Tuesday, May 19, 2020

The Government And The Central Bank - 1641 Words

Canada’s GDP is increasing and the unemployment is decreasing. And so, a cursory glance may suggest the country is performing well. However, in order to understand how successful the Government and the Central Bank’s efforts to ameliorate the economic situation have been we need to look beyond the narrow scope of two years set out by the essay title. As the world is more global now than before and Canada’s economy is export-based we have to wider our looks outside of Canada to understand whether their actions are reasonable made. Therefor I will in this essay compare Canada with other countries which also have large natural resource reserves, such as Russia and Norway. To understand the acts of the Canadian government and the†¦show more content†¦Canada is a developed country with large natural resource reserves. Trade statistics from recent years shows that the value of natural resource exports accounts for more than half of Canada’s merchandise exports. The United States, China and The United Kingdom are Canada’s most important trade partners and where more than 80% of the merchandised exports are destined (International.gc.ca, 2015) However, unlike other nations with large natural resource reserves Canada’s economy is not solely dependent on natural resources. According to the (Nrcan.gc.ca, 2013) Government of Canada’s calculations the energy sector directly account for only 7% of the GDP and other important sectors are: Car industry, Happenings before 2013 In 2007 - 2008 the world was struck by a financial crisis which lead the Eurozone into a debt crisis. Tom Worstall (2014) is reporting on Forbes that the Nobel prize award winner Ben Bernanke has revealed the financial crisis to have been even worse than the great depression in 1929 (The Economist, 2014). Many countries are still facing issues like deflation and slow growth (Knowledge@Wharton 2015). However, Canada got through the financial crisis less damaged than other countries and has since been able to present GDP growth and decreasing unemployment. (Haltom, 2015; IHS, 2015) Monetary and Fiscal Policy Macroeconomic policy in Canada is set out in its monetary and fiscal policy. Fiscal policy attempts to control the actions the

Monday, May 18, 2020

Apple Inc An Inventive Technology Company Functioning

Apple Inc is an inventive technology company functioning in the Electronic Equipment industry. It designs, creates and markets mobile communication and media devices, computers and portable digital music players and sells a variety of related software, services, peripherals, networking solutions and third-party digital content and applications (CNN MONEY, 2015). Recently, Apple reported record second quarter results for its 2015 fiscal year ended March 28. The company posted quarterly revenue of $58 billion and quarterly net profit of $13.6 billion. In comparison to last year to revenue of $45.6 billion and net profit of $10.2 billion, which is significantly higher. However, for the past month or two Apples’ stocks have declined rapidly by†¦show more content†¦BUSINESS SUMMARY Apple, Inc was founded by Steven Paul Jobs, Steve Wozniak and Ronald Gerald Wayne on April 1, 1976 and is headquartered in Cupertino, CA. It designs, manufactures, and markets mobile communication and media devices, personal computers, portable digital music players, and sells a variety of related software, services, peripherals, and third-party digital content and applications. Its products and services include iPhone, iPad, iPod, Mac, iPod, Apple TV, a portfolio of consumer and professional software applications, the iOS and OS X operating systems, iCloud, and accessories, service and support offerings. The company also sells and delivers digital content and applications through the iTunes Store, App Store, iBooks Store, and Mac App Store. It sells its products globally through its retail stores, online stores, and direct sales force and third-party cellular network carriers, wholesalers, retailers, and value-added resellers to the consumer and also sells third-party iPhone, iPad, Mac and iPod compatible products, including application software, and accessories, through its online and retail stores (CNN MONEY, 2015). Industry analysis Apple serves in the Electronic Equipment industry distributing its products worldwide. The Electronic Equipment industry is expected to grow by 6%, which could be good sign for Apple as there is room for them to grow. However, in order to see how Apple are performing in the industry, I have analyzed two of the biggest

