Friday, September 6, 2019
Political Power Essay Example for Free
Political Power Essay Power could be defined as ââ¬Å"the ability to bring about changeâ⬠according to Beyond intractability. Org website (http://www.beyondintractability.org/essay/Power/). Power is the ability to influence the behavior of the others so as to make them do what one wants.à It entails authority and control.à Thus political power is the authority to control a society. Political power can be manipulated leading to negative use by the person or people holding it.à There are many bad uses of political power that can result from holding of the power by an irresponsible person. Such negative uses include dictatorship, corruption and oppression of the society.à Political power can also be used positively to bring benefit to the society. Political power can be used to foster development, to maintain peace and also to protect the society from external threats of invasion.à Despite the various harsh negative uses of political power, the positive uses shows that political power does not always lead to negative outcomes.à Political power can be effectively used to bring a lot of benefits to the society. Political power can be used to perpetrate corruption. People holding much political power can use it inappropriately to engage in corruption. This is particularly possible when much of the power is vested on a few individuals and there is no evaluation or a watchdog on how this power is used.à When they get enticed to use it for their personal gain at the expense of the society for which they are supposed to care. Corruption is abuse of office or power by a person so as he can benefit.à Corruption can take many forms all leading to great injustices to the society.à When political officers get into office, they do so promising the society that they will serve the interest of the society before their own personal gains.à However, after gaining political power they uphold their personal gain.à This can be done through misappropriation of funds whereby the offices holding the power spends public funds in a way that do not bring benefits to the society.à Example of misappropriation of funds may entail starting of projects that are not necessary to the society or buying luxurious facilities for their use at the expense of other more necessary facilities. Corruption can also be in the form of embezzlement o f public funds.à The political officers may use their power to get access to money belonging to the public through public corporations and use it for their own personal interests.à Facilities of such corporation can be wrongly used to serve the officerââ¬â¢s personal interests instead of their official use. Such actions lead to poor performance of such corporation leading to difficulties in meeting the essential needs of the society.à If funds belonging to a government institution, for example, a hospital are embezzled by a few officers, it means the hospital is not able to offer the services it is supposed to offer efficiently.à This will lead to great suffering of the members of the society which depend on such public facilities.à It is also very unfair to the society as they pay taxes so that they government can offer such services Corruption can also take the form of bribery.à This is mostly an administrative form of corruption but can be perpetrated by political officers also.à This involves the political officers asking for bribes from the members of society or organization so as they can be offered certain services. The is bribes may range from small gifts to massive amounts of money.à This form of corruption means the members of society are not able to get services without parting with other resources.à It also means there is segregation of some of the members of the society as, if they fail to raise the required bribes, they donââ¬â¢t get access to the resources they need. Corruption can also lead to extortion.à This entails use of political power by the political officers to obtain something by illegal threats.à The political officers may acquire interests in certain things or organization though issuing threats or force. Corruption has various costs to a country. If corruption is predominant in a country all the members of society are affected in one way or another.à The wealth of such a country is significantly affected leading to decrease in income.à The economy in a very corrupt state will be poor and businesses will not operate efficiently.à Consequently, the national income goes down affecting the ability of the government to offer essential services to the citizens.à This will inform produce a society with high rates of illiteracy and poverty. In the animal farm Napoleon used his political power to instigate corruption. He changed the rules from what had been collectively agreed to what suited his rule. He also used the dogs to threaten any other animal that opposed his rule. Napoleon and the other pigs also used the property of the farm for their own use which the other animals had not agreed upon. Another negative use of political power is establishment of dictatorship rule. Dictatorship is whereby the country is controlled by one or a few individuals who have absolute power.à Their rule is not limited by anyone, buy law constitution or social justices.à They do what they want. To gain dictatorship political officers use the little political power they have to gain more political power and later dictatorship. This is possible through oppression of nay efforts that try to limit their power.à This may include execution of people who take the bold steps of openly opposing the rule of these political powers. Dictators take control of all the operations of power in the country and personalize the rule. The dictatorship may also regulate all the actions by the citizens of a country and directs these actions against the will or consent of the citizens. Dictatorships are influenced by different factors that lead the political rules to misuse their political powers and establish dictatorships.à There are many countries that have been ruled by dictators or are still ruled by dictators.à An example of dictatorship is Stalinism which was a regime established by Joseph Stalin who lived between 1878 and 1953 in United Social Soviet Republic.à He was a dictator party leader whose tenure and campaigns costed lives of millions of people.à His rule had big negative impacts on USSR but also transformed it from a peasant society to an industrial nation http://www.spartacus.schoolnet.co.uk/RUSstalin.htm). In George Orwellââ¬â¢s book (1996), the Animal Farm he depicts how people struggle collectively to oust bad rule but after gaining control, the few who are trusted with the political power misuse it and establishes an autocratic form of rule whereby they dictate on all the others. The pigs in the story, after chasing the oppressive farmer, took control of the farm and established a rule that oppressed the other animals.à The animals that questioned the rule were mistreated or executed (Orwell 1996). Napoleon used mudslinging to destroy the reputation of Snowball and later chased him from the farm. These represent how people who oppose a dictator are exiled after being falsely accused. This is typical of many African and Asian countries whereby after gaining independence form colonialism, the leaders who were trusted with political power went ahead to establish dictatorship.à Other examples of dictators include Idd Amin of Uganda, Hu Chi Minh of North Vietnam and Saddam Hussein of Iraq. Oppression of citizens and social injustices is another form of negative use of political power.à In this case, the leaders vested with political power bends the rules, and perpetrate actions that lead to oppression of citizens and social injustices.à The law or the constitution is not followed and injustice becomes inaccessible to the society. In political system where citizen are oppressed and social injustice are rife, a few people control all the branches of government. Though the legislative, executive and judiciary branches of the government may seem independent, this few individuals use their political powers to influence the operations of all these branches.à This results to much suffering of the citizens and as the justice system are faulty the citizen lack a forum through which their injustices can be addressed. In modern society this can be done through practices like imposition of rules that are aimed at oppressing the citizens, coercion to the citizens to carry out certain actions and even detention of some prominent people.à The individuals who do not support the action of those with the political power are mistreated, detained or exiled. In the Animal farm, George Orwell depicts how this is done when the pigs after assuming the leadership of the other animals change the rules and uses their power to mistreat, overwork, starve and oppress the other animals (Orwell 1996). Napoleon sold off one of the animals after he became old and less productive. This was an act of betrayal and oppression of the animal as he had also taken part in the fight for their independence. Political power can also be used for the benefits of the society. There are many countries that have benefited from positive use of the political powers to the benefit of the society.à One way political power can be used positively is fostering development can greatly be encouraged through use of political power to create the right environment for development.à Political powers can be used to enact laws, policies and strategies that are aimed at fostering development.à As the political systems influence much of the economic systems in a country, positive use of the political power can lead to positive influence on the economy of a country. The leaders vested with political power can use this pioneer to help enact laws or policies that will encourage investment and expansion of the economy.à This may be in the form of providing incentives to investors building effective infrastructures or providing a conducive environment for the economy to flourish.à In the animal farm the decision to build the windmill was a good idea aimed at bringing development in the farm and comfort to the animals (Orwell 1996). United States is a country that has massive political power that is used to foster developments. The country has a free market economy with policies encouraging conducive running of the economy.à A country like Japan has used their political power to build good infrastructures that facilitate expansion of their economy. Another positive use of political power is maintenance of peace. Political power can be effectively used to maintain peace and order in the country.à As peace is very crucial for co-existence and development in a country such use of political power can lead to great benefits to the country.à The political leaders can use their authority and influence in the society they rule to encourage and foster good co-existence between the citizens. à Political powers are needed to ensure that this happens.à The leader will use their authority to maintain order in the society and make sure that no one single citizen engages in practices that infringe the rights of others.à Laws are enacted to guide the actions of the citizens and certain strategies are taken to make sure that the laws are followed.à Political power is used to establish such a system. In Orwellââ¬â¢s Animal Farm the animal had collaborated to come up with rules that were aimed at maintaining good co-existence among the animals (Orwell 1996). This is done through establishment of a police force that maintains law and order and enactment of a court system that ensures that those who defy the rules are punished or forced to obey. Political power also establishes the judicial system that offers a forum through which the citizens can have their rights enforced.à All these actions bring peace by ensuring all the citizens get their rights and live harmoniously. Another positive use of political power is protection of the country from invasion. Political power is used in establishment of strategies of ensuring that a country is protected from external invasion.à This will ensure that the country is safe from threats and can concentrate on development. Political power can be utilized in different ways to protect a country from external attacks.à First the political leader can use their power and authority to help and lead in formation of policies aimed at protecting the country from possible attacks.à These policies may include security measures aimed at preventing such attacks.à The political powers can also establish armed forces that will maintain the security of the country and defend it in case of any external attacks. Weapons can also be acquired either through manufacturing or purchase form other countries aiming at providing a security measure to prevent or defend an attack.à Political leaders can also use their authority to established partnerships links with other countries aimed at fostering co-operation thus minimizing threat of attack from those countries.à These co operations may also be used as partners in maintenance of the peace of the country.à Such partners will collaborate in case of an attack or in strategies aimed at minimizing possibilities of an attack. In Orwellââ¬â¢s Animal Farm he depicted good use of political power when the animals united in their fight against Mr. Jones, the earlier owner of the farm. Because of this unity they were able to defeat Mr. Jones (Orwell 1996). Political leaders can use their authority to influence the practices of their country so as to prevent any actions that may trigger attacks from other countries.à Such actions may include neutrality in conflicts involving other parties. Countries in Europe have formed the European Union aimed at co-operation and collaboration in different issues. à This union unites the country hence minimizing the possibility of attack of one country by another.à There are many such unions that have been formed for such purposes including organization for economic co-operation and development (OECD) and the African Union (AU). Other countries in Europe and other places have formed NATO which is aimed at collaboration to prevent attacks form other countries.à All these efforts are aimed at protection of the individual countries and are established by political powers Political power can be used to instigate very bad and harmful activities in a country such as corruption, dictatorship and oppression of citizens. These activities lead to a lot of suffering and deterioration of economies of such countries.à However, political power can also be used to establish policies and practices for the benefit of a country. Political power is a key ingredient for development, peace and safety of a country.à Actually for country to be successful it must have a good and strong political powers that will help instigate the success. à à Thus, it is evidence that political power does not always lead to negative outcomes.à It can be used effectively to produce many benefits to a society. Reference: Beyondintractability.org. Power. Retrieved on February 6, 2008 from http://www.beyondintractability.org/essay/Power/ Orwell G. (1996).Animal Farm. New York; New American Library. Spartacus educational. Joseph Stalin. Retrieved on February 6, 2008 from http://www.spartacus.schoolnet.co.uk/RUSstalin.htm
