Wednesday, October 30, 2019

Amazon.com - Not Your Average Bookstore Case Study

Amazon.com - Not Your Average Bookstore - Case Study Example Other than customer comments, Amazon websites records numbers of customers, the products they review and pages they visit. After analyzing those records, Amazon recognizes sale/purchase patterns and makes business strategies accordingly. Is Amazon using disruptive or sustaining technology to run its business? A disruptive technology is the one that creates new market and value network. Amazon.com mostly incorporates disruptive technology. For instance; when Amazon website was formed, books purchase constituted a very small fraction of the items for sale but with the launch of Amazon online bookstore, it has redefined book’s market. People visit Amazon websites to read reviews on a book and make decision about purchasing the book. Things didn’t stop there; Amazon launched its book reading application, Kindle. It is an eBook reader and uses e-Ink technology which consumes very small battery power, this way people can take their collection of favorite books anywhere they w ant. Other applications like Amazon S3, Vine and Amazon MP3 all offer new technologies. Interactive interface technology used by Amazon really makes the shopping experience worthwhile. Online Music downloading and online storage application such as S3, all count as disruptive technologies. How is Amazon using personalization to keep its customers loyal? Amazon incorporates personalized recommendations to keep its customers loyal. ... ications like Amazon.com Auctions, zShops (independent third party sellers) and Amazon.com Marketplace (here customers can buy and sell used items), Amazon is offering almost everything to its customers on their fingertips. All of this contributes to increasing customer loyalty. How has Amazon used technology to revamp the bookselling industry? Amazon has completely refurbished the bookselling industry. Amazon bookstore has become a trademark name for book publishers and customers. For instance, Jeffery Bezos, the CEO of Amazon implemented a smart business strategy by making virtual book store accessible from all across the globe. When Bezos first initiated the list of 20 items online, books were a small ticket item on it, but later when Amazon created thousands of virtual book stores, Amazon Bookstore became a house hold name for book purchases. No book store could store 5 million books published each year but Amazon. Technology enabled Amazon to handle such a large amount of data a nd make it available to customers. It won’t be exaggeration saying that eBook concept was popularized by Amazon. Later with the introduction of eBook reader, Kindle; Amazon totally revamped the bookselling industry. Kindle incorporates another technology to download books for its eBook readers through ‘Whispernet’ on a wireless network, ‘Sprint Nextel Network’. Initial offering from Kindle included over 90,000 books, magazines and journals. How can Amazon use mbusiness to increase sales? There is tremendous potential in mbusiness or mcommerce. According to the research firm Strategy Analysts, mcommerce industry was supposed to be exceeding $200bn by 2005 with 350 million customers generating $14bn annually, and this is 2012, it is easy to figure out what potential mbusiness

