Sunday, December 29, 2019

Who are Charles and Ray Eames

The husband-and-wife team of Charles and Ray Eames became famous for their furniture, textiles, industrial designs, and practical, economical residential architecture. The couple met at the Cranbrook Academy of Art in Michigan, coming to the world of design from two paths—he was a trained architect and she was a trained painter and sculptor. Art and architecture merged when they married in 1941, forming a partnership that became one of Americas foremost mid-century modern design teams.  They shared credit for all their design projects. Charles Eames (born June 17, 1907 in St. Louis, Missouri) spent two years in the architecture program at Washington University in St. Louis, famously being asked to leave after challenging the course curriculum—he asked why Beaux-Arts architecture was being elevated in light of the modernist successes of the young upstart Frank Lloyd Wright?   After leaving architecture school, Eames and his first wife left for Europe in 1927, in search of more modernist architecture than St. Louis could offer. Europe in the 1920s was the time of Adolf Loos, Bauhaus, Le Corbusier,   the modern furniture designs of Mies van der Rohe, and experiments with what became known as the International Style of architecture. Returning to America in 1929, he joined with Charles M. Gray to form the firm of Gray and Eames, which designed stained glass, textiles, furniture and ceramics. By 1938 he had a fellowship to study at the Cranbrook Academy of Art in Michigan, where he collaborated with another yo ung modernist, Eero Saarinen, and eventually became head of the industrial design department. While at Cranbook, Eames divorced his first wife to marry Ray Kaiser, who had become a colleague with Eames and Saarinen. Known simply as Ray, Bernice Alexandra Kaiser (born December 15, 1912 in Sacramento, California) studied painting with the abstract expressionist artist Hans Hofmann. The ability to simplify means to eliminate the unnecessary so that the necessary may speak, has long been Hofmanns inspirational quotation. Rays art immersion in New York City and in Provincetown, Massachusetts from 1933-1939 meant living simply (eliminating the unnecessary) and being baptized by modernism. She retained her modern art circle of friends when she, too, went off to study at the Cranbrook Academy. The attraction, of course, was Eliel Saarinen, father of Eero and president / designer of this new art school that was to rival the Bauhaus in Germany. At Cranbook, the Finnish-born Saarinens presented the modernist works of another Finn, Alvar Aalto. The bending of wood, the elegance of simple design, the economy of art and architecture—all were absorbed by the eager Charles and Ray.   After marrying in 1941, Charles and Ray Eames moved to Los Angeles to mass produce their simple ideas. They experimented with molded, flexible, adaptable furniture and storage units for homes and public spaces. They also designed the machinery and production methods needed to manufacture their furnishings. The Eameses believed that a house should be flexible enough to accommodate work and play. Charles and Ray Eames helped supply affordable housing for veterans returning to the United States after World War II. Houses designed by the Eameses featured high-quality prefabricated materials that were mass produced for efficiency and affordability. 1949: Eames House (Also known as Case Study House #8)1949: Case Study House #9 (Entenza House)1951: Kwikset Prefabricated House, prototype house kit for Kwikset Lock Company1954: De Pree House, Zeeland, Michigan Charles Eames died of a heart attack   August 21, 1978 in St. Louis, Missouri. Ray Eames died August 21, 1988 in Los Angeles—exactly a decade after her husband. The Eameses were among Americas most important designers, celebrated for their contributions to architecture, industrial design, and furniture design.   Who has not sat in an Eames chair around the office conference table or in a classroom at the public school? The role the Eames duo played in modernizing North America is often explored in exhibitions throughout the world. Charles had a daughter,  Lucia Jenkins Eames, with his first wife. Lucia and her son, Eames Demetrios, grandson of Charles, set up the foundations that have preserved the legacy of the Eames ideas. Eames Demetrios TED talk, The design genius of Charles Ray Eames, was filmed in 2007. Learn More: EAMES: The Architect and the Painter, documentary by Jason Cohn and Bill Jersey, 2011 DVDEames: Beautiful Details by Eames Demetrios, 2012Powers of Ten: A Flipbook, based on the film by Charles and Ray Eames, 1998The Films of Charles Ray Eames, DVD