Thursday, September 5, 2019
History Of The Virtual Private Network
History Of The Virtual Private Network A VPN supplies virtual network connectivity over a possibly long physical distance. The key feature of a VPN, however, is its ability to use public networks like the Internet rather than rely on private leased lines which consume valuable recourse and extra cost . VPN technologies implement restricted-access networks that utilize the same cabling and routers as a public network, and they do so without sacrificing features or basic security , a simple cooperation office and remote branched VPN shown in below diagram . Sonicwall_Vpn A VPN supports at least three different modes of use as shown above: Remote access client connections. LAN-to-LAN internetworking . Controlled access within an intranet . A several network protocols have become popular as a result of VPN developments state as following : PPTP L2TP IPsec These protocols emphasize authentication and encryption in VPNs. Authentication allows VPN clients and servers to correctly establish the identity of people on the network. Encryption allows potentially sensitive data to be hidden from the general public. Many vendors have developed VPN hardware and/or software products. Unfortunately, immature VPN standards mean that some of these products remain incompatible with each other till now. Virtual private networks have grown in popularity as businesses to save money on remote network access for employees. Many corporations have also adopted VPNs as a security solution for private Wi-Fi wireless networks. Expect a continued gradual expansion in use of VPN technology to continue in the coming years. Objectives:- A virtual private network can resolve many of the issues associated with todays private networks. Cost: The cost of such links is high especially when they involve international locations. Even when VPNs are implemented on a provider private network, it would still be less expensive. Mobility of workforce: Many companies are encouraging telecommunications to reduce their investment in real estate, reduce traffic, and reduce pollution from automobile E-commerce applications: However, in traditional private networks, this kind of special access provision is difficult to incorporate because it is not easy to install dedicated link to all suppliers and business partners, nor it is flexible because a change in the supplier would require de-installing the link and installing another one to the new vendor. Advantages of VPN VPNs promise two main advantages over competing approaches cost savings, and scalability (that is really just a different form of cost savings). The Low Cost of a VPN One way a VPN lowers costs is by eliminating the need for expensive long-distance leased lines. With VPNs, an organization needs only a relatively short dedicated connection to the service provider. This connection could be a local leased line (much less expensive than a long-distance one), or it could be a local broadband connection such as DSL service. Another way VPNs reduce costs is by lessening the need for long-distance telephone charges for remote access. Recall that to provide remote access service, VPN clients need only call into the nearest service providers access point. In some cases this may require a long distance call, but in many cases a local call will suffice. A third, more subtle way that VPNs may lower costs is through offloading of the support burden. With VPNs, the service provider rather than the organization must support dial-up access for example. Service providers can in theory charge much less for their support than it costs a company internally because the public providers cost is shared amongst potentially thousands of customers. Scalability and VPNs The cost to an organization of traditional leased lines may be reasonable at first but can increase exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations. If a third branch office needs to come online, just two additional lines will be required to directly connect that location to the other two. However, as an organization grows and more companies must be added to the network, the number of leased lines required increases dramatically. Four branch offices require six lines for full connectivity, five offices require ten lines, and so on. Mathematicans call this phenomenon a combinatorial explosion, and in a traditional WAN this explosion limits the flexibility for growth. VPNs that utilize the Internet avoid this problem by simply tapping into the geographically-distributed access already available. Disadvantages of VPNs With the hype that has surrounded VPNs historically, the potential pitfalls or weak spots in the VPN model can be easy to forget. These four concerns with VPN solutions are often raised. 1. VPNs require an in-depth understanding of public network security issues and proper deployment of precautions. 2. The availability and performance of an organizations wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. 3. VPN technologies from different vendors may not work well together due to immature standards. 4. VPNs need to accomodate protocols other than IP and existing internal network technology. Generally speaking, these four factors comprise the hidden costs of a VPN solution. Whereas VPN advocates tout cost savings as the primary advantage of this technology, detractors cite hidden costs as the primary disadvantage of VPNs INTERNET VPNS FOR REMOTE ACCESS In recent years, many organizations have increased the mobility of their workers by allowing more employees to telecommute. Employees also continue to travel and face a growing need to stay connected to their company networks. A VPN can be set up to support remote, protected access to the corporate home offices over the Internet. An Internet VPN solution uses a client/server design works as follows: 1. A remote host (client) wanting to log into the company network first connects to any public Internet Service Provider (ISP). 2. Next, the host initiates a VPN connection to the company VPN server. This connection is made via a VPN client installed on the remote host. 3. Once the connection has been established, the remote client can communicate with the internal company systems over the Internet just as if it were a local host. Before VPNs, remote workers accessed company networks over private leased lines or through dialup remote access servers. While VPN clients and servers careful require installation of hardware and software, an Internet VPN is a superior solution in many situations. VPNS FOR INTERNETWORKING Besides using virtual private networks for remote access, a VPN can also bridge two networks together. In this mode of operation, an entire remote network (rather than just a single remote client) can join to a different company network to form an extended intranet. This solution uses a VPN server to VPN server connection. Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be one of two types: Intranet-based If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment. vpn-type INTRANET / LOCAL NETWORK VPNS Internal networks may also utilize VPN technology to implement controlled access to individual subnets within a private network. In this mode of operation, VPN clients connect to a VPN server that acts as the network gateway. This type of VPN use does not involve an Internet Service Provider (ISP) or public network cabling. However, it allows the security benefits of VPN to be deployed inside an organization. This approach has become especially popular as a way for businesses to protect their WiFi local networks. TUNNELING: SITE-TO-SITE In a site-to-site VPN, GRE (generic routing encapsulation) is normally the encapsulating protocol that provides the framework for how to package the passenger protocol for transport over the carrier protocol, which is typically IP-based. This includes information on what type of packet you are encapsulating and information about the connection between the client and server. Instead of GRE, IPSec in tunnel mode is sometimes used as the encapsulating protocol. IPSec works well on both remote-access and site-to-site VPNs. IPSec must be supported at both tunnel interfaces to use. TUNNELING Most VPNs rely on tunneling to create a private network that reaches across the Internet. Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network. The protocol of the outer packet is understood by the network and both points, called tunnel interfaces, where the packet enters and exits the network. Tunneling requires three different protocols: Carrier protocol The protocol used by the network that the information is traveling over Encapsulating protocol The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data Passenger protocol The original data (IPX, NetBeui, IP) being carried Tunneling has amazing implications for VPNs. For example, you can place a packet that uses a protocol not supported on the Internet (such as NetBeui) inside an IP packet and send it safely over the Internet. Or you could put a packet that uses a private (non-routable) IP address inside a packet that uses a globally unique IP address to extend a private network over the Internet. COST SAVINGS WITH A VPN A VPN can save an organization money in several situations: Eliminating the need for expensive long-distance leased lines Reducing long-distance telephone charges Offloading support costs VPNS VS LEASED LINES Organizations historically needed to rent network capacity such as T1 lines to achieve full, secured connectivity between their office locations. With a VPN, you use public network infrastructure including the Internet to make these connections and tap into that virtual network through much cheaper local leased lines or even just broadband connections to a nearby Internet Service Provider (ISP). LONG DISTANCE PHONE CHARGES A VPN also can replace remote access servers and long-distance dialup network connections commonly used in the past by business travelers needing to access to their company intranet. For example, with an Internet VPN, clients need only connect to the nearest service providers access point that is usually local. SUPPORT COSTS With VPNs, the cost of maintaining servers tends to be less than other approaches because organizations can outsource the needed support from professional third-party service providers. These provides enjoy a much lower cost structure through economy of scale by servicing many business clients. VPN NETWORK SCALABILITY The cost to an organization of building a dedicated private network may be reasonable at first but increases exponentially as the organization grows. A company with two branch offices, for example, can deploy just one dedicated line to connect the two locations, but 4 branch offices require 6 lines to directly connect them to each other, 6 branch offices need 15 lines, and so on. Internet based VPNs avoid this scalability problem by simply tapping into the public lines and network capability readily available. Particularly for remote and international locations, an Internet VPN offers superior reach and quality of service. USING A VPN To use a VPN, each client must possess the appropriate networking software or hardware support on their local network and computers. When set up properly, VPN solutions are easy to use and sometimes can be made to work automatically as part of network sign on. VPN technology also works well with WiFi local area networking. Some organizations use VPNs to secure wireless connections to their local access points when working inside the office. These solutions provide strong protection without affecting performance excessively. VPN SECURITY: IPSEC Internet Protocol Security Protocol (IPSec) provides enhanced security features such as better encryption algorithms and more comprehensive authentication. vpn-diagram2 Photo courtesy Cisco Systems, Inc. A remote-access VPN utilizing IPSec IPSec has two encryption modes: tunnel and transport. Tunnel encrypts the header and the payload of each packet while transport only encrypts the payload. Only systems that are IPSec compliant can take advantage of this protocol. Also, all devices must use a common key and the firewalls of each network must have very similar security policies set up. IPSec can encrypt data between various devices, such as: Router to router Firewall to router PC to router PC to server LIMITATIONS OF A VPN Despite their popularity, VPNs are not perfect and limitations exist as is true for any technology. Organizations should consider issues like the below when deploying and using virtual private networks in their operations: VPNs require detailed understanding of network security issues and careful installation / configuration to ensure sufficient protection on a public network like the Internet. The reliability and performance of an Internet-based VPN is not under an organizations direct control. Instead, the solution relies on an ISP and their quality of service. Historically, VPN products and solutions from different vendors have not always been compatible due to issues with VPN technology standards. Attempting to mix and match equipment may cause technical problems, and using equipment from one provider may not give as great a cost savings. TYPES OF VPN TUNNELING VPN supports two types of tunneling voluntary and compulsory. Both types of tunneling are commonly used. In voluntary tunneling, the VPN client manages connection setup. The client first makes a connection to the carrier network provider (an ISP in the case of Internet VPNs). Then, the VPN client application creates the tunnel to a VPN server over this live connection. In compulsory tunneling, the carrier network provider manages VPN connection setup. When the client first makes an ordinary connection to the carrier, the carrier in turn immediately brokers a VPN connection between that client and a VPN server. From the client point of view, VPN connections are set up in just one step compared to the two-step procedure required for voluntary tunnels. Compulsory VPN tunneling authenticates clients and associates them with specific VPN servers using logic built into the broker device. This network device is sometimes called the VPN Front End Processor (FEP), Network Access Server (NAS) or Point of Presence Server (POS). Compulsory tunneling