Tuesday, December 31, 2019

The Philosophical Battle Of Free Will And Determinism

Genetic Determinism in Octavia Butler’s Dawn David Erickson ENG. 175: Race, Heredity, and Genetics Professor Lisa Klarr 9 December 2014 The philosophical battle of free will and determinism has been present for centuries, bringing with it a host of moral and ethical implications. However, since scientist’s production of the first recombinant DNA and its hybridization in 1972 (genome.gov) genetic determinism has taken on a new set of circumstances. â€Å"Since the 1970s, numerous authors have examined †¦ethical issues raised by the genetic modification of human beings† (Resnik Vorhaus, PMC), Octavia Butler being one of them. In her imaginative science-fiction novel, Dawn, she examines the idea of how genetic engineering†¦show more content†¦Free will, which also encapsulates environmentalism, says that behavior is not determined by genes and can be effected by environmental factors and therefore â€Å"assumes that we are free to choose our behavior† (simplypsychology.org). In the modern world, the free will and determinism debate has been somewhat reconciled since it has been found that both genes and the environment play a role in human behavior, allowing us to have some choice of who we are based on the environments that we choose to be in. It is now known that it is our genes which interact with the environment that makes us who we are, not the genes themselves (Jacobson, APA). Humans differ drastically from Oankali in the facet of socially and genetically based behavior, embodying both in their respective symbolism of free will and genetic determinism. Humans are social creatures. They pass along behaviors and learn new ones socially and culturally. For example, Lilith and the humans she awakens behave in a manner that is socially constructed, based on one another. This is also seen in Lilith’s desperation for contact with another human being to the point where â€Å"It became irrationally important for her to do two things: First, talk to a human being†¦one who knew more than she had managed to learn† (57). This illustrates not only the

Monday, December 23, 2019

Protection Of Individual Property Rights - 1689 Words

The outcome of major cases that have gone through the United States Supreme Court have made an influence on how laws and amendments of the United States Constitution are construed. Protection of individual property rights is a controversial topic in the political spectrum and it has advanced with different visions of values that should be protected in American Society. The Fifth Amendment due process and clause jurisprudence reflects the notion of property. The following four U.S Supreme Court cases, Fletcher v. Peck (1810), Dartmouth College v. Woodward (1819), United States v. Cruikshank (1875), and Ex Parte Milligan (1866), demonstrate the tensions between property and democracy that have risen during the Civil War Period. The right of due process of law is one of the most profound principal in our lives today. It decreases the chance of giving an innocent person the death penalty and it protects people from condemnation. In Supreme Court cases like United Ex Parte Milligan, Due P rocess saved Milligan’s life from an unjust court trial. Due process also limits the power the government has such as search and seizures or to charge someone with an unreasonable crime. The principle of binding contracts was established in two Supreme Court cases. This theory states that a state cannot overturn a contract for private corporations. During the Founding era, a voluntary contract between two individuals was an indication of equality. They would both agree to give up some ofShow MoreRelatedEnvironmental Laws And Its Effects On The United States1292 Words   |  6 PagesDuring the late 1700s, many Americans advocated for social justice, economic empowerment, property rights and environmental protection. Their advocacy created a national phenomenon that empowered government and policymakers to execute policies aimed at solving these problems nationwide. The government again took action to enact numerous laws, some of which became the foundation for modern environmental policy and regulations in the United States. â€Å"On the national level, the first federal action toRead MoreCopyright Laws Protecting Musical And Literary Intellectual Creations901 Words   |  4 Pagesauthors’ intellectual property rights. The United States legislature has considered intellectual property protection since the Constitution’s penning. As the publishing world changes so do the laws protecting published works. As copyright law changes with time it grows more complex. Consequently, copyright litigation takes place frequently in the United States. Copyright Protection in the United States Intellectual property is a work that an individual or entity creates. This property may include thingsRead MoreChina on Diplomatic Protection Essay examples577 Words   |  3 PagesChina on Diplomatic Protection The topic of diplomatic protection historically is the link of nationality, which provides the basis of a right of protection by the state, although in some cases, by means of an international agreement a nation may have the right to represent another nation and act for the benefit of its citizens. Essentially states make claims against other bodies for compensation and remedy in the event that they have suffered by injury of denial or justice in the otherRead MoreIntellectual Property Rights : An Analytical Study Essay998 Words   |  4 PagesINTELLECTUAL PROPERTY RIGHTS – AN ANALYTICAL STUDY IN THE INDIAN CONTEXT Abstract Intellectual property rights are the rights given to persons over the creations of their minds. These rights make the creator/ inventor as the owner of the product/work. IP protection is intended to stimulate the creativity of the human mind for the benefit of all by ensuring that the advantages derived from exploiting a creation benefit the creator. This will encourage creative activity and allow investors in researchRead MoreCopyright Law Protects Functional Products, Processes, And Designs1315 Words   |  6 Pages Introduction â€Å"Intellectual Property†(IP) provides an intangible property rights protecting a product or creations, and regulates the uses of different sorts of ideas and insignia such as industrial design, literature, and artistic works inclusive of symbols, names and images. It is enforced by means of patented inventions, copyrights and trademarks where each protects distinct subject matter and promotes a unique social goal. Patent law protects functional products, processes andRead MoreThe Ethics And Intellectual Property1276 Words   |  6 PagesEthics and Intellectual Property In the business world, being able to compete in the marketplace is critical to a company s success. One of the ways organizations are able to improve the likelihood for success is by patenting their intellectual property (IP). Intellectual property is defined by Google (n.d.) as, a work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark (para. 1)Read MoreIntellectual Property Protection and Enforcement Essay1365 Words   |  6 PagesIntellectual property (IP) is defined as property that is developed through an intellectual and creative processes. Intellectual property falls under the category of property known as intangible rights, which includes patents (inventions of processes, machines, manufactures, and compositions of matter), copyrights (original artistic and literary works of), trademarks (commercial symbols), and trade secrets ((product formulas, patterns, des igns). Intellectual property rights has a significant valueRead MoreThe Effects Of Digital Media On The World Of Copyrights1531 Words   |  7 Pagesfamiliarity to intellectual property or copyright laws. When dealing with sources found digitally the laws become even more blurred and confusing; Copyright laws, traditionally, were intended protect authors and artists and physical mediums. Lawmakers’ struggle with copyright law is how to apply laws intended for one purpose to today’s high tech environment fast-paced environment. Laws are continuously being proposed and paced to stop piracy and infringement of intellectual properties (Yearneau, 2010; JamarRead MoreThe Liberties Of The United States Constitution1497 Words   |  6 PagesAmerican citizens have bided by the first 10 commandments in the United States Constitution, otherwise known as the Bill of Rights, for protection over their personal liberties from the United States government. These personal liberties i nclude, but are not limited to: The freedom of religion, speech, and press, the protection of privacy, and the right to life, liberty, and property. These personal liberties protected by the government, from the government, have always been strictly enforced with no unknownRead MoreThe Rights Of The Man And The Right Of Law731 Words   |  3 PagesMidterm #2 Prompt 2 The Rights of the Man and The Right of law Even if both Mill and Marx starts from the acknowledgement that the rights have legal groundings, two men focus on different aspects, and evaluate them differently: Mill thinks that the rights of the man increase the social cohesion through rights directly affecting the social utility, while Marx thinks that the rights of the man alienates one from another to undoubtedly make an individual into a self-centered individual who is distanced from

