Disc Ass #8
"For your discussion assignment this
time, share with the other members of the class any interesting facts or
other information you have uncovered as you search for relevant job
descriptions. Keep in mind that many other students in this class may
share the same professional interests as you."
I'm in IT and
employers are looking for professionals, I may not be alone in having
discovered the amount of experience employers require and the anxiety
this brings me since I'm still in school, and without certifications,
which are a must in my career field. Nonetheless, I'm determined to put
the best foot forward, which entails acquiring what employers seek as
well as learning what that is by reading job-postings.
"What advice about finding employment have you heard or read about that you think others may want to know?"
Have
a specific resume that presents fact and not fiction, that offers more
legitimacy and less opinions and conjecture; not only dress for the job,
but be prepared for the job, for the career you desire.
"What sorts of experiences (positive or negative) have you had in the past when seeking employment?"
Keeping
optimistic, slow but steady, at all costs wins the race, a handshake
and a smile goes a long way. Answering honestly, showing interest in the
interview instead of putting faith in merely placing an application,
and knowing what you want while keeping a level of composure that gives
respect and takes responsibility, a good first impression.
"How do you think social media could help you find a job?"
Some
temporary hiring agencies post job listings, some of which might have
part-time to transitional full-time work. Companies thus use social
media in the same manner, broadcasting new job openings or in some
instances issues that lead to job opportunities in the manner of
innovation/security, particularly in IT.
"What do you think are the benefits of becoming familiar with social media in the workplace?"
Networking
is essential to gainful employment, social media is another way to
learn, asses, study, and network with companies in a digital sense.
"Which keywords will your audience be looking for in your resume?"
I
assume something that intrigues them that they interpret as integral or
practical. Such as "diligent" or "attentive" or maybe
"efficient/proficient" and I'm sure in IT the world "Certified" is nearly
most sought.
"Has this research process changed your opinion or perception of your future career?"
I
have a certain perception of employment in my intended field of study,
some jobs we're overqualified and competing against other professionals,
some we're in demand but unqualified. It seems to me that the numbers
of applicants in both demographics are growing faster than I remember.
Answers are the way. Don't chase dreams, but believe in them. Don't believe goals, but chase them. Emotions are limited only by the culture you reflect. TLDR.SPQR.LLAP
30 April 2013
Et tu, Brute?
24 April 2013
Ruff Giraffe
Assignment: Write a proposal for your uninspiring technical writing class, make sure to haggle for approval of your topic before you begin, and review a proposal of someone in your group with a checklist written by a zombie.
[thread]
[thread]
Proposal
for
Wi-Fi Implementation
for
Wi-Fi Implementation
Prepared for
G.N. Eric
X.M. Paul
National Venue Corporation
G.N. Eric
X.M. Paul
National Venue Corporation
By
M.J. Banks
M.J. Banks
20 April
2013
Good Networking
Robots
“For American Quality Unparalleled”
1060 W Addison St
Grovers Mill, NJ 08550
874-555-1234
“For American Quality Unparalleled”
1060 W Addison St
Grovers Mill, NJ 08550
874-555-1234
April 20, 2013
G.N. Eric & X.M. Paul
Office Complex Megatower
1718 Rhode
Downers Grove, IL 60515
Office Complex Megatower
1718 Rhode
Downers Grove, IL 60515
Dear Doctors Eric and Paul:
Given to review is a Wi-Fi implementation proposal for NVC
locations. Within this document is the information in regards to your RFP.
In this report, you will find the listed corollary sections
as listed:
-
Product Specifications
pp.
3-4
-
Operating Instructions
pp.
4
-
Qualifications/Experience pp. 5
-
Cost
pp. 6
-
Warranty pp.
7
We are much obliged to have you take interest in our
information networking solutions, thank you for providing the opportunity, we
will check within the week to finalize arrangements.