Monday, October 28, 2019

Public Enterprises Essay Example for Free

Public Enterprises Essay What are the Objectives of Public Enterprises? SOUMYA SINGH In India, public enterprises have been assigned the task of realising the objectives laid down in the Directive Principles of State Policy. Public sector as a whole seeks: (a) to gain control of the commanding heights of the economy, (b) to promote critical development in terms of social gain or strategic value rather than on consideration of profit, and (c) to provide commercial surplus with which to finance further economic development. The main objectives of public enterprises in India are as follows: 1. Economic development: Public enterprises were set up to accelerate the rate of economic growth in a planned manner. These enterprises have created a sound industrial base for rapid industrialisation of the country. They are expected to provide infrastructure facilities for promoting balanced and diversified economic structure of development. 2. Self-reliance: Another aim of public enterprises is to promote self-reliance in strategic sectors of the national economy. For this purpose, public enterprises have been set up in transportation, communication, energy, petro-chemicals, and other key and basic industries. . Development of backward Areas: Several public enterprises were established in backward areas to reduce regional imbalances in development. Balanced development of different parts of the country is necessary for social as well as strategic reasons. 4. Employment generation: Unemployment has become a serious problem in India. Public enterprises seek to offer gainful employment to millions. In order to protect jobs, several sick units in the private sector have been nationalised. 5. Economic surplus: Public enterprises seek to generate and mobilise surplus for reinvestment. These enterprises earn money and mobilise public savings for industrial development. 6. Egalitarian society: An important objective of public enterprises is to prevent concentration of economic power and growth of private monopolies. Public sector helps the Government to enforce social control on trade and industry for ensuring equitable distribution of goods and services. Public enterprises protect and promote small scale industries. 7. Consumer welfare: Public enterprises seek to protect consumers from exploitation and profiteering by ensuring supply of essential commodities at cheaper prices. They aim at stabilising prices. 8. Public utilities: Private sector is guided by profit motive. Therefore, it is reluctant to invest money in public utility services like water supply, gas, electricity, public transport. Therefore, the Government has to assume responsibility for providing such services. 9. Defence: Government has to set up public enterprises for production of defence equipment. Supply of such equipment cannot be entrusted for private sector due to the need for utmost secrecy. 10. Labour welfare: Public enterprises serve as model employers. They ensure welfare and social security of employees. Many public enterprises have developed townships, schools, college and hospitals for their workers. Role and Rationale of Public Enterprises The public sector has been playing a vital role in the economic development of the country. In fact the public sector has come to occupy such an important place in our economy that on its effective performance depends largely the achievement of the countrys economic and social goals. Public sector is considered a powerful engine of economic development and an important instrument of self-reliance. The main contributions of public enterprises to the countrys economy may be described as follows: 1. Filling of gaps: At the time of independence, there existed serious gaps in the industrial structure of the country, particularly in the field of heavy industries. Basic and key industries require huge capital investment, involve considerable risk and suffer from long gestation periods. Private sector concerns do not come forward to establish such industries. Public sector has helped to fill up these gaps. The basic infrastructure required for rapid industrialisation has been built up, through the production of strategic capital goods. The public sector has considerably widened the industrial base of the country and speeded up the pace of industrialisation. 2. Employment: Public sector has created millions of jobs to tackle the unemployment problem in the country. Public sector accounts for about two-third of the total employment in the organised industrial sector in India. By taking over many sick units, the public sector has protected the employment of millions. Public sector has also contributed a lot towards the improvement of working and living conditions of workers by serving as a model employer. 3. Balanced regional development: Private industries tend to concentrate in certain regions while other regions remain backward. Public sector undertakings have located their plants in backward and untraded parts of the country. These areas lacked basic industrial and civic facilities like electricity, water supply, township and manpower. Public enterprises have developed these facilities thereby bringing about complete transformation in the social-economic life of the people in these regions. Steel plants of Bhilai, Rourkela and Durgapur; fertilizer factory at Sindri, machine tool plants in Rajasthan, precision instruments plants in Kerala and Rajasthan, etc. are a few examples of the development of backward regions by the public sector. 4. Optimum utilisation of resources: Public enterprises make better utilisation of scarce resources of the country. They are big in size and able to enjoy the benefits of large scale operations. They help to eliminate wasteful completion and ensure full use of installed capacity. Op timum utilisation of resources results in better and cheaper production. 5. Mobilisation of surplus: The profits earned by public enterprises are reinvested for expansion and diversification. Moreover, public sector concerns like banks and financial nstitutions mobilise scattered public savings thereby helping the process of capital formation in the country. Public enterprises earn considerable foreign exchange through exports. 6. Self reliance: Public enterprises have reduced considerably the need for imports by producing new and better products within the country. These enterprises are also earning considerable amount of foreign exchange through exports. 