Saturday, May 23, 2020

Comparing the Quest in M. Butterfly and American Beauty

The Quest in M. Butterfly and American Beauty Happiness is defined as enjoying, showing, or characterized by pleasure; joyous; contented. Based on this definition we all search for happiness our entire lives. Two very different stories address this idea of the quest for happiness. M. Butterfly by David Henry Hwang is the story of a man named Gallimard who is longing for his love Butterfly to return to him. John Deeney describes it as him, clinging to his idea of a Perfect Woman to the end by costuming himself into the victimized Butterfly though his final suicide. Although Gallimard’s infatuation with Song sometimes makes him cut a rather ridiculous figure, his dead seriousness at the end evokes a certain amount of pathos and†¦show more content†¦Not only is he using Gallimard for the government, but also for the control he has over him. Song knows that Gallimard thinks he is the perfect woman. He allows him to believe this for more than twenty years during their affair. It was not until the end that Song told Ga llimard the truth. Song lived most of her life as a lie, only because she thought it was making her happy. On the other side of Song’s insecure image was his lover Gallimard. Gallimard first lived a happy life with his lover Song. He changed his whole life and even got a promotion because of his new attitude. Not praising himself he said, It is because of you that I was promoted tonight. You have changed my life forever. My little Butterfly, there should be no more secrets: I love you (Meyer 1233). Gallimard truly loved Song and after finding out that Song was really a man, he was crushed. He was ridiculed everywhere because people could not understand how he did not know he was dating another man. He replied, This is the ultimate cruelty, isn’t it? That I can talk and talk and to anyone listening, it only air- too rich a diet to be swallowed by a mundane world. Why can’t anyone understand? That in China, I once loved, and was loved by, very simply, the Perfect Woman (Meyer 1250). After all of his searching for his Butterfly and to find out that she was really a man c rushed any happiness in his life. In the end, he said: Death with honor is better than

