Wednesday, November 27, 2019

Free Essays on Microsoft Legal Issues

Microsoft’s Legal Audit Microsoft, manufactures, licenses, and supports a host of software products for a number of computing devices. Their software includes operating systems for â€Å"intelligent devices, personal computers and servers; server applications for client/server environments; knowledge worker productivity applications; and software development tools. They also license consumer software programs; sell PC input devices; train and certify system integrators; and research and develop advanced technologies for future software products.† Should there be a reference here? Microsoft's ambitions are anything but small. The world's #1 software company provides a variety of products and services, including its Windows operating systems and Office Suite software. The company has expanded into markets such as video game consoles, interactive television, and Internet access. With its core markets maturing, Microsoft is targeting services for growth, looking to transform its software applications into Web-based services for enterprises and consumers. Microsoft has reached a tentative settlement to end an ongoing antitrust investigation, agreeing to uniformly license its operating systems and allow manufacturers to include competing software with Windows (Company Information). The following issues involving Microsoft were researched and analyzed in preparation for the production of this audit report. The three issues that were picked involve Microsoft’s employment discrimination troubles, anti-trust/monopoly problems, and revenue reporting investigations by the SEC. Following the legal audits, the appendix contains basic financial statements, a 5-year stock chart, and the 20 most recent insider trades as of March 2003. Employment Discrimination When it rains, it pours. The Associated Press headline and story lead-in of January 2001, announcing Jackson v. Microsoft, must have caused the hearts of anti-trust-weary Microsoft su... Free Essays on Microsoft Legal Issues Free Essays on Microsoft Legal Issues Microsoft’s Legal Audit Microsoft, manufactures, licenses, and supports a host of software products for a number of computing devices. Their software includes operating systems for â€Å"intelligent devices, personal computers and servers; server applications for client/server environments; knowledge worker productivity applications; and software development tools. They also license consumer software programs; sell PC input devices; train and certify system integrators; and research and develop advanced technologies for future software products.† Should there be a reference here? Microsoft's ambitions are anything but small. The world's #1 software company provides a variety of products and services, including its Windows operating systems and Office Suite software. The company has expanded into markets such as video game consoles, interactive television, and Internet access. With its core markets maturing, Microsoft is targeting services for growth, looking to transform its software applications into Web-based services for enterprises and consumers. Microsoft has reached a tentative settlement to end an ongoing antitrust investigation, agreeing to uniformly license its operating systems and allow manufacturers to include competing software with Windows (Company Information). The following issues involving Microsoft were researched and analyzed in preparation for the production of this audit report. The three issues that were picked involve Microsoft’s employment discrimination troubles, anti-trust/monopoly problems, and revenue reporting investigations by the SEC. Following the legal audits, the appendix contains basic financial statements, a 5-year stock chart, and the 20 most recent insider trades as of March 2003. Employment Discrimination When it rains, it pours. The Associated Press headline and story lead-in of January 2001, announcing Jackson v. Microsoft, must have caused the hearts of anti-trust-weary Microsoft su...

Saturday, November 23, 2019

Awesome Love Quotes Through the Ages

Awesome Love Quotes Through the Ages What is love without expression? One of the ways to express love is by writing the classic love letter. If you happen to be the inventive and poetic kind, then writing a love letter is probably effortless. However, if you are a regular person who wants to pen a few lines for your beloved, then the following awesome love quotes could be of help. Paulo Coelho I love you because the entire universe conspired to help me find you. Phoenix Flame Marriage is love personified. Swedish Proverb Love is like dew that falls on both nettles and lilies. Turkish Proverb Young love is from the earth, and late love is from heaven. Douglas Yates People who are sensible about love are incapable of it. Henry Miller â€Å"The only thing we never get enough of is love; and the only thing we never give enough of is love.† James D. Bryden Love does not die easily. It is a living thing. It thrives in the face of all of   lifes  hazards, save  one: neglect. Anonymous The essential sadness is to go through life without loving. But it would be almost equally sad to leave this world without ever telling those you loved that you love them. Herman Hesse â€Å"If I know what love is, it is because of you.† Some of us think holding on makes us  strong; but  sometimes it is letting go. Jorge Luis Borges To fall in love is to create a religion that has a fallible god. Gregory Maguire †¦and he kissed her and kissed her and kissed her, little by little by little. D. H. Lawrence I am in love - and, my God, it is the greatest thing that can happen to a man. I tell you, find a woman you can fall in love with. Do it. Let yourself fall in love. If you have not done so already, you are wasting your life. Julian Barnes Love is just a system for getting someone to call you darling after sex. Isha McKenzie-Mavinga On reflection, one of the things I needed to learn was to allow myself to be loved. Edmond Medina Things we do, we do for ourselves. But that which we love we have no choice but to give away. Norman Lindsay The best love affairs are those we never had. English Proverb Faults are thick where love is thin. Fyodor Dostoevski Love in action is a harsh and dreadful thing compared with love in dreams. Lao Tzu Being deeply loved by someone gives you strength, while loving someone deeply gives you courage. Friedrich Nietzsche Women can form a  friendship  with a man very  well; but  to preserve it to that end a slight physical antipathy must probably help. Barbara Bush I married the first man I ever kissed. When I tell this to my children, they just about throw up. Sara Paddison As you continue to send out love, the energy returns to you in a regenerating spiral... As love accumulates, it keeps your system in balance and harmony. Love is the tool, and more love is the end product. Jane Austen You pierce my soul. I am half agony, half hope†¦I have loved none but you.