Sunday, December 15, 2019

Advertising and News Environment in Media Communications Free Essays

The advertising and news environments in media communications are catered to the interests of the targeted audience. Companies advertise toys on channels that children watch as a means of influencing them to ask their parents to buy a specific item. Advertisements on a channel that broadcasts programs about the outdoors will have the products that are most interesting to people who enjoy the outdoor experience. We will write a custom essay sample on Advertising and News Environment in Media Communications or any similar topic only for you Order Now â€Å"This language of advertising, although less apparent to communicator and audience alike, is firmly anchored to cultural norms and often says more about a society’s psyche than the more obvious stereotypes of content† (Unwin, 1974, p. 4). The news environment in media communications is often more diversified because people who watch the news often belong to a wider variety of consumers from teenagers to parents. The concept of media planning is important so that the advertisements reach the company’s targeted audience. â€Å"The purpose of media planning is to conceive, analyze, and creatively select channels of communication that will direct advertising messages to the right people in the right place† (Arens, 2009, p. 280). To gain a better understanding about the decision made by the advertising and news environments in the industry of media communications, it is necessary to determine the influence of advertising and news on society. Commercials often focus on introducing a product or service to the public, or providing subliminal messages inspiring brand loyalty whereas the information from a news press release provides vital information about upcoming events to both the internal and external publics of an organization. During the â€Å"Anderson Cooper 360 degrees† talk show, the advertisements seemed to focus on regular advertisements, but one of the major focuses was cellular devices. This segment covered the latest information available on the George Zimmerman, Treyvon Martin case. The controversy associated with the cellular phone calls placed by George Zimmerman and Treyvon Martin prompted cellular companies to attempt to capitalize on the focus of cellular phones. The most dominant advertising force during the program was the computer and electronic device giant Apple Inc. The iPhone 5 advertisement’s intentions were to continue to establish the Iphone as the best option for smart phone users. In June 2007, the Apple Corporation released one of the newest smart phones with the intentions of crushing the efforts of its competition including the creators of the Blackberry and Android cellular phones. The targeted audience was cellular customers who wanted more from their smart phones. The ad reads â€Å"Touching is believing† encouraging people to enjoy the benefits of a cellular phone, iPod, and computer compatible with Apple computers both laptops and desktops. The effect of the advertisement is intended to spark interest in its targeted audience and continues to establish brand loyalty during this cellular phone revolution. The commercial that ran almost every commercial break implies that at this point nothing else matters but trying the new iPhone 5, upgrading a person’s cellular phone experience, and an attempt to divert the attention of one of the newest cellular devices, the Galaxy S4. The advertisements for the Galaxy S4 focused on the phone’s ability to send messages, search the Internet, and use social networking websites during on a phone call. Was this another subliminal message that focused on the phone conversation that Treyvon Martin was on during the altercation ? If he had a better phone could he have altered someone about the guy following him before it was too late. Regardless of the intentions, specific, or indirect, of the Galaxy S4 the actions influenced by the agenda setting theory used by the company focused on the differences between the Galaxy S4 and the iPhone. These differences are often the determining factor between why a person picks one product over another. Even though an issue in the George Zimmerman case was the issue of the cellular phone conversation, the majority of the commercials were not directly related to the news story contained in the program. The news environment associated with the program â€Å"Anderson Cooper 360 degrees†, focused on the objectivity of the jury on the evidence presented in the case. The information presented had a balanced approach to the situation because some guests sided with the family of the victim whereas others were focused on the issue of self-defense. This balanced pproach questioned issues such as sensationalism, persuasion, and journalistic ethics. Because this case is a sensitive subject sparking questions of racial profiling, self-defense, and the protocol of a neighborhood watchman there were many issues intended to catch the attention of the audience. One area of focus were the laws associated with self-defense in the state of Florida. â€Å"These laws, commonly referred to as castle laws, stand-your-ground laws, or shoot first, ask questions later laws, have the common feature of strengthening legal protections for those use deadly force in self-defense† (Holliday, 2012, p. 07, para. 1). The â€Å"shoot first, ask questions later† approach of George Zimmerman was criticized because of the recording of the phone call where the 9-11 operator told Zimmerman not to follow the individual. One of the major points of Anderson Cooper was that even though George Zimmerman had the right to protect himself, he was instructed to leave the situation alone because a police unit was on the way to investigate the so-called suspicious individual. Had Mr. Zimmerman followed the instructions he would have been in a situation in which he believed he had to defend himself. CNN’s program, â€Å"Anderson Cooper 360 degrees† focused on the sensitive elements and evidence associated with the George Zimmerman case. The program touched on the areas of objectivity, persuasion, sensationalism, and self-defense. The commercials had an indirect association with the information provided in the program. The frequent advertising of cellular devices was a subliminal tactic to establish brand loyalty, and make users question, or appreciate their current cellular phone carriers. However, outside the phone conversations held by Treyvon Martin with a friend, and George Zimmerman with the 9-11 operator the commercials during the program were random focusing on the average audience member’s interest. The news environment portrayed a surprising balance of opinions whereas the guests focused on the facts, laws, and any situational analysis conducted on the evidence available for the George Zimmerman case. The influence of advertising and news on society has a general approach with subliminal sodalities. How to cite Advertising and News Environment in Media Communications, Papers

