Thursday, October 31, 2019

Chapter 6 and ch 9 Article Example | Topics and Well Written Essays - 250 words

Chapter 6 and ch 9 - Article Example The case study has rightly highlighted the plea of an 80-year-old woman, who could not handle the hot coffee properly, resulting in her splitting same on her ankles. The judge has passed the right decision. However, there cannot be any hard rules that can specify the ethical responsibilities to be matched with the product quality, as each individual case is different. This is a case of â€Å"might is right†. The bigger companies with huge funds for market promotion use â€Å"slotting fees† phenomenon as a method to increase their sales volume. However, this keeps the smaller and medium manufacturers out of the competition. On the other hand, the customers who are satisfied with lesser-known brands may not be able to find these products on the shelves of a store. The market economy does not require that bigger sharks eat away the smaller fishes. Instead, it allows the fair competition to grow in a healthy manner. In addition, the established companies may not even try to improve their product quality as they ensure their increased sales through such

Tuesday, October 29, 2019

Choosing a song that meets the requirements below on the discription Assignment

Choosing a song that meets the requirements below on the discription box - Assignment Example One inarguable fact is that many individuals have a high disregard and skepticism of the hip-hop music without having the knowledge of the music’s content. Usually, this disregard of the hip-hop music links to the hip-hop’s abrupt bass line intensity and the manner of presenting the music genre’s content. Many people have an opinionated argument that the content presentation style is unappealing and un-soothing to listen. Conversely, there are those who deeply love the music genre (Olshansky 266). The question that, therefore, pegs is that, is hip-hop valuable? In contradiction to my personal preference of hip-hop music, the research herein rationally and justifiably discusses the reasons for the valuation of the song. People should erase the negative view, disregard, and overlook towards hip-hop music to derive the variety of positive messages their content present particularly the Forever Young song (Olshansky 268). We shall never know whether hip-hop music is valuable or not unless we allow ourselves to adopt a new positive way of viewing the music. The positive view of the hip-hop will consequently enable us to take the time to listen to the content presented by the music genre. Many people fail to see the value of the hip-hop music only because they disregard it. However, in reality, hip-hop music is highly valuable. Hip-hop music always, if not in all occasions, provides a reflection of the real happenings occurring in our daily lives and the society. In this regard, therefore, hip-hop music is a mirror of the real issues, problems, and factors virtually affecting all undertakings of the human life. Hip-Hop music is valuable in the sense that it continually serves as a means of expression to represent our identity and the real happenings in nature. For instance, the song’s lyric Hoping for the best but expecting the worst is a real reflection of life’s nature. It is an open fact that indeed every individual is living a life where no one has

