Monday, September 30, 2019

Menelaus and Helen In ‘The Trojan War’ Essay

Menelaus and Helen are the main characters of the poem, hence, its title. This draws the readers’ attention mostly to the characters rather than to the Trojan myth. The title could have been, ‘The Trojan War’, but rather than doing this, Brooke focused mostly on the main characters, for the poem is more about them, than about the actual happening of the Trojan War. The perspective, and of whose point of view the poem has been written, does not change. It is always from Menelaus point of view of what is happening. Both in part one which describes the scene of the Trojan War, and how Helen has been captured by Paris and is token away from Menelaus, and in part two, which talks about the future, and supposition of how Menelaus and Helen would be years after, it is all Menelaus’ point of view, and not Brookes. The effects of this are that we only have the point of view of one of the main characters, so we do not know how the others felt about the same situation, because Brooke just describes Menelaus’ thoughts and not Helens. It is distinct in the poem that the persona is not Brooke, and that Brooke is simply writing as if he knew what Menelaus thought. This can be told because Brooke writes, â€Å"Menelaus broke To Priam’s palace†, and not â€Å"I broke into Priam’s palace†. The speaker clearly indicates what took Menelaus to this action, his reasons, his feelings, and sensations; Brooke refers to Menelaus’ actions, the scene, as if it were a fact, he does not at any moment of the poem, show his opinion. He is not biased; he simply tells what happens when Helen is captured, as if he were an observer. In the second stanza, it is not Brook’s thoughts, but Menelaus’ feelings towards Helen. It is very clear that Brooke does nto put himself as if he were Menelaus, â€Å"He had not remembered that she was so fair†, he just describes his thoughts as if he knew what Menelaus though about Helen. In the second part of the poem, Brooke analyses the scene and gives his opinion, â€Å"perfect knight†, in the third stanza he continues analyzing, he writes about Menelaus thoughts. So there is a clear distinction between the writer and the persona, we can tell whether or not the character and voice is in the poem or not. Brooke does not only state the facts, he is writing as if he could read Menelaus’ mind and thoughts about his future with Helen, he then goes back to telling the facts and what actually happened when they got old, relating the facts, being omniscient and analyzing what happens, this enriches our comprehension about what is going on. The poem does not have a formal structure. Although we can depict some rhymes at the end of lines, they do not follow a regular pattern. There is also some sense of symmetry, for the stanzas are reasonably the same length. The poem is divided into two parts, the firs one which is a myth and the second one which is the reality. The theme is first presented by a description of the scene, the capturing of Helen by Paris, then, the feelings of Menelaus towards Helen and their lives, following a vision and analysis of the result of the capturing and how Menelaus imagined his future would be, finally, a report on how their lives actually turned out to be. Brooke narrates the scene, he describes Menelaus’ thoughts and therefore does not use speeches in his poem. When there is use of speeches, we know exactly what are on the characters mind, but he does not use them, and we still understand the thoughts of Menelaus because the author does not write of his point of view, but as he were thinking like Menelaus. There are connotations such as when Brooke relates Helens voice as being golden. In this case his intentions are not to say that her voice is made of gold, but this suggests that she has a soft voice, which gives an impression that she is a delicate and elegant woman. Brooke does not literally mean that Helens voice is gold. Brooke does not need to tell the readers that Helen is a feminine woman, because, by saying that her voice is golden, that is already noticed by who reads the poem.

Sunday, September 29, 2019

International Students Essay

It is said that â€Å"challenges are the tools for bringing one’s inner strength out†. Being an International student I strongly believe in the above saying. Challenges faced by International students can be know well-before in the home country or most of the time the challenges are know after visiting the foreign country. Challenges faced by an international student can be compared to a young child going to the school for the first time. The only difference is that, the young child has to be convinced to go to school while, the International student has already made a decision to go to a foreign country. The young child is sent to school to learn new things which would help him/her in the future similarly international student moves out of his/her home country to learn new things by getting the international exposure. The young child, when he enters the school and his parents leave him alone for the school time, the child is nervous. Once the parents leave the child, he is in a new environment where he finds many children same as him and starts observing them. Teacher tries to create the type of environment which would make the children feel good; however the child does not like it-because humans do not like changes. For initial time period every day the child faces a challenge of going to school and then a day comes when he start adjusting himself to the school environment and then the things starts changing. Similar is the case of an international student, most of the international students face challenges in their initial time period usually first 30 to 60 days. When the international student leaves his home country he is nervous because he is going to a new country where things are going to be different and all new. He has lots of excitement of entering in a new country but is still a bit nervous until he starts observing new things. University in which the international student is going to study is the environment in which he is going to adjust. He has a challenge of adjusting himself to the new country, new accommodation, new system of education, new way of leaving, new climate and on top of all this adjusting with new people. As time passes he observes people, makes new friends, learns new things, starts enjoying his studies and learns to manage things on his own. With all the learning, International students do start missing, their family, their friends and all other loved ones back in their home country and sometimes feel like they should go back to their home country rather than staying here and this the most important challenge everyone faces and I am 110% sure each and every International student must have faced this strong challenge, but like that young child every international student convinces his mind and stays back to achieve their goal. Still International students have an ongoing challenge for their bright career. Being an international student, I would salute all international students for facing all the challenges boldly and strongly. I wish all of you Good Luck for future!!

Saturday, September 28, 2019

Hard Work or Talent Essay Example | Topics and Well Written Essays - 500 words

Hard Work or Talent - Essay Example Looking into the history of the US trading market there are a number of individuals whose reputation has span over years while others have popped into the market lately and made it big within a short time span. Making it big in this respect is related to how much one has made or makes in trading deals and the factors that surround their continued successes in making the right choices, deals and bets for that matter. Two characters are to be discussed and offered as examples in supporting the view that talent is the one that matters not hard work. Ken Griffin is the first one to consider and he is the Managing Director/CEO of Citadel Investment Group (Traderslog 2008). Considering its large size, it is important to study a few trends of its CEO. He started trading stock options and funds in his college days. Later developed the fund mentioned above with 4.2 million dollars (Traderslog 2008). Today it stands to be the one of the largest in the world with current management portfolio of 13 billion dollars. John Arnold is the other trader whose mastery of his business is given credit by a cross-section of huge and reputed players (Demon 2009). Taking his background for instance in Enron as a trader it is clear that his fortunes in this line of business were destined for success after scooping over 750 million dollars for the company. He was handsomely rewarded with 8 million dollars bonus. He used the bonus to start his own hedge fund by the name Centaurus Advisors, LLC. Soon he was making billion dollar bets in energy related trading and to the surprise of many he trades few times a year in the most awkward moments of the market. Last year he made slightly less than a billion dollars. In the few times he has spoken he says that he buys things at the time when they are below fair value and sell when he believes they are way above it according to Demon (2009). This simple concept relies more on talent i.e. his innate understanding of concepts

Friday, September 27, 2019

Over sharing of information on social networks Research Paper

Over sharing of information on social networks - Research Paper Example However, a vast majority of the social media users have resorted to sharing too much information that may compromises their integrity (Solomon 111). In essence, oversharing of information is a major problem in most networking sites, especially those with largely unregulated policies. In this regard, many people tend to share inappropriate content or too much personal information in on the social networks and this amount to oversharing of information in such platforms (MOAC 28). This paper therefore, examines the current trends, contributing factors, and impacts of oversharing of information on social networks. Essentially, social media include all the sites in the internet that enable free interaction of people from different parts of the world. In such interaction, people can easily share multimedia files such as videos, images, and texts (Rasquinha). The use of social media enhances communication in a number of aspects. For instance, people can be able to chat online via the social networking sites besides having the option of doing online business. Initially, most people had the perception that social media was a tool that only friends and peers could use to interact especially in various situations (Solomon 111). Nonetheless, the mushrooming of various social networking sites, especially in the 21st century, has seen more individuals, corporates, and organization embrace the use of social media fully. One reason attributed to this is that one is able to reach and communicate to a large audience via social networking sites that in any other channel. The main social networking sites inc lude Facebook, twitter, Instagram, LinkedIn, You tube, Blogger, MySpace, and Flickr (Mergel 87). Although the main use of social networking sites is social interaction, as the name suggests, the integration of various services in such sites has attracted a number of specialized clientele over the years (Rasquinha). In turn, this scenario has

Thursday, September 26, 2019

Production Challenges at Shuzworld Term Paper Example | Topics and Well Written Essays - 1250 words

Production Challenges at Shuzworld - Term Paper Example To increase production efficiency, the managers have the great responsibility of realigning operations including the production flow layout, making changes to the staffing plan, as well as other logistics such as warehousing and distribution. This memorandum looks at three key issues at the Shuzworld namely improvement of the current workflow, the introduction of a new project, and staffing plan in order to increase efficiency and output). The memorandum also looks at some short-term scheduling techniques and rules that can be used to achieve efficient movement of units through Shuzworld production systems. Re: Improvement of the Current Workflow The current workflow in the plant can be improved through the process of assembly line balancing. According to Heizer and Render (2011) in order to produce at a particular rate it is important that management is aware of the current work methods, tools and equipment that are in use. The length of time that each task requires must also so be determined. Additionally, the sequence in which each task should be performed must be identified. The precedence diagram which is shown below illustrates the precedence relationship among the tasks to be performed on the workboot assembly line, the time taken to carry out the tasks labeled A to H, and the tasks which can be done at the same time. Although the current Workboot Assembly Schedule indicates that there are eight tasks involved in the production, it is clear that tasks B and C can be performed simultaneously to save time. The same logic applies to tasks E and F such that performing these tasks simultaneously with further save the time spent on production. The restructuring of the production process in order to allow processing of multiple tasks can lead to reduced production time. Using this logic, 3 minutes will be saved between tasks A and D and the same amount of time saved between D and G. Therefore, the total amount of time saved after restructuring will be 6 minutes . Task C takes 3 minutes but when performed simultaneously with C (8 minutes), it will take 8 minutes to complete both tasks. Similarly, it will take 4 minutes to complete both tasks E and F thereby saving 3 more minutes. Therefore, the total time taken for production of Workboot will be reduced to 40 minutes. The correct number of workstations can be found after making a determination of the cycle time. The calculations are as follows: Cycle time = Production time available/units required = (8hrs/day* 60mins per hr)/48 units per day = 480/48 = 10mins/cycle The cycle time of 10 minutes can then be used to determine the minimum number of workstations as follows: Minimum number of work stations = Total task time (?ti)/cycle time = 46/10 = 4.6 or 5 stations The information suggests that the minimum number of work stations required is 5. However, the cycle time is 10 minutes and so only tasks that can be done in 10 minutes or less can be performed at the same work station. This means th at Task A takes 10 minutes and will be done at one workstation; Task B and C can be done together in a total of 9 minutes at another workstation; Tasks D takes 8 minutes and can be done at another workstation; Tasks E, F and G takes a total of 10 minutes and can be done one workstation while Task H takes 9 minutes and will therefore be performed at another workstation. Therefore, a total of 5 workstations are required. The layout would therefore appear as follows: The most following tasks heuristic were used to assign jobs to