Saturday, December 7, 2019

Application of Principal Agent Relationship

Question: Discuss about the Application of Principal Agent Relationship. Answer: Introduction An agency is a type of a relationship that exists between two individuals. That is the agent and the principal. The primary purpose of the agent is to create contracts with a third party on behalf of the principal (Adamson, Morrison, 2016). In any case, a third party could be an employee or just an independent contractor. For example, in a supermarket, the cashier executes transactions on behalf of the supermarket. Actually, the customer doesnt enter into the contact with the cashier, but the contract is the between the customer and the supermarket. This study examines two different cases. In the first place, the study would look at a case where a de facto relationship is presumed to create an agency. The second one is an analysis of a case where an employee drags the employer to a case through apparent authority. This issue takes us to the root of the agency by presumption. Stone in (Stone, 2005) explained this agency as the agency that arises wherever a man and a woman are living together in a household. In (Campbell Dennis, 2009, p 56) the study found that two parties can create an agency by presumption or cohabitation. This type is agency exists through presumption that if a man and a woman are living in a de facto relationship, the woman is presumed to be an agent and can pledge the mans credit for necessaries. The same case would work for Rodney and Penelope. Rodney would be presumed to have the authority from Penelopes in acquiring the house necessaries so that both of them can keep up with their social status. Notably, necessaries are things like food, medical attention, and clothing. All things considered, these are mainly things that help in keeping their familys social status standing (Miss Gray Ltd .v Earl Cathcart, 1922). Another point to note is that the presumption of the agency only exists in the cases of cohabitation but not in marriage. After all, there is also a chance for invalidating this agency. For example, the husband can refute the authority if he expressly Had forbidden the wife from pledging credit. Had warned the supplier from supplying the goods to the wife. If wife already had sufficient supply of the goods earlier The wife had be provided with enough allowance to purchase such goods When the order was in excess even though it was necessary. However, if the husband had been paying for the bills to one supplier, the presumed agency of the wife will withstand and the only chance to escape liability is expressly warning the supplier. So to avoid paying for this $2500 microwave, Penelope should have warned the supermarket. So he doesnt have a choice rather than just pay. Adams Suing MODO after Dismissing the Lease A contract formed by an agent with a third party is as binding as when made with the principal under the doctrine of apparent authority (Carper, McKinsey, West, 2007). The same case applies to MODO sending Tim to search for an office but instead he exceed to acquiring a lease agreement. The main issue here is that Tim represented MODO to Adam, he made Adam believe that he has been sent to represent him in all the matters including entering into a contract. Apparent authority can be actual, expressed or implied, Plus, it could also happen by estoppel. Concerning this case, this study will lean towards apparent authority, the authority that Tim had and misused to an extent of drawing MODO to the case. Markedly, if it happens that the third party will rely on that representation; its no doubt that the principal will then be bound by any of the actions of the agent. So, MODO would be bound by the lease agreement, and this is because Tim made Adam believe that the Tim was there on behalf of Modo. In (Doncaster Metropolitan Borough Council v Racing UK Ltd, 2005), the court ruled that Mr Sanderson had apparent authority to bind the council the the contract. The case applies to MODO, Tim had apparent authority to bind MONDO to the agreement. For the sake of efficiency in transaction, there would be a demand to overlook the limits to express or implied authority. In other words, the law of agency should not be limited to only cases where the principal and agent relationship exist formally on the basis of either explicit or implied instructions. This one is the exact need to have apparent authority to substantially decrease the costs that would arise if inquiries have to be made to the principal every time a transaction is needed that where its terms are not included with the actual authority (Jones, Sufrin, 2016). However, the understanding of apparent authority has been battling with the misconduct of the agents. There are instances where an agent through apparent authority has committed fraud or mistakes drawing the principal into the suit. Nevertheless, the courts have always reasoned to prevent the misconduct of the agent from enrichment and fraud as in In (Skandinaviska Enskilda v. Asia Pacific Breweries, 2011). In this case, the Court quashed the reasoning that the defendants finance director had apparent authority to undertake the money that the plaintiff had given him. Role Of Apparent Authority To Establishing The Scope Of The Agents Power To Bind The Principal With Third Parties The agents action can totally bind the principal to a third party even though the apparent authority is not bona fide express or implied (Baze, 2015). The main reason is that the law of agency functions in the scope where trust in transactional activities is paramount. In the modern business world, the primary purpose of agency relationships is creating an efficient way through which a corporation can function and enter into business contracts. As a result, the law of agency has evolved to create the concept of apparent authority. This doctrine enables an agent who seems to have authority the capabilities of binding the principal, and in particular where the third party enters into a contract with the agent believing that the principal conferred such authority to the agency. This reasoning was held in (Ermoian v. Desert Hospital, 2007) where the court held that In the medical context, vicarious liability has been extended to a hospital entity under a theory of ostensible agency for t he acts of nonemployee physicians who perform services on hospital premises For instance, a case can happen where agent wont be authorized to sell an item on behalf of the principal. However, prior to the principals withdrawing the authority to sell, he had been allowing his agents to act for him by selling, including selling to the third party. Also, the third party has the knowledge that the principal had been allowing the agents to sell in the past. This past conduct deprives the third party a chance to an assumption that the agent doesn't have the authority to sell. In such a situation, a proper conclusion is that there is no actual authority for the agents to sell, but there may be authority due to the previous conduct of the principal in allowing them to sell. Apparent authority can arise in the cases where an agency relationship expired, but the third party doesn't have such knowledge. It can also arise after the termination or limitation of actual authority, yet the principal didn't communicate effectively (Kleinberger, 2008). Still, an apparent authority may occur even where there has been an established agency relationship forged between the agent and principal. In law, ostensible authority originates from estoppel (Ghaly, Wilken, 2012), but there are still substantial differences to distinguish the two. The concept of apparent authority allegedly comes into force to protect third parties. A valued explanation of this point is derived from (Bevans, 2007, p. 29) where the study stated that when a principal creates an impression that someone is empowered to act on his or her behalf, when, in reality, that person has no such authorization, the courts will intervene and supply the missing elements of the agency relationship. Courts have created the doctrine of apparent authority in order to prevent principals from escaping the obligations that they have created. Under this theory, a principal will be bound by the authority that he or she apparently transferred to the agent, even if this transfer was never actually completed. In the establishment of estoppels that would aid in apparent authority, the law would require the following reasons. The first one is a representation from the principal by words or conduct that the agent has authority. This fact was applied in (Rama Corp Ltd v. Proved tin General Inv. Ltd, 1952). In this case, the court laid out all the fundamentals that lead to the apparent authority using the concept of estoppels. By and large, the court provided that three features for the apparent authority to exist. In (Baskind, 2015), the law require the principal to make the representation either by word or conduct contemplated to be acted upon, proof of reliance, and change of the legal position of the third party. The second one is that the principal must make the representation to the third party. Thirdly, the third party must prove that it relied on the misrepresentation hence it entered into the contract. After establishing the three conditions, it would be no doubt that the principal w ill be estopped from disputing the agency. Ultimately, its vital to note that the appearance of authority must have arisen from the principal's previous conducts. That is to say; no agent can create a representation without the principal's previous conduct and expect to bind the principal to the dealing as held in (Sigma Cable (Pte) Ltd v NEI Parsons Ltd, 1992) Concussion The purpose of this paper was to simplify the main principles of apparent authority. The goal was to outline of the creation and aspect of the said authority to bring out a better understanding. Therefore, there is always a need for agents to act with diligence and credibility to maintain their good relationship with the principal. Also, it can help in preventing the burden of cases when the third party sues the principal. References Adamson, J., Morrison, A. (2016). Law for Business and Personal Use (19th ed., p. 387). Cengage Learning. Stone, R. (2005). The modern law of contract. London: Cavendish. Campbell, D., Dennis, E.C. (2009). International Agency and Distribution Law: Lulu Enterprises Incorporated. Carper, D., McKinsey, J., West, B. (2007) Understanding the Law. Cengage Learning Doncaster Metropolitan Borough Council v. Racing UK Ltd EWCA, Civ 999 (2005) Ermoian v. Desert Hospital 61 Cal. Rptr. 3d 754 (Cal. Rptr. 3d 754 ,2007) Rama Corp Ltd v. Proved tin General Inv Ltd, 2 QB 147, (1952) Skandinaviska Enskilda v Asia Pacific Breweries, 3 SLR 540. (2011) Sigma Cable (Pte) Ltd v NEI Parsons Ltd, 2 SLR 1087 (1992). Miss Gray Ltd V Earl Cathcart (1922) 38 TLR 562 Jones, A., Sufrin, B. (2016). EU competition law (6th ed., p. 753). Oxford, United Kingdom, UK: Oxford University Press. Baze, D. (2015). Common Law Of Agency. Supplemental Chapter For Oklahoma Real Estate Principles, 9. https://dx.doi.org/405-361-4602 Kleinberger, D. (2008). Agency, partnerships, and LLCs (3rd ed., p. 34). New York, NY: Aspen Publishers. Ghaly, K., Wilken, S. (2012). The law of waiver, variation and estoppel (3rd ed., p. 329). Oxford: Oxford University Press. Bevans, N. (2007). Business organizations and corporate law (3rd ed., p. 29). Clifton Park, NY: Thomson Delmar Learning. Baskind, E. (2015). Commercial law (1st ed., p. 176). Oxford University Press.

Friday, November 29, 2019

An Astrologers Day, Dusk and The Umbrella Man Essays

An Astrologers Day, Dusk and The Umbrella Man Essays An Astrologers Day, Dusk and The Umbrella Man Essay An Astrologers Day, Dusk and The Umbrella Man Essay An Astrologers Day by R.K Narayan Dusk by H.H Munro (Saki) The Umbrella Man by Roald Dahl In many ways, An Astrologers Day, is a thriller and is filled with an uncanny suspense which is revealed only at the end. And yet, like all his other stories, here R.K Narayan deals with the life of an ordinary Indian man whose life, when touched by Fate, had altered dramatically. The suspense which is cleverly maintained till the haunting end ensures that the reader will keep turning the pages, and when the end does arrive there is not just a sense of relief alone but also a sense of simple astonishment that is breathtaking. Indeed, this is a fine suspense story. The story of Dusk begins on a very pessimistic note as the author, H.H Munro describes all the defeated people of the world who come out of their homes in the dusk time so that they do not have to meet successful people. However, the rest of the story has little to do with this pessimism and we are drawn into the brilliant plan of a confidence trickster who was out to make money on some gullible victim. The end of the story is bound to make the reader laugh and wonder at the wit and creativity of a master storyteller. The Umbrella Man by Roald Dahl, is about a confidence trickster, but unlike the other stories this is told from a childs perspective which adds to the humor and charm of this narration. A mother and her little daughter are tricked into buying an expensive umbrella for a throwaway price; but they soon realize that not only the seller is a genuine seller but has a strange reason for selling the umbrella, and that they have been shortchanged in spite of buying the umbrella dirt cheap. There is an element of suspense in all three stories which keeps the readers on pins and needles till the very end. R.K Narayan kicks off the story by subtly narrating the life of the lower class Indian i.e the astrologer and the surroundings in which he works. The narrator does not re