Sunday, October 27, 2019

Rowhammer and Microarchitectural Attacks

Rowhammer and Microarchitectural Attacks Problem 1: Hardware Oriented Security and Trust Problem 2: Wireless Networking Problem 1 Introduction The analyzed paper deals with Side-Channel attacks on mobile devices, providing a thorough categorization based on several factors. Side-channel attacks aims to extract sensitive information taking advantage of apparently harmless information leakage of computing devices, both from the SW and HW point of view. Side-channel attacks are initially categorized as active or passive, depending on the level of influence and involvement the attack has on the system. The concept of Software and Hardware attacks are identified to separate attacks that exploit, respectively, logical and physical properties of a device. Also the distance of an attacker is a relevant element in the analysis of Side-channel attacks. The authors distinguish among Local, Vicinity and Remote Side Channel Attacks, depending on how close is the attacker to the attacked device. A comprehensive list of examples for every type of attacks is given, along with a constructive discussion on possible countermeasures. In this report, we will focus on the Rowhammer and Microarchitectural attacks that will be discussed in the following paragraphs. a) Rowhammer Attack As miniaturization of hardware architectures is pushed more and more, the density of memory cells of the DRAM drives the size of these cells to a dramatic reduction in dimensions. For the intrinsic properties of DRAMs, this leads to a decreases in the charge of single cells and could cause electromagnetic coupling effects between cells. Rowhammer attack takes advantage of this Hardware vulnerability. a.i) Principle The Rowhammer glitch takes place in a densely-populated cell hardware environment allowing an attacker to modify memory cells without directly accessing it. The aforementioned vulnerability in DRAM cells can be exploited by repeatedly accessing a certain physical memory location until a bit flips in an adjacent cell. A well-orchestrated Rowhammer attack could have devastating power, even getting to have root privileges. Rowhammer base its strength on a principle called Flip Feng Shui [2] where the attacker abuses the physical memory allocator to strike precise hardware locations and cause bits to flip in attacker-chosen sensitive data. Rowhammer can be either probabilistic [3] or deterministic [4]. The latter shows a greater impact as the lack of control of the first one could corrupt unintended data. The most effective Rowhammer attack is the double-sided Rowhammer [5], capable of having more flips in less time than other approaches. a.ii) Architecture The objective of Rowhammer attack is the DRAM. DRAM usually stores electric charges in an array of cells, typically implemented through a capacitor and an access transistor. Cells are then organized in rows. Thus memory cells inherently have a limited retention time and they have to be refreshed regularly in order to keep their data. From an OS point of view, a page frame is the smallest fixed-length adjacent block of physical memory that maps an OS memory page. From a DRAM point of view, a page frame is just a contiguous collection of memory cells with a fixed page size (usually 4KB). With this in mind, triggering bit flips through Rowhammer is basically a race against the DRAM internal memory refresh scheme to have enough memory accesses and cause sufficient disturbance to adjacent rows. a.iii) Instruction Set Architecture The Instruction Set Architecture (ISA) is a functional specification of a processor programming interface. It is used to abstract over microarchitecture implementation details (e.g. pipelines, issue slots and caches) that are functionally irrelevant to a programmer. Even though it is practically transparent, the microarchitecture incorporates a hidden state, which can be observed in several ways. To test whether Rowhammer can be exploited, a precise knowledge of memory cells dimension is crucial. In mobile devices, ARM processor represents the most widespread and used microprocessor. In [4] the authors determine the minimum memory access time that still results in bit flips by hammering 5MB of physical memory while increasing the time between two read operations by means of inserting NOP instructions. The rows are all initialized to a certain value, therefore all the changes are due to Rowhammer. Results show that up to 150 bit flips happen per minutes with around 150 ns read time. a.iv) Procedure The Rowhammer attack procedure is a combination of three main system primitives: P1. Fast Uncached Memory Access: Enable attackers to activate alternating rows in each bank fast enough to trigger the Rowhammer bug; P2. Physical Memory Massaging: The attacker tricks the victim component into storing security-sensitive data (e.g., a page table) in an attacker-chosen, vulnerable physical memory page. P3. Physical Memory Addressing: To perform double-sided Rowhammer, an attacker needs to repeatedly access specific physical memory pages. Mobile devices have Direct Memory Access (DMA) mechanisms that facilitates the implementation of P1 and P3. In particular, Android devices run ION, a DMA that allows user unprivileged apps to access uncached physically contiguous memory. To enforce P2 the attacker tricks the physical memory allocator built in Linux (buddy allocator) so as to partition the memory in a predictable way. Accurately selecting the dimensions of memory chunks to allocate, memory cells can be exhausted through Phys Feng Shui. Once the position of Page Table Pages (PTPs) and Page Table Entries (PTEs) is indirectly known, double-sided Rowhammer is performed. Once the desired flip triggered, write access is gained to the page table by mapping into the attacker address space. Modifying one of the attacker PTPs, any page in physical memory can be accessed, including kernel memory. b) Microarchitectural attack  ­The evolution of hardware architecture lead to a wide use of cache memories. Having several levels of cache between a CPU and the main memory, helps optimizing the memory access time with respect to the clock frequency. Microarchitectural attacks take advantage of the timing behavior of caches (e.g. execution times, memory accesses) to read into sensitive information. In [6] a comprehensive survey that presents microarchitectural