Thursday, October 31, 2019

Wireless Area Network Coursework Example | Topics and Well Written Essays - 500 words

Wireless Area Network - Coursework Example Wireless network for a company of 100 employees for purpose of data sharing and printing is discussed in the paper. In a company any employee can get connected with any other computer on the network to access data collectively. Printers can be shared and data sharing becomes extremely convenient. Hardware can be shared remotely without physical connection. Applications can be used for conferencing, messaging, screen sharing and file transfers. Besides these advantages of networking, wireless networks give mobility, flexibility, range and low equipment cost over conventional wired networks. The main downside of wireless networking includes limited or slow data transfer rates because of less bandwidth available as compared to wired network. Furthermore, security threats are more. Security features have evolved over time, making intrusion difficult. There are two types of networks. Server based or infrastructure and peer to peer. Server based networks utilize central servers. These servers store data and provide to clients (connected computers on network) on request (Mitchell, 2011). Peer to peer networks have no dedicated server, and computers can act as servers and clients (Allen, 2002). Server based networks offer more security and reliability of data as it is stored centrally and is typically used for large scale corporations. Peer to peer networks are more flexible and convenient for data sharing between computers and to incorporate flexible user base. Therefore, for the company with 100 computers a peer to peer network supported by infrastructure based wireless network is most suitable. Protocols are the standards used to operate a network. Most commonly used protocols for wireless network are 802.11a/b/g and n. 802.11n is suitable for the company as it offers greater range, increased bandwidth of over 150 Mbps, improved security and can even support voice calls (DeBeasi, 2009). For security,

Tuesday, October 29, 2019

658 Essay Example | Topics and Well Written Essays - 250 words

658 - Essay Example e main reason why there is a difficulty in the United States educational reform is because the reforms have failed in changing the conditions of learning and teaching for the teachers and students (Elmore, 2004). He adds that the failure has been caused by lack of establishment of accountability frameworks, lack of support for teachers in analyzing their practices and lack of continuous learning across and within schools. The chapter is relevant to the district roles in supporting and leading reforms in the system-wide education. Elmore mentions several times that most education reforms fail to get their teaching instructional core. He demonstrates that the legislation of â€Å"No Child Left Behind† brings more pressure on reform, but does not bring focus that would be essential for classroom reforms. He also has a compelling argument regarding internal accountability as a core factor that promotes external accountability (Elmore, 2004). Therefore, it means that for the occurrence of internal accountability, there must be necessary capacities such as the focus of workload complexity, school reforms, community and parent relationships and finally student and school

