Friday, November 29, 2019

An Astrologers Day, Dusk and The Umbrella Man Essays

An Astrologers Day, Dusk and The Umbrella Man Essays An Astrologers Day, Dusk and The Umbrella Man Essay An Astrologers Day, Dusk and The Umbrella Man Essay An Astrologers Day by R.K Narayan Dusk by H.H Munro (Saki) The Umbrella Man by Roald Dahl In many ways, An Astrologers Day, is a thriller and is filled with an uncanny suspense which is revealed only at the end. And yet, like all his other stories, here R.K Narayan deals with the life of an ordinary Indian man whose life, when touched by Fate, had altered dramatically. The suspense which is cleverly maintained till the haunting end ensures that the reader will keep turning the pages, and when the end does arrive there is not just a sense of relief alone but also a sense of simple astonishment that is breathtaking. Indeed, this is a fine suspense story. The story of Dusk begins on a very pessimistic note as the author, H.H Munro describes all the defeated people of the world who come out of their homes in the dusk time so that they do not have to meet successful people. However, the rest of the story has little to do with this pessimism and we are drawn into the brilliant plan of a confidence trickster who was out to make money on some gullible victim. The end of the story is bound to make the reader laugh and wonder at the wit and creativity of a master storyteller. The Umbrella Man by Roald Dahl, is about a confidence trickster, but unlike the other stories this is told from a childs perspective which adds to the humor and charm of this narration. A mother and her little daughter are tricked into buying an expensive umbrella for a throwaway price; but they soon realize that not only the seller is a genuine seller but has a strange reason for selling the umbrella, and that they have been shortchanged in spite of buying the umbrella dirt cheap. There is an element of suspense in all three stories which keeps the readers on pins and needles till the very end. R.K Narayan kicks off the story by subtly narrating the life of the lower class Indian i.e the astrologer and the surroundings in which he works. The narrator does not re

Monday, November 25, 2019

Blue-Ringed Octopus Facts

Blue-Ringed Octopus Facts The blue-ringed octopus is an extremely venomous animal known for the bright, iridescent blue rings it displays when threatened. The small octopuses are common in tropical and subtropical coral reefs and tide pools of the Pacific and Indian Ocean, ranging from southern Japan to Australia. Although the blue-ringed octopus bite contains the powerful neurotoxin tetrodotoxin, the animal is docile and unlikely to bite unless handled. Blue-ringed octopuses belong to the genus Hapalochlaena, which includes four species: H. lunulata, H. fasciata, H. maculosa, and H. nierstrazi. Fast Facts: Blue-Ringed Octopus Common Name: Blue-ringed octopusScientific Name: Hapalochlaena sp.Distinguishing Features: Small octopus with yellowish skin that flashes bright blue rings when threatened.Size: 12 to 20 cm (5 to 8 in)Diet: Small crabs and shrimpAverage Lifespan: 1 to 2 yearsHabitat: Shallow warm coastal waters of the Indian and Pacific OceansConservation Status: Not evaluated; common within its rangeKingdom: AnimaliaPhylum: MolluscaClass: CephalopodaOrder: OctopodaFun Fact: The blue-ringed octopus is immune to its own venom. Physical Characteristics When not threatened, the blue-ringed octopus rings may be brown or invisible. Brook Peterson/Stocktrek Images / Getty Images Like other octopuses, the blue-ringed octopus has a sac-like body and eight tentacles. Ordinarily, a blue-ringed octopus is tan-colored and blends in with its surroundings. The iridescent blue rings only appear when the animal is disturbed or threatened. In addition to up to 25 rings, this type of octopus also has a blue line running through its eyes. Adults range in size from 12 to 20 cm (5 to 8 in) and weigh from 10 to 100 grams. Females are slightly larger than males, but the size of any octopus varies greatly depending on nutrition, temperature, and available light. Prey and Feeding The blue-ringed octopus hunts small crabs and shrimp during the day, but it will eat bivalves and small fish if it can catch them. The octopus pounces upon its prey, using its tentacles to pull its catch toward its mouth. Then, its beak pierces the crustaceans exoskeleton and delivers the paralyzing venom. The venom is produced by bacteria in octopus saliva. It contains tetrodotoxin, histamine, taurine, octopamine, acetylcholine, and dopamine. Once the prey is immobilized, the octopus uses its beak to tear off chunks of the animal to eat. The saliva also contains enzymes that partially digest flesh, so that the octopus can suck it out of the shell. The blue-ringed octopus is immune to its own venom. Venom and Bite Treatment Encounters with this reclusive creature are rare, but people have been bitten after handling accidentally stepping on a blue-ringed octopus. A bite leaves a tiny mark and may be painless, so its possible to be unaware of danger until respiratory distress and paralysis occur. Other symptoms include nausea, blindness, and heart failure, but death (if it occurs) usually results from paralysis of the diaphragm. There is no antivenom for a blue-octopus bite, but tetradotoxin is metabolized and excreted within a few hours. First aid treatment consists of applying pressure to the wound to slow the effects of the venom and artificial respiration once the victim stops breathing, which usually occurs within minutes of the bite. If artificial respiration is started immediately and continued until the toxin wears off, most victims recover. Behavior Hal Beral / Getty Images During the day, the octopus crawls through coral and across the shallow sea floor, seeking to ambush prey. It swims by expelling water through its siphon in a type of jet propulsion. While juvenile blue-ringed octopuses can produce ink, they lose this defensive ability as they mature. The aposematic warning display deters most predators, but the octopus piles up rocks to block the entrance to its lair as a safeguard. Blue-ringed octopuses are not aggressive. Reproduction Blue-ringed octopuses reach sexual maturity when they are less than a year old. A mature male will pounce on any other mature octopus of its own species, whether its male or female. The male holds the other octopus mantle and tries to insert a modified arm called a hectocotylus into the female mantle cavity. If the male is successful, he releases spermatophores into the female. If the other octopus is a male or a female that already has sufficient sperm packets, the mounting octopus typically withdraws without a struggle. In her lifetime, the female lays a single clutch of about 50 eggs. Eggs are laid in autumn, shortly after mating, and incubated under the females arms for around six months. Females dont eat while incubating eggs. When the eggs hatch, the juvenile octopuses sink to the sea floor to seek prey, while the female dies. The blue-ringed octopus lives one to two years. Conservation Status None of the species of blue-ringed octopus have been evaluated with respect to conservation status. They are not listed on the IUCN Red List, nor are they protected. Generally, people dont eat these octopuses, but some are captured for the pet trade. Sources Cheng, M.W.; Caldwell, R.L. (2000). Sex identification and mating in the blue-ringed octopus,  Hapalochlaena lunulata.  Anim Behav.  60  (1): 27–33.  Lippmann, John and Bugg, Stan, DAN S.E. Asia-Pacific Diving First Aid Manual, J.L. Publications, Australia, May 2004. ISBN 0-646-23183-9Mthger, L.M.; Bell, G.R.; Kuzirian, A.M.; Allen, J.J. Hanlon, R.T. (2012). How does the blue-ringed octopus (Hapalochlaena lunulata) flash its blue rings?. Journal of Experimental Biology. 215 (21): 3752–3757. doi:10.1242/jeb.076869Robson, G. C. (1929). Notes on the Cephalopoda. - VIII. The genera and subgenera of Octopodinae and Bathypolypodinae. Annals and Magazine of Natural History: Series 10. 3 (18): 607–608. doi:10.1080/00222932908673017Sheumack D.D., Howden M.E., Spence I., Quinn R.J. (1978). Maculotoxin: a neurotoxin from the venom glands of the octopus Hapalochlaena maculosa identified as tetrodotoxin. Science. 199 (4325): 188–9. doi:10.1126/science.619451

