Saturday, November 9, 2019
Augustus Ceasar essays
Augustus Ceasar essays Two of the most destructive problems facing the late Roman Republic were the instability and disunity caused by incessant civil wars. Rome's rapid expansion, after the Punic Wars, resulted in socioeconomic changes that permanently divided the state. Both aristocratic and plebeian parties sought total control of Rome and tried to destroy each other. Civil war was the continuation of party politics by other means. Consequently, the power of the military became supreme. Control of Rome's armies steadily shifted away from the legitimate government to the generals because the soldiers began to give their allegiance to their generals rather than to the civil authorities. On dismissal from military service, the legionnaires had no farms to return to, and they depended entirely on whatever land and money their generals could provide since the government was unwilling or unable to supply veterans with livelihoods. Thus, the generals became autonomous centers of power. The general who dominate d the strongest army ruled the state. Repeated power struggles of these military strongmen ignited more civil wars that further undermined the stability and unity of the late Roman Republic. Augustus saw how divisive to the Roman polity civil war was. He understood that control of the legions by the civil government was necessary for the establishment of peace and order throughout the Roman Empire. He wanted to reorganize and institute changes in the military to assure that it would not rise again in support of some triumphant general to challenge the legitimacy of the state. Since warfare within the Empire was eliminated, the role of the legions changed. Its main objectives consisted in protecting the borders from foreign foes and pacifying conquered lands through the gradual introduction of the Roman language, law, administration, and engineering. Augustus' priority was to reduce the number of the legions from 60 to 28, settling in the process more than 1...
Wednesday, November 6, 2019
Spanish Verbs That Mean To Take
Spanish Verbs That Mean To Take Take is one of those English words that is all but impossible to translate to Spanish without some context. As can be seen in the list below, take has dozens of meanings - so it cant be translated with a single Spanish verb or even a handful of them. Although you always should translate to Spanish based on meaning rather than word-for-word, thats especially true with take. Meanings and Spanish Translations for To Take Here are some common uses (though certainly not all) of the verb to take in English along with possible translations to Spanish. Of course, the Spanish verbs listed arent the only ones available, and the choice you make will often depend on the context in which it is used. to take to get possession of - tomar - Tomà ³ el libro y fue a la biblioteca. (He took the book and went to the library.)to take to transport (something) and give possession to someone else - llevar - Le llevo las manzanas a Susana. (Im taking the apples to Susana.)to take to transport (a person) - llevar - Llevà ³ a Susana al aeropuerto. (She took Susana to the airport.)to take to remove, to pick - coger - Cogieron las manzanas del rbol. (They took the apples off the tree.)to take to snatch (from someone) - arrebatar - à ¿Te arrebatà ³ el sombrero? (Did he take your hat?)to take to steal - robar, quitar - A Susana le robaron mucho dinero. (They took a lot of money from Susana.)to take to accept - aceptar - à ¿Aceptan los cheques? (Do they take checks?)to take to subscribe to (a newspaper or magazine) - suscribirse, abonarse - Me suscribo al Wall Street Journal. (I take the Wall Street Journal.)to take to hold - coger - Dà ©jeme que le coja el sombrer o. Let me take your hat.)to take to travel by - coger, tomar, ir en - Tomarà © el autobà ºs. (I will take the bus.) to take to require - necesitar, requerir, llevar - Necesita mucho coraje. (It takes a lot of courage.)to take to require or wear (a certain size or type of clothing) - calzar (said of shoes), usar (said of clothing) - Calzo los de tamaà ±o 12. (I take size 12 shoes.)to take to last, to use time - durar - No durar mucho.à (It wont take long.)to take to study - estudiar - Estudio la sicologà a. (Im taking psychology.)to take a bath (shower) - baà ±arse (ducharse) - No me baà ±o los lunes. (I dont take baths on Mondays.)to take a break, to take a rest - tomarse un descanso - Vamos a tomarnos un descanso a las dos. (Were going to take a break at 2.)to take after to chase, to go after - perseguir - El policà a persiguià ³ el ladrà ³n. (The policeman took after the thief.)to take after to resemble - parecerse - Marà a se parece a su madre.à (Marà a takes after her mother.)to take apart - desmontar - Desmontà ³ el carro. (She took the car apart.)to take away, to take from, to take off to remove - quitar - Les quitaron el sombrero. (They took their hats off.) to take away, to take off to subtract - sustraer, restar - Va a sustraer dos euros de la cuenta. (He is going to take two euros off the bill.)to take back to return - devolver - No le he devuelto el coche.