Thursday, November 21, 2019

Ethical Use of Assessment Research Paper Example | Topics and Well Written Essays - 1000 words

Ethical Use of Assessment - Research Paper Example As a function of this, this particular analysis will seek to analyze the way in which school counselors are employing a new variety of risk assessment tools in order to draw inference on key levels of violent tendencies or anti-social behavior. Naturally, such models are not in and of themselves a perfect or all encompassing tool due to the fact that many individuals who have exhibited the type of sociopathic tendencies that have become the thing of nationwide news never exhibited any known or verifiable symptoms; however, it is nonetheless a key area of growth into which the high school counselor can seek to polish his/her skill level as a means of seeking to draw down the very real level of risks that currently exists within our current educational system. Naturally, one of the most important functions of this particular tool of violent risk assessment is to help to provide a level of information with regards to the propensity of a given student to display potentially harmful behav ior both to themselves, their loved ones, or those within the educational environment. As a means of reviewing the effectiveness of such an approach, a litany of studies has sought to measure such a determinant within the recent past. Several of these studies, such as the one Bernes and Bardick, indicated that school bullying was oftentimes a key determinant of violent behavior that is one of the few warning signs that the school counselor has the ability to be aware of (Bernes et al 2007). In such a way, seeking to implement the given assessment tools to both of the affected parties within a situation in which bullying takes place is a fundamental starting point in seeking to provide insight into one of the key and causal areas that affects upon the level of violence. Other studies have indicated that despite violence prevention efforts, one of the most powerful mechanisms in which school officials can seek to both deter and understand the existence of violent behavior and its prec ipitating factors is to ensure that the seriousness and extent of violent and pre-violent behavior within the student body is a determinant that is thoroughly and thoughtfully weighed by the shareholders within the process (McAdams 2011). With regards to the ethical concerns of enacting such an assessment tool, there are few if any that have been uncovered as a function of the research that has been employed within this brief analysis. Moreover, the fact of the matter is with regards to the application of the assessment tool, the ethical concerns that are presented with regards to utilizing such a tool are far outweighed by the ethical concerns of not implementing it at all. In other words, the dangers associated with not putting into place such a tool of analysis are far greater than the ethical concerns that might be endangered by putting one into place (Cawood 2010). Lastly, with respect to how such a tool of assessment would integrate with different ethnic and culturally diverse groups, the level of assessment and the individual assessment tools that have thus far been listed work across these groups and provide the same level of inference. This in and of itself is important to note due to the fact that few of the other assessment tools that could be put into place or utilized by a high school counselor would have the same level of

Tuesday, November 19, 2019

Chronic Obstructive Pulmonary Disease Essay Example | Topics and Well Written Essays - 2000 words

Chronic Obstructive Pulmonary Disease - Essay Example It is quite unfortunate that over the past three decades the research has not shown much progress, it has focused only on the pathogenic roles of cigarette smoke, inflammation, protease and antiprotease balance. Research has also established an association of COPD with cigarette smoking; and patients with emphysema are known to suffer from a gene deficiency in an inhibitor of a neutrophils protease (Stang et al, 2000). The theory of cigarette-inflammation-protease has done a lot in the field of COPD epidemiology and pathology but is not able to reduce the pervasiveness and morbidity caused by COPD. It is therefore imperative to impose an urgent necessity for research in this area. The research is directed to sustain novel concepts and innovative experimental approaches and techniques pertinently suitable to COPD research. The research is also directed to explicate the cellular pathways involved in COPD pathogenesis. This is a step helpful in clinical trials of potential therapeutics. Explanation of these pathways is the step to develop a capability of pharmaceutical industry to design the mechanism specific drugs. (http://www.nhlbi.nih.gov/meetings/workshops/copd_wksp.htm) The anonymity of COPD pathogenesis: COPD encompasses emphysema and chronic obstructive bronchitis, both these conditions relentlessly limits airflow that is not significantly reversed by bronchodilators. COPD progressively turn down the pulmonary functions with a rapid pace as compared to that in normal aging. Stimulating factors known to induce changes in animal lungs are cigarette smoke, pancreatic elastase, bacterial lipopolysaccharides, cadmium, chloramine-T, oxidants, silica, and rigorous malnourishment (Shapiro, 2000). It is established that many apparently dissimilar pathways are capable of causing emphysema or bronchitis,

