Wednesday, August 26, 2020

Critical Analysis Paper Essay Example | Topics and Well Written Essays - 1250 words

Basic Analysis Paper - Essay Example This show is publicized in ABS-CBN, one of the realized TV stations in the Philippines. This is a satire show where all characters are kids age 5-12 who have every one of their folks agree to work for the TV. Bulilit in the Philippines implies little. This is the motivation behind why simply hearing the title, one can get a thought that the throws are kids. What makes this not the same as the typical youngsters channels or show is that, the kids, given the content, are made to mimic adults by wearing corporate and business clothing to depict the conduct of an ordinary working individual in that specific nation. It ought to be comprehended that doing this exploration, I have viewed at any rate five scenes, four of which are under my perception. The show then again has been running on Philippine TV for over a year as of now and since it is exceptionally disparaged by kids and the youthful on a basic level, it proceeds with its parody demonstrations through the children who assume a huge job in getting a top rating for the show. Not at all like other kids' shows, the characters are made to be wise as they have to accept the jobs of various authorities who are notable in the nation. Now and again, they emulate celebrated lawmakers, entertainers or on-screen characters to ridicule them in a gentle manner. One of the most loved characters of this show is President Gloria Macapagal herself, the leader of the Philippines. So this is the main show that has all the guts to ridicule the President. It has not made any issue for the way that the children are the ones doing it. Had it been any genuine grown-up character, unit could have emitted to a major issue as of now. Returning to the very subject of my paper, there was one scene where four characters were set in one smaller than usual house. It was a picture of one family with a mother, a dad, and two children. The objective is for the dad to encourage his child to concentrate progressively like his sister. Father: Son, why not get your work done now rather than playingcomputer games. Attempt to resemble your sister. Child: What do you mean I ought to resemble my sister So I will be playingBarbie dolls at that point The focal point of the discussion is to tell the crowd that the dad, having said those words, it has made an alternate importance to his child. It seemed like the dad needed his child to be a young lady like his sister, which ought to be the clever piece of the content. In any case, that isn't the purpose of my contention. The point there is that young men have the generalization and are considered as dependent on computer games. This, as indicated by Lemish is only one of the discoveries in her article Gendered Content of Interests. As indicated by her, young men are known to be attached to playing PC games and tend to be innovation aficionados. The young ladies then again, they have their consideration concentrated on understanding books and magazines. This is the motivation behind why guardians allude to their young ladies as contemplative contrasted with young men in view of the referenced inclination. (Boville and Livingstone, page 268). Let me attempt to delineate another circumstance from another scene taken still from Going Bulilit. In one specific scene, in

Saturday, August 22, 2020

How Life Was Growing Up Essay

Being the most youthful kin of three has consistently been difficult for me. I was the main young lady and growing up with my two siblings has consistently had its ruins. I not just must be around my siblings consistently, I was additionally encircled by such a large number of male cousins. In all honesty, I can tally what number of female cousins I have in one hand. It is a genuine disgrace what a young lady needed to do just to be part of the gang. I was seven years of age at that point I despite everything recall what happened like yesterday was simply. For the late spring break my siblings and I alongside our cousins remained with our grandparents. My grandparents own sections of land and sections of land of land in the Philippines. Step by step we didn't do anything yet go around the field, handled one another, frightened away the creatures, and climbed trees. One summer day, we were playing tag and two of my cousins referenced that they were getting exhausted. We at that point began playing truth or dare. Everything was going easily until I was set out to climb the most elevated tree my grandparents had. I was set out to climb the tree to picked organic products for everybody. Without pondering it, I climbed the tree so quick with certainty I thought I was a super young lady. In any case, what they didn't know was I was frightened of statures. I was attempting my best to shroud my dread, however as I looked down the ground, I began shouting for help. I viewed my cousins alongside my siblings giggled so hard scarcely any tears were descending the side of their eyes. I at that point began shouting out for help. In the long run one of my siblings acted the hero. Anyway as I was going down, one of my feet slipped. As I took a stab at taking hold of something for help, my life flashed before my eyes. As I was falling, only handle for air was the main sound you could hear. I fell onto the ground twelve feet high and crack my lower arm. It has been a long time since the occurrence occurred. Until this day, the memory of how I broke my arm despite everything lives on through social occasion with my families. As a grown-up, we despite everything will in general settle on senseless choice just to fit in. Regardless of whether it is accomplished busy working, around new individuals, around parents in law, and even around your own family, impressions are still a lot for each and every person. Regardless of how youthful or old you might be, senseless activities will undoubtedly occur.

Friday, August 21, 2020

Chess Principles that Make You a Better Corporate Strategist

Chess Principles that Make You a Better Corporate Strategist Modern chess tournaments have been around since 1851. The game of strategy has roots that trace back to the earliest days of India and has spread around the globe, gaining a reputation for being a ‘thinker’s game’. Considered a game that combines attack and strategy, chess boards can be found tucked in the corner of an executive’s office, on tables in the park and in school classrooms all over the world. It transcends nationalities and gender and is enjoyed by young and old. Can this beloved game be more than a simple board game? Is there a parallel between chess and business that can be explored and investigated? What is it about the game of chess that attracts so many entrepreneurs to the board? © Shutterstock.com | OrlaThis article will look at the components of the chess principles that can make you a better corporate strategist. It will look at 1) the parallels between chess and business, 2) the main principles from chess that can be applied to business, 3) lessons from World Chess champions for becoming successful entrepreneurs, and 4) examples of chess strategies in business.PARALLELS BETWEEN CHESS AND BUSINESSPerhaps you’ve seen a chess game â€" either live or on television. They are typically very dignified events with players patiently waiting their turn, calmly stopping the clock to signify the end of their move. Each player fervently studies the board, anticipating their next move, running through potential scenarios in their head. This can be a far cry from the business world, where competitors attack simultaneously from all sides, the internal struggles of a company can have an effect and a host of other elements which can all be put into play at the same time . However, the parallels between chess and business are clearly evident. Companies put chess principles into action on a regular basis, often without even realizing that they are strategically positioning their pieces in a series of moves that have been utilized multiple times through the years.When considering the parallels between what happens on a chess board and what happens in a board room, there are some elements that these two environments have in common. The game of chess is about war. Specifically, it is about protecting a prized piece, and engaging in war with the opponent who wishes to defeat you. There are differing strategies for both offensive and defensive play, and the wise chess player will have experience with both. Corporate strategy is much the same: protecting something of value (the company) and engaging in war with the opponent who wishes to win. The business person who can successfully navigate offensive and defensive tactics will be an asset to a company in the game of business.Chess requires careful planning, time management, and the motivation to act.Why You NEED to Play Chess Dr. Donna Thomas-Rodgers | Speaker | Business Expert MAIN PRINCIPLES FROM CHESS THAT CAN BE APPLIED IN BUSINESSKnow the aim of the gamePerhaps one of the most important principles one can take from the game of chess is to know the aim of the game. A beginning chess player who is struggling with the fundamentals of the game will be easily defeated by the more experienced, practiced player. Understanding the main goal of the game is imperative for any player who wishes to be competitive. The goal of chess is to protect the king, while trying to eliminate the other player’s king. By trapping the king in a ‘checkmate’, the king is rendered useless and the game is over. In other words, the aim of the game is to decimate your opponent’s army and vanquish the king. Decimate and dominate, as quickly as possible.It is equally important to understand the aim of the business to remain competitive. Is the company’s aim to sell more products than a competitor? To provide outstanding customer service? No matter what the ‘business’ of the business is, it is essential to understand the goal of the company. Everything else that is done must be approached from the perspective of reaching that goal. The company that is competitive must understand that their competitors are out to win. By engaging in a war with another company for market share, the goal must be to win.Plan before making a moveWith the end goal in mind (protecting the king), the chess player can begin to plan moves and potential responses to that move. Many chess players memorize opening moves to start the game, setting up a series of events that they can deal with easily. The successful chess player can foresee moves several turns ahead, which will allow for easily planning successive moves and strategies.A similar approach must be taken in business. Before jumping into busine ss practices and plans, the successful entrepreneur will take the time to plan, not only for their immediate moves, but for the next few moves they will need to make as well.Manage time and resources wiselyIt is a reality of the game: the pieces are engaged in a war, and some pieces will be lost. It is expected â€" after all, if no one ever took out their opponent’s pieces, not much would happen on the game board. Through poorly planned moves, better strategy by the opponent or a strategic sacrifice, not all pieces will make it through the entire game. Within the game, the execution of a move that is not well thought out can be taken advantage of by the opponent. A well-played countermove can completely