à (I havent taken back the car to him.)to take cover - esconderse, ocultarse - Se escondià ³ de la policà a. (He took cover from the police.)to take down to dismantle - desmontar - Desmontaron la valla publicitaria.à (They took the billboard down.)to take an exam or test - presentar un examen, presentarse a un examen - El otro dà a me presentà © a un examen.à (The other day I took a test.)to take down, to take notes - anotar, escribir, tomar apuntes - Quiero que escriba la informacià ³n.à (I want you to take down the information.)to take (someone) for - tomar por - Ud. no me tomarà a por un chef. (You wouldnt take me for a chef.)to take in to deceive - engaà ±ar - Me engaà ±Ã © por el farsante.à (I was taken in by a liar.)to take in to und erstand - comprender - No pudo comprenderlo. (He couldnt take it in.) to take in to include - incluir, abarcar - El parque incluye dos lagos.à (The park takes in two lakes.)to take in to provide lodging for - acoger - Mi madre acoge a muchos gatos. (My mother takes in many cats.)to take off to go away - irse - Se fue como un murcià ©lago. (He took off like a bat.)to take off weight - adelgazar - Adelgaza por la actividad fà sica. (He is taking off weight through physical activity.)to take on to accept or assume (responsibilities) - aceptar, asumir - No puedo aceptar la responsabilidad. (I cant accept the responsibility.)to take on to employ - emplear, coger - Empleamos dos trabajadores. (We took on two workers.)to take out to removeà - sacarà - El dentista me sacà ³ una muela. (The dentist took out a molar of mine.)to take ones word for it - creer - No voy a creerte.à (Im not going to take your word for it.)to take over to assume operations - absorber, adquirir, apoderarse - El gobierno se apoderà ³ el ferrocarril. à (The government took over the railroad.) to take a picture - tomar una foto, hacer una foto - Tomà © tres fotos. (I took three pictures.)to take pity on - compadecerse de - Me compadecà © los pobres. (I took pity on the poor people.)to take prisoner - capturar, tomar priso - El policà a le capturà ³ el ladrà ³n. (The policeman took the thief prisoner.)to take up to begin - dedicarse a - Se dedicà ³ a nadar. (She took up swimming.)to take a walk - dar un paseo - Voy a dar un paseo. (Im going to go for a walk.) Use Caution With Coger Although coger is an entirely innocent and ordinary word in some regions, in other regions it can have an obscene meaning - take care when using this term.
Monday, November 4, 2019
Strategic Management Case Study Example | Topics and Well Written Essays - 2250 words - 1
Strategic Management - Case Study Example The marketing projection is done by taking into consideration the entire products of Fujifilm and its market growth in the past years. The operational estimation is conducted by considering the set marketing plan. The outer and inner environment of the company and the competitorsââ¬â¢ strength, as well as weakness, facilitates to estimate the operational prediction. The financial analysis is done by examining the marketing and operations of the company and their performance along with income statement of the previous years. The paper also covers the process of implementation of major objectives in order to achieve success. Finally, the paper is completed with a brief conclusion. The sales projection relates to the estimation of potential sales of a company at a certain time period. The sales projection of Fujifilmââ¬â¢s products and services can be prepared for the coming five years. The marketing projection of Fujifilm for successive five years from the present scenario is based on several factors. There may be external or internal factors that affect sales projection (Sane Jose State University, ââ¬Å"Process for Sales Projectionâ⬠). The marketing and sales of the product of Fujifilm have helped to increase its market share and proper planning will enhance its growth in the coming years. The various factors that are responsible for Fujifilmââ¬â¢s future projection are seasonability aspect prevalent in business, comparative situation of the economy, fashions of new products, changing population and productivity, income of consumer, present market share, innovative product lines, inventory shortage, recent trend in sales and price changes among others (Sane Jose State University, ââ¬Å"Process for Sales Projectionâ⬠). The various marketing products of Fujifilm are ââ¬Ëelectronics productsââ¬â¢, ââ¬Ëhighly functional materialsââ¬â¢, ââ¬Ëmedical imagingââ¬â¢, ââ¬Ëlife scienceââ¬â¢, ââ¬Ëgraphic artsââ¬â¢, ââ¬Ëoptical devicesââ¬â¢ and ââ¬Ëdocumentsââ¬â¢. These products are expanding globally and are in huge demand in the market. To maintain its demand in future, the company needs to develop various marketing techniques. The market share of LCD FUJITAC in a global market is 80% and for WV film it acquires 100%.