Monday, November 25, 2019

Blue-Ringed Octopus Facts

Blue-Ringed Octopus Facts The blue-ringed octopus is an extremely venomous animal known for the bright, iridescent blue rings it displays when threatened. The small octopuses are common in tropical and subtropical coral reefs and tide pools of the Pacific and Indian Ocean, ranging from southern Japan to Australia. Although the blue-ringed octopus bite contains the powerful neurotoxin tetrodotoxin, the animal is docile and unlikely to bite unless handled. Blue-ringed octopuses belong to the genus Hapalochlaena, which includes four species: H. lunulata, H. fasciata, H. maculosa, and H. nierstrazi. Fast Facts: Blue-Ringed Octopus Common Name: Blue-ringed octopusScientific Name: Hapalochlaena sp.Distinguishing Features: Small octopus with yellowish skin that flashes bright blue rings when threatened.Size: 12 to 20 cm (5 to 8 in)Diet: Small crabs and shrimpAverage Lifespan: 1 to 2 yearsHabitat: Shallow warm coastal waters of the Indian and Pacific OceansConservation Status: Not evaluated; common within its rangeKingdom: AnimaliaPhylum: MolluscaClass: CephalopodaOrder: OctopodaFun Fact: The blue-ringed octopus is immune to its own venom. Physical Characteristics When not threatened, the blue-ringed octopus rings may be brown or invisible. Brook Peterson/Stocktrek Images / Getty Images Like other octopuses, the blue-ringed octopus has a sac-like body and eight tentacles. Ordinarily, a blue-ringed octopus is tan-colored and blends in with its surroundings. The iridescent blue rings only appear when the animal is disturbed or threatened. In addition to up to 25 rings, this type of octopus also has a blue line running through its eyes. Adults range in size from 12 to 20 cm (5 to 8 in) and weigh from 10 to 100 grams. Females are slightly larger than males, but the size of any octopus varies greatly depending on nutrition, temperature, and available light. Prey and Feeding The blue-ringed octopus hunts small crabs and shrimp during the day, but it will eat bivalves and small fish if it can catch them. The octopus pounces upon its prey, using its tentacles to pull its catch toward its mouth. Then, its beak pierces the crustaceans exoskeleton and delivers the paralyzing venom. The venom is produced by bacteria in octopus saliva. It contains tetrodotoxin, histamine, taurine, octopamine, acetylcholine, and dopamine. Once the prey is immobilized, the octopus uses its beak to tear off chunks of the animal to eat. The saliva also contains enzymes that partially digest flesh, so that the octopus can suck it out of the shell. The blue-ringed octopus is immune to its own venom. Venom and Bite Treatment Encounters with this reclusive creature are rare, but people have been bitten after handling accidentally stepping on a blue-ringed octopus. A bite leaves a tiny mark and may be painless, so its possible to be unaware of danger until respiratory distress and paralysis occur. Other symptoms include nausea, blindness, and heart failure, but death (if it occurs) usually results from paralysis of the diaphragm. There is no antivenom for a blue-octopus bite, but tetradotoxin is metabolized and excreted within a few hours. First aid treatment consists of applying pressure to the wound to slow the effects of the venom and artificial respiration once the victim stops breathing, which usually occurs within minutes of the bite. If artificial respiration is started immediately and continued until the toxin wears off, most victims recover. Behavior Hal Beral / Getty Images During the day, the octopus crawls through coral and across the shallow sea floor, seeking to ambush prey. It swims by expelling water through its siphon in a type of jet propulsion. While juvenile blue-ringed octopuses can produce ink, they lose this defensive ability as they mature. The aposematic warning display deters most predators, but the octopus piles up rocks to block the entrance to its lair as a safeguard. Blue-ringed octopuses are not aggressive. Reproduction Blue-ringed octopuses reach sexual maturity when they are less than a year old. A mature male will pounce on any other mature octopus of its own species, whether its male or female. The male holds the other octopus mantle and tries to insert a modified arm called a hectocotylus into the female mantle cavity. If the male is successful, he releases spermatophores into the female. If the other octopus is a male or a female that already has sufficient sperm packets, the mounting octopus typically withdraws without a struggle. In her lifetime, the female lays a single clutch of about 50 eggs. Eggs are laid in autumn, shortly after mating, and incubated under the females arms for around six months. Females dont eat while incubating eggs. When the eggs hatch, the juvenile octopuses sink to the sea floor to seek prey, while the female dies. The blue-ringed octopus lives one to two years. Conservation Status None of the species of blue-ringed octopus have been evaluated with respect to conservation status. They are not listed on the IUCN Red List, nor are they protected. Generally, people dont eat these octopuses, but some are captured for the pet trade. Sources Cheng, M.W.; Caldwell, R.L. (2000). Sex identification and mating in the blue-ringed octopus,  Hapalochlaena lunulata.  Anim Behav.  60  (1): 27–33.  Lippmann, John and Bugg, Stan, DAN S.E. Asia-Pacific Diving First Aid Manual, J.L. Publications, Australia, May 2004. ISBN 0-646-23183-9Mthger, L.M.; Bell, G.R.; Kuzirian, A.M.; Allen, J.J. Hanlon, R.T. (2012). How does the blue-ringed octopus (Hapalochlaena lunulata) flash its blue rings?. Journal of Experimental Biology. 215 (21): 3752–3757. doi:10.1242/jeb.076869Robson, G. C. (1929). Notes on the Cephalopoda. - VIII. The genera and subgenera of Octopodinae and Bathypolypodinae. Annals and Magazine of Natural History: Series 10. 3 (18): 607–608. doi:10.1080/00222932908673017Sheumack D.D., Howden M.E., Spence I., Quinn R.J. (1978). Maculotoxin: a neurotoxin from the venom glands of the octopus Hapalochlaena maculosa identified as tetrodotoxin. Science. 199 (4325): 188–9. doi:10.1126/science.619451

Friday, November 22, 2019

The Grand Chessboard Assignment Example | Topics and Well Written Essays - 2000 words

The Grand Chessboard - Assignment Example In the Introduction of â€Å"The Grand Chessboard† by Zbignew Brzezinski, he shows how Eurasia, a combination of Europe and Asia, basically held the world power through politics, based on geographical and economic values. This was true even as the Americas began colonization and ultimately, the industrial revolution that brought the United States in line with other world powers. In the twentieth century, and through several world wars, the development of technology, economy and trade, has rapidly pushed the United States forward as a world political arbitrator in the complex relationships between the countries that make up the Eurasian conglomerate. In World War II, when essentially the United States was invaded on its own shores for the first time by a foreign power, the United States stepped away from its previously held stance of isolationism and idealism, and joined the global conflict to protect its own interests. In doing so, the United States became a global power to be contended with on a serious level. It can be safely said that without the introduction of the United States to the Allied powers group in the war, the outcome would have been very different. Europe and Britain would be under the dominance of Hitler’s Germany, and Asia, under the influence of Japan, albeit a rather limited one (Brzezinski,5). From the end of World War II, war was fought on an ideological level between Communist Russia, China and the Western powers of Europe and the United States as part of the â€Å"Cold War.† ... For 300 years, the Roman Empire ruled the region on its highest level, maintaining internal vitality and unity as part of its successful dominance. What finally broke the Roman Empire was the division of governing different areas in the Empire rather than keeping control centralized in one spot, the disintegration of morals and ideology, and a sustained inflation which required sacrifices the people no longer wanted to make. At the time of writing this book, Brzezinski viewed America as ‘standing supreme in the four decisive domains of global power,’ those being economic, militarily, technologically, and finally, culturally. Today, there is less supremacy, mainly because of the economic situation, even though the effects are worldwide, not just in the United States. The economic situation today almost forces America to show military might in areas of the world where changes in a foreign country could severely affect the American economics. Many wars in our present time a re more about economics rather than a political ideology, although they are somewhat tied hand in hand. What is unique about America is its influence in creating dialogue with other nations in an effort to promote a universe of international communication and peaceful interaction to avoid unnecessary potential conflicts (Brzezinski, 28). That’s not to say that other countries are not doing this too, but it seems the United States is in the middle of everything major concerning world events and their potential resulting effects. As Brzezinski notes, to support this claim, America’s supremacy has helped institute NATO, a collective international security group with an integrated command that represents the world at large;

Wednesday, November 20, 2019

Environment of business (globalisation) Essay Example | Topics and Well Written Essays - 2500 words

