Thursday, December 26, 2019

China s Cyber Attacks Against Us Military - 2251 Words

Brandon Pragosa Threat Assessment Dr. Urban 6 June 2015 China’s Cyber Attacks Against US Military Associated Private Firms Introduction: Based on current sources available, we have medium confidence that China will continue to conduct cyber espionage against United States defenses and military systems. It is not a new development as China’s People’s Liberation Army (PLA) cyber team has been behind many attacks against US defense firms and military systems as early as 2007. The KIQ for this assessment is: How vulnerable our Military and Defense sectors systems to cyber-attacks? It is imperative to US National Security, because outside actors, like the PLA, are exploiting our defense and military systems that can disrupt future operations both domestic and abroad. After a short background on China we will address the fallowing: Their motives, methods, targets, and challenges we face to combat Chinese cyber warfare. China’s Background: China’s political situation allows them to pursue their interests in cyber space with little objections from the world’s superpowers. Even when questioned about their actions, the Chinese government continue to deny their involvement in security breaches of US security systems. To counter-act the allegations of China’s involvement, they show how other countries attack them first giving them an obligation to defend themselves. China is also free from overt scrutiny solely based upon the needs of China’s business and economy for USShow MoreRelatedU.s. Joint Forces And The Strategic Direction1677 Words   |  7 Pageshas prompted a shift of military resources to the Asia-Pacific. This trend will continue. Additionally, globalization, cyber-attacks and advances in technology will further challenge the Joint Forces in the next ten years . The U.S. Joint Forces must identify and develop critical technology now in order to overcome fut ure challenges risk in 2025. Diminishing resources and lack of predictability within the military budget process will introduce significant strategic, military and political risk . WhileRead MoreCritical National Infrastructures And National Security1563 Words   |  7 PagesThreat Groups (APT). I will discuss their motives, attack objectives, targets of the attacks, tactics, techniques, and procedures (TTP), and attack vectors. I will propose strategies that would deter and provide defense against the group or that type of threat. I will also discuss if the APT is state backed or if it is a rogue actor. The four APT groups that I chose to discuss are APT 28 and APT 29 from Russia, PLA Unit 61398 and PLA Unit 78020 from China. I have chosen these four groups because theyRead MoreComparing Cyberwarfare And Private Sectors1438 Words   |  6 PagesCyberwarfare are usually online-based attacks often used in order to steal data, disrupt servers or even paralyse financial systems. These actions are often conducted by organizations or nations seeking for a specific goal in mind such as, power and money. Moreover, these â€Å"goals† are also seen as the motivations behind the attacks, notably, these motivations are often connected to military, hacktivism and private sectors. The two most common methods used by the military all over the world are sabotageRead MoreCyber Security : Armed Forces Sub Unified Command Of America1076 Words   |  5 PagesCYBER SECURITY RESERVES Unite state cyber reserve is armed forces sub-unified commands / commanded aiding Strategic Command of America . This command is stuated in Maryland , its supposed to ensures that all cyberspace operations are centralized , Its also responsible for the organization of available cyber resources and synchronizes defense of united states military networks . (Protect your workplace , report any abnormal behavior , activity , and cyber incidents . (2006 ) [Washington , D . CRead MoreU.s. National Security : The World s Largest Country Essay1129 Words   |  5 Pagesthe United States (US) are unfamiliar with the threat more conventional nation-states pose to the country’s national security. China, Iran, and Russia are seen as the three biggest threats to U.S. national security. Although Russia does not dominate the intelligence disciplines of HUMINT, OSINT, and cyber, its strengths in SIGINT, IMINT, and MASINT make it the biggest threat to the US. HUMINT Russia’s HUMINT program is slightly behind China’s, but slightly ahead of Iran’s. China encourages its citizensRead MoreCurrent Crimes and Criminal Issues925 Words   |  4 PagesCurrent Crimes and Criminal Issue Hasaye S. Newton CJA 394 October 6, 2015 Juan Campos Current Crimes and Criminal Issue Global crime are not as many as local or regional crimes, they range from illegal immigration, cybercrimes, terror, racism and terrorism. The war on terror in the aftermath of the attacks of Sep. 11, 2001 has undermined human rights