118,339 research outputs found

    The Syrian refugee crisis: a comparison of responses by Germany, Sweden, the United Kingdom, and the United States

    Get PDF
    The conflict in Syria between the government of Bashar al-Assad and various other forces, which started in the spring of 2011, continues to cause displacement within the country and across the region. By the end of 2014, an estimated 7.6 million people were internally displaced and 3.7 million Syrians had fled the country since the conflict began (OCHA 2014; UNHCR 2015a). The refugee situation caused by the Syrian conflict is dire, and it has placed enormous strain on neighboring countries. Lebanon, Jordan, Iraq, Egypt, and Turkey host massive numbers of Syrian refugees, and Syrians have been seeking protection beyond these countries in increasing numbers since 2011. This paper looks at the burdens and costs of the Syrian refugee crisis and considers how they have, or have not, been shared by the international community at large, and in particular by Germany, Sweden, the United Kingdom, and the United States. It also considers to what degree Syrians have been able to find protection in states outside the region. Germany and Sweden, by the end of 2014, had provided protection to the largest number of Syrian refugees outside the region. Although Germany, Sweden, the United Kingdom, and the United States differ in the level of protection provided to Syrians, all four states have increased protection to Syrians via resettlement and asylum (and in the case of the US temporary protected status) since 2012. Despite this, the degree of protection provided by the four states is modest in relation to that provided by neighboring countries to Syria, and far more could be done. This paper also argues that the international community as a whole has not sufficiently contributed toward alleviating the burden caused by the Syrian refugee influx, in terms of both financial assistance and refugee resettlement. The paper puts forward two general recommendations to reduce the strain on neighboring countries: increase the level of burden sharing by the international community as a whole and more evenly distribute the burden among industrialized states in Europe, North America, and the Asia Pacific. In terms of enhancing the level of protection for Syrians in countries beyond the region, it proposes three recommendations for states: namely, increase refugee resettlement, facilitate family reunification and other forms of legal admission, and allow refugees to seek protection through embassies in the region

    Storage Solutions for Big Data Systems: A Qualitative Study and Comparison

    Full text link
    Big data systems development is full of challenges in view of the variety of application areas and domains that this technology promises to serve. Typically, fundamental design decisions involved in big data systems design include choosing appropriate storage and computing infrastructures. In this age of heterogeneous systems that integrate different technologies for optimized solution to a specific real world problem, big data system are not an exception to any such rule. As far as the storage aspect of any big data system is concerned, the primary facet in this regard is a storage infrastructure and NoSQL seems to be the right technology that fulfills its requirements. However, every big data application has variable data characteristics and thus, the corresponding data fits into a different data model. This paper presents feature and use case analysis and comparison of the four main data models namely document oriented, key value, graph and wide column. Moreover, a feature analysis of 80 NoSQL solutions has been provided, elaborating on the criteria and points that a developer must consider while making a possible choice. Typically, big data storage needs to communicate with the execution engine and other processing and visualization technologies to create a comprehensive solution. This brings forth second facet of big data storage, big data file formats, into picture. The second half of the research paper compares the advantages, shortcomings and possible use cases of available big data file formats for Hadoop, which is the foundation for most big data computing technologies. Decentralized storage and blockchain are seen as the next generation of big data storage and its challenges and future prospects have also been discussed

    New directions in the analysis of inequality and poverty

    No full text
    Over the last four decades, academic and wider public interest in inequality and poverty has grown substantially. In this paper we address the question: what have been the major new directions in the analysis of inequality and poverty over the last thirty to forty years? We draw attention to developments under seven headings: changes in the extent of inequality and poverty, changes in the policy environment, increased scrutiny of the concepts of ‘poverty’ and inequality’ and the rise of multidimensional approaches, the use of longitudinal perspectives, an increase in availability of and access to data, developments in analytical methods of measurement, and developments in modelling

    A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

    Full text link
    Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network. It has emerged as the key technology that unleashes the potency of Big Data, Internet of Things, Mobile and Web Applications, and other related technologies, but it also comes with its challenges - such as governance, security, and privacy. This paper is focused on the security and privacy challenges of cloud computing with specific reference to user authentication and access management for cloud SaaS applications. The suggested model uses a framework that harnesses the stateless and secure nature of JWT for client authentication and session management. Furthermore, authorized access to protected cloud SaaS resources have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component and a Policy Activity Monitor (PAM) component have been introduced. In addition, other subcomponents such as a Policy Validation Unit (PVU) and a Policy Proxy DB (PPDB) have also been established for optimized service delivery. A theoretical analysis of the proposed model portrays a system that is secure, lightweight and highly scalable for improved cloud resource security and management.Comment: 6 Page
    • 

    corecore