attacks is given. b.i) Principle Microarchitectural attacks are based on different cache exploitations. Among them, three main methods are identified: Prime + Probe: The attacker fills one or more sets of the cache with its own lines. Once the victim has executed, the attacker accesses its previously-loaded lines, to probe if any were evicted showing the victim have modified an address mapping the same set. Flush + Reload: Its the inverse of Prime+Probe where the attacker first flushes a shared line of interest. Once the victim has executed, the attacker then reloads the evicted line by touching it, measuring the time taken. A fast reload indicates that the victim touched this line (reloading it), while a slow reload indicates that it didnt. Evict + Time: The attacker first tricks the victim to run, through the preload of its working set, and establish a baseline execution time. In a second step the attacker then eliminates a line and runs the victim again. The difference in execution time indicates that the analyzed line was accessed. All microarchitectural attacks are a combination of those previously explained principles. Another noteworthy approach is causing Denial of Service (DoS) saturating the lower-level cache bus [7]. .b.ii) Architecture As mentioned before, microarchitectural attacks objective is the cache. Caches are organized into lines. A cache line holds a block of adjacent bytes that are taken from memory. Cache are further organized in levels. Each level has a different size and is carefully selected to balance service time to the next highest (smaller in dimension therefore faster) level. Caches can enforce either Virtual or Physical addressing. In Virtual addressing, L1 cache level stores the index of virtual-to-physical addresses. .b.iii) Instruction Set Architecture The inference process of the internal state of the cache is a key parameter to perform devastating microarchitectural attacks. Analyzing the ISA of a cache can provide an attacker with useful information about the hardware structure. Several different states can be exploited and are briefly summarized here: Thread-shared State: cache stores information that are shared between threads. Accessing them could lead to performance degradation of the involved threads. Core-shared state: Analyzing L1 and L2 cache contention usage between competing threads, it is possible to infer the encryption keys for algorithm used in internal communication (e.g. RSA, AES). Package-shared State: Running a program concurrently in different cores residing in the same package, could lead to the saturation of that packages last-level cache (LLC). The saturation affects all the lower levels, exposing sensitive data. Numa-shared State: Memory controllers memory in multi-core systems are exploited to enforce DoS attacks. .b.iv) Procedure A plethora of attacks are presented in [6], therefore the procedure of the Flush + Reload for Android systems using ARM processors [8] is discussed. The most powerful methods to perform Flush + Reload is to use the Linux System Call clflush. However it is provided by the OS on x86 systems, on mobile devices using ARM this function is not available. A less powerful version of it is clearcache and is used in [8]. When the attack starts, the service component inside the attacker app creates a new thread, which calls into its native component to conduct Flush-Reload operations in the background: Flush: The attacker invokes clearcache to flush a function in the code section of this shared line. Flush-Reload interval: The attacker waits for a fixed time for the victim to execute the function. Reload: The attacker executes the function and measures the time of execution. With a small execution time, the function has been executed (from L2 cache) by some other apps (possibly the victims). In [8] the authors show that this method is capable of detecting hardware events (touchscreen interrupts, credit card scanning) and also tracing software executions paths. c) Rowhammer vs Microarchitectural attack Following the categorization used in [1], both Rowhammer and Microarchitectural attacks are active software attacks that exploits physical properties of the victim device. In particular Rowhammer uses the coupling effect of DRAM cells while Microarchitectural attacks gather sensitive information through the analysis of cache timing. The two attacks act at two different levels: while Rowhammer needs to work fast on an uncached DRAM, Microarchitectural attack objective are cache memories that are usually SRAM. Both of them can be applied to desktop and to mobile OS [4][8], as well as cloud environments. c) Mobile vs Desktop attacks Mobile devices are inherently more vulnerable than Desktop computers. Their portability and close integration with everyday life make them more available to attackers. Moreover, apps are way more easy to install on mobile devices and general carelessness helps hackers in installing malicious software. Also, with respect to desktop computers, mobile phones have several sensors that can be exploited to gather information about users behavior. But from a OS point of view, mobile OS are way more limited than Desktop OS. Specifically, Rowhammer suffers from the limited subset of features available in desktop environments (e.g. no support for huge pages, memory deduplication, MMU paravirtualization). Same limitations happens in Microarchitectural attacks for ARM , where clflush function to perform Flush + Reload is not supported. 