How do ethical regulations and legal provisions compel professional communicators to consider the public interest? Business Finance Assignment Help. How do ethical regulations and legal provisions compel professional communicators to consider the public interest? Business Finance Assignment Help.
(/0x4*br />
Advice and Guidance
This will be easier if you a) keep up with the Topic content and readings, and b) start the assignment early, recognising that it does require research of scholarly and media material.
Be careful not to use unacknowledged material from a previous assignment in this unit, or from the internet, as this will be detected (even if words are changed) by Turnitin and/or manual checking of references by marker(s). We are obligated by policy to report any suspected plagiarism and/or collusion.
On Content and Format
available for marking and Turnitin checking, late penalties have to be applied until the correct file is submitted.
On Approach
Previous students have written about, for e.g.–
o the right to a fair trial and journalism relating to a crime reporting case study or studies (1-2),
o ethical regulations and truth in advertising,
o PR ethics and public interest – whether the law helps or is PR unregulatable?
o A country case study (e.g. India, Philippines) and how the media was supported or constrained by the law and/or local ethical code of practice (for students who are based outside of Australia and wish to focus on their own legal context, you should refer to international ethical provisions as well as those in your country).
How do ethical regulations and legal provisions compel professional communicators to consider the public interest? Business Finance Assignment Help[supanova_question]
Please follow carefully all the requirements and upload on time Computer Science Assignment Help
This assignment consists of three (4) sections: a written project plan, revised business requirements document, project plan PowerPoint presentation, and a finalized project plan. You must submit the four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
While taking all business and project parameters into consideration, make quality assumptions to support the following requirements.
Section 1: Written Project Plan
You are now in the final stage of the project plan development. All previous documentation should be combined into one document that will serve as the statement of work for the project. Your goal is to have the project approved by the executive team. The project plan should be very detailed, which is designed to accomplish the monumental task of implementation; however, the executive team is only interested in a 30-minute summation. Therefore, you also must create a compelling executive summary that is supported by your detail that convinces the executive team that they should move forward with your solution.
- Develop a thirty to forty (30-40) page project plan in which you:
- Write a five to ten (5-10) page executive summary that provides a high-level technical overview of your project in which you:
- Describe the scope of the project and control measures.
- Describe the goals and objectives of the project.
- Include a high-level overview of all project deliverables.
- Give a detailed, realistically estimated cost analysis of the entire project, including human capital.
- Relate the value of the project plan solution to the competitive advantage that information technology will afford your organization.
- Recommend solution providers who can assist with development and implementation.
- Combine all previous documentation for Project Deliverables 1-5 in which you:Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
- Provide all aspects of the information technology implementation into the project plan.
- Revise the documentation based on feedback from the earlier evaluation of your deliverable.
Section 1 of this assignment must follow these formatting requirements:
- This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
- Include charts or diagrams created in MS Visio or Dia as an appendix of the project plan. All references to these diagrams must be included in the body of the project plan.
Section 2: Revised Business Requirements Document
- Document all revisions made to the written project plan in the Document Control section of the business requirements document from Project Deliverable 2: Business Requirement. Note: This documentation must outline the revisions made to the previous deliverables required in Section 1: Written Project Plan.
Section 3: Project Plan PowerPoint Presentation
Additional to your detailed executive summary you must present your findings to the executive team and the venture capital group that along with the executive summary will convince the group that your solution is optimal.
- Create a ten to fifteen (10-15) slide PowerPoint presentation in which you:
- Illustrate the concepts from your executive summary in Section 1 of this assignment.
- Create bulleted speaking notes for your presentation to the executive board in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established in this assignment for a realistic flow of communication.
- Use a professional technically written style to graphically convey the information.
Section 4: Finalized Project Plan
Use Microsoft project to:
- Finalize your project plan from Project Deliverable 5: Infrastructure and Security to include all necessary changes in assumptions, tasks, and / or subtasks.
The specific course learning outcomes associated with this assignment are:
- Develop information systems-related activities to maximize the business value within and outside the organization.
- Demonstrate an understanding of existing and emerging information technologies, the functions of IS, and its impact on the organizational operations.