globally, according to activists and experts who when the UN conference in Paris. Immediately after Sep. 11 2001 there was dramaticRead MoreA Rising Concern For United States Citizens1487 Words   |  6 Pagesthere is internet access. These attacks affect just about every American in one way or another. Cyber-attacks are generally conducted by foreign countries to hack into United States companies to gain access to Americans’ personal information for malicious reasons, disrupt the functionality of the government, and to impose their agenda against the United States. According to the Bureau of Justice Statistics, the three general types of cybercrime are â€Å"Cyber-attacks are crimes in which the computerRead MoreThe Common Forms Of Cyber Theft1358 Words   |  6 Pages The common forms of cyber theft are hacking and identity theft. In cybercrimes, the computer could be the source of the crime, the facilitator, or the target of the crime. In today s world, more criminals are exploiting the convenience of the internet and computer to satisfy their needs by committing diverse criminal offenses. According to (Moafa, 2014) there are several types of cybercrimes as follows: cyber harassment, cyber-bullying, and cyber-stalking .A. In the cyber-bullying the criminalRead MoreThe Stuxnet Virus Essay1724 Words   |  7 PagesJohn Velarosa Professor Ingram D. Rogers 1106CSIA3014041 August 3rd 2011 The Stuxnet Virus The Stuxnet Virus Abstract: What diplomacy could not achieve, sanctions could not silent, and for which a military option was not viable, a cyber attack quietly accomplished. Kim Zetter an investigative reporter with Wired Magazine online calls Stuxnet, â€Å"a piece of software that would ultimately make history as the world’s first real cyberweapon.† (Zetter, 2011, sec. 1) In his article, Is â€Å"Stuxnet†Read MoreThe Common Forms Of Cyber Theft1373 Words   |  6 Pages The common forms of cyber theft are hacking and identity theft. In cybercrimes, the computer could be the source of the crime, the facilitator, or the target of the crime. In today s world, more criminals are exploiting the convenience of the internet and computer to satisfy their needs by committing diverse criminal offenses. According to (Moafa, 2014) there are several types of cybercrimes as follows: cyber harassment, cyber-bullying, and cyber-stalking .A. In the cyber-bullying the criminal

Tuesday, December 17, 2019

Taking a Look at the Romantic Era - 1107 Words

Romantic Era Romanticism was brought to life around 1780 and thinned out around 1850. During this age romantic thought and imagination was chosen over reason, emotions, logic, intuition, and science. The late 18th century was a perfect era for romanticism. During this time period it spread wildly through the countries of Europe, the United States and Latin America and touched the pens of so many writers. Romanticism gave a type of feeling that made a lot excited or enthused to write and express their inner person through their works. This time period known as romantic like had a lot going on and held a lot for people of literature with the help of imagination and thought the romanticism era was brought to life. The meaning of this era was wondered about all over, through many decades such as from or time period to its original time period. This question of what this time era meant brought about a lot of discussion or arguing between literary and European historians, and critics. What was pretty much know for sure was that this era was felt with all thought and ideas. Romantic ideas came about as both implied and stated criticisms of 18th century Enlightenment even though many of these ideas were generated by a sense of not being able to deal with with the dominant ideals of the Enlightenment and of the society that produced them. Many Romantics during this era were liberals, conservatives, revolutionaries, and reactionaries. There were those who wereShow MoreRelatedThe Romantic And Classic Ages Of European Music1015 Words   |  5 Pagesoutside world; all the same, musicians of considerable significance have been both consciously and subconsciously molded by the environment in which they reside and as such they may interpret and bring the world to life in the language of music. The Romantic and Classic ages of European music can be simply put as the period of time between the deaths of Ludwig Van Beethoven in 1827, and that of Gustav Mahler in 1911. Despite t his convenient partition, history has never been one to divide itself so preciselyRead MoreEssay on Western Music1354 Words   |  6 PagesWestern Music dates back from 1200 BC. We can divide each major element of Western Music into periods. Some of the major periods of Western Music consist of Baroque, Classical, Romantic, and Modern Music. Each period contributed key elements that have influenced the formation of music. These key periods helped form the musical geniuses;Bach, Beethoven,Mozart,Verdi, and