7. Socialistic pattern of society: Public sector is an instrument for realising social objectives. Public enterprises help to check concentration of wealth and private monopolies. These enterprises can serve as powerful means of economic and social change. 8. Public welfare: Public enterprises help in the establishment of a welfare state in the country. These enterprises supply essential commodities at cheaper rates. A proper balance between demand and supply is created to protect consumers against exploitation by profit hungry businessmen. Public enterprises also protect and promote the interests of workers. Criticism of Public Enterprises [Arguments against Public Enterprises] Public enterprises are opposed on account of weaknesses in their organisation and working. These enterprises generally suffer from the following problems: 1. Delay in completion: Often a very long time is taken in the establishment and completion of public enterprises. Delay in completion leads to increase in the cost of establishment and benefits extracted from them are delayed. 2. Faulty evaluation: Public enterprises are in some cases set upon political considerations. There is no proper evaluation of demand and supply and expected costs and benefits. There are no clear cut objectives and guidelines. In the absence of proper project planning there is under- utilisation of capacity and wastage of national resources. . Heavy overhead costs: Public enterprises often spend huge amounts on providing housing and other amenities to employees. Though such investment is useful for employees but it takes away a large part of capital and the project suffers from financial difficulties. 4. Poor returns: Majority of the public enterprises in India are incurring loss. In some of them the profits earned do not yield a reasonable return on huge investment. Lack of effective financial controls, wasteful expenditure and dogmatic pricing policy result in losses 5. Inefficient management: Due to excessive centralisation of authority and lack of motivation public enterprises are managed inefficiently. High level posts are often occupied by persons lacking necessary expertise but enjoying political support. 6. Political interference: There is frequent interference from politicians and civil servants in the working of public enterprises. Such interference leaves little scope for initiative and freedom of action. Public enterprises enjoy little autonomy and flexibility of operations. 7. Labour problems: In the absence of proper manpower planning public enterprises suffer from over-staffing. Jobs are created to fulfil employment goals of the Government. Guarantee of job in these enterprises encourages trade unions to be militant in pursuing their aims. Growth of Public Enterprises in India At the time of independence, public sector in India was confined mainly to railways, communications, defence production and public utility services. Since then the growth of public enterprises has been very rapid. Now public sector consists of public utilities (e. g. , railways, post and telegraph, etc), manufacturing concerns (e. g. , BHEL, SAIL, etc. ), trading organisations (e. g. STC, MMTC, etc. ), service organisations (e. g. , NIDC, RITES, etc. ). SAIL, a Maharatna Company of Govt. of India, is the worlds leading and Indias largest steel producer with an annual turnover of around Rs. 50,348 crore (FY11-12). It operates and owns 5 integrated steel plants at Rourkela, Bhilai, Durgapur, Bokaro and Burnpur and 3 special steel plants at Salem, Durgapur and Bhadravati. As part of its g lobal ambition the Company is implementing a massive expansion plan involving project work of building/adding new facilites with emphasis on state of the art green technology. List of Maharatna, Navratna and Miniratna CPSEs As per available information (as on February, 2013) Maharatna CPSEs Bharat Heavy Electricals Limited Coal India Limited GAIL (India) Limited Indian Oil Corporation Limited NTPC Limited Oil amp; Natural Gas Corporation Limited Steel Authority of India Limited Navratna CPSEs Bharat Electronics Limited Bharat Petroleum Corporation Limited Hindustan Aeronautics Limited Hindustan Petroleum Corporation Limited Mahanagar Telephone Nigam Limited National Aluminium Company Limited NMDC Limited Neyveli Lignite Corporation Limited Oil India Limited Power Finance Corporation Limited Power Grid Corporation of India Limited Rashtriya Ispat Nigam Limited Rural Electrification Corporation Limited Shipping Corporation of India Limited Miniratna Category I CPSEs Airports Authority of India Antrix Corporation Limited Balmer Lawrie amp; Co. Limited Bharat Dynamics Limited BEML Limited Bharat Sanchar Nigam Limited Bridge amp; Roof Company (India) Limited Central Warehousing Corporation Central Coalfields Limited Chennai Petroleum Corporation Limited Cochin Shipyard Limited Container Corporation of India Limited Dredging Corporation of India Limited Engineers India Limited Ennore Port Limited Garden Reach Shipbuilders amp; Engineers Limited Goa Shipyard Limited Hindustan Copper Limited HLL Lifecare Limited Hindustan Newsprint Limited Hindustan Paper Corporation Limited Housing amp; Urban Development Corporation Limited India Tourism Development Corporation Limited Indian Railway Catering amp; Tourism Corporation Limited IRCON International Limited KIOCL Limited Mazagaon Dock Limited Mahanadi Coalfields Limited Manganese Ore (India) Limited Mangalore Refinery amp; Petrochemical Limited Mishra Dhatu Nigam Limited MMTC Limited MSTC Limited National Fertilizers Limited National Seeds Corporation Limited NHPC Limited Northern Coalfields Limited Numaligarh Refinery Limited ONGC Videsh Limited Pawan Hans Helicopters Limited Projects amp; Development India Limited Railtel Corporation of India Limited Rashtriya Chemicals amp; Fertilizers Limited RITES Limited SJVN Limited Security Printing and Minting Corporation of India Limited South Eastern Coalfields Limited State Trading Corporation of India Limited Telecommunications Consultants India Limited THDC India Limited Western Coalfields Limited WAPCOS Limited Miniratna Category-II CPSEs Bharat Pumps amp; Compressors Limited Broadcast Engineering Consultants (I) Limited Central Mine Planning amp; Design Institute Limited Ed. CIL (India) Limited Engineering Projects (India) Limited FCI Aravali Gypsum amp; Minerals India Limited Ferro Scrap Nigam Limited HMT (International) Limited HSCC (India) Limited India Trade Promotion Organisation Indian Medicines amp; Pharmaceuticals Corporation Limited M E C O N Limited National Film Development Corporation Limited National Small Industries Corporation Limited P E C Limited Rajasthan Electronics amp; Instruments Limited

