Tuesday, October 29, 2019
Managing strategy Case Study Example | Topics and Well Written Essays - 2500 words
Managing strategy - Case Study Example Starbucks Corporation is a global coffee retailing organisation headquartered in Seattle of United States (US). It was established in the year 1985 by three English partners named Jerry Baldwin, Zev Siegl and Gordon Bowker (Smith, 2007). It is one of the leading coffee house conglomerates in the world with a substantial reputation and corporate brand image (Bigboardnews.Com, 2012; Thompson & Shah 2010). Apart from beverage sector, it also deals in restaurants and entertainment division. Starbucks is the market leader in beverage sector in global market with annual revenue of $10.7 billion at the end of the year 2010 (Starbucks Corporation, 2009). Starbucks mainly attempts to offer most delicious coffee to its customers in order to inspire individuals in the targeted market (Starbucks Corporation, 2011). Hence, from the SWOT analysis, it can be clearly depicted that even though Starbucks is a renowned organisation with a sustainable corporate image in international market, it includes certain limitations as mentioned above. Besides, it can also lead to varied threats as well due to alternative market trends and preferences amid the targeted customers. This might also result due to globalisation. Hence, from the above PESTEL analysis, a detail overview about varied external factors which are most likely to have a substantial impact over Starbucksââ¬â¢ international operations can be evaluated in an appropriate way in order to understand the impact of these aspects on Starbucks. Thus, from this investigation, it can be clearly determined that there are higher prospects of expansion and development of Starbucks in future years. With reference to the PESTLE analysis, the prime factors which can offer a significant impact on Starbucks can be identified which is described below: Starbucks is one of the leading coffee retailing brands in the global context which positions itself as the market leader in food and beverage sector.
Sunday, October 27, 2019
Distributed Denial Of Service DDOS Attack Computer Science Essay
Distributed Denial Of Service DDOS Attack Computer Science Essay Information technology is an exciting and emerging day by day technology which requires communication systems for data and services exchange. As nowadays every services and products uses computer and internet as a medium to interchange data or money in an open internet, hence prone to vulnerabilities. Distributed Denial of Service (DDoS) attack is an attack to the availability of the resources available, so that authenticated users do not use those resources. This paper intended to explore the existing threats and vulnerabilities of DDoS with possible solutions and recommendations plus overview and architecture methodology of this kind of attack. Confidentiality, Integrity and Availability are the three main features of the any computer network communication systems. DDoS which is a subset of Denial of service (DoS) attack, which result in overwhelming the victim machine and deny the services to its legitimate users results in Unavailability of the resources and services for concern clients. Some examples are smurf attack, SYN UDP floods and ping of death. DDoS is a type of DoS attack but uses distributed computers from different location to attack on a particular victim may be a server or client which results into the stopping of its functionality to provide services, hence unavailability of the server ultimately results loss in monetary plus status of the organization. It works by flooding all the network of the given organization with unwanted traffic, the first well known DDoS was identified in 2000 on yahoo.com which goes down to around two hours. The DDoS is a result of weakness of internet which prone to several vulne rabilities as internet was designed only for functionality but not concern about any security. As internet is an open network everything is open and is shared among authenticated users. Another big problem is that it is not centralized network different organization, different countries have their own rules and regulation regarding internet. DDoS Layer Involved The DDoS attack mainly occurs in three layers of the OSI model which are layer 3 (Network) layer 4 (transport) and layer 7 (application). In transport layer what exactly happens is that attacker uses a forged IP address to request for connection so in typical connection, 3 way TCP handshake is done but in this attack it does not complete 3 way handshake but send connection request over and over server reserves resources for each attempt and results in out of connection requires for the legitimate users. In network layer it includes ping of death and ICMP requests, where as in application layer is kind of effective DDoS attack and hard to detect because it passes the 3 way handshake and treated as authenticated user to the concern server, so attacker requests a large amount of data continuously through HTTP and results in avoiding its legitimate users as got busy with those false requests. In DDoS attack a combination of those three layers results in an effective attack that results i n some really drastic effects. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data link Layer Physical Layer Fig: 1-Layers Involved in DDoS DDoS Architecture The main purpose of DDoS attack is to overwhelm the related server and makes it down, it can be for benefit or for fun only but in both case legitimate clients suffered as bandwidth, resources, memory and CPU got wasted. DDoS attack architecture consists of hierarchy pattern to attack; the four main components of DDoS are as follows: Attacker Master Machines/Handler Zombie Machines Victim First of all attacker scans thousands of computers on the internet independent of the origin of the systems for known vulnerabilities that is which have minimum security aspect on the computer and makes Master machines or handlers, its consists of more than two systems to many depends upon how sophisticated is attack, after making handlers rest scans for the vulnerable systems is done by these handlers, which results in thousands of zombies across the globe without knowledge of concern users and when these zombies are ready attacker can execute for attack and makes the victim down. Attacker Master Machines/Handlers Zombie Machines Victim Fig: 2- DDoS Architecture As seen from the above figure attacker takes control of one or more than one masters which then take control over thousands zombies and when triggered at a specific time these zombies flood the victim. These attack results with the use of some tools (software or malware) which to be install on the masters and zombies so that attacker can take controls through these tools and monopoly the systems. Here above the communication between attacker and master machines is done through TCP protocol whereas between master machines to zombie and zombie machines to victim use UDP protocol for communication, as UDP is unreliable protocol so does not hold any state and results in no trace back, it uses TCP for initial communication because it needs to organize other subordinates with master machines. DDoS Tools The tools used by DDoS attack are very sophisticated as it runs in background or in foreground with the systems program name and is not visible or very hard to detect by administrators. Trin00, tribal flood network, stacheldraht, tribal flood network 2000, trinity, wintrin00, MStream and etc are the examples of such kind of tools used in DDoS attack, by this tools attacker installed and executes accordingly. It also helps him to facilitates co ordination between masters and zombie, and execute timer also to bombards at a fixed time, so that all zombies attacks the victim. Trin00 scans for buffer overflows in systems and install attack shell daemon through remote shell, it communicate through unencrypted UDP. In tribal flood network, it