Wednesday, May 6, 2020

Active learning exercise (Markeing Ethics) Example

Essays on Active learning exercise (Markeing Ethics) Article Task ACTIVE LEARNING EXERCISE (MARKETING ETHICS) Introduction Moral philosophy guiding the decision-making at Ford and at Bridgestone/ Firestone The moral philosophy that guided the decision-making at the ford company was the utilitarianism perspective. This is because, Ford considered the long-term effects of their actions and decision-makings and compromised on the real safety issues that were at hand. For instance, many cars manufactured during the troubled periods when accidents occurred frequently, the top administration of the company knew the risks that were undertaken but still chose to ignore. At Bridgestone/ Firestone, the perspective taken was similar to that of Ford because they also compromised a lot on the methods of damage control of their supposed mistakes (Berkowitz, Pp.109). By deciding to close a manufacturing plant in Decatur, Illinois, they were exhibiting their ability to throw blame to show that it was not entirely their fault, that things went wrong Change of decision-making model as lawsuits mounted Sometime in 1995, an insurance company, State Farm Insurance, notified Ford that there was an increase in claims related to firestone using vehicles. Due to this, ford took it upon them self to gradually desist from using firestone tires. This was a good decision on their part, however, it came a little bit too late because some consumers had already suffered accidents owing to the tires. Bridgestone on the other hand, decided to distance them self from the whole debacle by claiming that it is the car manufacturer who was at fault and not their tires. They went further ahead to advise car owners to check frequently the tire pressure of their vehicles to maintain good performance and safety. Ford’s handling of the situation surrounding the development, marketing and subsequent recall was unethical but legal The way in which ford handled the situation was unethical but legal. Unethical because the executives put the company’s interest first and totally disregarded the safety of the consumer. They had conducted many tests on the safety of the vehicles but still ignored the underlying consequences of the minor details they had ignored (Berkowitz, Pp.110). Because of this, some of their customers died from accidents that were avoidable, had the correct measurements taken. Before mass production of the vehicles, they should have ensured maximum safety precautions are in place. In 2001, ford attempted to please their potential and current consumers by announcing a pact between them and Top Driver, Inc., a large driving school company in the USA. This partnership saw the introduction of a driver course aimed at training SUV owners on safe driving. The public received this move with hostility because it implied that accidents occurred due to irresponsible driving on the driver’s part. In the advert they ran in the media, there was a false sense of security created as the SUVs in the video, were weaving in and out of traffic to show invincibility. This was hypocritical because they claimed to offer driving courses on safety while showing that driving irresponsibly was safe. It was legal because they did not seem to break any laws during their manufacturing endeavors. For all the claims that they had to pay out, they did because they did admit that there were some faults with their automobiles. Recommendations Ford should do a whole overhaul of their decision-making methods because clearly they have no remorse for anything that happens beyond making profits for the company. This is what makes them unethical. It is important for them also to define the objectives of the company as far as customer satisfaction is concerned (Berkowitz, Pp. 108). They should consider how to handle the needs of customer first, even those that are unknown to him or her. Big companies such as Ford are trusted by consumers worldwide and should therefore have a moral obligation to protect the interest of the consumer. In light of the issues faced earlier, the lawsuits, the insurance claims and bad media campaigns, they should redirect their energy to all the safety issues raised by their engineers, safety guidelines and consumer reports. This will save them money on recalls and unnecessary lawsuits. In addition to that, ethically, it will save lives and allow them moral authority over their consumers. Works cited Berkowitz, Eric. Marketing. New York: Irwin/McGraw-Hill. 2000. Pp. 108-111.

Can we conclude that T.S.Eliots ideas about culture are...

Eliot writes of culture as the way of life of a particular people living together in one place. That culture is made visible in their arts, in their social system, in their habits and customs, in their religion.(Milner, A (1994) Contemporary Cultural Theory: An Introduction. London: UCC Press.) A culture, then according to Eliot is one which is shared in common by a whole people, although he believed it was not shared equally between the people. Eliot divided the people into two groups, the elite and the masses and considered the elite to exhibit more marked differenciations of function amongst their members than the lower types. (Eliot, T. S. (1948) The Class and The Elite: Notes towards the Definition Of Culture. London: Faber †¦show more content†¦The poetry of the Realists chose words and images and arranged them ...to set up a complex criss-crossing of associations... and set up their poems as an ...endless maze. This seems quite an accurate description of the work of T.S. Eliot himself, in whose poetry frequent criss-crossing of references emerges. It appears that this movement and its followers, who have influenced Eliot so strongly (Especially Baudelaire and Laforgue.) may be partly responsible for the frequent obscurity which appears in Eliots work. This evidence throws doubt on the claim that Eliots work and views of culture are merely elitist, it seems that the poet and his work have more depth than simply a desire for elitism in his poetry. However, Eliots views on culture have been shadowed by the frequent obscurity of the language and allusions used in his work. Eliot considered culture to have three meanings. The term culture has different associations according to whether we have in mind the developments of an individual of a group or class or of a whole society. (Eliot, T.S. (1948) Notes towards the Definition of Culture. London: Faber Faber Ltd.) Eliot believed that the differences between the three senses of culture could be best understood ...by asking how far, in relation to the individual, the group and society as a whole the conscious aim to achieve culture has any meaning. In The Three senses of Culture, Eliot criticises Arnold (Culture and