Sunday, October 27, 2019

Racial Stereotypes in Disney Films

Racial Stereotypes in Disney Films Henry Giroux, in his essay Animating Youth: The Disnification Of Childrens Culture, refers to Disney films as one of the primary institutions constructing childhood culture in the United States. But by the nineties, even the urban Indian child had access to the aura of innocence and wholesome adventure that Disney animated features supposedly exhibited. Fairytale adaptations such as Sleeping Beauty and Snow White and The Seven Dwarfs(1937), became immensely popular and as the 22 Billion Dollar Disney enterprise furthered its ventures, Disney films became synonymous with well loved Childrens movies, both abroad and at home. The objective of Disney films was to transport its viewers to a magical realm of enchantment and endless possibility. Disney offered a supposed alternate paradigm in which there was the promise of a Happily Ever After. It aimed at appealing to audiences young and old and hoped to find a universal market. Walt Disney once stated that Of all of our inventions for mass communication, pictures still speak the most universally understood language. And although it did reach audiences far and wide, for a young Indian girl watching The 1937 Disney adaptation of Snow White and The Seven Dwarfs, it gave her very little to identify with or relate to. Snow White, the first on-screen Disney Princess was rendered With lips as red as rubies and skin as fair as snow. Blatantly epitomising Western ideas of femininity and beauty, films like Snow White alienated the Non-western viewer. It was a fantasy that was centred on fixed archetypes of beauty and desirability which catered to the white, western population and had no room for anybody else. Eventually, the industry was criticised for its focus on a singular ethos and racial presentation. Thus, the last decade of the 20th century saw Walt Disney Pictures release films that were now aimed at broadening its cultural spectrum. Alladin, debuted as Disneys first attempt to explore a different cultural terrain. Released in 1992, it was later followed by other culture specific films like Mulan and Pocahontas which opened in cinemas in 1998 and 1995 respectively. Although this new brand of films hoped to establish a sense of cultural inclusivity by venturing beyond the Western World, what became clearly evident in the process, was a heavy dependence on Despite an apparent interest in spreading the knowledge of distant cultures, these films drew excessively on racial stereotypes and produced a largely distorted idea of the cultures they depicted. Elena Di Giovanni, in her essay Disney Films: Reflections of the Other and the Self, notes that Disneys selection of certain cultures which it chose to portray, was not a choice that was arbitrary and unplanned. According to Di Giovanni, the reasons for selecting these cultures can be ascribed to precise cultural and ideological strategies. The cultures depicted in these films are either conventionally considered to be somehow inferior if juxtaposed with modern Western Civilisations and to the narrating American culture in particular, as suggested by the Saudi Arabian-born scholar Ziauddin Sardar. Otherwise,they refer to prior stages of social and cultural development in comparison to the contemporary American standards. These films rely almost exclusively on conventional cultural metonymies to build the representations of the Other. In historical terms, the tradition of representing otherness through a filtered Gaze finds its roots in Western colonialism. With consolidated efforts made by the colonizers to impose their own cultural, linguistic parameters on the subjugated populations of the so-called East, moulding the image of the Other according to their own needs was a means to reinforce their own identity and supremacy. The dissemination of biased representations of non-Western cultures flourished even beyond the decades of colonial expansion, manifesting itself in various different forms, ranging from pop culture to international relations. One of the first scholars to give a sharp account of these biased cultural encounters was Edward Said in Orientalisrn(1978). Even though primarily concerned with tracing the history of the Orientalist attitude by the West in literature, Said does not fail to consider the importance of new technologies and the media in the proliferation of this unjust tradition: One aspect of the electronic, post-modern world is that there has been a reinforcement of the stereotypes by which the Orient is viewed. Television, films, and all the medias resources have forced information into more and more standardized moulds. More recently, Ziauddin Sardar has echoed similar ideas in his 1999 publication of Orientalism, a book he writes, as assort of tribute to Saids work, therefore titling it the same. The main interest of Sardars book, whose approach is even harsher than Saids, lies in his detailed reflections upon the new, modern ways by which the Orientalist attitude manifests itself and is still spreading nowadays. By way of introduction to his work, Sardar declares that even though the project of Orientalism has way passed its sell by date, it is colonizing new territories, such new territories being related to the new geographies which are shaped and controlled by contemporary means of mass cornmunication like the cinema. A whole chapter of Sardars work is devoted to Orientalism in films, where the author sets out to explore the treatment and manipulation of other cultures within the discourse of cinema, across different genres, including cartoons, and where he makes ample reference to the Americ an hegemonic