the British bar, Gandhi returned toRead MoreMohandas Gandhis Struggl for Indiaââ¬â¢s Independence Essay1571 Words à |à 7 Pageshis lifetime, Mohandas Gandhi with great patience struggled for the goal of Indiaââ¬â¢s independence (Mohandas Gandhi. ABC-CLIO). The world widely celebrates him because of his enormous efforts towards the goal with perseverance and dedication (Wakin, Eric. ââ¬Å"Gandhi, Mohandas K.â⬠). Though he faced huge penalties, he did not lost perseverance but he constantly campaigned against the powerful whites (Wakin, Eric. ââ¬Å"Gandhi, Mohandas K.â⬠). As he strongly supported nonviolence, Gandhi campaigned to ââ¬Å"convinceRead MoreMahatma Gandhi1029 Words à |à 5 PagesMahatma GandhiMohandas Karamchand Gandhi (Gujarati: à ª ®Ã «â¹Ã ª ¹Ã ª ¨Ã ª ¦Ã ª ¾Ã ª ¸ à ªâ¢Ã ª °Ã ª ®Ã ªÅ¡Ã ªâà ª ¦ à ªâ"à ª ¾Ã ªâà ª §Ã «â¬, pronounced [moà à ¦Ãâ¢nà ªdà ªaà s kÃâ¢rÃâ¢mà ¨Ãâ¢nà ªdà ª à ¡aà nà ªdà ªÃ ±ià ] ( listen); 2 October 1869 ââ¬â 30 January 1948) was the pre-eminent political and spiritual leader of India during the Indian independence movement. He pioneered satyagrahaââ¬âresistance to tyranny through mass civil disobedience, a philosophy firmly founded upon ahimsa, or total nonviolence, which helped India to gain independence, and inspired movements for civil rights and freedomRead MoreMahatma Gandhi : The First War Of Indian Independence1096 Words à |à 5 PagesMahatma Gandhi was one with the greatest soul who was a freedom fighter, father of the nation and he was called ââ¬ËBapuââ¬â¢ in the India. He took India to a totally new level by employing movements like non-violence, civil disobedience and civil rights during Indiaââ¬â¢s freedom struggle with the British. He was fasting for purification, and respect for all religions. The British government rule in India under crown rule, ending a century of control of the East India Company. The life and death struggleRead MoreMahatma Gandhi : A Leader Of India s Independence Movement1230 Words à |à 5 PagesMahatma Gandhi was a primary leader of Indiaââ¬â¢s independence movement and also the architect of a form of non-violent civil disobedience that influenced the world. Mahatma Gandhi was born on October 2nd, 1869 in Porbandar, Kathiawar, India, which was then apart of the British Empire. He was assassinated on January 30, 1948. His father, Karamchand Ghandi served as a chief minister and his mother Putlibai was deeply religious. Gandhi grew up worshipping the Hindu god Vishnu and followed Jainism, aRead More Gandhiââ¬â¢s Key Concepts of Passive Resistance, Non-violence, and Self-rule1344 Words à |à 6 PagesMohandas Karamchand Gandhi- 2 October 1869 - 30 January 194 was the pre-eminent political and spiritual leader of India during the Indian independence movement. He is also known as Mahatma which means ââ¬Å"The Great Soulâ⬠. He was committed to pac ifism, that there should be no violence.(1) He had three concepts to follow in his life for independence of India: Satyagraha, Ahimsa and Swaraj. Gandhi introduced the concept of ââ¬Å"Satyagrahaâ⬠that means ââ¬Å"passive resistanceâ⬠. This passive resistance also meansRead More Defining a Hero Essay2179 Words à |à 9 Pagesthe world today, a hero is someone distinguished by exceptional courage, nobility, or strength; but really, anyone can be a hero. A hero can vary from someone as well-known as George Washington to someone as unheard of as anyoneââ¬â¢s very own mother. Someone who has done a good deed for someone else is hero. The biggest heroes are the ones in well-known books and plays, such as Odysseus from The Odyssey, or have made a huge difference in the history of this world, like Mahatma Gandhi. Siddhartha GautamaRead MoreWho Is The Leader Of The Indian National Congress?1507 Words à |à 7 Pages At first glance, these two historical figures could not seem more distant. Mohandas Gandhi campaigned a universal and tolerant version of religion and upheld these beliefs through his political movement. In contrast, Osama bin Laden has been credited for creating an antagonistic and combative interpretation of traditional Islam that led to some of the most gruesome acts of terror observed in the twenty first century. Although both of their ideals stand on opposite ends of the spectrum, they
Monday, December 16, 2019
Astronomy in the Medieval Islamic World Free Essays
The religious practice of Islam is oriented in a fixed time and space. The faithful will pray in the direction of the Kaââ¬â¢ba five times a day, but how did astronomy take part in determining this? The Islamic calendar says that the day begins at sunset and the five prayers start from that time. Adjusting times for prayer grew out of observing the heavens, a practice known since the ancient Egyptians and Babylonians. We will write a custom essay sample on Astronomy in the Medieval Islamic World or any similar topic only for you Order Now The Arabs, for centuries, studied the sky and examined the groups of stars and phases of the moon on their long desert travels. This education of space was adapted and developed to conform to the practice of Islam. During the medieval period of the Islamic world, the science of astrology as a branch from astronomy was translated by