Sunday, November 17, 2019

Explain how the Bible shows god as a creator Essay Example for Free

Explain how the Bible shows god as a creator Essay In the bible God is described as the creator of everything. This is accepted without being questioned rather than being a matter of discussion. The nature of God as creator is most clearly seen in passages from genesis and Psalms. God is described as the creator meaning he designed and produced everything. According to Christian tradition, God caused the Universe to exist, he is responsible for the Universe coming into existence and existing at every moment. God is also responsible for everything that will ever exist in the Universe. To understand why exactly God is considered as the creator of everything it is helpful to look at the concepts of good being omnipotence, omnipresent and omniscience. Omnipotence literally means that God is all powerful. No one is and will ever be more powerful than he is. Within this lies the idea that nothing logically possible is beyond the power of God. Even though miracles happened in the Bible it does not mean that God can make the impossible happen like square circles. But it simply says that God is responsible for the way the universe works. Omnipresent is very easy to understand, it simply means that God is everywhere, and by implication in every moment. Finally, omniscience is the idea that God is all-knowing. There is nothing that happens in the universe physically, mentally or spiritually that God does not know. As he is just everywhere, Christians also say they have a relationship with God because he is always with them. They can trust and rely on him. Sometimes god is even seen as a craftsman. In the bible you will not find a guidance of how God created the world and on what exact date, but you will find an account of the way God is intimately involved in the making of all the living and non-living things of which the universe consists. How God made the world himself. The Bible also talks about the spirit of God how it moved through darkness before the earth existed. The Spirit of God is also translated as the breath of God and the moving as brooding. This gives the idea of good breathing life itself into our world and like a parent he was brooding over that life. He all did it himself, with love and passion he was involved in creating the universe. Like a parent God watched over us, wanted exactly us to be in this world and to be born. Exactly the way we are. It seems like he formed us, like a potter. We are crafted by God. Isabel Odenwà ¤lder ‘God is responsible for everything that happens in the universe’ The extent to which God is responsible for what happens in the universe is determined by the limitations of our belief in Gods omnipotence and omniscience. Defined, God’s omnipotence describes his limitless power; a concept which incorporates the belief that God has the power to control what is happening, God is responsible for everything that happens in the universe. His omniscience refers to his unlimited knowledge. God knows everything. You could argue that God is responsible for everything that happens in the universe because his omnipotence and omniscience is shown all through the bible. God created the univers because he wanted it to happen, he is omnipotent. But this also leads to a contradiction. If you accept that God knows everything, that he is responsible for everything that happens in the universe and that he loves us and we are having a relationship with him, then why would he allow so many terrible things to happen in the world? As example in the creation story when god created the world and the human kind. God created the paradise, the world for us, gave us fruitful earth and wild animals. He created something beautiful. And it all happened after his will, he decided how trees would look like and how strawberries would taste. He gave Eve and Adam the best conditions for a good life. But Adam and Eve were not satisfied with what they had after a while. They wanted more. So eventually they ate an apple from the tree which they were not allowed to eat from. As soon as they did so, the paradise was not how it used to be. This part in the bible says that God gave us the world under best conditions everything was great but sometimes we make mistakes and wrong decisions, we act wrong. Sometimes humans are too selfish and greedy. The problem of most natural disasters is not the disaster itself but the fact that there is not enough help and money on site. But we could change that, we are responsible too for what is happening. We can always make a change! If we would life like God wants us to, we would not have any starving children in Africa or any other problems like that. God is not responsible for our very own actions. He is like a parent ‘brooding us’ he gave our mind with which we can think and act. The rest is up to us. In my opinion God is responsible  for the existing of our earth he is the reason why we live. If we need support and someone to talk to we can rely on him. But God gave us our minds to think, to make our own decisions. God have us our lives but he does not life them. We do.

Friday, November 15, 2019

Art, Literature And Society From 1955-1970 Essay -- essays research pa

Fear and Loathing in a Clockwork AgeAh! The noble search for identity. That intangible achievement that all artists lust after and lay in torment over. And during the post war era that struggle reached incredible magnitudes. The world cried out for legions of anti-heroes, who were only virtuous in their unapologetic and brutally honest lack of virtue. And the art world provided as many counter culture messiahs as was needed to "Damn the Man". The Beats, hippies, and punks are evidence that behind the white picket fence of suburbia lay an America that wanted more out of life than the sugar coated portrayals of domesticity and patriotism it received from pop culture. The unfortunate side of authenticity often lead to the conclusion that autonomy was an impossible dream and that just mere existence required an individual to compromise his integrity. The post-war generation developed an interesting love-hate relationship with the mass culture of it’s time. Some, like Andy Warhol, embraced the inevitability of mass culturalization in order to control the beast (yes, this is a reference to Revelations). While others recognized the American Dream as being a hypocrisy and so chose the Golden Eternity instead.The Beat generation and early hippies sought to separate themselves from mainstream society where they believed they could start anew and fully experience life, liberty, and the pursuit of happiness. The flower child p hilosophy was in fact very Transcendental, minus the stuffy New England mentality. The sexual, spiritual, and intellectual freedom and autonomy that characterized the Haight-Ashberry scene were closer to the Whitmanesque ideal than anything achieved during his life time. Postwar America was extremely prosperous from the stand point of the middle class white suburbanite. The only problem was that not everyone fit that mold. And even those who were born into that environment often found it’s conventions limiting and unfufilling. At home the issues facing minorities went, for the most part, ignored. Jim Crow laws were allowed to stand in the south until major Supreme Court decisions like Brown v. Board of Education declared segregation to be unconstitutional. But even still that did not solve the problem of good old fashioned prejudice, which was as rampant as ever. And not every woman was delighted to once again be her husband’s hous... ...ller: Rock and Roll in the Age of Celebrity. New York: St.Martins Press.1990Bessman, Jim. Ramones: An American Band. New York: St.Martins Press. 1993Doyle, Jennifer, Jonathan Flatley, and Jose Munoz. Pop Out: Queer Warhol. Durham and London: Duke University Press.1996Banes, Sally. Greenich Village 1963. Durham and London: Duke University Press.1993Lippard, Lucy R. Pop Art. London: Thames and Hudson.1985Milbank, Caroline. New York Fashion: The Evolution of American Style. New York: Harry N. Abrams, Inc. Publishers.1989All Other SourcesAli, Tariq, Susan Watkins.1968: Marching in the Streets. New York: Free Press.1998Allen, Donald M.ed. The New American Poetry. New York: Groves Press.1960Burgess, Anthony.A Clockwork Orange. New York: Ballatine Books.1963De Castelbajac, Kate. The Face of a Century:100 Years of Makeup and Style. New York: Rizzoli.1995Dodd, David. The Annotated Grateful Dead Lyrics: A Web Site. <a href="http://arts.ucsc.edu/gdead/agdl/#songs">http://art s.ucsc.edu/gdead/agdl/#songs. June 1, 1999Piccoli, Sean. The Grateful Dead. Philidelphia: Chelsea House Publishers.1997Thompson, Hunter S.Fear and Loathing in Las Vegas. New York: Vintage Books, a Division