2) NAND Mirroring NAND mirroring is categorized in [1] as an active local Side Channel attack that exploits physical properties out of a device chip. In particular, in [13] a NAND mirroring attack is performed on an iPhone 5c. The security of Apple iPhone 5c became an objective of study after FBI recovered such mobile device from a terrorist suspect in December 2015. As FBI was unable to retrieve data, NAND mirroring was suggested by Apple technology specialists as an optimal way to gain unlimited passcode attempts so as to bruteforce it. As the encryption key is not accessible from runtime code and its hardcoded in the CPU, it is impossible to brute-force the Passcode key without the getting at the hardware level. In iPhones such memory is a NAND flash memory. In NAND memories the cells are connected in series which reduces the cell size, but increases the number of faulty cells. For this reason, external error correction strategies are required. To help with that, NAND memory allocates additional sp ace for error correction data. In [13] the authors desoldered the NAND memory and mirrored it on a backup file. Although this method seems promising, several challenges were encountered by the authors, who had to balance some electrical anomalies with additional circuitry and also mechanically plug in a PCB at every attempt of bruteforcing the iPhone code. Such method could be applied to Desktop Computers, but the complexity of NAND memories would be way higher and it may unfeasible, in terms of time and complexity, to perform such attack. Countermeasures Side-channel attacks are discovered and presented to the scientific world on a daily basis and suitable defense mechanisms are often not yet implemented or cannot be simply deployed. Even though countermeasures are being studied, it looks like a race between attackers and system engineers trying to make systems more secure and reliable. 3.a) Rowhammer Attack Countermeasures against Rowhammer have already been thoroughly explored, but not many are actually applicable in the mobile context. Powerful functions as CLFLUSH [9] and pagemap [10] have been disabled for users apps, but Rowhammer can still be performed through JavaScript. Furthermore, analyzing the cache hits and miss could raise a flag of alarm, but methods such as [4] dont cause any miss. Error correcting codes arent even that efficient in correcting bit flips. Most hardware vendors doubled the DRAM refresh rate, but results in [11] show that refresh rate would need to be improved by 8 times. Moreover, the power consumption would increase, making this solution not suitable for mobile devices. In Android devices Rowhammer attacks, the biggest threat is still user apps being able to access ION. Google is developing mechanisms so as to avoid it to happen in a malicious way. One solution could be to isolate ION regions controlled by user apps from kernel memory, in order to avoid ad jacent regions. But even in the absence of ION an attacker could force the buddy allocator to reserve memory in kernel memory zones by occupying all the memory available for users apps. Prevention of memory exhaustion need to be considered to avoid Rowhammer countermeasures workarounds. 3.b) Microarchitectural Attack As the final goal of microarchitectural attack is deciphering cryptographic codes (e.g. AES), a straightforward approach to protect them would be to avoid having tight data-dependencies (e.g sequence of cache line accesses or branches must not depend on data). If they depend on private data, the sequence, the program is destined to leak information through the cache. The constant-time implementation of modular exponentiation approach [12] represents a good way to fight data dependency. These are more general rules to follow, whether to combat specific attacks such as Flush + Reload in mobile devices with ARM [8]. Disabling the system interfaces to flush the instruction caches, the Flush-Reload side channels can be removed entirely from ARM- based devices, but feasibility and security of this method havent been studied yet. Also, by removing system calls to have accurate time from Android could mitigate all timing side channels. Another way to fight Flush + Reload would be by preventing physical memory sharing between apps, but that would cause the memory footprint to expand and therefore exposing the system to other Sidechannel attacks. Problem 2 Protocol Design The proposed solution for Problem 1 is represented in Figure 1. To solve this problem, four moments in which the Path-centric channel assignment algorithm from [14] are identified: : B receives a packet on its Channel 1 and, as an interferer is acting on Channel 1 on node A, B cant transmit. B1 is the active subnode, B2 and B3 are inactive subnodes. : B switches from Channel 1 to Channel 2 (total cost: 3), and forward the packet to A through Channel 2 (total cost: 3+6=9). B2 is the active subnode, B1 and B3 are inactive subnodes. A2 is the active subnode, A1 and A3 are inactive subnodes. : A can either transmit on Channel 2 and Channel 3, but transmitting on Channel 2 is more expensive, so it switches to Channel 3 (total cost: 9+3=12). A3 is the active subnode, A1 and A2 are inactive subnodes; : A send the packet at C through Channel 3 (total cost: 12+2=14). Network Applications In our K-out-of-N system we are interested in understanding how much is a probability of getting errors in sensing from N sensor, where K represent a threshold for accepting a reliable measurement. This reasoning follows the binomial distribution: In our case at each node, errors can be induced by a false measurement (with probability ) or by channel flipping a bit during the over-the-air time (with probability ). Therefore for our N-out-of-K nodes system we have: Assuming that and are independent, the final probability of having an erroneous detection is a linear combination of the two: For completion, the probability of a successful measurement and transmission is . Network Standards Spectrum scarcity is a widely known problem in the world of wireless communications. The explosive wireless traffic growth pushes academia and industry to research novel solutions to this problem. Deploying LTE in unlicensed spectrum brings up the conflict problem of LTE-WiFi coexistence. This conflict can be analyzed with a close look at 802.11 MAC level. In Figure 2, a comparison between WLAN MAC layer and what is casually called MAC in LTE is depicted [19]. WiFi 802.11 uses CSMA/CA to regulate accesses in MAC layer. In CSMA, a node senses the traffic before transmitting over the channel. If a carrier signal is sensed in the channel, the node waits until its free. In particular, in CSMA/CA the backoff time of a node is exponential. In LTE, multiple access is handled through TDMA (Time Division Multiple Access) meaning that all accesses to the channel are scheduled. Historically LTE has been developed for environments with little interference, while WiFi combats interference in ISM with CSMA. Using them in the same spectrum would see LTE dominating over WiFi, causing sever performance degradation in both the cases. Several solutions has been proposed and implemented in the past years. Qualcomm [15] and Huawei [16] proposed a separation in time and frequency domain. In [17] a Technology Independent Multiple-Output antenna approach is presented