control of the cinematic medium. Sardar states that otherness is generally treated as a pattern book from which strands can be taken to draw up cultural representations which serve the purpose of entertaining audiences while reinforcing, by contrast, the superiority of the narrating culture. Thus, the the commodification of culture takes place whereby visual and verbal elements belonging to a distant world are taken and made suitable for smooth reception within more powerful socio-cultural settings. Aladdin, which was based on the Arab  folktale  of  Aladdin and the magic lamp  from One Thousand and One Nights, became the most successful film of 1992, grossing over $502 million worldwide. However, almost instantly, it was met with criticism from the American-Arab Anti-Discrimination Committee. The movie quite literally translated into an Orientalist fantasy. With glaringly derogatory depictions of Arab culture, and a few pointedly offensive remarks, the movie has gone down in history as one of the most controversial films. The film portrays all Arab men as street thugs, pickpockets, emasculated palace guards, beggars, sultans, or sorcerers. A male character early in the film even declares to his master upon stealing a jewel, I had to slit a few throats, but I got it. The men are short and stocky with thick lips, missing teeth, heavy, menacing brows, and hooked noses, while the hero Aladdin and heroine Jasmine look like suburban, white, U.S. teenagers.  Jasmine, though sporting dark flowing hair and with darker skin than her counterpart princesses in earlier films, still retains blue eyes. Though Jasmine must represent the Arabian heritage, the films producers seem to find it necessary to leave at least a vestige of tangibility that Western audiences can relate to. In the same vein, the character of Alladin, seems to disinherit his Arabian roots, as hes cleverly christened Al, and exhibits distinctly American mannerisms throughout the film. What one is left to ponder is whether these characters would have appealed to western audiences, had they not been endowed with these traits? And if so, why? Arabs are shown as gratuitously cruel, with characters making several references to beheading. One Arab merchant even tries to cut off Jasmines hand when she doesnt have money to pay for an apple she gave to a hungry boy.   Most noteworthy, however is the opening sequence of the film, which was later revised due to harsh criticism and protests. Aladdin  opens with the expository song Arabian Nights which includes the lyrics PEDDLER: Oh I come from a land From a faraway place Where the caravan camels roam Where they cut off your ear If they dont like your face Its barbaric, but hey, its home The blatantly offensive final line had to be eliminated from the home video version of the film as a consequence of the numerous protests the Disney Company received after international release. However, all the other subtle and indirect hints at the American cultures position of supremacy over the narrated Other, which is deliberately kept ambiguous and undefined in historical-geographical terms, remain untouched, and continue to carefully shape the viewers perception. One of these subtle instances in the movie can be seen in the same opening sequence. The first words which are uttered by the peddler contain an unmistakable, conventional reference to the culture portrayed: PEDDLER: Ah, Salaam and good evening to you worthy friends. The worldwide-known Arabic greeting is, however, immediately followed by good evening, as if to compensate even for the faintest sense of estrangement the viewer might feel upon hearing salaam. Orientalist preconceptions find their way into the Disney adaptation of the Chinese legend of Hua Mulan. Walt Disney Pictures released Mulan in June, 1998 and it was the thirty sixth animated feature in the Walt Disney Animated Classics. Mulan, which was once again infused with orientalist imagining of culture, uses a host of long-established, worldwide-known stereotypes on the visual as well as verbal levels. As Elina Di Giovanni points out, cultural metonymies are very often related to specific domains such as food, which provides universally identifiable socio-cultural references and ensures easy, if strongly stereotyped identification of different nations and peoples. In the case of verbal stereotypes, references to other cultures clichà ©d words and expressions tend to draw from common categories such as greetings, exclamations and titles. Greetings and exclamations, though not necessarily connected to the stereotyping of cultures, can nonetheless be frequently used to support cultural representations as they ensure simple and immediate identification. In the opening sequence of Mulan, the 1998 film which portrays the Chinese culture at the time of the invasions by the Huns, the visual and verbal cultural stereotypes employed do not contain any derogatory reference, but they are equally highly conventional. An instance of this can be seen in the portrayal and dialogue of the emperor of China who, incidentally, is always shown with the image of a golden dragon at his back to address his army generals in a situation of emergency. He is shown to exhibit a typical trait which is often associated with the Chinese culture, using words of wisdom to describe the fate of his country: EMPEROR: single grain of rice can tip the scale Moreover, one can note that the reference to the most popular element of the Chinese culinary tradition does not appear by coincidence in the emperors line. The shot which immediately follows features a large bowl of rice in the foreground with a pair of chopsticks lazily picking at the rice. This