hides the details of VPN server connectivity from the VPN clients and effectively transfers management control over the tunnels from clients to the ISP. In return, service providers must take on the additional burden of installing and maintaining FEP devices. VPN TUNNELING PROTOCOLS Several computer network protocols have been implemented specifically for use with VPN tunnels. The three most popular VPN tunneling protocols listed below continue to compete with each other for acceptance in the industry. These protocols are generally incompatible with each other. POINT-TO-POINT TUNNELING PROTOCOL (PPTP) Several corporations worked together to create the PPTP specification. People generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in client support for this protocol. The initial releases of PPTP for Windows by Microsoft contained security features that some experts claimed were too weak for serious use. Microsoft continues to improve its PPTP support, though. LAYER TWO TUNNELING PROTOCOL (L2TP) The original competitor to PPTP for VPN tunneling was L2F, a protocol implemented primarily in Cisco products. In an attempt to improve on L2F, the best features of it and PPTP were combined to create new standard called L2TP. Like PPTP, L2TP exists at the data link layer (Layer Two) in the OSI model thus the origin of its name. INTERNET PROTOCOL SECURITY (IPSEC) IPsec is actually a collection of multiple related protocols. It can be used as a complete VPN protocol solution, or it can used simply as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer (Layer Three) of the OSI model. Using PPTP PPTP packages data within PPP packets, then encapsulates the PPP packets within IP packets (datagrams) for transmission through an Internet-based VPN tunnel. PPTP supports data encryption and compression of these packets. PPTP also uses a form of General Routing Encapsulation (GRE) to get data to and from its final destination. PPTP-based Internet remote access VPNs are by far the most common form of PPTP VPN. In this environment, VPN tunnels are created via the following two-step process: The PPTP client connects to their ISP using PPP dial-up networking (traditional modem or ISDN). Via the broker device (described earlier), PPTP creates a TCP control connection between the VPN client and VPN server to establish a tunnel. PPTP uses TCP port 1723 for these connections. PPTP also supports VPN connectivity via a LAN. ISP connections are not required in this case, so tunnels can be created directly as in Step 2 above. Once the VPN tunnel is established, PPTP supports two types of information flow: Control messages for managing and eventually tearing down the VPN connection. Control messages pass directly between VPN client and server. Data packets that pass through the tunnel, to or from the VPN client PPTP CONTROL CONNECTION Once the TCP connection is established in Step 2 above, PPTP utliizes a series of control messages to maintain VPN connections. These messages are listed below. No. Name Description 1 StartControlConnectionRequest Initiates setup of the VPN session; can be sent by either client or server. 2 StartControlConnectionReply Sent in reply to the start connection request (1); contains result code indicating success or failure of the setup operation, and also the protocol version number. 3 StopControlConnectionRequest Request to close the control connection. 4 StopControlConnectionReply Sent in reply to the stop connection request (3); contains result code indicating success or failure of the close operation. 5 EchoRequest Sent periodically by either client or server to ping the connection (keep alive). 6 EchoReply Sent in response to the echo request (5) to keep the connection active. 7 OutgoingCallRequest Request to create a VPN tunnel sent by the client. 8 OutgoingCallReply Response to the call request (7); contains a unique identifier for that tunnel. 9 IncomingCallRequest Request from a VPN client to receive an incoming call from the server. 10 IncomingCallReply Response to the incoming call request (9), indicating whether the incoming call should be answered. 11 IncomingCallConnected Response to the incoming call reply (10); provides additional call parameters to the VPN server. 12 CallClearRequest Request to disconnect either an incoming or outgoing call, sent from the server to a client. 13 CallDisconnectNotify Response to the disconnect request (12); sent back to the server. 14 WANErrorNotify Notification periodically sent to the server of CRC, framing, hardware and buffer overruns, timeout and byte alignment errors. 15 SetLinkInfo Notification of changes in the underlying PPP options. With control messages, PPTP utlizes a so-called magic cookie. The PPTP magic cookie is hardwired to the hexadecimal number 0x1A2B3C4D. The purpose of this cookie is to ensure the receiver interprets the incoming data on the correct byte boundaries. PPTP SECURITY PPTP supports authentication, encryption, and packet filtering. PPTP authentication uses PPP-based protocols like EAP, CHAP, and PAP. PPTP supports packet filtering on VPN servers. Intermediate routers and other firewalls can also be configured to selectively filter PPTP traffic. PPTP AND PPP In general, PPTP relies on the functionality of PPP for these aspects of virtual private networking. authenticating users and maintaining the remote dial-up connection encapsulating and encrypting IP, IPX, or NetBEUI packets PPTP directly handles maintaining the VPN tunnel and transmitting data through the tunnel. PPTP also supports some additional security features for VPN data beyond what PPP provides. PPTP PROS AND CONS PPTP remains a popular choice for VPNs thanks to Microsoft. PPTP clients are freely available in all popular versions of Microsoft Windows. Windows servers also can function as PPTP-based VPN servers. One drawback of PPTP is its failure to choose a single standard for authentication and encryption. Two products that both fully comply with the PPTP specification may be totally incompatible with each other if they encrypt data differently, for example. Concerns also persist over the questionable level of security PPTP provides compared to alternatives. Routing Tunneling protocols can be used in a point-to-point topology that would generally not be considered a VPN, because a VPN is expected to support arbitrary and changing sets of network nodes. Since most router implementations support software-defined tunnel interface, customer-provisioned VPNs often comprise simply a set of tunnels over which conventional routing protocols run. PPVPNs, however, need to support the coexistence of multiple VPNs, hidden from one another, but operated by the same service provider. Building blocks Depending on whether the PPVPN runs in layer 2 or layer 3, the building blocks described below may be L2 only, L3 only, or combinations of the two. Multiprotocol Label Switching (MPLS) functionality blurs the L2-L3 identity. While RFC 4026 generalized these terms to cover L2 and L3 VPNs, they were introduced in RFC 2547. Customer edge device. (CE) In general, a CE is a device, physically at the customer premises, that provides access to the PPVPN service. Some implementations treat it purely as a demarcation point between provider and customer responsibility, while others allow customers to configure it. Provider edge device (PE) A PE is a device or set of devices, at the edge of the provider network, which provides the providers view of the customer site. PEs are aware of the VPNs that connect through them, and which maintain VPN state. Provider device (P) A P device operates inside the providers core network, and does not directly interface to any customer endpoint. It might, for example, provide routing for many provider-operated tunnels that belong to different customers PPVPNs. While the P device is a key part of implementing PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is allowing the service provider to scale its PPVPN offerings, as, for example, by acting as an aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity optical links between major locations of provider. Categorizing VPN security models From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs only among physically secure sites, both trusted and secure models need an authentication mechanism for users to gain access to the VPN. Some Internet service providers as of 2009[update] offer managed VPN service for business customers who want the security and convenience of a VPN but prefer not to undertake administering a VPN server themselves. Managed VPNs go beyond PPVPN scope, and are a contracted security solution that can reach into hosts. In addition to providing remote workers with secure access to their employers internal network, other security and management services are sometimes included as part of the package. Examples include keeping anti-virus and anti-spyware programs updated on each clients computer. Authentication before VPN connection A known trusted user, sometimes only when using trusted devices, can be provided with appropriate security privileges to access resources not available to general users. Servers may also need to authenticate themselves to join the VPN. A wide variety of authentication mechanisms exist. VPNs may implement authentication in devices including firewalls, access gateways, and others. They may use passwords, biometrics, or cryptographic methods. Strong authentication involves combining cryptography with another authentication mechanism. The authentication mechanism may require explicit user action, or may be embedded in the VPN client or the workstation. Trusted delivery networks Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single providers network to protect the traffic. In a sense, they elaborate on traditional network- and system-administration work. Multi-Protocol Label Switching (MPLS) is often used to overlay VPNs, often with quality-of-service control over a trusted delivery network. Layer 2 Tunneling Protocol (L2TP) which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Ciscos Layer 2 Forwarding (L2F) (obsolete as of 2009[update]) and Microsofts Point-to-Point Tunneling Protocol (PPTP). Security mechanisms Secure VPNs use cryptographic tunneling protocols to provide the intended confidentiality (blocking intercept and thus packet sniffing), sender authentication (blocking identity spoofing), and message integrity (blocking message alteration) to achieve privacy. Secure VPN protocols include the following: IPsec (Internet Protocol Security) A standards-based security protocol developed originally for IPv6, where support is mandatory, but also widely used with IPv4. Transport Layer Security (SSL/TLS) is used either for tunneling an entire networks traffic (SSL VPN), as in the OpenVPN project, or for securing individual connection. SSL has been the foundation by a number of vendors to provide remote access VPN capabilities. A practical advantage of an SSL VPN is that it can be accessed from locations that restrict external access to SSL-based e-commerce websites without IPsec implementations. SSL-based VPNs may be vulnerable to Denial of Service attacks mounted against their TCP connections because latter are inherently unauthenticated. DTLS, used by Cisco for a next generation VPN product called Cisco AnyConnect VPN. DTLS solves the issues found when tunneling TCP over TCP as is the case with SSL/TLS Secure Socket Tunneling Protocol (SSTP) by Microsoft introduced in Windows Server 2008 and Windows Vista Service Pack 1. SSTP tunnels Point-to-Point Protocol (PPP) or L2TP traffic through an SSL 3.0 channel. L2TPv3 (Layer 2 Tunneling Protocol version 3), a new[update] release. MPVPN (Multi Path Virtual Private Network). Ragula Systems Development Company owns the registered trademark MPVPN. Cisco VPN, a proprietary VPN used by many Cisco hardware devices. Proprietary clients exist for all platforms; open-source clients also exist. SSH VPN OpenSSH offers VPN tunneling to secure remote connections to a network (or inter-network links). This feature (option -w) should not be confused with port forwarding (option -L). OpenSSH server provides limited number of concurrent tunnels and the VPN feature itself does not support personal authentication. VPNs in mobile environments Mobile VPNs handle the special circumstances when one endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points. Mobile VPNs have been widely used in public safety, where they give law enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, as they travel between different subnets of a mobile network. They are also used in field service management and by healthcare organizations, among other industries. Increasingly, Mobile VPNs are being adopted by mobile professionals and white-collar workers who need reliable connections. They allow users to roam seamlessly across networks and in and out of wireless-coverage areas without losing application sessions or dropping the secure VPN session. A conventional VPN cannot survive such events because the network tunnel is disrupted, causing applications to disconnect, time out, fail, or even the computing device itself to crash. Instead of logically tying the endpoint of the network tunnel to the physical IP address, each tunnel is bound to a virtual IP address that stays with the device. The Mobile VPN software handles the necessary network logins and maintains the application sessions in a manner transparent to the user. The Host Identity Protocol (HIP), under study by the Internet Engineering Task Force, is designed to support mobility of hosts by separating the role of IP addresses for host identification from their locator functionality in an IP network. With HIP a mobile host maintains its logical connections established via the host identity identifier while associating with different IP addresses when roaming between access networks. Conclusion: So what is a Virtual Private Network? As we have discussed, a VPN can take several forms. A VPN can be between two end-systems, or it can be between two or more networks. A VPN can be built using tunnels or encryption (at essentially any layer of the protocol stack), or both, or alternatively constructed using MPLS or one of the virtual router methods. A VPN can consist of networks connected to a service providers network by leased lines, Frame Relay, or ATM, or a VPN can consist of dial-up subscribers connecting to central
Wednesday, September 4, 2019
Necessity of Soft Skills for Professionals
