Sunday, February 23, 2020

The concept of natural laws vs. human laws in the Decameron Essay - 1

The concept of natural laws vs. human laws in the Decameron - Essay Example The stories are concerned with a lot of things but it is the everyman hero which comes out on top rather than a Christian knight or a great king. Topics such as love, practical jokes, the hypocrisy and corruption of the clergy are all covered and often the hero of a tale comes from the mercantile class which was coming up at the time (Barolini, 1983). Since the audience itself was largely composed of individuals from this class, their notion of natural law being more important than human laws is certainly reflected in how the tales take shape. For example, in the very first tale a sinner is canonized as a saint which not only shows the fallacy of human law created by clergymen but also the power of natural law as the man who did wrong in his life was not appreciated by anyone expect the foolish priest who came to see him. In the same series of tales of the first day (sixth and ninth tales), we see examples of how disputes can be better resolved by words amongst individuals rather than resorting to the proper application of the law which might have resulted in the detriment of all concerned parties. It must be noted that Boccaccio does not seek to eradicate laws or even consider them bad since many laws are good for protecting the people. However, laws which make no sense to him or those which he considers archaic traditions are ridiculed extensively. As a replacement of those laws, Boccaccio shows us that natural laws are not only their equal but perhaps an improvement since they result in more equitable answers. The tales of the second day directly connect with this since they all deal with an individual losing his fortune and then through the workings of natural law is restored to his fortune while winning out over those who oppose him. In fact, to take it a step further, it can be said that the relationship between natural law and human law in the

Thursday, February 6, 2020

Web 2.0 Security Research Paper Example | Topics and Well Written Essays - 2500 words

Web 2.0 Security - Research Paper Example The idea of the â€Å"Web 2.0 was given by Darcy DiNucci, an advisor on electronic information paradigm. In this regard, this emerging idea is normally linked with web applications that are helpful to increase the capability to communicate interactive information distribution, cooperation, user-centered plan on the www. Additionally, the web sites which encompass the features of Web 2.0 offer its users the free option to work together or cooperate with each other in the community media discussion as designers of user-produced information material in a virtual society, as compared to those websites where clients are restricted to the inactive analysis of content that was developed for them. Moreover, the instances of Web 2.0 comprise a range of applications like social-networking blogs, websites, video-sharing websites, wikis, web applications, hosted services, folksonomies and mashups. Despite the fact that the idea presents an innovative description of the World-Wide-Web, but it do es not offer an update to some technological conditions, however relatively growing transformations in the means software developers and end users utilize the Web (XIBL; Mysore). Normally, the Web 2.0 incorporates the client-side website browser expertise such as Flash, Asynchronous JavaScript and XML (Ajax) and JavaScript/Ajax frameworks and the Adobe Flex framework like that Dojo Toolkit, Yahoo! UI Library, jQuery and MooTools. In this scenario, Ajax programming utilizes Java-Script to upload as well as download new data from the web server without reloading a page repeatedly (XIBL; Mysore). Web 2.0 uses machine-based connections like that SOAP and REST. In this scenario, servers frequently represent administrative Application Programming Interfaces or simply APIs, however standard APIs (for instance, for positioning to an internet blog or informing a blog revision) are also used in development. Moreover, for the communications in APIs incorporate XML or else JSON payloads (XIBL; Mysore). The new web based or web-supported tools offer a range of effective software features and services to the consumers, workers and business associates. These services could be easily managed and handled. Additionally, the new information technology offers access to a major business resource such as the web server, which gives the capability to access various other useful information resources, for instance database servers (ITSecurity). At the present time, a lot of young people have fully integrated Web 2.0 tools and applications into their professional and personal lives. According to various researches, more than 80% of workers make use of social networking applications or web sites like that MySpace, Facebook and YouTube at workplaces or on their laptops. Thus, it is clear that the fame of video-calling (Skype), instant messaging and peer-to-peer (such as multi-player gaming) is increasing day by day and it is causing augmenting danger for business’s status, networ k performance in addition to information safety (M86 Security). Web 2.0 is definitely very helpful in almost every walk of life. For instance, people read blogs on various latest issues, and place queries on communication board to get response of their questions or investigate specialized debates or forums to get latest knowledge about a definite issue. Moreover, the Web 2.0 applications such as IM (or instant messaging), P2P and Skype frequently offer extra advantages for exchanging information with associates (M86 Security). Obviously, Web 2.0 technology can negatively affect business information security as well as efficiency of organizations. For instance, the lively, interactive website content on Web 2.0 websites can simply divert a worker for hours. Moreover, the businesses are bothered regarding the possible discovery of secret and sensitive data and information by workers when they communicate with other, write messages, write blogs or leave remarks when participating in so cial media (M86 Security). The major examples of Web 2.0 includes