so as to clean interfered 802.11 signals. This method was made more robust in [18] but still they relied on the fact that at least one signal from the two technologies had a clear reference. Traffic demands analysis could help mitigate the performance drop due to interference, but even with an accurate demand estimation, only one can be active at a certain time and frequency, limiting the overall throughput. When interference is high, packet transmission is corrupted and error correction strategies are needed. In WiFi, standard Forward Error Correction (FEC) is used. In FEC, a redundancy is added to the transmitted packet, so as a receiver can detect and eventually correct the wrong received bits. On the other hand, LTE uses HARQ (Hybrid-Automated Repeat reQuest) which is a combination of FEC and ARQ. In the standard implementation of ARQ, redundancy bits are embedded in the packets for error detection. When a corrupted packet is received, the receiver request a new packet to the transmitter. In HARQ, FEC codes are encoded in the packet, so as the receiver can directly correct wrong bits, when a known subset of errors is detected. If an uncorrectable error happens, the ARQ method is used to request a new packet. Hybrid ARQ performs better than ARQ in low signal conditions, but leads to an unfavorable throughput when the signal is good. To better see this interference behavior, a small simulation has been performed using ns3, in particular the LAA-WiFi-coexistence library [20]. The scenario was built using two cells whose radio coverage overlaps. The technologies used are LTE Licensed Assisted Access (LAA) operating on EARFCN 255444 (5.180 GHz), and Wi-Fi 802.11n operating on channel 36 (5.180 GHz). Two base station positioned at 20 mt distance from another, and they both have one user connected to them at a distance of 10 mt. Both BS are connected to a backhaul client node that originates UDP in the downlink direction from client to UE(s). In Figure 3(a) and Figure 3(b), we see how the throughput and the number of packets received by the WiFi BS varies when the two BSs coverage area overlaps and when they are isolated (e.g. their distance is 10 Km). Other scenarios were tested: Figure 4 (a) represent the scenario of two WiFi BSs and Figure 4(b) two LTE BSs. It is possible to see the behavior of the two technologies . Table 1 Throughput A Throughput B Packet loss A Packet loss B Distant BSs Figure 3(a) 73.78 Mbps 77.55 Mbps 4.6% 0% Interfering BSs Figure 3(b) 73.62 Mbps 4.95 Mbps 4.8% 93% Two WiFi BSsFigure 4(a) 53.45 Mbps 54.41 Mbps 27% 25% Two LTE BSsFigure 4 (b) 30.88 Mbps 30.4 Mbps 60% 61% In Figure 4(a) we can see how the channel is split between the two BSs and the Carrier Sensing Multiple Access keeps a high throughput and a low packet loss. In Figure 4(b) we can see how the interference between the two LTE cells affects the throughput and gives a high packetloss. In Table 1 results from simulations are summarized. References [1] R. Spreitzer, V. Moonsamy, T. Korak, S. Mangard. Systematic Classification of Side-Channel Attacks on Mobile Devices ArXiv2016 [2] K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giurida, and H. Bos. Flip Feng Shui: Hammering a Needle in the Software Stack. In Proceedings of the 25th USENIX Security Symposium, 2016. [3] D. Gruss, C. Maurice, and S. Mangard. Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. In Proceedings of the 13th Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA), 2016. [4] V. van der Veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice, G. Vigna, H. Bos, K. Razavi, and C. Giuffrida, Drammer: Deterministic Rowhammer Attacks on Mobile Platforms, in Conference on Computer and Communications Security CCS 2016. ACM, 2016, pp. 1675-1689. [5] Z. B. Aweke, S. F. Yitbarek, R. Qiao, R. Das, M. Hicks, Y. Oren, and T. Austin. ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. In Proceedings of the 21st ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2016. [6] Ge, Q., Yarom, Y., Cock, D., Heiser, G. (2016).A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. Journal of Cryptographic Engineering [7] Dong HyukWoo and Hsien-Hsin S. Lee. Analyzing performance vulnerability due to resource denial of service attack on chip multiprocessors. In Workshop on Chip Multiprocessor Memory Systems and Interconnects, Phoenix, AZ, US, 2007. [8] X. Zhang, Y. Xiao, and Y. Zhang, Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices in Conference on Computer and Communications Security CCS 2016. ACM, 2016, pp. 858-870. [9] M. Seaborn and T. Dullien. Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges. In Black Hat USA (BH-US), 2015. [10] M. Salyzyn. AOSP Commit 0549ddb9: UPSTREAM: pagemap: do not leak physical addresses to non-privileged userspace. http://goo.gl/Qye2MN,November 2015. [11] Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C. Wilkerson, K. Lai, and O. Mutlu. Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors. In Proceedings of the 41st International Symposium on Computer Architecture (ISCA), 2014. [12] Ernie Brickell. Technologies to improve platform security. Workshop on Cryptographic Hardware and Embedded Systems11 Invited Talk, September 2011. [13] S. Skorobogatov, The Bumpy Road Towards iPhone 5c NAND Mirroring, arXiv ePrint Archive, Report 1609.04327, 2016. [14] Xin, Chunsheng, Liangping Ma, and Chien-Chung Shen. A path-centric channel assignment framework for cognitive radio wireless networks Mobile Networks and Applications 13.5 (2008): 463-476. [15] Qualcomm wants LTE deployed in unlicensed spectrum. http://www.fiercewireless.com/story/qualcomm-wants-lte-deployed-unlicen% sed-spectrum/2013-11-21 [16] Huawei U-LTE solution creates new market opportunities for mobile operators. http://www.huawei.com/ilink/en/about-huawei/newsroom/ press-release/HW 3%27768. [17] S. Gollakota, F. Adib, D. Katabi, and S. Seshan. Clearing the RF smog: making 802.11 robust to cross-technology interference. In Proc. of ACM SIGCOMM, 2011. [18] Y. Yubo, Y. Panlong, L. Xiangyang, T. Yue, Z. Lan, and Y. Lizhao. ZIMO: building cross-technology MIMO to harmonize Zigbee smog with WiFi flash without intervention. In Proc. of MobiCom, 2013. [19] Long-Term Evolution Protocol: How the Standard Impacts Media Access Control Tim Godfrey WMSG Advanced Technology, http://www.nxp.com/files-static/training_presentation/TP_LTE_PHY_MAC.pdf [20] https://www.nsnam.org/wiki/LAA-WiFi-Coexistence