Necessity of Soft Skills for Professionals Soft Skills are Smart Skills: Necessity of Soft Skills for LIS Professionals in this Twenty First Century Abstract Changing the users awareness and the technology developed in this Twenty First Century, Library Professionals required to introduce new services, based upon user interest. Managing and running this current century library, professionals have a highly specialized job. So LIS professionals should be required multi-talented and multi-fold personalities. To reach the success and adding new variety of services in their libraries, this paper will helps to LIS professionals through Soft Skills.Various skills need to become a good leader. In Library concept, if you become a good Librarian you should have Library Professional Skills, Managerials Skills and Soft Skills. This paper describes the necessity of soft skill for library professionals. And it listed out the list of soft skills which are essential to survive effectively. Through this paper, we recommend all the library professionals must acquire and execute soft skills in order to better the outcome of their Library. Keyword: Library Science, LIS Professionals, Soft Skills, Twenty First Century Libraries, Librarianship. ââ¬Å"Professional skills may help to get your Job, But Soft skills can make you a good Librarianâ⬠. Introduction LIS professionals need continuous grooming by new skills. Then only they become obsolete in this fast changing environment. Soft skills, becoming important at the middle level of library management. Library professionals have to be effective in oral, written an e-communication with their patrons, colleagues and managers, This soft skills will make them more effective to promote their library product and services through marketing. And thus this will help them to show their value to the parent organization. They also need good interpersonal and networking skill to interact with users and effectively collaborate with their colleagues. There is also a growing realization that libraries and information service play important social and community function. Thus, social and community building skills are useful for information professionals- both for community of colleagues (Abdus Sattar Chaudhry Christopher S.G. Khoo). Definition Technical professionals in various disciplines such as information technology, engineering, architecture, and research and development are increasingly required to broaden their skill sets to master the so-called soft skills. Soft skills, as defined by Wikipedia, are the cluster of personality traits, social graces, facility with language, personal habits, friendliness, and optimism that mark people to varying degrees. Soft skills complement hard skills, which are the technical requirements of a job. Set of Skills There are various types of skills that can be acquired. These skills are categorized under ââ¬Å"Setsâ⬠based on their nature. There are five types of ââ¬Å"Setsâ⬠of skills (Vidya V. Hanchinal. 2014) Hard Skills: certificates acquired through completing a formal education e.g.Certificates Technical Skills: abilities essential to perform a particular job e.g. employability skills Professional Skills: expertise in professional knowledge, e.g. teaching skills,corporate skills. Life Skills: enriching the innermost qualities like peace of mind, concentration,positive energy levels, etc. E.g. Yoga, Meditation, Mind Power. Soft Skills: a sociological term for a persons ââ¬Å"EQâ⬠(Emotional Intelligence Quotient) which refers to the cluster of personality traits, social graces, communication, ability with language, personal habits, friendliness, and optimism that mark each of us in varying degrees. Gupta Rajat(2012). To differentiate clearly between Hard skills, Soft skills and Life skills as; any type of job/work/profession/trade requires a set of tasks to be executed. These are hard skills or Core skills. So these skills are basics for success in professional life. Soft skills, prepare us to be acceptable by others, so that one can attain materialistic and psychometric success in his/her career. And Life skills, prepare us to attain psycho-somatic success (Inner Happiness) in life. Nishitesh and Reddi Bhaskara (2012). All these three skills finally elevate and refine our personality to greater heights, if one knows how to balance all these skills. The ever changing life style, hybrid cultures emerging management styles, technological revolutions essentially require refined sets of skills consisting of Hard Skills(Professional Skills), Soft Skills and Life Skills. Skills Required for the 21st Century Library Though various skills are required, but the skill needs depend on the role and context of the parent organization As all skills do not relate to everyone, a summarized set of skills under three broad categories of skills, i.e. generic, managerial and professional skills have been listed below. (Fisher 2004). S.P. Singh Pinki (2009) (Fouire 62-74) (Oldroyd 30:45-49:69:78:99; Sridhar 141-149); TFPL Skill Set) Generic skills Managerial skills Professional skills Communication skill Local and global thinking Information technology skills Flexibility Planning and organizational skills a. Hardware/ software and networking Skills Adaptability Financial management skills b. MS-Office suite Assertiveness a. Fundraising c. Power point etc. Self-confidence b. Skillful use of financial resources d. Library automation Creativity c. Accounting and auditing skills e. Database creation Innovation Managing change f. Internet Analytical skills Team building g. Intranet skill Problem solving Decision making h. Scanning techniques Decision making Leadership i. Networking skills Service attitude Negotiation skills * On-line search engines Customer relationship Consumer management skills * On-line databases search Improving oneââ¬â¢s learning and experience a. User need analysis j. Desktop publishing Presentation skills b. Information seeking k. Content development Stress management c. Behavior analysis l. Digitization Time management Project management m. Web based services Interpersonal People management n. Virtual learning Group skills Stress management Information literacy Working with difficult people Time management Technical professional skills Resource management a. Information resource management b. E- serial management c. Metadata standards d. Standards e. System development Knowledge management5 Traditional skills Table No: 1 Required Skill for 21st Century Library Soft Skills Each one of us is endowed with two Kinds of Skills. Hard Skills and Soft Skills. Hard skills are human tangibles that often find a place in the individual.This soft skill are mostly of complementary nature representing human intangibles. Hard skills are nothing but academic skill that we have picked up in disciplines. Hard skills a can be obtained by reading books while soft skills cannot be acquired by merely reading books. Although it is difficult to give an exhaustive list of soft skills, let us look at the following list proposed by Goeran Nieragden under four heads: Interaction Self-Management Attitude Awareness Compensation strategies Conflict Handling Decision making Co-operation Learning willingness Diversity tolerance Self-assessment Etiquette Self-discipline Interlocutor orientation Self-marketing Teamwork willingness Stress resistance Communication Organization Delegating skills Problem solving Listening skills Systems thinking Presentation skills Troubleshooting List of Essential Soft Skills for Library Professionals Following are some of the significant soft skills that are required to become a successful library professional. Listening skills: The library professionals must have good listening skills a she/she has to interact with different types of users all the time. Communication skills: Command on language, especially English and also regional will improve the communication. A good communication skill also requires understanding people, self-confidence which enables to solve the problems with ease. Writing skills: The librarians are asked to help in writing research proposal/business proposal/project report, which requires good writing skills. Today there are many library professionals who are contributing to various publications, even in-house also or by sharing information and their experiences through library blogs and websites. Presentation skills: The presentation skills are required in report writing, library committee meetings and even in daily work which represents the overall library management. User service: To satisfy the information needs of the users is the utmost priority for any library. The library professionals provide various services such as CAS and SDI or other specialized services. Leadership skills Teamwork: Library management, especially in a bigger library set up is about team work/exercise. Hence, it is required to have leadership skills to manage and guide the team from time to time, as every subordinate is important for carrying out their work efficiently for smooth running of a library system. Teaching skills: Libraries spend huge amounts to procure resources, both print as well as electronic, therefore, it is essential to possess teaching skills, which helps to conduct the information literacy classes effectively. Conclusion Soft skills, becoming impartant of Library professionals in this 21st Century. A current century internet provides more exercise of this Softskills. The overlap in soft skill development and best practices across disciplines needs the Library Science course institutions have to think how to teach soft skills effectively. This paper presents and briefly mentioned variety of soft skills likely to be significant importance to LIS professionals. If we start to learn beginning from library science study itself, the huge difference will be there to execute their work environment. Of course, more and more innovative methods need to implement this soft skills to library studies. Through this paper, we request to add soft skill training to all library and information courses curriculams. References Abdus Sattar, Chaudhry., Christopher, S.G. Khoo.(2008). ââ¬Å"Trend in LIS Education: Coverage of Soft skills in Curriculaâ⬠. Journal of Librarianship and Information Studies, 66,1-13. Goeran Nieragden, (2000). ââ¬ËThe Soft Skills of Business Englishââ¬â¢, The Weekly September 2000. http://www.eltnewsletter.com/back/September2000/art282000.htm Accessed on (Dec- 2014). Gupta Rajat (2012). ââ¬Å"Soft Skills: Tools for Successâ⬠, Yking Books, Jaipur, P.4 Nishitesh and Reddi Bhaskara (2012).â⬠Soft Skills and Life Skills : The Dynamics of Successâ⬠, BSC Publishers and Distributors, Hyderabad, P.16 Vidya V. Hanchinal (2014).â⬠Developing Leadership Qualities in Librarians through Soft Skillsâ⬠, Episteme: an online interdisciplinary, multidisciplinary multi-cultural journal,6 (4). Sridhar (2000), ââ¬Å"Skill Requirements of LIS Professionals in the New E-Worldâ⬠, Library Science with a Slant to Documentation and Information Studies, 36.(3) Pp.141-149. TFPL Skills Set: Knowledge and Information Management Skills toolkit. http://skillstoolkit.tfpl.com Access on (Dec- 2014). Fisher (2004). ââ¬Å"Workforce Skills Development: The Professional Imperative for Information Services in the United Kingdom.â⬠Australian Library and Information Association 2004 Biennial Conference. Sydney, 19 June 2004. S.P. Singh Pinki (2009). ââ¬Å"New Skills for LIS professionals in Technology-Intensive Environmentâ⬠. ICAL 2009 ââ¬â CHANGE MANAGEMENT, Pp.331 -336
Tuesday, September 3, 2019
How John Keats used Symbolism in his Ode to a Grecian Urn Essay
How John Keats used Symbolism in his ââ¬Å"Ode to a Grecian Urnâ⬠à à à à à John Keats was born in 1795 in Moorfields, England. He was the son of a stableman who married the ownerââ¬â¢s daughter and eventually inherited the stable for himself. He was fourteen when his mother died of tuberculosis. Having been apprenticed to an apothecary at the age of fifteen, John felt the need to leave medical field to focus primarily poetry. Keatsââ¬â¢s imagery ranges from all of our physical sensations: sight, touch, sound, taste, and sexuality. Keats is one of the most famous for his Odes. Traditionally, the ode is lengthy, serious in subject, elevated in its diction and style, and often elaborate in its stanza structure. ââ¬Å"Symbolism seems the obvious term for the dominant style which followed nineteenth-century realismâ⬠(Wellek 251). According to an article found in Jstor journal, written by Vyacgeslav Ivanov, titled, Symbolism, ââ¬Å"symbols are far from being an invention and convention of mankind, constitute in the universe, all pulsating with life, a primordial imprint in the very substance of things and, and it were, an occult language by means of which is achieved a preordained communion of innumerable kindred spirits, no matter how these spirits may differ in their individual modes of existence or whether they belong to different orders of creationâ⬠(Ivanov 29). Keats uses symbolism in ââ¬Å"Ode to a Grecian Urnâ⬠to illustrate his love for ancient Greece. à à à à à à à à à à ââ¬Å"Ode to a Grecian Urnââ¬â¢ was written by John Keats at some unknown date. ââ¬Å"The Urn, as Keats described it, was a classical vase, decorated with a frieze of engraved figures in scenes from pastoral life. In reality it was more than any particular vase which he had seen on his museum excursions with Haydon or Severn. The Grecian Urn represented poetic vision, the timeless, enchanted world into which the artistââ¬â¢s imagination alone can enter,â⬠as stated in Robert Gittings and Jo Mantonââ¬â¢s book titled The Story of John Keats (Gittings and Manton, pg. 148). In this poem Keats wants to create a world of pure joy, but the world is of make believed of people living in a moment in time. In an article titled, ââ¬Å"Thought is sacrificed to sensation in the poetry of John Keats,â⬠author Iain Morrison states that ââ¬Å"Existing in a frozen or suspended time, they cannot move or cha... ... to know.â⬠The beauty lies in the urn. ââ¬Å"What the imagination seizes as beauty must be truth,â⬠as stated by Catherine Owens Peare, author of a book titled John Keats a Portrait in Words. ââ¬Å"John Keatsââ¬â¢s ââ¬Å"Ode on a Grecian Urnâ⬠was both inevitable and incredible. It was inevitable that he should by now have struggled free of the sonnet with its fourteen-line prejudice to create this ten-line stanza and its two pairs of lines and two sets of triple rhymes, inevitable that in developing his own style he should have resolved his philosophic search at this his period of most superb creativityâ⬠(Peare, pg. 174). Douglas Wilsonââ¬â¢s article in Jstor titled ââ¬Å"Reading the Urn: Death in Keatsââ¬â¢s Arcadia,â⬠ââ¬Å"Like Blakeââ¬â¢s ââ¬Å"Mental Travelerâ⬠and so many other Romantic poems, ââ¬Å"Ode on a Grecian Urnâ⬠invites the reader into a landscape of consciousness. As S.T. Coleridge puts it, the primary function of the poetic work, like the visual language of painting, is ââ¬Å"to instill energy into the mind, which compels the imagination to complete the picture. The odeââ¬â¢s speaker responding to an imaginary urn conjures up, as part of a mental dram, the underside of a vanished culture that created such urnsâ⬠(Wilson 823).