change the face of the game, and move a player from the offensive to the defensive. Similarly, a well-planned sacrifice can give a player the advantage in a few moves. These small sacrifices can mean the difference between winning and losing in a chess game.The business world is re markably similar. Companies who wish to succeed may find themselves in a position of sacrifice, in order to gain a better market share or position down the road. This can be seen in a company who spends capital on equipment with the expectation that business will pick up and they will need to be prepared. It can also been seen in a company that re-invents itself through staff cuts and organizational changes in order to remain competitive in the market. Sacrificing a few key pieces can lead to a greater reward later.Use all the available piecesThere is a temptation among novice chess players to immediately begin moving the king and queen around the board. While the player may be exhibiting a clear understanding of the goal of the game, the process of protecting the king and queen may be hazy. The young player must learn to maximize the availability of all of the pieces on the board and use that availability to an advantage. By using all of the pieces available, the king can be adequa tely protected and the other pieces are allowed to manage the elimination of the opponent’s pieces.Players often forget that the entire board can be utilized in the game, and concentrate on the central corridor of the board. Looking for ways that the entire board can be used to engage with the competition is crucial. It not only expands the playing field, it provides additional opportunities for overtaking the opponent, as well as spreading out the other player’s resources. This can be an asset when attempting to make a run for the king.Likewise, in a business setting, it can be tempting to focus on a few key areas. This can be seen in the company who pins their hopes and dreams on the shoulders of a ‘star employee’, or the company that bases their success on one product or line. While these methods may occasionally work, over time they have proven to be largely unsuccessful. Using the skills and abilities of all of the ‘players’ or employees, the company can establish a pattern of working towards success where everyone is involved. This creates an environment that thrives on teamwork and cooperation, helping to push the company farther than it could go with just a few individuals.Similarly, by expanding the available products and services offered, the business can challenge an opponent on several fronts, increasing the probability of success.Keep an eye on the clockWhile not utilized in every game, in tournament play the player is racing against the clock to make a move. At the end of their move, the player must tap the timer to signal that they have completed their move. Disciplined players know that they have a limited amount of time to act, and are prepared to make decisive moves. The inexperienced player will spend their time thinking about potential moves and may waste their move, frozen with indecision about which move is best. To prevent this, experienced players have prepared (often for months or even years) and have memorized potential mo ves and strategies. They can recall, at a moment’s notice, if need be, the move that they need to make.Business practices also require strategic thinking and planning, balanced with the ability to make quick decisions as necessary. While not every decision must be made on the spur of the moment, there are always situations that require action due to external forces. By preparing in advance for potential situations, the entrepreneur can make decisions which appear to be quick, but are in reality the result of months of studying and preparation. Conversely, business leaders must also know when to take the available time to consider options before making rash decisions. Even when an immediate decision appears to be the best option, further evaluation may reveal an alternative that ultimately is better.Know your opponentChess is a game of strategy and skill. As a game between two players, face to face, it is also a psychological game that involves knowing an opponent’s body language , temperament and strategy. Underestimating an opponent can result in defeat, simply because of the psychological advantage the opponent had. Luring an opponent into playing a different style of game, exhibiting unease or hesitancy through pauses or hesitant moves can all be part of the strategy an opponent undertakes during a game. Being prepared for the type of game that an opponent is likely to play will help in getting ready for the game, as well as increase the odds of a victory.The same strategy must be applied in the business world. Knowing the competition is vital to being competitive in the marketplace. Understanding the moves and motivations of an opponent, as well as being able to counter any possible moves that are made will ensure that the competitor is not able to gain an advantage. In addition, by studying an opponent’s strategy, there is opportunity for finding ways to outwit the competition and make inroads into winning the game.Finding the balanceThere is a balan ce in chess between analysis and intuition. Even with months and years of preparation and study, there is a human element that cannot be foreseen. The player must have a keen sense of intuition to not only predict what moves the competitor will make, but to react appropriately, regardless of the move made. Chess is an infinite game, with literally millions of potential moves available. It is impossible to know and plan for every contingency all the time. With so much preparation work, there is still a moment in the game when the player must simply move based on their intuition. Whether it is to predict an upcoming move, or to make an offensive move based on a perceived weakness, the player will ultimately be playing with their gut.Once a player learns to find the balance between skill and intuition, their game ability generally improves. Some of the greatest minds in chess have found great success during the times when they went with their feeling instead of their skill.Entrepreneur s must find the same balance. There is no replacement for the ability to rely on sheer instinct. In the business world, this is often referred to as thinking outside the box, and is often the source of great creativity and achievement. Successful marketing campaigns, surprise products and other by-products of intuition can be the difference between winning and losing.Ten Things Business Can Learn From Chess LESSONS FROM WORLD CHESS CHAMPIONS FOR BECOMING SUCCESSFUL ENTREPRENEURS © Wikimedia commons | David.MonniauxGarry Kasparov: One of the youngest World Chess champions, Kasparov claimed the title at age 22 and is considered one of the most accomplished players of all time.Chess is a battleground. The game of chess is not a nice, quiet game. It is about demolishing the enemy, according to Kasparov, and should not be played any other way. Business, therefore, must also be considered a fight to the end.Make yourself comfortable in enemy territory. By convincing a competitor that you are comfortable on their ground, you may be able to trick them into making a move into your territory. This can only happen if you have practiced working in the enemy’s holdings. Familiarize yourself with the enemy and then make plans to take over. © Flickr | Heisenberg MediaPeter Thiel: One of the early investors in Facebook and the founder of Paypal, Peter Thiel has history as a chess master.Know the value of the pieces. Each piece in a chess game has a specific value. By knowing the value, it is easier to make decisions about game strategy and placement. Similarly, knowing the value of employees and other associates, it can be easier to make business decisions regarding job responsibilities and more.Understand how the pieces work together. According to Thiel, there are two types of players in every setting: nerds and athletes. Nerds tend to be the thinkers who avoid conflict, while athletes make every situation into a competition. In Thiel’s opinion, each company needs both to be balanced and successful.Justin Moore: Child chess prodigy, Justin Moore was ranked in the top 20 youth chess players in the United States by the time he was a teenager. Moore is now CEO of Axcient, a cloud services provider.Relentless focus. Acco rding to Moore, too many companies lose sight of their goal and get sidetracked into reactionary activities. As a chess player, Moore understands the value in planning an endgame, and explains that businesses must model the same behavior. By not being waylaid by the activities of a competitor, it is easier to remain focused on the ultimate goal of the company.Recognize Patterns. Observing the repeated methods of an opponent can give an indicator of what their next possible move may be. The same principle applies in business: by observing the patterns of business, the entrepreneur can make predictions of what the market will do and act accordingly. In addition, adjustments can be made as necessary to improve and expand business activities.EXAMPLE OF CHESS STRATEGIES IN BUSINESSWhen Japan first began to introduce their cars to the world, they were facing the automotive giants of the United States. The early 1970’s were a time of innovation and change, and the market was ready for an alternative automobile manufacturer. Knowing that there was no way to dominate the American market through profit, Japanese car makers launched an attack straight from a chess player’s manual.Utilizing the strategies of having multiple advantages as well as the willingness to sacrifice, the Japanese were content to sacrifice profits in order to gain market share. They introduced their cheaper, energy-efficient cars to the market and waited. The American public, fed up with rising gas prices and more expensive cars, began to buy the Japanese cars. As the American car companies caught on and began to offer a cheaper car of their own, it was too late â€" the Japanese cars had flooded the market. They have continued to hold a large portion of consumer business in the United States car industry ever since.Companies that failed to use strategic thinking and planning are a reminder to other business leaders to employ chess techniques in their industry. One has to only think back a decad e to remember the photography industry giant Kodak. Failing to plan ahead for the competition’s move, Kodak found itself outflanked and outplayed with the introduction of digital photography. Unprepared to counterattack, Kodak has struggled to regain even a small footing within the camera marketplace.Sitting down to play a simple game of chess can be an enjoyable way to spend an afternoon. The deceptively pleasant game can bring important lessons into corporate board rooms, a fact that may have executives inviting people to ‘play a quick game of chess’ before heading into negotiations. Applying chess principles into corporate strategies can not only improve the overall strategy, it provides insight into the competition and provides methods for winning in the corporate game.Business Strategy is as Difficult as Chess[slideshare id=1609006doc=businessislikechess-090619095126-phpapp01w=640h=330] Image credit:  Flickr | Heisenberg Media under Attribution 2.0 Generic, Wikimedia commons | David.Monniaux under   Attribution-Share Alike 3.0 Unported.