Saturday, October 26, 2019

Marketing :: essays research papers

1. A. An economic system is a nations system for allocating its resources among its citizens. Economic systems differ in terms of who owns or controls the four basic factors of production: labor, capital, entrepreneurs, and natural resources. In planned economies, the government all or most factors. In market economies, which are based on the principles of capitalism, individuals control the factors of production. Most countries today have mixed market economies that are dominated by one of these systems but include elements of the other. The process of privatization is an important means by which many of the world’s planned economies are moving toward mixed market systems. 2. A. The most common forms of business ownership are the sole proprietorship, the partnership, the cooperative, and the regular corporation. Each form has several advantages and disadvantages. The form under which a business chooses to organize is crucial because it affects both long-term strategy and day-to-day decision making. In addition to advantages and disadvantages, entrepreneurs must consider their preferences and long-range requirements 3. B. The difference forms of competition advantage are critical to international business. With an absolute advantage, a country engages in international trade because it can produce a product more efficiently than any other nation. But more often, countries trade because they enjoy comparative advantages: They can produce some items more efficiently than they produce other items. The import-export balance including the balance of trade and the balance of payments, and exchange rate differences in national currencies affect the international economic environment and are important element of international business. 4. A. Social responsibility refers to an organization’s response to social needs. Until the second half of the nineteenth century, because business often paid little attention to these needs. Since then however both public pressure and government regulation especially as a result of the great depression of the 1930s and the social activism of the 1960s and the 1970s have forced business to consider the public welfare at least to some degree. A trend toward increased social consciousness, including a heightened sense of environment activism has recently emerged. 5. A Management is the process of planning, organizing, directing, and controlling an organization’s financial, physical, human and information resources to achieve the organization’s goal. Planning means determining what the company needs to do and how best to get to get it done. Organizing means determining how best to arrange a business’s resources and the necessary jobs into an overall structure.