installs the daemon which carries out the multiple attacks like ICMP flood, UDP flood, SYN flood, communication done through ICMP ECHO and REPLY. List of zombies daemon IP address is encrypted in later version of TFN. Stacheldraht uses the combination of trin00 and TFN. Encryption takes place between attacker and masterà ¢Ã ¢Ã¢â¬Å¡Ã ¬Ã ¢Ã¢â¬Å¾Ã ¢s communication and attacks are similar to TFN. Trinity floods through UDP, SYN, and ACK through Internet Relay Chat (IRC) has a backdoor program which monitors TCP port. MStream uses forged TCP packets with ACK flag set, it uses TCP and UDP floods with no encryption in between but master machines are kept password protected. Beside these tools various other program and tools are readily available for such kind of attack which leaves no residue to trace back. DDoS Types DDoS are acts differently but mainly classified in two main categories according to their attack pattern which are as follows: Bandwidth Depletion attack Resource Depletion attack In bandwidth depletion attack the main targeted area is the bandwidth of the concern victim by overwhelming with unwanted traffic more than 10 Gbps (It depends) and prevents the legitimate users from gaining access for the services. Some examples of such attacks are UDP flood, ping flood, Smurf and reflection attacks which bombards with unwanted traffic to make unavailability of the services. Whereas in resource depletion attack, the main concern area are the resources available. This attack leads to the out of resource available for the concern users by TCP SYN attack, PUSH ACK attack, Teardrop attack. These attacks through the requests like SYN to the concern server which in return reserves resources for this request, but attacker bombards the same again and again and hence server goes out resources. DDoS Detection The very first question about this attack is that, how to know if DDoS attack happened in any organization or in any machine. So following are some ways to know if it occurs: Performance of CPU, Memory and bandwidth degrades abnormally. Services become unavailable or partially available. Cannot access given resources properly. These above are preliminary steps to know the DDoS attack. It can be monitor through the continuously analyzing of the systems. DDoS Defense Practically speaking it is impossible to prevent DDoS attack but what we can do is to reduce its effect or tries to make security strong as much as possible. The following are very basic defense mechanism against DDoS attacks are: Prevention Detection Classification Justifying Tracing back The first phase called prevention which means to prevent from DDoS attack as much as possible that is to prevent itself to be part of the attack architecture, so not to become handler. It is done through the continuous monitor of the systems but every user is not aware of the security issues. The second phase describes to know that if the systems are under attack by verifying abnormal activities like CPU or bandwidth uses, it can done through firewalls or routers. The third phase is classification of the detected attack according to its prototypes like IP Addresses, protocol used and packet type used; it can be done through the use of Intrusion Detection System for future countermeasure. The fourth mechanism is justifying the detected attack that is how to deal with the known or detected attack one way is to block the whole traffic from those addresses by using access control list on gateways or react accordingly another approach is to trace back the detected packet so that source ca n be identified. The final part of our defense mechanism is trace back which will be covered in later section of this paper. DDoS trace back DDoS trace back is possible to zombies only but may be if done in proper way can leads to the attacker, chances are very rare as it is independent of the location. Some of the methods are as follows: Link Testing Controlled Flooding ICMP Trace back IP Trace back In link testing, when attack is in progress routers can co ordinates with each other to determines which router originated the attack traffic and can trace to the upstream but requires inter ISP co operations as different connections are maintained by different ISP. Whereas in controlled flooding it floods each incoming links of the router to determines the source but needs router co operation and better network map, similarly in ICMP and IP trace back a reverse path is generated to identify the source but path can be long and packet format space is limited to cope. DDoS Security measures As currently various research are going on to stop DDoS attack and it may takes time but DDoS becoming deadly day by day and is considered second in financial losses due to attack after viruses but comparison to virus it is very new and have vast effect with no remedy. So only option we got is to make it harder for attacker to penetrate into the systems, and following are some security precaution we should follow: Install and update continuously antivirus and spyware software from trusted authority and run regularly. Patches the security components of the systems continuously and be always ready for up gradation of systems. A well set network infrastructure with proper installation of firewalls and routers with appropriate policies, so that unwanted traffic and organization traffic can be separated clearly. Filters incoming traffic on routers or rate-limit certain types of traffic like ICMP and SYN packets. Monitors continuously incoming and outgoing packets and if some abnormality seen then react accordingly. Use Network Address Translation (NAT) to hide internal IP addresses. Use Intrusion detection systems (IDS) implement host based IDS plus network based IDS in a mix pattern to filter and detect abnormalities in the network. Egress and Ingress filtering, these are filtering mechanism implement on IP traffic. Egress sets the ranges of IPs leaving the organizationà ¢Ã ¢Ã¢â¬Å¡Ã ¬Ã ¢Ã¢â¬Å¾Ã ¢s network whereas in ingress a set of IP address ranges are allowed to move into the network. Using of SYN and RST cookies to verifies both communication parties with the help of cookies, so that legitimate clients can access the resources. Use a proxy server in between the network so that a request goes via proxy to server and proxy filters it according the rules implemented on it. Implement Honeypots systems, these are the systems in an organization with open security and are separated with internal network to know the attack pattern. At last but not least literate the users or clients about the security concerns. Conclusion DDoS Attack is an attack on availability of the resources and services which results in financial losses, loss of organization reputation, and disturbance in work flow environment. The bitter truth is that the security technologies like firewall, routers and IDS are very week to prevent DDoS as it cannot differentiate between original and fake traffic. Another factor is that it uses IP spoofing, difficult to verify with original packets plus the routing involved is stateless. Hence results in very strong attack. In this paper we have gone through the DDoS overview with its architecture layouts plus types and tools involved in DDoS attack. We have highlighted the DDoS detection part and visualize the security aspects and implementation to safeguard the assets against such attack plus a brief summary to how to trace back. To compete with DDoS one way effort cannot prevent or defeat it, it needs all round support to tackle with it like among different internet communities, different countries to enforce such laws and regulation strictly to cope with it. suggestions DDoS is a newer and disastrous attack, so to prevent it I would suggest that very carefully implement DDoS security measures which are defined above. Beside these IPSec and SSL/TLS protocols implementation can helps a lot to prevent. VPNs can be added for secure channel communications. Use Mozilla Firefox as browser instead of others.