Chess Principles that Make You a Better Corporate Strategist

Chess Principles that Make You a Better Corporate Strategist Modern chess tournaments have been around since 1851. The game of strategy has roots that trace back to the earliest days of India and has spread around the globe, gaining a reputation for being a ‘thinker’s game’. Considered a game that combines attack and strategy, chess boards can be found tucked in the corner of an executive’s office, on tables in the park and in school classrooms all over the world. It transcends nationalities and gender and is enjoyed by young and old. Can this beloved game be more than a simple board game? Is there a parallel between chess and business that can be explored and investigated? What is it about the game of chess that attracts so many entrepreneurs to the board? © Shutterstock.com | OrlaThis article will look at the components of the chess principles that can make you a better corporate strategist. It will look at 1) the parallels between chess and business, 2) the main principles from chess that can be applied to business, 3) lessons from World Chess champions for becoming successful entrepreneurs, and 4) examples of chess strategies in business.PARALLELS BETWEEN CHESS AND BUSINESSPerhaps you’ve seen a chess game â€" either live or on television. They are typically very dignified events with players patiently waiting their turn, calmly stopping the clock to signify the end of their move. Each player fervently studies the board, anticipating their next move, running through potential scenarios in their head. This can be a far cry from the business world, where competitors attack simultaneously from all sides, the internal struggles of a company can have an effect and a host of other elements which can all be put into play at the same time . However, the parallels between chess and business are clearly evident. Companies put chess principles into action on a regular basis, often without even realizing that they are strategically positioning their pieces in a series of moves that have been utilized multiple times through the years.When considering the parallels between what happens on a chess board and what happens in a board room, there are some elements that these two environments have in common. The game of chess is about war. Specifically, it is about protecting a prized piece, and engaging in war with the opponent who wishes to defeat you. There are differing strategies for both offensive and defensive play, and the wise chess player will have experience with both. Corporate strategy is much the same: protecting something of value (the company) and engaging in war with the opponent who wishes to win. The business person who can successfully navigate offensive and defensive tactics will be an asset to a company in the game of business.Chess requires careful planning, time management, and the motivation to act.Why You NEED to Play Chess Dr. Donna Thomas-Rodgers | Speaker | Business Expert MAIN PRINCIPLES FROM CHESS THAT CAN BE APPLIED IN BUSINESSKnow the aim of the gamePerhaps one of the most important principles one can take from the game of chess is to know the aim of the game. A beginning chess player who is struggling with the fundamentals of the game will be easily defeated by the more experienced, practiced player. Understanding the main goal of the game is imperative for any player who wishes to be competitive. The goal of chess is to protect the king, while trying to eliminate the other player’s king. By trapping the king in a ‘checkmate’, the king is rendered useless and the game is over. In other words, the aim of the game is to decimate your opponent’s army and vanquish the king. Decimate and dominate, as quickly as possible.It is equally important to understand the aim of the business to remain competitive. Is the company’s aim to sell more products than a competitor? To provide outstanding customer service? No matter what the ‘business’ of the business is, it is essential to understand the goal of the company. Everything else that is done must be approached from the perspective of reaching that goal. The company that is competitive must understand that their competitors are out to win. By engaging in a war with another company for market share, the goal must be to win.Plan before making a moveWith the end goal in mind (protecting the king), the chess player can begin to plan moves and potential responses to that move. Many chess players memorize opening moves to start the game, setting up a series of events that they can deal with easily. The successful chess player can foresee moves several turns ahead, which will allow for easily planning successive moves and strategies.A similar approach must be taken in business. Before jumping into busine ss practices and plans, the successful entrepreneur will take the time to plan, not only for their immediate moves, but for the next few moves they will need to make as well.Manage time and resources wiselyIt is a reality of the game: the pieces are engaged in a war, and some pieces will be lost. It is expected â€" after all, if no one ever took out their opponent’s pieces, not much would happen on the game board. Through poorly planned moves, better strategy by the opponent or a strategic sacrifice, not all pieces will make it through the entire game. Within the game, the execution of a move that is not well thought out can be taken advantage of by the opponent. A well-played countermove can completely change the face of the game, and move a player from the offensive to the defensive. Similarly, a well-planned sacrifice can give a player the advantage in a few moves. These small sacrifices can mean the difference between winning and losing in a chess game.The business world is re markably similar. Companies who wish to succeed may find themselves in a position of sacrifice, in order to gain a better market share or position down the road. This can be seen in a company who spends capital on equipment with the expectation that business will pick up and they will need to be prepared. It can also been seen in a company that re-invents itself through staff cuts and organizational changes in order to remain competitive in the market. Sacrificing a few key pieces can lead to a greater reward later.Use all the available piecesThere is a temptation among novice chess players to immediately begin moving the king and queen around the board. While the player may be exhibiting a clear understanding of the goal of the game, the process of protecting the king and queen may be hazy. The young player must learn to maximize the availability of all of the pieces on the board and use that availability to an advantage. By using all of the pieces available, the king can be adequa tely protected and the other pieces are allowed to manage the elimination of the opponent’s pieces.Players often forget that the entire board can be utilized in the game, and concentrate on the central corridor of the board. Looking for ways that the entire board can be used to engage with the competition is crucial. It not only expands the playing field, it provides additional opportunities for overtaking the opponent, as well as spreading out the other player’s resources. This can be an asset when attempting to make a run for the king.Likewise, in a business setting, it can be tempting to focus on a few key areas. This can be seen in the company who pins their hopes and dreams on the shoulders of a ‘star employee’, or the company that bases their success on one product or line. While these methods may occasionally work, over time they have proven to be largely unsuccessful. Using the skills and abilities of all of the ‘players’ or employees, the company can establish a pattern of working towards success where everyone is involved. This creates an environment that thrives on teamwork and cooperation, helping to push the company farther than it could go with just a few individuals.Similarly, by expanding the available products and services offered, the business can challenge an opponent on several fronts, increasing the probability of success.Keep an eye on the clockWhile not utilized in every game, in tournament play the player is racing against the clock to make a move. At the end of their move, the player must tap the timer to signal that they have completed their move. Disciplined players know that they have a limited amount of time to act, and are prepared to make decisive moves. The inexperienced player will spend their time thinking about potential moves and may waste their move, frozen with indecision about which move is best. To prevent this, experienced players have prepared (often for months or even years) and have memorized potential mo ves and strategies. They can recall, at a moment’s notice, if need be, the move that they need to make.Business practices also require strategic thinking and planning, balanced with the ability to make quick decisions as necessary. While not every decision must be made on the spur of the moment, there are always situations that require action due to external forces. By preparing in advance for potential situations, the entrepreneur can make decisions which appear to be quick, but are in reality the result of months of studying and preparation. Conversely, business leaders must also know when to take the available time to consider options before making rash decisions. Even when an immediate decision appears to be the best option, further evaluation may reveal an alternative that ultimately is better.Know your opponentChess is a game of strategy and skill. As a game between two players, face to face, it is also a psychological game that involves knowing an opponent’s body language , temperament and strategy. Underestimating an opponent can result in defeat, simply because of the psychological advantage the opponent had. Luring an opponent into playing a different style of game, exhibiting unease or hesitancy through pauses or hesitant moves can all be part of the strategy an opponent undertakes during a game. Being prepared for the type of game that an opponent is likely to play will help in getting ready for the game, as well as increase the odds of a victory.The same strategy must be applied in the business world. Knowing the competition is vital to being competitive in the marketplace. Understanding the moves and motivations of an opponent, as well as being able to counter any possible moves that are made will ensure that the competitor is not able to gain an advantage. In addition, by studying an opponent’s strategy, there is opportunity for finding ways to outwit the competition and make inroads into winning the game.Finding the balanceThere is a balan ce in chess between analysis and intuition. Even with months and years of preparation and study, there is a human element that cannot be foreseen. The player must have a keen sense of intuition to not only predict what moves the competitor will make, but to react appropriately, regardless of the move made. Chess is an infinite game, with literally millions of potential moves available. It is impossible to know and plan for every contingency all the time. With so much preparation work, there is still a moment in the game when the player must simply move based on their intuition. Whether it is to predict an upcoming move, or to make an offensive move based on a perceived weakness, the player will ultimately be playing with their gut.Once a player learns to find the balance between skill and intuition, their game ability generally improves. Some of the greatest minds in chess have found great success during the times when they went with their feeling instead of their skill.Entrepreneur s must find the same balance. There is no replacement for the ability to rely on sheer instinct. In the business world, this is often referred to as thinking outside the box, and is often the source of great creativity and achievement. Successful marketing campaigns, surprise products and other by-products of intuition can be the difference between winning and losing.Ten Things Business Can Learn From Chess LESSONS FROM WORLD CHESS CHAMPIONS FOR BECOMING SUCCESSFUL ENTREPRENEURS © Wikimedia commons | David.MonniauxGarry Kasparov: One of the youngest World Chess champions, Kasparov claimed the title at age 22 and is considered one of the most accomplished players of all time.Chess is a battleground. The game of chess is not a nice, quiet game. It is about demolishing the enemy, according to Kasparov, and should not be played any other way. Business, therefore, must also be considered a fight to the end.Make yourself comfortable in enemy territory. By convincing a competitor that you are comfortable on their ground, you may be able to trick them into making a move into your territory. This can only happen if you have practiced working in the enemy’s holdings. Familiarize yourself with the enemy and then make plans to take over. © Flickr | Heisenberg MediaPeter Thiel: One of the early investors in Facebook and the founder of Paypal, Peter Thiel has history as a chess master.Know the value of the pieces. Each piece in a chess game has a specific value. By knowing the value, it is easier to make decisions about game strategy and placement. Similarly, knowing the value of employees and other associates, it can be easier to make business decisions regarding job responsibilities and more.Understand how the pieces work together. According to Thiel, there are two types of players in every setting: nerds and athletes. Nerds tend to be the thinkers who avoid conflict, while athletes make every situation into a competition. In Thiel’s opinion, each company needs both to be balanced and successful.Justin Moore: Child chess prodigy, Justin Moore was ranked in the top 20 youth chess players in the United States by the time he was a teenager. Moore is now CEO of Axcient, a cloud services provider.Relentless focus. Acco rding to Moore, too many companies lose sight of their goal and get sidetracked into reactionary activities. As a chess player, Moore understands the value in planning an endgame, and explains that businesses must model the same behavior. By not being waylaid by the activities of a competitor, it is easier to remain focused on the ultimate goal of the company.Recognize Patterns. Observing the repeated methods of an opponent can give an indicator of what their next possible move may be. The same principle applies in business: by observing the patterns of business, the entrepreneur can make predictions of what the market will do and act accordingly. In addition, adjustments can be made as necessary to improve and expand business activities.EXAMPLE OF CHESS STRATEGIES IN BUSINESSWhen Japan first began to introduce their cars to the world, they were facing the automotive giants of the United States. The early 1970’s were a time of innovation and change, and the market was ready for an alternative automobile manufacturer. Knowing that there was no way to dominate the American market through profit, Japanese car makers launched an attack straight from a chess player’s manual.Utilizing the strategies of having multiple advantages as well as the willingness to sacrifice, the Japanese were content to sacrifice profits in order to gain market share. They introduced their cheaper, energy-efficient cars to the market and waited. The American public, fed up with rising gas prices and more expensive cars, began to buy the Japanese cars. As the American car companies caught on and began to offer a cheaper car of their own, it was too late â€" the Japanese cars had flooded the market. They have continued to hold a large portion of consumer business in the United States car industry ever since.Companies that failed to use strategic thinking and planning are a reminder to other business leaders to employ chess techniques in their industry. One has to only think back a decad e to remember the photography industry giant Kodak. Failing to plan ahead for the competition’s move, Kodak found itself outflanked and outplayed with the introduction of digital photography. Unprepared to counterattack, Kodak has struggled to regain even a small footing within the camera marketplace.Sitting down to play a simple game of chess can be an enjoyable way to spend an afternoon. The deceptively pleasant game can bring important lessons into corporate board rooms, a fact that may have executives inviting people to ‘play a quick game of chess’ before heading into negotiations. Applying chess principles into corporate strategies can not only improve the overall strategy, it provides insight into the competition and provides methods for winning in the corporate game.Business Strategy is as Difficult as Chess[slideshare id=1609006doc=businessislikechess-090619095126-phpapp01w=640h=330] Image credit:  Flickr | Heisenberg Media under Attribution 2.0 Generic, Wikimedia commons | David.Monniaux under   Attribution-Share Alike 3.0 Unported.