Friday, November 22, 2019

The Grand Chessboard Assignment Example | Topics and Well Written Essays - 2000 words

The Grand Chessboard - Assignment Example In the Introduction of â€Å"The Grand Chessboard† by Zbignew Brzezinski, he shows how Eurasia, a combination of Europe and Asia, basically held the world power through politics, based on geographical and economic values. This was true even as the Americas began colonization and ultimately, the industrial revolution that brought the United States in line with other world powers. In the twentieth century, and through several world wars, the development of technology, economy and trade, has rapidly pushed the United States forward as a world political arbitrator in the complex relationships between the countries that make up the Eurasian conglomerate. In World War II, when essentially the United States was invaded on its own shores for the first time by a foreign power, the United States stepped away from its previously held stance of isolationism and idealism, and joined the global conflict to protect its own interests. In doing so, the United States became a global power to be contended with on a serious level. It can be safely said that without the introduction of the United States to the Allied powers group in the war, the outcome would have been very different. Europe and Britain would be under the dominance of Hitler’s Germany, and Asia, under the influence of Japan, albeit a rather limited one (Brzezinski,5). From the end of World War II, war was fought on an ideological level between Communist Russia, China and the Western powers of Europe and the United States as part of the â€Å"Cold War.† ... For 300 years, the Roman Empire ruled the region on its highest level, maintaining internal vitality and unity as part of its successful dominance. What finally broke the Roman Empire was the division of governing different areas in the Empire rather than keeping control centralized in one spot, the disintegration of morals and ideology, and a sustained inflation which required sacrifices the people no longer wanted to make. At the time of writing this book, Brzezinski viewed America as ‘standing supreme in the four decisive domains of global power,’ those being economic, militarily, technologically, and finally, culturally. Today, there is less supremacy, mainly because of the economic situation, even though the effects are worldwide, not just in the United States. The economic situation today almost forces America to show military might in areas of the world where changes in a foreign country could severely affect the American economics. Many wars in our present time a re more about economics rather than a political ideology, although they are somewhat tied hand in hand. What is unique about America is its influence in creating dialogue with other nations in an effort to promote a universe of international communication and peaceful interaction to avoid unnecessary potential conflicts (Brzezinski, 28). That’s not to say that other countries are not doing this too, but it seems the United States is in the middle of everything major concerning world events and their potential resulting effects. As Brzezinski notes, to support this claim, America’s supremacy has helped institute NATO, a collective international security group with an integrated command that represents the world at large;

Wednesday, November 20, 2019

Environment of business (globalisation) Essay Example | Topics and Well Written Essays - 2500 words

Environment of business (globalisation) - Essay Example The admission of the overseas traders in to the less developed economies is an advantage, though it presents a number of troubles. The two main drivers towards this recent increase in globalization have been opinionated as well as industrial aspects. They have led to the flourishing of trade between countries globally. â€Å"Beginning from 1950s, globalization of industries increased at a high rate† (Griffiths and Wall, 2007 p. 37). This essay gives a critical analysis of two of the main drivers of this wave, which are political forces and technological aspects. The driving force towards adopting the various forms of globalization and the consequences of these options as well as the benefits and disadvantages of globalization have been discussed. Several examples of globalization have been highlighted. In the early 1950s, leaders especially from the developed economies needed to build up scheme of making certain that a war of such intensity could never recur. This had to be realized through removal of the barriers that formed impediments to trade in order to boost success and increase interdependence amongst nations globally. Mainly the powerful were involved in developing frameworks for international trade and investment through agreements. They established key global institutions. According to (Barry 2008 p. 91), â€Å"These political powers promoted international treaties that were aimed at upholding international trade through tariff reductions and encouragement of free trade amongst its members. Barry (2008 p. 91) further states that, â€Å"By 1994, its membership included more than 100 member states†. Through it, there was a major reduction in the restrictions that hampered trade before it was established. Such restrictions included a minimum quantity of what was to be traded. Held and Mcgrew, (2000 p.18) observe that â€Å"GATT membership kept on rising, and in 1995, it was transformed in to World Trade Organization†. This was transformation was a step taken