Role of Women in Mark Twains The Adventures of Huckleberry Finn :: Adventures Huckleberry Huck Finn Essays
Huckleberry Finn ââ¬â Role of Women Throughout history women have been subject to sexual discrimination based on being the physically weaker gender and thus leading to society's negative view of women, there is no exception to the stigma cast on women in The Adventures of Huckleberry Finn. During the novel every character portraying a woman shows society's view on the role on women. The issue of sexism was never questioned by Mark Twain, which leads to another question--- how can such a powerful novel dealing with such a heated topic like racial prejudices remain totally neutral and bypass altogether sexual inequality? One reason Twain may have overlooked the sexism of the time was because he too gave into society's connotation of women's roles. Olivia Clemens, his wife, was very much like Sally Phelps. She was dependent on her husband and served with no other true purpose in life than to run a house and bear children. But, did Twain look over sexism or support it? He may have had issues with women due to his own marriage. His wife never produced a healthy son, and she was always sickly. The dependent Olivia was even thought to hinder his ability as a writer. So were the roles of women purposely placed in the novel to support his own opinions of women in the home? Miss Watson plays into society's rules and regulations. "Miss Watson, a tolerable slim old maid, with goggles on, had just come to live with her, and took a set at me now, with a spelling book. She worked on me middling hard for about an hour, then the wido made her ease up. I couldn't stood her much longer." (The Adventures of Huckleberry Finn, Twain, page 2) The word spinster came into common use during the early 19th century when the thankless task of spinning cloth had been pushed off to unmarried women as a way to earn their keep in the home (O'Brien, 1973). Miss Watson is the image of everything an old maid stands for. Contemporary use of the word conjures up a mental image of a childless, frumpy, middle-aged woman who is somewhat depressed, and is longing to be like other "normal" women.
Monday, September 2, 2019
Heinz Case Study
Company made a corporate move that framed the course of their future business model. In order to increase their competitiveness, Heinz had to come up with a business strategy that would rival competitors. According to the case study, the dominant corporate strategy has been Identified as a directional strategy, which was based on analyzing the company's orientation toward growth. It was noted that the company needed to: 1) cut back on operations by simplifying their business model, 2) diversify the business to increase growth, and 3) grow nationally and globally through a merger which would also reduce debt.The first step in the strategy included streamlining their product selection which would refocus the company's business model, while also offering more flexibility. Heinz had decided to allow their two main food platforms to be the highlight of the company: meal enhancers (which included condiments of all types) and meal and snacks (including frozen and shelf-stable goods and the same made for the food service industry). In doing so, they could focus more attention to detail on their successful products such as packaging and quality, Instead of spreading themselves thin by splitting powerless with struggling products and brands.The second strategy Included Increasing growth by diversifying business. Heinz did so by engaging In concentric diversification with the Del Monte Company. By creating a synergistic relationship with a like-minded food company, Heinz was able to take stock of their product lines, figure out strengths and weakness of each, and identify which of the products would benefit from a strategic fit with Del Mote's input regarding approach and knowledge in production, marketing and/or sales. This allowed both companies to converge, growing both individually and together, thereby increasing profits and company growth.In fact, it was expected that as Whine's revenue increased by twenty percent, Del Mote's company would double in size. Lastly, th e business merger of Heinz with Del Monte Foods has not only Increased wealth, but It has reduced the debt. By allowing Its shareholders to assume a 0. 45 share of stock In Del Monte for every share that they owned In Heinz, this also allowed Del Monte to acquire twenty percent of Whine's debt. This essentially made those shareholders the majority owners in the new Del Monte. Additionally, more debt was alleviated when Heinz was able to condense dividends by thirty-three recent, which generated extra monetary flow.By 2004, Heinz was able to change its organizational structure which showcased its horizontal growth. They were able to venture into new markets through their band acquisitions from Del Monte, and created a strong presence in the following markets: North America, U. S. Foddering, Europe, Asia/Pacific, and smaller markets in Latin America, Africa, India, and the Middle East. Across the board, this resulted in profitable diversification In revenue. The appropriateness of thi s directional strategy seems to have worked In the Heinz Company's favor.Instead of continuing to be weighed down by debt, and an over-bloated portfolio of products (all of which were not profitable), the merger helped to alleviate most of the problems. If they had chose to only focus on a of debt acquired by Del Monte. Also by not choosing a parenting strategy, they allowed for more of a partnership between companies instead of a one holding more power than the other. The directional strategy seemed to offer the best combination (portfolio attention and a synergy relationship) of the latter two strategies, which worked best for the goals that Heinz Company had in mind for their own personal growth.
Sunday, September 1, 2019
A Missionary Who Transformed a Nation Essay
When Englishman William Carey (1761ââ¬â1834) arrived in India in 1793, it marked a major milestone in the history of Christian missions and in the history of India. Carey established the Serampore Missionââ¬âthe first modern Protestant mission in the non-English-speaking worldââ¬ânear Calcutta on January 10, 1800.1 From this base, he labored for nearly a quarter century to spread the gospel throughout the land. In the end his triumph was spectacular. Through his unfailing love for the people of India and his relentless campaign against ââ¬Å"the spiritual forces of evilâ⬠(Eph. 6:12), India was literally transformed. Asian historian Hugh Tinker summarizes Careyââ¬â¢s impact on India this way: ââ¬Å"And so in Serampore, on the banks of the river Hooghly, the principal elements of modern South Asiaââ¬âthe press, the university, social consciousnessââ¬âall came to light.â⬠2 Who was William Carey? He was exactly the kind of man that the Lord seems to delight in using to accomplish great things; in other words, the kind of person that most of us would least expect. He was raised in a small, rural English town where he received almost no formal education. His chief source of income came through his work as a cobbler (a shoemaker). He had an awkward, homely appearance, having lost almost all his hair in childhood. Upon his arrival in India and throughout his years there, he was harassed by British colonists, deserted by his mission-sending agency, and opposed by younger missionary recruits who were sent to help him. Despite these setbacks, he became perhaps the most influential person in the largest outpost of the British Empire.3 Carey didnââ¬â¢t go to India merely to start new churches or set up medical clinics for the poor. He was driven by a more comprehensive visionââ¬âa vision for discipling the nation. ââ¬Å"Carey saw India not as a foreign country to be exploited, but as his heavenly Fatherââ¬â¢s land to be loved and served, a society where truth, not ignorance, needed to rule.â⬠4 He looked outward across the land and asked himself, ââ¬Å"If Jesus were the Lord of India, what would it look like? What would be different?â⬠This question set his agenda and led to his involvement in a remarkable variety of activities aimed at glorifying God and advancing His kingdom. Following are highlights of Careyââ¬â¢s work described in Vishal and Ruth Mangalwadiââ¬â¢s outstanding book The Legacy of William Carey: A Model for the Transformation of a Culture.5 Carey was horrified that India, one of the most fertile countries in the world, had been allowed to become an uncultivated jungle abandoned to wild beasts and serpents. Therefore he carried out a systematic survey of agriculture and campaigned for agriculture reform. He introduced the Linnaean system of plant organizations and published the first science texts in India. He did this because he believed that nature is declared ââ¬Å"goodâ⬠by its Creator; it is not Maya (illusion) to be shunned, as Hindus believe, but a subject worthy of human study. Carey introduced the idea of savings banks to India to fight the all-pervasive social evil of usury (the lending of money at excessive interest). He believed that God, being righteous, hated this practice which made investment, industry, commerce, and economic development impossible. He was the first to campaign for humane treatment of Indiaââ¬â¢s leprosy victims because he believed that Jesusââ¬â¢ love extends to leprosy patie nts, so they should be cared for. Before then, lepers were often buried or burned alive because of the belief that a violent death purified the body on its way to reincarnation into a new healthy existence. He established the first newspaper ever printed in any Oriental language, because he believed that ââ¬Å"above all forms of truth and faith, Christianity seeks free discussion.â⬠His English-language journal, Friend of India, was the force that gave birth to the social-reform movement in India in the first half of the nineteenth century. He translated the Bible into over 40 different Indian languages. He transformed the Bengali language, previously considered ââ¬Å"fit for only demons and women,â⬠into the foremost literary language of India. He wrote gospel ballads in Bengali to bring the Hindu love of music to the service of his Lord. He began dozens of schools for Indian children of all castes and launched the first college in Asia. He desired to develop the Indian mind and liberate it from darkness and superstition. He was the first man to stand against the ruthless murders and widespread oppression of women. Women in India were being crushed through polygamy, female infanticide, child marriage, widow burning, euthanasia, and forced illiteracyââ¬âall sanctioned by religion. Carey opened schools for girls. When widows converted to Christianity, he arranged marriages for them. It was his persistent, 25-year battle against widow burning (known as sati) that finally led to the formal banning of this horrible religious practice. William Carey was a pioneer of the modern Christian missionary movement, a movement that has since reached every corner of the world. Although a man of simple origins, he used his God-given genius and every available means to serve his Creator and illumine the dark corners of India with the light of the truth. William Careyââ¬â¢s ministry in India can be described as wholistic. For something to be wholistic, it must have multiple parts that contribute to a greater whole. What is the ââ¬Å"wholeâ⬠to which all Christian ministry activities contribute? Through an examination of Christââ¬â¢s earthly ministry, we see that the ââ¬Å"wholeâ⬠is glorifying God and advancing His kingdom through the discipling of the nations (Matt. 24:14; 28:18ââ¬â20). This is Godââ¬â¢s ââ¬Å"big agendaâ⬠ââ¬âthe principal task that he works through His church to accomplish. If this is the whole, then what are the parts? Matthew 4:23, highlights three parts: preaching, teaching, and healing. Because each part is essential to the whole, letââ¬â¢s look at each one more carefully. Preaching includes proclaiming the gospelââ¬âGodââ¬â¢s gracious invitation for people everywhere to live in His Kingdom, have their sins forgiven, be spiritually reborn, and become children of God through faith in Christ. Proclaiming the gospel is essential to wholistic ministry, for unless lost and broken people are spiritually reborn into a living relationship with Godââ¬âunless they become ââ¬Å"a new creationâ⬠(2 Cor. 5:17)ââ¬âall efforts to bring hope, healing, and transformation are doomed to fail. People everywhere need their relationship with God restored, yet preaching is only one part of wholistic ministry. Teaching entails instructing people in the foundational truths of Scripture. It is associated with discipleshipââ¬âhelping people to live in obedience to God and His Word in every area of life. In Matthew 28:20 Jesus tells His disciples to ââ¬Å"teach [the nations] to obey everything I have commanded you.