Monday, February 17, 2020

Fashion Portfolio Essay Example | Topics and Well Written Essays - 1750 words

Fashion Portfolio - Essay Example The essay "Fashion Portfolio" focuses on the fashion design portfolio. Once I am familiar with the type of fashion industry companies I want to design for, I will then think about what they want to see from me. The research methodology of my paper will include publications, surveys and other techniques in which events like trade shows, forecasting, publications, and cultural events will be visited to gather relevant information. The processes intricate in designing fresh ranges and collections usually begin with researching and gathering information. Fashion designers have inadequate training in research methods and rarely carry out studies thus resulting in intuitive and subjective judgements. Contributing to such problems is the inadequate amount of time existing to do the research and heavy costs of designers gathering information. As a result, research methods which can be used by fashion designers include trade shows, forecasting, publications, and cultural events. In essence, d esigners require drawing upon a varied range of information so as to inform their decision-making in the process of planning and development of design portfolio. In trade shows, I expected to gain knowledge of fashion products and fabrics such as garments. These fashion shows are prearranged by garment and textile fashion companies to present new garment or fabric ranges and the aim is to sell out their products to the fashion designers and buyers. The advantages of appearing in trade shows seemed to be connected to networking.

Monday, February 3, 2020

Information Warfare & Cyberterrorism Case Study Example | Topics and Well Written Essays - 750 words

Information Warfare & Cyberterrorism - Case Study Example According to Hollis (2008), international cyber terrorism has made digital form of storage of information become an insignificant advancement. In this paper, three major cyberterrorism cases that have occurred around the globe will be reviewed. In the three cases, the victims, the aggressors and the motives behind the attacks will be highlighted. In this case the victim was Estonia. Major organizations in Estonia including the government were affected by this particular attack. Major websites in the government were disabled. Financial institutions in Estonia were also affected as their websites were jammed with foreign users (Traynor, 2007). The aggressor in this case was Russia. However, Russia did not take responsibility for the attack, but the victims claimed the attacks were traced back to Russia. Analysts also argued the bitter political rivalry between Russia and Estonia was enough to link Russia to this particular attack. NATO investigated the issue and it was accused of double standards since they refused to directly accuse Russia of the attacks (Traynor, 2007). Major websites in the government were hacked and they were accessible to many foreign people. Additionally, there was a viral attack which disabled many government websites which contained crucial information. To curb the cyber attacks, the government of Estonia and all the affected companies disabled all the affected websites. Additionally, the government disabled all foreign access to the country’s websites. It ensured that only domestic subscribers could view these websites. The victim in this case was Georgia. The county was having political confrontations with Russia, which lasted for many years. After a truce agreement was signed to stop military war between the two nations, the war shifted to cyber attacks. The attacks were politically instigated as Russia was directly blamed for the attacks. Unlike