Monday, November 18, 2019

Letter from Hagar Essay Example | Topics and Well Written Essays - 500 words

Letter from Hagar - Essay Example â€Å"Pride was my wilderness, and the demon that led me there was fear. I was alone, never anything else, and never free, for I carries my chains within me, and they spread out from me and shackled all I touched†(page 292). My dear child, you are young and the fountain of youth flows upon you. Waste it not your youth on matters that will chain your heart and soul. You must know that I loved your grandfather dearly though I never really found the right way to show him how much. I could not at that time for I believed that I must maintain restraint and never allow my feelings flow as freely as a cascading waterfall. I exhort you not commit the same mistakes I did. I could have shown your grandfather the ecstasies I felt when making love. â€Å"It was not long after we wed, when first I felt my blood and vitals rise to meet his. He never knew. I never spoke aloud, and I made certain the trembling was all inner†¦ I prided myself on keeping my pride intact, like some mainden hood† (page 81). Alas, I was wrong. I could have soared to the skies and explode that a super nova in the skies and then come down from heaven to dance with the daffodils but I was too proud to do such things. I made myself believe that pride is more important than showing warmth and accepting the same like an all consuming fire that runs through your veins searing you blood until you scream not in agony but in ecstasy. Now, as I look back into the empty years where I held my feeling locked and sealed inside me, tears come welling up and spilling down my weathered cheeks unbidden. I strived to hide them but could not. I could have given more but did not. I could not bring myself to show much love and say the right word a t the right time. Like a stone angel made of hard marble, I am doubly blind. But then again, would they have reacted differently had I said and done things differently? Would they? I think not. So it is perfectly all right. Child, I want you