Wednesday, September 25, 2019

Organization Research Paper Example | Topics and Well Written Essays - 2000 words

Organization - Research Paper Example The companies selected for analysis are IBM (manufacturing company. Following Reed (2001): â€Å"Motivation must be understood not as a series of separate "needs" but as the dynamic aspect of the very functioning of a living organism. In other words, any living organism is, in effect, a pattern of intrinsically active and directed relational functioning† (p. 60). These meanings may be expressed in organization writings, thought, or language management, and social context, an organization sustains its own cultural system of symbols and meanings that can be widely shared by organizational members. the main difference between content’ and ‘process’ theories of motivation. is that the latter determines motivation as a cognitive rational process while the former sees motivation as needs satisfaction process. Motivation is the main factors which helps companies to attract and retain top talents. The task of the HR manager is to envision these threats in advance, so he will be able to avoid them, or at least minimize their negati ve impact upon well-being. Although managers do not find it a comfortable activity to dwell on unpleasant events, the future survival of organizations and society, itself, mandates that we try to anticipate worst-case scenarios and develop creative methods to manage them. Motivation programs should be effective and management policies should ensure success and positive outcomes. The main methods used by managers will be goal setting method and the leadership. If too much stress is placed on getting the work done, human motivation will suffer. The main strategies applied to the program will be motivation and inspiring employees, cooperation and support initiatives. If all of the emphasis is placed on workers satisfaction, then productivity will suffer. Further, a HR manager can share this expertise with other managers and employees, so that the total organization expands

Tuesday, September 24, 2019

Explain the difference between an open economy and a closed economy Essay

Explain the difference between an open economy and a closed economy - Essay Example However, opponents believe that more openness leads to loss of jobs, dumping, interdependence among nations, and economic sanctions among others.2 A closed economy on the other hand, is accused of hindering technology transfer and foreign investments although it is appropriate in ensuring protection of local industries. The paper will discuss the numerous differences between a closed and open economy as well as the advantages and disadvantages a country would have by using either of the economic models. Differences between Closed and Open Economies There are numerous distinctions between a closed and open economy. A closed economy is one in which trade is carried out within the borders of a nation or domestically hence the gross domestic product (GDP) is the same as gross national product (GNP). An open economy on the other hand, is one in which trade is carried out within and outside the borders hence the GDP and GNP are not equal but depend on volume of imports and exports.3 An ope n economy is achieved by eliminating the barriers to trade such as tariffs and import quotas. However, most open economies have put some trade barriers so as to protect crucial industries from competition in the world market or to protect consumers against harmful products and also to protect the environment from pollution.4 It can be noted therefore that there is no perfectly closed or perfectly open economy as each has an element of closeness and openness. A closed economy does not allow movement of labour across borders unlike open economy where workers are free to work anywhere in the world. Another distinction is that a closed economy does not allow movement of capital across borders hence investments are domestic in nature and foreign exchange rates do not impact on the economy unlike in an open economy where there is movement of capital across borders. Businessmen can therefore invest in foreign stocks and money markets thus the economy is affected by exchange rates.5 Accordi ng to Jane, sometimes open economies can act as closed economies.6 This is especially so if few members with open economies act as a tightly integrated economic bloc and only trade with each other thus becoming a collectively closed economy. On the other hand, a country cannot produce all the goods and services it requires hence it is forced to import some products. Open economies are characterized with large multinational corporations like starbucks with braches all over the world and this is not the case in closed economies. Advantages and Disadvantages of Closed Economy A closed economy does not have any dealings in the global market therefore is not affected by factors outside the country. For example, the global financial crisis that started in the US spread to all parts of the world due to interrelatedness of product and financial markets. The developed countries are known to impose economic sanctions on developing countries as a condition for giving them funds for development . These sanctions impact negatively on the economy but a closed economy cannot be under such sanctions since it is self reliant.7 Another advantage is the effectiveness of fiscal and monetary policy in the economy. An expansionary fiscal policy is meant to stimulate the economy during recession by raising aggregate demand. This is

Monday, September 23, 2019

Use your critical thinking skills to evaluate the article Why Does Our Essay

Use your critical thinking skills to evaluate the article Why Does Our Collective Empathy So Often Fail to Manifest in Our Treatment of Refugees by Shami Chakrabarti - Essay Example The Council for At-Risk Academics (CARA) created to deal with academic related violence and persecution has dealt with numerous cases involving refugees. CARA has had to help a physics teacher of Iraqi origin who used to receive death threats after she had dared to challenge the in place religious beliefs. Another incident dealt with by CARA, which shows that people do not care about the refugees, is the case of a human rights lecture from Zimbabwe whom the state police thoroughly beat due to his so-called political activism. Chakrabarti does not understand why people treat refugees with much contempt and ignorance even when they are aware of their sad struggle stories. One of the likely reasons suggested by Chakrabarti as to why people forget these sad refugee stories is due to the emotional distance that exists between refugees and people of the country, and this makes people forget these sad refugee stories. Chakrabarti in the article suggests that the government has let these refugees down, and the work of taking care of refugees has been left to organizations such as CARA. According to Chakrabarti, the government’s main task is to enforce grinding poverty to refugees, which has been possible because people allow them. The government’s reluctance and bad policies intended to help refugees can be best illustrated by the case of a Pakistani woman who fled to the United Kingdom after been physically attacked by her husband for the mere wish of wanting to finish her Ph.D. On arriving in the UK, the woman did not have a home or something to eat until CARA came to her rescue. Due to CARA’s limited resources that they have, the issue of dealing with refugees is overwhelming them. It is up to people of goodwill who appreciate the vital and useful work CARA does take up the responsibility of supporting the

Sunday, September 22, 2019

Segregation in Labor Markets, Neighborhood, Education, and Criminal Essay

Segregation in Labor Markets, Neighborhood, Education, and Criminal Justice - Essay Example With the slightest earthquakes, cracks mark the surface, and even the toughest man or sturdiest structure feels its effects and aftershock so as the blow of recession is faced by both white collared and blue collared workers. From late 2007 to early 2009, a dramatic decline in job vacancies and pairing market deterioration caused rising number in unemployment and permanent layoffs as this is by far the worst recession in American history in equivalence to the coined name Great Recession where, as reported, resulted to 10.6 million jobs deficit in just two years. And even with the declared end of the Great Recession in early 2009, the height of unemployment rates continues to shoot upward as the government strives to face the colossal job creation challenge in order to get a resilient economic recovery (Peck, 2010). Three years has passed and the government is still running the same marathon with the victory far from sight. As explained by Peck (2010), the Great Recession may be techn ically over but going back to the normal economic state is still afar. He used the words â€Å"New Jobless Era† to define this time when job opportunities and offerings sink to the bottom. As the government and its policy makers cogitate for ways to solve this, there is one query at the mind of the population, how does this novel system affect the lives and behavior of the people? Can everyone easily cope or will they be impelled to do things unthinkable in order to survive? Both media and labor unions had their eyes pinned on the concurrent lay-offs the following years yet all that was given were only sympathy and not any solution to the problem. The real problem is not absence of work for work has always been available, but it is the dearth of a real job and the career path together with its health benefits and chances for promotion that kills the middle class Americans that used to have a comfortable living. Aronowitz and DeFazio (2010) elucidated that what is offered now are contractual works that offers employment and income only for a specified period of time lacking the stability that it used to offer. They further discussed that the reasons behind this phenomenon are the outsourcing of production to other countries and cybernetics. For a much cheaper labor cost, computer companies such as Apple, Dell, Hewlett-Packard, and even some other electrical and automotive companies ought to send production processing off-shore to countries that offer much cheaper salary rates and higher number of workers. This scheme maximizes the company’s production budget while still producing high quality materials for the market. On the other hand, cybernetics and automation had been part of everyone’s daily living including in some factories where robotics replaced the then job of one human highly skilled for that certain task. Automation is a path worth investing by the capitalists for this requires no health benefits or retirement plans and offers p recise production at much faster rate. An example is the bankruptcy of Solyndra and New United Motor Manufacturing Inc. (NUMMI), which both used to be the powerhouse manufacturers of solar products and automotives respectively. Both were struck and defeated by their off shore competitions as the jobs were brought to