Tuesday, November 12, 2019

To Be an Iskolar Ng Bayan

â€Å"Solar Eng banyan† are words which will forever be linked to each one of us studying here In this university. They are usually just accepted by students absent-minded, without truly understanding the weight of being an â€Å"solar Eng banyan†. Usually, for most people, what It meaner to be an â€Å"Solar Eng banyan† Is simply to be a student In the state university, the premier university in the country. However, that meaning is not all there Is to it: it's the tip of the iceberg to what an â€Å"ISO/ask† stands for.What most people forget Is that the term â€Å"Solar Eng banyan† Is actually a literal description f what UP students are: we are scholars of the country. Here in UP, we often see students fight and protest for d higher budget for education from the government because this would directly affect every single one of us kiosks and asks. A part of the annual education budget tot the country Is meant to subsidize our up talon. The relati vely low tuition fee here in UP is due to the fact that our government pays for some chunk of our supposed tuition: therefore what we have to pay for ourselves is a lower fee.However, looking at things In perspective, It Is not really the government hat subsidizes us. The money of the government comes from the Filipino people. Our countrymen, so we owe our education to them. Their money Is used to allow us to study here, therefore we are their scholars; we are scholars of our countrymen and of our country, hence the term â€Å"Solaris Eng banyan†. With that in mind, we have to remember that it is not only our parent's' money that is wasted every time we skip our classes, every time we fail our exams, or every time we have to retake our subjects.We may not feel guilty for wasting our parent's' money, but we should keep In mind hat we are also wasting our fellow Filipinos money. For example, our tuition may have been partly paid by a hardworking father, who does his Job faithfu lly and honestly every day, but the salary he is able to take home to his family is not enough because tax was deducted trot it, tax which was used tort government subsidy tot UP students. Instead of being able to provide his family with enough to eat, his money went to us, to be able to pay for our tuition.We should at least have the decency to be ashamed of wasting the money given to us, mandatory, by our countrymen. This s the reason why UP wants the â€Å"cream of the crop†, the best students in the country, because they wouldn't want to waste the Flossing' money. They know that with good students, the things taught in the classroom would not stay in the classroom, but would stick to the students' minds. UP wants to produce graduates Witt nor and excellence. It is better if we all realize this at once, so we don't call ourselves â€Å"Kiosks and asks† Just to say we are one of the best students this country has.Let's live up to that name, to being â€Å"Solaris En g banyan†, and living up to It doesn't stop once we have radiated. It is important to remember that our country has invested in us by allowing us to be scholars. They expect a return of their Investment. Lets make their investment worth It. They are paying for our education so we could hopefully make their quality of life better, so we could make this country better, That is the real just doing well in school and getting high grades. Being an â€Å"solar Eng banyan† is taking what you learn in the classroom and using them to return the favor given to us by our countrymen.