Sincerely,
Matthew Banks
Marketing Director
Marketing Director
Enclosure:
Proposal
Table of
Contents
ABSTRACT iv
1.0 INTRODUCTION
1.1 Purpose
1.2 Problems
1.2.1 High Costs
1.2.2 FCC Subsidy Absence
1.2.3 Diminished Quality of Service
2.0 DISCUSSION
2.1 Implementation
2.2 Technical Description
2.3 Qualifications
2.4 Administrations
2.5 Cost
2.6 Warranty
2.7
3.0 CONCLUSION
3.1 Major Concern
3.2 Recommendation
4.0 GLOSSARY
5.0 REFFERENCES/CITATIONS
1.0 INTRODUCTION
1.1 Purpose
1.2 Problems
1.2.1 High Costs
1.2.2 FCC Subsidy Absence
1.2.3 Diminished Quality of Service
2.0 DISCUSSION
2.1 Implementation
2.2 Technical Description
2.3 Qualifications
2.4 Administrations
2.5 Cost
2.6 Warranty
2.7
3.0 CONCLUSION
3.1 Major Concern
3.2 Recommendation
4.0 GLOSSARY
5.0 REFFERENCES/CITATIONS
Abstract
Publicity has become a greater
necessity as the digital era takes hold of the entertainment industry. Despite
the short-lived trends, the power of the consumer while losing purchasing power
has gained a near fanatical approach to live media, i.e. the ominous nature of
social networking.
As the commuters attend events
they can share their interests with the distanced internet community, the
audiophiles, the ever-connected youth and the parents who pay for their
children’s music taste. Bridging the gap from band tour to home tablet is a
popular solution that provides trending and maintainable monitored commercial
interests.
Using the best technology with the highest rated industry
professionals to implement a metropolitan area network of digital throughput
swiftly implements a niche network that opens venues and interests to profitable
free advertising through voluntary public participation.
1.0
Introduction
1.1
Purpose
This proposal is to establish
contract with Good Networking Robots (GNR) for full-scale assessment, design,
and implementation of a wireless solution in all NVC locations. This bid to
obtain a services contract includes the specifications of hardware, personnel
involved, and discounts provided as subsidized costs to NVC by federal
oversight.
1.2 Problems
1.2.1 Costs
As advertising costs increase, providing free Wi-Fi to customers is a return on investment that only begins remunerating when implemented.
1.2.2 FCC involvement
Internet access at current time the FCC requires purchase commercially; should a Federal initiative to implement national Wi-Fi occur, telecommunication companies have vied for options that sell services instead to corporations, such as NVC, in which case provisional or subsidized funding comes through them or federally. (POPSCI, 2013)
1.2.3 Diminished Quality of Service
Due to the cost of living circumventing cheap cellular network saturation, and the overall increase in population, a demand for the cheaper more common version Wi-Fi increases with time and impassable consumer interests. Time without Wi-Fi keeps the events hidden from free advertisement.
Because the price of internet Access Points will only slowly decline, a dependable hardware solution is the best consideration. GNR, a forerunner in achievements in all things networking, proposes the implementation of Cisco Systems routing equipment and anti-theft measures. They are an American multinational corporation that is the leader of industry standard technical excellence. The unit we recommend you using is the Cisco Aironet 3602I - Wireless access point.
Cisco routers provide access to applications and services, and integrate technologies. (Cisco Systems, 2013) All of which fall into the requirements of a metropolitan area network. The following provides an accurate technical description.
2.2 Technical Description
2.4 Qualifications and Experience
Good Networking Robots has been a computer network solutions agency since 1775. Starting with the player piano market, we have come to provide for the technological needs by bridging entertainment and technology to the point of satisfaction for many years. Our technicians are required to have both Master’s level college degrees and ISO certifications, which each employee is screened and delegated to lead and assist projects according to the demands of each special operation.
2.5 Personnel
Nerdy technicians rigorously trained in hacker prisons since childhood to install and maintain jukeboxes regiment each of our networking substations and other various highly technical devices, the following employees will oversee the implementation of a wireless solution at a single venue of your choosing before project assessment and plausible full-scale implementation.
John Camp, PhD Internet Sales Taxation
John Gomez, PhD Radiologic Sciences
John Jones, PhD Archeology
John Littlejohn, PhD Oriental Medicine/Herbology
John Omar, PhD Nanotechnology
John Smallberries, PhD Blacksmithing
John Kim Chi, PhD Aromatherapy
John Edwards, PhD Global Governance
John Rajeesh, PhD Comedy Studies
John Whorfin, PhD Enigmatology
2.6 Cost
GNR is pleased to offer these implementation services for merely the cost of labor at a single project cost to match the timeline requirements your company needs, this will portend a clean, efficient, successful, and timely operation. A full installation will cost $2,500 per venue, or five for $10,000. The Wi-Fi Access Points cost $1,000 each and will be included in the billing statement once quantity known. (CDW, 2013)
2.7 Warranty
Good Networking Robots provides an unconditional warranty, unless purposefully damaged, in case of accident for 100 years, despite any manufacturer warranty issued on the equipment we install. There is no additional cost of labor billed to NVC as result of maintenance of GNR warranties.