Saturday, September 21, 2019

English Is Official Language In U.S. Essay Example for Free

English Is Official Language In U.S. Essay Half the countries in the world have an official language. The US is not one of them. Recently some attempts were made to designate English as the official language of the United States, though this country is widely known for being multinational and, correspondently, multilingual. Nevertheless, at the present there are twenty seven states out of fifty that are claiming English to be their official language either by adopting a law or in their state constitutions. Thus, English language de facto occupies a position of the official language in the United States, and there are many supporters of the idea to set it in documents, de jure. The question arises: is this so vital? Should it be done by all means and at any cost? Definitely, there are some clearly stated advantages, pertaining mainly to the issue of immigration, both legal and illegal. Firstly, if English is designated as the official language, it will ensure that all the immigrants become more proficient in English, thus making communication and integration into the society much easier for all the parties. It is difficult to imagine any immigrant achieving the American dream without knowledge of English. This fact, though having little financial of physical impact, will incite people coming from other countries to learn English more zealously. Being forced to learn English, any immigrant will gain access to a full life of an American. Then, English as the default and official language will become a uniting factor for people from different parts of the world. They all came to America from divergent backgrounds, and English language is the tie that can bind them together. The last but not the least is the financial factor. Many states maintain language diversity thoroughly, which can not but call for extensive financial support. There are bilingual ballots, education, publications, and similar services provided at public expense. Massachusetts offers drivers tests in more than two dozen foreign languages. Federal voting rights laws provide for ballots in multiple translations. Internal Revenue Service forms are printed in Spanish. Elimination of need to translate these from one language into another may save a lot of money. On the other hand, all these advantages can easily turn into disadvantages if regarded from the other point of view. Thus, immigrants coming from all parts of the world will have to abandon their native language and most traditions. Of course, as it has already been mentioned, this would benefit to their integration into the American society, but at the same time weakening of cultural and historical bonds may result in loss of national identity. Moreover, the idea of ‘English-only’ implies the feeling of linguistic superiority and somehow exclusivity. It can definitely and can be upsetting to people whose native language is not English.   Its misuse would be intended to provoke an emotional reaction and in a way irritate anyone who favors making English the US official language, as well as those who simply want to protect its role as the common language of the United States. Designating English as the official language will also give trouble to bilingual education which is nowadays very popular in many states. Bilingual education programs use both the students native language and English for instruction. It is emphasized that native language development has the positive influence on second language proficiency. Lack of first language development has been shown, in some cases, to inhibit the level of second language proficiency and cognitive academic development. Successful bilingual education programs actually result in faster acquisition of English. Content matter taught in the native language can be transferred to the second language. In the regular classroom, confronted with both concepts and language that are not comprehensible to them, limited English speakers learn neither the content nor the language. Language acquisition occurs only when incoming messages can be understood. Again, to be successful, citizens need to be open to learning multiple languages. Business leaders and Europeans do it. Knowing multiple languages is a great asset. In a global economy, it is the monolingual English speakers who are falling behind. Along with computer skills, a neat appearance and a work ethic, Americans more and more are finding that a second language is useful in getting a good job. What is the most important, everybody knows that English is the official language already, even if it was not designated to be one. Its declaration as the official tongue would be nothing but a mere symbol. No matter how hard the proponents of designation try to officially establish a language for the US, it is in vain; such a language already exists and is predominant. Correspondingly, efforts to strive for it can be applied to maintain the country’s multilingualism. Outline: question of designating English as the official language in the USA is a debatable one. The arguments â€Å"for† are that it would encourage immigrants to learn the language, helping them to integrate into the society and become citizens of the United States.   It would also help to save the money spent on translations. Nevertheless, the disadvantages of such a step prevail: loss of language and culture of immigrants, problems with bilingual education, limitation of possibility to acquire new languages.   Nevertheless, the crucial factor â€Å"against† the designation is that it would mean nothing, as most benefits from such the step are already existent.

Friday, September 20, 2019

Analysis of Intrusion Detection Systems (IDS)