Sunday, November 10, 2019

History of dance Essay

Extra credits assignment: Dance2Live Crew VS. Crew on Feb. 15th, 2014 It was the first time to watch a live dance battle in the United States. Each crew’s performance impressed me and even shocked me a lot because of their insistence toward dancing and contribution to the crew. Before watching this dance competition, I have watched similar dance battles in movies, which solely give me a sense of aggressiveness or radicalism. However, this dance competition totally alters my previous impression. Every crewmember showcases their love to hip-hop dance. They really enjoy what they are doing. One thing surprised me is that many participants are kids, who are just four or five years old. Although they are very young, they treat the competition seriously and practice over and over again in order to perform optimally. Numerous floor moves look really hard and are easy to get hurt, but those young participants are not afraid of and worried about doing those difficult floor moves. Instead, they try their best to dance precisely even though they are not as fast and expert as some older participants. One four-year-old crewmember called Jim is one of the youngest participants in this competition. Before the competition began, I noticed that he stayed at the corner of the room and practiced his dance movements without having a rest. Though afterward he did not obtain a chance to dance during the battle, he still kept dancing and doing floor moves himself during each intermission. At that moment, I felt that Jim was truly keen on hip-hop dance. He just dances for himself instead of merely showing off the difficult floor moves. On the other hand, I can feel that all crews are not only for the final prize. Rather, they are enjoyable to hip-hop dance. During each dance battle, every crewmember has few minutes to do some freestyle dance moves under DJ’s remixed music. As one of the audience, I did not feel how fierce of each battle. Every dancer always interacted with the audience and treated it as a performance rather than a competition. Some participant dancers missed the rhythm or made mistakes, but they were not flustered or gave up, especially the teen participants. They all performed confidently and proudly. No matter whether they were good at doing difficult floor moves, they enjoyed the stage and danced as best as they can. From my personal perspective, it was an awesome performance. I can feel each dancer’s enthusiasm and love about hip-hop. Personally, people love hip-hop dance because it gives everyone freedom to express themselves no matter where they are from or how old they are, just like Buddha Stretch and Rennie Harris. These two excellent hip-hop dancers’ freestyle dance and persistent promotion of hip-hop culture help young people and teenagers, who probably are suffered from the poverty and discrimination, build up self-confidence and self-esteem. During the process of dancing hip-hop and learning hip-hop, people can demonstrate their personality and even attitude to life. Just like I have watched during this dance competition, hip-hop dance connects people of different ages and different races together. Sometimes they danced similar moves, but they showed in their unique style. Some participants were better at floor moves than others, but they were all highly engaged in the performance and in expressing themselves, which were more important than winning the competition. Basically, this dance competition makes me more passionate about hip-hop dance than before. Not only the dance movements are cool and fun to learn, but also the culture and spirit of hip-hop are needed to understand and acquire.