Copland. The Baroque period lasted from 1600-1750. The two best known Baroque composers are Johann Sebastian Bach and GeorgeRead MoreOn How the Artists of the Romantic Period Chose to React against the Approaches and Philosophy Established during the Age of Elightment 1185 Words   |  5 Pagesthis assignment we will be taking a look at how artists during the Romantic period, that took place around the 18th and 19th centuries, choose to react against the approaches and philosophy established by artist during the age of Enlightenment. We will take a look at a few obviously Romantic artworks to help us better our understanding of this fascinating movement. To understand how Romanticism has rejected, or reacted to, the Enlightenment, we first need to take a look at what artists believed duringRead MoreAs the 19th century rolled into the 20th , WWI was imminent and life was changing. The romantic900 Words   |  4 PagesAs the 19th century rolled into the 20th , WWI was imminent and life was changing. The romantic era had flourished and passed, impressionistic music was well into its lifespan, but arising from amid the rubble of the romantic era was the Verismo movement! Verismo was a movement or new school of thought embodied in the operas of composers like Pietro Mascagni, Ruggero Leoncavallo, Umberto Giordani, Giacomo Puccini. Verismo is virtually synonymous with ‘realism.’ It was an attempt made by composersRead MoreWilliam Cullen Bryant And The Devil And Tom Walker811 Words   |  4 Pages An Analysis of American Romanticism The romantic period,1735 to 1830, for writers is a dark and confusing time, it is a time when dark things are made to seem better than they are. Many great literary works come from this period, but at the price of confusing the population. People believe that â€Å"emotions and relationships were not just important, but were the very currency of life.† Three romantic era pieces stand out, The Pit and The Pendulum by Edgar Allen Poe, Thanatopsis by William CullenRead MoreAmerican Romanticism As Portrayed By Walt Whitman s Song Of Myself979 Words   |  4 PagesReason was ruled out in this era in place of imagination, individuality, and emotions, which are all three roots that defines Romanticism. Although, Walt Whitman’s Song of Myself and Frederick Douglass’ Narrative were written ten years apart, many persons that wrote in this era represented the major ideas and themes of the Romanticism era. As an Abolitionist Romance Narrative, Frederick Douglass’s Narrative consists of a journey from repression to transcendence. The Romantic elements in his NarrativeRead MoreEssay on Romanticism In Literature512 Words   |  3 Pageswho influenced the era with their writings were William Wordsworth and Samuel Taylor Coleridge, both English poets of the time. Their edition of â€Å"Lyrical Ballads;, stressed the importance of feeling and imagination. Thus in romantic Literature the code was imagination over reason, emotion over logic, and finally intuition over science. All of these new ways discouraged and didn’t tolerate the more classic way of literature.   Ã‚  Ã‚  Ã‚  Ã‚  Other significant writers of the Romantic Age are noted still Read MoreThe And The French Revolution1419 Words   |  6 Pages Casper David Friedrich was a German Romantic artist in the nineteenth century that is most known for his landscape paintings that display the romantic ideals of individualism, nature, physical and emotional passion and an interest in the mysteries of the world. Where did these ideals of Romanticism begin? Taking a look back into the 17th century, there was another intellectual movement that changed society, culture and politics. The Enlightenment was a time period lasting throughout the 18th centuryRead MoreGood Morning And Thankyou For Tuning Into The Poet s Voice1391 Words   |  6 PagesGood morning and thankyou for tuning into The Poet’s Voice. My name is Meg Cuskelly and it’s that time of the week that we all look forward to, here on the show, where we have the privilege to welcome a guest speaker to discuss a poem, poet and period with us. Today, from The Australian National University in Canberra we have Vivienne White, head lecturer in the literature departmen t. Thankyou for joining us Vivienne. My Pleasure Meg, thankyou for having me on The Poet’s Voice. The pleasure isRead MoreFrankenstein And Science : What Is The Purpose Of Science?1676 Words   |  7 Pagesmean to conquer nature? In the Romantic era of Mary Shelley, scientists were the ultimate conquerors of the natural world. The Enlightenment allowed for impressive advancements in the realm of science that negated the need for mystery in nature. This fact downplayed the necessity of faith and reliance on God and emphasized the importance of logical, empirical evidence for the belief of anything and everything. Science becomes the ultimate vision of reality that Romantic writers oftentimes critique.