Analysis of Intrusion Detection Systems (IDS) Introduction Intrusion detection systems (IDS) were developed in 1990’s, when the network hackers and worms appeared, initially for the identification and reporting of such attacks. The intrusion detection systems didn’t have the ability to stop such attacks rather than detecting and reporting to the network personnel. The Intrusion Prevention Systems got both characteristics i.e. threat detection and prevention. The detection process analyzes the events for any possible threats while the intrusion prevention stops the detected possible threats and reports the network administrator. Purpose Scope The main purpose of the project is to evaluate the security capabilities of different types of IDPS technologies in maintaining the network security. It provides detail information about the different classes components of IDPS technologies, for example, detection methods, security capabilities, prevention capabilities internals of IDPS. It is mainly focused on different detection techniques responses by these technologies. 1.2 Audience The information can be useful for computer network administrators, network security personnel, who have little knowledge about these IDPS technologies. 1.3 Project Structure The project is organized into the following major structure: Section 2 provides a general introduction of IDPS. Section 3 provides detail information about of IDPS technologies, components architecture, detection methodologies, security capabilities prevention capabilities. Section 4 provides the internals of IDPS incident response. Section 2: Introduction of IDPS This Chapter Explains the Intrusion Detection Prevention Process, Uses, Functions and Different Types of IDPS The modern computer networks provide fast, reliable and critical information not only to small group of people but also to ever expanding group of users. This need led the development of redundant links, note book computers, wireless networks and many others. On one side, the development of these new technologies increased the importance and value of these access services and on other side they provide more paths to attacks. During the past, In the presence of firewalls and anti-virus software, organizations suffered huge losses in minutes to their businesses in terms of their confidentiality and availability to the legitimate clients. These modern threats highlighted the need for more advance protection systems. Intrusion detection prevention systems are designed to protect the systems and networks from any unauthorized access and damage. An intrusion is an active sequence of related events that deliberately try to cause harm, such as rendering system unusable, accessing unauthorized information or manipulating such information. In computer terminology, Intrusion detection is the process of monitoring the events in a computer network or a host resource and analyzing them for signs of possible incidents, deliberately or incidentally. The primary functions of IDPS are the identification of incident, logging information about them, stopping them preventing them from causing any damage. The security capabilities of IDPS can be divided into three main categories: Detection : Identification of malicious attacks on network host systems Prevention: stopping of attack from executing Reaction: Immunization of the system from future attacks. On the basis of location and type of events they monitor, there are two types IDPS technologies, host-based network based. The network-based IDPS monitors traffic for particular network segment and analyze the network application protocol activity for suspicious events. It is commonly deployed at the borders between networks. While on the other hand, host-based IDPS monitors the activity of a single host and events occurring within that host for suspicious activity. There are two complementary approaches in detecting intrusions, knowledge-based approach and behavior based approach. In knowledge-based approach an IDPS looks for specific traffic patterns called Signatures, which indicates the malicious or suspicious content while in the behavior-based approach an intrusion can be detected by observing a deviation from normal or unexpected behavior of the user or the system. What is an IDS? The Intrusion Detection Systems (IDS) can be defined as: tools, methods resources to identify, assess report unauthorized or unapproved network activity. It is the ability to detect attacks against a network or host and sending logs to management console providing the information about malicious attacks on the network and host resources. IDSs fall into two main categories: Host-Based Intrusion Detection System (HIDS): A HIDS system require some software that resides on the system and can scan all host resources for activity. It will log any activities it discovers to a secure database and check to see whether the events match any malicious event record listed in the knowledge base. Network-Based Intrusion Detection Systems (NIDS): A NIDS system is usually inline on the network and it analyzes network packets looking for attacks. A NIDS receives all packets on a particular network segment via one of several methods, such as taps or port mirroring. It carefully reconstructs the streams of traffic to analyze them for patterns of malicious behavior. The basic process for IDS is that it passively collects data and preprocesses and classifies them. Statistical analysis can be done to determine whether the information falls outside normal activity, and if so, it is then matched against a knowledge base. If a match is found, an alert is sent. Figure 1-1 outlines this activity. Response Manager GUI Host System Pre-processing Statistical Analysis Alert Manager Knowledge Base Long-Term Storage Signature Matching Fig 1.1 Standard IDS System What is an IPS? IPS technology has all capabilities of an intrusion detection system and can also attempt to stop possible incidents. IPS technologies can be differentiated from the IDS by one characteristic, the prevention capability. Once a threat is detected, it prevents the threat from succeeding. IPS can be a host-based (HIPS), which work best at protecting applications, or a network-based IPS (NIPS) which sits inline, stops and prevents the attack. A typical IPS performs the following actions upon the detection of an attack: IPS terminates the network connection or user session. It blocks access to target .i.e. IP address, user account or sever. It reconfigures the devices i.e. firewall, switch or router. It replace the malicious portion of an attack to make it benign An IPS typically consists of four main components: Traffic Normalizer: Interpret the network traffic and do packet analysis and packet reassembly traffic is fed into the detection engine service scanner. Service Scanner: Builds a reference table that classifies the information helps the traffic shaper manage the flow of the information. Detection Engine: Detection engine does pattern matching against the reference table. Figure 1.2 outlines this process: Response Manager GUI Traffic Normalizer System Scanner Detection Engine Alert Manager Reference Table Long-Term Storage Signature Matching FIG 1-2 Standard IPS Uses of IDPS Technologies The identification of possible incidents is the main focus of an IDPS, for example, if an intruder has successfully compromised a system by exploiting the vulnerability in the system, the IDPS could report this to the security personnel. Logging of information is another important function of IDPS. This information is vital for security people for further investigation of attack. IDPS has also the ability to identify the violation of security policy of an organization which could be intentionally or unintentionally, for example, an unauthorized access to a host or application. Identification of reconnaissance activity is one of the major capabilities of IDPS, which is the indication of an imminent attack, for example, scanning of hosts and ports for launching further attacks. In this case, an IDPS can either block the reconnaissance activity or it can alter the configurations of other network devices Functions of IDPS Technologies The main difference between different types of IDPS technologies is the type of events they can recognize. Following are some main functions; Recording of information regarding observed events, this information could be stored locally or could be sent to the logging server. Sending of alerts is one of the vital functions of IDPS. Alerts are sent through different methods i.e. email, SNMP traps, syslog messages etc. In case of detection of a new threat, some IDPS do have the ability to change their security profile, for example, when a new threat is detected, it might be able to collect more detail information about the threat. IDPS not only performs detection but it also performs prevention by stopping the threat to succeed. Following are some prevention capabilities: It can stop the attack by terminating either network connection or user session, by blocking access to a target host. It could change the configuration of other network devices (firewalls, routers switches) to block the attack or disrupt it. Some IDPS could change the contents of a malicious IP packet, for example, it can replace the header of an IP packet with a new one. Types of IDPS Technologies IDPS technologies can be divided into following two major categories: Network-Based IDPS Host-Based IDPS Network-Based IDPS Network-based IDPS monitors network traffic for a particular network segment. They analyze the network and application protocol activity to identify any suspicious activity. A network based IDPS is usually sits inline on the network and it analyzes network packets looking for attacks. It receives all packets on a particular network segment, including switched networks. It carefully reconstructs the streams of traffic to analyze them for patterns of malicious behavior. They are equipped with facilities to log their activities and report or alarm on questionable events. Main strengths of network-based IDPS are: Packet Analysis: Network-based IDPSs perform packet analysis. They examine headers of all IP packets for malicious contents. This helps in detection of the common denial of service (DOS) attack. For example, LAND attack, in which both the source destination addresses and source destination ports are same as of the target machine. This cause the target machine to open connection with itself, causing the target machine either performs slowly or crash. It can also investigate the payload of an IP packet for specific commands. Real Time Detection Response: Network-based IDPS detects attacks in real time as they are occurring in the real time and provides faster response. For example, if a hacker initiated a TCP based DoS attack, IDPS can drop the connection by sending a TCP reset. Malicious Content Detection: Network-based IDPS remove replaces suspicious portion of the attack. For example, if an email has infected attachment, an IDPS removes the infected file and permits the clean email. Evidence for Prosecution: Network-based IDPS monitors real time traffic and if an attack is detected and captured the hacker cannot remove the evidence. Because the captured attack has data in it but also the information about his or her identification which helps in the prosecution. Host-Based IDPS A Host-Based system monitors the characteristics of a single host and the events occurring within that host for suspicious activity. It require some software that resides on the system and monitors the network traffic, syslog, processes, file access modification and configuration or system changes. It logs any activities it discovers to a secure database and check to see whether the events match any malicious event record listed in the knowledge base. Some of the major strengths of Host-Based IDPS are as under: Verification of Attack: Host-based IDPS uses logs which contains events that have actually occurred. It has the advantage of knowing if the attack is successful or not. This type of detection is more accurate and generates fewer false alarms. Monitoring of Important Components: Host-Based IDPS monitors key components for example, executables files, specific DDLs and NT registry. All of these can cause damage to the host or network. System Specific Activity: Host-based IDPS monitors user and file access activity. It monitors the logoff or login procedure and monitors it on the basis of current policy. It also monitors the file access for example, opening of a non shared file. Switched Encrypted Environments: Host-Based IDPSs provide greater visibility into purely switched environment by residing on as many critical hosts as needed. Encryption is a challenging problem for network-based IDPS but not a major problem for host-based IDPS. If the host in question has log-based analysis the encryption will have no impact on what goes in to the log files. Near Real Time Detection: A host-based IDPS relies on the log analysis which is not a true real time analysis. But it can detect respond as soon as the log is written to and compared to the active attack signatures. Real Time Detection Response: Stack-based IDPS monitors the packets as they transverse the TCP/IP stack. It examines inbound outbound packets and examines in real time if an attack is being executed. If it detects an attack in real the time then it can responds to that attack in the real time. Section 2: IDPS Analysis Schemes IDPSs Perform Analysis: This Chapter is about the Analysis Process- What Analysis does and Different Phases of Analysis. 2.2 Analysis In the context of intrusion detection prevention, analysis is the organization of the constituent parts of data and their relationships to identify any anomalous activity of interest. Real time analysis is analysis done on the fly as the data travels the path to the network or host. The fundamental goal of intrusion-detection prevention analysis is to improve an information system’s security. This goal can be further broken down: Create records of relevant activity for follow-up. Determine flaws in the network by detecting specific activities. Record unauthorized activity for use in forensics or criminal prosecution of intrusion attacks. Act as a deterrent to malicious activity. Increase accountability by linking activities of one individual across system. 2.3 Anatomy of Intrusion Analysis There are many possible analysis schemes but in order to understand them, the intrusion process can be broken down into following four phases: Preprocessing Analysis Response Refinement 1. Pre-Processing Preprocessing is the key function once the data is collected from IDPS sensor. The data is organized in some fashion for classification. The preprocessing helps in determining the format the data are put into, which is usually some canonical format or could be a structured database. Once the data are formatted, they are broken down further into classifications. These classifications can depend on the analysis schemes being used. For example, if rule-based detection is being used, the classification will involve rules and patterns descriptors. If anomaly detection is used, then statistical profile based on different algorithms in which the user behavior is baseline over the time and any behavior that falls outside of that classification is flagged as an anomaly. Upon completion of the classification process, the data is concatenated and put into a defined version or detection template of some object by replacing variables with values. These detection templates populate the knowledgebase which are stored in the core analysis engine. 2. Analysis Once the processing is completed, the analysis stage begins. The data record is compared to the knowledge base, and the data record will either be logged as an intrusion event or it will be dropped. Then the next data record is analyzed. The next phase is response. 3. Response Once information is logged as an intrusion, a response is initiated. The inline sensor can provide real time prevention through an automated response. Response is specific to the nature of the intrusion or the different analysis schemes used. The response can be set to be automatically performed or it can be done manually after someone has manually analyzed the situation. 4. Refinement The final phase is the refinement stage. This is where the fine tuning of the system is done, based on the previous usage and detected intrusions. This gives the opportunity to reduce false-positive levels and to have a more accurate security tool. Analysis Process By Different Detection Methods The intrusion analysis process is solely depends on the detection method being used. Following is the information regarding the four phases of intrusion analysis by different detection methods: Analysis Process By Rule-Based Detection Rule-based detection, also known as signature detection, pattern matching and misuse detection. Rule-based detection uses pattern matching to detect known attack patterns. The four phases of intrusion analysis process applied in rule-based detection system are as under: Preprocessing: The data is collected about the intrusions, vulnerabilities and attacks and then it is putted down into classification scheme or pattern descriptors. From the classification scheme a behavior model is built and then into a common format; Signature Name: The given name of the signature Signature ID: The unique ID for the signature Signature Description: The description of the signature what it does Possible False Positive Description: An explanation of any â€Å"false positives† that may appear to be an exploit but are actually normal network activity. Related Vulnerability Information: This field has any related vulnerability information The pattern descriptors are typically either content-based signatures, which examine the payload and header of packet, or context-based signatures that evaluate only the packet headers to identify an alert. The pattern descriptors can be atomic (single) or composite (multiple) descriptors. Atomic descriptor requires only one packet to be inspected to identify an alert, while composite descriptor requires multiple packets to be inspected to identify an alert. The pattern descriptors are then put into a knowledge base that contains the criteria for analysis. Analysis: The event data are formatted and compared against the knowledge base by using pattern-matching analysis engine. The analysis engine looks for defined patterns that are known as attacks. Response: If the event matches the pattern of an attack, the analysis engine sends an alert. If the event is partial match, the next event is examined. Partial matches can only be analyzed with a stateful detector, which has the ability to maintain state, as many IDS systems do. Different responses can be returned depending on the specific event records. Refinement: Refinement of pattern-matching analysis comes down to updating signatures, because an IDS is only as good as its signature update. Analysis Process By Profile-Based Detection (Anomaly Detection) An anomaly is something that is different from the norm or that cannot be easily classified. Anomaly detection, also referred to as Profile-based detection, creates a profile system that flags any events that strays from a normal pattern and passes this information on to output routines. The analysis process by profile-based detection is as following: Preprocessing: The first step in the analysis process is collecting the data in which behavior considered normal on the network is baselined over a period of time. The data are put into a numeric form and then formatted. Then the information is classified into a statistical profile that is based on different algorithms is the knowledge base. Analysis: The event data are typically reduced to a profile vector, which is then compared to the knowledge base. The contents of the profile vector are compared to a historical record for that particular user, and any data that fall outside of the baseline of normal activity is labeled as deviation. Response: At this point, a response can be triggered either automatically or manually. Refinement: The profile vector history is typically deleted after a specific time. In addition, different weighting systems can be used to add more weight to recent behavior than past behaviors. Section 3: IDPS Technologies This section provides an overview of different technologies. It covers the major components, architecture, detection methodologies security capabilities of IDPS. Components Following are the major components and architecture of IDPS; Sensor Agents: Sensors Agents monitors and analyze the network traffic for malicious traffic. Sensor:The technologies that use sensors are network based intrusion detection prevention systems, wireless based intrusion detection prevention systems and network behavior analysis systems. Agents: The term â€Å"Agent† is used for Host-Based Intrusion detection prevention technologies. Database Server: The information recorded by the sensors and agents are kept safely in a database server. Console: A console is software that provides an interface for the IDPS users. Console software is installed on the administrator’s PC. Consoles are used for configuring, monitoring, updating and analyzing the sensors or agents. Management Server: It is a centralized device, receives information from sensors agents and manages that information. Some management server can also perform analysis on the information provided by sensor agents, for example correlation of events. Management server can be both appliance based or software based. 3.1 Network architecture IDPS components are usually connected with each other through organization’s network or through Management network. If they are connected through management network, each agent or sensor has additional interface known as management Interface that connects it to the management network. IDPS cannot pass any traffic between management interface and its network interface for security reasons. The components of an IDPS i.e. consoles and database servers are attached only with the Management network. The main advantage of this type of architecture is to hide its existence from hackers intruders and ensure it has enough bandwidth to function under DoS attacks Another way to conceal the information communication is to create a separate VLAN for its communication with the management. This type of architecture doesn’t provide a much protection as the management network does. 3.2 Security capabilities IDPS provide different security capabilities. Common security capabilities are information gathering, logging, detection and prevention. 3.2.1 Information gathering Some IDPS gather general characteristics of a network, for example, information of hosts and network. They identify the hosts, operating system and application they use, from observed activity. 3.2.2 Logging capabilities When a malicious activity is detected by the IDPS, it performs logging. Logs contain date time, event type, rating and prevention action if performed. This data is helpful in investigating the incident. Some network-based IDPS captures packet while host-based IDPS records user ID. IDPS technologies allow log to be store locally and send copies of centralized logging server i.e. syslog. 3.2.3 Detection capabilities The main responsibility of an IDPS is to detect malicious activity. Most IDPS uses combination of detection techniques. The accuracy and types of events they detect greatly depends on the type of IDPS. IDPS gives great results once they are properly tuned. Tuning gives more accuracy, detection and prevention. Following are some the tuning capabilities: Thresholds: It is a value that sets the limit for normal and abnormal behavior. For example, the number of maximum login attempts. If the attempts exceed the limit then it is considered to be anomalous. Blacklists Whitelists: A blacklist is list which contains TCP or UDP port numbers, users, applications, files extensions etc that is associated with malicious activity. A whitelist is a list of discrete entities that are known to be benign. Mainly used to reduce false positive. Alert Setting: It enables IDPS to suppress alerts if an attacker generates too much alerts in a short time and blocking all future traffic from that host. Suppressing of alerts provide IDPS from being overwhelmed. 3.2.4 Prevention Capabilities IDPS offers multiple prevention capabilities. The prevention capability can be configured for each type of alert. Depending on the type of IDPS, some IDPS sensors are more intelligent. They have learning simulation mode which enables them to know when an action should be performed-reducing the risk of blocking benign activity. 3.2.5 Types of Alarms When IDPS detects an intrusion it generates some types of alarms but no IDPS generates 100% true alarm. An IDPS can generate alarm for legitimate activity and can be failed to alarm when an actual attack occurs. These alarms can be categorized as: False Alarms: When an IDPS fails to accurately indicate what is actually happening in the network, it generates false alarms. False alarm fall into two main categories: False Positives: These are the most common type of alarms. False positive occurs when an IDPS generates alarm based on normal network activity. False Negatives: When an IDPS fails to generate an alarm for intrusion, it is called false negative. It happens when IDPS is programmed to detect ck but the attack went undetected. 2. True Alarms: When an IDPS accurately indicates what is actually happening in the network, it generates true alarms. True alarms fall into two main categories: True Positives: When an IDPS detects an intrusion and sends alarm correctly in response to actually detecting the attack in the traffic. True positive is opposite of false negative. True Negative: It represents a situation in which an IDPS signature does not send alarm when it is examining normal user traffic. This is the correct behavior. ARCHITECTURE DESIGHN Architecture design is of vital importance for the proper implementation of an IDPS. The considerations include the following: The location of sensors or agents. The reliability of the solutions the measurements to achieve that reliability. For example using of multiple sensors, for monitoring the same activity, as a backup. The number location of other components of IDPS for usability, redundancy and load balancing. The systems with which IDPS needs interfacing, including: System to which it provides the data i.e. log servers, management softwares. System to which it initiates the prevention responses i.e. routers, firewalls or switches. The systems used to manage the IDPS components i.e. network management software. The protection of IDPS communications on the standard network. 3.3 Maintenance Operation Mostly IDPS are operated maintained by user graphic interface called Console. It allows administrator to configure and update the sensors and servers as well as monitor their status. Console also allows users to monitor and analyze IDPS data and generate reports. Separate accounts could be setup for administrators and users. Command Line Interface (CLI) is also used by some IDPS products. CLI is used for local administration but it can be used for remote access through encrypted tunnel. 3.3.1 Common Use of Consoles Many consoles offer drill down facilities for example, if an IDPS generates an alert, it gives more detail information in layers. It also give extensive information to the user i.e. packet captures and related alerts. Reporting is an important function of console. User can configured the console to send reports at set time. Reports can be transferred or emailed to appropriate user or host. Users can obtain and customized reports according to their needs. 3.3.2 Acquiring applying updates There are two types of updates –software updates and signature updates. Software updates for enhancing the performance or functionality and fixing the bugs in IDPS while the signature updates for adding detection capabilities or refining existing capabilities. Software updates are not limited for any special component but it could include all or one of them i.e. sensor, console, server and agents. Mostly updates are available from the vendor’s web site. New Chapter Detection Methodologies Most IDPS uses multiple detection methodologies for broad accurate detection of threats but following are primary detection methodologies: Signature Based Detection Anomaly Based Detection Stateful Protocol Analysis 3.3.1 Signature Based Detection The term Signature refers to the pattern that corresponds to a known threat. In signature based detection, the predefined signatures, stored in a database, are compared with the network traffic for series of bytes or packet sequence known to be malicious, for example, an email with the subject of free screen savers and an attachment of screensavers.exe, which are characteristics of known form of malware Or a telnet