Friday, October 25, 2019
Toms Character in the Great Gatsby :: essays research papers
Tom Buchananââ¬â¢s moral character can be quesitoned due to his dispicable and patheic nature when it comes to his actions throughout the novel. Even though he was born into a wealthy family and thus inherited the wealth he has in the novel, no signs of moral teachings by his family were evident. The actions he took in the book were due to him being a conceited and ignorant man. His ignorance was a result of the easy access he had to power and wealth. He feels that because he has wealth and power in society, he is given the acquiescence to be as arrogant and immoral as he so chooses and society cannot do anything about it. Because of this he looks down upon people that he feels are lower in the social and financial ladder. An example of this is when Nick is talking to tom about his accomplice in adultery and Nick says ââ¬Å"Doesnââ¬â¢t her(Myrtle Wilson) husband object?â⬠and Tom replies with ââ¬Å"Wilson? He thinks she goes to see her sister in New York. Heââ¬â¢s so dumb he doesnââ¬â¢t know heââ¬â¢s aliveâ⬠(Gatsby 26). This indicates that Tom is very cocky and ignorant. Tomââ¬â¢s immoral acts in the novel stem from his overconfidence and ignorance due to his wealth and power. This is further proved by the fact that when his first and only child was born, he left Daisy without any support only one hour after the birth of their daughter. This is shown in the novel when Daisy says ââ¬Å"Well she was less than an hour old and Tom was God knows whereâ⬠(Gatsby 22). For most, the birth of a child would be a joyous occasion and a reason for celebration but as for Tomââ¬â¢s case, he had no love for Daisy at that time. If he had love for her, he would not commit a sin and perpetrate adultery with Myrtle Wilson. A man with strong morals would never commit the sin of betraying their spouse and then cause the other person to do the same in the process. Moreover, he uses his accomplice in the adultery as an object and has no care or consideration for her whatsoever. An example of this is an altercation between Myrtle and Tom : ââ¬Å"Daisy! Daisy! Daisy!â⬠shouted Mrs. Wilson. ââ¬Å"Iââ¬â¢ll say it whenever I want to! Daisy!
Thursday, October 24, 2019
Determining the Concentration of Calcium Carbonate in an Unknown Substance through the Methods of Titration Aim Essay
Determine the concentration of the unknown ethanoic acid solution by titrating with a known concentration of sodium hydroxide Equipment and Materials * Unknown ethanoic acid * 50cm3 burette * 250cm3 Erlenmeyer flask * 100cm3 beaker (for CH3COOH) * 200cm3 beaker (for NaOH) * 100cm3 beaker (for waste) * Standardized sodium hydroxide solution * Burette clamp * Retort stand * Phenolphthalein indicator * 50cm3 graduated cylinder * Distilled water (to rinse the flask) Procedure: To begin with, obtain approximately 200 cm3 of sodium hydroxide solution. Then, set up the retort stand and burette clamp as indicated in the diagram below. Using two 10 cm3 aliquots of the NaOH solution, rinse the burette twice. Next, fill to above the 0.00cm3 mark and drain down to below the 0.00cm3 mark in order to remove any air bubbles. After that, transfer 50 cm3 of the unknown acid into the 250cm3 flask. Into the same flask, place 2 drops of the phenolphthalein indicator. Finally, add sodium hydroxide from the burette until you reach the endpoint. Procedural Notes To accommodate for the sodium hydroxide that splashes to the sides of the flask, distilled water was used. Using the distilled water on the sides of the flask was rinsed down to bring the sodium hydroxide to the rest of the solution in the flask. Also, when dropping a half-drop into the flask, the following procedure was used: First, a half-drop was made at the tip of the burette. Then, using the flask, the half-drop was collected to the flaskââ¬â¢s side. Finally, using the distilled water, the half-drop was rinsed down to the rest of the solution. To make it easier to recognize the endpoint of the reaction, a white paper was put under the flask. This way, it was easier to see when the solution changed color. Observation (Data Collection): Quantitative Data Measurements Recorded During the Experiment Trial 1 2 3* 4* Initial Burette Reading (ml?0.02ml) 0.20 0.42 0.10 0.23 Final Burette Reading (ml?0.02ml) 45.70 45.93 45.39 45.30 Volume of Ethanoic Acid Used (ml?0.04ml) 50.00 50.00 50.00 50.00 *To increase the results, trial 3 and 4 was taken from another group to get more data, thereby increasing the accuracy of the data. Qualitative Data Descriptions of the Substances Used and Produced Sodium Hydroxide Clear solution, low viscosity, slippery Ethanoic acid Clear solution, acidic, Phenolphthalein indicator Clear solution, comes in bottle, add as drops Solution Produced (NaCH3COO(aq) + H2O) Clear/pink throughout, trail 4 was the most successful as it was closest to clear than all other trails. Volume of trial 