Environment of business (globalisation) - Essay Example The admission of the overseas traders in to the less developed economies is an advantage, though it presents a number of troubles. The two main drivers towards this recent increase in globalization have been opinionated as well as industrial aspects. They have led to the flourishing of trade between countries globally. â€Å"Beginning from 1950s, globalization of industries increased at a high rate† (Griffiths and Wall, 2007 p. 37). This essay gives a critical analysis of two of the main drivers of this wave, which are political forces and technological aspects. The driving force towards adopting the various forms of globalization and the consequences of these options as well as the benefits and disadvantages of globalization have been discussed. Several examples of globalization have been highlighted. In the early 1950s, leaders especially from the developed economies needed to build up scheme of making certain that a war of such intensity could never recur. This had to be realized through removal of the barriers that formed impediments to trade in order to boost success and increase interdependence amongst nations globally. Mainly the powerful were involved in developing frameworks for international trade and investment through agreements. They established key global institutions. According to (Barry 2008 p. 91), â€Å"These political powers promoted international treaties that were aimed at upholding international trade through tariff reductions and encouragement of free trade amongst its members. Barry (2008 p. 91) further states that, â€Å"By 1994, its membership included more than 100 member states†. Through it, there was a major reduction in the restrictions that hampered trade before it was established. Such restrictions included a minimum quantity of what was to be traded. Held and Mcgrew, (2000 p.18) observe that â€Å"GATT membership kept on rising, and in 1995, it was transformed in to World Trade Organization†. This was transformation was a step taken

Monday, November 18, 2019

Letter from Hagar Essay Example | Topics and Well Written Essays - 500 words

Letter from Hagar - Essay Example â€Å"Pride was my wilderness, and the demon that led me there was fear. I was alone, never anything else, and never free, for I carries my chains within me, and they spread out from me and shackled all I touched†(page 292). My dear child, you are young and the fountain of youth flows upon you. Waste it not your youth on matters that will chain your heart and soul. You must know that I loved your grandfather dearly though I never really found the right way to show him how much. I could not at that time for I believed that I must maintain restraint and never allow my feelings flow as freely as a cascading waterfall. I exhort you not commit the same mistakes I did. I could have shown your grandfather the ecstasies I felt when making love. â€Å"It was not long after we wed, when first I felt my blood and vitals rise to meet his. He never knew. I never spoke aloud, and I made certain the trembling was all inner†¦ I prided myself on keeping my pride intact, like some mainden hood† (page 81). Alas, I was wrong. I could have soared to the skies and explode that a super nova in the skies and then come down from heaven to dance with the daffodils but I was too proud to do such things. I made myself believe that pride is more important than showing warmth and accepting the same like an all consuming fire that runs through your veins searing you blood until you scream not in agony but in ecstasy. Now, as I look back into the empty years where I held my feeling locked and sealed inside me, tears come welling up and spilling down my weathered cheeks unbidden. I strived to hide them but could not. I could have given more but did not. I could not bring myself to show much love and say the right word a t the right time. Like a stone angel made of hard marble, I am doubly blind. But then again, would they have reacted differently had I said and done things differently? Would they? I think not. So it is perfectly all right. Child, I want you