Thursday, September 19, 2019

History of the West Nile Virus Essay -- Biology Medical Biomedical Dis

History of the West Nile Virus Abstract West Nile virus (WNV) is a virus that is transmitted by mosquitoes. It has been found in humans, birds, and other animals, typically in Africa, Eastern Europe, and the Middle East. In 1999, WNV was detected in the United States for the first time, and since then it has spread across the U.S. According to the U.S. Centers for Disease Control and Prevention (CDC), over 15,000 people in the U.S. have tested positive for the WNV infection since 1999, including over 500 deaths. Many more people have likely been infected with WNV, but have experienced mild or no symptoms. What is the history of the West Nile virus? West Nile virus is an emerging infectious disease that can cause encephalitis (inflammation of brain tissue) and or meningitis (swelling of the tissue that encloses the brain and spinal cord). West Nile virus is a newly emergent virus of the family Flaviviridae, found in both tropical and temperate regions. Its group is classified in Group IV (gram(+) single stranded, RNA). Its genus is Flavivirus. It?s commonly found in Africa, West Asia, the Middle East, and more recently; North America. It may result to serious illnesses if not reported to the hospital in time. Knowing its history, how it?s transmitted, symptoms, treatment, and prevention will probably keep one from getting it. In 1937, West Nile virus was first discovered in a feverish woman in the West Nile district of Uganda in Central Africa. The virus became recognized as a cause of severe human Meningoencephalitis (inflammation of the spinal cord and brain) in elderly patients during an outbreak in Israel in 1957. In the early 1960?s, Eastern Equine Encephalitis (affecting horses) was first found in Egypt and France (We... ... people may need to go to the hospital where they can receive supportive treatment including intravenous fluids, help with breathing, and nursing care. To help prevent WNV: Empty plastic wading pools at least once a week or store in a position that water will drain. Make sure your backyard pool is maintained properly. It is though that once a person has recovered from WNV, they are immune for life to future infections with WNV. This immunity may decrease over time or with health conditions that compromise the immune system. As long as people get older or immune system is weak you may end up getting it again. This is very important because just to know if people can get it again when there immunity isn?t work very good. The U.S. government and its citizens should care WNV 4 because there is no vaccine to cure it or it can mutate and get even harder to fight it off.

Wednesday, September 18, 2019

Aristotles Ethics Essay -- essays research papers

The Humanities represent man's concern with man and with the human world. In that concern there is no more important problem than the age-old one which was first discussed systematically here, in Greece, more than two thousand years ago. The problem I refer to, which the ancient Greek philosophers thought deeply about, is this one: What makes a human life good -- what makes it worth living and what must we do, not just merely to live, but to live well? In the whole tradition of Western literature and learning, one book more than any other defines this problem for us and helps us to think about it. That book of course is Aristotle's Ethics, written in the fourth century before Christ. Aristotle was a student of Plato. Plato had founded the Academy of Athens, which was the great university of ancient Greece. Aristotle studied and worked there for about twenty years. He was called by Plato "the intellect of the school." Unlike Socrates, Aristotle was interested in the study of nature. He was unlike Socrates in another respect. When he, too, was accused of un-Athenian activities, he decided to flee, saying "I will not let the Athenians offend twice against philosophy." The subject treated in this book is called "ethics" because ethos is the Greek word for character, and the problems with which this book deals are the problems of character and the conduct of life. The Ethics is divided into ten parts. I am going to deal only with the first part, in which Aristotle discusses happiness. But before we begin, let me remind you of a famous statement about happiness that occurs in the opening paragraph of the American Declaration of Independence. "We hold these truths to be self-evident, that all men are created equal and that they are endowed by their Creator with certain unalienable rights: that among these are life, liberty, and the pursuit of happiness. That to secure these rights, governments are instituted among men, deriving their just powers from the consent of the governed..." Have you ever thought what it means to say that it is every man's natural right -- not to be happy -- but to engage in the pursuit of happiness? What do we mean when we say that one of the main objectives of good government is to see that no man is interfered with -- more than that, that every man must be helped by the state in his effort to lead ... ... almost completed, and say that it has been good. This may seem strange to you at first, but when you think about it for a moment you will see that it really is not. One example will make this clear to you. You go to a football game. At the end of the first half, you meet a friend of yours in the aisle. He says to you, "Good game, isn't it?'' If it has been well-played so far, your natural response would be to say, "Yes." But if you stop to think for a moment, you will realize that all you are in a position to say, at the end of the half, is that it is becoming a good game. Only if it is well played all through the second half, can you say, when it is all over, that it was a good game. Well, life is like that. Not until it is really over can you say, "It was a good life" -- that is, if it has been well lived. Toward the middle, or before, all you can say is that it is becoming a good life. Here is Aristotle's way of making this point: "Certainly the future is obscure to us, while happiness, we claim, is an end and something in every way final†¦If so, we shall call happy those among living men in whom these conditions are, and are to be fulfilled."