Monday, December 9, 2019

Embracing Customer Relationship Management †MyAssignmenthelp.com

Question: Discuss about the Embracing Customer Relationship Management. Answer: Introduction ABC is an Australian based private tourist network that attracts more than 200,000 families in a span on one year. The business includes the primary tourist attractions that can be visited along one of major Australian highways. The business serves the customers that are from Australian and also from other international locations. There are many loopholes present in the current system that is followed for the management and execution of the business activities. This leads to the inability to meet the customer expectations. One of the major drawbacks of the current system is the inability to be accessed on the mobile platforms. In order to overcome such issues, it has been proposed that an automated system shall be developed with many new functions and features. The four primary areas that will be targeted in this task would be finance management, scheduling activities, human resource management and the customer relationship and interface management. The document is a report for the project that covers the planning and management details around the project. Assumptions Limitations The skill set of the project human resources are adequate and as per the business specifications and their fulfillment for the project. There will be a lot of planning necessary for the project as it is huge and also belongs to the category of critical projects. The funds and expenses necessary for the execution and fulfillment of the project activities will be arranged by the Project Sponsor. The budget along with the schedule that is determined for the project is fixed and it would not be possible to make any enhancements in these two areas associated with the project. The work environment and the set of tools necessary for the execution of the project activities will be provided and arranged in advance for the project resources (Peslak, 2012). The project will be managed by using and applying the project management methodology as Project Management Body of Knowledge (PMBOK). The project will be completed in a series of phases as initiation, planning, development, testing, documentation and closure. PMBOK methodology has five phases as initiation, planning, execution, control and closure. The activities that come under PMBOK will be applied and synced with the project phases. There will be many estimates that will be set and decided for the project in the planning phase. These would primarily include schedule, budget, scope and resources. The initiation stage must cover the feasibility analysis and chartering processes followed by estimation of schedule, budget, scope and resources in the planning phase. The execution must focus upon the management of design, development and integration activities. The control phase must include the review and monitoring along with the implementation and testing processes. The final closure phase must involve the acceptance and sign offs along with the submission of closure report. Project Scope Management The project shall be designed and developed with five modules as finance management, HR management, schedule management, customer relationship management and facility management. The automated system would be made accessible on web and mobile platforms. The project resources will integrate and test the five modules and will release a single eunit (Mirza, Pourzolfaghar and Shahnazari, 2013). The automated system will be deployed at the client side and will be made available to the end users with the desired design and functionalities implemented in it. The information associated with the requirements will be collected and analyzed and accordingly the planning will be carried out. The system will also be designed with the qualities like reliability, availability, security and good performance. Out-of-Scope Third-party delays and cancellations will not be handled by the project team. The changes requests not approved by the sponsor will not be handled (Randolph, 2013). Any negotiations with the third-parties will not be covered Time Estimates Schedule Management Apart from the time estimations, budget estimations and scope management, the following groups or modules will be used and implemented in the project as the modules and the management activities will also be based on the same. Finance Management System: Additional costs present in the current system in terms of the cost of brochures and printing costs will be eliminated and budget will be managed with ease (O'Leary, 2009). The project management must carry out and apply the management activities such as planning, monitoring and control to understand the progress and adherence to the best practices. Human Resource Management System: The management activities such as increase discussions and interactions with the human resources along with resource tracking shall be implemented and the same shall be applied in the project activities as well for efficient management of the human resources (Gagnon, 2006). Scheduling Tasks: The system shall make sure that the customer bookings are analyzed and the resources are accordingly provided. The safety measures, upgrading of the database and tracking of the customers shall be performed. The management must make sure that verification and validation techniques are applied in this area to track the progress. Customer Relationship Management System: The customer management and interface requirements will be met by making the information available on the mobile as well as web platforms. Social media groups and networks