1 was greatest as a lot of water was used in order to wash down the sodium hydroxide stuck to the side of the flask. Data Analysis The neutralization reaction between sodium hydroxide and ethanoic acid is Sodium Hydroxide + Ethanoic acid ââ¬â> Sodium Ehthanoate + Water Therefore, the molar ratio is 1 mole of sodium hydroxide to 1 mole of ethanoic acid. Sodium hydroxide is known to have a concentration of 1.003 mol dm-3à ¯Ã ¿Ã ½0.004 mol dm-3. Consequently, the following represents the calculations to determine the concentration of ethanoic acid in trial 1: Using similar calculations, the concentration of ethanoic acid for trials 2,3, and 4 were calculated as well. The following table represents the results. Results for the calculations of the concentration of ethanoic acid used in each trial Trial Concentration of CH3COOH / mol dm-3 CH3COOH Uncertainties / % 1 0.913 1.3 2 0.913 1.3 3 0.909 1.3 4 0.904 1.3 Average 0.910 1.3 Conclusion: In conclusion, the result of this lab indicates that the concentration of CH3COOH is 0.910 mol dm-3. Using this value, and the actual value of ethnoic acid, 0.9190 mol dm-3 à ¯Ã ¿Ã ½0.0004 mol dm-3, percent error was calculated as follows: With this, we see that the percent of uncertainties is greater than the percent error. The percent of uncertainties represents the random errors, in which the measured value can either be bigger or smaller than the accepted value, due to an imprecise measurement. To improve these random errors, it is necessary to use more precise equipment and/or repeat measurements. One example of this would be to use a pipette instead of a graduated cylinder, especially because ?0.4 cm3 is a relatively large uncertainty. Consequently, the use of such equipment led to the percent of uncertainties being greater than the percent error. This means that the random errors cover for the errors in this lab. However, there are a couple potential systematic errors that should be appointed in this lab. The biggest one would be that it is hard to get to the endpoint, where the solution is barely pink. In all trials, the solution became clear pink. However, it was only in trial 4 that the solution was truly ambiguous to whether it was slightly pink. The difficulty of getting to this ambiguous clear pink is definitely a systematic error as it always leads to a larger volume of sodium hydroxide used to react. One way to improve this may be to perform the lab in a longer time span. When I performed the lab, I felt pressured to get a sufficient amount of trials done within the class period. By stretching the time span of the lab, it may be possible to take more time and get better quality results. A more realistic improvement may be to record measurements more frequently when approaching the endpoint. This would give us two measurements that the endpoint lies within, helping us estimate where the endpoint actually is. However, improving this error would lead to a smaller volume of sodium hydroxide, a smaller value for the concentration of ethanoic acid, which would make the observed value further from the true value. Another systematic error in this lab is the sodium hydroxide splashing to the sides of the flask. Although using water to rinse the sodium hydroxide down was aimed to cover this, another way to improve this may be to use equipment with a wider mouth, such as a beaker, instead of a flask. Once again, improving this error would lead to a greater percent error for the same reasons as the difficulty of getting an ambiguous pink color. Next, although it most likely did not affect the results in this lab, there is a question to whether rinsing the burette two times is sufficient. To improve this, it may be suggested that rinsing the burette 4 times is more sensible, even though it is time consuming. A final systematic error comes when transferring the ethanoic acid from the graduated cylinder. When this happens, some of the ethanoic acid may be retained in the graduated cylinder. This is a systematic error as this always leads to a smaller volume of ethanoic acid than measured. To improve this error, one may pour a tiny bit more than 50 ml of ethanoic acid, and measure that as 50 ml of ethanoic acid. Improving this error leads to a larger volume of ethanoic acid, a lower concentration of ethanoic acid, and once again, an increase in percent error. All in all, it is very interesting how knowing the amount of one substance can help determine the amount of another substance, although it is a topic that appears frequently in chemistry. In this case, knowing the number of moles of sodium hydroxide enabled us to know the concentration of the ethanoic acid. Furthermore, this lab helps one enhance their knowledge on the difficulty of setting up a lab. By reviewing and understanding the errors to a lab, one can relate the improvements to future labs. In a nutshell, this lab exemplified the process of titration, and how useful it can be.