Data Security Breaches for Problems and Solutions †Free Sample

Question: Discuss about the Data Security Breaches for Problems and Solutions. Answer: Introduction: On October 2015, hackers were able to gain access to T-Mobile and Experian data records. Following the attack, the two companies were sued by aggrieved customers whose records were severely exposed. In fact, according to Forbes Tech (2015), over 15 million customer records were exposed in the attack. So, why the two companies? T-Mobile uses Experian (a credit tracking company) to process its credit requirements including applications. Therefore, a breach of the records held by these companies exposed sensitive data on financial transactions. In essence, the data breach was conducted on Experian Plc. Servers where over 15 million T-Mobile customers had applied for credit applications. Moreover, the hack was an isolated incident that occurred over a short period of time. An exact time frame was never revealed, however, any customer who had applied for T-Mobiles post-paid products or services between the dates of September 2013 to 2015 was affected. Furthermore, the hackers mostly got away with personal data such as names, addresses, birthdays, social security numbers and military IDs among many others. However, the company noted that no other data was captured particularly those housing other financial records (Pagliery, 2015). How and why the breach occurred According to Krebs (renowned cyber security experts), Experian application portal was to blame for the attack. In his analysis, Krebs noted that Experians analysis and decision credit portal allowed users to upload any file attachment regardless of the type. Therefore, through these attachments, the hackers were able to upload malicious files that affected the companys database. Moreover, this type of attack is pretty common whereby attackers inject malware to an organisations database disrupting operations or as in this case harvest sensitive data. In addition to this, the attack was also aggravated by the fact that Experian did not request its users to subscribe to a username or password before uploading their files. In a nutshell, this meant any anonymous person could upload a file without any form of authentication or authorization (Wired, 2015). A quick analysis of the hack outlined the following; through the unprotected upload facility, the intruders gained access to the companys servers (Experian). Moreover, the said upload facility enabled malware to the uploaded into the system to harvest information however, the encryption method used to encrypt customer data was not provided, which raised more questions. Therefore, the breach may have occurred to acquire customer personal data but the intruder should have never been able to decipher the information. Moreover, the data was actually decrypted as noted by experts who claimed to have seen the data been auctioned in the dark web (Larson, 2015). Now, because of this outcome, the plaintiff to the lawsuit accused both companies of negligence as the information provided (in the dark web) placed the users (customers) at risk. However, even more, worrying was Experian solution to the problem which suggested an extended free service to the customers after a thorough assessment tha t needed the same customers to provide more confidential information (Pagliery). Information is the new currency of business, organisations spend heavily on protecting their data particularly that of their customers who rely on these organisations to protect them. This case study depicts a serious threat and vulnerability of cyber systems. To begin with, Experian and T-Mobile should have included thorough authentication as well authorization protocols before enabling its users to upload files. Moreover, if these functionalities were never in place, both organisations with their massive revenues should have done regular risk assessments to identify vulnerabilities in their systems (Bennett, 2013). Nevertheless, their existing approach could have been done to facilitate an easier transaction with their system however, a systems usability should never come at the price of security. At best a basic access control feature should have been incorporated. In addition to this, these organisations can enact information content management procedures where users encrypt their own personal data before uploading to the system. Commonly known as enterprise right management (ERM), this procedure encrypts documents and provide rules on who can access the said files (Verizon, 2015). Therefore, from the said encryption, files can transverse any network or communication channels without fear of compromise or intrusion. This outlook would have helped Experian whose customer records would have been safe regardless of the intruders accessing the files (encrypted with the access rules). On the other hand, T-Mobile should have included thorough security assessment as part of their acquisition process