Friday, November 8, 2019

Annotated Bibliography on Technology

Annotated Bibliography on Technology Annotated Bibliography on Database Forensics: Data base forensic has various aspects including its process, weaknesses and disadvantages. This research paper aims at explaining the process of data base forensic, its related weaknesses and disadvantages. This is to certify whether the use of database forensics tools will keep the confidentially of the data or not. In the first instance, data base forensic has a unique process in which it is carried out. This shows that data base process has to be enacted so that facts are investigated and established. Rogers, M. (2003). The role of criminal profiling in the computer forensics process. New York. The author of this source document tries to disclose to people that there is a significant role in criminal profiling in computer forensic process. This role is most useful in computer forensic process where information of criminals is stored. He clearly and precisely impacts that knowledge into every reader of his work to make the role understood by many individuals. From the source document, we get to know that criminal profiling involves getting all the required data from criminals for proper investigations and establishment of factual information in criminal and civil courts. Criminal profiling serves a critical purpose since it keeps all information of criminals making it easy to track them even if they escape. Criminal profiling also serves to indicate that certain individuals are criminals. It includes the crime and felony committed by the criminal at hand. This source is useful in to those individuals entrusted with criminology duties. It makes them aware that criminal profiling is necessary for proper management of criminals. It also serves to show that full data and information of criminals should be taken for effective investigation and establishment of factual information concerning criminals. Werrett, J, D. (2000). The National DNA Database. Birmingham: UK. Database forensic puts into action many ways to get criminals. The data base forensic process used may involve many ways of getting the criminals. One of the methods enacted is the DNA testing operation. For the last two years, the Forensic Science Service has established and put into operation a National DNA Database. This operation is meant get criminals who escape after committing their felonies. The data base forensic process involved testing DNA samples of suspected individuals of various crimes. Also, samples were analyzed from stains from gotten from scenes of crime. This shows that the stains were to be analyzed to get the criminal who committed the offense. DNA samples of suspected individuals were tested to prove whether or not they committed the crime they are being suspected of committing. This source will be useful to those individuals who may be suspecting criminals for committing certain crimes. This is because their DNA samples can be analyzed to prove guilty or innocent of the suspected felonies. Gill, P, Curran, J, Elliot, K. (2005). A graphical simulation model of the entire DNA process associated with the analysis of short tandem repeat loci. USA. Database forensic process that deals with DNA analysis provides complete information to DNA and its related tests to arrest criminals. The author of this journal article shows us that there is a prevalent increase in the use of expert system in interpretation of short tandem DNA profiles. It has been proved that this way of getting data from criminal is cumbersome and time-consuming hence invention of the graphical model. This is reference to the Low Copy Number (LCN) applications. The graphical model is used to simulate stochastic variations related to DNA process. From the model, DNA process starts with extraction of sample followed by the preparation of a PCR reaction mixture. This shows that database forensic is becoming complex but faster in DNA process to get information regarding to criminals. This source will, therefore, be useful to those intellectual individuals dealing with criminal investigations. This source document clearly provides a complex but faster way of DNA process to get information from criminals. Willuweit, S. (2007). Y chromosome haplotype reference database (YHRD): Update. Berlin: Germany. This source document shows that Y chromosome haplotype reference database (YHRD): Update is an application of database forensic process. The update is designed for forensic analysts in their work since it is meant to store the Y chromosome haplotypes from global population. This update is mainly useful to those individuals who are interested in family and historic genetics. Since genetics is the scientific study of passage of genetic materials form parents to their offsprings, forensic analysts get to know genetic characteristics of various families. This knowledge can be used to trap criminals since their family genetic characteristics are known. Forensic analysts understand families with law breakers hence they fall suspects of crimes which happen within their reach. This source document will be useful since it gives people a clear knowledge about the Y chromosome haplotype reference database (YHRD) update. It also makes people know that family genetics can be useful in tracking criminals. Rowlingson, R. A Ten Step Process for Forensic Readiness. University of Aston: Birmingham. This research paper gives a ten step process which an individual should undergo to be for database forensic process. The ten processes outlined in the source document are as follows; define business scenario that require digital evidence, identify available resources and different types of evidence, determine the evidence collection requirement, and establish a capability for securely gathering legally admissible evidence to meet the requirement and establish a policy for secure storage and handling of potential evidence. Other steps include ensuring that monitoring and auditing is targeted to detect and deter major incidents, specifying circumstances when escalation to a full formal investigation is required, training staff, presenting an evidence-based case describing the incident and its impact, and ensuring legal review to facilitate action in response to the incident. The source document is useful since it gives researchers the ten step process for data base forensic readiness. This serves to prepare and make it known to individuals joining CID that they have to be prepared to be ready for data base forensic process. Bandelt, H, J, Lahermo, P, Richards, M V. Macaulay, V. (2001). Detecting errors in mtDNA data by phylogenetic analysis. UK. The author of this source document claims that some errors may occur on a forensic mtDNA data base. This error may result in wrong establishment of facts concerning criminals. This error may also lead to passing out wrong judgment to suspected criminals. This implies that innocent suspected criminals may be declared guilty while guilty suspected criminals may be declared innocent. This shows that the error has great effect on the judgment passed on criminals. This source document comes up with a way in which the error on a forensic mtDNA data base can be detected to avoid confusion. This source document will be useful since it gives a way in which the mtDNA error can be detected to avoid confusion and wrong judgment in criminal and civil courts. Researchers and readers can clearly understand the error and the way of detecting it. There are some weaknesses related to database forensic and its related tools. These weaknesses serve to draw back the efforts put in place, by the use of data base forensic, to investigate or establish facts in courts. The weaknesses bring about limitations to the use of forensic data base in investigating and establishing facts in courts. Lee, S, Kim, H, Lee, Lim, J. (2005). Digital evidence collection process in integrity and memory information gathering. Korea University Seoul. South Korea. The author of this source document brings out a weakness that is linked to data base forensic. The weakness is related to the EnCase that was used globally. Its weakness is that modifications can be made on MDC value of digital evidence. This shows that the MDC value is not standard hence can be adjusted resulting to resulting to errors. This led to the proposal of another counter measure. The counter measure proposed was the MDC public system, public authentication system with PKI and MAC system. This source document is useful since it brings out the weakness of the MDC value and its counter measure proposal. Leigland, R W. Krings, W. (2004). A Formalization of Digital Forensics. France. This source document brings out one of the weakness in data base forensic. The weakness limits investigation and some other ways of finding evidence against criminals. The weakness stated in this source document is the unclear use and bounds of digital evidence in legal proceedings. This means that the current techniques, of digital cameras, may not rigorous enough to be used in the courtroom. This limits evidence that is presented against criminals if recorded by digital devices such as digital cameras. This source is helpful since it makes clear the weaknesses of data base forensic. Digital evidence may not be allowed during legal proceedings in courtrooms. Harris, R. (2006). Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Purdue University: USA. According to this source document, there are some anti-forensics problems that act as draw backs to data base forensic. Such problems are some of the weaknesses of data base forensic in investigating and establishing facts concerning criminals. This source is helpful since it shows that anti-forensic problems act as weaknesses of data base forensic. Newsham, T, Palmer, C, Stamos, A Burns, J. (2007). Breaking Forensics Software: Weaknesses in Critical Evidence Collection. San Francisco: USA. According to this source, forensic software break down is a common problem. Such breakdown brings about problems in collection of information to be used as evidence. This results in weakness in critical evidence collection. Casey, E. (2003). Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Knowledge Solutions LLC: USA. The author of this source document mainly focuses on weakness brought about in data base forensic by tools of data base forensic. Since the tools used are not100% effective, they are prone to errors. These errors make data base forensic a defective way of investigating and establishing facts about criminals in criminal and civil courts. This source is, therefore, useful as it informs researchers of the weakness brought in data base forensic b y defective tools used. Thompson, E. (2005). MD5 collisions and the impact on computer forensics. West Lindon: United States of America. Thompson concentrates his writing on the weakness of data base forensic caused by MD5 collisions. These MD5 collisions have an impact on data base forensic since it brings about weaknesses in the MD5 hash algorithm. This leads to the general weakness of data base forensic as a process of investigating and establishing facts on criminals in courts. This source document is useful as it grants researchers and readers the chance to discover that MD5 collisions results in weakness of the data base forensic. Inclusively, there are some disadvantages that come about due to the use of database forensic tools. Nagesh, A. (2006). Distributed Network Forensics using JADE Mobile Agent Framework. Arizona State University: USA. Nagesh says that some disadvantages of data base forensic are brought about by architectures in data base forensic. This is because the architectures create network congestion near the forensics. This leads to unavailability of network in such places. Data base forensic tools and devices which use network cannot operate properly in such places due to lack of network. This interferes with collection of data and information to be used as evidence. This source is helpful since it makes researchers and readers be aware of the disadvantage caused by data base forensic architectures. Haggerty, J, Jones, D, L Taylor, M. (2008). Forweb: file fingerprinting for automated network forensics investigations. Liverpool John Moores University: UK. This source admits that there are many disadvantages connected to data base forensic. This is because some ways of data base forensic make use of approaches that use computationally exhaustive statistical measures. Some of these measures are complex in nature posing a problem in proper establishment and investigation of information to be used as evidence. The source is useful since it clearly shows that file printing for automated network forensic investigations may be intensive hence a predicament in data and information collection. Navarro, P, J, Nickless, B Winkle, L. (1995). Combining Cisco Net Flow Exports with Relational Database Technology for Usage Statistics, Intrusion Detection, and Network Forensics. The author of this source document suggests that some of the disadvantages of data base forensic are caused by the tools used. This means that any defective tool used in data base forensic process results in one or more problems. According to her, data can be lost if the back-end SQL data base is unavailable. This implies that the lack of the back-end SQL data base results to data loss. This source is useful since it equips it readers that data will be lost if the back-end SQL data base is unavailable. Singhal, A Jajodia, S. (2006). Data warehousing and data mining techniques for intrusion detection systems. Gaithersburg: USA. The disadvantage of data base forensic explained in this source document bases on data mining and data warehousing techniques. These techniques improve performance of Usability of Intrusion Detection System (IDS). The problem comes with the current IDS since they do not provide support for historical data summarization and analysis. This means that data collected is not supported hence does not have assurance of being true or false. This source document is useful in its full content of the problem caused by the current Usability of Intrusion Detection Systems. Garfinkel, S, L. (2010). Digital forensics research: The next 10 years. Monterey: USA. The golden age of computer forensic is quickly coming to an end. This calls for careful handling of data base forensic tools. SQL, for example, requires a standardized careful planning for its handling. This means that some of data base tools are delicate and vulnerable hence requires careful handling. Careless handling of such tools may result in their damage hence loss. This source document is useful since it precisely explains the idea careful planning for data base forensic tools such as the SQL data base.