Wednesday, October 23, 2019
How does Shakespeare invoke a sense of evil in Macbeth? Essay
Narrating the climactic downfall and eventual death of a Scottish thane, ââ¬Å"Macbethâ⬠is widely regarded as one of Shakespeareââ¬â¢s four great tragedies, alongside ââ¬Å"Hamletâ⬠, ââ¬Å"Othelloâ⬠and ââ¬Å"King Learâ⬠. ââ¬Å"Macbethâ⬠is typical of the other three tragedies through several key factors, the first of which is the qualities of the protagonist. As with the other tragedies, Macbeth is a notable man of high status who bears many heroic qualities, including extreme valour and honour. However, much like with Othello and his jealousy, Macbeth is undone by his greed and ambition, his fatal flaw, or ââ¬Å"harmartiaâ⬠in the Greek. These flaws play a role in the heroââ¬â¢s fall from grace and eventual death, and these occurrences imbue the audience with a sense of loss and waste; thus the genre is deemed a ââ¬Ëtragedyââ¬â¢. If the protagonist was solely brought down by his own flaws the piece would cease to be a tragedy, as there would be no sense of loss or waste upon the heroââ¬â¢s demise, as they would appear to be malevolent and deserving of their downfall. Instead, Shakespeare also incorporates external factors contributing to the downfall; in the case of ââ¬Å"Macbethâ⬠, Lady Macbeth and the Witches are used, coaxing Macbeth into regicide. If the protagonist were to be influenced too heavily by the separate circumstance then the hero would begin to appear as a puppet, completely corrupted and controlled. A fine balance is found during Shakespeareââ¬â¢s four great tragedies between character-based flaws and external circumstancesââ¬â¢ influencing the heroââ¬â¢s actions, and subsequently the feeling of tragedy is massive. This is perhaps a defining factor as to why these four tragedies have received so much acclaim, after all a tragedy is defined by the effect it has on the audience. ââ¬Å"Macbethâ⬠however makes one large departure from the generic formulae in that throughout the play Shakespeare conveys a sense of concentrated evil, not seen in the other tragedies. Concentrated evil is achieved through various characters in the play including the witches, Macbeth and Lady Macbeth. Indeed, evil is commonplace throughout ââ¬Å"Macbethâ⬠, with children being slaughtered and various assassinations. Shakespeareââ¬â¢s acclaimed inclusion of the witches is a prominent factor in the suggestion of evil throughout the piece. Indeed, immediately in the first scene, you are instantly submerged into this dire, supernaturally influenced world, plagued by the presence of these malevolent witches. Consequently, the sense of evil is evoked right from the opening of the curtains. An aspect of the witches which grabs our attention immediately is the intermittent rhyme and riddle of their dialogue. As the second witch answers ââ¬Å"when the hurley-burleyââ¬â¢s done, when the battles lost and wonâ⬠this unconventional rhyming speech supplements the witchesââ¬â¢ already alien nature, as well as adding confusion as to what these riddles portend. Also, as the witches chant in unison ââ¬Å"â⬠¦hover through the fog and filthy airâ⬠it seems they share a magical link by which they may indulge in the same evil thoughts. This, for the audience of the time, would be a disturbing piece of imagery. At times what the witches say may be paradoxical, adding to the dialogueââ¬â¢s riddling nature, for example when they drone ââ¬Å"fair is foul and foul is fairâ⬠. The aberrant speech style of the witches is used by them throughout the play, with the exception of ââ¬ËAct 3, Scene 5ââ¬â¢ which will be discussed later. It is also evident from this first scene that the witches have an unholy alliance or affiliation with the future and time. The third witch proclaims ââ¬Å"that will be ââ¬Ëere the set of sunâ⬠displaying her knowledge of future events, and so augmenting the witches already supernatural, malevolent image. With this development the sisters seem all the more potent as with their knowledge of the future comes also the ability to meddle and pervert it. Displayed also is the witchesââ¬â¢ association with the elements as the first witch questions ââ¬Å"in thunder, lightning or in rain?â⬠, as though they have a slight mastery over the elements. The thunder and lightning of the scene is more evidence of their power over the elements. We see the witchesââ¬â¢ use of familiars when the first witch says ââ¬Å"I come, Graymalkinâ⬠, a tool with which the sisters may communicate to the devil. Again, the application of this familiar, in this case a cat, adds further to the witchesââ¬â¢ malevolent aura, and the sense of concentrated evil. Over the years, different directors have added various features in order to maintain the sceneââ¬â¢s originality. For example, Polanskiââ¬â¢s version saw the witches on a beach burying a severed arm, whilst, in contrast Frainââ¬â¢s version depicted the witches as children on a council estate. As the play progresses, the witchesââ¬â¢ spiteful, vindictive nature becomes ever more apparent, as they display their malevolence during various scenes. Notable for exhibition of evil is Act 1, Scene 3 in which the sisters describe how they deprived the hapless sailor of sleep, stating ââ¬Å"sleep shall neither night nor day, hang upon his penthouse lidâ⬠. This shocking image is made doubly repulsive by how the witches seem to be thoroughly enjoying the whole scenario. Moreover, in the same scene, the witches brandish a severed ââ¬Å"pilotââ¬â¢s thumbâ⬠, another revolting image, which is indeed evident of their malicious nature. An example of them dabbling in the dark arts is seen in Act 4, Scene 1 where they brew the vile potion, chanting the theatrically legendary lines ââ¬Å"double, double toil and trouble; fire burn and cauldron bubbleâ⬠. With repulsive detail, they describe the ingredients of the potion, one such being a ââ¬Å"liver of blaspheming Jewâ ⬠and a ââ¬Å"finger of birth-strangled babeâ⬠. This horrific concoction is indicative of their very nature: vile and against society and nature. Due to these malevolent acts, the witches are often referred to as and associated with, agents of evil, for example in Act 4, Scene 1 Macbeth refers to them as ââ¬Å"you secret, black, and midnight hags!