â⬠Unless believers are taught to obey Christââ¬â¢s commands, their growth may be hindered. Colossians 3:16 says, ââ¬Å"Let the word of Christ dwell in you richly as you teach and admonish one another with all wisdom.â⬠Healing involves the tangible demonstrations of the present reality of the Kingdom in the midst of our hurting and broken world. When Jesus came, He demonstrated the present reality of Godââ¬â¢s Kingdom by healing people. ââ¬Å"The blind receive sight, the lame walk, those who have leprosy are cured, the deaf hear, the dead are rais ed, and the good news is preached to the poor,â⬠was Jesusââ¬â¢ report to His cousin John the Baptist in Matthew 11:4ââ¬â5. Jesus didnââ¬â¢t just preach the good news; He demonstrated it by healing all forms of brokenness. Unless ministry to peopleââ¬â¢s physical needs accompanies evangelism and discipleship, our message will be empty, weak, and irrelevant. This is particularly true where physical poverty is rampant. The apostle John admonishes, ââ¬Å"If anyone has material possessions and sees his brother in need but has no pity on him, how can the love of God be in him? Dear children, let us not love with words or tongue but with actions and in truthâ⬠(1 John 3:17ââ¬â18). Hereââ¬â¢s a picture of the basic elements of a biblically balanced, wholistic ministry: First, there are multiple partsââ¬âpreaching, teaching and healing. These parts have distinct functions, yet they are inseparable. All are essential in contributing to the whole, which is glorifying God and advancing His Kingdom. Lastly, each part rests on the solid foundation of the biblical worldview. In other words, each is understood and implemented through the basic presuppositions of Scripture. In summary, preaching, teaching and healing are three indispensable parts of wholistic ministry, whose purpose is to advance Godââ¬â¢s kingdom ââ¬Å"on earth as it is in heavenâ⬠(Matt. 6:10). Without these parts working together seamlessly, our ministry is less than what Christ intends, and will lack power to transform lives and nations. To comprehend the nature and purpose of wholistic ministry, two concepts must be understood. First is the comprehensive impact of humanityââ¬â¢s spiritual rebellion. Second is that our loving, compassionate God is presently unfolding His plan to redeem and restore all things broken through the Fall. When Adam and Eve turned their backs on God in the Garden of Eden (Gen. 3:1ââ¬â6), the consequences of their sin were devastating and far-reaching; they affected the very order of the universe. At least four relationships were broken through the Fall. First, Adam and Eveââ¬â¢s intimate relationship with God was broken (Gen. 3:8ââ¬â9). This was the primary relationship for which they had been created, the most important aspect of their lives. When their relationship with God was broken, their other relationships were damaged too: their relationship with themselves as individuals (Gen. 3:7, 10), with each other as fellow human beings (Gen. 3:7, 12, 16), and with the rest of creation (Gen. 3:17ââ¬â19). The universe is intricately designed and interwoven. It is wholistic, composed of multiple parts, each of which depends on the proper functioning of the others. All parts are governed by laws established by God. When the primary relationship between God and humanity was severed, every part of the original harmony of Godââ¬â¢s creation was affected. The results of this comprehensive brokenness have plagued humanity ever since. War, hatred, violence, environmental degradation, injustice, corruption, idolatry, poverty and fa mine all spring from sin. Thus, when God set out to restore His creation from the all-encompassing effects of manââ¬â¢s rebellion, His redemptive plan could not be small or narrow, focusing on a single area of brokenness. His plan is not limited to saving human souls or teaching or even healing. Rather, it combines all three with the goal of restoring everything, including each of the four broken relationships described above. Colossians 1:19ââ¬â20 provides a picture of Godââ¬â¢s wholistic redemptive plan: For God was pleased to have all his fullness dwell in [Christ], and through him to reconcile to himself all things, whether things on earth or things in heaven, by making peace through his blood, shed on the cross. (Emphasis added) God is redeeming all things. Through Christââ¬â¢s blood our sins are forgiven and our fellowship with God is renewed. And not only thatââ¬âwe also can experience substantial healing within ourselves, with others, and with the environment. The gospel is not only good news for after we die; it is good news here and now! The task of the church is to join God in His big agenda of restoring all things. We are ââ¬Å"Christââ¬â¢s ambassadors,â⬠called to t he ââ¬Å"ministry of reconciliationâ⬠(see 2 Cor. 5:18ââ¬â20). In the words of Christian apologist Francis Schaeffer, we should be working ââ¬Å"on the basis of the finished work of Christ . . . [for] substantial healing now in every area where there are divisions because of the Fall.â⬠6 To do this, we must first believe that such healing can be a reality here and now, in every area, on the basis of the finished work of Christ. This healing will not be perfect or complete on this side of Christââ¬â¢s return, yet it can be real, evident, and substantial. Preaching, teaching, and substantial healing in every area where brokenness exists as a result of the Fallââ¬âin essence, wholistic ministryââ¬âis the vision that Christ had and modeled for us on earth. It was the vision that set the agenda for William Carey in India. It is the vision that should set the agenda for our ministry as well. When Jesus sent out His disciples on their first missionary journey, ââ¬Å"He sent them out to preach the kingdom of God and to heal the sickâ⠬ (Luke 9:2). Yet today itââ¬â¢s common for Christian ministries to separate the twin ministry components. Some focus exclusively on preaching, evangelism, or church planting, while others focus on meeting the physical needs of the broken or impoverished. Typically these two groups have little interaction. This division is not what Christ intended. By focusing on one to the exclusion of the other, ministries are limited and ineffective in bringing about true, lasting transformation. The Bible provides a model of ministry where preaching, teaching, and healing are, in the words of Dr. Tetsunao Yamamori, ââ¬Å"functionally separate, yet relationally inseparable.â⬠7 Each part is distinct and deserves special attention and focus. Yet the parts must function together. Together they form a wholistic ministry that is both powerful and effectiveââ¬âa ministry able to transform lives and entire nations. The work of William Carey in India gives historical testimony to this fact. According to theologian David Wells, preaching, teaching, and healing must be ââ¬Å"inextricably related to each other, the former being the foundation and the latter being the evidence of the working of the former.â⬠There is a story told about the subject of the following sketch which may be repeated here by way of introduction. It is said that long after he had attained to fame and eminence in India, being Professor of oriental languages in the college of Fort William, honoured with letters and medals from royal hands, and able to write F.L.S., F.G S., F.A.S., and other symbols of distinction after his name, he was dining one day with a select company at the Governor-Generalââ¬â¢s, when one of the guests, with more than questionable taste, asked an aide-de-camp present, in a whisper loud enough to be heard by the professor, whether Dr. Carey had not once been a shoemaker. ââ¬Å"No, sir,â⬠immediately answered the doctor, ââ¬Å"only a cobbler!â⬠Whether he was proud of it, we cannot say; that he had no need to be ashamed of it, we are sure. He had out-lived the day when Edinburgh reviewers tried to heap contempt on ââ¬Å"consecrated cobblers,â⬠and he had established his right to be enrolled amongst the aristocracy of learning and philanthropy. Some fifty years before this incident took place, a visitor might have seen over a small shop in a Northamptonshire village a sign-board with the following inscription: Second-hand Shoes Bought and Sold.WILLIAM CAREY.| The owner of this humble shop was the son of a poor schoolmaster, who inherited a taste for learning; and though he was consigned to the drudgery of mending boots and shoes, and was even then a sickly, care-worn man, in poverty and distress, with a delicate and unsympathizing wife, he lost no opportunity of acquiring information both in languages and natural history and taught himself drawing and painting. He always worked with lexicons and classics open upon his bench; so that Scott, the commentator, to whom it is said that he owed his earliest religious impressions, used to call that shop ââ¬Å"Mr. Careyââ¬â¢s college.â⬠His tastes ââ¬â we ought rather to say Godââ¬â¢s providence ââ¬â soon led him to open a village school; and as he belonged to the Baptist community, he combined with the office of schoolmaster that of a preacher in their little chapel at Moulton, with the scanty salary of à £16 a year. Strange to say, it was whilst giving his daily lessons in g eography that the flame of missionary zeal was kindled in his bosom. As he looked upon the vast regions depicted on the map of the world, he began to ponder on the spiritual darkness that brooded over so many of them, and this led him to collect and collate information on the subject, until his whole mind was occupied with the absorbing theme. It so happened that a gathering of Baptist ministers at Northampton invited a subject for discussion, and Carey, who was present, at once proposed ââ¬Å"The duty of Christians to attempt the spread of the Gospel amongst heathen nations.â⬠The proposal fell amongst them like a bombshell, and the young man was almost shouted down by those who thought such a scheme impracticable and wild. Even Andrew Fuller, who eventually became his great supporter, confessed that he found himself ready to exclaim, ââ¬Å"If the Lord would make windows in heaven, might this thing be?â⬠But Careyââ¬â¢s zeal was not to be quenched. He brought forward the topic again and again; he wrote a pamphlet on the subject; and on his removal to a more important post of duty at Leicester, he won over several influential persons to his views. It was at this time (1792) he preached his famous sermon from Isaiah 54:2,3, and summed up its teaching in these two important statements: (1) ââ¬Å"Expect great things from God,â⬠and (2) ââ¬Å"Attempt great things for God.â⬠This led to the formation of the Baptist Missionary Society; and Carey, at the age of thirty-three, proved his sincerity by volunteering to be its first messenger to the heathen. Andrew Fuller had said, ââ¬Å"There is a gold mine in India; but it seems as deep as the centre of the earth; who will venture to explore it?â⬠ââ¬Å"I will go down,â⬠responded William Carey, in words never to be forgotten, ââ¬Å"but remember that you must hold the rope.â⬠The funds of the Society amounted at the time to à £13 2s 6d. But the chief difficulties did not arise out of questions of finance. The East India Company, sharing the jealousy against missionary effort, which, alas! at that time was to be found amongst the chief statesmen of the realm , and amongst prelates of the Established Church as well as amongst Nonconformist ministers, were opposed to all such efforts, and no one could set his foot upon the Companyââ¬â¢s territory without a special license. The missionary party and their baggage were on board the Earl of Oxford and the ship was just ready to sail, when an information was laid against the captain for taking a person on board without an order from the Company, and forthwith the passengers and their goods were hastily put on shore, and the vessel weighed anchor for Calcutta, leaving them behind, disappointed and disheartened. They returned to London. Mr. Thomas, who was Careyââ¬â¢s companion and brother missionary, went to a coffee-house, when, to use his own language, ââ¬Å"to the great joy of a bruised heart, the waiter put a card into my hand, whereon were written these life-giving words: ââ¬ËA Danish East Indiaman, No. 10, Cannon Street.