i.e. when partnering with Experian. This precaution would have identified the risks associated with Experian systems (Forbes 2015). Nevertheless, the major security violation, in this case, was a negligent system that exposed confidential data to the internet without any form of authentication. Experian should change its systems drastically to incorporate competent authentication procedures to their upload services. Moreover, they must conduct regular security assessment regardless of whether they face attacks or not (FTC, 2015). JPMorgan chase hack JPMorgan Chase, a renowned financial institution experienced one of the biggest security breaches in 2014. In the said attack, intruders gained access to over 100 million records of the companys customers. Moreover, this attack compromised more than one aspect of the organisations resources, this included household users, businesses and even charity branches of JPMorgan. In addition to this, the attack hacked several systems of the organisations publishers system which essentially affected the authenticity of the information produced (Crowe, 2015). According to JPMorgan, the intruders gained access to the companys servers accessing customers confidential information such as names, telephone numbers, and addresses. Furthermore, they also gained access to other sensitive information that was undisclosed at the time due to security outcomes. Nevertheless, despite this massive intrusion, JPMorgan held to the notation that the hack did not affect their financial records which maintained the accuracy of their banking details (Weise, 2014). Their evidence for this perception was based on the fact that no account files were compromised by the attack. Which meant, the intruders never gained access to the banks account numbers, IDs and social security numbers. However, this information was refuted by the New York Times who outlined the severity of the attack. In their report, the New York Times suggested that the intruders gained maximum access to JPMorgans systems through the authorization they acquired, which was the highest access lev el possible. In other reviews by Kerb (2015), the intruders acquired maximum privileges to over 90 servers owned by the financial institution across the globe. This outcome gave the hackers root access control over the organisations financial services including their confidential information, manipulation of accounts (open and close) and the ability to transfer funds. Therefore, when needed, the hackers could do whatever they wanted with minimal restrictions. However, as stated before, the organisations financial systems were unaffected despite the criminals extensive access which fueled the notation of future attacks through vulnerabilities left by the perpetrators. Today, reputable organisations like JPMorgan employ sophisticated security measures to avoid attacks such as the one seen in this case study. In the attack, one would expect an extensive and sophisticated attack technique sourced from the dark web, however, this intrusion was instigated by a simple if not negligent security flaw. First, the cybercriminals acquired an employees login (confidential) information. From this resource, they accessed the organisations systems and used them to manipulate other control information more so, the pump and dump resource for the online stock exchange scheme. Now, it is through this scheme, that the intruders gained massive earnings using the online processing systems that controlled services such as online gambling (Farrell Hurtado, 2015). Furthermore, the intruders used a clever access option to avoid detection in that they exploited the affiliate system linked to JPMorgans data. Therefore, through the stolen credential, they accessed different systems owned by the organisation across different branches in the world. To start with, they hacked websites owned by charity organisations hosted by JPMorgan. In fact, according to the final assessment, a charity website was the first intrusion point of the hack (Goldstein, Perlroth Corkery, 2014). Therefore through this intricate plan, the cybercriminals went undetected for many months while exploiting the vulnerabilities hosted by the institution. After the intrusions were detected many feared coordinated attack on United States systems, however, because of the simple security flaw, negligence was concluded to be the root cause of the problem. Solutions and Preventing the Attack At the beginning of the incidence, security experts thought that malicious malware sourced from the dark web was used to compromise JPMorgans systems, however, following a thorough assessment the credential flaw was discovered to being the problem. Again, as seen in the previous case study, JPMorgan needs to invest in competent security measures. First, on authentication procedures and secondly, on authorization policies. Yes, sensitive data was stolen (login credential) but the system should have had other extended protocols to identify