â⬠. Another example can be found in Act 1, Scene 3 where Banquo calls the witches ââ¬Å"the instruments of darknessâ⬠. They influence the characters to such an extent that they refer to them with such titles; this is further evidence of the witchesââ¬â¢ concentrated malevolence. It must not be forgotten also that the witches were the ones who originally ensnared Macbeth with promises of greatness, which were partially accountable for him committing regicide. This can be seen in Act 1, Scene 3 as the third witch greets Macbeth, saying ââ¬Å"All hail Macbeth that shalt be king hereafterâ⬠. Had the witches not tainted the noble Macbeth, he may have never fallen and so the evil of the witches can be held partially responsible. The witches can be seen meddling once more during Act 4, Scene 1 where they blind Macbeth into believing he is nigh on invincible with several prophecies. And so, Macbeth becomes complacent, fooled by the witchesââ¬â¢ misleading prophecies. Their malevolence is clear to see through their misguiding of Macbeth, as well as the other example given. The witches are depicted as having a haunting physical presence, both through their actual physical appearance and through their chilling language. In terms of their physicality, the witches are only described once during the play by Banquo in Act 1, Scene 3. He describes them as being ââ¬Å"withered and so wild in their attireâ⬠, telling directly of their abnormal manifestation. Also, Banquo tells of how the witches ââ¬Å"look not like the inhabitants of the earthâ⬠, showing how they are supernatural to such an extent that even their appearance makes us question whether they of this world. Disturbingly, the witchesââ¬â¢ appearance is so distorted that their very gender is ambiguous, as Banquo describes how their sex ââ¬Å"man may questionâ⬠. Their strangeness in appearance would immediately show to the audience the witchââ¬â¢s malevolence, as well as encouraging a sense of foreboding towards them. Along with their appalling appearance is their unorthodox and seemingly corrupting language. As discussed before, their language generally is spoken like a rhyming chant, further supporting their supernatural image. Implementing this chant-like dialogue enhances the threat which the witches impose on the audience, such as during Act 4, Scene 1 where a witch drones ââ¬Å"By the pricking of my thumbs, something wicked this way comesâ⬠, far more chilling then a non-rhyming alternative. As the play progresses, Macbethââ¬â¢s mind seems to be defiled by the witches, so far that at times even his language seems tainted and so echoes theirs at regular intervals. For example, during Act 3, Scene 4 Macbeth cries ââ¬Å"It will have blood they say, blood will have bloodâ⬠and in Act 4, Scene 1 he declares ââ¬Å"I conjure you by which you professâ⬠. Both these quotations bear a resemblance to the dialogue adopted by the witches and as such it seems as though Macbeth is either tainted by their influence or just obsessed with them. This is further suggestion of their evil, as their malevolence is such that their influence seems to have corrupted Macbethââ¬â¢s mind. In complete contrast, during the scene of ââ¬Ëdubious authorshipââ¬â¢ (or Act 3, Scene 5), the suggestion of evil through the language is comparatively tame and the established speech conventions adopted by the witches are neglected. Shakespeare cleverly omits the witchesââ¬â¢ usual language style in order to highlight their angst at having angered Hecate. Rather then using the typical chanted rhyming style, instead what little the witches do say is blunt and concise, as when a witch says ââ¬Å"come, lets make haste; sheââ¬â¢ll soon be back againâ⬠. Aside from the lack of rhyming, the witchesââ¬â¢ speech lacks its usual dark and evil content; for example a witch simply questions ââ¬Å"why how now, Hecate, you look angerly?â⬠This is heavily altered from their previous dialogue, for example during Act 1, Scene 3 when a witch declares ââ¬Å"like a rat without a tail, Iââ¬â¢ll do, Iââ¬â¢ll do and Iââ¬â¢ll doâ⬠. This quotation contains various dark themes, for example the disfigured rat, and is vastly different from the dialogue seen in Act 3, Scene 5. The speech in this scene also lacks the usual complexity used in other scenes, instead adopting a far more concise and simple language. However, because the witches make no reference to evil during this scene, this does not mean that their characters become less malevolent in nature. This is because they make no reference to evil as they are so fearful for their own safety, thus they still seem as vindictive and malicious as ever, only with self-preservation as a priority. ââ¬Å"Macbethâ⬠includes various themes which were relevant to the audience at the time; thus the play bore a higher significance to them, one such being the inclusion of the weird sisters. James I, King of England at the time, had a particular obsession with the hunting and executing of witches, caused by having nearly been killed during a storm, which he believed to have been caused by witches. This hate for witches filtered through the kingdom, meaning the persecution of witches or witch sympathisers was commonplace. Jamesââ¬â¢s paranoia went so deep that he even wrote a book entitled ââ¬Å"Daemonologieâ⬠inciting hate towards witches and other like creatures. Thus witches were widely regarded as a threat to the contemporary Renaissance audience and so when Shakespeare included the ââ¬Å"three weird sistersâ⬠in ââ¬Å"Macbethâ⬠the audience became more emotionally invested in the performance. Also, the prevailing theme of regicide, central to the play, w ould hold significance to the somewhat paranoid king, thus further immersing him in the drama. Although the witches are certainly responsible for triggering the eventual decision to commit regicide, it must be acknowledged that Macbeth himself is culpable and so may be considered partly malevolent. Highlighting his drastic choice of evil is his initial potential and heroic virtues described in Act 1, Scene 2. The Captain exclaims ââ¬Å"brave Macbeth- well he deserves that nameâ⬠telling us how his comrades admire his valour and respect his courage. We are then told how Macbeth fought ââ¬Å"disdaining fortuneâ⬠, thus fighting unafraid against the odds. Macbeth is then likened to ââ¬Å"valourââ¬â¢s minionâ⬠, symbolising just how courageous and brave he is; that he is the darling or minion of courage. And so with these references, we expect great things from this protagonist when he arrives on stage. It is because of this description that Macbethââ¬â¢s fall into darkness and evil seems all the more pronounced; that a celebrated soldier, of such audacity, c an fall into such a concentrated crucible of evil, killing a virtuous king, his best friend and even a helpless family. Also augmenting the perceived concentration of evil in ââ¬Å"Macbethâ⬠is the fact that he knows full-well the evil of his actions. Indeed, just before killing Duncan during Act 1, Scene 7 Macbeth tells Lady Macbeth that he no longer wishes to kill Duncan, stating ââ¬Å"we will proceed no further in this businessâ⬠. Therefore, it is discernable that he knows the