StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Evaluating the Qatar Softs Security Project - Report Example

Cite this document
Summary
This report "Evaluating the Qatar Softs Security Project" focuses on the project that might seem extremely challenging to some extent, not only due to the fact that it requires wide knowledge in networking but also because to fast-time users it might seem stressful and difficult to get used to it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Evaluating the Qatar Softs Security Project
Read Text Preview

Extract of sample "Evaluating the Qatar Softs Security Project"

Introduction: The project might seem extremely challenging to some extent, not only due to the fact that it requires wide knowledge in networking but also because to fast-time users it might seem stressful and difficult to get used to it. Moreover, in this particular project, there are some things that are prone to changes. The main criteria that will be used in evaluating the Qatar Softs security project include; 1. Project performance (PP) 2. Impact of the project on Qatar Softs overall performance 3. Performance of the partners (PT) Noteworthy is the fact that these criteria are consistent with international practice. Project performance (PP): this criteria essentially assessed through three main criteria namely; relevance of the project’s objectives, efficiency and effectiveness. Taken together three criteria captures how well Qatar Soft chose the means of meeting its communication security needs and how well the intervention performed in delivering against objectives, as manifested in the project’s implementation phase. This criterion essentially focuses on the quality and effectiveness of the project’s objectives and the extent that the appropriate objectives were achieved at reasonable cost. In a nutshell the Project performance answer the questions “were the correct thing done correctly” (Kaushik, 2010), and whether the nature of accountability in this project assessment in line with the needs of the Qatar Softs communication security between its head office in Qatar and it newly opened office in UK. 1. Under Impact of the project on Qatar Softs overall performance several “domain of impact” have been identified systematically to cover all the main issues touching on the Qatar Soft communication security. The several domain include; Communication Security Employees The environment Institutions, policies, and also the regulatory framework 2. The performance of the partners demands separate assessment of the performance of the primary partners in the entire project. These partners includes; the employees, the government, and a number of agencies playing peripheral roles in the implementation of the project. This criterion most importantly, addresses the effectiveness of each of each partner in the implementation of the project. In this regard, it looks at the way these partners are identified, prepared and supervised the entire project, and the contribution of each of them to the project’s success in course of its implementation. As much as the criteria serves to clarify whatever happened during the project implementation, it also attempts to answer questions such as; why did the project various activities took the direction that they took?, if there were shortcoming, how bests can be implementation be conducted in future to avoid such shortcomings?, and where there are successes, what are the major ingredients of this successes, and how best can the project implementation be conducted in future to improve on those successes? Or to put it in better words “how can the project be replicated or even up-scaled?” By asking these and other questions, we will be able to generate lessons and insight from this post project evaluation exercise. 3. It is also important to subject the finding of this evaluation to a rigorous data collection and analysis. Without this kind of audit it might be hard, even impossible, to convince evaluation partners of the validity of the conclusion that has been drawn and the lesson that have been learned from the evaluation. PROJECT PERFORMANCE: Like I have noted the project performance will be assessed on the basis of; Relevance of the project’s objectives Effectiveness (the extent at which this objectives have been realized) Efficiency (how economical has the process of converting resources into results been) Relevance of its objective: This factor determines whether the project was worthy carrying out at all. First, there is no doubt that with the tremendous growth Qatar Soft has experienced over the years, a growth that has particularly necessitated its expansion to other overseas jurisdiction and the resultant increased workforce, a well-designed and foolproof communication system between the branches and among the firm’s workforce is highly required. A system that will enable Qatar Soft to fully function as a stand-alone and self-sufficient software development company, while enabling it to efficiently satisfy the needs and expectations of its clients in time and to their satisfaction. It is also not in doubt that such a system requires a proxy server whose purpose is to maintain and ensure internet connection, a web-filter and firewall whose main purpose is to ensure that transactions within Qatar Softs are safe and secure not only from competitors but also from malicious characters who might be interested in sabotaging and torpedoing the firm’s growth, and lastly and equally important, an exchange server (Mbynum, 2009). It is a fact that a system that is designed this way is not only better than a telephone communication system that Qatar Soft has been using over the years but most importantly, offers more security that is commensurate with its increased size, outside threat and risk. From this there is no doubt that this project’s objectives have been directed towards the right priorities during the designing phase. It is also not in doubt from the design of the project that it has been adjusted to suit the ever-changing circumstances in course of its implementation (Mbynum, 2009). This gives weight to the frequent updating of the project design