Saturday, November 2, 2019
Interaction Analysis Essay Example | Topics and Well Written Essays - 1250 words
Interaction Analysis - Essay Example Although it was short, a brief introduction of his cultural background was established. The actual meeting had begun with a brief prayer outside the house, which was interpreted as a religious ritual to welcome a special guest in the house. The Jordan region is mainly inhabited by Muslims with a distinct Arabic origin. A great percentage of the population upholds Islamic values and Mohammed is not an exception. As a Christian, I had to respect this religious and cultural situation and consent to the prayer although my religion does not agree with some aspects of Islam. This is an example of the behavioral code that is expected when interacting with people from different cultures. The meals session was a great experience and a great opportunity to understand the cultural values by observing the non-verbal codes. Particularly, this was an opportunity to understand the culture by observing the eating habits, type of food, and the overall family involvement during mealtime. Our meal was a reflection of the Arabian-Jordan dining culture. Halloumi, a pita-style bread sandwich was served with grilled meat marinate and fresh vegetables as the main course. This type of food is an identity of the Jordan community and a lot can be learned about the culture by just looking at the food. According to Mohammed, mealtimes are respected and, therefore, people should not talk during mealtime. However, the best time for verbal communication and interaction came immediately after the meals. We shared a debate and a discussion about different cultural values that Mohammed upholds. Certainly, he values religion and it seems that his culture is deeply entrenched into the Islam. This is one of the most important sessions since I got a chance to compare and contrast his cultural values and mine. For instance, I observed that religion has a great influence on his morals, since they are founded on Islam. However, this contrasted with my cultural background, whereby, my religion has nothi ng to do with my cultural background. Indeed, the two are very different. My cultural background does not stem from religion, but rather, encompasses religion as an important aspect of life. Nevertheless, we still uphold similar family values and beliefs. Although there are very big differences in the societal roles especially for women, the roles within the family remain relatively the same for both cultures. Mohammed does not let his wife go to the Mosque simply because the larger community does not encourage that. However, he feels that the cultural values are changing rapidly and that he may decide to embrace the changes and give her permission to attend prayers and Islamic gatherings. This was a memorable moment since I was able to differentiate the contrasts in which different cultures accept changes. Whereas, our culture is fast and swift to adapt to changes, some cultures are very conservative and, therefore, very slow and resistive to changes. It is evident from the verbal communication pattern that Mohammed can be classified in the high-context culture group. He comes from a culture that has strong values and most of the life aspects are strongly associated with the culture. For instance, he would conclude many sentences with the phrase ââ¬Å"Inshallah.â⬠I came to realize that this phrase simply means God willing. It is an expression of hope that a premeditated endeavor will be
Thursday, October 31, 2019
Connection journal about nutrient cycling Assignment
Connection journal about nutrient cycling - Assignment Example Meanwhile, biotic components may refer to various staff or personnel who takes up the nutrients or ideas for publication. Now that we are quite familiar to the connection that we established, let us take nutrient cycling inside the magazine office. Ideas are always present in the atmosphere, just like nitrogen. Ideas can be converted into functional ideas with the help of creative staff. It is comparable to the role of nitrogen-fixing bacteria that converts nitrogen to nitrates. Next, the creative director takes in the ideas of the creative staff and forms the cover and photo concepts. The same goes through with the cycle when plants take in nitrogen and form proteins. The next level of hierarchy goes to the managing director who is constantly in contact with the creative director and consumes the proteins formed within a span of time. In the absence of both the creative and managing director, the tasks may not be completed and eventually phase-out. When both plants (creative director) and animals (managing director) die or become absent in the process, proteins (final ideas) formed decompose into nitr ogen in atmosphere. In this case, the role of the editor-in-chief to oversee the whole process takes effect until the editor-in-chief establish constant contact again with the creative and managing directors or until the cycle starts
Tuesday, October 29, 2019
The personalities of the contenders Essay Example for Free
