Sunday, March 29, 2020

Polemics On Veiling Egyptian Women In The Twentieth Century Essays

Polemics On Veiling Egyptian Women In The Twentieth Century Introduction .. so much energy has been expended by Muslim men and then Muslim women to remove the veil and by others to affirm or restore it .. (Ahmed 167). This paper explores these efforts in two specific stages: the first and the last thirds of the twentieth century. Through an analysis of some of the various arguments on the veil, I will try to induce some general characteristics of the debate on the issue and on women during these two specific periods of time. The starting point will be Kasim Amin's Tahrir el Mara'a (Liberation of Woman) and the counter argument of Talat Harb's Tarbiet el Mara'a wal Hijab, (Educating Women and the Veil). The debate between those two protagonists which has become a prototype of the debate on the veil throughout the century (Ahmed P. 164). Malak Hefni Nassif's and Hoda Sha'arawi's attitudes towards the veil represent an interesting insight to two different interpretations of the hijab issue by feminist activists that prevail throughout the century. The whole synthesis of this early debate is then put in juxtaposition to the debate later in the century as represented by the avalanche of literature on the topic in the seventies, the views of some famous sheikhs like Mohammed Metwally el Shaarawi and others, and the heated debate initiated by the Minister of Education's decree of 1994 to prevent school administrations from imposing the hijab on girls as part of the uniform. The Early Debate Kasim Amin's Tahrir El-Mara'a (Published 1899) It may not be an exaggeration to say that Amin's Tahrir al-Mara'a was one of the most controversial book in Egypt's modern history. It has ignited a strong debate and prompted more than thirty reaction articles and books either to defy or assert his argument against the veil (Ahmed P. 164). The ideas of the book were not totally new, they echoed the writings of some writers like Mariam al-Nahhas (1856-1888), Zaynab Fawwaz (1860-1914), Aisha al-Taymuriah (1840-1902), and Murqus Fahmi's (a Coptic lawyer) four act play Al Mar'ah fi al-Sharq or (The Woman in the East) (Badran P. 19). Yet, Amin's book double-scored for coming from a Muslim judge and for his overt proposal to unveiling women's faces. His words were not the only challenge to the existing notions of the hijab, it was his caliber as a Moslim judge that has vocalized his call to unveil women and gave his book importance. After an introduction loaded with emotional phrases on the degradation of the Egyptian woman and an exaltation of the European woman, the book is divided into four sections: Educating women, Women's veil, The woman and the nation, and Marriage and divorce. Amin starts his argument calling for the Hijab Shara'ei stating that the Hijab in its form then (covering the face, the hair and the whole body) was not mandated by the Shari'aa. He further adds that he was not calling for the extreme of the West which makes the woman liable to seduction (Amin P. 65). The argument against the veil is in two sections: The religious section which is mainly text interpretation and some Hadith that prompt women to cover the hair and the whole body except for the hands and the face; and the social (practical / everyday life) perspective. The later section includes social ideas such as the inconvenience for women with their faces covered to dwell in business, to testify in courts or to get engaged (as the groom should see her face first). Furthermore, he argues that unveiling would make women watch their behaviors as they could be recognized and hence their reputation would be at stake if they did any wrong. Still, from the practical social point of view, the flimsy bourqo' (face cover) used was more tempting as it makes the viewer curious to see what was intended to be hidden. He further argues that, if women are imprisoned in the hareem (part of the house where women are secluded), then even if they did not commit any shameful act, it would not be due to any virtue in them, but to the fact that they did not have the freedom to do otherwise. Amin accuses the veil of being a barrier to women's development and education (P. 85), arguing that it deprived her from interacting with the society and learning how to live. He illustrates by comparing the ignorant peasant with the elite urban lady who can speak French and plays the piano, and concludes that the ignorat peasant would be