Tuesday, November 5, 2019

Ranking the Countries of Asia by Area

Ranking the Countries of Asia by Area Asia is the largest continent in the world with a total area of 17,212,000 square miles (44,579,000 sq km) and a 2017 population estimate of 4,504,000,000 people, which is 60 percent of the worlds population, according to the UNs  World Population Prospects, 2017 Revision. Most of Asia is in the northern and eastern hemispheres  and shares its landmass with Europe; together they  make up Eurasia.  The continent covers about 8.6 percent of the Earths surface and represents about one-third of its land mass. Asia has a varied topography that consists of the worlds highest mountains, the Himalayas, as well as some of the lowest elevations on Earth.Asia is made up of 48 different countries, and as such, it is a diverse mix of people, cultures, and governments. The following is a list of the countries of Asia arranged by land area. All land area figures were obtained from the CIA World Factbook.   Asias Countries, From Largest to Smallest Russia: 6,601,668 square miles (17,098,242 sq km)China:  3,705,407 square miles (9,596,960 sq km)India: 1,269,219 square miles (3,287,263 sq km)Kazakhstan:  1,052,090 square miles (2,724,900  sq km)Saudi Arabia:  830,000 square miles (2,149,690  sq km)Indonesia: 735,358 square miles (1,904,569 sq km)Iran: 636,371 square miles (1,648,195 sq km)Mongolia: 603,908 square miles (1,564,116 sq km)Pakistan:  307,374 square miles (796,095 sq km)Turkey: 302,535 square miles (783,562 sq km)Myanmar (Burma):  262,000 square miles (678,578 sq km)Afghanistan: 251,827 square miles (652,230 sq km)Yemen: 203,849 square miles (527,968 sq km)Thailand:  198,117 square miles (513,120  sq km)Turkmenistan: 188,456 square miles (488,100 sq km)Uzbekistan: 172,742 square miles (447,400 sq km)Iraq:  169,235 square miles (438,317  sq km)Japan:  145,914 square miles (377,915  sq km)Vietnam:  127,881 square miles (331,210 sq km)Malaysia:  127,354 square miles (329,847 sq km)Oman:  1 19,499 square miles (309,500  sq km)Philippines: 115,830 square miles (300,000 sq km) Laos: 91,429 square miles (236,800 sq km)  Kyrgyzstan:  77,202 square miles (199,951 sq km)Syria: 71,498 square miles (185,180 sq km)Cambodia:  69,898 square miles (181,035 sq km)Bangladesh:  57,321 square miles (148,460  sq km)Nepal:  56,827 square miles (147,181 sq km)Tajikistan:  55,637 square miles (144,100  sq km)  North Korea: 46,540 square miles (120,538 sq km)South Korea: 38,502 square miles (99,720 sq km)Jordan:  34,495 square miles (89,342  sq km)Azerbaijan: 33,436 square miles (86,600 sq km)United Arab Emirates:  32,278 square miles (83,600  sq km)Georgia: 26,911 square miles (69,700 sq km)Sri Lanka: 25,332 square miles (65,610 sq km)Bhutan:  14,824 square miles (38,394 sq km)Taiwan: 13,891 square miles (35,980 sq km)Armenia:  11,484 square miles (29,743 sq km)Israel: 8,019 square miles (20,770 sq km)Kuwait:  6,880 square miles (17,818  sq km)Qatar:  4,473 square miles (11,586  sq km)Lebanon: 4,015 square miles (10,400 sq km)Brunei:  2,226 square miles (5,765 sq km)Hong Kong: 428 square miles (1,108 sq km) Bahrain: 293 square miles (760 sq km)Singapore: 277.7 square miles (719.2 sq km)Maldi ves: 115 square miles (298 sq km) Note: The total sum of the areas listed above is lower than the figure mentioned in the introductory paragraph because that figure also includes areas that are territories and not countries.