Saturday, November 16, 2019

Attack Tree Model Analysis of Security Breaches

Attack Tree Model Analysis of Security Breaches THE SUCCESS MISUSES of computer systems security breaches increased slightly in 2005, according to the FBI and the Computer Security Institute (CSI). Many security issues that apply to large enterprises definitely apply to SMBs, especially as SMBs become more technologically sophisticated, according to Andrew Kellett, senior research analyst with U.K.-based Butler Group. You dont have to be a particular large organization to have some pretty complex supporting systems in place, he says. (Fred Sandsmark, p11) The above-mentioned stated that there was slightly increase in computers attack in 2005. As technology evolving, companies willingly to spend more money on computer systems to do business activities with their associate and partners. This will increase more and more security breaches on the computer systems. The purpose of this analysis report is to examine the various possible attack methods to compromise the availability of the computers, information and associated resources of a small firm. Research for this report includes an attack tree diagram, showing how the hacker can compromise the availability of the systems services, associated resources and to access sensitive information through different attack techniques. Each technique is the subset of the different type of attack methods, with possible assumptions attach to each methods, the attack tree will be discussed in greater details. INTRODUCTION The manager of the Raylee Pte Ltd has recently heard through the media and newspaper publications that there are numerous threats which could compromise the availability of the computers, information and associated resources. Management of Raylee Pte Ltd has decided to hire the security consultant firm Red Alert Security Pte Ltd to undertake a details analysis of its current computer and network state in order to prevent the hackers to compromise the availability of the computers services, information and resources. The under-mentions are the network and desktop environments of the Raylee Pte Ltd. There are six computers and one internal server (for processing orders) within the firm. Each computer encompasses Microsoft Windows 7 and Microsoft 2007 Each workstation has been patched with all updates as of March 25th, 2010. The company shares an ADSL 2+ connection amongst all computers. Server backups are done fortnightly and stored on a DVD spindle name backup1 Workstation backups are done bi-monthly and stored on a DVD spindle name backup2 Employees have email addresses provided by the Internet Service Provider. Documents are shared amongst employees through a D-Link DNS-323 NAS The router is utilising a default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. SCOPE Security consultant of Red Alert Security Pte Ltd will analyse of the company current computer system, network state and desktop environment in order to prevent the hackers to compromise the availability of the computers services, information and resources. Then the consultant will submit a detail analysis report to the Management of Raylee Pte Ltd for recommendations METHODOGLY The security consultant uses a technique known as attack tree to identify the best possible options to compromise the availability of the system services, information and resource in the quickest time. Below is the attack tree he comes up with. Compromise The Availability Of Computers, Information And Associated Resources 1. Remote Access Router: D-Link DSL G604t 2. Access NAS: D-Link DNS-323 3. 3. Gain Access Internal Server (Processing Orders) Orders) 4. Steal Password: Workstations METHODOLOGY From the attack tree in the previous page, each of the sub attack tree will be discussed in more detail. Figure 1 1. Remote Access Router : D-Link DSL G604t 1.1 Determine the password 1.1.1 Learn password 1.1.2 Use widely know password 1.1.3 Dictionary attacks 1.1. Determine password Hacker and cyber criminal will try to determine the password of the router in order to access the network environment and do whatever they want. We will briefly explain the methods as follows 1.1.1 Learn password If the user has not set new password and is using the default which is normally blank. Hackers can easily search online for the manual of the particular wireless router and know the password. Hackers login the wireless router configuration page to change the setting and sabotage the network. For instance, hacker can surf this link http://www.routerpasswords.com/index.asp to get the default password for all the routers. 1.1.2 Use widely know password The common used passwords are admin, password, [emailprotected], 123456, 666666, qwerty, 00000000 and etc. These widely used passwords allow hackers to easily access the router. 1.1.3 Dictionary attacks As the word dictionary it implies that it is one of the attack techniques use by the hackers to determine its decryption key, password or passphrase by searching the all the words which are usually seven characters or lesser chosen by the user in the dictionary. METHODOLOGY Figure 2 2. Access NAS : D-Link DNS-323 2.1 FTP server 2.2 Folder File Permission 2.3 P2P distribution 2.1.1 Bounce Attack 2.1.2 Misconfigure 2.3.1 File poisoning 2.3.2 Sybil attack 2.1 FTP server Most of the Network Attach Storage device comes with the feature of the FTP server which allows user to download or upload file remotely anywhere. However, this service creates a loophole for attacker to retrieve sensitive information and data. The various attack methods on FTP server are discussed as follows 2.1.1 Bounce Attack FTP bounce attack is another attacking technique use by the hacker to exploit the ftp protocol so that he can use the PORT command to send request access to the ftp port indirectly to another victim machine which acts as third party for such request to access the ftp. 2.1.2 Misconfigure One of the common problems is to misconfigure the ftp server which allows users to download and upload the files in the same directory (global/tmp directory) for people to share data with each other. It will create an opportunity for attacker or theft to steal the data or upload virus program to the directory. Hence employee will accidentally install the virus program and infect to the computer systems and network. 2.2 Folder File Permission Proper folder and file permission must be set according to the employee roles and responsibilities. If there is no permission setting on the files and folder and gives everyone permission to read, write and execute it. Then it will be easily for attacker to retrieve information upon hacking into the company network. 2.3 P2P Distribution It is a peer-to-peer file transfer protocol to allow users each download different pieces of the broken file from the original uploader (seed). Users exchange the pieces with their peers to obtain the broken ones which are missing. IT savvy employees can make use of the P2P to download their favourite movies, videos, music and software. Hacker will make use of the P2P attacks to gain access into the network. There are two types of attacks which are file poisoning and Sybil attack. 2.3.1 File Poisoning File poisoning attacks operate on the data plane and have become extremely commonplace in P2P networks. The purpose of this attack is to replace a file in the network by a fake one and this file will be corrupted and no longer in use. 2.3.2 Sybil Attack The idea behind this attack is that a single malicious identity can present multiple identities, and thus gain control over part of the network. Once the attacker gains the control, he can abuse the protocol in any way he likes. METHODOLOGY Figure 3 3. Gain Access Internal Server (Processing Orders) 3.1 Steal sensitive information from the database 3.1.1 Gain access by internet 3.1.2 Physical access to the server 3.1.3 Access server from workstation OR OR 3.1.1.1 Monitor network traffic 3.1.1.2 Use remote exploit 3.1 Steal sensitive information from the database Sometimes hackers are hired by the competitor to create chaos in the company network and to steal confidential information such as customer data, vendor data, pricing information, new product launch information from the computer systems. There are various methods to steal information from the database and there are as follows: 3.1.1 Gain Access By Internet Attack corporate network by using internet is becoming more sophisticated as technologies evolving. There is an increase of internet attacks orchestrate by the hackers to strike highly protected targets, to coordinate waves of scripted exploits and/or to conceal the true origin of an attack. 3.1.1 .1 Monitor Network Traffic Cyber criminal use network monitor tools to monitor the local area networks or wide area networks. Some of the network monitoring tools such as Microsoft Network Monitor, Ettercap, TCP Dump and DSniff can be download freely from the internet. This program can intercept and log the traffic passing over the network or part of the network. Once the information is captured by the program, hacker will decodes and analyse its content according to the appropriate RFC or other specifications. 3.1.1 .2 Use Remote Exploit The server is connected to the internet and the operating system is not updated the latest patches, then the cyber attacker will use remote exploit the vulnerability of the system to infiltrated the system to steal the information and sabotage the server by destroy the database and hard disk. Since the server backups are done fortnightly, management will be facing difficulties in recover the data. 3.1.2 Physical Access To The Server Due to the space constraint, sometime the server share space with someones cubicle or office. This creates an opportunity for an attacker who able to access files and other data by removes the hard disk, and then attaches it to another computer. He can also use third-party operating system CD to start the computer and steal corporate data or insert USB drive to inject virus into the system. 3.1.3 Access Server From Workstation Cyber attacker is not limited to hack into the server. Workstation is the often the first target the hacker will try to access because from there, he can learn about the network environment and security loopholes to attack the server. He will use the workstation as the stepping-stone to server-level break-in by stealing administrator passwords. METHODOLOGY Figure 4 4. Steal Password: Workstations 4.1 Users Login password 4.1.2 Obtain password illegally 4.1.1 Social Engineering 4.1.1.1 Share password 4.1.1.2 Phishing 4.1.2.2 Find written password 4.1.2.1 Steal password 4.1.2.1.2 Install keyboard sniffer 4.1.2.1.1 Obtain sniffer output file AND 4.1 Users Login Password Companies must know that hackers not only interested in the corporate data, they are also interested in the employees personal data such as bank account, credit card, email address and others. To break into the workstation, hackers will need to know the users login password. 4.1.1 Social Engineering Social engineering is the method of non technical hacking into the system by manipulating people through social interaction via email or phone to reveal their password. 4.1.1.1 Shared Password It is very common for employees to share computer password with their colleagues. Sometimes in their absence in the office, they will usually call one another to help them login to the computer to retrieve some information. 4.1.1.2 Phishing Hacker can create an email or instant messaging with attach fake website link which looks almost the same as the real one to lure the user enters their personal details such as username, password, credit card details and banking credential. All these information will be sending to the hacker. 4.1.2 Obtain Password Illegally Weak password makes hacker to obtain password illegally and faster. Cyber attackers will steal the password by infect the workstation with trojan. Basically there are three types of trojan attackers can use to steal the password namely: keyboard sniffer, login spoofing and password stealer. When attacker install the keyboard sniffer program which will monitor each keystroke the user has entered and this program generate the sniffer output file which send to the attacker. Sometimes hacker can pose as companys guest to access the premises. Upon entering the office, he will look for password which the employee written on a piece of paper and paste it around the working cubicle. CONCLUSION Companies are constantly at risk of losing sensitive corporate data. In this report,  we have use the attack tree model to analyse various attacks method the attackers use to steal sensitive information on the server, network attach storage device, router and workstations. The most common and easier method is to obtain the users password by learn the password, use widely common password, dictionary attack, shared password, phishing, find written password and steal passwords. Cyber attackers and novice hackers are usual like to steal the passwords by downloading keyboard loggers, passwords cracking software, keyboard sniffers and others which are available on the website to test on their skill. Management should implement counter measures to prevent hackers to attack their system and security breaches. We recommend antivirus program to be installed on  the workstation and server as they are utilising Microsoft Windows Malicious Software Removal Tool which is not enough for the prevention of the cyber attacks. Local group policy of the password needs to enforce on the networking devices, workstation and server so that the password is not being easily crack by the hackers. Lastly, passwords should be set minimum 8 characters and contain alphanumeric and symbols for complexity. In conclusion, steal password is the easiest method for hackers to attack the computer system because local authorities might face difficulties in tracking them down if they are distant hackers. GLOSSARY Attack tree Attack trees provide a formal, methodical way of describing the security of systems, based on varying attacks. Basically, you represent attacks against a system in a tree structure, with the goal as the root node and different ways of achieving that goal as leaf nodes. (Source : http://www.schneier.com/paper-attacktrees-ddj-ft.html ) Social Engineering In computer security, social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. (Source : http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci531120,00.html ) 3. Phishing Phishing is a technique of fraudulently obtaining private information. (Source : http://en.wikipedia.org/wiki/Social_engineering_(security)#Pretexting ) 4. Keyboard Sniffer A program which reads the keystrokes made by a user and transmits them to someone else. Such programs are usually used by intruders into computer systems in order to capture important information such as passwords. (Source : http://www.encyclopedia.com/doc/1O12-keyboardsniffer.html ) 5. RFC Short for Request for Comments, a series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard. Each RFC is designated by an RFC number. Once published, an RFC never changes. Modifications to an original RFC are assigned a new RFC number. (Source : http://www.webopedia.com/TERM/R/RFC.html )