Tuesday, May 12, 2020

What Is Globalization and What Are Its Effects

Globalization, for good or ill, is here to stay. Globalization is an attempt to abolish barriers, especially in trade. In fact, it has been around longer than you might think. Definition Globalization is an elimination of barriers to trade, communication, and cultural exchange. The theory behind globalization is that worldwide openness will promote the inherent wealth of all nations. While most Americans only began paying attention to globalization with the North American Free Trade Agreement (NAFTA) debates in 1993. In reality, the U.S. has been a leader in globalization since before World War II. End of American Isolationism With the exception of a spate of quasi-imperialism between 1898 and 1904 and its involvement in World War I in 1917 and 1918, the United States was largely isolationist until World War II changed American attitudes forever. President Franklin D. Roosevelt had been an internationalist, not an isolationist, and he saw that a global organization similar to the failed League of Nations might prevent another world war. At the Yalta Conference in 1945, the wars Big Three allied leaders--FDR, Winston Churchill for Great Britain, and Josef Stalin for the Soviet Union--agreed to create the United Nations after the war. The United Nations has grown from 51 member nations in 1945 to 193 today. Headquartered in New York, the U.N. focuses (among other things) on international law, dispute resolution, disaster relief, human rights, and the recognition of new nations. Post-Soviet World During the Cold War (1946-1991), the United States and the Soviet Union essentially divided the world into a bi-polar system, with allies either revolving around the U.S. or the U.S.S.R. The United States practiced quasi-globalization with nations in its sphere of influence, promoting trade and cultural exchanges, and offering foreign aid. All of that helped keep nations in the U.S. sphere, and they offered very clear alternatives to the Communist system. Free Trade Agreements The United States encouraged free trade among its allies throughout the Cold War. After the collapse of the Soviet Union in 1991, the U.S. continued to promote free trade. Free trade simply refers to a lack of trade barriers between participating nations. Trade barriers typically mean tariffs, either to protect domestic manufacturers or to raise revenue. The United States has used both. In the 1790s it enacted revenue raising tariffs to help pay off its Revolutionary War debts, and it used protective tariffs to prevent cheap international products from flooding American markets and prohibiting the growth of American manufacturers. Revenue-raising tariffs became less necessary after the 16th Amendment authorized an income tax. However, the United States continued to pursue protective tariffs. The Devastating Smoot-Hawley Tariff In 1930, in an attempt to protect U.S. manufacturers trying to survive the Great Depression, Congress passed the notorious Smoot-Hawley Tariff. The tariff was so inhibiting that more than 60 others nations countered with tariff obstacles to U.S. goods. Rather than spur domestic production, Smoot-Hawley probably deepened the Depression by hobbling free trade. As such, the restrictive tariff and counter-tariffs played their own role in bringing about World War II. Reciprocal Trade Agreements Act The days of the steep protective tariff effectively died under FDR. In 1934, Congress approved the Reciprocal Trade Agreements Act (RTAA) which allowed the president to negotiate bilateral trade agreements with other nations. The U.S. was prepared to liberalize trade agreements, and it encouraged other nations to do likewise. They were hesitant to do so, however, without a dedicated bilateral partner. Thus, the RTAA gave birth to an era of bilateral trade treaties. The U.S. currently has bilateral free trade agreements with 17 nations and is exploring agreements with three more. General Agreement on Tariffs and Trade Globalized free trade took another step forward with the Bretton Woods (New Hampshire) conference of World War II allies in 1944. The conference produced the General Agreement on Tariffs and Trade (GATT). The GATT preamble describes its purpose as the substantial reduction of tariffs and other trade barriers and the elimination of preferences, on a reciprocal and mutually advantageous basis. Clearly, along with the creation of the U.N., allies believed that free trade was another step in preventing more world wars. The Breton Woods conference also led to the creation of the International Monetary Fund  (IMF). The IMF was intended to help nations that might have balance of payments trouble, such as Germany had paying reparations after World War I. Its inability to pay was another factor that led to World War II. World Trade Organization GATT itself led to several rounds of multilateral trade talks. The Uruguay Round ended in 1993 with 117 nations agreeing to create the World Trade Organization (WTO). The WTO seeks discusses ways to end trade restrictions, settle trade disputes, and enforce trade laws. Communication and Cultural Exchanges The United States has long sought globalization through communication. It established the Voice of America (VOA) radio network during the Cold War (again as an anti-Communist measure), but it continues in operation today. The U.S. State Department also sponsors a multitude of cultural exchange programs, and the Obama administration recently unveiled its International Strategy for Cyberspace, which is intended to keep the global Internet free, open, and interconnected. Certainly, problems exist within the realm of globalization. Many American opponents of the idea say it has destroyed many American jobs by making it easier for companies to make products elsewhere, then ship them into the United States. Nevertheless, the United States has built much of its foreign policy around the idea of globalization. Whats more, it has done so for nearly 80 years.