- Evaluate the issues and challenges associated with information systems integration.
- Use technology and information resources to research issues in information systems.
- Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.
Click here to view the grading rubric.
[supanova_question]
Global branding 2 page Business Finance Assignment Help
After reading and viewing the assigned resources create a thread that provides your insights on the following.
Read Tata: The Evolution of a Corporate Brand.(Course Textbook) Entire book.
Review https://www.tata.com/newsroom/business/retail-cons…https://www.girvin.com/blog/brand-culture-the-spirituality-of-tata/Brand Culture | The Spirituality Of TATA |
Viewhttps://www.youtube.com/watch?v=I3sLDme_wg0Lessons of branding from failure of Tata Nano | By KV Gautamhttps://www.youtube.com/watch?v=d-G24kBODNk How to create global brands? Nirmalya Kumar, Tata Sonshttps://www.youtube.com/user/TataCompaniesAbout the Tata group https://www.youtube.com/watch?v=UKdwvRZEIWQTata Group Branding VideoChoose one of the following areas and elaborate on it as it relates to the development of the Tata global brand:
How do you see brand development and enhancement emerging from the area that you chose? |
[supanova_question]
CS 7642 Reinforcement learning – MDP – Finding the Optimal State-Value Function Programming Assignment Help
Problem
Description
The game DieN is played in the following way:
- You will be given a die with N sides. You will know the size of N, and can assume that N is a value greater than 1 and less than or equal to 30.
- You will be given a bit mask vector isBadSide representing the sides of a die that will make you lose. The vector will be of size N, and 1 indexed. (there is no 0 side)
- You start with 0 dollars.
- At any time you have the option to roll the die or to quit the game
- If you decide to roll:
- And you roll a number not in isBadSide, you receive that many dollars. (eg.
- if you roll the number 2 and 2 is not active — meaning the second element of the vector is 0 — in isBadSide, then you receive 2 dollars)
- Repeat step 4.
- And you roll a number in isBadSide, then you lose all money obtained in previous rolls and the game ends.
- If you decide to quit:
i. You keep all money gained from previous rolls and the game ends.
Procedure
- ● For this problem, determine an optimal policy for playing the game DieN for N sides. You will be given N and the array isBadSide which indicates which sides are bad. As you will see, the optimal policy for this game will depend on your current bankroll.
- ● You can try solving this problem either by creating an MDP of the game (state, action, transition, reward function, and assume a gamma of 1) and then calculating the optimal
1
state-value function or you can plug-in values and solve directly using the Bellman
Equations.
● What is the expected amount of dollars for this game if you follow an optimal policy? That
is, what is the optimal state-value function for the initial state of the game? Provide answers for the problems you are given in the “Solve for Code” tab on the Heroku site. Your answer must be correct to 3 decimal places.
Examples
The following examples can be used to verify your calculation is correct.
- ● Input: N = 21, isBadSide = {1,1,1,1,0,0,0,0,1,0,1,0,1,1,0,1,0,0,0,1,0}, Output: 7.3799
- ● Input: N = 22, isBadSide = {1,1,1,1,1,1,0,1,0,1,1,0,1,0,1,0,0,1,0,0,1,0}, Output: 6.314
- ● Input: N = 6, isBadSide = {1,1,1,0,0,0}, Output: 2.5833
- Resources
- The concepts explored in this homework are covered by:
- ● Lectures
○ Lesson 1: Smoov & Curly’s Bogus Journey
● Readings
○ Littman (1996)(chapters 1-2)
page 65 in the link http://www.incompleteideas.net/book/RLbook2018.pdf would be of additional help
and aditionally you can also use Pymdptoolbox
http://pymdptoolbox.readthedocs.io/en/latest/
[supanova_question]
There are two cases in this project. Below are the details on the two cases in the SPC Project (Based on Chapter 6S Statistical Process Control). In this module, there is an Excel spreadsheet labeled SPC Project – BLANK New_2019 that has the sample data Business Finance Assignment Help
Case 1: Frito-Lay Salt Test
A. Read the first case (Frito-Lay) description below.
B. Watch the video in this module for the Frito-Lay case (the video must be watched in its entirety to get full credit).
C. You must also submit a Word document containing a memo to Angela McCormack and answering the additional two questions.