Wednesday, November 13, 2019

Shakespeares Sonnet 19 :: essays research papers

Shakespeare's Sonnet 19 In his Sonnet 19, Shakespeare presents the timeless theme of Time's mutability. As the lover apostrophizes Time, one might expect him to address "old Time" as inconstant, for such an epithet implies time's changeability. But inconstant also suggests capricious, and the lover finds time more grave than whimsical in its alterations. With the epithet "devouring" he addresses a greedy, ravenous hunger, a Time that is wastefully destructive. Conceding to Time its wrongs, the lover at first appears to encourage Time to satisfy its insatiable appetite. Indeed, he familiarly addresses Time as "thou" as he commands it harshely to "blunt, n "make the earth devour, n "pLuck," and "burn." Not onLy are the verbs "blunt,n npluck," and "burn" linked by assonance, but also by their plosive initial consonants, so that the Lover's orders sound off Time's destructiveness as well. Each line offers a different image of Time at work: on the lion, the earth, the tiger, the phoenix-bird. Time is indiscriminate in its devouring. In the second quatrain, the lover grants to Time its own will: "And do whate'er thou wilt, swift-footed Time," acknowLedging priorly that in its fleet passage Time does "Make glad and sorry seasons. n For the first time one sees Time in other than a destructive capacity--in its cycLical change of seasons, some Time does "make glad" with blooming sweets. So the lover changes his epithet from devouring to swift-footed, certainly more neutral in tone. For now the lover makes his most assertive command: "But I forbid thee one most heinous crime. n The final quatrain finds the lover ordering Time to stay its antic "antique pen" from aging or marring his love. It is a heinous crime to carve and draw lines on youth and beauty. ere the Lover no Longer speaks with forceful pLosives; his speech, for all the appearance of imperative command, sounds more