in course of its implementation so that it can reflect the emerging needs and perceptions of Qatar Soft. A common vision on how to address the communication security needs of Qatar Soft has been somehow reflected in the project strategy. First, Qatar Soft’s internal and external communication system has fulfilled some very important technical requirements that include; an on-call technical support that is expected to be available all the time to support customer service, an implementing server environment whose sole purpose is to manage all the transactions and activities that the departments (administrators, technical support staff, designers and finance controller) and among the employees within and out of those departments are being carried out in the company through the AD, an internet connectivity for both external and intranet communication and lastly, an implanting exchange server. The importance of meeting this technical requirement emanates from the fact that they enable the project to meet the international communication security standards that ensure that the transactions between the Qatar Soft’s Headquarter and the overseas office in UK are safe and secure. They also satisfy the need to safeguard both external and intra communication from any malicious characters whose intent might be to steal and compromise the firm’s competitive position or even destroy the firms with such vital information. The project strategy also consider the need to be driven by the need to have a secure system that guarantee the safety and security of employees’ information as they go about transacting the firm’s business. This being the primary purpose of the project there is no doubt that it has been incorporated in the project which is manifested in the “capturing user requirement” section. In this regard, Qatar Soft’s requirements have been captured properly through a combination of a questionnaire and an exhaustive interview. This capturing of Qatar Soft requirement has been accompanied a thorough validation exercise whose aim has been to determine whether they are achievable or not. Effectiveness: Evaluation of the effectiveness of the project is another important step that has to be undertaken in the post evaluation of a project like this one. This kind of evaluation is normally tricky in that there is always the probability of confusing a project’s objectives. However, in order to avoid such a risk it is always important to measure a project’s effectiveness with respect to the expectations of the project’s designers regarding its impact on the clients’ expectation. In our case here, the effectiveness of this project can best be evaluated through subjecting Qatar Soft’s external and intra communication security issues with the project’s activities to the effectiveness matrix, which essentially guides and assists evaluators to reorganize the project tasks so that they are positioned as far as possible into the domains that are affected most (Andrew, 2001). Below is a sample matrix that can be used to assess the project\’s effectiveness. Main domain of impact Key questions for impact on Qatar Soft Expectation of Impact Effectiveness ratting I strongly agree Agree I strongly disagree I strongly agree I agree I strongly Disagree Cost Will it make communication cheaper? Security Will it enhance communication security? Manpower Will it enhance the handling and storage of information? Efficiency Will it improve the sharing of information and files? Security Will it bring secure storage of information within the system? This project scores highly in almost all of these questionnaire questions which therefore show that it is viable project. By using a rating of the effectiveness of the sub-criterion that we have agreed upon with the evaluation mission and in relation to percentages achieved vis-a-viz the project’s objectives i.e. 80% and above – high, 60% to 80% - substantial, 30% to 60% modest, less than 30% - negligible, we can comfortably say that the project has scored highly when it comes to achieving communication security Qatar Softs objectives. The project also scores highly in effectiveness when it comes to connecting the four client PCs (PC1, PC2, PC3, and Win7), in this regard, I am referring to the virtual simulation of these PC using VMs, something that saves resources by not requiring any physical device (Cisco IOS Security Command Reference, 2008). Below is a depiction of simulating them using VMs; Another measure of effectiveness that this project scores highly can be found in the way a secondary research has been conducted to test the implement’s ability and the system requirement feasibility that have already been captured in its primary research (John 2008). This is particularly important in that it looks in to details as to how each of the requirements will be transited and implemented into the new system, the implications that this new system will have, not to mention its costs, benefits, pros, cons and other such information. It is a normal practice to confirm the primary research of this kind of a system with a secondary research just as has happened with this project which is a big plus for this particular project. It is equally important that the secondary research has confirmed that the objectives of the project are still viable just as was the case with the primary research. In this regard, I am referring to the likes of enhanced security, better file storage, better communication and better management and improved sharing of information which is essentially the main benefits that the project’s objectives intend to realize. Another measure of effectiveness can be found in the fact in the project’s architecture which is not only very practical but also very straightforward. Standard Architecture of the New System: From this architecture, which is the standard one in this kind of security projects, there is no doubt that all the departments will be connected to a safe internet connection through a WAN, which are then connected to the headquarters through a LAN. Even the new system conforms to the standard architecture of this kind of system which further reinforces the ideas that it