Case 1 Description
Frito-Lay, the multi-billion-dollar snack food giant, produces billions of pounds of product every year at its dozens of U.S. and Canadian plants. From the farming of potatoes-in Florida, North Carolina, and Michigan-to factory and to retail stores, the ingredients and final product of Lay’s chips, for example, are inspected at least 11 times: in the field, before unloading at the plant, after washing and peeling, at the sizing station, at the fryer, after seasoning when bagged (for weight), at carton filling, in the warehouse, and as they are placed on the store shelf by Frito-Lay personnel. Similar inspections take place for its other famous products, including Cheetos, Fritos, Ruffles, and Tostitos.
In addition to these employee inspections, the firm uses proprietary vision systems to look for defective potato chips. Chips are pulled off the high-speed line and checked twice if the vision system senses them to be too brown.
The company follows the very strict standards of the American Institute of Baking (AIB), standards that are much tougher than those of the U.S Food and Drug Administration. Two unannounced AIB site visits per year keep Frito-Lay’s plant on their toes. Scores, consistently in the “excellent” range, are posted, and every employee knows exactly how the plant is doing.
There are two key metrics in Frito-Lay’s continuous improvement quality program: (1) total customer complaints (measured on a complaints per million bag basis) and (2) hourly or daily statistical process control scores (for oil, moisture, seasoning, and salt content, for chip thickness, for fryer temperature, and for weight).
In the Florida plant, Angela McCormack, who holds engineering and MBA degrees, oversees a 15-member quality assurance staff. They watch all aspects of quality, including training employees on the factory floor, monitoring automated processing equipment, and developing and updating statistical process control (SPC) charts. The upper and lower control limits for one check point, salt content in Lay’s chip, are 2.22% (UCL) and 1.98% (LCL), respectively. To see exactly how the limits are created using SPC, watch the Frito Lay Control Charts video in the Module below that accompanies this case.
In the Excel document (below in this Module) you are going to create a new set of UCL and LCL measurements based on the below sample data and using the provided population parameter for standard deviation. Calculate the measurements and show your work.
Angela is evaluating a new salt process delivery system and wants to know if the upper and lower control limits at 3 standard deviations for the new system will meet the upper and lower controls specifications currently used (2.22 and 1.98). The population standard deviation is s = .07 and each sample is n=4. In a Word document, write a memo to Angela explaining whether or not the new salination process (from which we obtained the sample data) is delivering a new set of UCL/LCL measurements that is within the specifications set by the current set of control limits. In other words, does the new set of UCL/LCL measurement exceed the prior limits (meaning it is unacceptable) or equals or is less than the current specifications?
Additionally, in the same Word document, answer the following two critical thinking questions about Frito-Lay’s current quality process.
Question 1: How much of an improvement in variability did Frito-Lay make by implementing SPC?
Question 2: What are the steps Karen Engels and Barbara Boudreau go through as part of a testing cycle?
The data (in percent) from the initial trial samples using the new salting process are:
Sample 1: | 1.98 | 2.11 | 2.15 | 2.06 |
Sample 2: | 1.99 | 2.0 | 2.08 | 1.99 |
Sample 3: | 2.20 | 2.10 | 2.20 | 2.05 |
Sample 4: | 2.18 | 2.01 | 2.23 | 1.98 |
Sample 5: | 2.01 | 2.08 | 2.14 | 2.16 |
Case 2: Stensil Fertilizer and Chemical Co. Inorganic Fertilizer Testing
A. Read the second case (Stensil) description below (also found in the Excel file, second tab).
B. Watch the second video in this module which explains how to build an SPC chart in Excel (the video must be watched in its entirety to get full credit).