Monday, November 11, 2019

The Short Cut Home

Peter and his friends were discussing the rumours about a street which is a shortcut from school to his house. They were talking about how the street is deserted, with only one house in the middle. When they were walking home from school the pace of Peter's steps increased as they went past it. Peter felt a shiver going down his spine. The street was pitch black as there were no streetlights. There were wooden planks boarding up the windows. The next day, Peter was going home from school. It was dark and he was walking alone as he had got an hour's detention after school for swearing at a teacher. He thought to himself that he should take the shortcut home as he was late. Suddenly he stopped. He thought about the things his friends had been talking about. â€Å"A murder happened here 2 days ago† Laura said. He was thinking should he go or not. â€Å"All that stuff is nonsense† he thought and stepped into the dark, pitched black street. At first it felt normal, but as he kept on going he saw a strange light flicker in the old, abandoned house. He jumped and stopped. Should he go back or keep walking? Peter deep in his thoughts went nearer to the house. He didn't know what he was thinking. As he reached nearer and nearer to the house, he felt his neck tingle. The window was high so Peter got a small box and placed in under the sill. He looked and peeped through a small hole in the plank. He could see out of the corner of his eye a man. A thin man, tall with a long overcoat on. He had a shiny kitchen knife. Peter suddenly saw a woman on the floor with tape masked over her mouth. Her hands and feet were tied. â€Å"BANG!† Peter fell off the box. The man heard the sound and ran to the front door. Peter swiftly went to the back of the house and hid behind a bush. The man shouted â€Å"Who's there?!† Peter, not knowing what he should do stayed deadly still. He felt the footsteps getting closer and closer. Thoughts were running through his mind. â€Å"Why did I come here? What should I do?† Run or stay? If he ran he might get caught but he might still get caught just staying there. The man kept getting closer and closer. Peter could hear his heart beating. Then the footsteps suddenly stopped. Peter was sure he was still there but at the same time he was sure that he had gone. He peeped over bush. The man was walking back, checking the grounds as he was going. Peter desperate to get out of there ran as fast as he could. The man stealthily shifted round and saw a glimpse of Peter's face. He ran after Peter. Peter was running as fast as he could, trying to catch his breath. The man reached out and he was about two-three centimetres away from him. He grabbed Peter. He was scared to death and he burst into tears. The man took Peter quickly into his house. As Peter entered he could see his own breath. It was cold. Peter felt like he was entering a freezer. He saw the woman lying on the floor. Her mouth masked and her hands and feet tied together. There were knives on the floor next to the woman. Peter jumped and screamed. The man put his hand over Peter's mouth and commanded him to â€Å"Shut up or you'll get the same thing as the woman.† Peter slowly calmed down and got his breath back. Thoughts were running through his mind. Should he go for the door? What did he mean by saying â€Å"the same thing as the woman?† Was he going to let him go? Maybe it was just a plan to shut him up. â€Å"Look, this is the important thing. You've got to promise me something† explained the man. Peter nodded his head. â€Å"If I let you go, you've got to promise not to tell a soul about what you saw in this house. Even if you mention one tiny bit then I'm coming after you.† Peter nodded in fear. â€Å"I'll be onto you faster than a dog on a cat. Don't underestimate me lad. If you cross me then you've had it. Understood?† shouted the man. Peter let out a low grunt. The man led Peter to the door and let him go. He ran as fast as he could until the dark, pitched black street disappeared and he reached the gentle, warm glow of the streetlights. When Peter got home he went upstairs and quickly got into his bed. Peter woke up the next day feeling much better. He went to school with a big bright smile on his face looking like nothing happened to him. As he reached school he decided that he should tell his mates what happened as he thought the man doesn't even know where he lives so how can he do anything to him? His mates didn't believe him at first but eventually they did. Peter wasn't scared of the man anymore. That evening, when Peter reached home after school, his phone rang. He picked it up. â€Å"Hello†, Peter said. â€Å"You're dead†, barked a hard voice. Peter realised it was the man from the house. â€Å"I know where you live and I'm coming to get you!†