3.0 Conclusion
3.1 Major Concern
NVC may go without providing free Wi-Fi to its customers; this prevents free advertisement, and impugns the dissemination of NVC ventures and activities for the public to acquire and asses.
3.2 Recommendation
To bypass oversight by a digital era, we recommend the use of GNR to implement Cisco network solutions in all NVC locations.
4.0 Glossary
Access Point: Hardware device that uses high-frequency radio waves to relay magical invisible communication with the Internets.
Cisco: International networking hardware, networking, and communications company. (NASDAQ: CSCO)
Jukebox: A machine that automatically plays a selected musical recording when a coin is inserted popularized in the 20th century.
5.0 Works Cited
CDW. (2013). Retrieved from http://www.cdw.com/shop/products/Cisco-Aironet-3602I-wireless-access-point/2544633.aspx#TS
Cisco Systems. (2013, 4 24). Retrieved from http://www.cisco.com/en/US/products/hw/routers/index.html
POPSCI. (2013, Feb 2). FCC Proposes Free WiFi For Everyone In The U.S. . Retrieved from POPSCI: http://www.popsci.com/technology/article/2013-02/fcc-proposes-national-free-super-wifi-network
1.2 Problems
1.2.1 Costs
As advertising costs increase, providing free Wi-Fi to customers is a return on investment that only begins remunerating when implemented.
1.2.2 FCC involvement
Internet access at current time the FCC requires purchase commercially; should a Federal initiative to implement national Wi-Fi occur, telecommunication companies have vied for options that sell services instead to corporations, such as NVC, in which case provisional or subsidized funding comes through them or federally. (POPSCI, 2013)
1.2.3 Diminished Quality of Service
Due to the cost of living circumventing cheap cellular network saturation, and the overall increase in population, a demand for the cheaper more common version Wi-Fi increases with time and impassable consumer interests. Time without Wi-Fi keeps the events hidden from free advertisement.
2.0 Discussion
2.1 ImplementationBecause the price of internet Access Points will only slowly decline, a dependable hardware solution is the best consideration. GNR, a forerunner in achievements in all things networking, proposes the implementation of Cisco Systems routing equipment and anti-theft measures. They are an American multinational corporation that is the leader of industry standard technical excellence. The unit we recommend you using is the Cisco Aironet 3602I - Wireless access point.
Cisco routers provide access to applications and services, and integrate technologies. (Cisco Systems, 2013) All of which fall into the requirements of a metropolitan area network. The following provides an accurate technical description.
2.2 Technical Description
Networking
|
|
Compliant
Standards:
|
IEEE
802.11a , IEEE 802.11b , IEEE 802.11d , IEEE 802.11g , IEEE 802.11h , IEEE
802.11i , IEEE 802.11n , IEEE 802.1x , Wi-Fi CERTIFIED
|
Connectivity
Technology:
|
Wireless
|
Data
Link Protocol:
|
IEEE
802.11a , IEEE 802.11b , IEEE 802.11g , IEEE 802.11n
|
Data
Transfer Rate:
|
450
Mbps
|
Features:
|
4T4R
MIMO technology , Auto-sensing per device , CleanAir
technology , Maximum Ratio Combining (MRC) , Power over Ethernet (PoE) , Wi-Fi Multimedia (WMM) support
|
Form
Factor:
|
External
|
Power
Over Ethernet (PoE):
|
PoE
|
Status
Indicators:
|
Status
|
Wi-Fi
Bands:
|
2.4
GHz , 5 GHz
|
Wireless
Protocol:
|
802.11
a/b/g/n
|
Interface:
|
Ethernet
10Base-T/100Base-TX/1000Base-T
|
Encryption
Algorithm:
|
AES
, PEAP , TKIP , TLS , TTLS , WPA , WPA2
|
Interface:
|
|
Type:
|
Management
|
2.4 Qualifications and Experience
Good Networking Robots has been a computer network solutions agency since 1775. Starting with the player piano market, we have come to provide for the technological needs by bridging entertainment and technology to the point of satisfaction for many years. Our technicians are required to have both Master’s level college degrees and ISO certifications, which each employee is screened and delegated to lead and assist projects according to the demands of each special operation.