Friday, October 25, 2019

History of Arkansas Tech University :: essays research papers

History of Arkansas Tech University Est. 1909   Ã‚  Ã‚  Ã‚  Ã‚  Arkansas ranked 42nd out of the 46 states in annual per capita school funds at a mere $4.97 per student. Citizens started to feel the need for secondary education for their children most ardently. The Washington County Farmers’ Union started the concept of agricultural boarding schools. H.S. Mobley was one of the most fluent spokesman for the Union. He believed in vocational education, and he pleaded for schools where students might learn partly by working with their hands at practical farm work under trained instructors. In 1908, the Arkansas Democratic platform endorsed the idea of â€Å"farmer’s schools† and George W. Donaghey advocated four such schools in his campaign for governor. The bill that was introduced to the Senate was referred to the agriculture committee, which reported the bill back to the House of Representatives on January 30, 1909, with the recommendation that it be passed. The bill passed the House on February 5, 1909, and the Senate on March 23, 1909. It was signed into law as Act 100 by Governor Donaghey on April 1, 1909. By September 30, 1909, the board members had been appointed.   Ã‚  Ã‚  Ã‚  Ã‚  The town wishing to be considered as the location for one of the four schools must offer a minimum of $40,000 and a site of not less than 200 acres. The citizens of Russellville were very interested in meeting these bid conditions. A story in the January 1910 Courier Democrat stated that Atkins had raised $30,000 and 320 acres of land toward a bid for the school, apparently only four towns were in the final bidding; Fort Smith with $40,000 and 200 acres of land; Ozark with $40,000 and 200 acres of land; Russellville with $40,000 and 220 acres of land; and Morrilton with $46,000 and 200 acres of land. It originally appeared that Morrilton went to Ozark with the best bid. However, apparently at the last moment the Russellville delegation led by Judge R.B. Wilson raised its bid by offering free lights and water for three years. Russellville was also favored because of its healthfulness of location, its railroad connections with Dardanelle, Ola, Little Rock, and Fort Smith, Arkansas, its quality of soil, its central location in the district, its proposed site close to town, and its location directly on the water and light lines coming from the dam. February 10, 1910, was a great day in Russellville. History of Arkansas Tech University :: essays research papers History of Arkansas Tech University Est. 1909   Ã‚  Ã‚  Ã‚  Ã‚  Arkansas ranked 42nd out of the 46 states in annual per capita school funds at a mere $4.97 per student. Citizens started to feel the need for secondary education for their children most ardently. The Washington County Farmers’ Union started the concept of agricultural boarding schools. H.S. Mobley was one of the most fluent spokesman for the Union. He believed in vocational education, and he pleaded for schools where students might learn partly by working with their hands at practical farm work under trained instructors. In 1908, the Arkansas Democratic platform endorsed the idea of â€Å"farmer’s schools† and George W. Donaghey advocated four such schools in his campaign for governor. The bill that was introduced to the Senate was referred to the agriculture committee, which reported the bill back to the House of Representatives on January 30, 1909, with the recommendation that it be passed. The bill passed the House on February 5, 1909, and the Senate on March 23, 1909. It was signed into law as Act 100 by Governor Donaghey on April 1, 1909. By September 30, 1909, the board members had been appointed.   Ã‚  Ã‚  Ã‚  Ã‚  The town wishing to be considered as the location for one of the four schools must offer a minimum of $40,000 and a site of not less than 200 acres. The citizens of Russellville were very interested in meeting these bid conditions. A story in the January 1910 Courier Democrat stated that Atkins had raised $30,000 and 320 acres of land toward a bid for the school, apparently only four towns were in the final bidding; Fort Smith with $40,000 and 200 acres of land; Ozark with $40,000 and 200 acres of land; Russellville with $40,000 and 220 acres of land; and Morrilton with $46,000 and 200 acres of land. It originally appeared that Morrilton went to Ozark with the best bid. However, apparently at the last moment the Russellville delegation led by Judge R.B. Wilson raised its bid by offering free lights and water for three years. Russellville was also favored because of its healthfulness of location, its railroad connections with Dardanelle, Ola, Little Rock, and Fort Smith, Arkansas, its quality of soil, its central location in the district, its proposed site close to town, and its location directly on the water and light lines coming from the dam. February 10, 1910, was a great day in Russellville.