consequences of his actions and so when he does eventually commit the crime it seems all the more malevolent; he knows what he is doing yet he continues nonetheless. Furthermore, throughout the play, particularly at the beginning when he is less corrupted, Macbeth uses euphemisms to hide the shocking alternative word and to an extent to stop himself hearing the reality. In Act 1, Scene 7 Macbeth says in a soliloquy ââ¬Å"if it were done when it is done, then ââ¬â¢twere wellâ⬠referring to the murder of Duncan as ââ¬Ëitââ¬â¢. Again, this adds to the evil of the final crime as it is clear Macbeth knows exactly what he is doing, and the malevolent significance the murder bears. Macbeth shows, through these two media, that he has a conscience which he is choosing to ignore and so more responsibility for the crime can be placed on him, as the witches clearly didnââ¬â¢t influence him to the extent where he didnââ¬â¢t know what he was doing. Another contributor to the evil present in ââ¬Å"Macbethâ⬠is the heinous nature of all of the murders; first a gracious and fair king, then his long standing best friend and comrade (Banquo), then an attempted assassination on Banquoââ¬â¢s helpless son, and finally the murder of Macduffââ¬â¢s innocent family. A sensational aspect is present in each of these murders making them seem all the more shocking and repulsive. Due to the vile nature of each of these murders, the concentrated evil present in ââ¬Å"Macbethâ⬠becomes all the more obvious. Also, the necessity of some of the murders is questionable; for example, what was the need to murder Macduffââ¬â¢s innocent family? The murder of Macduffââ¬â¢s family seems entirely out of spite, rather than an actual requirement. With these grim murders, Macbeth is perceived to be host to an even greater concentration of evil, especially in the later stages of the play were he is arguably unaffected by his malicious ac tions. An inner evil is conveyed through the mental torture Macbeth experiences in the later stages of the performance, which defiles his mind and his sanity. Evidence of the inner torture Macbeth experiences is seen in Act 3, Scene 4 where the ghost of Macbethââ¬â¢s former friend Banquo haunts him, unseen to all else. Gory to behold, this apparition is most likely an embodiment of Macbethââ¬â¢s guilt at having killed his former friend, as we see Macbeth shout; ââ¬Å"thou canst not say I did itâ⬠. This attempt to relieve himself of the blame is really only confession of his guilt. Moreover, the evil blighting Macbethââ¬â¢s mind can be seen again through his inability to sleep. In Act 2, Scene 2 Macbeth tells his wife of how ââ¬Å"Macbeth does murder sleep, the innocent sleepâ⬠, evidence of his disability. Due to the evil things he has done, Macbethââ¬â¢s mind has become contaminated and so he is tormented, to the point where he can no longer sleep. Indeed, at one point Macbeth even professes to Lady Macbeth about his inner torment, saying ââ¬Å"full of scorpions is my mind, dear wifeâ⬠in Act3, Scene 2. In any case, the change in Macbethââ¬â¢s thoughts as the play progresses is easily discernable; and so an inner evil corrupting his thoughts is arguably present. Throughout the play, Macbeth always appears to be preoccupied with the witches and this may be partly the reason for the corruption of his mind. Often, in his dialogue he refers to the sisters and genuinely seems beset by their deceitful words. For example, in Act 3, Scene 1 Macbeth tells a servant of how Banquo ââ¬Å"chid the sisters when they first put the name of king upon meâ⬠. References such as this towards the witches are commonplace in Macbethââ¬â¢s speech and it seems he has developed an indissoluble link with them, resulting in his obsession with them. This link can be seen also, as mentioned previously, in Macbethââ¬â¢s dialogue, which often echoes that of the witches. Even the first words Macbeth utters are akin to lines of the witches, where he remarks; ââ¬Å"so foul and fair a day I have not seenâ⬠; paradoxical language similar to theirs. At one point, during Act 2, Scene 1, Banquo even questions Macbeth as to whether his mind still lingers over the witches and he replies ââ¬Å"I think not of themâ⬠. Macbeth certainly seems influenced by the witches, and we even see that just before the killing of Macduffââ¬â¢s family he visits the sisters. It is possible that the witches are also responsible for Macbethââ¬â¢s inability to sleep mentioned above, as we know that they have engaged in such acts previously on the unfortunate sailor. Further influencing and at times controlling the actions of Macbeth is his wife, Lady Macbeth. More so in the early stages of the play, she can be found cleverly manipulating her husband, playing upon his weaknesses to ensure he secures his place as king. As Macbeth tells her how he no longer wishes to kill Duncan in Act 1, Scene 7, she responds ââ¬Å"art though afeardâ⬠, questioning his masculinity and classifying him a coward. Had she not guided Macbeth in this sequence, it is questionable whether he would have proceeded with the murder at all. In the same scene she also plans out the detestable details of the murder, and so in this case she can be considered the main agent. This is certainly indicative that there is a concentration of evil present in Lady Macbeth, even if its manifestation is less pronounced than her husbandââ¬â¢s. Additionally, in order to provide her with the inner strength to commit the murder, during Act 1, Scene 5 she attempts to conjure up evil ministers, declaring ââ¬Å"come you spirits that tend on moral thoughtsâ⬠. This act is testimony to her evil; that she would be willing to affiliate herself with damned spirits in order to kill an innocent old man. Also, Lady Macbeth is so eager to kill the king that she is even willing to reject her femininity. In a soliloquy during Act 1, Scene 5 she utters ââ¬Å"unsex me here and fill me from the crown to the toe top full of direst crueltyâ⬠. This unnatural (and chilling) denial of her sex shows how willing she is to commit murder. Through all these ill plans towards Duncan and despite bearing the knowledge that his life may well end that night, in Act 1, Scene 6 Lady Macbeth shows just how devious she is as she acts the part of a welcoming hostess, telling the king ââ¬Å"your majesty loads our houseâ⬠. At this stage in the play Lady Macbethââ¬â¢s subtle nature of evil is clear to see. Finally, as with her husband, it is obvious that Lady Macbeth registers the enormity of the crime through her pang of conscience before the murder and continues nonetheless. It is true that during Act 2, Scene 2 she tells Macbeth of how ââ¬Å"had he not resembled my father as he slept, I had done