Saturday, November 16, 2019

Attack Tree Model Analysis of Security Breaches

Attack Tree Model Analysis of Security Breaches THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting systems in place, he says. (Fred Sandsmark, p11) The above-mentioned stated that there was slightly increase in computers attack in 2005. As technology evolving, companies willingly to spend more money on computer systems to do business activities with their associate and partners. This will increase more and more security breaches on the computer systems. The purpose of this analysis report is to examine the various possible attack methods to compromise the availability of the computers, information and associated resources of a small firm. Research for this report includes an attack tree diagram, showing how the hacker can compromise the availability of the systems services, associated resources and to access sensitive information through different attack techniques. Each technique is the subset of the different type of attack methods, with possible assumptions attach to each methods, the attack tree will be discussed in greater details. INTRODUCTION The manager of the Raylee Pte Ltd has recently heard through the media and newspaper publications that there are numerous threats which could compromise the availability of the computers, information and associated resources. Management of Raylee Pte Ltd has decided to hire the security consultant firm Red Alert Security Pte Ltd to undertake a details analysis of its current computer and network state in order to prevent the hackers to compromise the availability of the computers services, information and resources. The under-mentions are the network and desktop environments of the Raylee Pte Ltd. There are six computers and one internal server (for processing orders) within the firm. Each computer encompasses Microsoft Windows 7 and Microsoft 2007 Each workstation has been patched with all updates as of March 25th, 2010. The company shares an ADSL 2+ connection amongst all computers. Server backups are done fortnightly and stored on a DVD spindle name backup1 Workstation backups are done bi-monthly and stored on a DVD spindle name backup2 Employees have email addresses provided by the Internet Service Provider. Documents are shared amongst employees through a D-Link DNS-323 NAS The router is utilising a default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. SCOPE Security consultant of Red Alert Security Pte Ltd will analyse of the company current computer system, network state and desktop environment in order to prevent the hackers to compromise the availability of the computers services, information and resources. Then the consultant will submit a detail analysis report to the Management of Raylee Pte Ltd for recommendations METHODOGLY The security consultant uses a technique known as attack tree to identify the best possible options to compromise the availability of the system services, information and resource in the quickest time. Below is the attack tree he comes up with. Compromise The Availability Of Computers, Information And Associated Resources 1. Remote Access Router: D-Link DSL G604t 2. Access NAS: D-Link DNS-323 3. 3. Gain Access Internal Server (Processing Orders) Orders) 4. Steal Password: Workstations METHODOLOGY From the attack tree in the previous page, each of the sub attack tree will be discussed in more detail. Figure 1 1. Remote Access Router : D-Link DSL G604t 1.1 Determine the password 1.1.1 Learn password 1.1.2 Use widely know password 1.1.3 Dictionary attacks 1.1. Determine password Hacker and cyber criminal will try to determine the password of the router in order to access the network environment and do whatever they want. We will briefly explain the methods as follows 1.1.1 Learn password If the user has not set new password and is using the default which is normally blank. Hackers can easily search online for the manual of the particular wireless router and know the password. Hackers login the wireless router configuration page to change the setting and sabotage the network. For instance, hacker can surf this link http://www.routerpasswords.com/index.asp to get the default password for all the routers. 1.1.2 Use widely know password The common used passwords are admin, password, [emailprotected], 123456, 666666, qwerty, 00000000 and etc. These widely used passwords allow hackers to easily access the router. 1.1.3 Dictionary attacks As the word dictionary it implies that it is one of the attack techniques use by the hackers to determine its decryption key, password or passphrase by searching the all the words which are usually seven characters or lesser chosen by the user in the dictionary. METHODOLOGY Figure 2 2. Access NAS : D-Link DNS-323 2.1 FTP server 2.2 Folder File Permission 2.3 P2P distribution 2.1.1 Bounce Attack 2.1.2 Misconfigure 2.3.1 File poisoning 2.3.2 Sybil attack 2.1 FTP server Most of the Network Attach Storage device comes with the feature of the FTP server which allows user to download or upload file remotely anywhere. However, this service creates a loophole for attacker to retrieve sensitive information and data. The various attack methods on FTP server are discussed as follows 2.1.1 Bounce Attack FTP bounce attack is another attacking technique use by the hacker to exploit the ftp protocol so that he can use the PORT command to send request access to the ftp port indirectly to another victim machine which acts as third party for such request to access the ftp. 2.1.2 Misconfigure One of the common problems is to misconfigure the ftp server which allows users to download and upload the files in the same directory (global/tmp directory) for people to share data with each other. It will create an opportunity for attacker or theft to steal the data or upload virus program to the directory. Hence employee will accidentally install the virus program and infect to the computer systems and network. 2.2 Folder File Permission Proper folder and file permission must be set according to the employee roles and responsibilities. If there is no permission setting on the files and folder and gives everyone permission to read, write and execute it. Then it will be easily for attacker to retrieve information upon hacking into the company network. 2.3 P2P Distribution It is a peer-to-peer file transfer protocol to allow users each download different pieces of the broken file from the original uploader (seed). Users exchange the pieces with their peers to obtain the broken ones which are missing. IT savvy employees can make use of the P2P to download their favourite movies, videos, music and software. Hacker will make use of the P2P attacks to gain access into the network. There are two types of attacks which are file poisoning and Sybil attack. 2.3.1 File Poisoning File poisoning attacks operate on the data plane and have become extremely commonplace in P2P networks. The purpose of this attack is to replace a file in the network by a fake one and this file will be corrupted and no longer in use. 2.3.2 Sybil Attack The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Once the attacker gains the control, he can abuse the protocol in any way he likes. METHODOLOGY Figure 3 3. Gain Access Internal Server (Processing Orders) 3.1 Steal sensitive information from the database 3.1.1 Gain access by internet 3.1.2 Physical access to the server 3.1.3 Access server from workstation OR OR 3.1.1.1 Monitor network traffic 3.1.1.2 Use remote exploit 3.1 Steal sensitive information from the database Sometimes hackers are hired by the competitor to create chaos in the company network and to steal confidential information such as customer data, vendor data, pricing information, new product launch information from the computer systems. There are various methods to steal information from the database and there are as follows: 3.1.1 Gain Access By Internet Attack corporate network by using internet is becoming more sophisticated as technologies evolving. There is an increase of internet attacks orchestrate by the hackers to strike highly protected targets, to coordinate waves of scripted exploits and/or to conceal the true origin of an attack. 3.1.1 .1 Monitor Network Traffic Cyber criminal use network monitor tools to monitor the local area networks or wide area networks. Some of the network monitoring tools such as Microsoft Network Monitor, Ettercap, TCP Dump and DSniff can be download freely from the internet. This program can intercept and log the traffic passing over the network or part of the network. Once the information is captured by the program, hacker will decodes and analyse its content according to the appropriate RFC or other specifications. 3.1.1 .2 Use Remote Exploit The server is connected to the internet and the operating system is not updated the latest patches, then the cyber attacker will use remote exploit the vulnerability of the system to infiltrated the system to steal the information and sabotage the server by destroy the database and hard disk. Since the server backups are done fortnightly, management will be facing difficulties in recover the data. 3.1.2 Physical Access To The Server Due to the space constraint, sometime the server share space with someones cubicle or office. This creates an opportunity for an attacker who able to access files and other data by removes the hard disk, and then attaches it to another computer. He can also use third-party operating system CD to start the computer and steal corporate data or insert USB drive to inject virus into the system. 3.1.3 Access Server From Workstation Cyber attacker is not limited to hack into the server. Workstation is the often the first target the hacker will try to access because from there, he can learn about the network environment and security loopholes to attack the server. He will use the workstation as the stepping-stone to server-level break-in by stealing administrator passwords. METHODOLOGY Figure 4 4. Steal Password: Workstations 4.1 Users Login password 4.1.2 Obtain password illegally 4.1.1 Social Engineering 4.1.1.1 Share password 4.1.1.2 Phishing 4.1.2.2 Find written password 4.1.2.1 Steal password 4.1.2.1.2 Install keyboard sniffer 4.1.2.1.1 Obtain sniffer output file AND 4.1 Users Login Password Companies must know that hackers not only interested in the corporate data, they are also interested in the employees personal data such as bank account, credit card, email address and others. To break into the workstation, hackers will need to know the users login password. 4.1.1 Social Engineering Social engineering is the method of non technical hacking into the system by manipulating people through social interaction via email or phone to reveal their password. 4.1.1.1 Shared Password It is very common for employees to share computer password with their colleagues. Sometimes in their absence in the office, they will usually call one another to help them login to the computer to retrieve some information. 4.1.1.2 Phishing Hacker can create an email or instant messaging with attach fake website link which looks almost the same as the real one to lure the user enters their personal details such as username, password, credit card details and banking credential. All these information will be sending to the hacker. 4.1.2 Obtain Password Illegally Weak password makes hacker to obtain password illegally and faster. Cyber attackers will steal the password by infect the workstation with trojan. Basically there are three types of trojan attackers can use to steal the password namely: keyboard sniffer, login spoofing and password stealer. When attacker install the keyboard sniffer program which will monitor each keystroke the user has entered and this program generate the sniffer output file which send to the attacker. Sometimes hacker can pose as companys guest to access the premises. Upon entering the office, he will look for password which the employee written on a piece of paper and paste it around the working cubicle. CONCLUSION Companies are constantly at risk of losing sensitive corporate data. In this report,  we have use the attack tree model to analyse various attacks method the attackers use to steal sensitive information on the server, network attach storage device, router and workstations. The most common and easier method is to obtain the users password by learn the password, use widely common password, dictionary attack, shared password, phishing, find written password and steal passwords. Cyber attackers and novice hackers are usual like to steal the passwords by downloading keyboard loggers, passwords cracking software, keyboard sniffers and others which are available on the website to test on their skill. Management should implement counter measures to prevent hackers to attack their system and security breaches. We recommend antivirus program to be installed on  the workstation and server as they are utilising Microsoft Windows Malicious Software Removal Tool which is not enough for the prevention of the cyber attacks. Local group policy of the password needs to enforce on the networking devices, workstation and server so that the password is not being easily crack by the hackers. Lastly, passwords should be set minimum 8 characters and contain alphanumeric and symbols for complexity. In conclusion, steal password is the easiest method for hackers to attack the computer system because local authorities might face difficulties in tracking them down if they are distant hackers. GLOSSARY Attack tree Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes. (Source : http://www.schneier.com/paper-attacktrees-ddj-ft.html ) Social Engineering In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. (Source : http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html ) 3. Phishing Phishing is a technique of fraudulently obtaining private information. (Source : http://en.wikipedia.org/wiki/Social_engineering_(security)#Pretexting ) 4. Keyboard Sniffer A program which reads the keystrokes made by a user and transmits them to someone else. Such programs are usually used by intruders into computer systems in order to capture important information such as passwords. (Source : http://www.encyclopedia.com/doc/1O12-keyboardsniffer.html ) 5. RFC Short for Request for Comments, a series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard. Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number. (Source : http://www.webopedia.com/TERM/R/RFC.html )

Wednesday, November 13, 2019

Shakespeares Sonnet 19 :: essays research papers

Shakespeare's Sonnet 19 In his Sonnet 19, Shakespeare presents the timeless theme of Time's mutability. As the lover apostrophizes Time, one might expect him to address "old Time" as inconstant, for such an epithet implies time's changeability. But inconstant also suggests capricious, and the lover finds time more grave than whimsical in its alterations. With the epithet "devouring" he addresses a greedy, ravenous hunger, a Time that is wastefully destructive. Conceding to Time its wrongs, the lover at first appears to encourage Time to satisfy its insatiable appetite. Indeed, he familiarly addresses Time as "thou" as he commands it harshely to "blunt, n "make the earth devour, n "pLuck," and "burn." Not onLy are the verbs "blunt,n npluck," and "burn" linked by assonance, but also by their plosive initial consonants, so that the Lover's orders sound off Time's destructiveness as well. Each line offers a different image of Time at work: on the lion, the earth, the tiger, the phoenix-bird. Time is indiscriminate in its devouring. In the second quatrain, the lover grants to Time its own will: "And do whate'er thou wilt, swift-footed Time," acknowLedging priorly that in its fleet passage Time does "Make glad and sorry seasons. n For the first time one sees Time in other than a destructive capacity--in its cycLical change of seasons, some Time does "make glad" with blooming sweets. So the lover changes his epithet from devouring to swift-footed, certainly more neutral in tone. For now the lover makes his most assertive command: "But I forbid thee one most heinous crime. n The final quatrain finds the lover ordering Time to stay its antic "antique pen" from aging or marring his love. It is a heinous crime to carve and draw lines on youth and beauty. ere the Lover no Longer speaks with forceful pLosives; his speech, for all the appearance of imperative command, sounds more