Friday, December 20, 2019

The Impact of the Vietnam War on Veterans Essay - 966 Words

How did a Vietnam soldiers life change during and after the war. Society had a lot of different views regarding the soldiers and the war. When coming home veterans faced many distinct challenges. The Vietnam Veterans Memorial helped to heal the nation. The Vietnam War had a major impact on the United States and the soldiers who fought in it. The Vietnam War was a violent and costly war that needed many men to fight for its cause. These men are now known as the Vietnam veterans. Numerous veterans who fought in the war were injured or lost a comrade during battle. These soldiers fought to protect the United States and its people while risking their own lives. A lot of these brave men were either killed or injured and did not gain the†¦show more content†¦Diseases, drugs, alcohol, and the harsh living conditions often left soldiers longing for home. Veterans coming home had to face many different situations. Most veterans who came home did not receive the welcome they had deserved. Some veterans were homeless and unemployed after coming home. An organization called the Vietnam Veterans against the War or the VVAW tried to help the soldiers coming home. The organization allowed veterans to talk about their experiences to them and also tried to get the veterans to talk to the public (Rivers 646-648). The VVAW helped the veterans throughout the war. Many veterans who came home had emotional trauma or Post Traumatic Stress Disorder (PTSD). The United States citizens did not want to remember the war or the brave men who fought in it (Rivers 646-647). Very few people cared about Vietnam or the soldiers during the war because of the negative views toward the soldiers and the war. There were two main views toward the soldiers in Vietnam; a negative view and a positive view. The negative view seemed to be the most popular attitude towards them. The negative outlook portrayed the soldiers as the reason for the United States involvement in the war and the reason to why the U.S. was losing. Many soldiers came back to the U.S. and felt like a criminal (Rivers 647). The positive view saw the soldiers as heroes. This perspective depicts the soldiers as heroic and fighting for the United States. Post traumatic stressShow MoreRelatedThe Vietnam War Was A Long And Bloody1502 Words   |  7 Pages The Vietnam War was a long and bloody one. The war began on November 1, 1955 and ended on April 30, 1975. The war lasted nearly 20 years. Over this period, 9,087,000 men from United States were deployed, 58,220 were killed and more than 300,000 were wounded. The war also killed an estimated 2 million Vietnamese civilians, 1.1 million North Vietnamese troops, and 200,000 South Vietnamese troops. The Vietnam War was the first war America ever lost and this lost would lead to a heavy impact on theRead MoreProblems With The Vietnamese War Veterans1609 Words   |  7 PagesVietnamese war veterans face and at the end there will be ways that can help, how they were treated and viewed by their fellow countrymen when they returned back home. How did it impact Countries/governments and who protested against the Vietnam War. All these question will be answered on the main paragraphs bellow. What was the problem for the Vietnamese war veterans? Problem that the Vietnamese war veterans faced was the psychological effects which was very common for Vietnam veterans to have. TheRead MoreHow Did The War Affect The Vietnam War?1525 Words   |  7 PagesVietnamese war veterans face and at the end there will be ways that can help. In this essay I will be showing my findings/ research and answer my research topic which how did the war affect these soldiers. I will be discussing/finding problems like how the Vietnamese war. How they were treated and viewed by their fellow countrymen when they returned back home. How did it impact Countries/governments and who protested against the Vietnam War. What was the problem for the Vietnamese war veterans? ProblemRead MoreZiek Sanchez. Massie And Perry . Pd. 3. April 12, 2017.1113 Words   |  5 PagesZiek Sanchez Massie and Perry Pd. 3 April 12, 2017 Post Traumatic Stress Disorder From The Vietnam War The Vietnam war was one of the most alarming and dangerous wars to fight. Every step in the Vietnam jungle was taken cautiously. The guerrilla warfare used by the Vietcong was frightening to anticipate. The majority of the United States army was only that of young men who had been chosen through the draft. Young men going to school and living a life at home in safety all the sudden having to makeRead MoreThe Vietnam War: The Mental, Social, and Physical Effects on the Soldiers1402 Words   |  4 PagesIn 1961 the worst war ever fought by America had just started. The Vietnamese of the north also known as the Viet Cong had invaded the south to take control of the entire country. America and other democratic countries felt the spread of communism to this country would be a stepping-stone for other communistic countries around the world, also known as the Domino Effect. America, as cocky as they were, invaded Vietnam to help the southern Vietnamese. Although America is one of the most powerful countriesRead MoreThe War Of The Vietnam War1686 Words   |  7 PagesThe Vietnam War, or also known as the American War to the Vietnamese people, is a catastrophic battle that has left both nations reeling with the casualties and the irreversible emotional, physical, and mental destruction for civilians and soldiers alike. Spanning over two decades, the war has taken away not only the lives of its soldiers, but also the souls of its survivors. Aware of its impact, artists, writers, and filmmakers from both sides have attempted to capture the post-war memories andRead MoreAmerica ´s Hostile Response to the Vietnam War and Post-Traumatic Stress Disorder 1630 Words   |  7 Pagesthe Vietnam War contribute to the high number of Post-Traumatic Stress Disorder victims? Plan of Investigation In this investigation, the personal side of the soldiers who fought in the Vietnam war will be examined- particularly the symptoms of Post-Traumatic Stress Disorder (PTSD) that were most common in veterans, and the different experiences in the war or after returning home that could have caused them. The types of warfare, deaths, and differences from methods used in the Vietnam War willRead MoreThe Vietnam War Essay1701 Words   |  7 PagesSummary Like any other war the Vietnam War had a lot of devastating effects after the war ended. It also had many causes that changed many things after this war. The Vietnam War was fought between 1964 and 1975 on the ground in South Vietnam and bordering areas of Cambodia and Laos, and in bombing runs over North Vietnam.1.There were two opposing sides. On one side it was a coalition of forces including the United States, the Republic of Vietnam, Australia, New Zealand, and South Korea. AndRead MorePost-Traumatic Stress Disorder766 Words   |  3 Pagesand limb for our country while serving in the Vietnam War, but they continue to suffer immensely. Americans as well as Vietnamese troops and civilians suffered great losses when it comes to casualties. Witnessing first-hand the pain and death of strangers and allies, isn’t something one is likely to forget. Post-Traumatic stress disorder (PTSD) has been one of the many repercussions of witnessing these gruesome events (Mental Health Am erica). Veterans, their families, and the government have comeRead MoreVietnam Veterans Against The War Essay1478 Words   |  6 Pages Brief History The first American troops arrived in Danang, South Vietnam on 8th March, 1965. The troops’ mission was to defend the American airfield from the Viet Cong insurgents. However, their mission gradually extended to defensive patrolling and later on taking the offensive. As such, the number of US troops swelled to 184,300 by the end of the year and by1969, the number of American soldiers had swelled to 543,000. Correspondingly, opposition against the mission, which was previously minimal