The personalities of the contenders Essay How significant were the personalities of the contenders to succeed Lenin in accounting for Stalinââ¬â¢s defeat of his opponents in the years 1924-29? Lenins death on the 21st January 1924 caused huge sadness across the country. After Lenins death, everyone was eagerly waiting to know who would be the next leader of Russia. In the years after Lenins death, there was no clear successor to his leadership. However, when Lenin was leader, Trotsky was always there for him, and he played a huge role in the Civil War, therefore everyone thought he would become Lenins successor. However, as well as Trotsky there were other significant contenders, such as Stalin, Bukharin, Zinoviev and Kamenev which created a huge power struggle. I believe that the personalities of the contenders were significant in this struggle. However, other factors such as ideological battles, removal of opponents by Stalin and the consolidated powerbases also had an effect. The personalities of all were all extremely different by a great margin. The most likely to win, Trotsky was intellectually gifted which greatly benefitted him. He was also a great military leader and had good organisational skills. Trotsky has a few strong disadvantages to his personality though. His late arrival to the Bolshevik party could be interpret Trotsky as an unloyal character while his arrogance due to his intelligence made him quite a few different enemies in the Bolshevik party. Trotskyââ¬â¢s arrogance led to his defeat as he vastly underestimated Stalin and the threat he posed, while also decreasing his inner party support. At the time Trotsky would be clear favourite to win but his poor characteristics let him down. The next contender and winner of the battle for power was Joseph Stalin. An underdog and one of the least likely looking people to win, Stalin played his cards well and to his advantage. Being a Bolshevik from the beginning supported the fact that Stalin was a loyal Bolshevik which was a strength of his personality. Stalin being a cunning character was another strength of his and was a contributing factor to the defeat of his enemies as he was easily able to manipulate and outplay them. His ruthlessness and his ability to easily gain support due to his position and authority to promote them also benefitted greatly to the defeat of his enemies. He had a major weakness and thorn in his side though and that was Leninââ¬â¢s opinion of him. The ability to easily manipulate Stalin was also a major disadvantage for him. While Stalin didnââ¬â¢t look it, he had just as bigà of a chance as Trotsky due to his nature. Another contender in the race for leadership was the ââ¬Å"Golden boyâ⬠known as Bukharin. Bukharin was possessed one of the best personalities of the party and his traits and strengths such as his incorruptibility and honest and well natured manner were good aspects about him. His ââ¬Å"Golden boyâ⬠title was also helpful as it represented how liked he was by Lenin before his death. His intellectuality also benefitted him greatly and he was often referred to as the brains of the Bolsheviks. Bukharinââ¬â¢s main weakness though was that he ha d no ambition and he was too young. These factors led to a small support for Bukharin while his right-wing views also cut out some votes for him. Another contender, Zinoviev possessed good strengths such as being a good speaker and being good friends with Lenin. These would essentially give Zinoviev a right to the leadership of the party. He was involved little in the civil war though and his dislikeable and vain nature did little to help him gain the support he needed which was why he teamed up with the last contender Kamenev. Kamenev was also a friend of Lenin but compared to Zinoviev was from a working class background which would have benefitted him greatly due to the say and respect he would have. Kamenev had little influence though and was too uninspirational greatly denting his chances Therefore, what we can infer from the personalities and strengths of each other contenders was that Stalin cleverly manipulated and took advantage of each contenders weaknesses which led to him becoming leader. Stalin would also use the past to his advantage e.g. Zinovievââ¬â¢s poor revolutionary record or Trotskyââ¬â¢s past allegia nces. Stalin would also use the personalities of other contenders to his advantage e.g. Trotskyââ¬â¢s arrogance or the fact that Bukharin has no ambition. There were also many other factors that led to Stalinââ¬â¢s victory though. Another way in which Stalin won was the removal of opponents by Stalin. Stalin slowly but surely took out each of his opponents carefully and concisely. Stalin removed Trotsky by creating the Triumvirate with Kamenev and Zinoviev. Stalin carefully destroyed Trotskyââ¬â¢s reputation with Zinoviev and Kamenev with things such as questioning his loyalty to Lenin, destroying his influence by questioning his ââ¬ËBonapartismââ¬â¢ ideology and question his activities leading up to the revolution. Stalin also made Trotsky miss the funeral of Lenin, shocking the party and destroying Trotskyââ¬â¢s influence by a huge chunk. When Stalin had taken care of Trotsky,à he then took care of Zinoviev and Kamenev by splitting the Triumvirate and creating the Duumvirate with Bukharin. With Zinoviev and Kamenev in decline due to the influence they had in the defeat of Trotsky, Stalin easily defeated them. When that had happened Stalin quickly turned against Bukharin and with his growing inf luence Stalin removed him from the race for leadership. At the end of everything, Stalin had removed all opponents and this was a big factor in determining Stalinââ¬â¢s victory due to the fact that it had removed all of the people in the way of Stalin becoming leader of the Bolsheviks. Another way Stalin took power was by increasing his influence by never actually taking a side. While everyone was on either a left-wing or right-wing stance, Stalin remained neutral as to not damage his influence with members of either side. This way Stalin would face less opposition due to him not going against a large opposition of the party. His stance on things such as the NEP also came to his advantage and he both agreed and disagreed with it at different times. Stalin also took a neutral view on how fast Russia should industrialise, he personally however took a left wing view towards this.