Monday, November 11, 2019

The Short Cut Home

Peter and his friends were discussing the rumours about a street which is a shortcut from school to his house. They were talking about how the street is deserted, with only one house in the middle. When they were walking home from school the pace of Peter's steps increased as they went past it. Peter felt a shiver going down his spine. The street was pitch black as there were no streetlights. There were wooden planks boarding up the windows. The next day, Peter was going home from school. It was dark and he was walking alone as he had got an hour's detention after school for swearing at a teacher. He thought to himself that he should take the shortcut home as he was late. Suddenly he stopped. He thought about the things his friends had been talking about. â€Å"A murder happened here 2 days ago† Laura said. He was thinking should he go or not. â€Å"All that stuff is nonsense† he thought and stepped into the dark, pitched black street. At first it felt normal, but as he kept on going he saw a strange light flicker in the old, abandoned house. He jumped and stopped. Should he go back or keep walking? Peter deep in his thoughts went nearer to the house. He didn't know what he was thinking. As he reached nearer and nearer to the house, he felt his neck tingle. The window was high so Peter got a small box and placed in under the sill. He looked and peeped through a small hole in the plank. He could see out of the corner of his eye a man. A thin man, tall with a long overcoat on. He had a shiny kitchen knife. Peter suddenly saw a woman on the floor with tape masked over her mouth. Her hands and feet were tied. â€Å"BANG!† Peter fell off the box. The man heard the sound and ran to the front door. Peter swiftly went to the back of the house and hid behind a bush. The man shouted â€Å"Who's there?!† Peter, not knowing what he should do stayed deadly still. He felt the footsteps getting closer and closer. Thoughts were running through his mind. â€Å"Why did I come here? What should I do?† Run or stay? If he ran he might get caught but he might still get caught just staying there. The man kept getting closer and closer. Peter could hear his heart beating. Then the footsteps suddenly stopped. Peter was sure he was still there but at the same time he was sure that he had gone. He peeped over bush. The man was walking back, checking the grounds as he was going. Peter desperate to get out of there ran as fast as he could. The man stealthily shifted round and saw a glimpse of Peter's face. He ran after Peter. Peter was running as fast as he could, trying to catch his breath. The man reached out and he was about two-three centimetres away from him. He grabbed Peter. He was scared to death and he burst into tears. The man took Peter quickly into his house. As Peter entered he could see his own breath. It was cold. Peter felt like he was entering a freezer. He saw the woman lying on the floor. Her mouth masked and her hands and feet tied together. There were knives on the floor next to the woman. Peter jumped and screamed. The man put his hand over Peter's mouth and commanded him to â€Å"Shut up or you'll get the same thing as the woman.† Peter slowly calmed down and got his breath back. Thoughts were running through his mind. Should he go for the door? What did he mean by saying â€Å"the same thing as the woman?† Was he going to let him go? Maybe it was just a plan to shut him up. â€Å"Look, this is the important thing. You've got to promise me something† explained the man. Peter nodded his head. â€Å"If I let you go, you've got to promise not to tell a soul about what you saw in this house. Even if you mention one tiny bit then I'm coming after you.† Peter nodded in fear. â€Å"I'll be onto you faster than a dog on a cat. Don't underestimate me lad. If you cross me then you've had it. Understood?† shouted the man. Peter let out a low grunt. The man led Peter to the door and let him go. He ran as fast as he could until the dark, pitched black street disappeared and he reached the gentle, warm glow of the streetlights. When Peter got home he went upstairs and quickly got into his bed. Peter woke up the next day feeling much better. He went to school with a big bright smile on his face looking like nothing happened to him. As he reached school he decided that he should tell his mates what happened as he thought the man doesn't even know where he lives so how can he do anything to him? His mates didn't believe him at first but eventually they did. Peter wasn't scared of the man anymore. That evening, when Peter reached home after school, his phone rang. He picked it up. â€Å"Hello†, Peter said. â€Å"You're dead†, barked a hard voice. Peter realised it was the man from the house. â€Å"I know where you live and I'm coming to get you!†

Saturday, November 9, 2019

Brutality of Ivory trade Essay

In 1989, CITIES (the Convention on International Trade in Endangered Species of Wild Fauna and Flora) approved a worldwide ban on ivory trade due to extensive poaching reducing the African elephant population by more than half. However, levels of poaching and illegal trade are getting out of control once again. Since 1997, certain countries such as Botswana and Zimbabwe have tried to weaken the ban by allowing the sale of thousands of kilograms of ivory to China and Japan. It was not until 2012 that CITIES recognized that elephant poaching had reached unsustainable levels (Elephants and the ivory trade, 1). The illegal trade of ivory is pushing elephant poaching to the point where elephants are vulnerable to extinction. This terrible, wasteful act of poaching will put many species, as well as our own, at risk and harm the economy unless we take immediate action. What would happen if elephants became extinct? Elephants play a very important role in maintaining sustainable habitats for many other species (African elephant, 2). There are certain elephant-dependent tree species in Congo, Africa that have declined in growth population after more than 98% of the forest elephants have been killed by poachers. Forest elephants help these trees by spreading their seeds when they roam, and germinate them with their stomach acids. This dual relationship allows fruit trees with no other dispersal partners to ensure reproduction (Platt, 2). Depletion in these trees will have long-term ecological effects as the loss of one species directly impacts the whole balance of the food web (Bove, 2). If elephants became extinct, the elephant-dependent tree species would no longer continue to grow, causing  the herbivores that rely on these trees for food to essentially starve as well as the carnivores that eat these herbivores, eventually affecting all local people who rely on these organisms for food and me dicine. Can elephants be protected in order to save the economy? The demand for ivory is very high. Because of this, the price of ivory has risen causing the amount of poaching to rise as well. It has gotten to the point that the tusks of a single adult elephant can be worth more than 10 times the average annual income in many African countries (Rosen, 1). This is unsustainable for the economy because if we assume that these poachers hunt elephants into extinction, they will no longer have means of making money once the elephants are gone (Planet earth, video). However, if the conservation of elephants were to put money in people’s pockets, then poaching could be stopped. A way to do this would be by the means of tourism; tourists mostly go to Africa to see wildlife, and wherever there are elephants, tourists will go. Tourism brings a lot of money into the economy, and with more money coming from tourism, poaching will become less appealing to those who need money (Johnson, 3). What needs to be done to stop elephant poaching? Because demands for ivory are so high, measures need to be taken immediately to avert the extinction of African elephants. The only solution to truly protect elephants is to reinstate a total, permanent ban on all ivory sales (Sterling, 1). Other measures that also need to be taken include the application of strong law enforcement on international levels to ensure punishment, and the closing down of national ivory markets (Elephants and the ivory trade, 1). What is being done now to try and stop elephant poaching? Many elephants are being protected from poachers within national parks to ensure their continuity and survival. Organizations, such as the World Wild Life Fund, try and protect habitats by having anti-poaching patrols surveying areas within elephant ranges (African elephant, 9). There are many African countries that recognize the threat to their elephant populations and want to protect them (Sterling, 2). Among these countries, Kenya plays a  major role in trying to convince CITIES to reject any proposals from Tanzania and Zambia to allow them to sell ivory (Elephant voices blog, 7). However, most African countries do not have the power to stop these crimes from being committed without the help of European countries (Sterling, 2). IFAW (the International Fund for Animal Welfare) is urging the European Union to support these countries that are requesting assistance to stop poaching since they have the power to ensure that a ban on all ivory is reinstated (Sterling, 2). What could be used instead of ivory? Poaching is extremely wasteful. When an elephant is killed, the poachers usually leave it there to rot. Often times, poachers will lay new snares without checking old ones and elephants caught in the old ones are also left to rot. This has lead to many animals, including humans that rely on elephants for food to starve (Poaching in Zimbabwe, 1). Ivory is mainly used in the manufacture of piano and organ keys, and minor objects of decorative value because of its durability (Uses of ivory, 1). Ivory is not a necessity; there are alternatives to the products that we manufacture that don’t require the use of tusks. A good example of this is Ivorite, made from casein (milk protein) and an inorganic hardening compound, which has both the quality and durability of ivory (Rosen, 2). Products like this always have flaws, but there is always room for improvement. In this case, RPIvory, which is an unusual polymer, was created to improve Ivorite, which made the keys less slippery for pia nists (Rosen, 2). Science and technology have improved so much that there is absolutely no more need to keep removing tusks in order to manufacture minor objects that are not essential to humans. Elephant poaching is unsustainable in the sense that it harms other habitats by disrupting their sustainability; it is extremely wasteful because of the fact that only the tusks are being used, and it ruins the African economy. At the rate we’re going today, elephants will become extinct causing many species, as well as our own, to suffer because of our greed. The African economy is so bad that people would risk their own lives to kill an elephant in order to get paid by a supplier, who will then sell it for ten times as much. There are many things that countries and organizations are doing to help elephants, but there are still many things that need to be done. Ivory is not a necessity; there are other materials  that have been created to be similar to ivory that do not require the tusks of an elephant. Nobody in the world needs an elephant tusk but an elephant. If everyone did little things, such as signing a petition to refuse to buy items made from ivory or funding elephant protection, we would still be able to meet our human needs without destroying the sustainability of the environment. Our greedy and selfish acts are making a species vulnerable to extinction; Gandhi stated, â€Å"Earth provides enough to satisfy every man’s needs, but not every man’s greed.† (Good reads, 1). Works cited â€Å"African Elephant.† WorldWildlife.org. World Wildlife Fund, n.d. Web. 29 Mar. 2014. . Bove, Jennifer. â€Å"Why does it Matter if Species go Extinct?.† About.com Endangered Species. N.p., n.d. Web. 28 Mar. 2014. . â€Å"â€Å"Earth provides enough to satisfy every man’s needs, but not every man’s greed.†.† Goodreads. N.p., n.d. Web. 31 Mar. 2014. . Kimani, Eddy. â€Å"EDDY KIMANI.† EDDY KIMANI. N.p., n.d. Web. 31 Mar. 2014. . â€Å"ELEPHANTS AND THE IVORY TRADE.†The Ivory Trade. N.p., n.d. Web. 25 Mar. 2014. . â€Å"ElephantVoices Blog.† ElephantVoices Blog. N.p., n.d. Web. 25 Mar. 2014. . Gilford, Gwynn. â€Å"wildsingapore news: 90 dead elephants in Zimbabwe are proof that the ivory trade has gone industrial.†wildsingapore news: 90 dead elephants in Zimbabwe are proof that the ivory trade has gone industrial. N.p., n.d. Web. 31 Mar. 2014. . Johnson, Glen. â€Å"Kenyan poachers make a killing in ivory.† – Features. N.p., n.d. Web. 30 Mar. 2014. . â€Å"Kenya hunts for armed elephant-poachers.† – Africa. N.p., n.d. Web. 31 Mar. 2014.