is an extremely viable project. The use of the latest hard and software in the project is understandably to improve on the effectiveness of the project in meeting the objectives of Qatar Softs. For instance, the use of the 9 slot Cisco 6509-E switch instead of Cisco catalyst 6509 switch is informed by the fact that it offer a higher port densities that are useful for distribution, wiring, data center deployment and core networks (Cisco 2011). This does not however mean that the Cisco catalyst have been rendered redundant by the Cisco 6509-E switch in this system configuration if the implementation of the intranet network is anything to go by (Cisco 2011). If anything they are known to be good in providing what can only be referred to as double firewall services that further increase the highly needed network security in this system. Efficiency: The assessment of efficient resource use in this kind of a project might require a qualitative judgment that is made by the evaluator (Josh, 2008). This is because just as is normally the case with all evaluations, a good basis for assessments where objectives standards are not available for comparison is normally informed by the evaluator judgment, and particularly using experience from such projects. In our case, there are several previous closely related projects whose experience can be used in comparing this particular project. However, before we go as far as comparing this project with a similar one, we might start with conducting a qualitative assessment as part of appraising its efficiency. Qualitative assessment of efficiency should take into account, among others, the following; Actual costs vis-a-viz appraisal estimates together with any other revisions: there are a number of requirement that are likely to consume a significant amount of money. Both the software and hardware requirements forming part of this project are likely form a sizeable amount. In this regard, I am referring to the three servers, window server 2008, the latest release of the operating system (window 7 premium), A cisco catalyst 6509-E switch, three cisco catalyst 6500 series, One Cisco Catalyst 6500 or a Cisco 7600 Router, two cisco 4400 series wireless Local Area Network controllers, A cisco aironet 1200 series access point, and a aironet 1200. The good thing with this project’s cost estimation is that they do not appear to deviate much from the actual cost as can be attested during the implementation phase. All this requirement might have been factored in the budgetary estimates however there is a high probability that the budgetary figures as they are might escalates to high levels which might as well affect the project completion and even its infallibility. Implementation delays as well as any other subsequent redesign which might have potential of escalating cost. From the narration there is no doubt that all the contingent cost that might be occasioned by delays or any other subsequent redesign has been factored in the project. However, there is a thread of uncertainty that cut across the fabric of this project. In this regard, I am referring to the statement to the effect that these requirements that have been illustrated are just but a fraction of the required requirements that ought to be implemented in order to establish the whole scenario for implementing the network and management solution and anything else that might be needed for the effective and efficient operation of Qatar Soft is achieved (Novell, inc., 2011). The level of benefits and their growth curve vis-a-viz their expectation (if it is feasible). The benefits of this project are definitely commensurate with the cost and time expended on the entire project if its objectives are anything to go by. Other than the safe and secure intranet and the project also offer a way of operating and monitoring employees’ activities at an administration level and outside internet connection thereby giving Qatar Soft a platform of communication to the outside world. Utilization rates for project’s services and facilities. As much as there are tremendous benefits to be gotten from this project there are also gigantic risks that might befall this project although at a smaller scale. There for instance, project delay is seemingly a risk that has a significant chance of interfering with the projects. This therefore demonstrates that the project is not infallible just as is normally the case with all such projects. Whether facilities and services meets proper practices standards. It has been indicated in the project that a number of very crucial areas of the project will be subjected to thorough scrutiny and testing (Cisco Systems, 2011). Among the main areas that have been tested in order to ensure that they meet proper practices standards include; 1 Connectivity capabilities; this test will ensure that the set-up LAN/AN is not only configured correctly but also working properly. 2 File transfer; this test is aimed at ensuring that the system permit efficient file transfer for all kind of file. 3 Bandwidth speed; this test is aimed at testing the bandwidth speeds in order to ensure that the system has quality speed 4 Security checks; this test is meant for ensure that no security breaches of whatever nature are not witnessed in the system, or even any unauthorized person is able to access the system. Whether the benefits stream is sufficient vis-a-viz the costs: there is no doubt that the resultant system’s benefits far outweigh the project’s cost outlay. IMPACT OF THE PROJECT ON QATAR SOFTS OVERALL PERFORMANCE: There are a number of overarching factors that ought to be considered as contributing factors for assessing the project overall impact namely; innovation, replicability, and sustainability. In this regard, one need to ask him/herself how much as this project has the potential of improving the security of Qatar’s communication not only among employees but also between its Headquarters at Qatar and it office in UK. Having posed that question, the next stage to follow involves considering whether the changes effected by this project are sustainable, and whether it has set in motion dynamic processes that will