Sunday, May 24, 2020

Modern Perspective On Contractual Obligation - Free Essay Example

Sample details Pages: 11 Words: 3212 Downloads: 10 Date added: 2017/06/26 Category Law Essay Type Essay any type Level High school Did you like this example? Modern perspective on contractual obligation Empirical studies of contracting behaviour consistently demonstrate that commercial contracting parties care little for written contracts or the rules of contract law. Should the law of contract manifest any concern over this? If not, why not, and if so, how should the rules of contract law be amended to better reflect commercial practice? Question: A Introduction The overwhelming majority of contracts are transacted in an informal setting. Such contracts are either made by word of mouth, or even by a partys conduct. Don’t waste time! Our writers will create an original "Modern Perspective On Contractual Obligation" essay for you Create order Whilst that may be the case, written contracts are the types of agreements which are favoured by parties in the commercial world, not least because of what is potentially at stake in the event of a breach of the agreement. The extent of the terms of some commercial agreements and the seriousness of the implications of a breach of a partys obligations, written contracts are resorted to to ensure both that the parties to the contract are aware of their rights and obligations and also as a reference tool in the event of a dispute. The advent of the European Community witnessed a renewed impetus to harmonize the laws pertaining to, inter alia, commercial contracts. Various efforts have already been made to facilitate international transactions. For instance, the Uniform Law on International Sales and the Vienna Sales Convention, the Rome Convention on the Law Applicable to Contractual Obligations. These efforts have been producing w new codified lex mercatoria. This work i s seeks to highlight the rules applicable to parties to commercial contracts within the European Community and whether or not these rules are adequate to cope with parties who do not honour their contractual obligations. More specifically, are contracts which are made orally or by conduct enforceable in European Law? The essay shall also highlight whether there is any concern if parties care little for written contracts, and if not why not? In the Conclusion, the work shall explain whether or not the rules ought to be modified to reflect current commercial practice. Harmonising European Contract Law Efforts already made to harmonize the EU contract law rules have manifested in various forms. The national laws applicable to contracts vary from Member State to Member State. This difference or divergence in the laws inevitably adversely influences the decision of businesses whether or not to carry out cross-border transactions. A difference in the laws can result in uncer tainty and negatively affect whether or nota business decides to enter an agreement with a party based in a different Member State. The European institutions have therefore taken action to alleviate this problem by introducing laws which are applicable throughout Member States. These laws come in a variety of forms; Regulations; Directives and European Court of Justice judgments. Most notably, however, The Principles of European Contract Law 1998 has done a good job in encapsulating, codifying and harmonizing the rules of contract law from Member States. The Principles of European Contract law Parts I and II – (Parts I and II completed and revised) states (at Article 1) that the Principles are intended to be applied throughout Member States as the general rules of contract law in the EC. Furthermore, the Principles shall apply when the parties agree to their application, or in the event that it has not been expressly stated that a specific system or rules of law s hall govern the contract (see Section 1, Article 1.101(3)(b)). In addition, the Principles can also be used where other national laws or rules fail to provide a solution (see Section 1, Article 1.101(4)). Under the Principles however, the parties still maintain the right to freedom of contract. That is to say that parties are permitted to agree upon the terms they wish to agree upon. However, set out in the document are ‘General Obligations of ‘Good Faith and ‘Fair Dealing (Section 2, Article 1.201) and a ‘Duty to Cooperate (see Section 2, Article 1.202). These obligations cannot be derogated from and therefore provide a safeguard for parties to a contract. Albeit a contract, under the Principles, may still be made orally or by conduct, and does not have to be in writing. All that is required is that the parties intended to be ‘legally bound (see Section 1, Article 2.101), and that they reached a ‘sufficient agreement (see Section 2, Articl e 2.101). Furthermore, those terms which have not been individually negotiated can be invoked (under Article 2.104) against a party who claims to have been unaware of them, providing that the party wishing to invoke them takes reasonable steps to highlight their existence prior to, or at the time of, concluding the contract. The European Contract Law Project The Principles of European Contract Law document is over a decade old now. Since the introduction of the Principles of European Contract Law, there have been further efforts within the European Community to streamline and harmonise European Contract law. Most notably, the Common Frame of Reference has made great strides in this area. Background to the Formation of the Common Frame Reference In 1999, the European Council (Tampere) requested a study on the feasibility of approximation of civil law in order to facilitate the efficient functioning of the European market. The European Commission responded by announci ng that a consultation shall take place in order to collate information on how to form a European Contract Law. Subsequent to this, an Action Plan followed in 2003 proposing measures, for instance, the Common Frame of Reference was one such measure. Common Frame of Reference In essence, the Common Frame of Reference (‘CFR) outlines the model rules, principles and definitions to be applied to contract law within the EC. It is a long-term project with the objective of facilitating the preparation or revision of existing legislation in the field of contract law. It shall be of assistance to EC Legislators by providing solutions to contractual problems within the EC. These solutions have been extracted from existing contract law within the Member States. It is hoped that this will, inter alia, modify the existing body of rules applicable to contract law within the EC. Work already done in this area has produced various pieces of legislation aimed at improving existin g laws. For instance, EU consumer protection law is a good example of all the work that has resulted in EC laws. R. Madelin, in his article, European Contract Law: Moving Forward Together, Director General for Health and Consumer Protection European Commission stated (at pg. 5) that it is hoped that the European Contract Law Project, and particularly the CFR, shall aide the pursuit of the following goals: achieving better regulation, boosting competitiveness and improving the functioning of the international market (see pg.5, R. Madelin, European Contract Law: Moving Forward Together, Director General for Health and Consumer Protection European Commission, Conference of the network of stakeholder experts on the Common Frame of Reference in the area of European Contract Law (CFR-net), Charlemagne Building, Meeting Room S2, 15 December 2004) Reshaping the legal landscape to enhance competitiveness within the EC ought to provide an environment in which businesses are able to operate within the EC in a more efficient and profitable manner. This should address some of the complaints which have been forthcoming from small and medium size enterprises, who were concerned, inter alia, about inconsistent and diverse contract laws throughout the Member States (see pg. 5 article). It was felt that a more consistent and transparent system would facilitate competitiveness by allowing businesses to conduct cross-border transactions in a more efficient manner by supplying goods and services in a more competitive environment. It follows that greater confidence in European Contractual Law would inject greater confidence in the EC business community and in turn increase cross-border transactions. Ultimately therefore, European institutions are responsible for introducing laws which will simplify, and be more coherent to facilitate transactions within the EC, which ought to eliminate, or at least reduce, legal obstacles to trade. The European Commission has committed itself to utilizing the CFR in order to improve the quality and coherence of contract law. The success and development of the CFR is due to the fact that it has received support from all European Community institutions, Member States and stakeholders alike. Following public consultation, the CPR was adopted. The objective of the CFR shall become a toolkit for the Commissions lawmakers, including the European Council and EC Parliament. The CFR shall also be of benefit as a source of reference for law-makers, judges and lawyers. The work carried out for consumer contract law has been particularly fruitful. For instance, in October 2008, the proposal for a Directive on Consumer Rights was adopted by the Commission. The ultimate objective of which was to make it easier and cheaper for Member States to conduct cross-border transactions. The Unfair Contract Terms Directive (1993/13/EEC) is only of eight pieces of legislation which is being analysed in relation to t he Review of the Consumer Acquis. Such initiatives are aimed at improving legislation by identifying and alleviating problems. For instance, the Unfair Contract Terms Directive has introduced the concept of ‘good faith into consumer contracts, in an attempt to redress any imbalance that may be present in a contract between a seller and consumer. In addition, the Directive sets out a list of terms that are to be deemed unfair in such contracts, and are thereby rendered obsolete if they are included in such agreements. It is a further requirement that terms are to be ‘plain and intelligible and any ambiguity shall be interpreted in the consumers favour. Therefore is accordingly a duty on Member States to ensure that the provisions of the Directive are implemented. Conclusion As noted above, the European institutions have been busy harmonising the laws applicable to contracts throughout the Member States. The work already completed with the CRF has ensured th at parties to contracts have participated in the process of harmonising the laws applicable to contracts. This therefore ensures that the rights and obligations of the parties to a commercial contract are reflected in the laws introduced by the EC institutions. It accordingly follows that there is no need for any concern if parties prefer to enter contractual agreements by conduct or statement. Providing such agreements are clear (see Section 2, Article 2.101 of the Principles), and that both parties are aware of the terms, and express their wish to be legally bound by the agreement (see Section 1, Article 2.101 of the Principles), the right to freedom of contract has been preserved. Given the differences in the Common law system adopted in Ireland and the United Kingdom, and the variations of the civil law systems adopted by the remaining Member States, these efforts by the EC institution et al to harmonise the contract laws applicable to Member States ought to improve the po sition of parties to commercial contracts by keeping them informed of their rights and obligations, which in turn, one would think, ought to ultimately reduce breaches of contract within the EC. Question B EU business law Critically assess the corporate structures within EU Member States. Introduction The corporate structures in Member States of the European Community (‘EC) differ immensely in their form and the practices that they adopt. The EC institutions have accordingly endeavoured to facilitate the smooth functioning of the internal market by harmoninsing the systems and laws applying to corporate structures throughout Member States. This assignment provides a critical assessment of the corporate structures applicable to Member States. More specifically, the work shall explore whether or not corporate structures within the EC are operating in an efficient manner. Given the limited word count of this work, however, and the complexity of the subject, the essay concentrates on one aspect of corporate structures within the EC; Golden Shares. The work shall highlight the efforts made by the EC institutions, particularly the European Court of Justice (‘ECJ), in attempting to bring about parity within Member States by eliminating obstacles t o the free movement of capital, as required under Article 56 EC Treaty. Golden shares inhibit the free movement of capital by discouraging foreign investment, inter alia, due to the special rights that are often retained by the holders of golden shares. EC law makers, particularly the ECJ, have endeavoured to bring a degree of semblance to the EC rules governing corporate structures in relation to ‘golden shares. This has been done through a process of sifting out the ‘golden shares and ruling them to be inconsistent with EC law. The assignment shall commence by outlining information about ‘Golden Shares before setting out numerous prominent ECJ case law pertaining to ‘Golden Shares. Finally, in the Conclusion, the work shall sum up the findings. Golden Shares A ‘golden share is a shareholding which derives from a former state-owned company, in which a government of a Member State may reserve, subsequent to its privatization. Such shares carry with them special rights which the government shareholder can enjoy. Albeit the government, despite being a minority shareholder, often wields rights which permit it to exercise undue influence over the company. This usually exceeds the percentage of the stake the government owns in the company. The special rights in question can come in the form of: power to veto certain actions by the company in question; limiting the size of other shareholdings; blocking foreign shareholdings; and a right to control the appointment of directors. Whilst being a relatively common practice in Member States, the EC feels that the practice is undesirable and has therefore sought to tackle such shareholdings. For instance, in 2003, the ECJ found that the UK government failed in its duty to fulfill its obligations in accordance with Article 56 of the EC Treaty, namely in respect of the principle of the free movement of capital. In addition, Spain was also held to have upset the ECJ by hol ding golden shares in numerous companies, such as: Repsol, an energy company; Telfoncia, telecommunications company; Tabacalera, tobacco company; Argentaria, banking group; and Endesa, electricity company. Again the ECJ held that the shareholdings held by the Spanish government in this regard were inconsistent with EC principles as they restricted the free movement of capital throughout the EC. The result of the ECJs judgment was that the Spanish government was compelled to change its relationships with the companies in question. The ECJ has illustrated, however, that its decision are thoroughly thought through before outlawing such shareholdings. For instance, the ECJ found that a Member State can derogate from the obligations under Article 56 EC Treaty of ensuring the free movement of capital, on the basis of retaining special rights as the holder of ‘golden shares, on grounds of national security, and in applying the principle of proportionality, when it decided th at Distrigaz, a Belgian energy firm, was permitted to retain its ‘golden share because it was a ‘legitimate measure designed to promote the general national interest in terms of the security of the national gas supplying times of emergency. However, the general consensus within the ECJ appears to be one of ruling such shareholdings to be inconsistent with EC principles. For instance, in 2006, the ECJ proved once again that it would not shy away from ruling that a Member State had infringed the principle of free movement of capital when the Netherlands government was found to have breached the principle by retaining special rights (golden shares) following the privatization of the national postal, Koninklijke KPN NV (‘KPN), and telecommunications companies TNT Post Groep NV (‘TNG). The shares themselves permitted the government to, inter alia, give prior approval of specific management decisions. The ECJ accordingly held such rights to be disproport ionate to the rights enjoyed by ordinary shareholders. It was accordingly felt that such shares could potentially discourage investors from other Member States from investing in the company. Conclusion The ongoing campaign by EC institutions, particularly the ECJ in this regard, in seeking to eradicate any impediments to greater liberalisation of the EC Member States markets, is clearly not complete. It is therefore highly likely that the eradication of government owned ‘golden shares is likely to continue unabated. That is that there appears to be no room for ‘golden shares in the ECs agenda. Whilst this may impact hard on the corporate structures of many Member States, the harmonization of the rules shall undoubtedly result in an increase in cross-border mergers, which includes former state owned companies in which the government hitherto held ‘golden shares. This may call for a shake-up of the current corporate structures in this regard, but the clos er cooperation of Member States can only enhance and improve the corporate structures. Bibliography Text Books: P. Craig and Grà ¡inne De Bà ºrca, EU Law: Texts, Cases and Materials, 2008, Oxford University Press P. Richards, Law of Contract, 8th Edition, 2007, Pearson Longman R. Goode, Commercial Law, New Edition, Penguin Cases: Commission v. Belgium C-503/99 European Commission IP/03/1753 Commission v. Kingdom of Spain Case C 463/00 Commission v. United Kingdom Case C-98/01 Journals: Ivan Kuznetsov, The Legality of Golden Shares under EC Law, Vol. 1 No. 1 2005, Hanse Law Review Omar Shah and Scott Campbell (Latham Watkins), End of the Golden Age ? The European Courts Move to Promote Greater Free Movement of Capital Within the EU by attacking ‘Golden Shares, World Trade Executive www.wtexecutive.com Philip Martinius and Matthias von Oppen, ECJ Delivers New Judgments Concerning Golden Shares, mondaq, https://www.thefreelibrary.com/ECJ+Delivers+New+Judgments+Concerning+%22Golden+Shares%22.-a0102820963 R. Zimmermann and S. Whittaker, Good Faith in European Contract Law, 2000, Cambridge University Press R. Madelin (Director General for Health and Consumer Protection European Commission), European Contract Law: Moving Forward Together, Conference of the Network of Stakeholder Experts on the Common Frame of Reference in the Area of European Contract Law (CFR-net), Charlemange Building, Meeting Room S2,15 December 2004 Structuring European Acquisitions, Reorganisations, and Investments : Third Edition, Reprinted with permission by World Trade Executive, inc. www.wtexecutive.com) Weil, Gotshall Manges LLP, Comparative Study of Corporate Governance Codes Relevant to the European Union and it Member States, On behalf of the European Commission, Internal Market Direct orate General , Final Report Annexes I-III, , January 2002 Additional Materials: Consumer Sales Directive 99/44 The Principles of European Contract Law 1998, Parts I and II – (Parts I and II completed and revised) Unfair Contract Terms Directive 93/13 Internet Sources: https://www.cbs.dk/departments/law/staff/ol/commission_on_ecl/members.htm https://ec.europa.eu/consumers/rights/gen_rights_en.htm#gar https://europa.eu.int/rapid/pressReleaseAction.do?language=ENreference=IP/03/1753 (15.3.2005) https://www.eu-consumer-law.org/index.html www.google.books.com www.lexmercatoria.org https://webh01.ua.ac.be/storme/CECL.html Under Article 2.102, a partys intention to be bound by the contract shall be discerned from the statements or conduct of the parties. The Directives in question are: the Doorstep Selling Directive 85/577; the Package Travel Directive 90/314; the Unfair Contract Terms Directive 93/13; the Timeshare Directive 94/47; the Distance Selling Directive 97/7; the Price Indication Directive 98/6; the Injunctions Directive 98/27 and the Consumer Sales Directive 99/44. See pg. 69, Omar Shah and Scott Campbell (Latham Watkins), End of the Golden Age ? The European Courts Move to Promote Greater Free Movement of Capital Within the EU by attacking ‘Golden Shares, World Trade Executive www.wtexecutive.com Commission v. United Kingdom Case C-98/01 Commission v. Kingdom of Spain Case C 463/00 Commission v. Belgium C-503/99 Ibid See European Commission IP/03/1753. Available at: https://europa.eu.int/rapid/pressReleaseAction.do?language=ENreference=IP/03/1753 (15.3.2005)