Wednesday, November 6, 2019

Calculate Cross-Price Elasticity of Demand (Calculus)

Calculate Cross-Price Elasticity of Demand (Calculus) Suppose youre given the following question: Demand is Q 3000 - 4P 5ln(P), where P is the price for good Q, and P is the price of the competitors good. What is the cross-price elasticity of demand when our price is $5 and our competitor is charging $10? We saw that we can calculate any elasticity by the formula: Elasticity of Z with respect to Y (dZ / dY)*(Y/Z) In the case of cross-price elasticity of demand, we are interested in the elasticity of quantity demand with respect to the other firms price P. Thus we can use the following equation: Cross-price elasticity of demand (dQ / dP)*(P/Q) In order to use this equation, we must have quantity alone on the left-hand side, and the right-hand side be some function of the other firms price. That is the case in our demand equation of Q 3000 - 4P 5ln(P). Thus we differentiate with respect to P and get: dQ/dP 5/P So we substitute dQ/dP 5/P and Q 3000 - 4P 5ln(P) into our cross-price elasticity of demand equation: Cross-price elasticity of demand (dQ / dP)*(P/Q)Cross-price elasticity of demand (5/P)*(P/(3000 -4P 5ln(P))) Were interested in finding what the cross-price elasticity of demand is at P 5 and P 10, so we substitute these into our cross-price elasticity of demand equation: Cross-price elasticity of demand (5/P)*(P/(3000 -4P 5ln(P)))Cross-price elasticity of demand (5/10)*(5/(3000 - 20 5ln(10)))Cross-price elasticity of demand 0.5 * (5 / 3000 - 20 11.51)Cross-price elasticity of demand: 0.5 * (5 / 2991.51)Cross-price elasticity of demand: 0.5 * 0.00167Cross-price elasticity of demand: 0.5 * 0.000835 Thus our cross-price elasticity of demand is 0.000835. Since it is greater than 0, we say that goods are substitutes. Other Price Elasticity Equations Using Calculus To Calculate Price Elasticity of DemandUsing Calculus To Calculate Income Elasticity of DemandUsing Calculus To Calculate Price Elasticity of Supply

Monday, November 4, 2019

Premium-price Milk in the Company Coca-Cola Essay - 5

Premium-price Milk in the Company Coca-Cola - Essay Example In the dairy case, the milk is also free of lactose, and it will be sold while cold. The production line aims at offering the milk in various versions such as whole milk, fat-free, chocolate, and reduced fat versions. The decision of producing this product came up when the Coca-Cola Company realized that the sales of carbonated drinks continued to decline in the United States. The first issue it aimed to address is the decline in sales of its original product. Another issue is aimed at addressing is the fact that it is produced at a time when most of the consumers are obsessed with all products protein. According to research by NPD Group research firm, approximately 71% of the consumers say that they want more of the proteins in their diet. 3) Analyze some of the key (macro and/or micro) ENVIRONMENTAL FACTORS that resulted in Coca-Cola launching this new product. Note: for this, you will need to read the chapter that deals with the marketing environment. Steve Jones, who is the CEO of Fairlife, made a strong argument when he insisted that though Coca-Cola plays the part of distributing the milk, it does not take any role in the actual production of the milk and that it has nothing to be involved with what occurs on the dairy farms. He adds that people who have been referring to it as Coke Milk should not since it is actually not. The sole job of Coke, according to him, is the distribution of the milk and making sure that the milk is on the shelf. The market analysis and condition for the Coca-Cola’s Fairlife product seem to be somehow favoring while to some extent it is not so much on their side. The opportunity for the company after coming up with this product is that they have very limited competition since this is an uncharted sector. Again, having a good brand name globally, Coke expects to sell its milk product all over the world that  will, in turn, favor the growth.

Saturday, November 2, 2019

Rights and Obligations Research Paper Example | Topics and Well Written Essays - 750 words

Rights and Obligations - Research Paper Example This is going to be done by analyzing a case study. There exists a difference between a contract and an agreement because they both have different ramifications for the parties involved. An agreement has the option of being legally binding, or it can be informal. An agreement becomes a contract when the parties involved conceptualize their agreement into a binding relationship. An agreement becomes a contract when it is made with a lawful consideration for a lawful entity. For an object to qualify to be included in a contract, it must not be forbidden by law or defeat the purpose of any laid down law. A contract should not be fraudulent in intent or imply injury and damage to a person or property of other individuals. A contract should not contravene societal morals either that can be deemed by a court of law as being opposed to public policy and interests (Miller, 2012). A contract should be agreed on based on free will and consent, and should not be realized through coercion. It sh ould not be accomplished through undue influence, misrepresentation or a mistake either. If a contract does not meet the aforementioned qualities, then it is null and void in the eyes of the law, and it cannot be enforced by law. Contracts have elements that define and validate their viability under the law, which makes them enforceable under the law. These main elements should be in a contract, or it would be invalid. The first element that constitutes a contract is an offer, agreement or a promise, which is the basis around which a contract is constructed. Without an offer, a contract cannot be actualized because it is the initial step that necessitates the drawing up of a contract (Helewitz, 2010). An offer in a contract should be between two or more individuals with one party making the offer and the other considering the same. The offer stipulates that there should be the fulfillment of duties and obligations by both parties for the offer to be constituted in a legally valid co ntract. There exists a difference between an offer in a contract and an advertisement. In an advertisement, the obligations and duties are fulfilled first before a contract is constructed. In an advertisement, one of the parties has no part to play in the setting up of terms and conditions required to fulfill the contractual obligations. Acceptance is an element that should be featured in a contract for it to be legally binding. Contractual acceptance is characterized by a party in the contract agreeing to the terms and conditions of the offer. A contract is not formalized until the party being proposed accepts the offer, and a contract is not legally binding if the requirements of an offer are under negotiation. Consideration in a contract is a vital element, and it means that the parties would be giving something back in return for the proposed offer. It is mostly characterized by a payment as consideration for the offer (Goldman & Sigismond, 2010). The parties involved in a contr act should make it clear to each other that the terms and conditions under which they are both entering into agreement are legally binding. This is an element in contracts that should be emphasized because it helps make the parties involved avoid the consequences of breach of contract. Certainty of the terms and conditions of a contract must be clearly stated and understandable to all parties. Lack of certainty of the regulations