lead to further improvement. There is strong reason to convince a person that this project is technically sound. However, there is always a likelihood that new technologies will emerge that will lead a once infallible technology obsolete and longer unreliable. This is one of the problems that ail projects of this nature especially bearing in the mind the rate at which technological projects are rendered obsolete in all sectors. For instance, new software and hardware might have replaced all the requirements that are being referred to as latest in this project by the time it has been fully evaluated. OVERARCHING FACTORS: Sustainability: Assessing sustainability entails making a judgment to the effect that the net benefits that are generated by the project will be maintained in the long-term. The sustainability concept looks at the features that continues to, or threat; the maintenance of the net positive changes over the long-term, and any plan to safeguard these changes from the unexpected events and the ever-changing circumstance. Sustainability is a crucial criterion in that it is considered one of the factors in determining the overall rating of the project. There are a number of factors that affect sustainability. Technical: there is no doubt that this project is technically sound. The technical part has been well-thought-out; however this does not necessarily translate to practical successes. A number of areas that are expected to function theoretically might as well prove unreliable or even out-rightly unworkable. Equally important, this technical soundness should be long-term and therefore sustainable. Replication: One of the strengths of this project is the fact that it can be replicated with time to meets the both the technological and security needs of that particular time. Environmental impact: there is always a risk in project of this nature to interfere with the cultural environment of an organization. In fact, there is no way this kind of a project can fail to radically a change a number of features of an organization which ought to be expected even in this one. However, as much as this project might potentially impact the cultural environment of the firm it might as well ends-up protecting it. Economic viability: It will be utterly unreasonable for Qatar Soft to implement this project if it cost ever surpassed the benefits that can be expected to emanate from it. So far it appears quiet economical to implement, although there is always the risk of a couple of budgetary estimates that might skyrocket both in the short and long term. There Resilience to exogenous factors: at the moment this project appears to have addressed majority of issues that it was conceived to address. However, it is only time that should tell of its infallibility especially because we leave in very dynamic world. Replicability/scaling up and Innovation: Innovation for this project is the development of improved and cost-effective ways of addressing the problems and the opportunities that Qatar Soft may encounter due to this project. This encompasses the technological and the institutional approaches. Qatar Soft no doubt support innovation, which has been responsible for assisting its processes while promoting not only its replication but also its scaling-up (David, et al, 2009). These innovations are in terms of technology, as can be manifested by the details of this project, as well as in precise development strategies and approaches that have are provided in the project. There is no doubt that this project meets almost all the characteristics of a replicable innovation. For instance, it improves and build-on the existing communication security technologies and approaches. The system architecture particularly, borrows heavily from similar projects. In fact, this project is just an upgrade of such projects, as can be manifested by the use of latest requirements in the market that it makes use of. One common thing with all latest It equipment is that they are normally better than the one before them. For instance, the main reason informing the use of Window 7 operating system in this project is the fact that it has superior user-friendly abilities as well as enhanced sharing capabilities that the previous version is lacking (Dunbar, 2010). Another improvement on the part of this project is the inclusion and installation of Microsoft active directory and a domain by the name “QatarSofts.local” respectively, whose implementation is solely informed by the need to manage employees’ activities (Mike, 2009). An important server that has been used in the system is a fax server which goes a long way enabling the user to not only share but also manage the network’s fax resource from a central point (GNS3dev, 2008). In fact, the user can as well define routing policies by setting up this fax server which is a major achievement of effectiveness in regulating the flow of information in within and out of Qatar Softs as can be depicted in the snapshot below; By specifying who to access the fax server the use of the system can realize its objective by enabling the user (routing assistant) to not only view the incoming fax before anybody else but also specify who to access the fax server inbox where he/she store all faxes (Ciscoguides, 2011), something that further enhancing the effectiveness of the system further as can be depicted by the two snapshots below; In the context of the amount of information to be sorted before being shared out and the kind of security that ought to be observed, the system appear to have placed safeguards in that regard the most prominent of them being the Files Services which essentially provides technologies that assist in the management of storage, while enabling file replication, management of shared folders, ensuring fast file search and access to UNIX client computer (Cisco Unified Communications Manager Express System Administrator Guide, 2008), all of which are powerful safeguards. Below is a snapshot with the introduction of File Services; Another mark of effectiveness in inculcating security in the system is the DFS Namespace which as a virtual view of the shared folders in all the