118,339 research outputs found
The Syrian refugee crisis: a comparison of responses by Germany, Sweden, the United Kingdom, and the United States
The conflict in Syria between the government of Bashar al-Assad and various other forces, which started in the spring of 2011, continues to cause displacement within the country and across the region. By the end of 2014, an estimated 7.6 million people were internally displaced and 3.7 million Syrians had fled the country since the conflict began (OCHA 2014; UNHCR 2015a). The refugee situation caused by the Syrian conflict is dire, and it has placed enormous strain on neighboring countries. Lebanon, Jordan, Iraq, Egypt, and Turkey host massive numbers of Syrian refugees, and Syrians have been seeking protection beyond these countries in increasing numbers since 2011.
This paper looks at the burdens and costs of the Syrian refugee crisis and considers how they have, or have not, been shared by the international community at large, and in particular by Germany, Sweden, the United Kingdom, and the United States. It also considers to what degree Syrians have been able to find protection in states outside the region. Germany and Sweden, by the end of 2014, had provided protection to the largest number of Syrian refugees outside the region. Although Germany, Sweden, the United Kingdom, and the United States differ in the level of protection provided to Syrians, all four states have increased protection to Syrians via resettlement and asylum (and in the case of the US temporary protected status) since 2012. Despite this, the degree of protection provided by the four states is modest in relation to that provided by neighboring countries to Syria, and far more could be done. This paper also argues that the international community as a whole has not sufficiently contributed toward alleviating the burden caused by the Syrian refugee influx, in terms of both financial assistance and refugee resettlement.
The paper puts forward two general recommendations to reduce the strain on neighboring countries: increase the level of burden sharing by the international community as a whole and more evenly distribute the burden among industrialized states in Europe, North America, and the Asia Pacific. In terms of enhancing the level of protection for Syrians in countries beyond the region, it proposes three recommendations for states: namely, increase refugee resettlement, facilitate family reunification and other forms of legal admission, and allow refugees to seek protection through embassies in the region
Storage Solutions for Big Data Systems: A Qualitative Study and Comparison
Big data systems development is full of challenges in view of the variety of
application areas and domains that this technology promises to serve.
Typically, fundamental design decisions involved in big data systems design
include choosing appropriate storage and computing infrastructures. In this age
of heterogeneous systems that integrate different technologies for optimized
solution to a specific real world problem, big data system are not an exception
to any such rule. As far as the storage aspect of any big data system is
concerned, the primary facet in this regard is a storage infrastructure and
NoSQL seems to be the right technology that fulfills its requirements. However,
every big data application has variable data characteristics and thus, the
corresponding data fits into a different data model. This paper presents
feature and use case analysis and comparison of the four main data models
namely document oriented, key value, graph and wide column. Moreover, a feature
analysis of 80 NoSQL solutions has been provided, elaborating on the criteria
and points that a developer must consider while making a possible choice.
Typically, big data storage needs to communicate with the execution engine and
other processing and visualization technologies to create a comprehensive
solution. This brings forth second facet of big data storage, big data file
formats, into picture. The second half of the research paper compares the
advantages, shortcomings and possible use cases of available big data file
formats for Hadoop, which is the foundation for most big data computing
technologies. Decentralized storage and blockchain are seen as the next
generation of big data storage and its challenges and future prospects have
also been discussed
New directions in the analysis of inequality and poverty
Over the last four decades, academic and wider public interest in inequality and poverty has grown substantially. In this paper we address the question: what have been the major new directions in the analysis of inequality and poverty over the last thirty to forty years? We draw attention to developments under seven headings: changes in the extent of inequality and poverty, changes in the policy environment, increased scrutiny of the concepts of âpovertyâ and inequalityâ and the rise of multidimensional approaches, the use of longitudinal perspectives, an increase in availability of and access to data, developments in analytical methods of measurement, and developments in modelling
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Cloud computing is significantly reshaping the computing industry built
around core concepts such as virtualization, processing power, connectivity and
elasticity to store and share IT resources via a broad network. It has emerged
as the key technology that unleashes the potency of Big Data, Internet of
Things, Mobile and Web Applications, and other related technologies, but it
also comes with its challenges - such as governance, security, and privacy.
This paper is focused on the security and privacy challenges of cloud computing
with specific reference to user authentication and access management for cloud
SaaS applications. The suggested model uses a framework that harnesses the
stateless and secure nature of JWT for client authentication and session
management. Furthermore, authorized access to protected cloud SaaS resources
have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component
and a Policy Activity Monitor (PAM) component have been introduced. In
addition, other subcomponents such as a Policy Validation Unit (PVU) and a
Policy Proxy DB (PPDB) have also been established for optimized service
delivery. A theoretical analysis of the proposed model portrays a system that
is secure, lightweight and highly scalable for improved cloud resource security
and management.Comment: 6 Page
- âŠ