the Greeks into Arabic, along with Sasanian, Indian and ancient Egyptian influences, allowing more scientific and mathematical development by mathematicians and scientists of the Arab world. The subject came to be a very popular one, as it was taken interest in by scholars such as Abu Maââ¬â¢shar al-Balkhi, al-Biruni, and Nasir al-Din al-Tusi. There is evidence of this topic being widespread throughout the Islamic world, such as manuscripts and astrological records found in al-Fustat in Egypt. Since there has proven to be much scientific evidence and involvement in the study of the stars and planets, how did this outbreak of information in the Islamic world affect Islamic Art? And why was it so significant? There is much architecture, objects and textiles from the Islamic World that express the significance of this topic, such as Qasr al-Amra in Jordan, built by Umayyad caliph Walid II in the early 8th century, which features a frescoed caldarium ceiling depicting the twelve Zodiac constellations. The exterior of the construction is very minimal; the only ornamentation being small domes and triple arches. Otherwise, the ornamentation becomes servant to the architecture. The techniques that were contributed into constructing Qasr al-Amra references the Roman and Byzantine techniques: predominately limestone and terracotta brick, along with other types of stones. The frescoed ceilings in the caldarium, or the hot plunge bath, is said to be the earliest depiction of the stars painted on a domed surface. It features 35 recognizable constellations along with, as mentioned previously, twelve zodiacs. There has been reported to be one mistake: the order of the stars in the counterclockwise direction, which tells that it is possible that the fresco was copied from a flat surface. This fresco, however, is not the only one in Qasr al-Amra: there were many brilliant murals in several of the other chambers that suggest that the caliphs of this ââ¬Å"pleasure palaceâ⬠lived a luxurious lifestyle. This luxury tells of an involvement in. The use of imagery in relation to astrology began in the twelfth century, and eventually taken in for its visual decorative quality, by the Ghaznavids and the Seljuqs among others, and they adopted it with their own meanings and influences. The bowl (figure 1) from central or northern Iran in the late 12th century depicts figures very close to those of the Kashan. The bright hues lend it a quality similar to Persian miniatures. There is Kufic inscriptions around the rim of the bowl as well as naskh script on the secondary intermediary space but the focal point is the sun-shaped face in the center, with a classical depiction of the planets surrounding it. How to cite Astronomy in the Medieval Islamic World, Papers
Saturday, December 7, 2019
Cloud Computing for Internet Services- myassignmenthelp.com
Question: Discuss about theCloud Computing for Internet Services and Applications. Answer: The various risks that are evident due to the migration of the database, IaaS infrastructure and the communication of the company are discussed in this portion. Risks in database: The various cloud related risks that are evident due to the migration of the database is discussed in this portion. In case of cloud feature installations, the various applications installed in the system will need to be installed in the cloud architecture. In some cases, these applications may show license problems. In cases like this, the business operations will be affected due to the license risks. In addition, as the cloud features are being provided by the cloud vendors, the organization needs to comply with their requirements (Garrison, Kim Wakefield, 2012). Any changes to the system are to be done after contacting with these vendors. This reduces the transparency of the system with respect to the organization involved. Risks in IaaS infrastructure: The main risks to the IaaS infrastructures due to the migration of the database are discussed in this section. The main risks are the misconfiguration, shadow-IT and vulnerabilities. The first risk to be discussed is the misconfiguration in the infrastructure. The presence of existing problems in the system is to be referenced to fight these vulnerabilities. For addressing such requirements, the scanning of the whole system is to be referenced. This includes the scan of the whole system by using the IaaS APIs. These are used to scan the whole database. These data are used to compare with the existing templates of the API scanning (Garrison, Kim Wakefield, 2012). These templates are complied with the universal standards. The data are then to be applied for addressing the risks in the infrastructure. In addition, the presence of monitoring features to scan the status of the system is also to be done for detecting any errors present in the system. Vulnerability is another risk that is present in the infrastructure. This is to be addressed by not only the vendors of the cloud solutions but also the organization. The main process to be involved is the installation of applications for automated scanning procedures and workload security management. The last risk in the infrastructure is the