image is used in the film to introduce the protagonist herself, who will be very slowly revealed to the audience starting from her hand holding the chopsticks. But even more noteworthy, is that fact that the bowl of rice which alluded to in the beginning by the Emperor, and used in the introducing of the protagonist, Mulan is then later appropriated to serve American cultural interests by replacing the contents of the bowl(rice), with porridge and rashers of bacon and fried eggs, which make up Mulans breakfast. The bowl which contained rice in the opening scene has been deprived of its typical, if also highly conventional, Chinese content to be replaced by what looks more familiar to the American viewers, although totally remote from the eating habits of Chinese soldiers. Moving from visual to verbal examples, the use of language is an obvious vehicle for further consolidating the presence of American culture. It is worth pointing out that all the main characters in the films, although belonging to distant and exotic worlds, speak with perfect American accents. Moreover, they are very often characterized by the use of non-standard, colloquial or regional varieties of American English. This is the case of the dragon Mushu in Mulan, whose dialogue is generously punctuated with contemporary, informal American expressions. Similarly, in Aladdin, the most striking, informal and modem use of Ameriean English is to be found in the lines uttered by the genie of the lamp, appearing in different guises and often mimicking famous American personalities. His lines are filled with colloquial expressions as well as references to the contemporary American world. Pocahontas, which opened in cinemas in the year 1995, presented a thoroughly revised picture of a historical figure, appropriated suitably to appeal to western audiences. Modelled on the historical Native American figure ,Matoaka, who is more popularly known by the nickname Pocahontas, the film revamps and restructures the story of Pocahontas and showcases it as a tale where a culture under siege by British Colonialism, ends up being rescued by the White Messiah. The film clearly distorts historical facts and produces a tale that is made palatable to western audiences, with the White Settler rescuing the native tribe from a terrible fate, which, interestingly enough, would have been executed by his fellow men. The movie Pocahontas deviates from the true historical story in many ways. The most significant deviation is Pocahontas age and the nature of her relationship with John Smith. In the movie, Pocahontas is portrayed as a twenty year old woman who falls in love with John Smith, and he with her. From what we know of the historical record, she [Pocahontas] was a child when they met, probably between 12 and 14, and Smith was about 27, states Thomasina Jordan, the head of the Virginia Council on Indians, and herself a Wampanoag Native-American. However, it is not just her age that has been altered in the film version. Even her physical appearance is rendered far from factual. The on-screen Pocahontas is designed to be a tall, attractive figure, with dark, flowing hair and sharp features. This depiction in the film has been clearly designed to cater to the male fantasy of the young, exotic woman. Moulded from the Orientalist perspective, she is seen as the enigmatic princess, who captivates the young John Smith with her gentle spirit and exotic beauty. Moreover, the relationship between John Smith and Pocahontas, was that of a young girl and an older man. The relationship that the two share in the movie is entirely fictitious and completely inaccurate. Another deviation is John Smiths attitude towards the Native Americans. In the movie, Smith defends the Native-Americans, and dons the mantle of the White Messiah. Abandoning his fellow men, Smith advocates the legitimate right of the natives to possess their own land. He states that the British are the intruders and have no authority to colonise and usurp the land of the natives. This heroism, is however absent in factual accounts of the story. In reality, Smith believed that the English had a right to the land and he was not an advocate for the Native-Americans. Disney also distorts the facts about Governor James Ratcliffe. In the movie they portray him as a villainous character. At the end of the movie he tries to shoot Chief Powatan, but shoots John Smith instead. After he does this, his own men make him a prisoner and send him back to England. However, this is not confirmed in the historical account. Thus, it is evident, that even through Disneys attempt to create a more panoramic view of Society and the world, by retelling tales rooted in different socio-cultutal contexts, it is unable to rid itself of omniscient Western ideals which dictate the ways in which Non-western cultures are received. The non-western cultures can only be understood when either juxtaposed with western traditions or appropriated to appeal to a western audience. The appeal of a non-white prince must be countered with distinctly Americanised mannerisms. Tales from the East seem only to be tangible if they propagate long standing stereotypes and reinforce Orientalist preconceptions. While Disney paints portraits of cultural landscapes and attempts to traverse into the world of The Other, the question remains as to whether it is possible for the West to tell tales of a Non-White civilisation, without all the trappings of stereotypes and exoticism. Can a Media Giant like Disney truly showcase different cultures, without insinuating Western Supremacy over them all? Can they truly paint with all the colours of The Wind? Zoya Parvin Roll No. 19 III A