Wednesday, May 6, 2020

Financial assets are made up of securities Free Essays

Financial assets are made up of securities, stocks and derivatives. These are claims to the cash flow generated by real, tangible assets which are the lands, buildings and machineries we use. These pieces of paper are how citizens of highly developed countries increase their wealth. We will write a custom essay sample on Financial assets are made up of securities or any similar topic only for you Order Now Wealth generation involves risk, for no business activity is certain to provide returns. Financial markets allow investors to participate in money-making ventures without being physically present in the project site. Most risk tolerant individuals prefer stocks, for it has the potential to yield very high returns, while conservative ones go for bonds which provides a steady, fixed income. In this activity, stock trading is the main focus. Objectives Just like any investor, generating cash flow was the primary goal. The amount of cash to be gained from trading should compensate the risk undertaken. The goal was to achieve steady growth. The expected was return is 40%. After setting the required return, a portfolio strategy was chosen. Assets were then selected which would comprise the efficient portfolio– provides the highest return for a given level of risk. Fundamental analysis was the method used to pick the stocks. Diversification was another tactic used to maximize return while spreading the risk. Construct a portfolio Portfolio construction was a tedious task. I had to weigh the risk and returns, and sometimes, to trust my gut feel. Stock prices, as studies have shown follow a random walk movement. The approach used was a top-down portfolio construction. A portfolio is basically a collection of investment assets. The type of assets to be held was first determined. It was then followed by security analysis to pick out the stocks deemed profitable. Diversification was one principle used in choosing the stocks. It simply meant that equities from different industries were held in the portfolio so that risk exposure was limited. Shares from the software industry (RIMM, JAVA), arms(SWHC), pharmaceutical (GERN), computer (PALM), insurance (HUM), health care(HMA), power (FL), SAM, metals and mining(AUY, AA) ,oil and gas(IEO), index fund(SWPIX), cement(CX),AXP Asset Analysis Fundamental analysis was mainly used in the decisions undertaken. This approach uses earnings and dividend prospects of the firm, expectations of future interest rates, and risk evaluation of the firm to determine proper stock prices. It relies on the company’s financial health indicators. The stocks’ annual growth rate, quarterly earnings records, and P/E (price-to-earnings) ratios were measured. Historical data was also used. One such statistic is the EPS, or earnings-per-share ranking. PALM stocks were bought since the firm’s return on investment was stated at 2470. 70%. Also, on the day that it was traded, it was lower priced. Smith and Weson, SWHC had a P/E ratio of 5. 50%, an ROE of 19. 7%. Thus, a total of 4000 shares of SWCH were bought. Alcoa, or AA’s ROE was 16. 20%. Its EBITDA was 5. 45 B. Meanwhile, its P/E ratio was 11. 60 and its annual dividend was at . 68 per share. Alcoa looks financially healthy, but was expensive, so only 1000 shares were purchased. Similarly, FPL’s ROE was 14. 6%. Its P/E ratio was 12. 7%. Its EBITDA was 4. 47 B. The market values FPL shares highly. But, I found it unsmart to invest in highly valued stocks, because market perceptions fluctuate wildly. Thus, I only acquired 700 shares of FPL. RIMM had an ROE of 30. 60%. Its P/E ratio was 50%. For me, RIMM shares were really costly. In fact, it was has the highest cost per share in my portfolio. But I was attracted to its financial forecast. Furthermore, its 52 week high was at $148 so I found the $80 per share enticing. I thus bought 1000 shares from RIMM. HUM had an ROE of 19. 9% and a P/E ratio of 18. 00. It was quite overpriced, so I only bought 1000 shares. HMA was the lowest priced stock in my portfolio. But, I decided to purchase it believing that demand for health care services will increase in the near future. CX, compared with its competitor, Heidelberg cement had higher earnings and historically displayed returns higher than the market average. I bought 1000 shares. I also bought SWPIX, an index fund as a comparison for the return of my trading activities. Event Selection One of the most remarkable news was the launching of PALM’s Pre. With the belief that the Pre will be hot in the market, just like Apple’s I-pod, I bought 4,000 shares from PALM. I deem that the future value of PALM will increase more than two-fold once the Pre is introduced. The hype will push the price of its stock. Thereafter, I can sold my shares at a profit. In addition, the popularity of smart phones, or phones which serve more than just talking devices was forecasted to increase steadily in the near future. Aside from purchasing PALM stocks, I decided to buy shares from BlackBerry’s maker, RIMM. News of the global swine flu outbreak prompted me to purchase HMA shares. HMA , a healthcare provider would have more profits if the flu would become widespread. In addition, Citigroup upgraded HMA shares from hold to buy. Meanwhile, the news on the pending sale of JAVA drove me to sell my 1000 shares. Monster stocks which were identified two weeks in a row included AUY. The information urged me to buy 3000 shares of AUY. How to cite Financial assets are made up of securities, Papers