ââ¬â¢ No more tears that night. Our courage revived; we fled to No. 10, Cannon Street, and found it was the office of Smith and Co., agents, and that Mr. Smith was a brother of the captainââ¬â¢s; that this ship had sailed, as he supposed, from Copenhagen; was hourly expecte d in Dover roads; would make no stay there; and the terms were à £100 for each passenger, à £50 for a child, and à £25 for an attendant.â⬠This of course brought up the financial difficulty in a new and aggravated form; but the generosity of the agent and owner of the ship soon overcame it, and within twenty-four hours of their return to London, Mr. Carey and his party embarked for Dover; and on the 13th June, 1793, they found themselves on board the Kron Princessa Maria, where they were treated with the utmost kindness by the captain, who admitted them to his own table, and provided them with special cabins. The delay, singularly enough, removed one of Careyââ¬â¢s chief difficulties and regrets. His wife who was physically feeble, and whose deficiency in respect to moral intrepidity was afterwards painfully accounted for by twelve years of insanity in India, had positively refused to accompany him, and he had consequently made up his mind to go out alone. She was not with him when he and his party were suddenly expelled from the English ship; but she was so wrought upon by all that had occurred, as well as by renewed entreaties, that with her sister and her five children she set sail with him for Calcutta. Difficulties of various kinds surrounded them upon their arrival in India. Poverty, fevers, bereavement, the sad illness of his wife, the jealousy of the Government, all combined to render it necessary that for a while Carey should betake himself to an employment in the Sunderbunds, where he had often to use his gun to supply the wants of his family; and eventually he went to an indigo factory at Mudnabully, where he hoped to earn a livelihood. But he kept the grand project of his life distinctly in view; he set himself to the acquisition of the language, he erected schools, he made missionary tours, he began to translate the New Testament, and above all he worked at his printing press, which was set up in one corner of the factory and was looked upon by the natives as his god. Careyââ¬â¢s feelings at this time with regard to his work will be best expressed in the following passage from a letter to his sisters: ââ¬Å"I know not what to say about the mission. I feel as a farmer does about his crop; sometimes I think the seed is springing, and then I hope; a little time blasts all, and my hopes are gone like a cloud. â⬠¦ I preach every day to the natives, and twice on the Lordââ¬â¢s Day constantly, besides other itinerant labours; and I try to speak of Jesus Christ and Him crucified and of Him alone; but my soul is often dejected to see no fruit.â⬠And then he goes on to speak of that department of his labour in which his greatest achievements were ultimately to be won: ââ¬Å"The work of translation is going on, and I hope the whole New Testament and the five books of Moses may be completed before this reaches you. It is a pleasant work and a rich reward, and I trust, whenever it is published, it will soon prevail, and put down all the Shastras of the Hindus. â⬠¦The translation of the Scriptures I look upon to be one of the greatest desiderata in the world, and it has accordingly occupied a considerable part of my time and attention.â⬠Five or six years of patient unrequited toil passed by, and then four additional labourers were sent out by the Society to Careyââ¬â¢s help. Two of them will never be forgotten, and the names of Carey, Marshman, and Ward will ever be inseparably linked in the history of Indian missions. Ward had been a printer; and it was a saying of Careyââ¬â¢s, addressed to him in England, that led him to adopt a missionaryââ¬â¢s life: ââ¬Å"We shall want you,â⬠said he, ââ¬Å"in a few years, to print the Bible; you must come after us.â⬠Marshman had been an assistant in a London book-shop, but soon found that his business there was not to his taste, as he wished to know more about the contents of books than about their covers; so he set up a school at Bristol, mastered Greek and Latin, Hebrew and Syriac, and became prosperous in the world; but he gave up all to join Carey in his noble enterprise, and moreover, brought out with him, as a helper in the mission, a young man whom he himself had been the means of converting from infidelity. Marshmanââ¬â¢s wife was a cultivated woman, and her boarding school in India brought in a good revenue to the mission treasury. His daughter married Henry Havelock, who made for himself as great a name in the military annals of his country as his illustrious father-in-law had won for himself in the missionary history of the world. The jealous and unchristian policy of the East India Company would not allow the newly arrived missionaries to join their brethren, and they were compelled to seek shelter under a foreign flag. Fortunately for the cause of missions, a settlement had been secured by the Danes at Serampore, some sixteen miles up the river from Calcutta, and it now proved ââ¬Å"a city of refugeâ⬠to Englishmen who had been driven from territory which owned the British sway. The governor of the colony, Colonel Bie, was a grand specimen of his race; he had been in early days a pupil of Schwartz, and he rejoiced in knowing that the kings of Denmark had been the first Protestant princes that ever encouraged missions amongst the heathen. He gave the exiled missionaries a generous welcome and again and again gallantly resisted all attempts to deprive them of his protection, declaring that ââ¬Å"if the British Government still refused to sanction their continuance in India, they should have the shield of Denmark thrown over them if they would remain at Serampore.â⬠Carey determined, though it was accompanied with personal loss to himself, to join his brethren at Serampore, and the mission soon was organized in that place, which became, so to speak, ââ¬Å"the cradle of Indian missions.â⬠It possessed many advantages: it was only sixty miles from Nuddea, and was within a hundred of the Mahratta country; here the missionaries could preach the Gospel and work their printing press without fear, and from this place they could pass under Danish passports to any part of India. There was a special providence in their coming to Serampore at the time they did; for in 1801 it passed over to English rule without the firing of a shot. They were soon at work, both in their schools and on their preaching tours. Living on homely fare and working for their bread, they went forth betimes in pairs to preach the word of the living God, now in the streets or in the bazaars, now in the midst of heathen temples, attracting crowds to hear them by the sweet hymns which Carey had composed in the native tongue, and inviting inquirers to the mission-house for further instruction. The first convert was baptized in the same year on the day after Christmas. His name was Krishnu. He had been brought to the mission-house for medical relief, and was so influenced by what he saw and heard, that he resolved to become a Christian. On breaking caste by eating with the missionaries, he was seized by an enraged mob and dragged before the magistrate, but to their dismay he was released from their hands. Carey had the pleasure of performing the ceremony of baptism with his own hands, in presence of the governor and a crowd of natives and Europeans. It was his first recompense after seven years of toil, and it soon led the way to other conversions. Amongst the rest, a high-caste Brahmin divested himself of his sacred thread, joined the Christian ranks, and preached the faith which he once destroyed. Krishnu became an efficient helper and built at his own expense the first place of worship for native Christians in Bengal. Writing about him twelve years after his baptism, Car ey says, ââ¬Å"He is now a steady, zealous, well-informed, and I may add eloquent minister of the Gospel, and preaches on an average twelve or fourteen times every week in Calcutta and its neighborhood.â⬠But we must turn from the other laborers and the general work of the mission to dwell upon the special work for which Careyââ¬â¢s tastes and qualifications so admirably fitted him. We have seen that his heart was set on the translation and printing of the Scriptures and to this from the outset he sedulously devoted himself. On the 17th March, 1800 the first sheet of the Bengali New Testament was ready for the press, and in the next year Carey was able to say, ââ¬Å"I have lived to see the Bible translated into Bengali, and the whole New Testament printed.â⬠But this was far from being the end of Careyââ¬â¢s enterprise. In 1806, the Serampore missionaries contemplated and issued proposals for rendering the Holy Scriptures into fifteen oriental languages, viz., Sanskrit, Bengali, Hindustani, Persian, Mahratta, Guzarathi, Oriya, Kurnata, Telinga, Burman, Assam, Boutan, Thibetan, Malay, and Chinese. Professor Wilson, the Boden Professor of Sanscrit at Oxford, has told us how this proposal was more than accomplished: ââ¬Å"They published,â⬠he says, ââ¬Å"in the course of about five-and-twenty years, translations of portions of the Old and New Testament, more or less considerable, in forty different dialects.â⬠It is not pretended that they were conversant with all these forms of speech, but they employed competent natives, and as they themselves were masters of Sanscrit and several vernacular dialects, they were able to guide and superintend them. In all this work Dr. Carey (for the degree of Doctor of Divinity had been bestowed on him by a learned university) took a leading part. Possessed of at least six different dialects, a thorough master of the Sanscrit, which is the parent of the whole family, and gifted besides with a rare genius for philological investigation, ââ¬Å"he carried the project,â⬠says the professor, ââ¬Å"to as successful an issue as could have been expected from the bounded faculties of man.â⬠And when it is remembered that he began his work at a time when there were no helps or appliances for his studies; when grammars and dictionaries of these dialects were unknown, and had to be constructed by himself; when even manuscripts of them were scarce, and prin ting was utterly unknown to the natives of Bengal, the work which he not only set before him, but accomplished, must be admitted to have been Herculean. Frequently did he weary out three pundits in the day, and to the last hour of his life he never intermitted his labours. The following apology for not engaging more extensively in correspondence will be read with interest, and allowed to be a sufficient one:ââ¬â ââ¬Å"I translate from Bengali and from Sanscrit into English. Every proof-sheet of the Bengali and Mahratta Scriptures must go three times at least through my hands. A dictionary of the Sanscrit goes once at least through my hands. I have written and printed a second edition of the Bengali grammar and collected materials for a Mahratta dictionary. Besides this, I preach twice a week, frequently thrice, and attend upon my collegiate duties. I do not mention this because I think my work a burden ââ¬â it is a real pleasure ââ¬â but to show that my not writing many letters is not because I neglect my brethren, or wish them to cease writing to me.â⬠Carey was by no means a man of brilliant genius, still less was he a man of warm enthusiasm; he had nothing of the sentimental, or speculative, or imaginative in his disposition; but h e was a man of untiring energy and indomitable perseverance. Difficulties seemed only to develop the one and to increase the other. These difficulties arose from various quarters, sometimes from the opposition of the heathen, sometimes from the antagonism of the British Government, sometimes, and more painfully, from the misapprehensions or injudiciousness of the Society at home; but he never was dismayed. On the contrary, he gathered arguments for progress from the opposition that was made to it. ââ¬Å"There is,â⬠he writes ââ¬Å"a very considerable difference in the appearance of the mission, which to me is encouraging. The Brahmins are now most inveterate in their opposition; they oppose the Gospel with the utmost virulence, and the very name of Jesus Christ seems abominable in their ears.