Friday, October 25, 2019

Womens Inferior Status in The Bible Essay -- Status of Women in the B

Corinthians 14:34 states, â€Å"Let the women keep silence in the churches: for it is not permitted unto them to speak; but let them be in subjection, as also saith the law† (Holy Bible, King James Edition). Edith Hamilton, "recognized as the greatest woman Classicist", says that the Bible is the only book before our century that looked to women as human beings, no better nor worse than men (Tanner). However, it cannot be said that this book was consistently favorable to women. Maybe not absolutely, but conditionally in personal opinion, the Bible shows numerous examples of a woman’s inferiority to men, an assessment that has been translated into the cultures of generations. In this essay I will address briefly instances in the bible pertaining to women, and continue on with thoughts on how I believe these notions have been interpreted into society. Interpretations of the Bible are influential to our society because in the United States, approximately eighty-three percent of the population is Christian, according to a poll performed by ABC News. Perhaps the Bible is written with women subservient to men because the very story of creation is written as such. Genesis serves as the foundation of not only our universe, but also the religious text. In the biblical story of creation, Adam came first, then came the animals, and then last of all came Eve, putting the origin of women last. Then, it is Eve who is vulnerable enough for evil to deceive her into taking the apple and she who persuades Adam to follow her example. This sets up a basis that women are inherently weak and sinful for the rest of the faith to be built upon. (Stanton) The negative view of the female sex continues in Leviticus, in a section dictating the re... ... a merely a reflection of Hebrew society of the time (Stanton). Jesus Christ, being a reformer, should have improved the status of women with his message of love and acceptance. However, there is no denying that the stigma is carried with women into the present day. Women’s position in society can be greatly attributed to their depiction in religious text. Holy word is still a factor in making women more susceptible, more culpable, and more sinful an impure than men. Even as women move up in the social order, religion is timeless and ever bearing on the struggle women fight for sexual equality. Works Cited The Holy Bible. New York: Penguin, 1994. Print. King James Version. Stanton, Elizabeth Cady, et al. The Woman’s Bible . Salem: Ayer Company, Publishers, 1988. Tanner, Stephen L. Women in Literature of the Old Testament. University of Idaho, 1975.

Thursday, October 24, 2019

Metaphors in Poetry Essay

The use of metaphor in poetry is one of the most important aspects of poetic style that must be mastered. Metaphor can be described as figure of speech in which a thing is referred to as being something that it resembles. For example, a fierce person can be referred to as a tiger. Another example of a metaphor would be the description of a person who was uncommunicative as being as â€Å"silent as stone†. The word stone is an image that is used to explain the intense silence of the person. In this way, metaphors are used in poetry to explain and elucidate emotions, feelings, relationships other elements that could not to described in ordinary language. Poets also use metaphor as a way of explaining or referring to something in a brief but effective way. An easy way to understand metaphor is to view a metaphor as a simile without the word â€Å"like†. A simile compares two things in a clear fashion. For example: â€Å"he is like a beast†. Another example of a simile would be to say that the man is so fierce that he is like a tiger. A metaphor assumes that the relationship will be understood without the interlinking word â€Å"like†. Metaphor works on many levels in poetry. The best way to show how a metaphor function is to study the use of sustained metaphor. Sustained metaphor refers to a metaphor that consistently runs through the entire poem and is therefore easily identifiable. Metaphors that are sustained also provide a depth and inner complexity to the poem.