Saturday, November 9, 2019

Brutality of Ivory trade Essay

In 1989, CITIES (the Convention on International Trade in Endangered Species of Wild Fauna and Flora) approved a worldwide ban on ivory trade due to extensive poaching reducing the African elephant population by more than half. However, levels of poaching and illegal trade are getting out of control once again. Since 1997, certain countries such as Botswana and Zimbabwe have tried to weaken the ban by allowing the sale of thousands of kilograms of ivory to China and Japan. It was not until 2012 that CITIES recognized that elephant poaching had reached unsustainable levels (Elephants and the ivory trade, 1). The illegal trade of ivory is pushing elephant poaching to the point where elephants are vulnerable to extinction. This terrible, wasteful act of poaching will put many species, as well as our own, at risk and harm the economy unless we take immediate action. What would happen if elephants became extinct? Elephants play a very important role in maintaining sustainable habitats for many other species (African elephant, 2). There are certain elephant-dependent tree species in Congo, Africa that have declined in growth population after more than 98% of the forest elephants have been killed by poachers. Forest elephants help these trees by spreading their seeds when they roam, and germinate them with their stomach acids. This dual relationship allows fruit trees with no other dispersal partners to ensure reproduction (Platt, 2). Depletion in these trees will have long-term ecological effects as the loss of one species directly impacts the whole balance of the food web (Bove, 2). If elephants became extinct, the elephant-dependent tree species would no longer continue to grow, causing  the herbivores that rely on these trees for food to essentially starve as well as the carnivores that eat these herbivores, eventually affecting all local people who rely on these organisms for food and me dicine. Can elephants be protected in order to save the economy? The demand for ivory is very high. Because of this, the price of ivory has risen causing the amount of poaching to rise as well. It has gotten to the point that the tusks of a single adult elephant can be worth more than 10 times the average annual income in many African countries (Rosen, 1). This is unsustainable for the economy because if we assume that these poachers hunt elephants into extinction, they will no longer have means of making money once the elephants are gone (Planet earth, video). However, if the conservation of elephants were to put money in people’s pockets, then poaching could be stopped. A way to do this would be by the means of tourism; tourists mostly go to Africa to see wildlife, and wherever there are elephants, tourists will go. Tourism brings a lot of money into the economy, and with more money coming from tourism, poaching will become less appealing to those who need money (Johnson, 3). What needs to be done to stop elephant poaching? Because demands for ivory are so high, measures need to be taken immediately to avert the extinction of African elephants. The only solution to truly protect elephants is to reinstate a total, permanent ban on all ivory sales (Sterling, 1). Other measures that also need to be taken include the application of strong law enforcement on international levels to ensure punishment, and the closing down of national ivory markets (Elephants and the ivory trade, 1). What is being done now to try and stop elephant poaching? Many elephants are being protected from poachers within national parks to ensure their continuity and survival. Organizations, such as the World Wild Life Fund, try and protect habitats by having anti-poaching patrols surveying areas within elephant ranges (African elephant, 9). There are many African countries that recognize the threat to their elephant populations and want to protect them (Sterling, 2). Among these countries, Kenya plays a  major role in trying to convince CITIES to reject any proposals from Tanzania and Zambia to allow them to sell ivory (Elephant voices blog, 7). However, most African countries do not have the power to stop these crimes from being committed without the help of European countries (Sterling, 2). IFAW (the International Fund for Animal Welfare) is urging the European Union to support these countries that are requesting assistance to stop poaching since they have the power to ensure that a ban on all ivory is reinstated (Sterling, 2). What could be used instead of ivory? Poaching is extremely wasteful. When an elephant is killed, the poachers usually leave it there to rot. Often times, poachers will lay new snares without checking old ones and elephants caught in the old ones are also left to rot. This has lead to many animals, including humans that rely on elephants for food to starve (Poaching in Zimbabwe, 1). Ivory is mainly used in the manufacture of piano and organ keys, and minor objects of decorative value because of its durability (Uses of ivory, 1). Ivory is not a necessity; there are alternatives to the products that we manufacture that don’t require the use of tusks. A good example of this is Ivorite, made from casein (milk protein) and an inorganic hardening compound, which has both the quality and durability of ivory (Rosen, 2). Products like this always have flaws, but there is always room for improvement. In this case, RPIvory, which is an unusual polymer, was created to improve Ivorite, which made the keys less slippery for pia nists (Rosen, 2). Science and technology have improved so much that there is absolutely no more need to keep removing tusks in order to manufacture minor objects that are not essential to humans. Elephant poaching is unsustainable in the sense that it harms other habitats by disrupting their sustainability; it is extremely wasteful because of the fact that only the tusks are being used, and it ruins the African economy. At the rate we’re going today, elephants will become extinct causing many species, as well as our own, to suffer because of our greed. The African economy is so bad that people would risk their own lives to kill an elephant in order to get paid by a supplier, who will then sell it for ten times as much. There are many things that countries and organizations are doing to help elephants, but there are still many things that need to be done. Ivory is not a necessity; there are other materials  that have been created to be similar to ivory that do not require the tusks of an elephant. Nobody in the world needs an elephant tusk but an elephant. If everyone did little things, such as signing a petition to refuse to buy items made from ivory or funding elephant protection, we would still be able to meet our human needs without destroying the sustainability of the environment. Our greedy and selfish acts are making a species vulnerable to extinction; Gandhi stated, â€Å"Earth provides enough to satisfy every man’s needs, but not every man’s greed.† (Good reads, 1). Works cited â€Å"African Elephant.† WorldWildlife.org. World Wildlife Fund, n.d. Web. 29 Mar. 2014. . Bove, Jennifer. â€Å"Why does it Matter if Species go Extinct?.† About.com Endangered Species. N.p., n.d. Web. 28 Mar. 2014. . â€Å"â€Å"Earth provides enough to satisfy every man’s needs, but not every man’s greed.†.† Goodreads. N.p., n.d. Web. 31 Mar. 2014. . Kimani, Eddy. â€Å"EDDY KIMANI.† EDDY KIMANI. N.p., n.d. Web. 31 Mar. 2014. . â€Å"ELEPHANTS AND THE IVORY TRADE.†The Ivory Trade. N.p., n.d. Web. 25 Mar. 2014. . â€Å"ElephantVoices Blog.† ElephantVoices Blog. N.p., n.d. Web. 25 Mar. 2014. . Gilford, Gwynn. â€Å"wildsingapore news: 90 dead elephants in Zimbabwe are proof that the ivory trade has gone industrial.†wildsingapore news: 90 dead elephants in Zimbabwe are proof that the ivory trade has gone industrial. N.p., n.d. Web. 31 Mar. 2014. . Johnson, Glen. â€Å"Kenyan poachers make a killing in ivory.† – Features. N.p., n.d. Web. 30 Mar. 2014. . â€Å"Kenya hunts for armed elephant-poachers.† – Africa. N.p., n.d. Web. 31 Mar. 2014.