C. You must also submit a Word document containing a memo to Bill Evans, Quality Control Manager for Stensil.
Case 2 Description
Stensil Fertilizer and Chemical Company produces both organic and inorganic fertilizers. Organic fertilizers are generally safe, but inorganic fertilizers are carefully monitored by the EPA due to the presence of hazardous waste materials (hazmat). Most bags contain some hazardous content, but theoretically there should be none. The EPA allowable specification is 90 parts per million (PPM). The quality control department at Stensil feels that there is no problem with hazardous material content, which has been averaging just over 50 PPM. The production department estimates that a substantial investment would be required to lower the amount of this contaminant. These two departments, after consulting with the marketing department and the EPA, suggest that a control chart be set up to monitor hazmat content. Five samples will be tested per day and plotted as one point on the chart. Use the data in Table 1 to set up the control limits. Then, after the limits are in place for this process, use Table 2 to determine whether or not the process remains in control for the week of September 6—10.
The Excel file includes a second tab for the Stensil Fertilizer Case (Case 2). This is the data you need for the problem. Build an appropriate SPC X-bar Chart and R-chart for the Table 1 data on this tab of the Excel worksheet.
Then, test to determine whether the Table 2 data indicates the process is under control for that period. Show your work for this part in the same Excel worksheet and submit it.
Assuming the role of Quality Control Analyst, write a memo (using Word) to the Manager of Quality Control for Stensil Fertilizer & Chemical Company (Bill Evans) explaining the process you went through and making a recommendation regarding current hazmat levels in Stensil’s fertilizer.
The first document is the file required by the homework, and the last two files are the homework examples.
[supanova_question]
[supanova_question]
Political science writing paper Writing Assignment Help
Need 5 full pages, at least 1800 words count. Need high quality work, this is a Political science class.
Here is the writing instruction:
You are a consultant from the group Judicial Crisis. You have been tracking recent court battles over voting rights and elections with great interest. Your organization believes that court intervention into political matters is a risky, but potentially necessary endeavor. The legitimacy of the courts is at stake, but then so is the strength democratic rule. You have been tasked with writing a “thought paper” on the Supreme Court’s most recent decision rejecting judicial intervention into questions of partisan gerrymandering. Your organization is producing a series of analyses on the Court’s decision and would like you to provide analysis of a) your interpretation of the Court’s decision and b) whether you believe the Court’s read of the “political questions doctrine” was correct. The analysis should a concise but complete overview of the salient points of the case history, the Court’s ruling and the political questions doctrine, but should spend significant time spelling out what you believe the Court got right or wrong in it’s decision to deny Court jurisdiction, and why. The analysis should be 5-pages-double spaced and will be evaluated using the following criteria: Use and mastery of the material (did you use and interpret the following correctly? political questions doctrine; gerrymandering case facts; gerrymandering decision) Completion–did you answer all of the questions or address each portion of the prompt? Strength of argument–would a reasonable person be convinced of your logic? Writing/grammar In the attached file, there is one example essay from my classmate.
Political science writing paper Writing Assignment Help[supanova_question]
Use of Hard-coded cryptographic key Programming Assignment Help
12639 Use of hard-coded cryptographic key
Users with access to this source code can use this key to access encrypted production data. Changing this key requires changing the code and re-deploying the application.
In your code, A cryptographic key is stored directly in the source code. (CWE-321)
We have production applications that go through security checks. Often this checks throw security issues within the code.
For issue type, need a document which explains about Use of hard-coded cryptographic key in the source code and how it can affect the application.
Also, need real code examples that can walk through the steps to remediate or fix this issue. Code is not language specific, but one example for one language is fine. You can review CWE issues and come up with a remediation plan for this issue.
________________________________________************************_______________________________________
Below is the sample that I made for other type of issue:
Dereference null return value
All but the most simple web applications have to include local resources, such as images, themes, other scripts, and so on. Every time a resource or file is included by the application, there is a risk that an attacker may be able to include a file or remote resource you didn’t authorize.
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted path.
Overview
Many file operations are intended to take place within a restricted directory. By using special elements such as “..” and “/” separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system. One of the most common special elements is the “../” sequence, which in most modern operating systems is interpreted as the parent directory of the current location. This is referred to as relative path traversal. Path traversal also covers the use of absolute pathnames such as “/usr/local/bin”, which may also be useful in accessing unexpected files. This is referred to as absolute path traversal.