the user without any reasonable doubt. A simple solution to this outcome would have been a multiple authentication procedures, where more than one variable is used to identify the users of JPMorgans systems (TRC, 2015). For instance, the login credential can be combined with biometric scanners to verify the user who requests access. Moreover, the login credentials should only have a limited access, where further authorization is needed to gain access to other extended systems. Finally, the access codes should also be limited and changed regularly to contain the losses just in case they fall into the wrong hands (Verizon, 2015). Nevertheless, another problem is also showcased by this case study, that of network vulnerabilities. Many organisations today face a considerable challenge in maintaining a strong security system throughout the year regardless of the business outcomes. This attack also went undetected because they organisation at the time focused on payment processes because it was at a turnover period. Therefore, minor systems such as charity websites were neglected which fuelled the attack (Valdetero Zetoony, 2014). Moreover, JPMorgan, as seen before, failed to assess its affiliate organisations during acquisition. Therefore, the organisation should also employ security assessments before acquiring and integrating new systems into their extended services (Forbes, 2015). In summary, JPMorgans attack could have been prevented with basic security measures, for one, employees should not have access information prescribed in their badges. Secondly, even if access cards are used, another variable should be used to authenticate the user e.g. a one-time password. Moreover, access must be limited across the system owned by the organisation, no one time pin should serve as a wholesome access to the companys system. In addition to this, regular assessments should be done to detect and identify system vulnerabilities or even existing threats such as the attack experienced (FTC, 2015). References Bennett. S. (2013). Data Security Breaches: Problems And Solutions. Jones day. Retrieved 14 April, 2017, from: https://www.jonesday.com/files/Publication/2dbb7406-ba13-4305-902a-8f2c65ef3d49/Presentation/PublicationAttachment/301495c5-31c8-4881-8202-9dd8665df004/TPL0812-Bennett.pdf Crowe. P. (2015). JPMorgan fell victim to the largest theft of customer data from a financial institution in US history. Retrieved 4 March, 2017, from: https://www.businessinsider.com/jpmorgan-hacked-bank-breach-2015-11?IR=T Farrell. G Hurtado. (2015). JPMorgan's 2014 Hack Tied to Largest Cyber Breach Ever. Bloomberg. Retrieved 4 March, 2017, from: https://www.bloomberg.com/news/articles/2015-11-10/hackers-accused-by-u-s-of-targeting-top-banks-mutual-funds Federal Trade Commission (FTC). (2015). Data breach response. A guide of business. Retrieved 14 April, 2017, from: https://www.ftc.gov/system/files/documents/plain-language/pdf-0154_data-breach-response-guide-for-business.pdf Forbes. (2015). The Top 10 Security Breaches Of 2015. Tech. Retrieved 14 April, 2017, from: https://www.forbes.com/sites/quora/2015/12/31/the-top-10-security-breaches-of-2015/6/#4ae5d13e377a Goldstein. M, Perlroth. N Corkery. M. (2014). Neglected Server Provided Entry for JPMorgan Hackers. Deal book. Retrieved 4 March, 2017, from: https://dealbook.nytimes.com/2014/12/22/entry-point-of-jpmorgan-data-breach-is-identified/ Krebs. (2016). Hyatt Card Breach Hit 250 Hotels in 50 Nations. Retrieved 4 March, 2017, from: https://krebsonsecurity.com/2016/01/hyatt-card-breach-hit-250-hotels-in-50-nations/ Larson. E. (2015). T-Mobile, Experian Sued Over Data Hack Affecting 15 Million. Bloomberg technology. Retrieved 14 April, 2017, from: https://www.bloomberg.com/news/articles/2015-10-07/t-mobile-experian-sued-over-hack-on-15-million-customers Pagliery. J. (2015). T-Mobile customers' info breached after Experian hack. CNN Tech. Retrieved 14 April, 2017, from: https://money.cnn.com/2015/10/01/technology/tmobile-experian-data-breach/ TRC. (2015). Data breach report. IDT911. Retrieved 03 March, 2017, from: https://www.idtheftcenter.org/images/breach/DataBreachReports_2015.pdf Valdetero. J Zetoony. D. (2014). Data security breaches; incidence preparedness and response. Washington legal foundation. Retrieved 03 March, 2017, from: https://www.bryancave.com/images/content/2/2/v2/2285/DataBreachHandbookValdeteroandZetoony.pdf Verizon. (2015). 2015 data breach investigation report. Verizon enterprise solution. Retrieved 14 April, 2017, from: https://msisac.cisecurity.org/whitepaper/documents/1.pdf Weise E. (2014). JP Morgan reveals data breach affected 76 million households. USA today. Retrieved 4 March, 2017, from: https://www.usatoday.com/story/tech/2014/10/02/jp-morgan-security-breach/16590689/ Wired. (2015). Hack Brief: Hackers Steal 15M T-Mobile Customers Data from Experian. Retrieved 14 April, 2017, from: https://www.wired.com/2015/10/hack-brief-hackers-steal-15m-t-mobile-customers-data-experian/