Thursday, October 24, 2019

Developing an international marketing plan Essay

Working in teams of 4 – 5 students you will analyze a country’s cultural and economic environment in order to develop a marketing program for a specific product or service. The purpose of this assignment is to facilitate cross-cultural understanding and evaluate a country’s market potential. You should work as if you represent a company planning to expand operations to several new countries. Your job is to analyze and tentatively propose a marketing program for the company’s product in one of the countries. The project includes a paper (15 pages plus as many appendixes, tables, etc. as needed) and a presentation (each group will have 15 minutes to present their work to the class). Please see The Country Notebook (p. 586) in International Marketing by Cateora and Graham. Project Components 1) Identify country 2) Identify product and develop product fact sheet 3) Economic analysis 4) Cultural analysis 5) Market audit and competitive analysis 6) Marketing plan 1) Selecting a Country Please choose a country that you have some interest in and would like to develop in-depth knowledge. There are only three restrictions in the selection of a country: 1) you must study a country other than your own, 2) two groups cannot select the same country, and 3) you cannot study the United States. You can select countries ranging from the most economically developed to most recent developing nations. You must have a country selected by week 3. 2) Selecting a Product The focus of this project is exclusively consumer products. You may choose any consumer product. You must also produce a 1 page product fact sheet identifying the product and product features (e.g., brand name, description, usage, purpose, benefits, unit size, cost, contents or other relevant features). The product fact sheet is due in week 4. Also include your product fact sheet as an appendix in your final project. 3) Economic Analysis Entire books have been written on the topics in this section, however I want you to demonstrate an understanding of the economic information and highlight points of particular significance from a marketing planning perspective. Potential categories of information include population, economic statistics and activity, developments in science and technology, distribution systems, and media. Adapt and modify these categories as necessary. In addition, provide a 1-page summary of the major economic points. The 1-page summary is due in week 6. Also place the summary in the appendix of your final project. 4) Cultural Analysis You will need to report cultural facts that you have identified and analyze these facts in terms of likely marketing implications. Relevant cultural information includes geographical setting, social institutions (family, education, political, legal, etc.), religion, living conditions, and language. In addition to reporting facts, it is important to interpret this information. You must answer the question â€Å"What does this cultural information have to do with marketing?† You will also have to complete a 2-page essay on â€Å"what it is like to be a citizen of† the country that you choose to study. The â€Å"what it is like†¦Ã¢â‚¬  essay is due in week 6. Also include your essay as an appendix in your final project. 5) Market audit and competitive analysis This section is used to determine competitive market conditions and market potential. This information is then used to determine the extent of adaptation of the company’s marketing mix. Consider the product and the market (e.g., consider the conditions where the product will be sold, competitors, government involvement, market size, etc.). 6) Marketing plan The information that you have developed should serve as a basis for your marketing plan. You need to identify the most effective means of marketing your product or service in the country identified. Categories include objectives, product, promotion, distribution, and price. Please indicate if you think that this is a profitable market opportunity for your product or service. Be sure to include your recommendations. You have the option of recommending to market or not to market the product in the country. Make sure your decision is supported with adequate information. FORMAT ISSUES †¢ Be concise. The final product should be no more than 15 pages in length (not including appendices and references). The paper should be easily read and understood. o It should be written in concise business-style English o Use bullet-point statements with short explanatory paragraphs when appropriate. o Include charts and figures to describe numerical data. o Include pictures if appropriate. †¢ Form matters. The look of this document is important. It should look as if it has been professionally prepared. Use double-spacing with 12-point font. All tables, figures and appendices should be individually labeled and titled (e.g., Table 1: Descriptive Statistics of †¦; Appendix A: Graphical Representation of †¦). †¢ Writing matters. I expect you to write clearly, using language that conveys what you mean. All members of the group should carefully inspect the document for grammatical and spelling errors. o You do not get credit for correct grammar, punctuation and spelling. However, you WILL MOST CERTAINLY lose points if there are problems in this area. OTHER STUFF †¢ Each group should submit three exam questions (and answers) to the instructor prior to the presentation. One of these questions may be placed on the exam. †¢ History suggests that not every member of a group will actively participate in the project. In order to overcome this tendency, I will ask each group member to complete a peer evaluation for this project. This evaluation is intended to force you to confront (as a group) at the start what expectations each of you has for the others in your group relative to this project. †¢ Each group is required to meet with the instructor during the term to make sure that the group is on the right track with the project. Be prepared to discuss what you will be doing, how you will be doing it, and how you will present this information in class. †¢ Rather than splitting the project up among group members and then putting it together at the end, I strongly urge you to approach it as a total entity. This will help with the flow of the writing and understanding of how each element relates to the others. o Your grade will be reduced if it appears that you slapped together four different parts written by four different people. †¢ Cite all of your sources. PRESENTATION GUIDELINES †¢ Each group is required to make a presentation to the class. †¢ Each group member must present, but the amount of time does not have to be shared equally across all members. †¢ Practice, practice, practice! It is the only way to make sure that the timing is right and the only way to ensure that the transitions between speakers are smooth. †¢ It is important to engage the audience. Make the presentation fun and interesting. Ask questions, show enthusiasm, and include visual aids and props when appropriate. †¢ Make an effort to face the class when you’re speaking. People often have a tendency to talk to the screen. Also, do not stand in front of the screen. Remember, you want your audience to see it. †¢ Speak clearly and deliberately. Students often rush through the presentation. Remember, even though you are really familiar with the content, others are not. †¢ Presentation slides should include enough information to communicate the key points to the class. †¢ Attendance is mandatory for ALL students, whether presenting or not. It is the responsibility of the audience to listen attentively and to engage the speakers where appropriate.