2.5 Personnel
Nerdy technicians rigorously trained in hacker prisons since childhood to install and maintain jukeboxes regiment each of our networking substations and other various highly technical devices, the following employees will oversee the implementation of a wireless solution at a single venue of your choosing before project assessment and plausible full-scale implementation.
John Camp, PhD Internet Sales Taxation
John Gomez, PhD Radiologic Sciences
John Jones, PhD Archeology
John Littlejohn, PhD Oriental Medicine/Herbology
John Omar, PhD Nanotechnology
John Smallberries, PhD Blacksmithing
John Kim Chi, PhD Aromatherapy
John Edwards, PhD Global Governance
John Rajeesh, PhD Comedy Studies
John Whorfin, PhD Enigmatology
2.6 Cost
GNR is pleased to offer these implementation services for merely the cost of labor at a single project cost to match the timeline requirements your company needs, this will portend a clean, efficient, successful, and timely operation. A full installation will cost $2,500 per venue, or five for $10,000. The Wi-Fi Access Points cost $1,000 each and will be included in the billing statement once quantity known. (CDW, 2013)
2.7 Warranty
Good Networking Robots provides an unconditional warranty, unless purposefully damaged, in case of accident for 100 years, despite any manufacturer warranty issued on the equipment we install. There is no additional cost of labor billed to NVC as result of maintenance of GNR warranties.
3.0 Conclusion
3.1 Major Concern
NVC may go without providing free Wi-Fi to its customers; this prevents free advertisement, and impugns the dissemination of NVC ventures and activities for the public to acquire and asses.
3.2 Recommendation
To bypass oversight by a digital era, we recommend the use of GNR to implement Cisco network solutions in all NVC locations.
4.0 Glossary
Access Point: Hardware device that uses high-frequency radio waves to relay magical invisible communication with the Internets.
Cisco: International networking hardware, networking, and communications company. (NASDAQ: CSCO)
Jukebox: A machine that automatically plays a selected musical recording when a coin is inserted popularized in the 20th century.
5.0 Works Cited
CDW. (2013). Retrieved from http://www.cdw.com/shop/products/Cisco-Aironet-3602I-wireless-access-point/2544633.aspx#TS
Cisco Systems. (2013, 4 24). Retrieved from http://www.cisco.com/en/US/products/hw/routers/index.html
POPSCI. (2013, Feb 2). FCC Proposes Free WiFi For Everyone In The U.S. . Retrieved from POPSCI: http://www.popsci.com/technology/article/2013-02/fcc-proposes-national-free-super-wifi-network
[/thread]
22 April 2013
Everyone's a Critic
of
"The Art of Deception” By Kevin D. Mitnick & William L. Simon
M. J. Banks
Monsters University
Spring 2013
ITS 20000-01 Ethical & Legal Issues
This review will entail
observations of “The Art of Deception” by By Kevin D. Mitnick and William L.
Simon; overall, it will portend the quality of the book. While assessing
tactical hacking and the authors’ suggested approaches at stopping the malicious
intents relayed, foremost the personable affectations needed to deceive the
deceivers, and relaying how the book presents itself for the layperson. The amount of intrigue given from the book is
acceptable to hobbyist and analogue readers alike, proffering enough useful
knowledge for IT managers also, in entirety can become excessive to the
uninitiated techie, and outlines the certainty of the dichotomy of hacker and
security professional. This inroad to
technical security oftentimes panders to all readers with isolated scenarios
that touch upon literary noire elements, simple altruistic tales that illumine
otherwise trivial elements of the technical world as the perils that they are
and can be, validated by proven security measures it maintains standing as
designed, a partial manual to avoid human error. Infamous Mr. Mitnick relies as much on his
criminal past as he does the gathered solutions written in the book to prove the
value of the guide. Balanced against humble brags and common knowledge the book
is a descent read for people of the nerd community.
Book Review: “The Art of Deception”
‘Deception’ begins with a close
focus on threats based in the computer world and a call to acknowledge, define,
and prevent them. Slowly it brings the readers on a journey that eventually
forces the reader to realize the necessity of network hardware firewalls,
intrusion detection systems (IDS), antivirus (AV) software, and other security
protocols digital and physical, each in individuated experiences. Each serial foray into a security threat is
predictably simple, which allows the reader to learn typical solutions to the
most typical problems, distinguishing the book as persuasive rather than rigidly
technical. Easily enough to read, it has many explanations for novice readers
and can at times redundantly explain things. In other instances, the writers
impose lulls to security scenarios with elongated personal attestations, which
served to explain the flaw of neglecting dangers of a mere unfortunately trusted
and unattended hackers. The prose points balanced with the technical aspects
make for a descent book to read, but probably a better audiobook.