To What Degree was Reconstruction after the Civil Essay Example For Students

To What Degree was Reconstruction after the Civil Essay War successful Reconstruction was successful politically in its attempts to solve the problems of how to deal with the newly freed slaves and how to bring the seceded states back into the Union after the Civil War; however, many of these methods were unsuccessful or had no effect socially or economically. Some solutions determined by Reconstruction included: the passage of the Thirteenth, Fourteenth, and Fifteenth Amendments; the Freedmens Bureau; the Reconstruction Act of 1837, the Civil Rights Act, and the Enforcement Act of 1870. In 1865, Congress ratified the Thirteenth Amendment, which stated that Neither slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted, shall exist within the United States. Simply put, the Thirteenth Amendment abolished slavery. The passage of this amendment was successful politically; however, many states did not readily enforce this law. Many even passed discriminatory laws known as black codes. These laws were seen by Republicans as the driving vehicle for the reconstitution of the Democratic Party in the South. The black codes placed numerous restrictions on African-Americans including the prohibition of blacks to carry weapons, serve on juries, testify against whites, marry whites, start their own businesses, and travel without permits. The Thirteenth Amendment allowed for the freedom of African-Americans, but they were far from equal. However, with the help of the Freedmens Bureau, former slaves began to slowly pull themselves back up. The Freedmens Bureau was created by Congress just before the war to aid refugees, freedmen, and Southerners who had been uprooted by the Civil War by furnishing supplies and medical services, establishing schools, distributing clothing, and much more. Although the Freedmens Bureau lasted only a short time, it did succeed in establishing and assisting numerous educational institutions including Howard University and Hampton Institute. The Bureau also succeeded in providing work for families who needed it the most. Congress voted in February of 1866 for the continuation of the Bureau. This law was very successful in employing and assisting many of the freed slaves after the war. It most definitely was a successful solution to one of the main problems after the warhow to deal with the newly freed slaves. Because of the acutely enforced Thirteenth Amendment, Congress later passed the Civil Rights Act of 1866 and the Fourteenth Amendment. The Civil Rights Act extended citizenship to all persons born in the United States and not subject to any foreign powerof every race and color, without regard to any previous condition of slavery or involuntary servitude. It also forbade states from passing discriminatory laws like the black codes. The Fourteenth Amendment, passed to reinforce and reiterate the Thirteenth Amendment, made all persons born or naturalized in the United States citizens of the country. Everyone, regardless of color, was entitled to equal protection of the law and the states were enjoined from violating the rights of citizens to life, liberty, property, and equal protection of laws. To protect the civil rights of African-Americans, Congress passed the Reconstruction Act of 1867. This act allowed former Confederate states to reenter the Union if they agreed to ratify the Fourteenth Amendment and grant African-American men the right to vote in their new state constitutions. The act also divided the ten former Confederate states into five military districts, each headed by a Union general to ensure the laws were carried through. This act was very successful not only because it allowed former Confederate states to peacefully reenter the Union, but because it protected the civil rights of African-Americans and allowed them to execute their votes. As a result of this act, all remaining Confederate states agreed to set forth terms and were reentered into the Union by 1870. After the inauguration of Ulysses Grant, Republicans introduced the Fifteenth Amendment in fear that pro-Confederate Southern whites would try to place limits on black suffrage. This amendment stated that no one could be kept from voting because of race, color, or previous condition of servitude. However, the Fifteenth Amendment did not succeed in making it possible for qualified African-Americans to exercise their right to vote. .u6b9f8846af0e5942dd8799ee707b46e0 , .u6b9f8846af0e5942dd8799ee707b46e0 .postImageUrl , .u6b9f8846af0e5942dd8799ee707b46e0 .centered-text-area { min-height: 80px; position: relative; } .u6b9f8846af0e5942dd8799ee707b46e0 , .u6b9f8846af0e5942dd8799ee707b46e0:hover , .u6b9f8846af0e5942dd8799ee707b46e0:visited , .u6b9f8846af0e5942dd8799ee707b46e0:active { border:0!important; } .u6b9f8846af0e5942dd8799ee707b46e0 .clearfix:after { content: ""; display: table; clear: both; } .u6b9f8846af0e5942dd8799ee707b46e0 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u6b9f8846af0e5942dd8799ee707b46e0:active , .u6b9f8846af0e5942dd8799ee707b46e0:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u6b9f8846af0e5942dd8799ee707b46e0 .centered-text-area { width: 100%; position: relative ; } .u6b9f8846af0e5942dd8799ee707b46e0 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u6b9f8846af0e5942dd8799ee707b46e0 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u6b9f8846af0e5942dd8799ee707b46e0 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u6b9f8846af0e5942dd8799ee707b46e0:hover .ctaButton { background-color: #34495E!important; } .u6b9f8846af0e5942dd8799ee707b46e0 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u6b9f8846af0e5942dd8799ee707b46e0 .u6b9f8846af0e5942dd8799ee707b46e0-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u6b9f8846af0e5942dd8799ee707b46e0:after { content: ""; display: block; clear: both; } READ: What My Mentor Taught Me Essay Therefore, the Enforcement Acts of 1870 and 1871 were enacted to protect the voting rights of .