presence of shadow-IT features (Jadeja Modi, 2012). This mainly consists of ghost servers, dormant storages and orphan storage. The ghost server generally means the presence of servers which can still perform efficiently. However, these servers are unused for a long time. Similarly, the orphan servers are the presence of those servers that are also not used for a long time and are not in good conditions with respect to operations. Moreover, when servers are replaced by the new ones, they remain in the infrastructures. These are the dormant resources. All these poses great risks to the organizations as these storages still consist of data. These can be used to get access to these data unethically. Risks in communication between the organization and database: The main risks in the communications among the organization and the cloud vendor are the concerns in privacy and availability of data. As the organization needs to update the vendor regarding any organizational changes, the vendor will have access to all the data of the organization. This raises a security and privacy concern as the organization concerned may not have ease of mind in doing businesses (Hashizume et al., 2013). This also provides an ethical risks if the cloud vendor unethically analyses their data. The presence of internet access is a requirement in cloud architecture. As the information to be updated in the cloud infrastructure can only be done by the presence of internet, the risks due to such requirements is great. In case an organization is facing threats in the system, they need to close the cloud application to mitigate the threats. In case of internet absence, the organization will not be able to access the system which will lead to grave impacts in the system. This section is concerned with the application of the access protection features in different parameters of the cloud solutions. IaaS infrastructure: The access to the IaaS infrastructure can only be provided by utilizing the four different parameters. These include the internet access, physical access, APIs and web console. The physical access is provided by the cloud vendors. The organization needs to review the security features and protocols followed by the cloud vendors. Any problems in their security can lead to the business failure as well (Jadeja Modi, 2012). Internet access can be secured by the application of various cloud related solutions. These include the applications of tighter security measures. The most commercially available solutions are the one provided by Cloud Sigma. The main aim of these solutions is the implementation of firewall setups that could be used for neglecting access by third-parties. In case of the APIs and web-console, tighter security can be applied by the adoption of security protocols. Ms SQL Server 2012 R2 cloud instance: The presence of user privileged access to the instance of the server is to be emphasized for the IaaS cloud consumers corporate network. This can be done by the application of access protocols like SSHv2 or TLS/SSL. The main emphasis of these uses will be based on the use of multi-factor authentication. In addition, the use of public key certificate is also to be emphasized for addressing these requirements. Cloud infrastructure: The access to the cloud infrastructure by using the browser is to be minimized. The main reason is that they are prone to injection attacks. In addition, the presence of security tools is also needed in the VMs to reduce the possibilities of back door intrusion and information leak (Jadeja Modi, 2012). Furthermore, the antivirus programs must also be used for removing the malwares from the system. Cloud backup and restore: The organization needs to review the security features and protocols followed by the cloud vendors. Any problems in their security can lead to the business failure as well. This requires the need for encrypting the data to be backed up (Khan et al., 2013). In such cases the data will not be easily accessed. Furthermore, the presence of offline storage of the decrypting key is also required. References: Garrison, G., Kim, S., Wakefield, R. L. (2012). Success factors for deploying cloud computing.Communications of the ACM,55(9), 62-68. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Jadeja, Y., Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on(pp. 877-880). IEEE. Jula, A., Sundararajan, E., Othman, Z. (2014). Cloud computing service composition: A systematic literature review.Expert Systems with Applications,41(8), 3809-3824. Kavis, M. J. (2014).Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley Sons. Khan, A. N., Kiah, M. M., Khan, S. U., Madani, S. A. (2013). Towards secure mobile cloud computing: A survey.Future Generation Computer Systems,29(5), 1278-1299. Kumar, S., Goudar, R. H. (2012). Cloud Computing-Research Issues, Challenges, Architecture, Platforms and Applications: A Survey.International Journal of Future Computer and Communication,1(4), 356. Li, J., Qiu, M., Ming, Z., Quan, G., Qin, X., Gu, Z. (2012). Online optimization for scheduling preemptable tasks on IaaS cloud systems.Journal of Parallel and Distributed Computing,72(5), 666-677.
Subscribe to:
Posts (Atom)