Friday, May 1, 2020

Information Security Malware Denotes Malicious Software - Samples

Question: Discuss about the Information Security Malware Software. Answer: Introduction The term 'Malware' denotes malicious software. This kind of system software is being designed specifically in order to create discrepancies in the computer system. The owner has no idea of the fact that the system is being accessed (Rouse, 2017). The software is said to be malicious as the owner or the end user has no clue regarding the damage caused to the system. The developer of such software has the access of the system, rather than the owner or the user, this marks it to be malicious. The main purpose behind building such software is to extract the personal information of the users from their system. And also, there are certain factors that contribute in making the computer system accessible for such types of software (Hoffman, 2014). Such factors are defect in the operation system of the computer network, same network responsible for the running of the entire computers etc. The initiation phase of the malware was completely different, as compared to its present day usage. The m alwares, in their initial phase were being used for the purpose of experiments as well as pranks. But, in the contemporary times, the malwares are used in order to earn secret profits (Computerhope, 2017). The developers aim to earn secret profit through the means of: Spreading email spam (zombie computers) Stealing or accessing relevant and confidential information (spyware) Forced advertisements (adware) Money extortion (ransomware) Background The concept of virus was developed with the publication of the research paper "Computer Viruses-Theory and Experiments". The research paper was being written in the year 1984, by the Professor Fred Cohen (Cohen, 1984). The author highlighted the main ideas related to the power and ability of these viruses to impact the system, how such viruses find their pathways to the computer systems, and also the preventive measures that can be adopted to prevent the computer from such viruses. According to the authors, if a system is very much in sharing of abundant and bulk data and does not uses the preventive measures, then, such systems are being adversely impacted by the attack of the viruses. Ralph Burger, in the year 1987 initiated to focus on the concept of idea and the results that he obtained from his research were being written through the book "Computer Viruses: A High Tech Disease" (Burger, 1988). The author through his book aimed at letting the readers know about the origination of the viruses as well as their functioning. This resulted in sharing of the information which is related with the designing and development of the viruses. People started using the ways for developing the viruses that were being mentioned in the book for the purpose of prank and experiments. As the internet came into the picture, since 1990, the security of the reports also increased. The viruses named Melissa as well as Michaelangelo were considered as the fresh as well as the most dangerous viruses (King of Gng, 2014). Along with the development of the viruses, the technology for virus likes bots and botnets were being developed (Norton, 2017). As the concept of internet was becoming popular among the people, it soon started with the sharing of the personal as well as private and business information. This turned out to be a serious issue as the confidential and relevant information of the people was being leaked. (Economic Times, 2017). For the cyber security department, it became difficult to trace such hackers who had an unauthorized access over the personal information of the individuals. This impacted not only the personal computers of the individuals or business organization, but also the confidential information of the government department and officials. With the growing issues of security, the risk to the personal details and information is also increasing. There is a heavy need to implement the safety measures that shall ensure privacy to the users, because in the contemporary era, the people are very much inclined towards the use of technologies and digital methods for the sake of payment and other purposes. As t he number of online transactions is being increasing, so is the sharing of confidential information and also the risk of getting the information leaked. Impact of Malware The mails which are not composed by the user are sent to any recipient, without the user's knowledge. The malware has the ability of hijacking the browser, which leads to the redirection of the users to various inappropriate and harmful sites. It has a direct impact on the efficiency of the operating system of the computer. The speed and accuracy of the system is reduced, as the files and programs, within the system gets infected due to malware attack (Magalhaes, 2012). Types of Malware In the initial phase, it was only virus that was considered as malicious software and had the ability to threat and risks the security issues of the information. But, as the time passed, new malwares has been developed by the hackers in order to get an unauthorized access over someone else's system and information (Study.com, 2017). Such malware types are: Spyware: the purpose of such type of malware is to have an access over the personal information that is being shared. The purpose is to transfer such information from the computer system to another system that is of the third party. It aims to send the malware back to the system, and spies on all the internet based activities of the users. Worms: this type of malware is similar to the malware of virus. This malware is being named 'worm' as it moves from one system to another without the need of any human actions. Worms multiplies within the system, gets attached to the files in the system and hunts for the pathways between two systems that are involved in sharing information and media within each other. Viruses: this malware gets attached with different programs and files. These files and programs are those which are being downloaded or installed on the user's