Tuesday, September 17, 2019

Hercules: 12 Labors Of Hercules :: essays research papers

Hercules: 12 Labors of Hercules Hercules, in Greek mythology, was a hero known for his strength and courage and for his legendary adventures. Hercules is the Roman name for the Greek hero Heracles. He was the son of the god Zeus and a human mother Alcmene, wife of the Theban general Amphitryon. Hera, Zeus' jealous wife, was determined to kill Hercules, and after Hercules was born, she sent two great serpents to kill him. Hercules, while he was still a baby, strangled the snakes. Hercules conquered a tribe that had been demanding money from Thebes. As a reward, he was given the hand in marriage of the Theben princess Megara and they had three children. Hera, still filled hatred of Hercules, sent him into madness, which made him kill his wife and children. In horror and remorse at what he did, Hercules was about to kill himself. But he was told by the oracle at Delphi that he should purge himself by becoming the servant of his cousin Eurystheus, king of Mycenae. Eurystheus, urged by Hera, planned as a punishment the 12 impossible tasks, the "Labors of Hercules." The Twelve Labors The first task was to kill the lion of Nemea, a lion that could not be hurt by any weapon. Hercules knocked out the lion with his club first, then he strangled it to death. He wore the skin of the lion as a cloak and the head of the lion as a helmet, a trophy of his adventure. The second task was to kill the Hydra that lived in a swamp in Lerna. The Hydra had nine heads. One head was immortal and when one of the others was chopped off, two grew back in its place. Cancer, one of the Hydra's guards, bit Hercules on the foot when he came near, and was crushed by Hercules, but she was rescued by Hera. Hercules scorched each mortal neck with a burning torch to prevent it from growing two heads and he buried the immortal head under a rock. He then dipped his arrows in the Hydra's blood to make them poisonous. Hercules' next labor is to capture alive a stag with golden horns and bronze hoofs that was sacred to Artemis, goddess of the hunt. The fourth labor was to capture a great boar in Mount Erymanthus. Hercules used the poison arrows with the Hydra's blood to shoot at the Erymanthian boar. One of the poison arrows wounded Hercules' friend Cheiron, an immortal centaur, half-horse and half-man. Cheiron feared the poison arrow would hurt him for eternity, but Zeus rewarded him for his service to the gods by Hercules: 12 Labors Of Hercules :: essays research papers Hercules: 12 Labors of Hercules Hercules, in Greek mythology, was a hero known for his strength and courage and for his legendary adventures. Hercules is the Roman name for the Greek hero Heracles. He was the son of the god Zeus and a human mother Alcmene, wife of the Theban general Amphitryon. Hera, Zeus' jealous wife, was determined to kill Hercules, and after Hercules was born, she sent two great serpents to kill him. Hercules, while he was still a baby, strangled the snakes. Hercules conquered a tribe that had been demanding money from Thebes. As a reward, he was given the hand in marriage of the Theben princess Megara and they had three children. Hera, still filled hatred of Hercules, sent him into madness, which made him kill his wife and children. In horror and remorse at what he did, Hercules was about to kill himself. But he was told by the oracle at Delphi that he should purge himself by becoming the servant of his cousin Eurystheus, king of Mycenae. Eurystheus, urged by Hera, planned as a punishment the 12 impossible tasks, the "Labors of Hercules." The Twelve Labors The first task was to kill the lion of Nemea, a lion that could not be hurt by any weapon. Hercules knocked out the lion with his club first, then he strangled it to death. He wore the skin of the lion as a cloak and the head of the lion as a helmet, a trophy of his adventure. The second task was to kill the Hydra that lived in a swamp in Lerna. The Hydra had nine heads. One head was immortal and when one of the others was chopped off, two grew back in its place. Cancer, one of the Hydra's guards, bit Hercules on the foot when he came near, and was crushed by Hercules, but she was rescued by Hera. Hercules scorched each mortal neck with a burning torch to prevent it from growing two heads and he buried the immortal head under a rock. He then dipped his arrows in the Hydra's blood to make them poisonous. Hercules' next labor is to capture alive a stag with golden horns and bronze hoofs that was sacred to Artemis, goddess of the hunt. The fourth labor was to capture a great boar in Mount Erymanthus. Hercules used the poison arrows with the Hydra's blood to shoot at the Erymanthian boar. One of the poison arrows wounded Hercules' friend Cheiron, an immortal centaur, half-horse and half-man. Cheiron feared the poison arrow would hurt him for eternity, but Zeus rewarded him for his service to the gods by

Monday, September 16, 2019

Spirituality and Strength

My Strengths Strength is a word that is greatly misinterpreted. Strength is to overcome challenges that you face and to grow from them. To most, strength only comes in physical form, while for others strength comes emotionally as well as spiritually. One can be small yet strong or one can even be scared yet strong. Strength has no set rules or requirements. Strength is going against all odds to end up prevailing. Being physically strong is the ability to sustain the capacity of a force without breaking or yielding.To be mentally strong is to emerge with confidence through an emotional series of events. For one to be spiritually strong they must have faith in what you believe when the odds are stacked against you. Everyone in life strives to be strong. Why? It is human nature. Physical strength is to prevail through obstacles that test your body to its limits. Physical strength is fighting a disease such as skin cancer. Listening to the doctors tell me that the chances of living a lon g healthy life are not excellent. After telling me all this they expect me to be that same person who was lways there for others.But who was there for me? Physical strength is fighting the never ending battle of drowsiness, when I was diagnosed with mononucleosis. This was a hopeless battle when I had so many things to do in so little time, Meyer 2 with no energy to spare. Yet, all I wanted to do was to fall into a deep sleep and escape all my responsibilities for the moment. Physical strength is being the strongest that I can be. This is waking up six days a week at the first light of day and pushing my body to its limits at the gym surrounded by other bodies dripping of sweat.It is to fight the endless struggle of laziness of a typical college student and workout even when I have had a long day, with few hours of sleep, and no time in my schedule. Physical strength is a daunting task to seek out but with hard work and perseverance it can be achieved. Mental strength is the ability to overcome hardship, pain, and suffering. The ability to use those experiences from depression in a positive way, to grow and develop from the most painful situations imaginable. That is what mental strength is all about. I have always been told that the strongest are always most successful.My success is the new person that I have become. I ignore the Judgmental looks and comments made by those I love and those I hate. I handle being ridiculed and gossiped about by those, who in the past, I had put all my trust in. Mental strength is dealing with the drama and stress of high school. It takes strength to walk down those cramped hallways alone and be watched by those who I used to be able to call my friends, and having no one to talk to. Even though I feel as though I am alone within a crowd of faces and shadows, bumping into me, trying to knock me down I do not get intimidated.On weekdays at six in the morning I look in the mirror and plaster on a brave face to fool others into thi nking that nothing is wrong. I have the strength to not fall in to the deadly trap that people lay out when they make fun of you have with everyone and with yourself. Spiritual strength is the will to believe when all others do not. It is the fight for faith, something that could be imaginary, but that I see as real. It is the urge to die for what I believe in. I maintain my strength while I am tested on my faith in God by countless people, Judging me for following and acting on my beliefs in God.I would rather die protecting my spirituality then live a lie full of regret. In my times of trouble I have come to realize God is the light, the truth, and the way when all other paths are taken over with darkness. My strength is overcoming the hardship of following the unknown and not knowing where it will take me. It is putting my faith trust in God, and praying when I feel scared or upset. Every Sunday morning and Wednesday night I devote myself to the life of the church, the body, and the blood of Jesus Christ. Some say that by having spiritual strength I am condemning myself.On the contrary, in having spiritual strength I am freeing myself to a life full of Joy and happiness. Above all, to have spiritual strength is to have faith, love, patience, dedication and hope in God. In conclusion, there are three types of strength I have exhibited throughout my life; physical, mental, and spiritual. To have physical strength is to excel in challenges that are made upon the body. To have mental strength is to when my limits are tested. To have spiritual strength is to stick to what I believe is morally right in life. These strengths tie into how I live my life day by day.