will be used to provide the customers with the required details. Also, the assistance will be provided in terms of support and query areas (Ayiri and Kudzanayi, 2017). Facility Management System: This module will be managed by implementing the advanced incident recording and response facilities in the system. The same controls will be used for project management as well. Reporting Requirements Report Name Report Frequency Submitted to Mode of Reporting Daily Status Report Daily Project Manager E-mails Weekly Status Report Weekly Project Sponsor SharePoint Change Requests Report Bi-Monthly Project Manager SharePoint Defect Report Monthly Project Manager and Sponsor SharePoint Closure Report Once At Project Completion Project Sponsor SharePoint Project Risk Management There may be many risks that may emerge during the project. An approach will be necessary for the management of the risks and this approach will have numerous phases as graphically represented below. The above diagram represents the process that shall be used for the management of the risks in this case. The information system that will be developed for ABC Company may have many risks due to the industry type and nature of the project. The first step in the risk management process shall be the identification of the risks. In this phase or sub-process, all forms of risks irrespective of their nature, type, priority and severity shall be identified and listed. This information and identification shall be performed on the basis of the information that shall be collected from various sources. These sources shall include the project stakeholders, market information, legacy systems etc. The next sub-process shall be the analysis of the risks. In this sub-process, the risks that are identified shall be analyzed in terms of the project specifications, stages and accomplishment in terms of the likelihood, impact and rank. The risks shall then be evaluated in the third stage in which the risks that may be accepted shall be identified. The ones that cannot be accepted shall be moved to the fourth sub-process as risk treatment. Risk treatment is a sub-process in which various treatment policies and mechanisms shall be identified and applied. There can be various treatment processes that can be applied in the form of mitigation, avoidance or transfer. The strategy applicable to every risk shall be decided and implemented. The monitoring and control activities associated with the risks shall be carried out in the last stage with the submission of a closure report. Risk Register Risk Name Risk Likelihood (1-5, 5 is highest) Risk Impact (1-5, 5 is highest) Risk Rank (Likelihood * Impact) Risk Treatment Strategy Security Risks and Attacks 4 4 16 Risk Avoidance Use of technical , physical and administrative security controls Quality Issues 2 5 10 Risk Avoidance Training on quality standards and monitoring of adherence to the standards Operational Errors 5 3 15 Risk Avoidance Training on operational processes and monitoring of adherence to the standards Schedule Overrun 2 5 10 Risk Avoidance Tracking of the project activities against the estimated schedule Technical Faults 4 3 12 Risk Mitigation Use of alternative tools Legal/Political Risks 1 5 5 Risk Avoidance Training on legal policies and monitoring of adherence to the standards Budget Overrun 4 5 20 Risk Avoidance Tracking of the project activities against the estimated budget Monitoring, Review Evaluation The monitoring and review processes shall be carried out by the Project Manager and the senior leadership. These processes must include the execution of the verification and validation techniques to understand the progress of the project, adherence to the best practices along with conflicts, disputes, risks and problems. These processes must include a review plan prepared in the beginning and the same shall be followed. The results of these processes shall be discussed internally and shall also be informed to the project sponsor. The success of the project shall be evaluated by using the following methods and techniques: The actual schedule of the project shall be matched with the estimated schedule and the gap in the two values shall be nil or minimal for considering the project a success. The actual budget of the project shall be matched with the estimated budget and the gap in the two values shall be nil or minimal for considering the project a success. The feedback shall be acquired from the project sponsor, end-users and other stakeholders and it must be analyzed. The feedback shall be positive to ensure success. The actual features and specifications of the project shall be matched with the estimated requirements and specifications and the gap in the two values shall be nil or minimal for considering the project a success. The number of defects in the final defect report shall be zero or low and there shall be no major or critical defects present. Resource Management There will be internal and external resources that will be involved with the project that must be managed correctly. There must be specific approach and steps used for the management of the internal and external resources associated with the project. There shall be a daily team meeting organized and facilitated by the Project Manager and all the internal resources must attend the meeting (Muller and Turner, 2007). The project activities, issues, risks and conflicts shall be discussed and resolved in the meeting (Kock, Heising and Gemunden, 2016). The meeting notes shall be circulated at the end of the meeting to all the internal resources. The Project Manager must carry out one-on-one discussions with the project resources to understand