Saturday, March 7, 2020

Free Essays on Unix

UNIX has served many different government and scientific entities in the past and continues to be enhanced by software designers in order to better serve customers by being responsive to today’s marketplace. It is obvious that with public demand for internet services, combined with the fact that the internet is UNIX-based, there is no immediate threat to the UNIX operating system. The unique advantage of the UNIX operating system when it was introduced was that it could (and still does) run on dissimilar machines, unheard of prior to 1969. UNIX also can run more than one program at a time, store complex graphics and databases, and link to other UNIX and mainframe computer systems, including DOS since the late 1980s. UNIX-based systems control various programs written by many companies to distribute information between multiple computers within the network. UNIX at first worked over ARPnet the ARPA network grew throughout the 1970s when computer networks from various organiz ations, both nationally and internationally, began to link to ARPAnet, mostly for transferring engineering and scientific research data. The ARPAnet eventually migrated into what we know as the World Wide Web. The Web allows users to easily browse through hypertext and multimedia located on various computers and mainframe systems around the world. Prior to the CERN project, Internet users had to know UNIX programming language and move around in a cumbersome UNIX shell environment. The Web can best be described as a â€Å"global interactive, dynamic, cross-platform, distributed, graphical hypertext information system that operates over the Internet. It operates on many protocols, including FTP, Gopher, UseNet, WAIS databases, and TELNET. Most of the text transferred over the Internet is written in hypertext markup language (HTML). Graphics are transferred via standard generalized markup language (SGML) through the UNIX operating system. No one owns the web, but a... Free Essays on UNIX Free Essays on UNIX UNIX has served many different government and scientific entities in the past and continues to be enhanced by software designers in order to better serve customers by being responsive to today’s marketplace. It is obvious that with public demand for internet services, combined with the fact that the internet is UNIX-based, there is no immediate threat to the UNIX operating system. The unique advantage of the UNIX operating system when it was introduced was that it could (and still does) run on dissimilar machines, unheard of prior to 1969. UNIX also can run more than one program at a time, store complex graphics and databases, and link to other UNIX and mainframe computer systems, including DOS since the late 1980s. UNIX-based systems control various programs written by many companies to distribute information between multiple computers within the network. UNIX at first worked over ARPnet the ARPA network grew throughout the 1970s when computer networks from various organiz ations, both nationally and internationally, began to link to ARPAnet, mostly for transferring engineering and scientific research data. The ARPAnet eventually migrated into what we know as the World Wide Web. The Web allows users to easily browse through hypertext and multimedia located on various computers and mainframe systems around the world. Prior to the CERN project, Internet users had to know UNIX programming language and move around in a cumbersome UNIX shell environment. The Web can best be described as a â€Å"global interactive, dynamic, cross-platform, distributed, graphical hypertext information system that operates over the Internet. It operates on many protocols, including FTP, Gopher, UseNet, WAIS databases, and TELNET. Most of the text transferred over the Internet is written in hypertext markup language (HTML). Graphics are transferred via standard generalized markup language (SGML) through the UNIX operating system. No one owns the web, but a... Free Essays on Unix Following is all the information that you need to understand the workings of the UNIX operating system (Berkley 4.2). Patched together by The War On the security side of UNIX: - On the Security of UNIX Dennis M. Ritchie Recently there has been much interest in the security aspects of operating systems and software. At issue is the ability to prevent undesired disclosure of information, destruction of information, and harm to the functioning of the system. This paper discusses the degree of security which can be provided under the system and offers a number of hints on how to improve security. The first fact to face is that was not developed with security, in any realistic sense, in mind; this fact alone guarantees a vast number of holes. (Actually the same statement can be made with respect to most systems.) The area of security in which is theoretically weakest is in protecting against crashing or at least crippling the operation of the system. The problem here is not mainly in uncritical acceptance of bad parameters to system calls there may be bugs in this area, but none are known- but rather in lack of checks for excessive consumption of resources. Most notably, there is no limit on the amount of disk storage used, either in total space allocated or in the number of files or directories. Here is a particularly ghastly shell sequence guaranteed to stop the system: while :; do mkdir x cd x done Ether a panic will occur because all the i-nodes on the device are used up, or all the disk blocks will be consumed, thus preventing anyone from writing files on the device. In this version of the system, users are prevented from creating more than a set number of processes simultaneously, so unless users are in collusion it is unlikely that any one can stop the system altogether. However, creation of 20 or so CPU or disk-bound jobs l...