Sunday, October 27, 2019
The Department of Homeland Security: Technology
The Department of Homeland Security: Technology The statement: The Department of Homeland Security has complete responsibility for all U.S. homeland security related critical infrastructure (CI) matters is not entirely accurate; originally, matters of national security were the sole responsibility of the federal government (Homeland Security, 2003, p. 7). Today, national critical infrastructure protection is a joint effort among the federal government, public and private sectors. The Department of Homeland Security was established to protect and secure the homeland from both domestic and foreign threats. According to the Homeland Security Act of 2002, the development of a plan which will ensure the security of critical infrastructure is the responsibility of the DHS (Homeland Security, 2009). Likewise, the DHS is also responsible for recommending the measures necessary to protect the key resources and critical infrastructure of the United States (Homeland Security, 2009, p. 2). The mission of DHS is one that involves the protection of infrastructure and critical facilities and networks (Homeland Security, 2010, p. 33). The DHS is responsible for the identification and assessment of all components which make up critical infrastructure. In addition to mitigating potential vulnerabilities; improving the resilience of critical infrastructure, is also a top priority of the DHS. This includes but is not limited to: stand-alone facilities and interdependent systems and networks within and across critical infrastructure sectors (Homeland Security, 2010, p. 34). The DHS serves as the leader and facilitator for those agencies who share responsibility for protecting the nations critical infrastructures (Homeland Security, 2010, p. 31). Those agencies include territorial, tribal, local and state governments, as well as the private sector and other agencies not associated with the government (Homeland Security, 2003). Conversely, when a disaster occurs these agencies are the first line of defense for national critical infrastructures. Even though the DHS is responsible for leading critical infrastructure efforts, coordination of security measures within local and state governments and critical sector industry leaders are the responsibility of federal lead departments and agencies (Homeland Security, 2003). Similarly, it is the responsibility of state and local governments to provide protection to critical infrastructures that are located within their jurisdictions (Homeland Security, 2003, p. 10). If and when a catastrophic event should occur which exhaust the capabilities of local and state governments, it is up to the federal government to coordinate a response (Homeland Security, 2003). A majority of our nations critical infrastructures are privately owned or operated, which means that the private sector are initially responsible for providing protection against threats to their facilities (Homeland Security, 2003). When the threat becomes more than the private sector can handle then the government will step in to assist and ensure that our nations critical infrastructures and assets are protected (Homeland Security, 2003, p. 11). Likewise, the federal government will be there to provide support for an environment in which the private sector can better carry out its specific responsibilities (Homeland Security, 2003, p. 11). The chemical sector is one of the most vulnerable critical infrastructures to natural disaster and terrorist attacks, that being said the DHS is working with the EPA to enhance security at chemical facilities (Homeland Security, 2003). In addition, special attention is being paid to those facilities which house large quantities of hazardous chemicals (Homeland Security, 2003, p. 78). Studies conducted by the DHS and private sector are currently underway to identify and understand physical vulnerabilities within the telecommunications infrastructure and their associated risks (Homeland Security, 2003, p. 61). Even though the private sector must occasionally seek assistance from the DHS, there are times when the federal government must rely on the private sector to lend a hand in emergency response and recovery. An example of the federal government calling on the private sector for assistance was the anthrax scare of 2001. A large Washington D.C. construction corporation was contracted to oversee the abatement and restoration of the Brentwood Post office in Washington D.C. and the Trenton Post office facility in New Jersey. One must also understand that quite a few of our nations critical infrastructures cross international borders (Homeland Security, 2003, p. 35). Therefore the federal government has partnered with the neighboring countries to provide security for our interconnected infrastructures (Homeland Security, 2003, p. 35). The United States partnership with Canada is is a vital asset to national critical infrastructure, efforts are being made to provide protection for international interconnected infrastructures. An example of this partnership is the Alaskan Canadian hightway. In order to transport goods and supplies to Alaska we must travel cross Canadian territory. It is evident that matters of critical infrastrucutre involves not only the DHS but the public and private sectors as well. The DHS would not be able to carry out their responsibilites without the assistance of local and state agencies, the private sector and