Health Law and Regulations Paper Essay

In the last decade, the debate over the ethics of organ and transplant allocation has intensified and the attention sensationalized in the media. At the core of this issue, critical questions remain. They include but are not limited to those regarding economics, race, and geographic inequity and about the moral relevance and weight of geography, economics, and other disparities and inequities in transplant allocation (Stanford University, 2012). Transplant allocation raises questions regarding the four of the basic major ethical principles of medical ethics: autonomy, beneficence, justice and non-maleficence. As such, bioethicists typically refer to the four principles of health care ethics in their evaluation of the merits and difficulties of medical procedures such as transplants. With regards to issue of transplant allocation, the four ethical principles can be applied to the issue in the following ways: Autonomy The principle of autonomy involves the patient having ‘a voice,’ ownership, autonomy of thought, action, intention and level of advocacy when making decisions regarding their health care procedures. As such, and as it relates to transplant allocation, the decision-making process should and must be free of coercion or coaxing of all involved and even the families of deceased individuals (Robertson, 2005; SU, 2012). In order for a patient and for families to make educated and fully informed decision, they must understand all risks and benefits of the allocation and the actual transplant procedure as well as the likelihood for success, especially since the process can illicit intense emotions, financial and physical set-backs(SU, 2012). Beneficence This principle stipulates that the transplant allocation and procedure be solely conducted with only the best intent of doing well for the patient(s)  involved. As such, the principle then also requires that health care providers develop and maintain the needed skills and knowledge, that they continuously update training and educational courses, consider individual circumstances of each and every patient, and strive to maximize the benefits as healthy and positive as possible (SU, 2012). Justice The principle of justice is grounded in the idea that the burdens and benefits of new or experimental treatments must be distributed equally among all groups in society. Therefore, as it relates to transplant allocation, the allocation or access to organs should be a fair process and not one in which ‘the highest and wealthiest bidder gets the organ transplant or the mere fact of only the rich have access to health insurance. That is not justice fair or equitable distribution of healthcare and in this case transplant allocation (Childress, 2001). The principle requires that transplant allocation and procedures uphold the spirit of existing laws and are fair to all players involved. As such, the health care provider must consider the four main areas when evaluating justice: fair distribution of scarce resources, competing needs, rights and obligations, and potential conflicts with established legislation (SU, 2012). Non-maleficence This principle requires that a transplant procedure does not intentionally or maliciously bring unanticipated harm to the patient, donor or others involved in the process. Surgeons operate under the assumption that they are doing little to no harm by pursuing the greater good. However, overall desired outcomes must be facilitated through the careful monitoring especially since transplant allocation can be inequitable, unfair and even the procedures do fail and can affect the emotional state of the patient. In some extreme cases, sometimes it is difficult for doctors successfully to do no harm principle (SU.2012). Transplant allocation often has a ripple effect as Burdick(2005) asserts: â€Å"Because there are not enough donated organs, all patients and practitioners are bound together by a community of medicine principle: whenever a patient receives a transplant, it diminishes the chance that other potential recipients will be able to receive this gift of life in time to save  them.†(275). Other very sad and disturbing well-known facts include but are not limited to: although through organ transplants many people have been helped and given a new ‘lease on life,’ a growing number of transplant candidates suffer and die waiting for life-enhancing or life-saving organs that just never materialize (SU, 2012). In conclusion, it is imperative that we stop, think and ask: How are organs for transplant allocated? How should they be allocated? In accordance with which ethical principle, theory, or precept? Should this scarce, expensive, life-saving therapy be only available to those who can ‘afford’ it and should it be distributed among the growing numbers of those who need it? (SU, 2012). According to Childress (2001), â€Å"the success of policies of organ procurement may reduce scarcity and hence obviate some of the difficulties of organ allocation. However, distrust is a major reason for the public’s reluctance to donate organs, and policies of organ procurement may be ineffective if the public perceives the policies of organ allocation as unfair and thus untrustworthy.† (p. 366). Transplant allocation creates ethical dilemmas because like general health care and health insurance, access and treatment are not equally available to everyone. Subsequently, in order for a medical practice to be considered â€Å"ethical†; it must respect all of the four ethical principles. Furthermore, it is critical that medical professionals, bioethicists, patients, and health insurers be cognizant of potential conflicts of interest when formulating and evaluating policies regarding transplant allocation (Burdick, 2000; SU, 2012). Many ethical and moral questions remaining include but are not limited to: racial and ethnic inequity, the moral relevance and weight of waiting time, the ethics of directed donation to individuals and groups, as well as those regarding the overarching ethical framework in which organs for transplant should be allocated. With such compelling questions and related aspects considered, it is mandatory, critical, inevitable and beneficial for all involved that the Council on Bioethics pays very close attention to the ethics of organ allocation. References Burdick, J. (2000). Responses to a critique of UNOS liver allocation policy by Kenneth Einar Himma. Cambridge Quarterly of Healthcare Ethics, 9, 275-283 Childress, J. (2001). Putting patients first in organ allocation: An ethical analysis of the U.S. Debate. Cambridge Quarterly of Healthcare Ethics, 10: 365-376 Robertson, C. (2005). Who is really hurt anyway? The problem of soliciting designated organ donations. The American Journal of Bioethics, 5 (4):16-17. Stanford University. (2012).What are the ethical concerns regarding egg donation? Retrieved from http://www.stanford.edu

Sunday, September 15, 2019

Why Students Should Have Part Time Jobs

Is it a good idea for High School Students to have a part-time job? I think that high school students should have part time jobs because it gives students a chance to get out and contribute to the community. It teaches students the value of money and gives them skills that they can use in their future. Firstly, a part time job for students is a good idea because students are greatly needed to participate in to todays society, getting a job in the community is a great way to participate and get themselves involved.It gives students a sense of ownership and belonging within their community that they too are an active member that helps make the society function at it's highest level. Also, when students get a pay check they have to know that they need to budget their money and also to create a savings account for future purchases. It also teaches them the value of the dollar where a teenager when about to spend their money they can stop and question themselves ‘is this a want, or is this a need? This is a great tool for young adults to acquire at a young age. Finally it gives students important skills useful for their future. For example, a student was to get a job at the local gas bar one would learn how to handle money, how to stock shelves, order supplies that are needed, customer service and the ability to handle hazardous materials. It's also builds a students character and trust worthy value. As we all know in society word of mouth about ones character and how responsible they are excel fast within any community.In conclusion, part time work for a student is a key element in future success. It allows the student to grow and learn as an individual and creates strong work ethic. There is nothing more valuable to an employer than an employee that has these skills and in life there is nothing more desirable as an individual than to have a strong sense of worth, character and the ability to handle and manage money to their fullest potential.