In the book,
Mitnick explains his role in becoming a famous hacker, by means of a national
FBI search due to ruining several millions of dollars in the monies of corporate
America through his hacking skills, duly ending in incarceration by the federal
government, and since has strived for legitimate business ventures. My
assessment being that he intimates in his writing sympathy for hackers in his
own way, yet now consults corporate institutions and security firms around the
world to the malicious hacker element. Logically inundated with a need for IT
security these companies hire security admins to propose, design, implement,
maintain, and improve the valuable networks they implement for large amounts of
commerce all day every day. The book scenarios define users and a network,
credentials and insecure situations, showing that hacking has the simplicity of
stolen passwords as much as the complex actions of network intruders. In regards to detection, threats found
case-by-case present as autonomous and predictable threats, dealt with
formulaically to stop the intrusion. Given to the forthcoming information, the
threats remain unto themselves human.
The book’s
subtitle, “Controlling the Human Element of Security” is a certainty to the
narrative, from personal confessions to common threats, a good handbook to moral
legality in a growing network, formal it continues to educate the reader to the
shocking industrious nature of a hacker, eventually telling that threats from
within a company are as viable as from without. Commonly the book paints the
same pictures as do today’s spy movies, wherein patient thieves wait for the
time to strike, using falsified data and pretenses, under the auspices of
professional courtesy. Before explaining how to be suspicious in each scenario,
each life lesson styled chapter stresses the importance of security through
secrecy in the aspects of personal info, passwords, badges, etc.
It’s not
exactly the most informative of books for a student with a degree in computer
sciences, but does discuss many techniques and insights, the balanced views of
hacker and security professional give the book weight, and the depth of hacker
profiling compartmentalized by chapter gives an interesting twist to an
otherwise textbook. In attempts to leave little to the imagination a descent
compilation of hacker events and social engineering crimes are presented in an
entertaining book that deserves a second read, but not a third, worthy of
recommendation to the generation prior to millennials, and moderate approval
among them, given that the examples are plausible hypothetical.
Not to spoil the finer points of
anarchy the book reveals, some favorite points included beating speeding tickets
with a holiday, bypassing a rotating password with inclement weather, top-level
clearance with a fake persona, and gaining restricted access by exploiting kindness,
among many other hacker exploits. It is a very ‘spy-world’ book that enlightens
obvious circumventions unknown to the average well-mannered individual and goes
as far to explain why a person becomes victim in each scenario, thus making the
book fairly useful to modern corporate interests.
~
16 April 2013
Joined at the Hipster
Ethical & Legal Issues
Spring-2013-ITS-20000
Spring-2013-ITS-20000
· Read the Case study 3-Cyberbullying on page
378 of "Ethics In Information Technology" 4e. Answer the three questions on pages 380-381. Each question shouldn't be longer than a page and please keep it professional
looking, no MLA or APA required. (Same case study starts on pg. 321 in Third
Edition)
· Due Date: April 16, 2013 11:59:00 PM EDT
1) Do you believe that knowingly violating the terms of a
Web site’s service agreement should be punishable as a serious crime, with
potential penalties of substantial fines and jail time? Why or why not?
If the terms of the Web site’s service agreement protect
itself and its users from crimes, than there is a moral and ethical precedent
to enforce the laws subject when violating the service agreement. Informing
users of terms and conditions is a fair usage of warning measures to the
community that uses the website, enforcing those laws despite any service
agreement is the responsibility of regional laws, which are partaken by users
and law enforcement entities. The site may have a legal obligation to the
country in which is resides and/or is accessed by, to display the service
agreement, and equally may be a requirement to protect its commercial
interests, as in, certain legal actions cannot be taken without prior warning
of a Web site’s service agreement.
2) Imagine that you are the defense council for Lori Drew.
Present your strongest argument for why your defendant should not be convicted
for violation of the Computer Fraud and Abuse Act. Now imagine that you are the
prosecutor. Present your strongest argument for why Drew should be convicted.