Thursday, December 12, 2019

Information Technology and Systems Management

Question: Discuss about the Information Technology and Systems Management. Answer: Introduction A risk refers to the possibility of an event that may result in some sort of damage and negative impact. Information technology and systems are exposed to a number of risks of varied categories and the same may result in low to severe impact. It is necessary for the project in the IT field to follow a well devised risk management plan cover the necessary steps as risk identification, risk analysis, risk evaluation and risk treatment (Gartner, 2016). There are a number of methods to treat the risks such as risk avoidance, risk acceptance, risk mitigation and risk transfer. The report discusses various topic under IT risks and elaborates each one of them in complete detail. Stakeholder Map Operational Executive Internal Security Expert Network Designer Administrator Verifier Project Manager External Technical Expert and Analyst Security Head Program Manager Business Analyst End User Security Virtues There are broadly four virtues of security that must always be considered in order to protect the system from the security risks and attacks. Daily consideration: Security must be considered on a daily basis and the steps must be taken to keep the assets secure at all times rather than performing the same at fixed intervals Community Effort: Security should be considered as a community effort that is all the parties that are involved must take care of security rather than a designated team to perform the task Higher focus: The focus that is put forward by the security team must be high and must be generalized as well Education: It is not possible for the resources to practice security measures without any knowledge or background and thus, training sessions must be arranged (Day, 2003) Internet Security Internet suffers from a number of security risks and threats and in spite of a number of measures and protocols developed to keep the internet safe from all such risks, there are still numerous cases that are encountered on a frequent basis. As per the internet threat model, it is possible for the attackers to devise a measure through which they can add, delete, modify, duplicate or perform any other operation on the internet packets that are transferred from one location to the other (Rescorla, 2003). There are a number of internet and network security risks that are prevailing in the present era and some of them have been discussed below. Malware Threats These are the most common threats that are present and the information on the internet can get exposed due to the same. A number of malware such as viruses, logic bombs, Trojan horses, worms, adware and many others get downloaded on the users machine through the internet and can gain unauthorized access to the information. These may or may not be reproducible in nature but have the potential to cause severe damage. Integrity Attacks Message and media alteration attacks are executed on the network to make unauthorized changes to the information that is being exchanged. These are the assaults that occur by making modifications to the message in the middle of the correspondence, for example, re-steering the bring in an unapproved way or rolling out improvements in the message that is being exchanged to bestow deceiving data to the collector. Call re-steering is executed by the aggressors to re-course the call and include or expel elements that are not approved to be a part of the same. Get back to holing is another type of message change uprightness assault in which the call is deliberately postponed by making blunders in the set up or expanding the turnaround time or comparable exercises (Obidinnu Ibor, 2016). Quality of Service (QoS) abuse These are the assaults which are incorporated under the accessibility classification since they influence the accessibility of correspondence with most extreme quality. There are likewise assaults in this particular class in which exceptional instruments are utilized that fumes the transfer speed of a specific association or system (Shaidani, 2016). Server Impersonation In this type of the assault, the aggressor imitates as the media server, gets the solicitation for a specific correspondence, sends the reaction and plays out the pernicious movement. The accessibility of the ordinary correspondence is not reestablished and the same causes a serious effect on the specific type of correspondence. Media Session Hijacking At the point when the media session is in advancement, then the assailant may play out a movement in which the media session is captured and the media is re-coordinated to another endpoint. It causes the inaccessibility of typical interchanges and in this way influences the accessibility of the data. Mental Models of Computer Security Risks Mental models are the simplified concepts that explain how a particular process or phenomenon works in reality. The mental models to understand the security risks associated with computer systems and information technology is based upon a number of conceptual models which are as explained below. Physical Safety: The physical concept associated with the security of any system is significant as individualized and localized physical control is of utmost