In many programming languages, the injection of a null byte (the 0 or NUL) may allow an attacker to truncate a generated filename to widen the scope of attack. For example, the software may add “.txt” to any pathname, thus limiting the attacker to text files, but a null injection may effectively remove this restriction.
Issues
The following sections review some of the more common Filesystem path, filename, or URI manipulation vulnerabilities with suggestions for mitigation.
Example 1
In the model underneath, the path to a dictionary file is read from a system property and used to initialize a File object.
Example Language: Java
However, the path is not validated or modified to prevent it from containing relative or absolute path sequences before creating the File object. This allows anyone who can control the system property to determine what file is used. Ideally, the path should be resolved relative to some kind of application or user home directory.
Example 2
The following code attempts to validate a given input path by checking it against a whitelist and once validated delete the given file. In this specific case, the path is considered valid if it starts with the string “/safe_dir/”.
Example Language: Java
An attacker could provide an input such as this:
/safe_dir/../important.dat
The software assumes that the path is valid because it starts with the “/safe_path/” sequence, but the “../” sequence will cause the program to delete the important.dat file in the parent directory.
Example 3
This vulnerability shows up if the both of the following are true:
- The malicious user can enter a path to a file system object that would be accessed;
- After giving the path to the object, the malicious user can perform tasks, previously limited to him. Let’s take a look at an example, where the application receives a file name from and HTTP request, checks for its existence on the server, and returns the file to the user in an HTTP response:
Example Language: Java
Let’s suppose the HTML page that asks the user to download the file presents a list of available files, thus limiting the user’s access to the files on the server. However, the malicious user can create URL in the browser address bar himself, giving the path to the file he needs. Thus, the user can gain access to server files that are not meant for the public.
Potential consequences
- The malicious user can gain unsanctioned access to confidential data stored on the file system;
- The malicious user can gain write access to critical files, including config files. For example, he can write in a new user account, and bypass authorization;
- The malicious user can write access to executable files and libraries. He can thus replace a critical application module for his own, gaining complete system access;
- The malicious user can gain erase access to critical files, destroying system productivity.
Removal recommendations/Remediations
- The most effective way to prevent file path traversal vulnerabilities is to avoid passing user-supplied input to filesystem APIs altogether. Many application functions that do this can be rewritten to deliver the same behavior in a safer way.
- When performing any input filtration on the client side, make sure that similar filtration is done on the server side as well. This is done because the user can modify the data after the client-side filtering is done;
- Assume that all data coming from the client is a potential threat, including hidden form fields and cookies. We recommend using the “accept known good” method for input filtration, such as using a whitelist that describes acceptable input format. All input that does not follow the format, described in the whitelist should be rejected. You can, for example, limit file extensions, allowed symbols in the input string or file name length in symbols:
- To ensure the validity of file system paths, you can use a list of allowed symbols. For example, add a limitation that the file must contain only ‘.’ symbol, and no ‘/’ symbols. We recommend against relying on blacklists that include potentially dangerous symbols.
- Inputs should be decoded and canonicalized to the application’s current internal representation before being validated (CWE-180). Make sure that the application does not decode the same input twice (CWE-174). Such errors could be used to bypass whitelist validation schemes by introducing dangerous inputs after they have been checked.
- Use a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
- Store library include, and utility files outside of the web document root, if possible. Otherwise, store them in a separate directory and use the web server’s access control capabilities to prevent attackers from directly requesting them. One common practice is to define a fixed constant in each calling program, then check for the existence of the constant in the library/include file; if the constant does not exist, then the file was directly requested, and it can exit immediately.
- Use an application firewall that can detect attacks against this weakness. It can be beneficial in cases in which the code cannot be fixed (because it is controlled by a third party), as an emergency prevention measure while more comprehensive software assurance measures are applied, or to provide defense in depth.
- Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations.