â⬠And all this is the more remarkable, when we remember that he was by nature indolent. He says of himself, ââ¬ËNo man ever living felt inertia to so great a degree as I do.â⬠He was in all respects a man of principle and not of impulse. Kind and gentle, he was yet firm and unwavering. Disliking compliments and commendations for himself, it was not his habit to bestow them upon others. Indeed, he tells us that the only attempt which he ever made to pay a compliment met with such discouragement, that he never had any inclination to renew the attempt. A nephew of the celebrated President Edwards called upon him with a letter of introduction, and Carey congratulated him on his relationship to so great a personage; but the young man dryly replied, ââ¬Å"True, sir, but every tub must stand on its own bottom.â⬠From his childhood he had been in earnest in respect to anything he undertook. He once tried to climb a tree and reach a nest, but failed, and soon came to the ground; yet, though he had to limp home bruised and wounded, the first thing he did when able again to leave the house was to climb that same tree and take that identical nest. This habit of perseverance followed him through life. One evening, just before the missionaries retired to rest, the printing office was discovered to be on fire, and in a short time it was totally destroyed. Buildings, types, paper, proofs, and, worse than all, the Sanscrit and other translations perished in the flames. Ten thousand poundsââ¬â¢ worth of property was destroyed that night, no portion of which was covered by insurance; but under the master mind of Carey the disaster was soon retrieved. A portion of the metal was recovered from the wreck, and as the punches and matrices had been saved, the types were speedily recast. Within two months the printers were again at their work; within two more the sum required to repair the premises had been collected; and within seven the Scriptures had been re-translated into the Sanscrit language. Carey preached on the next Lordââ¬â¢s-day after the conflagration, from the text, ââ¬Å"Be still, and know that I am God,â⬠and set before his hearers two thoughts: (1) God has a sovereign right to dispose of us as He pleases; (2) we ought to acquiesce in all that God does with us and to us. Writing to a friend at this time, he calmly rem arks that ââ¬Å"traveling a road the second time, however painful it may be, is usually done with greater ease and certainty than when we travel it for the first time.â⬠To such a man success was already assured, and by such a man success was well deserved. And it came. When the Government looked round for a suitable man to fill the chair of oriental languages in their college at Fort William, their choice fell, almost as a necessity, upon the greatest scholar in India, and so the persecuted missionary became the honoured Professor of Sanscrit, Bengali, and Mahratta, at one thousand rupees a month. He stipulated, however, that he would accept the office only on the condition that his position as a missionary should be recognized; and he took a noble revenge upon those who had so long opposed his work, by devoting the whole of his newly-acquired salary to its further extension. His new position served to call attention to missionary work; and by degrees a better feeling sprang up towards it both at home and abroad. Carey and his companions were at length able to preach in the bazaars of Calcutta. Fresh labourers had come to India. Corrie, Browne, Mart yn, and Buchanan were stirring the depths of Christian sympathy by their work and by their appeals. Grant, Wilberforce, and Macaulay were rousing the British nation to some faint sense of duty; so that when the charter of the East India Company came to be renewed in 1813, the restrictive regulations were defeated in the House of Commons by a majority of more than two to one. In the very next year the foundations of the Indian Episcopate were laid; and in the following year Dr. Middleton, the first Metropolitan of India (having Ceylon for one archdeaconry, and Australia for another) was visiting the Serampore missionaries, in company with the Governor-General, and expressing his admiration and astonishment at their work. Distinctions crowded fast upon the Northamptonshire cobbler. Learned societies thought themselves honoured by admitting him to membership. He had proved himself a useful citizen as well as a devoted missionary. He had established a botanic garden, and edited ââ¬Å"The Flora Indica;â⬠he had founded an agricultural society, and was elected its president; he suggested a plantation committee for India and was its most active member; he collected a splendid museum of natural history which he bequeathed to his college; he was an early associate of the Asiatic Society, and contributed largely to its researches; he had translated the ââ¬Å"Ramayana,â⬠the most ancient poem in the Sanscrit language, into three volumes; he was a constant writer in the Friend of India; he founded a college of his own, and obtained for it a royal charter from the King of Denmark; and in these and other ways he helped forward the moral and political reforms which have done so much for Hindustan. He was one of the first to memorialize the Government against the horrid infanticides at Sangor, and he lived to see them put down. He was early in the field to denounce the murderous abominations of the Suttee [sat i], and to oppose to them the authority even of the Hindu Vedas, and he had the satisfaction of seeing them abolished by Lord William Bentinck. He protested all along against the pilgrim tax, and the support afforded by the Bengal Government to the worship of juggernaut, and he did not die until he saw the subject taken up by others who carried it to a triumphant issue. What would have been his devout gratitude, had he lived to see the last links of connection between the Government and the idol temples severed in 1840, and Hindu and Mohammedan laws, which inflicted forfeiture of all civil rights on those who became Christians, abrogated by the Lex Loci Act of 1850! What would have been the joy of Carey, of Martyn, or of Corrie, could they have heard the testimony borne to the character and success of missions in India by Sir Richard Temple, the late Governor of Madras, at a public meeting held last year in Birmingham! He said, ââ¬Å"I have governed a hundred and five millions of the inhabitants of India, and I have been concerned with eighty-five millions more in my official capacity. â⬠¦I have thus had acquaintance wi th, or been authentically informed regarding, nearly all the missionaries of all the societies labouring in India within the last forty years. And what is my testimony concerning these men? They are most efficient as pastors of their native flocks, and as evangelists in preaching in cities and villages from one end of India to the other. In the work of converting the heathen to the knowledge and practice of the Christian religion, they show great learning in all that relates to the native religion and to the caste system. â⬠¦They are, too, the active and energetic friends of the natives in all times of danger and emergency.â⬠So far as to the character of the missionaries. Speaking of their success, he said, ââ¬Å"It has sometimes been stated in the public prints, which speak with authority, that their progress has been arrested. Now, is this really the case? Remember that missionary work in India began in the year 1813, or sixty-seven years ago. There are in the present year not less than 350,000 native Christians, besides 150,000 scholars, who, though not all Christians, are receiving Christian instruction; that is, 500,000 people, or half a million, brought under the influence of Christianity. And the annual rate of increase in the number of native Christians has progressed with advancing years. At first it was reckoned by hundreds yearly, then by thousands, and further on by tens of thousands. â⬠¦But it will be asked, what is the character of these Christian converts in India? what practically is their conduct as Christians? Now, I am not about to claim for them any extreme degree of Christian perfection. But speaking of them as a class, I venture to affirm that the Christian religion has exercised a dominant influence over their lives and has made a decided mark on their conduct. They adhere to their faith under social difficulties. Large sacrifices have to be made by them. â⬠¦The number of apostates may almost be counted on the fingers. â⬠¦There is no such thing as decay in religion, nor any retrogression towards heathenism. On the contrary, they exhibit a laudable desire for the self-support and government of their Church. â⬠¦I believe that if hereafter, during any revolution, any attempts were to be made by secular violence to drive the native Christians back from their religion, many of them would attest their faith by martyrdom.â⬠Carey was not the man to wish or to expect that Government should step out of its sphere in order to enforce Christianity upon the natives. ââ¬Å"Do you not think, Dr. Carey,â⬠asked a Governor-General, ââ¬Å"that it would be wrong to force the Hindus to be Christians?â⬠ââ¬Å"My Lord,â⬠was the reply, ââ¬Å"the thing is impossible; we may, indeed, force men to be hypocrites, but no power on earth can force men to become Christians.â⬠Carey, however, was too clear-headed not to see , and too honest not to say, that it was one thing to profess neutrality, and another to sanction idolatry; that it was one thing to abstain from using earthly power to propagate truth, and quite another to thwart rational and scriptural methods of diffusing it. And he was too much of a statesman, as well as too much of a missionary, not to see that in respect to some tenets of the Hindu system it would be impossible for the Government eventually to remain neutral, inasmuch as they subverted the very foundations upon which all government is based. Such was the man who in the sequel won deserved honour even from hostile critics, and earned high encomiums from even prejudiced judges. Well might Lord Wellesley, who was, perhaps, the greatest of Indian statesmen, say concerning him, after listening to the first Sanscrit speech ever delivered in India by an European, and hearing that in it Carey had recognized his noble efforts for the good of India, ââ¬Å"I esteem such a testimony from such a man a greater honour than the applause of courts and parliaments.â⬠Still, amidst all his labours and all his honours, he kept the missionary enterprise distinctly in view, and during the forty years of his residence in India he gave it the foremost p lace. Several opportunities and no small inducements for returning to his native land were presented to him, but he declined them all. ââ¬Å"I account this my own country,â⬠he said, ââ¬Å"and have not the least inclination to leave it;â⬠and he never did. To the last his translations of the Scriptures and his printing press were his chief care and his chief delight. He counted it so sacred a work that he believed that a portion of the Lordââ¬â¢s-day could not be better employed than in correcting his proof-sheets. In his seventy-third year, when weak from illness and old age, and drawing near to death, he writes, ââ¬Å"I am now only able to sit and to lie upon my couch, and now and then to read a proof-sheet of the Scriptures; but I am too weak to walk more than across the house, nor can I stand even a few minutes without support.â⬠His last work was to revise his Bengali Bible, and on completing it he says, ââ¬Å"There is scarcely anything for which I desired to live a little longer so much as for that.â⬠He went back to Serampore to die; and ââ¬Å"he died in the presence of all his brethren.â⬠It must have been a touching sight to see Dr. Wilson, the Metropolitan of India, standing by the death-bed of the dying Baptist, and asking for his blessing. It bore witness to the large-heartedness both of the prelate and of the missionary, and was a scene that did honour alike to the living and to the dying. Carey in his will directed that his funeral should be as plain as possible; that he should be laid in the same grave with his second wife, the accomplished Charlotte Rumohr, who had been a real helper to him in his work; and that on the simple stone which marked his grave there should be placed this inscription, and no more.
Subscribe to:
Posts (Atom)