vice versa. The U.S. government has made great strides in developing techniques and strategies to harden U.S. critical infrastructures which will make them more resistant to terrorist attack and natural disasters. One of the U.S. governments goals is to establish a strong partnership that spans across all levels of government, in addition to the private sector and the American people (Homeland Security, 2009). The Protected Critical Infrastructure Information Program is just one of many steps taken by the U.S. government to harden critical infrastructure. This program provides protection to security-related critical infrastructure information (Homeland Security, 2009, p. 5). By breaking down each critical infrastructure sector it is easier to understand how the U.S. government has been successful in hardening each critical infrastructure. The agriculture and food sector is one of the most vulnerable critical infrastructures, that being said, efforts to harden this sector are an ongoing challenge (Mark Sauter James Carafano, 2005). The U.S. government has revised its measures by providing more protection through the hiring of more health inspectors, and adding more reporting requirements (Sauter Carafano, 2005, p. 291). Contamination of our nations water supply is often a topic of concern; efforts are being made by the Environmental Protection Agency as well as the Department of Homeland Security to conduct a vulnerability and threat assessment (Sauter Carafano, 2005). These assessments will improve not only site security at high threat locations it will also enhance monitoring and sharing of information (Sauter Carafano, 2005, p. 292). With regards to the critical infrastructure of public health the U.S. government has implemented measures to harden biomedical surveillance (Sauter Carafano, 2005). This is extremely important because of the risks of a biological attack. There have also been improvements in hardening security of emergency stockpiles of medical supplies (Sauter Carafano, 2005, p. 294). In order to improve the physical security of medical structures the U.S. government has provided incentives to the private sector (Sauter Carafano, 2005, p. 294). In response to hardening the critical infrastructure of emergency services the U.S. government has established measures to harden interoperable and redundant communication networks (Sauter Carafano, 2005, p. 295). The U.S. government has instituted a tougher national emergency preparedness exercise program which teaches better security and promotes consistent protection planning and response protocols (Sauter Carafano, 2005, p. 295). Since the defense industrial base critical infrastructure sector is owned by a majority of the private sector the U.S. government has implemented new measures to include critical infrastructure protection requirements in contract processes (Sauter Carafano, 2005, p. 296). Likewise, security is being strengthened in the defense related commercial production and distribution processes (Sauter Carafano, 2005, p. 296). The telecommunications critical infrastructure has been assessed by the U.S. government, and in return a program has been designed to identify where the most vulnerable areas are in the communication architecture and then address the security issue (Sauter Carafano, 2005). Conversely, there have also been efforts made in the energy critical infrastructure sector to enhance resilience of the energy facilities (Sauter Carafano, 2005, p. 298). Facility equipment is being repaired and replaced and there have also been improvements in restoration and recovery of services (Sauter Carafano, 2005, p. 298). Significant improvements have been made to harden the transportation critical infrastructure sector; for example, security initiatives have been established to provide commercial airliners with protection from shoulder fired missiles (Sauter Carafano, 2005, p. 299). There have also been new developments in screening technology which help identify potential threats to transportation as well as aiding the postal service sector in identifying suspicious mail (Sauter Carafano, 2005, pp. 301-302). Despite the many efforts being made to harden critical infrastructure, there are still several weaknesses in the U.S. governments strategy. Lets face it, the only other thing that is more costly than hardening critical infrastructure is the disruption or potential loss of operations in those critical infrastructures. It is clear that trying to harden all critical infrastructures is too daunting of a task and is not cost effective. The U.S. government needs to focus on those areas of the United States where our critical infrastructures are most vulnerable (e.g. New York City, Los Angeles, Washington D.C. etc.). The federal government also needs to look at the protection of our nations water ways. Information security systems need to be deployed to guard the locks on the Mississippi and St. Lawrence seaways (Bruce Don David Mussington). By employing an information security system it will enable the monitoring of vessels and ships while in locks or approaching locks (Don Mussington). To provide another level of security, river marshals could be deployed to accompany dangerous shipments through the locks (Don Mussington). Many people dont realize that a large majority of our nations goods are transported through inland waterways, which is why it is important that more attention be paid to the transportation sector.
Subscribe to:
Posts (Atom)