four servers which further enables the user to navigate them without necessarily requiring knowing them or even the shared folders hosting the data (GNS3dev, 2011). Below is practical way of creating a DFS Namespace and managing the sharing system; From the foregoing there is overwhelming evidence to suggest that this system also addresses a widely shared problem touching on the communication security between distant locations especially in this age of “knowledge economy” as Drucker like calling it. In this regard, I am referring to Drucker assertion that knowledge is the key to gaining a competitive edge in today’s corporate world and therefore should be protected at all cost. This project does not significantly endanger the survival Qatar Soft if it is compromised which is characteristic of all replicable innovations. In fact, this project has in-build mechanisms to detect any fault in the system thereby ensuring that the damage that might emanate from any outside threat is always maintained at very low levels. Lastly, there is ample evidence in this project to suggest that it can be reversed within reasonable time in the events that it is detected to either not to be cost-effective or out-rightly a liability to Qatar Soft. PARTNERS’ PERFORMANCE: This criterion look at the way each of the partners involved in this project has fulfilled the role that is expected of them in the project. In this regard the performance of each party involved in the project has to be examined and audited separately, although it is their coordinated and composite effort and performance that counts in the overall performance of the project. In the case of this project there are a number of question that are to be asked to a number of players in this project. Of particular interest is the existing IT department which is expected to play a comparably major part in the implementation of the project. The role that they have played in setting up this project ought to be audited if Qatar Soft is to be convinced that the security system after its transition to firm’s system is in competent hands. The employees who will also been using this system once it is up and running will also been called to account for the part they have played if we are to be assured that no mistake that can cost the firm untold suffering and losses does not occur as part of the project’s toothing problem. This might even take the form of employees’ orientation to the system which is equally important if the system is to be a success. We are going to use a number of criteria to judge, all of which will include asking a number of questions as a starting point and as a guide to the assessment of the criterion. It is however important to understand that this criteria is more concerned with the quality of the services offered by these player in the project from project funding, project implementation, all the way to transition of the project to regular operation of the project developed tasks after doing away with the implementation phase. However, over and above, it is the quality of the project is the sole responsibility of the implementer, whether through proxies or not. In ensuring that this criterion has been fulfilled we will consider a number of factors namely; The quality of the so-called upstream services, as evaluated by the ultimate design approved for undertaking and funding. The selection and engagement of appropriate partners not only during design but during implementation as well. The assistance services during implementation: COOPERATING INSTITUTION PERFORMANCE: The performance of the cooperating institution is an extremely important factor in assessing the success of the project. Most importantly, it can provides much needed sufficient and informed support that is important in overcoming the various difficulties that are normally synonymous with the implementation phase of any project. In this project the greatest threat might as well be the internet. This is even the reason why the IT department has to be vigilant because threats might as well come from that direction. CONCLUSION: The structure and the breakdown of the project are not only convincing but also superb. The explorations of the risk that are likely to befall the project have been enumerated appropriately. The measures that have been put in place to address these risks are particularly convincing and very objective. To add in to comprehensiveness of the project is the Gantt chart that has been constructed and which depict a clear and precise single critical path of the project. The choice of the Sashimi model in a project of this kind and its enumeration are two thing features of this project that enables a person to assess the viability of certain requirements and the overall project instead of implementing the project first and then having to start all over again as is normally the case with certain projects. There are however, a number of factors that might deny this project the infallibility that it proclaims in the long-term. Nonetheless, over and above, the project is superb and is definitely going to fulfill Qatar Soft’s communication security needs in short-term. REFERENCES: Andrew Mason. (2001). Configuring the Cisco PIX Firewall for CA Site-to- Site. Retrieved on 11th November 2011 from Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Evaluating the Qatar Softs Security Project Report Example | Topics and Well Written Essays - 4500 words, n.d.)
Evaluating the Qatar Softs Security Project Report Example | Topics and Well Written Essays - 4500 words. https://studentshare.org/information-technology/1760632-project-evaluation-and-documentation
(Evaluating the Qatar Softs Security Project Report Example | Topics and Well Written Essays - 4500 Words)
Evaluating the Qatar Softs Security Project Report Example | Topics and Well Written Essays - 4500 Words. https://studentshare.org/information-technology/1760632-project-evaluation-and-documentation.
“Evaluating the Qatar Softs Security Project Report Example | Topics and Well Written Essays - 4500 Words”. https://studentshare.org/information-technology/1760632-project-evaluation-and-documentation.
  • Cited: 0 times