Saturday, September 14, 2019

Emergent Corporate Strategy Essay

CORPORATE STRATEGY is the direction an organization takes with the objective of achieving business success in the long term. Recent approaches have focused on the need for companies to adapt to and anticipate changes in the business environment. The development of a corporate strategy involves establishing the purpose and scope of the organization’s activities and the nature of the business it is in, taking the environment in which it operates, its position in the marketplace, and the competition it faces into consideration. Strategic management is a relatively young subject. It has its roots in the economic and social theories of the 1930s and 1940s – perhaps even earlier. It only really began to emerge as a separate topic in the 1960s and 1970s. Even today, there is only partial agreement on the fundamental principles of strategic management with many views, ideas and concepts. Among the numerous early contributors, the most influential were Alfred Chandler, Philip Se lznick, Igor Ansoff and Peter Drucker. Alfred Chandler recognized the importance of coordinating management activity under an all-encompassing strategy. Interactions between functions were typically handled by managers who relayed information back and forth between departments. Chandler stressed the importance of taking a long term perspective when looking to the future. In his 1962 ground breaking work Strategy and Structure, Chandler showed that a long-term coordinated strategy was necessary to give a company structure, direction and focus. He says it concisely, â€Å"structure follows strategy.† Times change and concepts evolve so by the 1980s one can choose between two pathways when developing a strategy for a corporation, non-profit organization or an institution: the prescriptive and the emergent approach. Deliberate strategy is goal-orientated. It asks: what do we want to achieve? Emergent strategy is means-orientated. It asks: what is possible, with the means we have at our disposal? Already in 1985 Mintzberg and Waters were publishing: Ë ®Of strategies, Deliberate and EmergentË ® were they stated that deliberate str ategy is realized as intended whereas emergent strategy are patterns of consistence realized despite, or in the absence, of intention. There are 8 different types of strategy between the two poles of deliberate and emergent strategy: planned, entrepreneurial, ideological, umbrella, process, unconnected, consensus, imposed. Many authors have defined the two approachments in different ways. In Linch’s view a prescriptive thinking is one whose objectives are defined in advance and whose main elements have been developed before the strategy commences. Such an approach usually begins with an analysis of the outside environment and the resources of the company. The objectives of the organization are then developed from this. There then follows the generation of strategic options to achieve the objectives, from which one (or more) may be chosen. The chosen option is then implemented. This full range of activities is called the prescriptive strategy process. Henry Mintzberg, in his work, The Rise and Fall of Strategic Planning, was a critic of the analytical approach arguing that label strategic planning should be dr opped because strategic planning has impeded strategic thinking and also because unpredictable events, such as the introduction of new regulations or technologies, will regularly act to force the original strategy off its course. From a contrary point of view Ansoff shows that firms in fast-paced, competitive environments who use a systematic process for strategic planning very often go on to dominate their marketplace. Their logical, analytical approach allows them to devise predictive and pre-emptive strategies from which they can meet new opportunities head on. For instance, in 1995 EasyJet used incredible foresight to introduce low cost flights allowing it to take advantage of a more cost-conscious European Market. The prescriptive approach regards strategy development as a systematized and deterministic process where analysis of the organisation, its performance and external environment leads to the formation of a rational, long-term plan. Senior management is in charge of defining the final objectives and the plan is then put into action through the successive layers of the organization. Managers who use the analytical method are usually those with a low appetite for risk and activate in a slow changing market. On the other hand, the emergent strategy is a pattern of action that develops over time in an organization in the absence of a specific mission and goals, or despite a mission and goals. Emergent strategy is sometimes called realized strategy. Mintzberg argues that strategy emerges over time as intentions collide with and accommodate a changing reality. Emergent strategy is a set of actions, or behavior, consistent over time, â€Å"a realized pattern [that] was not expressly intended† in the original planning of the strategy. When a deliberate strategy is realized, the result matches the intended course of action. An emergent strategy develops when an organization takes a series of actions that with time turn into a consistent pattern of behavior, regardless of specific intentions. â€Å"Deliberate strategies provide the organization with a sense of purposeful direction.† Emergent strategy implies that an organization is learning what works in practice. Mixing the deliberate and the emergent strategies in some way will help the organization to control its course while encouraging the learning process. â€Å"Organizations †¦[may] pursue †¦ umbrella strategies: the broad outlines are deliberate while the details are allowed to emerge within them† (from Mintzberg, H. 1994, The Rise and Fall of Strategic Planning). Linch defines emergent strategy as one that does not have the same fixed objectives as the prescriptive approach. The whole process is more experimental with various possible outcomes depending on how matters develop. To quote, ‘An emergent strategy is one whose final objective is unclear and whose elements are developed during the course of its life, as the strategy proceeds.’ Thus the early stages of emergent strategy may be similar to prescriptive strategy – analysis of the environment and resources. But then the process becomes more circular, learning and experimental. Formulation of strategy runs parallel to implementation and managers at multiple organizational levels have a key input into the actual strategies pursued by the organization. This model’s emphasis on learning underlies more recent theories which focus on the value of knowledge as a core organizational competence for gaining competitive advantage. Despite heaving a good, solid, prescriptive strategy with their low cost flights, Easy Jet embraces with success also the emergent approach by launching allocated seats on all flights, in order to get competitive advantage. Budget airline says it will make more money from seat allocation than speedy boarding scheme preferred by rival Ryanair. EasyJet is ending the desperate rush for prime seats on low-cost flights by launching allocated seating across its network. Having been eschewed by budget carriers in the past for impeding fast turnaround times, the Luton-based airline said seat allocation did not appear to slow down journeys an d is more lucrative than speedy boarding schemes. It expects 1a and 6a to be the prime picks on flights following trials on 6,000 flights this season. Allocated seating was be rolled out across easyJet’s network from November, with all passengers allocated a seat. Those wishing to change their seat will be charged  £12 for front row and over-wing seats,  £8 for berths in the four rows behind the front row, and  £3 to reserve a seat anywhere else on the plane. Passengers who don’t pay for a particular spot will be randomly allocated a seat as well when they check in, free of charge, although the chances of getting a seat up front will be diminished. â€Å"The majority of people will not have to pay for their seat,† said an EasyJet spokesman, adding that the airline would attempt to seat families together even if they don’t pay for specific seats. EasyJet has mulled allocated seating trials in the past but Carolyn McCall, EasyJet chief executive, has decided to push ahead after a trial scheme showed encouraging results. The trials found that on short-haul flights such as London to Glasgow, the  £3 window seat 6a was the most popular, while on longer routes such as London to Sharm-el-Sheikh the  £12 1a berth is the most sought-after due to the more substantial legroom. Predictably, seats in the middle and near the back found the fewest takers, with 16b the least desired on short haul and passengers avoiding 19b on long haul. â€Å"This is an example of EasyJet trying to do all it can to make travel easy and affordable for our passengers,† said McCall. â€Å"Our customers asked us to trial allocated seating and we are really pleased with the positive passenger feedback during the trial. As importantly, we have shown that we can do so while delivering strong on-time performance – the most important driver of passenger satisfaction.† EasyJet said that more than seven out of 10 passengers on trial routes preferred the system to speedy boarding, where passengers pay around  £10. 50 to board a flight first – a service also offered by Ryanair. Low-cost airlines have been characterized by their strategy of charging for as many services as possible, from inflight food to checking bags into the hold. However, some notions such as allocated seating have been ruled out by the likes of Ryanair because of their potential to clutter up planes, which would prevent low-cost carriers from executing the 25-minute turnaround times – the gap between a plane arriving at its gate and pushing off again – that allow them to run the busiest possible timetable. Andrew Lobbenberg, an analyst at HSBC, said the move would benefit EasyJet because it gives the airline the opportunity to make money from all seats on a flight rather than the 30 berths set aside for speedy boarding. â€Å"We would expect sales of pre-allocated seat selection and premium seat allocation in the front of cabin and exit rows to certainly exceed speedy boarding revenues. Speedy boarding was limited to 30 passengers per flight, but we imagine a higher share of passengers will opt to secure their seats in advance of travel.† He added: â€Å"Moreover, we think the switch to allocated seating will make trave lling on EasyJet notably less stressful. It will be far better for families travelling together. It will also remove the hassle of boarding which we think has been a material deterrent for business travelers. It should also be helpful for relations with airports: as customers spend less time standing in queues for hours before the flight, they should be free to spend more time and money in airport stores.† An emergent approach leads to more creative and responsive strategy making which is well suited to the hyper-competitive and unpredictable environments of today. Interestingly, Hamel and Prahalad pointed out that the most successful firms in the world do not tie themselves down to mission, goals and objectives or the predetermined plan. One of these corporations is obviously Apple, which is in a never-ending development. Apple prides itself on its innovation. When reviewing the history of Apple, it is evident that this attitude permeated the company during its peaks of success. For instance, Apple pioneered the PDA market by introducing the Newton in 1993. Later, Apple introduced the easy-to-use iMac in 1998, and updates following 1998. It released a highly stable operating system in 1999, and updates following 1999. Apple had one of its critical points in history in 1999 when it introduced the iBook. This completed their â€Å"product matrix†, a simplified product mix strategy formulated by Jobs. This move allowed Apple to have a desktop and a portable computer in both the professional and the consumer segments. In 2001, Apple hit another important historical point by launching iTunes. This marked the beginning of Apple’s new strategy of making the Mac the hub for the â€Å"digital lifestyle†. Apple then opened its own stores, in spite of protests by independent Apple retailers voicing cannibalization concerns. Then Apple introduced the iPod, central to the â€Å"digital lifestyle† strategy. Philip W. Schiller, VP of Worldwide Product Marketing for Apple, stated, â€Å"iPod is going to change the way people listen to music.† He was right. Apple continued their innovative streak with advancements in flat-panel LCDs for desktops in 2002 and improved notebooks in 2003. In 2003, Apple released the iLife package, containing improved versions of iDVD, iMovie, iPhoto, and iTunes. In reference to Apple’s recent advancements, Jobs said, â€Å"We are going to do for digital creation what Microsoft did for the office suite productivity.† That is indeed a bold statement. Time will tell whether that happens. Apple continued its digital lifestyle strategy by launching iTunes Music Store online in 2003, obtaining cooperation from â€Å"The Big 5† Music companies—BMG, EMI, Sony Entertainment, Universal, Warner. This allowed iTunes Music Store online to offer over 200,000 songs at introduction. In 2003, Apple released the world’s fastest PC (Mac G5), which had dual 2.0GHz PowerPC G5 processors. Product differentiation is a viable strategy, especially if the company exploits the conceptual distinctions for product differentiation. Those that are relevant to Apple are product features, product mix, links with other firms, and reputation. Apple established a reputation as an innovator by offering an array of easy-to-use products that cover a broad range of segments. However, its links with other firms have been limited, as we will discuss in the next section on strategic alliances. There is economic value in product differentiation, especially in the case of monopolistic competition. The primary economic value of product differentiation comes from reducing environmental threats. The cost of product differentiation acts as a barrier to entry, thus reducing the threat of new entrants. Not only does a company have to bear the cost of standard business, it also must bear the costs associated with overcoming the differentiation inherent in the incumbent. Since companies pursue niche markets, there is a reduced threat of rivalry among industry competitors. A company’s differentiated product will appear more attractive relative to substitutes, thus reducing the threat of substitutes. If suppliers increase their prices, a company with a differentiated product can pass that cost to its customers, thus reducing the threat of suppliers. Since a company with a differentiated product competes as a quasi-monopoly in its market segment, there is a reduced threat of buyers. With all of Porter’s Five Forces lower, a company may see economic value from a product differentiation strategy. A company attempts to make its strategy a sustained competitive advantage. For this to occur, a product differentiation strategy that is economically valuable must also be rare, difficult to imitate, and the company must have the organization to exploit this. If there are fewer firms differentiating than the number required for perfect competition d ynamics, the strategy is rare. If there is no direct, easy duplication and there are no easy substitutes, the strategy is difficult to imitate. There are four primary organizing dilemmas when considering product differentiation as a strategy: inter-functional collaboration, connection to the past, commitment to market vision and institutional control. To resolve these dilemmas, there must be an appropriate organization structure. A U-Form organization resolves the inter-functional collaboration dilemma if there are product development and product management teams. Combining the old with the new resolves the connection to the past dilemma. Having a policy of experimentation and a tolerance for failure resolves the commitment to market vision dilemma. Managerial freedom within broad decision-making guidelines will resolve the institutional control dilemma. Five leadership roles will facilitate the innovation process: Institutional Leader, Critic, Entrepreneur, Sponsor, and Mentor. The institutional leader creates the organizational infrastructure necessary for innovation. This role also resolves disputes, particularly among the other leaders. The critic challenges investments, goals, and progress. The entrepreneur manages the innovative unit(s). The sponsor procures, advocates, and champions. The mentor coaches, counsels, and advises. Apple had issues within its organization. In 1997, when Apple was seeking a CEO acceptable to Jobs, Jean-Louis Gassà ©e (then-CEO of Be, ex-Products President at Apple) commented, â€Å"Right now the job is so difficult, it would require a bisexual, blond Japanese who is 25 years old and has 15 years’ experience!† Charles Haggerty, then-CEO of Western Digital, said, â€Å"Apple is a company that still has opportunity written all over it. But you’d need to recruit God to get it done.† Michael Murphy, then-editor of California Technology Stock Letter, stated, â€Å"Apple desperately needs a great day-to-day manager, visionary, leader and politician. The only person who’s qualified to ru n this company was crucified 2,000 years ago.† Since Jobs took over as CEO in 1997, Apple seems to have resolved the innovation dilemmas, evidenced by their numerous innovations. To continue a product differentiation strategy, Apple must continue its appropriate management of innovation dilemmas and maintain the five leadership roles that facilitate the innovation process. In a few words emergent strategy does not mean chaos, but unintended order instead; does not mean that management is out of control, only that it is open, flexible and responsive as well as willing to learn; ultimately it implies learning what works. The purely prescriptive approach, where realized strategy is formed exactly as intended, and purely emergent strategy- order (consistency in actions over time) in absence of intention about it do both not exist in real life. The purely prescriptive and purely emergent strategy are two poles of a continuum of observable strategies in practice. Within the framework of an environment which is by and large unpredictable, many organizations are forced to become more flexible and adaptive to change. This supports the adoption of an emergent approach to strategy development which invokes a more intelligent capacity to respond to new opportunities. Nonetheless, such a strategy can preclude control over actions and may risk a lack of direction. A greater use of strategic planning tools for internal and external analysis would certainly facilitate improved organizational learning and enhance strategic thinking even while following an emergent approach. This recognition that the prescriptive and emergent processes, rather than being mutually exclusive, can be complementary approaches that reinforce each other is being highlighted in more recent theories such as the Logical Incrementalism approach proposed by Quinn. Although many management writers seem to seek one ‘best way’ to conduct strategy, these approaches are not necessarily incompatible. Different approaches may be suitable at different times, depending on the context or situation, and an organization may pursue a combination of approaches. For example, an organization can have a clear direction and an overall plan – which it expects to have a amend or adapt as events unfold. It may also encourage small-scale strategic initiatives or projects throughout the organization. They help the organization to develop new skills and retain flexibility; they also have the potential of spreading if conditions are appropriate. All in all, most viable strategies in today’s business world should have customized elements of prescriptive and emergent characteristics in order to manage the complexities of their business and still triumph over changing circumstances. The final conclusion is that â€Å"Strategy formation walks on two feet, one deliberate and one emergent.† (Mintzberg & Waters)