their ideas and problems. An internal tool and server shall be set up for exchange of mails, documents, messages and information. The performance of the resources shall be measured at the end and the associated rewards shall be provided. External Resource Management The Project Manager must have a weekly meeting with the external stakeholders and sponsor of the project. The project progress shall be informed and the suggestions must be taken for improvement. The change requests shall be acquired from the sponsor with the approvals and additional enhancements. The total cost of the project has been estimated to be AUD 75,000. It has been done using bottom up estimation technique and the costs that are allocated are justified because of the analysis involved in the project activities, project resources involved and the time required to complete the project. Per unit cost has been estimated and the assignment has been carefully done so as to meet the project requirements. For the development of the information system for the private tourist business, the development methodology that shall be used in this case shall be agile methodology for product development. This methodology has been recommended due to the nature of the project and the requirements that need to be accomplished in the project. There are possibilities wherein the project requirements may change or get altered in the advanced stages of the project. With the use of agile methodology, it would be easy to incorporate the changes without any major impacts on the other modules or the overall project progress. There will be many other advantages that will be offered by the agile methodology to the project. It would make sure that the system that is designed is flexible and scalable in nature. Technology is witnessing many changes and these changes are extremely rapid. It is necessary for the present day systems and applications to be designed and developed in such a manner that the changes can be easily made in future as well. Agile methodology will provide this ability to the system and the incorporation of future scaling will be smooth and hassle free. The transparency and communication with the end users and the project sponsor will also be maintained all throughout the project. This will not be restricted to the final stages of the project only. However, the recommendations and feedback will be collected during every stage and at the end of iteration. This will ensure that the areas of improvement are highlighted and the actions are taken to meet the customer expectations. The product development will be carried out in the form of iterations which will be referred as sprints. All the project requirements will be broken down in many different sub-requirements and functions and each of these sets will be allocated to the iterations. The requirements of a particular iteration will be met and completed and the final requirement set will be created. Conclusion The project has been analyzed in terms of the resources involved, project requirements, nature of the project, project dependencies etc. The management methodology that has been selected for the project as PMBOK will be apt for this case on the basis of these different factors (Greenberger, 2016). There shall also be different trainings that shall be set up and arranged for the project resources. These trainings shall be in association with the new system that will be developed. Also, the trainings on the quality and ethical standards and practices that must be followed shall also be informed and made aware to the project resources. There will be many changes in the business operations and the way they will be executed. These changes must also be considered and managed using the PMBOK guidelines. The changes must be listed and the corresponding change management approach must be applied for better handling and management. The security issues associated with the project shall be managed by using the various basic and advanced security concepts and tools. These shall include the use of access control mechanisms, intrusion detection systems, authentication systems, firewalls, proxy servers, network monitoring systems, anti-malware tools and many more such controls and measures. References Ayiri, G. and Kudzanayi, G. (2017). Embracing Customer Relationship Management (CRM) to Improve Organisational Viability by Small Businesses in Chinhoyi, Zimbabwe. IOSR Journal of Business and Management, 19(01), pp.50-54. Gagnon, S. (2006). Globalizing Human Resource Management - Paul Sparrow, Chris Brewster and Hilary Harris. Human Resource Management Journal, 16(3), pp.331-332. Greenberger, L. (2016). Effective Communications for Project Success. Remediation Journal, 26(2), pp.121-128. Kock, A., Heising, W. and Gemunden, H. (2016). A Contingency Approach on the Impact of Front-End Success on Project Portfolio Success. Project Management Journal, 47(2), pp.115-129. Mirza, M., Pourzolfaghar, Z. and Shahnazari, M. (2013). Significance of Scope in Project Success. Procedia Technology, 9, pp.722-729. Muller, R. and Turner, R. (2007). The Influence of Project Managers on Project Success Criteria and Project Success by Type of Project. European Management Journal, 25(4), pp.298-309. O'Leary, D. (2009). Downloads and citations inIntelligent Systems in Accounting, Finance and Management. Intelligent Systems in Accounting, Finance Management, 16(1-2), pp.21-31. Peslak, A. (2012). Information Technology Project Management and Project Success. International Journal of Information Technology Project Management, 3(3), pp.31-44. Randolph, S. (2013). Projects and Complexity. Project Management Journal, 44(3), pp.e2-e2.