Which argument do you believe is stronger?
Defense: Lori felt adamant about her opinions, enough to
share them, yes they were shared anonymously, but the false profile that she
created is no different than the average user, which she herself is one, making
her fully qualified to voice those opinions in that manner, free speech does
not require a lack of anonymity.
Prosecution: Ms. Drew knowing of her intentions had no right
to provide false information to the website in this case, providing a perfect
example of identity theft, misleading the public, as well as misleading the
victim with harassment, slander, intimidation, and forethought malice, which
resulted in the death of an innocent girl.
The stronger argument I believe belongs to the defense, not
merely because I wrote it, but for the legitimacy of free speech principles,
and that the CFAA was not broken in this case. The prosecution has a far
stretch to make in order to reach either, equivocation for false identities
being fatal, and or, to make the cyber bullying actions of Lori Drew sway the
emotional sentiment of the jury to sway the verdict in differentiated CFAA
parameters.
3) Do you think that Lori Drew was responsible for Megan’s
death? Do you think that justice was served in this case? Should new laws be
created to address similar future cases?
I don’t have the maternal instinct that I believe is a
qualifier to this case. I guessing, I think that suicide is a crime because of
the killer, which in this case is the victim and not quite the harassers. The
timeline puts Lori’s actions near the death and could be the outlier that
pushed Megan ‘over the line’, but I like to believe that Megan’s excuse for
suicide could have been personal.
I think that justice was served in this case, a particular
amount of attention was shed to this case amongst the fanfare, the harassers
did not gain immunity by means of mistrial or double jeopardy laws (in regards
to harassment, stalking, intimidation, slander charges). I reckon to remember
that after this actual case that new cyber bullying laws were enacted, which
expanded current laws of the civil justice code to amend new penalties for
existing offenses to include Internet communications, around the globe.
-
15 April 2013
Enregistrement
[thread]
Describe the positive aspects of social networking.
A well-established form of communication, the advent of social media has created a digital society for both professional and anonymous interaction, that allows current media trends to be disseminated and obtained simultaneously and instantaneously, deferring media monopoly to privatized interest, while allowing information sources to advertise and track public interest.
How important is it in your life?
Very importantly it allows me to obtain information from contacts I would otherwise have difficulty reaching or trusting, it can be a waste of time and a misleading gathering of self-loathing where everyone is a critique arguing with everyone and themselves. It also connects analogue workers digitally to career opportunities.
What are some of their practical business uses?
Advertising prospectively raises revenue for companies, and it gives the advertising companies the ability to test public-relations campaigns against a wider audience in a smaller amount of time. It also allows potential employers to screen recruits quicker and assessing a person's social networking behavior/actions.
What is at least one key ethical issue associated with the use of social networking?
The right to not self-incriminate no longer exists for those who have published 'tweets' and 'status updates' to social networking sites. Full disclosure and admission are pertinent to much of social networking, easily documented and open to interpretation widely.
How trustworthy is the information on these sites?
A report is only as good as its source; a renowned journalism portal can be trustworthy, while opinion/editorials without cited information can be misleading by their omissions, while bias and agenda can corrupt the information revealed, while honest information can be tainted by a trail of bad information.
"There are lies, damned lies and statistics"
- Mark Twain
"The problem with most quotes on the internet is that you don't know if they are true"
~ Abraham Lincoln
[/thread]
Describe the positive aspects of social networking.
A well-established form of communication, the advent of social media has created a digital society for both professional and anonymous interaction, that allows current media trends to be disseminated and obtained simultaneously and instantaneously, deferring media monopoly to privatized interest, while allowing information sources to advertise and track public interest.
How important is it in your life?
Very importantly it allows me to obtain information from contacts I would otherwise have difficulty reaching or trusting, it can be a waste of time and a misleading gathering of self-loathing where everyone is a critique arguing with everyone and themselves. It also connects analogue workers digitally to career opportunities.
What are some of their practical business uses?
Advertising prospectively raises revenue for companies, and it gives the advertising companies the ability to test public-relations campaigns against a wider audience in a smaller amount of time. It also allows potential employers to screen recruits quicker and assessing a person's social networking behavior/actions.
What is at least one key ethical issue associated with the use of social networking?
The right to not self-incriminate no longer exists for those who have published 'tweets' and 'status updates' to social networking sites. Full disclosure and admission are pertinent to much of social networking, easily documented and open to interpretation widely.