Wednesday, October 23, 2019

Crime in the 21st Century: Technology and Terrorism Essay

It is an accepted fact that globalization has been a dominant development of the 21st century. Together with globalization, the major crimes in the 21st century became also global in scope and nature. The website policy-traccc. gmu. edu/ (2008) cited Louise I. Shelley, Director of George Mason University School of Public Policy as saying that â€Å"Terrorists and transnational crime groups will proliferate because these crime groups are major beneficiaries of globalization. They take advantage of increased travel, trade, rapid money movements† (1st para. ). Based from the statement, the major crimes in the 21st century in the likes of Sept. 11, 2001 of World Trade Center and the subsequent activities of Al Queda were considered as terrorist-related crimes. Terrorism which is domestic in nature was defined by www. tfft. co. uk (2008) through Boaz Ganor, an expert in the same field as â€Å"the intentional use of, or threat to use violence against civilians or against civilian targets, in order to attain political aims. †(1st para. ). Based on the definition, the target victims of domestic terrorism were the local population of a particular community or communities within a country. Kofi Annan, the UN Secretary General define international terrorism as â€Å"any action intended to kill or seriously harm civilians or non-combatants, with the purpose of intimidating a population or compelling action by a government or international organization† (â€Å"Discussion of definitions and the possibility of amalgamation†, 4th par. ). In both definitions, the use of violence, the target are individuals or a country or an international organization and the purpose is to attain political objectives were the salient points. Related to use of violence against individuals or an international organization, experience in 9/11 bombing will tell us that the impact of terrorist act is much intense when it was done in a surprise manner. In this age of great technological advancement, it is imperative for a government to use technology to pre- empt terrorist acts which usually result to great destruction of lives and properties. In order to promote development of anti-terrorism technology, the US Congress after the 9/11 has acted decisively and passed the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act. This act provides protection to sellers, manufacturers, distributors and providers of hi-tech anti-terrorism gadgets and instruments. As a result, about 200 different companies were awarded the SAFETY Act certification. (Cafarano, 2008). This paper aims to document the availability of the latest high technology instruments, what is the principle behind such instrument and elucidate how the government is using the gadgets to 2 pre-empt surprise terrorist attacks. It was mentioned by Louise I. Shelley, Director of George Mason University School of Public Policy that terrorists usually use the benefits of globalization related to increased travel, trade and rapid money movements. This was the reason why terrorists were always associated with urban centers, buses, airplanes, airports and places where people usually congregate. The following are the popular ant- terrorism gadgets so far invented: The Anti Human-Bomb Bus In Israel and Iraq, the suicide bomber is one of the most deadly threats to innocent citizens. Numerous prevention techniques have been developed to address this problematic threat. According to Holmes, et al (2005), in Israel bus system, a new technology aimed at preventing suicide bombers from boarding a bus was invented and being used at present. This is achieved by detecting explosives from approaching passengers. Developed by Israeli Military Industries, the system takes the form of turnstile fitted with shield sensors. The sensors can detect explosives at a distance of up to a meter from the bus. When the sensor detect a suspicious passenger, the turnstile remains blocked and a red warning light flashes near the bus driver. A green light flashes when a boarding passenger is not a threat. Another turnstile at the rear of the bus allows passenger to get off the rear but not board it in cases of emergencies. The bus windows were bullet and shrapnel – proof and a communication system can allow the driver to talk to waiting passengers outside and call for help in emergencies. A bus with these features costs $25,000. 00. Rapiscan Airport Scanner This technology was developed as an answer to the improvements needed with neutron and ion detector technology (Panel on Assessment of the Practicality of Pulsed Fast Neutron Transmission Spectroscopy for Aviation Security, 2008) According to the Panel, the drawback of the two technology instruments earlier developed is that it cannot detect explosives and other materials if hidden under lead cover and plastic materials. According to Holmes, et al , the instrument was called Rapiscan Secure 1000 and function by scanning the passenger like a virtual strip search. The machine uses a low-level reflective x-ray technology to scan a person’s body through their clothing thus showing clearly metal objects like guns and explosives wrapped in plastics. Civil liberties advocates were opposed in using it due to the virtual strip effect. The technology has been considered for compulsory use in airports. The potential of people being embarrassed due to virtual strip effect of the scanner can be avoided by separating the male from female. The eXaminer This is an advanced form of Explosive Detection System (EDS) and is currency being used in the Middle East although the technology is still being perfected in the US according to Holmes,et al. The instrument is called the Examiner 3DX600 and being used to detect explosives in baggage and not from people. This instrument uses advanced Computer Tomography that result to complete 3D image reconstruction of entire bags and analyzes any potential hazards from the baggage without the need for opening it. This reduces the likelihood of exposure of staff to