CHECK THESE SAMPLES OF Evaluating the Qatar Softs Security Project

DISNEYLAND IN QATAR

This paper presents the marketing plan for the opportunity identified in the emerging market of qatar for the establishment of a Disneyland theme park.... his paper presents the marketing plan for the opportunity identified in the emerging market of qatar for the establishment of a Disneyland theme park.... he implementation plan highlights the chronology of events that will lead to the establishment of a fully functional theme park in qatar....
14 Pages (3500 words) Case Study

Implementation of Information and Communication Technology in SMEs

the qatar Development Bank developed an online toolkit contains information, business forms, tools and their training to facilitate the SMEs.... Keeping in view the importance of the information the qatar Development Bank (QDB) developed a toolkit to facilitate the entrepreneurs for starting a new business or to improve an existing business.... QDB is a Government entity having the responsibility of supporting and developing local Small and Medium Enterprises (SME's) in qatar....
15 Pages (3750 words) Assignment

Development of GIS in Qatar

qatar is probably the only country that has been able to avail a fully integrated countrywide infrastructure for societal data that carries a societal GIS.... The technology's… ion support and decision0making capacity has encouraged a vast number of institutions in qatar to take up GIS as a prime part of the infrastructure in their organizations.... In light of emerging facets of the country's economic growth and renewed development, the government is Without a doubt, qatar foresees hurdles and challenges it has to face during the course of implementing its plans, and designs the contingency plans as well....
15 Pages (3750 words) Essay

The Effect of Oil and Gas on Qatars Economy

the qatar government expects a hike in the employment rates, which in turn will stimulate the massive economic growth of the nation.... It can be affirmed that through this non-oil based initiative, the qatar government expects a significant improvement in terms of government revenue earnings rates, governmental export earnings, economic liquidity rate and GDP among others (Ministry of Development Planning and Statistics, Qatar, “Qatar Economic Outlook 2013–2014”)....
10 Pages (2500 words) Research Paper

An investigation in to the effect of oil and gas to Qatar's economy

4 Pages (1000 words) Essay

Migrant Workers to Qatar

Qatar was successful in winning the 2022 world cup bid which has spurred investment in enormous infrastructural projects such as the qatar metro, construction of a new port, light rail system, stadiums, roads and more sporting infrastructure.... 1) the qatar investment law also known as Foreign Capital Investment is bestowed with regulating the flow of foreign capital into the country.... Entities that provide financial services are regulated by the qatar Financial Center....
2 Pages (500 words) Article

Political, Economic, and Social System of Qatar

As a result, by the end of 2005, the GDP per capita in the country was around QAR 157,000 equivalent to USD 43,000 the GDP estimates released by the qatar Central Bank.... Moreover, the Central Bank has also introduced a new short-term instrument named as the qatar monetary rate (QMR) enhancing the process of liquidity management in the country.... However, there are around 15 banks; in which the qatar National Bank, which is 50 percent owned by the Government, accounts for a substantial portion of the sector's total assets....
31 Pages (7750 words) Coursework

MIGRANT WORKERS TO QATAR

The Amir of qatar crippled the Qatari economy by stashing the oil and gas… The Amir was overthrown by his own son Hamad bin Khalifa Al Thani in 1995 in a bloodless coup after having ruled the country since the year 1972 (Central Intelligence Agency, 2014).... Hamad saw the creation of Al Jazeera, an Arab broadcasting At the start of the century, qatar resolved its disputes border disputes with Saudi Arabia and Bahrain.... Owing to enormous revenues from oil and natural gas, qatar attained the highest per capita GDP in the world as of 2007....
20 Pages (5000 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us