Freedom’s Mirror: Cuba and Haiti in the Age of Revolution

Paper is on Freedom’s Mirror: Cuba and Haiti in the Age of Revolution by Ada Ferrer. 978-1-107-69778-2.

Paper must be 3-4 pages and include page numbers, and presented in a formal and professional manner employing the Turabian-Chicago style format (i.e. proper footnoting)  

Paper must be editable by myself in .docx format.

Paper must restate the author’s thesis and address the author’s sources, (briefly) methodology, (briefly) historiography, and an examination of the authors thesis/argument. 

In the Fields of the North paper

There are five parts to writing a critical review of a piece of literature:

purpose, focus, perspective;
summation of content;
coherence of analysis;
contributions to knowledge;
a personal assessment and/or opinion.

Purpose, Focus, Perspective

            In two to three well-organized paragraphs answer the following questions:

Purpose:  Why is the book being written?
Focus:  What major themes does the author propose to cover?  What issues will be dealt with?  Who or what is to be examined or studied?  What is the time frame?  Where will it take place?  (It is not necessary to have all of these questions answered, nor do you have to follow the order given, but it is important to make sure all relevant information is included).
Perspective:  Who is the author arguing for or against?

Summation of Content

Summarize the contents of the book in three to four concise paragraphs.  Pay attention to how the chapters of the book provide important information that supports what you think the author is arguing for or against.  Take notes on each chapter’s themes.  Can you find meaningful examples which support the author’s purpose, focus, and perspective above?  Avoid re-telling the story.  Write short summary statements that identify the themes and topics of the important chapters that convey the author’s purpose, focus, and perspective.  Always connect the ideas presented in the chapters you judge are central to the author’s intent.  Provide examples from the author’s writing that help you understand the major arguments being made.  A useful summation of content succinctly conveys the author’s organizational structure and presentation of ideas, relaying important thoughts that are central to the author’s argument.  After taking extensive notes based on the information above, you are prepared to write a brief summary of the information in three to four well-organized paragraphs.  Remember: avoid re-telling the story.

Coherence of Analysis

Address any conclusions you judge the author reached.  Perhaps several chapters provided a conclusion.  Or, the last few chapters may have emphasized major points reached.  In one or two paragraphs state the major conclusions reached.  After writing what you judge the conclusions are, in one paragraph, assess the author’s work based on how the parts of the story relate to the whole.  After connecting the parts to the whole, come to an assessment of the work by answering the following question: Given the purpose, focus, and perspective, and understanding how the subject matter was presented, are the conclusions warranted?

Contribution to Knowledge

In one paragraph, address how the work helped you understand the historical concepts introduced in class.  How did the information assist you in appreciating the historical experience of Mexicans and Latinas?  Assess the work’s value in relationship to the content of the course and the concepts used to understand the Mexican and Latina experience.  Look at the instructor’s presentation of the subject matter to date.  Address any information provided by the Gonzalez textbook, if relevant.  Understand how the text under review relays the subject matter via the course presentations and the Gonzalez textbook.  Connect the sources of information together.

Personal Assessment

Now you are ready to conclude with your personal opinion.  The previous sections dealt with the author on his/her terms, not yours.  In a very concise paragraph, address the following questions: What was positive and negative about reading the piece of literature?  How valuable was it in your quest to gain knowledge? Would you recommend the work to others?

By following the steps above, you should be able to write a nice four to six page review of the book.  There is no need to use headers for each section of the review.  Just write out a nice assessment that addresses the five parts listed above in the order given.  If you follow the order given, you should have a smooth flowing critique.  As you are writing, always return to the instructions to guide you or get you back on track.  Do not stray from the task at hand.   Pay attention to the steps.  Pay attention to vocabulary and its use.  Pay attention to the themes/ issues/ideas you are addressing.  Stay focused.

Design an implementation of cryptographic methods for an organization.

IT543-4: Design an implementation of cryptographic methods for an organization.

Assignment Instructions:

This Assignment requires you to analyze a system, identify the cryptographic requirements, and then design a set of solutions to secure the data and the communication within the system. The system to be developed is based on the following scenario:

The ACME Yearbook Company has an existing desktop application that allows customers to create school yearbooks. The desktop application imports a portrait template containing a text document with student and faculty names, grades, and filenames. The filenames identify the yearbook photo for the respective individual. The application then allows the customer to edit the portrait database and to design the school’s yearbook, including the ability to import additional photographs and then lay out each page of the yearbook. When the yearbook is completed, the application uploads a data set to the portrait database “in the cloud” and all of the layout data for each page of the yearbook.

Note: Their previous product used CD ROMSs and there was no Internet access for development, viewing, or purchase.

This data set is used by the company so that the company can produce a high-resolution PDF of the yearbook, which is then used to produce the printed hardcopy yearbooks for the school. Additionally, the schools can request electronic copies of the yearbook on CDs for record keeping or for direct sale to students to accompany their hardcopies.

The ACME Yearbook Company has hired you to help them develop an Internet-based product to complement the existing desktop application. Write a report to the company explaining what features need to be added to their product to make it secure.

The Internet-based product should include the following additional features:

  • Allow all of the yearbook data to be stored on ACME’s servers, rather than on the customer’s local computer.
  • Allow the desktop product to be used to edit the yearbook, in addition to any new Internet version of the product.
  • Allow multiple people to edit the yearbook at the same time (including any students who are working on the yearbook).
  • Allow people to purchase copies of the completed yearbook using a credit card.
  • Allow a low-resolution PDF of the completed yearbook to be available to the school for proofing. Also make available a high-resolution PDF that can only be accessed by ACME’s printing facilities and partners.

Security concerns include:

  • Licensing of the application client on school PCs.
  • Security for the output designs on the cloud and on CDs.
  • Secure storage of multiple yearbooks from multiple clients at ACME and in the cloud.
  • Online purchasing of electronic copies of yearbooks.
  • Communications security.

You must do the following:

  1. Identify and list RISKS to be addressed
  2. Design a solution or a solution set

You do not have to address all of the items below, but here are some possible topics to consider:

    1. Email
    2. Remote Access (VPN)
    3. Whole disk encryption
    4. Encrypted flash sticks
    5. Ecommerce transactions
    6. Database encryption
    7. Use of Hashes (e.g., for checksums, passwords, perhaps even credit card information)
    8. Cloud access security
    9. Digital certificates (at various levels)
    10. DRM for electronic copies of yearbooks
    11. Acceptable Use policies regarding use of company computers, personal computers, and perhaps even use of personal encryption
  2. Identify potential vulnerabilities with your proposed solution (Note: not all vulnerabilities can be solved with encryption)
  3. Finally, in case the company cannot implement all of your suggestions at once, list the features that you recommend and rank order them by importance.

Your design should take into consideration the data storage, data processing, and data communication needs of the system.


weaknesses and vulnerabilities when revoking certificates

***This is for a Cryptology class***


Discuss the weaknesses and vulnerabilities of different approaches and the problems with revoking certificates and possible remedies. Include illustrations of these processes and cite your sources. Just need 1 image per process. The writing will be a page but the images will make it seem longer.

weaknesses and vulnerabilities when revoking certificates

***This is for a Cryptology class***


Discuss the weaknesses and vulnerabilities of different approaches and the problems with revoking certificates and possible remedies. Include illustrations of these processes and cite your sources. Just need 1 image per process. The writing will be a page but the images will make it seem longer.