Thursday, May 14, 2020

Observation Home With Her Mother Essay - 2467 Words

ANECDOTAL OBSERVATION Child’s name: Lilu Date: 29/11/2016 Setting: Home with her mother Observer: Lauren Macnaught Observation: A child named Lilu is in her playroom with her mother. She is occupied with building blocks of different shapes and numbers in increasing order to make a tower. Meanwhile the child is in constant conversation with her mother seeking approval at every digit of the block, the child is having good identification of the digits. She is totally active and energized to complete the block starting from 1 to 10. The child is responsive towards her mother and is constantly participating in solving the riddle whether she stacked the block linearly in increasing order. The shapes of every cubical blocks were in increasing surfaces due to which the block remain stacked in other bigger blocks which is making the child clueless to the digit 2 and she thinks that it is lost. Interpretation, including developmental skills, concepts and dispositions/links to theory: The child is responsive and kind to her mother. With a silver lining of her identification memory, she is able to identify shapes and digits. But still lacks the logic to fit in the problem solving shoes. The communication skills is in the humour and she is good at it. While the child is not fully lightened socially but more curved toward the parents and teacher affection and care. Relevant Approved Learning Framework Links: Possible future planning: For the purpose of the child’s brain development,Show MoreRelatedEvaluation Of A Professional Social Worker Student Essay1564 Words   |  7 Pagesprotection of observation participants. Consent was given by the guardian of Pia as the guardian understands the observation and interview is for educational purposes only. Pia is 2 years old, with dark hair and eyes and of light brown complexion. Pia lives with her mother and father who are both parents are natives of Guatemala. The family speaks both Spanish and English. Spanish is the language of choice when in the home and English when conversing with Americans. For the sake of the observation and interviewRead MoreEssay on Holistic Biographical Narrative of a Child1180 Words   |  5 PagesIntroduction: In this essay I will be discussing about the observation of a nine month old baby girl called Sarah, who lives with her mother and father in a private home in East London. Her two parents are from different races but were both born in United Kingdom. During the observation Sarah’s mother used very different method to take care of her child. How it was assessed and observed the role her mother placed during the observation. Discussing the child`s physical development, cognitive developmentRead MoreChild Observation Paper1294 Words   |  6 PagesChild Observation Paper Jason Betts Pacific Oaks College November 12, 2012 The purpose of this paper is to discuss and review my observation of a 7 year old African American male who is being raised by his grandmother (45 year old Bi-racial female who has 9 children of her own; 7 of the children are still in the house). During my observation of â€Å"Jackson†, I focused on the following domains of child development: * Physical * Cognitive * Social * Emotional I applied AttachmentRead MoreA Short Note On Individual Student Observation Format Essay962 Words   |  4 PagesAppendix D – Individual Student Observation Format I. Identification of Subject: Age: 6 Race: Caucasian Gender: Male Grade: Kindergarten Location: Observation took place in the student’s home after school. II. Information Sources: Before completing my observation, I spoke to the mother to get a better sense of who the student is. She discussed his accomplishments, strengths, and weaknesses. She also gave me a better understanding of the family dynamic. I also reviewed the child’s report card fromRead MoreMary : A Year Old Female With No Disabilities Essay1576 Words   |  7 Pagesafter school by either her mother or uncle. We are the only people in the house. Mary has two or three homework assignments to complete every afternoon. In addition to homework, we work on supplemental materials provided by me to improve her understanding of the concepts presented in the homework assignments. Tutoring sessions are finished by 4:30pm most afternoons. The setting and times are the same for each of the ABC observations. Permission was obtained from the mother prior to gathering dataRead MoreChild Observation Paper1083 Words   |  5 PagesChild Observation Paper After observing a nine month old child for this Child Observation paper, the author of this paper has taken copious notes during the session. The purpose of this paper is recognizing the biological, cognitive and psychosocial development of the child. The author of this paper identified the background history of the child, the observation made and the development process of the child. BACKGROUND The child chosen for this child observation paper is a nine month old maleRead MoreObservation 1 Physical Development946 Words   |  4 PagesObservation 1 Physical Development Date 9/10/2012 Time 11.00am Number of children present 1 Number of adults present 2 Permission obtained from mother Physical Development: Physical development: The growth and development of the body’s muscles, bones, energy systems, and the nervous system. Description of setting: This observation took place at the TC home. Immediate context: In the main living room there is lots of cushions around the room, there is wooden floors and theRead MoreStrategies For The Study Child788 Words   |  4 Pagesa strong sense of self (identity). Additionally, Annika needs to be supported and exposed to various scenarios that will assist her to make decisions and direct her own play without forcing or dictating to others (abilities). Support strategies for these two aspects will now be discussed. 1. Annika continues to learn through play in order to discover and strengthen her sense of self (identity): Both Annika’s parents have an extremely busy work schedule due to holding such high-regarded roles withinRead MoreYoung Girl With High Functioning Autism That Has Issues With Her Emotions And Effective Communication Essay1225 Words   |  5 Pagesautism that has issues with her emotions and effective communication. For my research, I used observations of the child, interviews with significant people in her life, like her parents and teacher among others, books and the internet. The child can function in an inclusive classroom with the proper guidance and instruction. Introduction I did a case study on a 4 year-old girl with high functioning autism named â€Å"Sabrina Smith†. She has difficulty communicating with her family and peers and often becomesRead MoreMy Observation Of Children During Family Settings981 Words   |  4 PagesDemographics For my observation of children in family settings, I observed my nephew Maison inside his home. This observation occurred on October 24, 2015 from 6:00-8:30. This observation took place in their home on a school day so no major activities in the home were going on at this time. It was an average day for the family where the children were picked up from after school daycare due to the fact that both parents are working. During the observation, Maison’s entire family was home. These included

Wednesday, May 6, 2020

The Rosewood Films Depictions of the Rosewood Massacre

Racial tension between African Americans and whites caused an excessive amount of violence in the city of Rosewood. Citizens of Rosewood, Florida were victims of racial violence in 1923, which lead to eight documented deaths in the city. The city of Rosewood took a turn for the worst on January 1, 1923 when Frances â€Å"Fannie† Taylor claimed that she was assaulted by an African American man who enter her home without invitation. Many of the African American families that became involved knew that Mrs. Taylor was not telling the truth. Fannie lied to the people of Rosewood to fabricate the truth of her having an affair with another man. The man that assaulted her was not an African American; it was Fannie Taylor’s lover. Because of the lie, the city of Rosewood was instantly torn into pieces. The Rosewood massacre was not a well known historical event. To bring awareness to an important part of African American history, John Singleton decided to create a motion picture based on the Rosewood events. The movie displays the town that was filled with racial prejudice. It shows the many injustice attacks on the African American community. John Singleton did an exceptional job bringing the horrific racist events of 1923 in Rosewood, Florida to the eyes of billions. In the movie, a fictional hero was created. His name was Mr. Mann. Mann helped save many blacks that had no idea as to what they should do. Mann helped the surviving members of the Carrier family, the women and

Tuesday, May 5, 2020

The Increasing Gap Between the Wealthy - MyAssignmenthelp.com

Question: Discuss about theIncreasing Gap Between the Wealthy and the Poor. Answer: Introduction: Rich is becoming richer and Poor are becoming poorer. The issue of integrating gap between the wealthy and poor has always been an issue of serious concern. This gap is because of the income inequality, the variance between the incomes of people in Australia is immense which in turn leads to enhanced gap between the rich and poor strata of the nation. A research has proved that the twenty percent of the total population of the nation receives half of the total population of the Australian continent, whereas on the other hand, the poor population has received just four percent of the national income(Schipp., 2016). Mark McCrindle, social demographer, through his analysis of Australian Bureau and statistics wealth and income data has stated that Australia is on the verge of losing its image as the continent or land of the middle class. If one goes through the statistics available the wealth of the top people in Australia has integrated by 28 percent from 2004 to 2012. On the other hand the poor strata have just grown by 3 percent. Better job opportunities were created in order to counter the inequality, but the inappropriate and unequal wages contributed to increase the gap. Australia has embraced the path of sustainable economic growth for the last twenty years. Income helps up to plan the consumption and living standard of a household(Judith., 2015). There had existed an appropriate time in the history of the Australian continent when the economic life, houses and every other asset were affordable. There was a time when loans could be easily waived off on an individuals salary. In comparison to the past, the income of approximately quarter of families has declined. According to a survey, 46 percent of the population has income above $ 100,000, whereas, 17 percent of the families have an income under $ 40,000 which has decreased according to the statistics from the past. The Australian household lifestyle has depicted enhancement in the style of living by 1.9 percent, but is predicted to grow by just 0.2 percent in the coming years and huge income drops are expected to take place in Australia. The OECD reports state that half of the creation of jobs in the country is that of non-standard work ever since the mid-1990s. Beneficial factors and the effective tax regimes have come to a decline, according to the past records of the coun try(Anna., 2017). This widening gap between the two sections of the country will affect the growth of the nation. This gap has led to varying significant of people in the society. The poor people find it difficult to match up the level and living standards of the rich strata which in turn degrades their opportunity for a clear level of prosperity in the society. Due to this gap new habits and rituals are coming up which is ultimately increasing the gap between the rich and poor people. The OECD report states that the wider gap in the education system of the country has led to weaker work force. These are some of the problems that are being faced, but they can be easily tackled if all the citizens are provided with a fair opportunity for education and healthcare. It is essential for the growth, betterment and prosperity of a nation fill up such gaps and provide everybody with the chance to live in comfort, according to the hard works they put in to lead through(Sarah., 2014). Some of the major named reasons for this widening gap are namely, job insecurity. In a survey conducted regarding the same it was found out that one out of every other three persons was insecure about his/her job, which is 7 percent more than the statistics from the last survey. Around 37 percent people stated the difficulty in finding a new job in case of job loss or unemployment. 60 percent of the part time employees demanded an increase in the working hours and the rest 70 percent demanded a regular job. A cut in wages, due to numerous reasons is another factor contributing to this enhancing gap. In the social scenario the amount of income received plays a vital role to maintain the balance in the society. In 1950s the gap has started widening up and currently the gap is at its top point. Such inequalities within a nation further press the economic matters and in turn affect the productivity, which ultimately can lead to financial crisis in an economy. Hampering the labor growth can yield economic instability in a nation(Anne., 2015). Health is an issue that needs to be managed appropriately as if an individual isnt mentally, socially and physically healthy, he/she cant add on to the productivity. The gap often leads to such factors which affect the health of the bottom population. Educational opportunities should be made available for all the people of the nation as it will lead to skilled labor force. The education can help citizens with availing better job opportunities and yielding productive capacity(Lenore., 2015). Inequalities can lead to the hampering of investments being made and the political and economic stability across the country. It is visible that the rising impact of the rich people in the society has made an effect on the financial benefits of the po or and middle class and has in response turned down the long and short term growth. Such inequalities lead to the destruction of social and trust factors which hamper the investments being made. Inequality between the rich and poor make the solving of disputes even more difficult. It acts as an obstacle in the conflict, economics, which can in turn degrade the opportunities available for the citizens(Michael., 2013). It was in the news that the richer strata of the Australian continent earn five times more than the people at the bottom line. The richer strata are the owner of 70 percent of the wealth of the bottom 20 percent(Will., 2015). The report stated that despite the efforts put in by the government in order to decrease the gap like the creation of more employment opportunities and the enhancement of wages for the workers. But, all the advantages have been again availed by the wealthier strata of the Australian continent which clearly depicts that the richer population is getting richer whereas, the poor are getting no benefits(Peter., 2014). Conclusion: The need of the hour in the Australian continent is social justice in terms of economic layout and social scenario. In order to eradicate this widening gap between the wealthy and the poor requires revolutionary transformations in the capitalism model(Federico., 2014). The unorganized split of wealth in the population needs to be analyzed and tackled appropriately in order to avoid the worst comings in the future. Bibliography Anna., P., 2017. The Sydney Morning Herald. [Online] Available at: https://www.smh.com.au/business/workplace-relations/divide-between-rich-and-poor-in-australia-is-growing-20170203-gu5bkw.html [Accessed 8 may 2017]. Anne., H.D., 2015. PARLIANMENT of AUSTRALIA. [Online] Available at: https://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/pubs/BriefingBook44p/EconEffects [Accessed 8 may 2017]. Federico., C., 2014. Australian policy online. [Online] Available at: https://apo.org.au/node/42752 [Accessed 8 may 2017]. Judith., I., 2015. The Sydney Morning Herald. [Online] Available at: https://www.smh.com.au/federal-politics/political-news/gap-between-rich-and-poor-growing-and-will-get-worse-report-20150914-gjlxhf.html [Accessed 8 May 2017]. Lenore., T., 2015. Theguardian. [Online] Available at: https://www.theguardian.com/australia-news/2015/jun/21/australian-inequality-rising-as-top-20-increase-wealth-and-income-report [Accessed 8 May 2017]. Michael., F., 2013. Australia Government The treasury. [Online] Available at: https://www.treasury.gov.au/PublicationsAndMedia/Publications/2013/Economic-Roundup-Issue-2/Economic-Roundup/Income-inequality-in-Australia [Accessed 8 may 2017]. Peter., W., 2014. The Conversation. [Online] Available at: https://theconversation.com/income-and-wealth-inequality-how-is-australia-faring-23483 [Accessed 8 may 2017]. Sarah., W., 2014. The Sydeney Morning Herald. [Online] Available at: https://www.smh.com.au/federal-politics/political-news/oxfam-survey-finds-widening-gap-between-australias-rich-and-poor-20140615-3a5vd.html [Accessed 8 may 2017]. Schipp., D., 2016. news.com.au. [Online] Available at: https://www.news.com.au/national/income-inequality-means-were-no-longer-the-land-of-the-middle-class/news-story/90821b0b0b013babd29d2ac4c5dfd304 [Accessed 8 May 2017]. Will., O., 2015. NEWS. [Online] Available at: https://www.abc.net.au/news/2015-06-22/acoss-report-finds-rich-getting-richer-much-faster-than-poor/6563020 [Accessed 8 May 2017].