Thursday, October 24, 2019

Eragon Essay

Often, heroic characters have to make tough choices in life; occasionally, the result of said choices is not to the individual’s benefit, but the outcome may bring joy to other people’s lives. In Christopher Paolini’s Eragon, coincidences, decisions, and desires combine to change Eragon’s life forever. Eragon is a hard working farm boy who shows a great deal of patience, honesty, and curiosity. He showcases these skills when hunting for food, and by coincidence he discovers a mysterious blue stone which he decides, out of curiosity, to take home with him. This â€Å"egg†, which happens to hatch into a dragon; this discovery becomes a turning point in Eragon’s life and he knows it could enable his way out of a long and tedious life. In fact, Eragon’s decision to keep and ultimately raise the dragon triggers his transformation from a boy to a dragon rider; forever altering his destiny, he will have to travel and meet new people. He will have to make sacrifices and must accept the consequences to bring peace to Alagaesia; and he will make the inevitable choice of raising this dragon (Saphira) and training himself and his dragon to kill the Ra’zac and overthrow the Empire. In this commitment, Eragon shows that a point in a person’s life where an event dramatically changes who or what he/she will become. Eragon’s decisions bring consequences and responsibilities’ compel him to fight for something in life and stand up for what one believes in. People can lead their lives one way and know what their destiny might be, only to have coincidences alter their lives for the better, or the worst. As Eragon’s quest begins he shows how any person with desire, passion, and hard work can prove himself to be a man of honour, and bravery. Coincidences can lead someone to meet different people, and see new places. A person’s life can ultimately be altered because of one coincidence and can change the course of his/her life in a good or bad way. Eragon’s life takes a dramatic turn after coincidently finding the egg while hunting for food, for his family. After finding the egg and realizing it is a dragon Eragon knows he has to do what he was destined to do: train Saphira and overthrow the Empire. â€Å"He raced home, trying to escape the dragon†¦ my dragon† (pg. 6) This mindset of Eragon shows that as much as he wants to escape the dragon, he can’t because he has made a special bond with the dragon and will inevitably raise her as his own, and because Eragon’s eye that catches the stone in the forest leads him to become the next dragon rider and to overthrow the evil reign of King Galbatorix. Also by coincidence, there is a story teller (Brom) who lives in Eragon’s village who has a great deal of knowledge about dragons and magic, and decides to aid Eragon in his journey. After Eragon is aware that Brom is willing to help him, this pushes Eragon to make the decision and to take the responsibility as the next dragon rider. Eragon learns a great deal from Brom, who becomes one of his closest friends who also ends up being a dragon rider many years ago. Being the good friends they become Brom aids him and Eragon has the knowledge and strength to defeat Durza (Galbatorix’s Shade). When captured by the Ra’zac and almost being killed, another coincidence occurs when a mysterious figure scares away the Ra’zac saving Eragon’s, Brom’s and Saphira’s lives. This mysterious person, whose name is Murtagh, also joins Eragon in his journey and assists him in killing the Ra’zac. This coincidence results in Murtagh saving Eragon’s life and continuing their journey, as well finding a helper in Murtagh to support him in his journey. †Who are you? † â€Å"Murtagh† (pg. 268) Not only does Murtagh save their lives but he plays a big role in helping Eragon, but shows how without Murtagh he would not make it as far as he did. Knowing Brom dies shortly after) Making a decision can alter someone’s life forever, and there is no going back especially when the decisions affects other people’s lives as well, making the decisions irreversible. Eragon makes the decision to keep the egg and when it hatches and to raise Saphira as his own, this leads to the Ra’zac coming to his doorstep and killing his uncle. This is a significant event because Eragon’s uncle was practically his father and making the decision to keep the egg results in his uncle’s death, and without him he feels lost; however, the bond he creates with Saphira is so immense, that only death can break it. The Empire is alerted that Eragon has the egg, and the send the Ra’zac to retrieve the egg back for the King. Making the decision to keep the egg is what instigates his entire journey and creates that special bond with his dragon. Eragon makes the decision to pursue the killers to avenge his uncle’s death and to bring peace to Alagaesia. He changes his life by pursuing the Ra’zac wanting the satisfaction of doing to the Ra’zac what they did to his uncle and feeling obligated to his uncle for all that he has done in his life to apprehend the murderers â€Å"What do you want me to do†¦ ursue the strangers? † (pg. 92) He asks this of Saphira, who agrees with Eragon to pursue the strangers. With this one decision of following the killers, he changes his life dramatically and if he succeeds, he can change everybody’s life for the better. Eragon decides that he cannot continue his journey without more help, so he travels to the Beor Mountains to seek help from the Varden, a rebellious group also against the Empire. After Brom dies, Murtagh helps him; however, this is not enough after he knows he has too many enemies: Urgals, the Ra’zac and Durza the shade. It is a desperate path to take†¦ We are desperate† (pg. 320). This decision is a great benefit to Eragon because he gets all the help he needs, meets the person who has been in his dreams in Arya (an elf from the Varden who is trapped) and eventually kills Durza. When a person desires something in life, he/she will do whatever it takes to achieve it, sometimes the desire is so strong that is can change someone’s life. Eragon has a desire to avenge his Uncle Garrow’s death after the Ra’zac brutally murders him. This eventually changes his life, because of chasing the killers. And what would give him more satisfaction than hunting down the strangers? †(pg. 93) He asks Saphira how he can satisfy himself, then realizes hunting them down and killing them would be the only way to achieve total satisfaction for his burning desire to avenge his uncle as well as finally feeling the sense of accomplishment of the commitment he made. Eragon has a desire to become the very best he can at magic, and swordsmanship, this pushes him to become the best so he can fend off for himself and not rely on others to help him. It is time for you to use the blade†¦ We’ll cut each other to ribbons†¦ Not so. Again you forget magic† (pg. 159) This is when Eragon and Brom have their daily sparring, where Brom teaches Eragon how to fight with a sword and magic, his desire to become the best shows when he wants to learn something new every time they spar. After seeing Arya imprisoned in his dreams, he is determined and has a desire to rescue her. Arya, who ends up being the elf that sent the egg to Eragon in the first place. â€Å"I expect the queen’s hostility will abate. The fact you rescued Arya will greatly help our case with her† (pg. 410) The queen is somewhat against having a dragon rider joining the Varden, but because he had a desire to rescue her and risked his life saving Arya, the queen allows Eragon to join. Sometimes in life people have to make tough choices that will positively or negatively affect others around them. The choices we make can change our and other people’s lives forever, there are many things that may change how our life is played out, coincidences, decisions, and desires just being a few.