If it is considered unavoidable to pass user-supplied input to filesystem APIs, then two layers of defense should be used together to prevent attacks:
The application should validate the user input before processing it. Ideally, the validation should compare against a whitelist of permitted values. If that isn’t possible for the required functionality, then the validation should verify that the input contains only permitted content, such as purely alphanumeric characters.
After validating the supplied input, the application should append the input to the base directory and use a platform filesystem API to canonicalize the path. It should verify that the canonicalized path starts with the expected base directory.
Below is an example of some simple Java code to validate the canonical path of a file based on user input:
- Before validation filesystem paths, canonize them
For example, this includes filters that remove dangerous sequences from the string. If the filter removes ‘../’ from the string, then after filtering the sequence ‘../…//’, the result would be ‘../’, just what the malicious user needs. Using these recommendations, we can rewrite the first example using the validateFilename function:
Use a built-in path canonicalization function (such as realpath() in C) that produces the canonical version of the pathname, which effectively removes “..” sequences and symbolic links (CWE-23, CWE-59). This includes:
- realpath() in C
- getCanonicalPath() in Java
- GetFullPath() in ASP.NET
- realpath() or abs_path() in Perl
- realpath() in PHP
This significantly reduces the chance of an attacker being able to bypass any protection mechanisms that are in the base program but not in the include files. It will also reduce the attack surface.
Note: An application firewall might not cover all possible input vectors. In addition, attack techniques might be available to bypass the protection mechanism, such as using malformed inputs that can still be processed by the component that receives those inputs. Depending on functionality, an application firewall might inadvertently reject or modify legitimate requests. Finally, some manual effort may be required for customization.
Further reading
http://cwe.mitre.org/data/definitions/22.html
https://www.owasp.org/index.php/File_System#Path_traversal
https://portswigger.net/web-security/file-path-traversal
[supanova_question]
IRAC method to analyse a law case Law Assignment Help
Questions attached.
Requirement: It will examine your ability to identify legal issues, identify the relevant rules and apply them to a factual situation. Use “IRAC” as a method to analyse the facts but not for when writing, make sure there is an intro/body/conclusion. Use headings and paragraphs to guide the reader through your arguments. Full stops and commas also help. Plagiarism and collusion will not be tolerated, if it is found there are two or more answers which are similar, all those papers will not be marked and will be referred to the disciplinary committee. Word limit: 800 words maximum.
[supanova_question]
critical analysis Writing Assignment Help
This assignment, When A Weak Rival Collapses, Watch Out
(Bloomberg Business Week 1/3/2018)
Link (Links to an external site.)
PDF: CA1-Lufthansa Prepares for Low Cost Competition.pdf
Critical Analysis Rubrics
Criteria | Ratings | Pts | ||||
---|---|---|---|---|---|---|
This criterion is linked to a Learning OutcomeBody – Concise and focused on key take-a-ways |
|
20.0 pts |
||||
This criterion is linked to a Learning OutcomeIntroduction- Concise, precise and action oriented |
|
10.0 pts |
||||
This criterion is linked to a Learning OutcomeOrganization and style |
|
10.0 pts |
||||
This criterion is linked to a Learning OutcomeContent-Identification of the key insight and application |
|
20.0 pts |
||||
This criterion is linked to a Learning OutcomeAppropriate use of THREE MARKETING concepts |
|
20.0 pts |
||||
This criterion is linked to a Learning OutcomeAppropriate use/citation of AT LEAST THREE ADDITIONAL EXTERNAL SOURCES |
|
20.0 pts |
||||
Total Points: 100.0 |
[supanova_question]
About Poem and violence Humanities Assignment Help
Please choose two poems from the reading and relate how violence plays a role in each. I would like you to make a reference to Gilligan’s violence video. How is the poet using the theme of violence? What message is the poet trying to convey? Why did you choose the two poems you did. Feel free to include Langston’s Hughes’s work here.
please this are the poem I choose
http://www.poets.org/viewmedia.php/prmMID/15549
http://www.warpoetry.co.uk/owen1.html
and this link is another source to help the two poem
http://www.poets.org/poet.php/prmPID/83
Please no addition source is need. I need only this sources plus the video 200 to 250 words lenght
[supanova_question]