Saturday, April 4, 2020

There Are No Children Here Essays - There Are No Children Here, Gang

There Are No Children Here The West side of Chicago, Harlem, Watts, and almost any major city in the U.S., What do all of these areas have in common? These areas, along with many others have become mine fields for the explosive issues of race, values, and community responsibility, led by the plight of the urban underclass. Issues such as violent crime, social separation, welfare dependence, drug wars, and unemployment all play a major role in the plight of American inner-city life. Alex Kotlowitz's book; ?THERE ARE NO CHILDREN HERE?, confronts America's devastated urban life; a most painful issue in America. Kotlowitz traces the lives of two black boys; 10-year-old Lafayette, and 7 year old Pharaoh, as they struggle to beat the odds growing up in one of Chicago's worst housing projects. Their family includes a welfare dependent mother, an alcoholic-drug using father, an older sister, an older brother, and younger triplets. Kotlowitz describes the horrors of an ill-maintained housing project completely taken over by gangs, where murders and shootings are an everyday thing. He succeeds at putting a face on the people trapped inside the housing projects with virtually no hope of escape. One can truly feel a sense of great loss for the family, and a great deal of hope for the two young boys. You can truly feel yourself hoping that things will work out for them, and you can really feel like you know these young men on a personal basis. All through their lives Pharaoh and Lafayette are surrounded by violence and poverty. Their neighborhood had no banks, no public libraries no movie theatres, no skating rinks or bowling allies. Drug abuse was so rampant that the drug lords literally kept shop in an abandoned building in the projects, and shooting was everywhere. Also, there were no drug rehabilitation programs or centers to help combat the problem. Police feared going into the ghetto out of a fear for their own safety. The book follows Pharaoh and Lafayette over a two year period in which they struggle with school, attempt to resist the lure of gangs, mourn the death of close friends, and still find the courage to search for a quiet inner peace, that most people take for granted. Kotlowitz portrays what life is like at the bottom, and the little hope there is for the poor which makes it virtually impossible for the young lives in the ghetto to grow up. Also at the same time Kotlowitz wants the reader to know that not all hope is lost, but something must be done before hope is truly lost. The mother was portrayed as a woman who lacked self-esteem, and was not prepared to enter the job market. She had no skills, and was completely dependant on welfare. She also liked to gamble, and sometimes actually won. The biggest and most pervasive problem of the young children's lives was the dominance of the gangs at Henry Horner Homes. The gangs were dedicated to violence, and children were compelled to join for their own safety. The gangs in the Homes were of a retreatist sort, in that they focused mainly on drugs, and their gang related activities, and would use whatever force necessary to keep their activities afloat. Drugs were a part of the boys every day life, and brutal drugs wars surrounded their apartment. With the gangs so close to home, the children had a constant fear of death. The violence never let up. The children lost many friends to either drugs or the gangs. When they lost a friend, they felt sorrow for a while, but reality would set in, and they knew that it w as an every day part of their life. It was these feelings that made the Rivers children hesitant to get close to anyone. If they did not get close, they would not feel the loss as much. It made them feel that there was no way out, and death was their unyielding fate. Their feelings of loss also caused them to have a tremendous distrust in the police. In a way they looked to the police for guidance, but at the same time did not trust them. Residents of the homes

Sunday, March 8, 2020

The Changes in Health Care for Retired Workers essays

The Changes in Health Care for Retired Workers essays Health care for retired workers is always changing and its not for the better. The workforce had changed remarkably causing retirement plans to decline. Current workers are being pressured to pay more out of pocket. These retirees are rarely helped out and when they are, it isnt enough. It is difficult for employees to provide the best health care for their workers and remain competitive in todays economy. Employers are providing health care to stay competitive in the marketplace, but this trend is dissipating. These employers are finding it increasingly difficult to provide these benefits to retired workers. The employers are focusing on health care costs and are not able to absorb additional cost increases. Current law severely limits employers ability to pre-fund retires health care obligations. As a result of this law, employers have capped contributions, increased co pays, increased employee contributions, or even eliminated benefits all together. The Employee Retirement Income Act states that employers are not required to provide any health care coverage to their workers, either active or retired. Although, once they decide to offer benefits they must follow certain requirements. Currently, only thirty five percent of employers sponsor retiree health care, leaving many with out access. Employers who offer medical coverage for retirees went from forty percent in 1993 to twenty pe rcent in 2001. That leaves more than three quarters of the retired population with out health coverage. Health care costs are rising for both active and retired employees and new pension funding requirements have wiped out corporate benefits budgets. This leaves less money for the retiree to live healthy in a world that is to expensive. Retirees depend on health care from current or past employers, and its the only likely source of affordable reliable coverage. In 2003 cost for employer plans increased about fifteen perc...

Friday, February 21, 2020

Math 157 course Essay Example | Topics and Well Written Essays - 750 words

Math 157 course - Essay Example This research will begin with the statement that mathematics is a fundamental tool that is used to solve puzzles occurring in nature. Thus teaching mathematics not only provided learners with a useful concept but also problem-solving strategies. Data analysis is a fundamental concept that we covered in the first week through the course. This involves processes used to inspect, clean and model data to derive useful information.   In this context, data refers to raw information obtained from the field or a real experiment. Real data is more complex than data used for class practice. Complexities of real data required us to apply data analysis software such as SPSS and Stata. Moreover, data collection is a costly procedure and, therefore, statisticians require the knowledge of probability. The concept of probability explains the outcomes of random events and the likelihood of certain occurrences. These concepts are useful in determining samples in a field study or a survey. The concep ts of probability are established on the existence of a sample space consisting of possible outcomes and ratios that represent each possibility. For example, a coin tossing experiment has two outcomes and a sample space sample S = {H, T}, with P (H) =P (T) =  ½. In the third, fourth and fifth week we covered the concepts of geometry. Geometry provides essential mathematical concepts that are used to describe the size, shape and relative position of an object.

Wednesday, February 5, 2020

Plato's Meno Research Paper Example | Topics and Well Written Essays - 1500 words

Plato's Meno - Research Paper Example One very significant part of the Meno is that which demonstrates the Theory of Recollection, or the idea that â€Å"what appears to be learning something new is really recollecting something already known† (Cohen, University of Washington), or what is known as the doctrine of anamnesis, which means that â€Å"all learning is [merely] recollection† (Samet, Stanford Encyclopedia of Philosophy). This theory is what Socrates exactly proves to Meno when the latter asks, â€Å"†¦on what lines will you look, Socrates, for a thing of whose nature you know nothing at all?† (Plato, Meno, 80d2). The â€Å"thing† that Meno is referring to in his question is actually virtue, for this is the concept upon which the dialogue is particularly focused. Virtue, in fact, is the whole point of the discourse. However, the discussion has temporarily shifted to the Theory of Recollection in the middle part of the dialogue. This begins when Socrates has concluded that â€Å"[ no one] can know a part of virtue when he does not know virtue itself† (79c1), which means that neither Meno nor anyone else knows virtue. Upon hearing this, Meno then begins to ask Socrates a rather common sense question: How can the latter know that this is not virtue the former has been talking about early on in the dialogue when the latter himself does not know what virtue is? Socrates’ reply to this rather sarcastic accusation is the Theory of Recollection. In demonstrating the theory, Socrates first attempts to explain to Meno the roots of the theory by stating that it came from priests and priestesses (81a8) and poets â€Å"of heavenly gifts† (81b1), and that these people all say that â€Å"the soul of man is immortal† (81b1). Socrates then concludes from this premise that the soul â€Å"has been born many times, and has [therefore] beheld all things both in this world and in the nether realms [and therefore] has acquired knowledge of all and every thing† (81b1). Socrates then adds that since the soul has already learned everything, then â€Å"there is no reason why we should not, by remembering but one single thing – an act which men call learning – discover everything else† (81d1). Now, if one goes back to Meno’s accusing question - How can you look for something whose nature you do not know? – Socrates’ answer is that one actually already knows everything but simply cannot remember anything. In short, everyone knows what virtue is, only that not everyone can remember. According to Socrates, aside from courage and determination in searching, â€Å"research and learning† are needed in order to remember. Moreover, Socrates even equates â€Å"research and learning† with â€Å"recollection† (81d1), which means that, for the philosopher, the learning and the remembering are the same, and that everything is simply all remembering. After Socrates calls on the boy, what follows is an elenchus, whose literal meaning is â€Å"refutation† but may actually mean a type of â€Å"cross examination† (Ionescu 10). One purpose of the elenchus is for Socrates â€Å"to help his listeners discover for themselves the inadequacy of what they hold as true† (Johnston). A second purpose, however, is, according to Socrates himself, is for an individual to â€Å"[find] out the truth of the matter [and to] push on in the search gladly, as lacking knowledge† (Plato, Meno, 84b7). In short, the first purpose of this elenctic discourse is for someone to discover his ignorance and for him to search for the