itâ⬠. This is evidence of her conscience, although she still lets her husband kill Duncan, ignoring her inner sense of right and wrong. Because of this, Lady Macbeth gradually becomes insane and descends into a hell of her own making, famously saying during Act 5, Scene 1; ââ¬Å"hell is murkyâ⬠. Shortly after these w ords Lady Macbeth commits suicide, relinquishing her life because of the evil she is aware she has committed. Contributing in a different way to the evil atmosphere found in ââ¬Å"Macbethâ⬠is the adept language implemented by Shakespeare, which persistently evokes the intended malevolence. A dramatic way in which Shakespeare conveys evil is through the use of disease imagery, for example ââ¬Å"canst thou not minister to a mind diseasedâ⬠. Particularly to the audience of the era, disease was exceptionally feared as it was often fatal due to the lack of medical knowledge, and for this reason the inclusion of these references conjured markedly strong dark thoughts. The idea of disease by definition is that of spreading corruption and defilement, and this it seems is reminiscent of the spread of evil in ââ¬Å"Macbethâ⬠, and so such references are therefore a reminder of the irresistible contagion caused by a tyrannical king. Similarly, the theme of concealment is also used throughout, regularly conveying a distressing sense of the unknown as well as the ominous threat of hidden evil. At one point Duncan tells of how ââ¬Å"thereââ¬â¢s no art to find the mindââ¬â¢s construction in the faceâ⬠, a chilling image of how there is no method by which a person can read anotherââ¬â¢s intentions based upon their external make-up; this is bitterly ironic given that Macbeth is tricking Duncan all along. In disguising intention, evil can remain hidden ââ¬â disguise imagery therefore reminds the audience of a characterââ¬â¢s hidden intent. Given this overlapping theme of disguise and deception, the audience are always aware of a malevolent atmosphere in ââ¬Å"Macbethâ⬠. Another common method of evoking the sense of evil is Shakespeareââ¬â¢s regular reference to night and blackness. This brand of imagery plays upon humanityââ¬â¢s primitive fear of the unknown; thus in making regular references to darkness Shakespeare ensures that an evil presence is always felt. The play boasts many memorable teaming references to darkness; a typical one can be found in Act 1, Scene 5 where Lady Macbeth proclaims ââ¬Å"come thick night and pull me in the dunnest smokes of hellâ⬠. Aside from the obvious reference to hell Shakespeare cleverly refers to darkness to evoke the feeling of deception and hidden evil, as well as the primitive evil of the darkness on its own. On the same note, the theme of cancelling out light is integrated as well as when Macbeth notably says in an aside ââ¬Å"stars hide your fires, let not light see my black and deep desiresâ⬠. Perhaps the most obvious pattern in ââ¬Å"Macbethâ⬠in terms of sinister language is the regular reference to predatory animals. Animals can often portend omens which in ââ¬Å"Macbethââ¬â¢sâ⬠case translate into dire events; however at times in Shakespeareââ¬â¢s application they can also just conjure up dire images. On occasion the characters allude to animals related to ill omens; for example when Lady Macbeth says ââ¬Å"the raven himself is hoarseâ⬠, the raven being the bird of ill omen. Or in other cases the reference may just be made in terms of sinister imagery, like when Macbeth says ââ¬Å"full of scorpions is my mindâ⬠. At times the imagery also contains biblical-related animals; for example when Lady Macbeth tells her husband ââ¬Å"look like the innocent flower but be the serpent under itâ⬠. In this case the serpent is a sinister use of imagery as it is related with the biblical ââ¬Ëfallââ¬â¢ and so is often an animal linked with male volence in literature. Shakespeareââ¬â¢s choice of regularly adding emphasis on blood further exaggerates the evil perceived by the audience, as well as darkening the image of the play. In particular, the murder of Duncan conjures many references to blood, for example Macbeth says ââ¬Å"will all great Neptuneââ¬â¢s ocean wash this blood clean from my hand?â⬠In this manner, emphasis is added on Macbethââ¬â¢s bloody hands, questioning whether even all the oceanââ¬â¢s waters will clean them. Likewise, the spots of blood described on Lady Macbethââ¬â¢s hand are also highlighted, to the point where she believes her hands are still blood stained several days after the murder, crying ââ¬Å"out damned spots! Out I say!â⬠The explicit references to blood add to the sinister content of the play through their dire implications; blood after all symbolising pain and suffering. A debatable topic within ââ¬Å"Macbethâ⬠is whether the main source of evil in the play extends from external supernatural sources or from Macbeth himself. However, as mentioned previously, if Macbeth is regarded as being influenced too heavily by the witches, he begins to seem like their puppet- easily manipulated. If Macbeth is seen as to be too easily manipulated this draws from his heroic status; how could such a strong character be so easily turned against his will? As such, I feel Macbeth is just as responsible for the atrocities as the witches. The tyranny brought about by this combined concentration of evil affects the whole kingdom, even at times supernaturally, for example after Duncanââ¬â¢s death Lennox tells of how ââ¬Å"the night has been unruly: where we lay, our chimneys were blown downâ⬠. As you can see, the disruption brought about by the death of the king is even portrayed to affect the weather. This idea used by Shakespeare in which everything is affected by the death of the king is in conjunction with the ââ¬Ëchain of beingââ¬â¢. The concept of this was a large hierarchy in which God was placed at the top and below him was ranked king; below this was all other organic life. Regicide means that everything below Duncan in the ââ¬Ëchain of beingââ¬â¢ would be disrupted, and would only return to order once the rightful king was restored. This happens in ââ¬Å"Macbethâ⬠: once the rightful king, Malcolm, takes the throne, then the disruption is purged and order returns over the whole kingdom. However, in spite of the regained regime, the final impression of Shakespeareââ¬â¢s masterpiece is that of lingering evil; the witches are still to an extent at large and who is to say the process will not repeat itself again with them partially corrupting yet another star-crossed victim. ââ¬Å"Macbethâ⬠is a play in which evil reigns and flourishes throughout and so it seems only fitting that the final impression masterfully created by Shakespeare should be that of lingering evil.
Subscribe to:
Posts (Atom)