computer system. The viruses multiply themselves when the file or the program that is infected is being transferred from one system to another. A virus is capable of damaging data files, hampering the performance of the system and corrupting the data stored on the system. Adware: the advertisements that pops up on the website while using the internet is the adware type of malware. Such malwares are hidden within the files or programs that are being downloaded and installed in the system. The aim of the adware is that the user clicks on the displayed advertisement once. By doing so, a third party shall make money, just out of the one click done by the user. Trojan: this is considered as the most dangerous and harmful type of malware that attacks on the financial information of the user and also plans to take over the resources of the computer system. In the large network of systems, the malware creates the 'denial of service attack'. This is an attempt that enables a system to make the computer system resources unavailable for those who make an attempt to reach it. Rootkit: this type of malware is considered to be the most difficult and hardest, out of all the malwares to get detected. It is very difficult for the users to know that there system has been impacted by this malware type. This is the reason that the experts have recommended to erase off the drives and also install each and every program again. (Malware Truth, 2017) Tools for Counter-Attacking Malwares With the rising security issues and development of various types of malwares, there are certain tools that have been developed in order to counter attack such malwares, to protect the system from the threat of such malwares. Such tools are: Antivirus software: this software of Antivirus has the ability to perform the scanning process along with deleting and blocking those files and programs that have become corrupted due to the virus attack. This development, in order to provide data security is considered to be a successful one. This software does not entirely eliminate the risk from the viruses, but has the ability to forecast and mitigate the risk from the viruses and hence, is considered as the most reliable method of counter attacking. In order to detect malwares, the software uses two- step processes. Initially, looking for the suspicious activities is the step one and in the other step, the software scans the entire system. The company developing such software has installed various systems in the software in order to detect the viruses. Antivirus software is needed to be updated on a regular basis. (Webroot, 2017) Spam filter: the world of internet has infinite malwares within it. Various sites on the internet consist of spam as well as malicious software, which harm the system of the user. Though people are getting aware about such types, there are still some systems that get harmed by such malwares. A spam filter works in many ways and the most common way is that it scans and filters the spam in the e-mails. This method is effective but is time consuming too (University of Pennsylvania, 2017). Firewall: the firewall software has the ability to counter attack the malwares that are being infecting the system as well as leaking the confidential information of the users. The software keeps a trace of the files and programs and allows the user to transfer such programs and files, wherever they want, at a safe destination. When the data are being on a large scale, such software is being preferred. If there is no malicious file attached with the data, then only the firewall allows the sharing of the data (Rouse, firewall, 2017). Conclusion With the development in the internet services, the risk of getting the information leaked is also increasing. The various types of malwares have an impact on the files and programs of the system. However, there are various software development companies, which have developed various software in order to counter attack the malwares. Apart from this, it is necessary for a user to install and update these anti malware programs on a regular basis so that they do not fall prey to cyber criminals. References Burger, R. (1988). Computer viruses: a high-tech disease. Abacus. Cohen, F. (1984). Computer Viruses - Theory and Experiments. Retrieved from Web.eecs.umich.edu: https://web.eecs.umich.edu/~aprakash/eecs588/handouts/cohen-viruses.html Computerhope. (2017, April 26). Why do people create viruses and malware? Retrieved from Computer Hope: https://www.computerhope.com/issues/ch001404.htm Economic Times. (2017). Definition of 'Cyber Security'. Retrieved from https://economictimes.indiatimes.com/definition/cyber-security Hoffman, C. (2014, March 3). Who is Making All This Malware and Why? Retrieved from How-To Geek: https://www.howtogeek.com/183642/who-is-making-all-this-malware-and-why/ King of Gng. (2014, March 30). Michelangelo and Melissa, the mass hysteria computer viruses. Retrieved from Sir Arthur's Den: https://kingofgng.com/eng/2014/03/30/michelangelo-and-melissa-the-mass-hysteria-computer-viruses/ Magalhaes, R. (2012, August 22). Malwares impact, serious and long lasting. Retrieved from TechGenix: https://techgenix.com/malwares-impact-serious-long-lasting/ Malware Truth. (2017). The Truth About Malware. Retrieved from https://www.malwaretruth.com/the-list-of-malware-types/ Norton. (2017). Bots and BotnetsA Growing Threat. Retrieved from https://us.norton.com/botnet/ Rouse, M. (2017). firewall. Retrieved from TechTarget: https://searchsecurity.techtarget.com/definition/firewall Rouse, M. (2017). Malware (malicious software). Retrieved from TechTarget: https://searchsecurity.techtarget.com/definition/malware Study.com. (2017). What is Malware? - Definition, Examples Types. Retrieved from https://study.com/academy/lesson/what-is-malware-definition-examples-types.html University of Pennsylvania. (2017). How does the spam filter work? Retrieved from https://www.seas.upenn.edu/cets/answers/spamblock-filter.html Webroot. (2017). What is Anti-Virus Software? Retrieved from https://www.webroot.com/in/en/home/resources/tips/pc-security/security-what-is-anti-virus-software