How trustworthy is the information on these sites?
A report is only as good as its source; a renowned journalism portal can be trustworthy, while opinion/editorials without cited information can be misleading by their omissions, while bias and agenda can corrupt the information revealed, while honest information can be tainted by a trail of bad information.
"There are lies, damned lies and statistics"
- Mark Twain
"The problem with most quotes on the internet is that you don't know if they are true"
~ Abraham Lincoln
[/thread]
07 April 2013
Nothing Tangible Is Worthless
Assignment Question:
For the average worker, does higher productivity result in higher wages? Clearly, higher wages means a higher standard of living. Is there a relationship between GDP and the average earnings of workers? Discuss the advantages and disadvantages of teleworking for employees.
[thread]
Productivity creates wages, wages create jobs, mandating jobs for the single goal of production do not create wages. Growing production lowers the value commodities, which serves the purpose of progress for social enterprises, but offers levels of artificial subsidized activity, often known as an industrial complex. A system of market commodity values that balance in direct conjunction with wages duly of productivity, commonly referred to as capitalism, is what survives.
Wages increase with the advent of profit from market activity in this regard, not from mere productivity despite the privatized outliers. In which private property, for instance private-sector corporate ownership, is the only effectively true form of worker-owned institutions, by means of their production leverage. This in regards to GDP only holds leverage while consumers (and likewise workers) are allowed to have capitalism, balanced by business being able to set the price (fairly in regards to anti-trust laws), balanced by absence of both subsidy and over-taxation of any income level ultimately leading to currency inflation, which further creates wage detriment.
Teleworking is flexible and limiting. Distances closed by teleworking increase efficiency and thus the related activities, but is different to open human interaction, which by any aspect is communication that is susceptible to losses in translation opposed to physical work environments, and the aptitude available of teleworking when responses to activities either cannot be done or are impeded by static limitations.
[/thread]
For the average worker, does higher productivity result in higher wages? Clearly, higher wages means a higher standard of living. Is there a relationship between GDP and the average earnings of workers? Discuss the advantages and disadvantages of teleworking for employees.
[thread]
Productivity creates wages, wages create jobs, mandating jobs for the single goal of production do not create wages. Growing production lowers the value commodities, which serves the purpose of progress for social enterprises, but offers levels of artificial subsidized activity, often known as an industrial complex. A system of market commodity values that balance in direct conjunction with wages duly of productivity, commonly referred to as capitalism, is what survives.
Wages increase with the advent of profit from market activity in this regard, not from mere productivity despite the privatized outliers. In which private property, for instance private-sector corporate ownership, is the only effectively true form of worker-owned institutions, by means of their production leverage. This in regards to GDP only holds leverage while consumers (and likewise workers) are allowed to have capitalism, balanced by business being able to set the price (fairly in regards to anti-trust laws), balanced by absence of both subsidy and over-taxation of any income level ultimately leading to currency inflation, which further creates wage detriment.
Teleworking is flexible and limiting. Distances closed by teleworking increase efficiency and thus the related activities, but is different to open human interaction, which by any aspect is communication that is susceptible to losses in translation opposed to physical work environments, and the aptitude available of teleworking when responses to activities either cannot be done or are impeded by static limitations.
[/thread]
Labels:
Abstracts,
Capitalism,
econ,
economics,
Essays,
Free Verse,
GDP,
jobs,
productivity,
teleworking,
wages
05 April 2013
For your viewing pleasure...
I have installed a "Send To Kindle" button on the page, to the right-side.
This is it; try it now, if so desired.
For anyone that has a Kindle device and account, when on any posted entry to this site, click the button in order to Send to Kindle the page being read. Simply sign-in if not already, choose which Kindle to read the article (if you have more than one), choose whether or not to archive said article in your 'uploads library', and read it in the mental state and physical luxury of your choosing. The document can easily be deleted when finished reading.
A Thousand Thanks,
MJB
This is it; try it now, if so desired.
Send to Kindle
For anyone that has a Kindle device and account, when on any posted entry to this site, click the button in order to Send to Kindle the page being read. Simply sign-in if not already, choose which Kindle to read the article (if you have more than one), choose whether or not to archive said article in your 'uploads library', and read it in the mental state and physical luxury of your choosing. The document can easily be deleted when finished reading.
A Thousand Thanks,
MJB
Subscribe to:
Posts (Atom)