Friday, February 21, 2020

Unlocking the postcolonial experience with the keys of history Essay

Unlocking the postcolonial experience with the keys of history - Essay Example In my reading of history I have found that the meaning of history is different for different people.In other words any history,which includes also the postcolonial one,has a subjective meaning for the individual.However,an objective approach to history can unlock the impasse of interpretation of history to the reasonable satisfaction of all people.I have observed that the tone of eulogy that characterized the early writers in the heyday of colonization has given way to less buoyant enthusiasm in the postcolonial literature after the liquidation of the empire. I should think that the Postcolonial writer now expresses his authentic subjective experience, not only of the colonial past, but also his perception of the aftermath of colonization.History is important in Postcolonial studies because it fixes the parameters for inclusion or exclusion the sources that we should study. Experience of a historical colonial past and the literature that reflects this is included as the canonical wor ks for study. However, many argue that the colonial past though politically over is actually present because of the overwhelming influence still exerted by former rulers on their former colonies. Some others argue that colonization is still a reality as some powerful nations still exercise political power from a distance through their conglomerates.1 There is a school of thought that argues that colonial experience is universal in human history because some time in the remote or recent past most countries or peoples had the experience of being subjugated by another powerful people.2 What is Postcolonial I feel that it is necessary to have a clear idea of the term Postcolonial. It became prominent terminology in academic parlance with the publication of Edward Said' vehement critique of western ideas of the Orient in his work Orientalism. His work highlights the inaccuracies of a wide variety of assumptions accepted on individual, academic and political levels. It is a mirror image of what is inferior and alien to the west (Said 1978). According to Said a historian and a scholar should see the diversity of culture and allow room for a dynamic variety of human experience. However, I find that Said was insistent about the essential difference between the orient and the occident. So I feel that in spite of the stereotype that European perception has of the orient there is different subjective perception of one another. In this context it is desirable to read Daniel Defoe's Robinson Crusoe. From this we get a proper insight into the colonial mind.3 With the appearance in 1989 of the work The Empire Writes Back: Theory and Practice in Post-Colonial Literatures, Postcolonial studies became a branch of study by itself and earlier terms like Colonial Literature, Commonwealth Literature and Third World Literature were replaced by Postcolonial. However many do not consider the term suitable. In fact some use term to signify a stand against Imperialism and Euro- centrism often surprisingly ante-Americanism. In this context I wish to compare and contrast the perspective of earlier writers who were conscious or unconscious appendages of the Raj by examining the work, In an Antique Land by Amitav Ghosh.4 Is American Experience Part of Postcolonialism Americas were one of the earliest scenes of European colonial adventure. The American expansion at the cost of the native American population is one of the saddest chapters of world history. Similarly the flourishing slave trade and the vestiges of which remained in our recent memory makes the America all the more a part of essential colonial experience. The white chroniclers of European explorations cinemetically focussed on what they saw through a single lense. However the Postcolonial historians capture the quite mystique of the discovery of the unfolding virgin America with the eyes of the natives Americans also.This

Wednesday, February 5, 2020

Management information system Essay Example | Topics and Well Written Essays - 2000 words

Management information system - Essay Example Confidentiality ensures that the information is not accessed by any person who is not authorized. Integrity ensures that the data is not modified or altered by unauthorized users and authentication deals with ensuring that the user is actually the person he claims to be. These days computers are used by everyone from banking to shopping and communicating with others. Though there might not be any secret information in your data but one would not want a stranger getting access to his/her information. Intruders often gain control to anyone’s computer so that they can use it for their attacks on other confidential systems. According to (Caldwell 175) computer security has five fundamental functional areas which are listed below: Risk Avoidance This is a basic security fundamental which deals with questions like unrestricted internet access, business engaging in risky activities and standardization on a desktop operating system. Prevention This consists of implementing security to the system in order to avoid any attacks. Complete prevention is desirable but not achievable. Deterrence It deals with the threats to information assets, consisting of communication strategies which are developed and designed to catch the intruders when they attack the system. Detection It works well with preventive measures. When prevention fails, detection should be started in order to minimize the damage. It also includes activities like log-keeping and auditing. Recovery When all measures fail and the intruder has successfully attacked the system and nothing has worked, it is important to focus on recovery. Includes backing up servers, internet connections and other similar recovery activities. Attacking Techniques There have been various techniques used by intruders these days to attack a single computer or a network. Some of them are listed and described briefly below: Viruses A virus is such a program that when it is executed it works within the security policy completely. When a virus is activated, that is when it becomes a part of a process; it makes use of a Trojan horse to look for the authorized environment for executable programs which are modifiable and then attaches itself with all such programs. Hence, when these programs are executed, the virus activates and spreads throughout the executable code of the computer. Viruses can create, modify, move, replicate and erase the files on a computer in order to engage much of the computer’s memory and causes the system not to function properly. Some viruses even have the ability to duplicate themselves and attack to other programs. An infected email attachment is one of the most common and easy ways to get a virus. (Caldwell 212) Trojan Horse A Trojan horse attack can be designed to attain any desired goals by the attacker. Trojan horse attacks are one of the most serious threats to computer security. If a computer has been attacked with a Trojan horse, it may not be the only computer under att ack but unknowingly it is used to attack several other computers. Trojan Horses are usually built and attached to the source code of an original program and is made to remain dormant until an attempt is made to overcome security. For example a Trojan horse may appear in the form of a computer game, which once double clicked, starts writing on parts of your hard drive, corrupting the data. Trap door A trapdoor is normally an entrance to the