Sunday, November 3, 2019

Chief Ethics Officer Assignment Example | Topics and Well Written Essays - 1250 words

Chief Ethics Officer - Assignment Example Ethics try to determine what people must do and the goals that they need to pursue. The Chief Ethics Officer is the most important person in the C-level executive suite (Vallabhaneni, 2008). This report tries to highlight the roles and responsibilities of the Chief Ethics Officer. It also tries to identify the parameter’s that is necessary to avoid organs and leadership toxicity. It talks about the leadership skills required to ensure implementation and success. The company chosen for the study is Ford Motors Company. Job Description of Chief Ethics Officer Ford Motors is recognized as a renowned car manufacturing company of the world. The company is headquartered at Dearborn, Michigan. Being the new Chief Ethics Officer of Ford Motors, the following are the things that need to be done according to his responsibilities. Since internationally corporate unethical behavior pervades in an uncontrollable manner, they can however be cured if the companies appoint the Chief Ethics Of ficer in order to lessen the impacts of such unethical behaviors (Tran, 2010). It has been proposed that the system where the Ethics Officer reports to the management needs to be changed in order that these officers can perform their task effectively. The ethics officer must be hired and fired directly by the corporate board of directors instead of the company management. This kind of change in the reporting environment helps to enhance the effectiveness and independence of the ethics officer. There are numerous organizations that create and maintain the ethics position. The main responsibility of the ethics manager or officer is to improve the organizational ethical performances. They need to advise and assist the corporate management in the development and maintenance of the codes of conducts. They also have the additional responsibility of providing ethics training, monitoring along with accountability programs (Hoffman & Et. Al., 2007). The major role and responsibility of the C hief Ethics Officer is that they need to develop an ethics manual that will clearly describe the procedures and the policies on conflict of interest and codes of conduct. The policies need to be such that it restricts regarding the acceptance and giving of the gifts and travel by procurement, marketing, contracting and sales personnel. The chief responsibility of the ethics officer would be to prepare the rules that require written disclosures of the executives’ financial condition along with the outside earned income activities. He needs to ensure that there is adequate transparency in matter of disclosure of the financial statements and the position of the firm to the shareholders. The protection of the property of the organization and the key information are other important roles of the ethics officer in Ford Motors. In addition to these, the officer needs to perform certain other functions as well. He needs to promote a positive ethical climate in the organization via his leadership skills. He needs to work with the internal audit departments for the development of the audit plans and identify the areas of audit that will address the ethical violations. Parameters Necessary to Avoid Organ and Leadership Toxicity It has been noted that in the recent days,

Friday, November 1, 2019

The United States (Foreign) policy towards Haiti Essay

The United States (Foreign) policy towards Haiti - Essay Example The richest 10% receive 48% of the national income while the poorest 10% receives less than 1%. More than 70% of these immigrants live in Florida and New York states. Haiti has been ranked as the most politically corrupt state in the world.3 The tax structure majorly targets the basic commodities produced by peasants while ignoring the capitalist class. This work will address the US foreign policy towards Haiti as we try to establish the relations that have been there between the two countries. The essay will revolve around the interactions between the two countries to cover the question in an amicable manner. Haiti gained independence from their French colonizers under the leadership of Napoleon Bonaparte in January 1804. However France did not recognize their sovereign state until 1825 when Haiti paid 150 million gold francs to compensate for lost property, slaves, land and equipment France had used during the colonial era.4 Haiti had to shoulder an economic burden in the form of high interest loans which was fully paid in 1947. Arguably the U.S migration policy on Haiti is hurting. In 1957 Duvalier established a dictatorship government which combined violence against political opponents and instilling fear among citizens through the use of coercive power and threats. U.S.A government suspended aid program towards Haiti in 1961 after allegations surfaced that he had misappropriated aid money. Duvalier’s son Jean Claude inherited his father’s presidency after his death in 1971. His regime dropped some of the coercive elements that characterized his father’s presidency. The United States thus restored its aid program to Haiti in 1971. Duvalier was forced into exile after months of disorder in the country after Pope John Paul II condemned the regime.5 A provisional military government took control from 1986 to 1988 and a new constitution enacted. This provided for an elected parliament, an