Wednesday, November 6, 2019

Calculate Cross-Price Elasticity of Demand (Calculus)

Calculate Cross-Price Elasticity of Demand (Calculus) Suppose youre given the following question: Demand is Q 3000 - 4P 5ln(P), where P is the price for good Q, and P is the price of the competitors good. What is the cross-price elasticity of demand when our price is $5 and our competitor is charging $10? We saw that we can calculate any elasticity by the formula: Elasticity of Z with respect to Y (dZ / dY)*(Y/Z) In the case of cross-price elasticity of demand, we are interested in the elasticity of quantity demand with respect to the other firms price P. Thus we can use the following equation: Cross-price elasticity of demand (dQ / dP)*(P/Q) In order to use this equation, we must have quantity alone on the left-hand side, and the right-hand side be some function of the other firms price. That is the case in our demand equation of Q 3000 - 4P 5ln(P). Thus we differentiate with respect to P and get: dQ/dP 5/P So we substitute dQ/dP 5/P and Q 3000 - 4P 5ln(P) into our cross-price elasticity of demand equation: Cross-price elasticity of demand (dQ / dP)*(P/Q)Cross-price elasticity of demand (5/P)*(P/(3000 -4P 5ln(P))) Were interested in finding what the cross-price elasticity of demand is at P 5 and P 10, so we substitute these into our cross-price elasticity of demand equation: Cross-price elasticity of demand (5/P)*(P/(3000 -4P 5ln(P)))Cross-price elasticity of demand (5/10)*(5/(3000 - 20 5ln(10)))Cross-price elasticity of demand 0.5 * (5 / 3000 - 20 11.51)Cross-price elasticity of demand: 0.5 * (5 / 2991.51)Cross-price elasticity of demand: 0.5 * 0.00167Cross-price elasticity of demand: 0.5 * 0.000835 Thus our cross-price elasticity of demand is 0.000835. Since it is greater than 0, we say that goods are substitutes. Other Price Elasticity Equations Using Calculus To Calculate Price Elasticity of DemandUsing Calculus To Calculate Income Elasticity of DemandUsing Calculus To Calculate Price Elasticity of Supply

Monday, November 4, 2019

Premium-price Milk in the Company Coca-Cola Essay - 5

Premium-price Milk in the Company Coca-Cola - Essay Example In the dairy case, the milk is also free of lactose, and it will be sold while cold. The production line aims at offering the milk in various versions such as whole milk, fat-free, chocolate, and reduced fat versions. The decision of producing this product came up when the Coca-Cola Company realized that the sales of carbonated drinks continued to decline in the United States. The first issue it aimed to address is the decline in sales of its original product. Another issue is aimed at addressing is the fact that it is produced at a time when most of the consumers are obsessed with all products protein. According to research by NPD Group research firm, approximately 71% of the consumers say that they want more of the proteins in their diet. 3) Analyze some of the key (macro and/or micro) ENVIRONMENTAL FACTORS that resulted in Coca-Cola launching this new product. Note: for this, you will need to read the chapter that deals with the marketing environment. Steve Jones, who is the CEO of Fairlife, made a strong argument when he insisted that though Coca-Cola plays the part of distributing the milk, it does not take any role in the actual production of the milk and that it has nothing to be involved with what occurs on the dairy farms. He adds that people who have been referring to it as Coke Milk should not since it is actually not. The sole job of Coke, according to him, is the distribution of the milk and making sure that the milk is on the shelf. The market analysis and condition for the Coca-Cola’s Fairlife product seem to be somehow favoring while to some extent it is not so much on their side. The opportunity for the company after coming up with this product is that they have very limited competition since this is an uncharted sector. Again, having a good brand name globally, Coke expects to sell its milk product all over the world that  will, in turn, favor the growth.

Saturday, November 2, 2019

Rights and Obligations Research Paper Example | Topics and Well Written Essays - 750 words

Rights and Obligations - Research Paper Example This is going to be done by analyzing a case study. There exists a difference between a contract and an agreement because they both have different ramifications for the parties involved. An agreement has the option of being legally binding, or it can be informal. An agreement becomes a contract when the parties involved conceptualize their agreement into a binding relationship. An agreement becomes a contract when it is made with a lawful consideration for a lawful entity. For an object to qualify to be included in a contract, it must not be forbidden by law or defeat the purpose of any laid down law. A contract should not be fraudulent in intent or imply injury and damage to a person or property of other individuals. A contract should not contravene societal morals either that can be deemed by a court of law as being opposed to public policy and interests (Miller, 2012). A contract should be agreed on based on free will and consent, and should not be realized through coercion. It sh ould not be accomplished through undue influence, misrepresentation or a mistake either. If a contract does not meet the aforementioned qualities, then it is null and void in the eyes of the law, and it cannot be enforced by law. Contracts have elements that define and validate their viability under the law, which makes them enforceable under the law. These main elements should be in a contract, or it would be invalid. The first element that constitutes a contract is an offer, agreement or a promise, which is the basis around which a contract is constructed. Without an offer, a contract cannot be actualized because it is the initial step that necessitates the drawing up of a contract (Helewitz, 2010). An offer in a contract should be between two or more individuals with one party making the offer and the other considering the same. The offer stipulates that there should be the fulfillment of duties and obligations by both parties for the offer to be constituted in a legally valid co ntract. There exists a difference between an offer in a contract and an advertisement. In an advertisement, the obligations and duties are fulfilled first before a contract is constructed. In an advertisement, one of the parties has no part to play in the setting up of terms and conditions required to fulfill the contractual obligations. Acceptance is an element that should be featured in a contract for it to be legally binding. Contractual acceptance is characterized by a party in the contract agreeing to the terms and conditions of the offer. A contract is not formalized until the party being proposed accepts the offer, and a contract is not legally binding if the requirements of an offer are under negotiation. Consideration in a contract is a vital element, and it means that the parties would be giving something back in return for the proposed offer. It is mostly characterized by a payment as consideration for the offer (Goldman & Sigismond, 2010). The parties involved in a contr act should make it clear to each other that the terms and conditions under which they are both entering into agreement are legally binding. This is an element in contracts that should be emphasized because it helps make the parties involved avoid the consequences of breach of contract. Certainty of the terms and conditions of a contract must be clearly stated and understandable to all parties. Lack of certainty of the regulations