Monday, December 2, 2019

Their Eyes Were Watching God Essays (1847 words) -

Their Eyes Were Watching God Neale Hurston's work provides the African-American community with a one of the first literary symbols of racial health - a sense of black people as complete, complex, undiminished human beings. Appropriately, Hurston's Their Eyes Were Watching God, published in 1937, provides an enlightening look at the journey of one of these undiminished human beings, Janie Crawford. Janie's story - based on principles of self-exploration, self-empowerment, and self-liberation - details her loss and subsequent attainment of her independence of her own reality, as she constantly learns and grows from her difficult experiences with gender issues and racism in Their Eyes Were Watching God. Hurston's grasp on the reader's imagination is demonstrated with her masterful use of imagery and phrasing. Janie's dialogue and vernacular carry the reader along with seemingly innocuous pieces of vivid perception. In reality Hurston has put the reader in such a position that they hardly realize they are ingesting something deep and true. Their Eyes Were Watching God recognizes that there are problems to the human condition, such as the need to possess the fear of the unknown and the result of stagnation. Hurston does not leave us with the hopelessness; rather, she extends a recognition and understanding of humanity's need to escape emptiness. The truth of life, as with death that it is done alone and at the end of it all there should be a sense of self with a positive resolve. Janie's search begins in her Nanny's yard, as Janie lies beneath the pear tree when; "the inaudible voice of it all came to her. She saw a dust-bearing bee sink into the sanctum of a bloom; the thousand sister-calyxes arch to meet the love embrace and the ecstatic shiver of the tree from root to tiniest branch creaming in every blossom and frothing with delight. So this was a marriage! She had been summoned to behold a revelation" (11). Janie's youthful idealism leads her to believe that this intense sensuality must be similar to the intimacy between lovers, and she wishes "to be a pear tree - any tree in bloom!" (11). The image suggests a wholeness - as bees pollinate blossoms paralleling human sexual intercourse - which Janie finds missing in her marriages to both Logan Killicks and Joe Starks, but finally discovers in her relationship with Tea Cake. After joyfully discovering an archetype for sensuality and love under the pear tree at age sixteen, Janie quickly comes to understand the reality of marriage when she marries Logan Killicks, then Joe Starks. Both men attempt to coerce Janie into submission to them by treating her like a possession: where Killicks works Janie like a mule, Joe objectifies her like a medal around his neck. In addition, Janie learns that passion and love are tied to violence, as Killicks threatens to kill her, and both Joe and Tea Cake beat her to assert their dominance. Yet Janie continually struggles to keep her inner Self-intact and strong, remaining resilient in spite of her husbands' physical, verbal, and mental abuse. Janie's resilience is rewarded when she finally meets and marries Tea Cake, who represents the closest semblance to her youthful idealism regarding love and marriage. Rather than self-destruct under the constant realities of racism and misogyny she receives throughout her life, Janie Crawford does the opposite at the close of Their Eyes Were Watching God. The novel's final image states what Janie does throughout the story - taking her difficult past in and growing stronger and wiser as a result of it. Author Zora Neale Hurston believed that freedom "was something internal?. The man himself must make his own emancipation" (199). Likewise, in her defining moment of identity formation, Janie "pulled in her horizon like a great fish-net. Pulled it from around the waist of the world and draped it over her shoulder. So much of life in its meshes! She called in her soul to come and see" (183). At the end of a novel focusing on self-revelation and self-formation, Janie survives with her soul - made resilient by continual struggle - intact. Janie's grandmother was one of the most important influences in her life, raising her since from an infant and passing on her dreams to Janie. Janie's mother ran away from home soon after Janie was born. With her father also gone, the task of raising Janie fell to her grandmother, Nanny. Nanny tells Janie ?Fact uh de matter, Ah loves yuh a whole heap more'n Ah do yo' mama, de one Ah did birth? (15). Nanny's dream