importance. Medical Infections: The model of security episodes as medicinal contamination is grounded in the examples of dispersion of vindictive code irresistible sicknesses, and the significance of heterogeneity in the bigger system. A few investigations of system security have focused on the idea of the system as a biological community of security. Criminal Behavior: There is a presence of malicious intent or criminal behavior involved behind the execution of the risk or an attack associated with the same. Warfare: The risks and attacks are executed due to the presence of the enemy who makes the ground for the execution of these attacks Economic Failure: These risks are often seen as market or economy failures which may cause severe damage to the victim organization (Asgharpour, 2016) These mental models explain the reason and participants behind the risks that take place. As per these models, every risk termed as r in the system has a designated list of participants who are either involved or get affected by the risk and are represented as p. Multi-dimensional scaling is used to understand the behavior and involvement of experts and non-experts behind the mental models of security. Perception of Risks It is important for the organization and the project teams to perceive the risks correctly. There are a number of factors that are associated with the risks in terms of likelihood, impact, nature of risk, type of risk and likewise. Model of impact for the unfortunate events (Slovic, 2016) The methodology to manage and treat the risks depends largely upon the way the risks are perceived. This perception also aids the team to form the methods to control and mitigate the risks. Security Metrics Security metrics provides a mechanism to build a distinction between the metrics and measurements. The security metrics associated with the computer and information risks must be SMART this is they must be specific, measurable, attainable, repeatable and time dependent in nature. In order to generate or draw the security metrics for the security risks, there is a series of steps that must be followed. First of all the goals and objectives must be defined to design the metrics. It is also important to make a decision on which metrics to generate. Strategy, benchmarks and targets must then also be finalized for the designing of the metrics. An action plan must then be created and executed to bring the security metrics in place. These metrics that are created must include the risk management, patch management, cost benefit analysis and other features and factors considered in them (Sans, 2016). Use Case Models Use Cases and Brief Descriptions Use Case Description Authentication Check A request response structure to make sure that the authentication checks are performed for maintenance of the security Identity Management Two layer authentication including the keying in of a onetime password for security Access Management Authorization and authentication checks Network security Network monitoring and scans to make sure that there are no risks involved Use Case Diagrams Conclusion IT risk management is a broad concept that comprises of a number of components and techniques present within them. The several risks that are present in the world of information technology can be handled with a number of different mechanisms such as identity and access management, anti-viruses, use of firewalls, intrusion detection and prevention and a number of different other methods. It is also necessary to set up and install a high level of physical security in the infrastructure to prevent the risks from occurring. Perception of risks and the security metrics associated with the risks are extremely significant in dealing with the risks that are probable to the IT security. These measures should be created accurately and with utmost perfection in order to deal with the risks. There are a number of measures and steps that are already being taken in order to protect the system from the risks but the same are not enough to protect the system. Security managers thus are required to t ake a step forward to ensure the security from the events and manage the risks at all levels. References Asgharpour, F. (2016). Mental Models of Computer Security Risks. Retrieved 9 September 2016, from https://www.econinfosec.org/archive/weis2007/papers/80.pdf Day, K. (2003). Inside The Security Mind - Making the tough decisions (1st ed., p. 25). Pearson Education Inc. Gartner,. (2016). IT Risk Management. Gartner.com. Retrieved 9 September 2016, from https://www.gartner.com/technology/consulting/it-risk-management.jsp Obidinnu, J. Ibor, A. (2016). A survey of Attacks on VoIP networks and Countermeasures. Ajol.info. Retrieved 9 September 2016, from https://www.ajol.info/index.php/wajiar/article/viewFile/128074/117625 Rescorla, E. (2003). The Internet is Too Secure Already (1st ed.). RTFM Inc. Sans,. (2016). A Guide to Security Metrics. Sans.org. Retrieved 9 September 2016, from https://www.sans.org/reading-room/whitepapers/auditing/guide-security-metrics-55 Shaidani, S. (2016). and Defenses Against Voice over IP (VoIP). Retrieved 9 September 2016, from https://www.cs.tufts.edu/comp/116/archive/fall2015/sshaidani.pdf Slovic, P. (2016). Perception of Risk (1st ed.). American Association for the Advancement of Science.