Wednesday, October 23, 2019

Automobile Industry History Essay

You are here: Home †º World Industries †º Auto Industry †º Auto Industry | Automobile Industry | Car Industry Auto Industry | Automobile Industry | Car Industry. Automobile Industry History : In the year 1769, a French engineer by the name of Nicolas J. Cugnot invented the first automobile to run on roads. This automobile, in fact, was a self-powered, three-wheeled, military tractor that made the use of a steam engine. The range of the automobile, however, was very brief and at the most, it could only run at a stretch for fifteen minutes. In addition, these automobiles were not fit for the roads as the steam engines made them very heavy and large, and required ample starting time. Oliver Evans was the first to design a steam engine driven automobile in the U.S. A Scotsman, Robert Anderson, was the first to invent an electric carriage between 1832 and 1839. However, Thomas Davenport of the U.S.A. and Scotsman Robert Davidson were amongst the first to invent more applicable automobiles, making use of non-rechargeable electric batteries in 1842. Development of roads made travelling comfortable and as a result, the short ranged, electric battery driven automobiles were no more the best option for travelling over longer distances. The Automobile Industry finally came of age with Henry Ford in 1914 for the bulk production of cars. This lead to the development of the industry and it first begun in the assembly lines of his car factory. The several methods adopted by Ford, made the new invention (that is, the car) popular amongst the rich as well as the masses. According the History of Automobile Industry US, dominated the automobile markets around the globe with no notable competitors. However, after the end of the Second World War in 1945, the Automobile Industry of other technologically advanced nations such as Japan and certain European nations gained momentum and within a very short period, beginning in the early 1980s, the U.S Automobile Industry was flooded with foreign automobile companies, especially those of Japan and Germany. The current trends of the Global Automobile Industry reveal that in the developed countries the Automobile Industries are stagnating as a result of the drooping car markets, whereas the Automobile Industry in the developing nations, such as, India and Brazil, have been consistently registering higher growth rates every passing year for their flourishing domestic automobile markets. Those who are interested in gathering more information about the Automobile Industry, may browse through the following links :