hazardous stuff inside the baggage. . This EDS can completely and continuously scan over 500 bags an hour. Radio Frequency Identification (RFID) Technology and Biometrics This new system is called US-VISIT. It scans photographs of the visitor’s face and index finger into a computer and matched with the criminal data base of the federal agencies. According to infowars. com (2005), the RFID technology practically is an invisible automatic ID check by the government and has long been needed in clogged border system of most countries particularly the US. With RIFD technology, people or objects are identified automatically and swiftly. The technology allow vehicles outfitted with the technology to pass through toll plazas without stopping but will be stopped in borders if their identifying data produce red flags; if otherwise, they will just be stopped for a brief check without lengthy questioning. The website declared that â€Å"U. S. officials want to see if the same technology that speeds cars through highway tolls and identifies lost pets can unclog border crossings without compromising security†. As part of the biometric data base, foreign visitors at the 50 busiest land border crossings in 10 states of the US are now being fingerprinted. The chips with identifying information will be placed in a document such as the State Department issued border crossing cards for those making regular short trips across the Mexican border. The chips can also be attached to an antenna that transmit data to a handheld or stationary reader which then converts the radio waves from the RFID tag into a code that links to identifying biometric information in a computer database of border agents. The use of biometrics which involve the physiological and behavioral characteristics for identification purposes has been initiated by the US to enhance security and identification (Batch, et al, 2006). There 4 were considerations however related to its wide scale collection like its practicality and social impact which infringe on self’s autonomy. To address the concerns, the NRC and the CIA were undertaking comprehensive assessments on current biometric capabilities and future possibilities. Summary and Conclusion It was documented that 21st century crimes were mostly international terrorism in nature and can be linked to advances in technology and globalization especially with the ease of international travel and readily available financing through electronic money transfers. Since terrorists were using the technological advances in doing their crimes to achieve their political aims, the countries were also doing its best to encourage companies and individuals to develop technologically advanced gadgets to pre-empt surprise attacks which were the very common style of terrorist activities. In the US, a total of over 200 companies were registered and given the incentive of being free from legal suit and damages for them to continue their business of inventing instruments aimed at pre-empting terrorism. Only a few newly invented gadgets were available in literature. A number of them being done by the 200 companies according to unwritten sources were highly confidential in nature and therefore no literature yet are available. This was being done by the US Defense Department so that the terrorist themselves will be surprised that their planned acts of terrorism has been long monitored and therefore will think twice before implementing their plan. Surprise attack and defense has been the name of the game against terrorists. The new gadgets documented in this paper were living proof that government is not winking their eyes even for a moment and always several steps ahead of terrorist plans. The government was aware that terrorism cannot be stopped and can only be prevented from happening for the time being but the plan and danger will always be there as experienced in 9/11 bombing. Terrorism is man- made and the inspiration which fuel terrorist acts is a product of an insane mind. This cowardice act can only survive in a society which is ill- prepared and whose ideals were blurred by the blinding light of success and achievements. After the 9/11 incident, we can no longer judge the readiness of one country towards terrorism. The technological advances made it possible to hide all the preparations and readiness in the pretext that everything is topsy-turvy and no one dares to make the first move. Technology will save us all. 5 References Batch, K. , Millett, L. , and Pato, J. (2006). Summary of a Workshop on the Technology, Policy, and Cultural Dimensions of Biometric Systems. Washington. National Academy of Sciences. 62 pp. Cafarano, J. (2008). Backgrounder #213:Fighting Terrorism, Addressing Liability: A Global Proposal. May 21, 2008. The Heritage Foundation. Retrieved November 8, 2008 from http://www. heritage. org/Research/NationalSecurity/bg2138. cfm Holmes, A. , Abarra, O. , Chamberlain, A. , Chan, W. , Ho, K. , Hsiao, A. , Von Lendeiner, J. and Nusibeth, Z. (2005). Technologies for Fighting Terrorism. 2004/2005. Retrieved November 8, 2008 from http://www. tfft. co. uk/Files/Report. pdf Infowars. com (2005). Radio Technology to Fight Terrorism. TechNewsWorld. February 5, 2005. Retrieved November 9, 2008 from http://www. infowars. com/articles/bb/radio_tech_to_fight_terrorism. htm Panel on Assessment of the Practicality of Pulsed Fast Neutron Transmission Spectroscopy for Aviation Security, Commission on Engineering and Technical Systems, National Research Council (1999). The Practicality of Pulsed Fast Neutron Transmission Spectroscopy for Aviation Security. Washington. National Academy of Sciences. 58 pp. Shelley, L. (2008). TraCC: Devoted to understanding of crime scope and causes and to formulating policy to reduce the problem. George Mason University School of Public Policy. Retrieved November 8, 2008 from http://policy-traccc. gmu. edu/ Tfft. co. uk. (ca 2007). Discussion of definitions and the possibility of amalgamation. Technologies for Fighting Terrorism. Retrieved November 8, 2008 from http://www. tfft. co. uk/ApproachEnd. htm