Tuesday, January 28, 2020

Analysis and Detection of Metamorphic Viruses

Analysis and Detection of Metamorphic Viruses Chapter 1 Introduction 1.1 Motivation Metamorphic Viruses are very special type of viruses which have ability to reconstruct into entirely new offspring which is completely different than the parent; Main object to use these techniques to rebuild itself is to avoid detection by Antivirus Software. Although for the time being some well known metamorphic viruses are detectable, but it is predicted that in future we might face problem of similar viruses those would be capable of changing their identification and perform malicious tasks. Our objective in this thesis is to perform an in-depth analysis of metamorphic code, and evaluate some best practices for detection of metamorphic viruses. 1.2 Outline This document has been divided into five chapters; first two chapters are for introductory purpose it provides basic information about viruses in Chapter 2 we have tried to give some details about virus evolution how metamorphic viruses came into existence. Chapter 3 includes detailed information about metamorphic Virus, Formal definition, Core components of Architecture and some explanations from a virus writer about metamorphic viruses. Chapter 3 deals with some of techniques which are being used by metamorphic viruses and what advantages these viruses have using those techniques. Chapter 4 contains different type of detection methodologies used to detect metamorphic viruses. It also contains sample code from different metamorphic viruses for their feature comparison. Chapter 2 Computer Virus Introduction 2.1 Introduction The term Virus was first described by Dr. Fred Cohan in his PHD thesis during 1986[1] although different type of computer malware where already exited that time but the term was specifically introduced by Dr. Fred. Thats why in may research papers he is considered the father of Virus Research [2]. According to his formal definition as virus A program that can infect other programs by modifying them to include a possibly evolved copy of itself[1] Based on this definition we have taken some pseudo code of Virus V from his research [25]. program virus:= {1234567; subroutine infect-executable:= {loop:file = get-random-executable-file; if first-line-of-file = 1234567 then goto loop; prepend virus to file; } subroutine do-damage:= {whatever damage is to be done} subroutine trigger-pulled:= {return true if some condition holds} main-program:= {infect-executable; if trigger-pulled then do-damage; goto next;} next:} This is a typical example of a computer virus, we can divide this virus into three major parts first subroutine which is infect-executable it tries to look for and executable file or any other target file which it wants to infect it contains a loop which tried to append the virus body to with the target file. Second subroutine do-damage is the virus code its self for which virus has been written this is called virus payload upon execution it performs some damage to the system. The third subroutine trigger-pulled is some sort of trigger to execute the virus code it could be some condition based on date or system or file. Main code of virus is that once the condition is met we it should append itself to the target file and perform something. If we evaluate this definition modern viruses cannot be considered as virus because there are several different type of viruses which are not performing any harm such as â€Å"Co-Virus†, their main target is to help the original virus by performing such tasks so the execution of original virus could be performed without being detected. Peter Szor has redefined this definition [2] as â€Å"A computer virus is a program that recursively and explicitly copies a possibly evolved version of itself.† This definition is also self explanatory, as the author suggest it recursively and explicitly search for the target files and then infect them with virus code to make possible copies. As we are all aware virus is special kind of malware which always requires a user attention to propagate such as either he access the infracted file or tries to execute infected files. Grimes[26] append this definition with boot sector information and other methodologies as Viruses are not limited to file infections only. 2.1.1 Different Type of Malware In this section we will try to discuss some type of malware which like virus but they are not virus. This section is for information purpose only. Viruses its self could be of different kind based on their activity we can define their category, such as boot sector virus, File Infection Virus or some of advanced Macro Viruses which are used inside Microsoft Office documents to automate the process. Basically all virus follow the same process of infection which is described by Dr. Fred Cohen in V Sample Virus. We will define some of advanced code armoring techniques in Section 2.2. 2.1.1.1 Trojans Trojans are very famous backdoor malware some time they are not considered as virus as their main objective is to let attacker gain access to the target machine without getting noticed by the user. Their main objective is not only to gain access but it could be executing some sort of malicious code. Origin of their name is from Greek History where a giant horse was built to gain access inside the castle and transport soldiers through that horse. Same technique is used with Trojans they tricked users by displaying something on screen and behind it is doing something else. Trojan does not infect files or attach their code to other files usually they contain some sort to joiner utility which help users to embed their code or application inside the Trojan. Trojans can used to gain access to infected systems, mounting share drives or disturbing network traffic through Denial of Services attacks. Some famous examples of Trojans are Netbus, Subseven, Deep Throat ,Beast etc. Some remote administration Trojans can have their client side which can be used to communicate to the infected computer. Above image is Client side of Beast Trojan which can perform so many operations on the target machine once it is connected. 2.1.1.2 Spyware and Adware Spyware are very common problem of todays internet user. They are used to get information about users and monitor their activity with or without his knowledge. Till now antivirus companies are unable to define detection and removal of spyware software because there are some famous companies who are selling spyware software to monitor user activities and they are getting legal support to protect spyware from getting removed by antivirus. With spyware it is quite possible that without user knowledge they transport all user information and activities to some monitoring email address. There is some sort of spyware which are only used to get all key press events by users whatever he is typing or writing in email or entering password. It will be recorded and based on the software settings it can be sent to email or saved on disk. Adware are slightly different than malware they collect information about users internet activity and based on that they tries to display target advertisement to the users or install some software on users system which displays unwanted advertisement to the user. 2.1.1.3 Rootkits Root kits are specially crafted virus; their main objective is to gain administrative level access on the target system. Usually they contain some virus or script to execute the malicious code on target machine, enable root level access for the attacker and hide the process, allowing attacker full access to machine without getting noticed. Detailed information about root kits is beyond the topic. Based on their functionality we can say that they hijack the target system and monitor all system calls. They are now capable of patching kernel also so attacker can get higher level of permissions. Security researchers have demonstrated a new technology called â€Å"Blue-Pill†[27] which has helped them creating a super root kit without getting any performance degradation or system restart. They have used virtualization support inside processor to run in a virtual machine mode. 2.1.1.4 Worms Worms are considered as the most advanced version of malware unlike virus they do not require any user interaction to propagate, but like virus they can replicate their code by infecting other target files. They can be combined with Trojan horses to execute on target machine. But unlike virus they are always dependent on some software for their execution without that specific software they cannot perform their actions. These try to exploit vulnerabilities of software or operating system to perform malicious actions. Love Bug is one of famous worm example it used Microsoft Emailing software to distribute its copies. CodeRed and Nimda are some other examples which used Microsoft protocols to distribute and infect other systems. 2.2 Virus Evolution Viruses are evolved throughout the time thats why today we are dealing with the most advanced type of viruses of all time. Most of time researchers are challenged by the virus writers to detect their created virus and create vaccine for it. In the following section we will describe some of the techniques which are used by virus to satisfy the main objective of Virus writer that is â€Å"Make Virus Completely Undetectable†. From time to time they have used different techniques in this section we will discuss those techniques and how those techniques lead toward metamorphic viruses. 2.2.1 Encryption Encryption is the main sources of information hiding. It has been used some centuries the same way virus writers are using encryption to avoid detection by antivirus. A decryptor is attached with the main virus code to decryp the virus body and performs the action. lea si, Start ; position to decrypt (dynamically set) mov sp, 0682 ; length of encrypted body (1666 bytes) Decrypt: xor [si],si ; decryption key/counter 1 xor [si],sp ; decryption key/counter 2 inc si ; increment one counter dec sp ; decrement the other jnz Decrypt ; loop until all bytes are decrypted Start: ; Encrypted/Decrypted Virus Body The above code is from [5] for Cascade Virus. In the same article the author has suggested four major reasons why some virus writer will use encryption: Prevention against code analysis: With encryption it becomes quite difficult to disassemble the virus code and examining the code for instructions which can be quite interesting for the virus researchers. For example if someone is performing specific operations such as calling INT 26H or calling specific Crypto API. By using encryption users will bet get an idea about what are the intentions of users because most of file contents will be encrypted and it is quite possible it may contain some Junk Code also. Making disassembling more difficult: Virus writers can used encryption not only to make it difficult they can also us to make this process more time consuming and difficult they can include more junk code inside or wrong instruction so the researchers will not be able to perform static analysis of code and get some confusing idea about the code itself. Making virus temper proof: Same like real life business products some virus writers do not want their virus code to be used by others with their name or generate new variant from their code because it is quite possible someone will decrypt virus and again generate another virus by modifying the code. This is also some sort of prevention from reverse engineering the virus. Avoid detection: This is the core objective of virus write to evade detection by Anti Virus software, based on time to time new techniques have been developed in following section we will discuss some of these techniques how they use encryption. Mostly the virus contains the decryptor within their code this had helped the Virus researchers to detect viruses based on their decryption signature. But this method is not very successful as it may raise an exception in case some other software tries to use similar methodologies to decrypt data. As time evolved they have developed some new interesting techniques. Most of time in assembly they use simply XOR ing operations help then in decrypting virus code. For example in above code of Cascade Virus it is using XOR to decrypt each byte of virus code unless all body is decrypted. With XOR they have some advantage first of all it is very simple operating and second XOR ing the same values twice yields the first value this operating can help them in decryption and making it more confusing during static code analysis. Peter Szor has described some of these strategies which can be used to make process of encryption and decryption more difficult [2-Chapter7], according to him: Virus Writers are not require to store decryption key inside the virus body some advanced virus such as RDA.Fighter generate their decryption key upon execution. This technique is called Random Key Decryption. They use brute force method to generate key during run-time. These Viruses are very hard to detect. It is under control by the attacker how he wants to modify the flow of decryption algorithm, it can be forward or backward or it is also possible to have multiple loops inside a single body. Or multiple layers of encryption. Second most important factor is the key size which can make decryption process more difficult based on the key length. Obfuscation is another factor involved in it. In Metamorphic Viruses Similie.D was one of the virus which used non-linear encryption and decrypts the virus body in semi-random order and most important thing is that it access the encrypted portion of virus body only once.[3] There is another factor involved in virus encryption such as virus is encrypted with very strong algorithm such as IDEA virus [9] which contains several decryptors. Main source of interest is that it is quite easy to detect virus and remove it but it is extremely difficult to repair the infected file as on second layer of IDEA it uses RDA for key generation. Microsoft Crypto API is part of Windows operating system. This can also be used for malicious purpose, Virus writers can use Crypto API to encrypt data with some secret key or call their API through virus code to perform encryption. It is also difficult to detect this because other program such as Internet Explorer also uses this API to encrypt transmission over secure channel. There is another variation in decryption which was demonstrated by W95/Silcer Virus that the first portion of virus which is already decrypted force Windows Loader to relocate infected software images once they are executed loaded in to memory. For the purpose of decryption the virus itself transfers relocation information. There are other possibilities such as some virus use file name as their decryption key in such case if file name is modified virus cannot execute and there is possibility we will not be able to recover that file after infection. Other methods such as it can use decryptor code itself as decryption key it help them in such condition if someone is analyzing code or virus execution is under a debugger it will raise an exception. 2.2.2 Oligomorphism With encrypted virus it is quite possible to find the decryption mechanism to challenge this situation virus writers implemented a new technique to create multiple decryptors and use them randomly while they are infecting other files. Major difference between Encryption and Oligomorphism is that in encryption is uses same decryptor for encryption purpose while in oligomorphic virus have multiple decryptors and they can use any of them during the process. Whale Virus was first of this kind to use multiple decryptors. W95/Memorial[7] is one of very famous examples of oligomprphic viruses it uses 96 different type of decryptors. mov ebp,00405000h ; select base mov ecx,0550h ; this many bytes lea esi,[ebp+0000002E] ; offset of Start add ecx,[ebp+00000029] ; plus this many bytes mov al,[ebp+0000002D] ; pick the first key Decrypt: nop ; junk nop ; junk xor [esi],al ; decrypt a byte inc esi ; next byte nop ; junk inc al ; slide the key dec ecx ; are there any more bytes to decrypt? jnz Decrypt ; until all bytes are decrypted jmp Start ; decryption done, execute body ; Data area Start: ; encrypted/decrypted virus body Sliding key feature can also be noted as with this feature it is quite possible to change instructions for decryptor. If we get other instance of same virus it has little variations there is a little change in loop instruction Another Variant of W95 Memorial mov ecx,0550h ; this many bytes mov ebp,013BC000h ; select base lea esi,[ebp+0000002E] ; offset of Start add ecx,[ebp+00000029] ; plus this many bytes mov al,[ebp+0000002D] ; pick the first key Decrypt: nop ; junk nop ; junk xor [esi],al ; decrypt a byte inc esi ; next byte nop ; junk inc al ; slide the key loop Decrypt ; until all bytes are decrypted jmp Start ; Decryption done, execute body ; Data area Start: ; Encrypted/decrypted virus body . It has been mentioned [2] that a virus is only called Oligomorphic if it can mutate its decryptor slightly. Detecting Oligomorphic virus is extremely difficult because as they have random decryptors it is quite possible that our virus detecting mechanism will not able to detect if there are quite large number of decryptors. 2.2.3 Polymorphism The term Polymorphism came from Greek origin Poly means multiple and morphi means forms. We can say that these types of viruses can take multiple forms. They are much advanced than their ancestors like Oligomorphic virus they rely on mutating their decryptor in such a way so it generates number of variation of same virus. Core of their operation is their engine which helps them in mutating. For each infection their mutation engine generates a completely new instruction set for decrypter. This process help them in generating a completely new virus having exact functionality as their parents but the sequence of instruction is entirely different from others[28]. Antivirus software are challenged by their method as every time a new file is infected it generated a new encryption code and decryptor so those software who are relying on virus decryptor signature will not be able to detect those viruses as new offspring are completely different in decryptors signature. Research has already shown that it is possible for a mutation engine to generate several million different type of decryptor code for new viruses [28]. Dark Mutation Engine is one of very famous example of polymorphic virus following code has been taken from [2]. mov bp,A16C ; This Block initializes BP ; to Start-delta mov cl,03 ; (delta is 0x0D2B in this example) ror bp,cl mov cx,bp mov bp,856E or bp,740F mov si,bp mov bp,3B92 add bp,si xor bp,cx sub bp,B10C ; Huh finally BP is set, but remains an ; obfuscated pointer to encrypted body Decrypt: mov bx,[bp+0D2B] ; pick next word ; (first time at Start) add bx,9D64 ; decrypt it xchg [bp+0D2B],bx ; put decrypted value to place mov bx,8F31 ; this block increments BP by 2 sub bx,bp mov bp,8F33 sub bp,bx ; and controls the length of decryption jnz Decrypt ; are all bytes decrypted? Start: ; encrypted/decrypted virus body Idea behind making a code engine was that in beginning virus writing was very difficult and time consuming so the experienced virus writers helped novice in virus generating by giving them code mutation engine with little modification they can use this engine within their own virus code and it can perform same operations. Based on the virus type and engine capabilities it can enhance the virus functionality there are several viruses which can use Microsoft CryptoAPI in their polymorphic operations. Marburg is also one of very famous polymorphic virus which has entirely different mechanism in file infection. till now we could think that infection method if polymorphic virus could be same just decryptor is changing but that virus introduced some of new methodologies like key length in encryption could be different and each file which it is infecting is using different encryption mechanism.[8] Start: ; Encrypted/Decrypted Virus body is placed here Routine-6: dec esi ; decrement loop counter ret Routine-3: mov esi,439FE661h ; set loop counter in ESI ret Routine-4: xor byte ptr [edi],6F ; decrypt with a constant byte ret Routine-5: add edi,0001h ; point to next byte to decrypt ret Decryptor_Start: call Routine-1 ; set EDI to Start call Routine-3 ; set loop counter Decrypt: call Routine-4 ; decrypt call Routine-5 ; get next call Routine-6 ; decrement loop register cmp esi,439FD271h ; is everything decrypted? jnz Decrypt ; not yet, continue to decrypt jmp Start ; jump to decrypted start Routine-1: call Routine-2 ; Call to POP trick! Routine-2: pop edi sub edi,143Ah ; EDI points to Start ret There are examples of other viruses which shows that 2.2.4 Metamorphism After all these evolution in virus, now we are dealing with one of the most advanced version of these viruses. Polymorphic viruses were really challenging to detect and remove from system, but it was just a matter of time Researchers tried to build solutions against polymorphic viruses. Viruses writer tired to work on something really amazing a virus which would be able to rebuild itself with same functionality but entirely different from the parent. This proposed solution was first implemented in W32/Apparition, If it finds a compiler in some machine it tries to rebuild itself into completely new shape. Following code has been taken from [2] two different variants of W95/Regswap . This virus was first of its kind to implement metamorphism in shifting registers. a.) 5A pop edx BF04000000 mov edi,0004h 8BF5 mov esi,ebp B80C000000 mov eax,000Ch 81C288000000 add edx,0088h 8B1A mov ebx,[edx] 899C8618110000 mov [esi+eax*4+00001118],ebx b.) 58 pop eax BB04000000 mov ebx,0004h 8BD5 mov edx,ebp BF0C000000 mov edi,000Ch 81C088000000 add eax,0088h 8B30 mov esi,[eax] 89B4BA18110000 mov [edx+edi*4+00001118],esi Although till now there is no big incident reported due to metamorphism as normal computers do not contain such utilities like compilers or scripting support to rebuild virus but this situation could be very dangerous for Linux machine where scripting languages and compilers are enabled by default. Upcoming versions of Microsoft Windows are also having support of .Net and MSIL which is capable of generating such virus very easily MSIL/Gastropod is one of famous example of metamorphic virus. In upcoming section we will describe main architecture of metamorphic viruses. Chapter 3 Metamorphic Virus Architecture The idea behind metamorphic legacies came from the same biological aspect that the parents are mutating and generating new offsprings which are entirely different than their parents but they are performing the same actions as their parents were doing. Virus Writers have adopted the same idea and implemented in the form of metamorphic virus. Power of any virus relies in its power to bypass the Antivirus Scanner and perform actions. Usually constants in their virus body, specific register allocation, patterns or heuristics scanning are some of the common ways to detect a virus. Metamorphic Viruses are one of those kinds which are capable of transforming their code into new generation, these viruses are capable of changing their syntax but their semantics remain same throughout generations. Polymorphic viruses were difficult to detect but their main weakness was their decryption mechanism once researchers found their decryption methodology and add this as a signature to antivirus products through this they were able to detect full generation of polymorphic virus but in case of metamorphic virus this approach fails because the syntax of code and mechanism of operation is entirely different throughout generations. They are considered as shape shifters [2] because each generation is entirely different than each other. Metamorphic engines are mostly buggy, this could be our luck that till now there is no perfect metamorphic engine available. It has been reported that metamorphism has been used as a mean of software security the same way it has been used in viruses to for their protection. They can be used stand alone by which they are self generating viruses and capable of performing actions on target system or they could take help from the surrounding environment in downloading some plug-in form internet or generating their new copies. Metamorphic viruses are capable of changing arrangement of their instruction. This ability gives them ability to generate new undetectable virus for examples if a virus contains n number of subroutines it will generate n! different type of generations. In case of BADBoy Virus it has 8 subroutines and it is capable of rearranging its subroutines it can generate 8! = 40320 type of different virus. This grows if number of subroutine increases inside the Virus Body. Above image is a code module of Badboy Virus in file it just need to take care of Entery Point whereregardless of where it is located remaining subroutines are access through jump instructions throughout the code. Zperm is another exam of metamorphic virus the above code sample is from Zperm virus which shows its rearrangement of code. 3.1 Formal Definition This formal definition is presented in [13] according to this definition let à ¡Ã‚ µÃ‚  P(d,p) represented as a function which is going to be computed by a program P in the current environment (d,p) in this case p represents programs stored on computer and d represents data processed. D(d,p) and S(p) are two recursive functions , T(d,p) is a trigger and is an injury condition and I(d,p) is considered as injury condition. In Case of this we can say that pair (v,v) are recursive functions and( v and v) are metamorphic virus if all conditions X(v,v) satisfies. Where T(d,p) ,I(d,p),S(d,p) is entirely different than T'(d,p) ,I'(d,p),S'(d,p). Based on that we can say that v and v are metamorphic virus and they are performing same actions. Polymorphic Virus share their kernel but in metamorphic virus each virus has its own kernel. 3.2 Core Architecture In this section we will discuss major components of metamorphic virus, although there are several other components already explained but architecture represented in [10] is considered as best. According to original author they have divided metamorphic virus in to two categories close-world or open-world. Open World are those who integrate with executing environment and perform some actions such are download some spyware etc. Here we will describe functional architecture of closed world viruses. Most of them perform binary transformation. 3.2.1 Locate Own Code The virus must be able to locate its code from inside the infected file or its own body each time it is transforming into new form or infecting a new file, metamorphic virus which are infecting other files and use them as their carrier must be capable of locating their code from inside the infected file. Mostly in file they use some predefined location of their startup code this location is mostly constant and remains contestant throughout the other generations. There are only few incidents when Engine tries to put dynamic locations. 3.2.2 Decode Once the code of virus is located by metamorphic engine it tries to obtain some sort of blue print information about how to transform. Although this is one of the drawback of metamorphic virus that within them self it they contain their architecture about how they are getting transformed. This information is very critical because this information is further encoded inside body of new virus. This unit can also retrieve information about flags, bit-vectors, markers, hints which will help in building new viruses. There is a drawback of this approach as it is required by the virus engine itself so virus write cannot obfuscate this area. 3.2.3 Analyze Once the core information is gathered there is other information which is very critical for proper execution of metamorphic virus. Without this information transformation cannot be performed. Metamorphic engine must have information about the register liveliness. If it is not available from Decode phase the engine must be capable of constructing it via def-use analysis. Control Flow Graph is also required by transformation phase because this will help in the rewriting logic and flow of the program. Control Flow graph is required in case if the malware itself is capable of generating the code which can shrink or grow in new generations and also it is required to process the control flow logic which is further transformed into code. In the following code it has gather its main idea about code what it is required to perform and it is further transforming it to simplified instructions. 1) mov [esi+4], 9 mov [esi+4], 6 add [esi+4], 3 2) mov [ebp+8], ecx push eax mov eax, ecx mov [ebp+8], eax pop eax 3) push 4 mov eax, 4 push eax 4) push eax push eax mov eax, 2Bh 3.2.4 Transform This unit is most important area of virus as it is capable of generating new virus. Most of virus logic resides here. This unit generate new instruction blocks semantically which are exactly same like its code but syntax is a bit different. Here some sort of obfuscation is also performed, metamorphic engine tries to rename registers , inserts NOP and garbage instructions and reorder the execution of block. Following code block has been taken from their examples in [10]. 1) mov eax, 10 mov eax, 5 add eax,5 2) mov eax, 5 sub eax, 10 mov eax, 1 add eax, 2 sub eax, 8 3) mov eax, 5 add eax, 5 mov eax, 10 4) cmp eax, 5 ja L1 cmp eax, 2 je L2 cmp eax, 5 jb L3 L1 : mov ebx, 3 jmp L4 L2 : mov ebx, 10 jmp L4 L3 : mov ebx, 10 jmp L4 L4 cmp eax, 5 ja L1 cmp eax, 5 jb L2 L1 : mov ebx, 3 jmp L3 L2 : mov ebx, 10 jmp L3 L3 3.2.5 Attach Attach unit it only available in those viruses which infect files and use them as source of replication. Transform unit not only transforms own code but also the code of target file, where it sets some entry point to virus main routine. During the attachment process it also shuffle the code