Wednesday, October 23, 2019

The Impact of Technology on Family Time

Title: the impact of technology on family time Do you think technology has changed the way of communication? Is technology slowly taking over people live and affecting their personal relationship? Have we become addicted to the technology that surrounds us everyday and it has sucked us into it? Technology is a use of scientific knowledge for improving the way to do things. It has been playing an important role in our life. It is common today, many developed countries are using high technology to run their works as well as many advance technologies are invented productively to the need of society.This can be seen, technology has become a part of our life in order to do our works more fast and accurate. As we know, every institution has it own machine which has replaced human physical to produce more output. Technology brings lots of benefits to people unfortunately it also brings negative effect impact to a family. In this essay, I would be discussing about how technology impacts on f amily. Firstly, let’s begin with how advanced technology has meant that family life has changed.This is meaning to say that parents and children have lesser interaction to each other because they used to do spend their time with technology like Laptop, PSP, games on the internet, TV and so on. It is because children no longer spend time playing and engaging in activities with their parents or siblings. For example, when we were young, we did not need any internet games to whereas we had our own game which is traditional games. It can actually build up a positive relationship between parents and children but these traditional games are slowly replaced by the current technology that can bring lots of fun.This example makes it clear that, advanced technology has replaced the traditional games which could create more interaction among family and friends. Unfortunately, children today are likely to play with technology instead of traditional games. â€Å"During the evening, when parents used to sit and talk together or amuse their children, they now sit in front of a computer. It would seem that technology may have helped family life to deteriorate† (Johnston 2010). It is obvious that, the impact of technology could deteriorate a family because they are addicted to the current technology.Secondly, technology is slowly changing the way we communicate with others and affecting our personal relationship. It has left us with the chance to meet people in a much easier ways. Most people, both children and adults spend quite a lot of time in texting friends and relatives, wasting money and using text- speak as a way to communicate. Take Facebook as example, making a friend is now on a finger click, to gain a new friend you simply click on â€Å" add as friend† and the other person accepts or denies you. We are in the next wave of technology, where communicating with parents or friends is all on the internet and instantly done. New social networking si tes are popping up everyday and people are taking advantage of them. You can see their away messages online and see what children are doing at that very instant. † (Gupta 2011) When looking at this example, there is no doubt that it has led us to our hypothesis. If a child is heavy users of social networking sites then it will have a negative impact on their personal relationships. Thus, parents and children seem to spend less time in each other’s company and the time they do spend together often involves playing computer games or watching television.Most children are not getting enough exercise in today’s society, generally because parents can’t be bothered to take their children to the park, while being afraid of letting their children play outside by themselves. For many parents, being able to get in contact with their children by phone isn’t enough. Children will therefore spend most of their time hidden away in their bedroom, watching DVDs or p laying computer games, while their parents sit around the house doing nothing particularly constructive with their time. Technology is supposed to make life easier and give people more free time, but it seems that technology has undermined family life, actually eating into people’s time and affecting family relationships in a negative way. † (Wilkinson 2011) In conclusion, technology brings many benefits to people today, without technology people can’t do work more productively and efficiency. However, it has negative impact to human either. Interaction between family and friends are getting lesser and lesser.Although there are also advantages to having so much technology at your fingertips families may want to weigh up pros and cons to make sure that they achieve an even balance between a quality family lives. In my opinion, I would use technology to go my works but I will not let technology to influence my family and friends’ relationship. 0104896 (Jonat han Kuek SzeGuan) Title: the impact of technology on family time Do you think technology has changed the way of communication? Is technology slowly taking over people live and affecting their personal relationship?Have we become addicted to the technology that surrounds us everyday and it has sucked us into it? Technology is a use of scientific knowledge for improving the way to do things. It has been playing an important role in our life. It is common today, many developed countries are using high technology to run their works as well as many advance technologies are invented productively to the need of society. This can be seen, technology has become a part of our life in order to do our works more fast and accurate. As we know, every institution has it own machine which has replaced human physical to produce more output.Technology brings lots of benefits to people unfortunately it also brings negative effect impact to a family. In this essay, I would be discussing about how techn ology impacts on family. Firstly, let’s begin with how advanced technology has meant that family life has changed. This is meaning to say that parents and children have lesser interaction to each other because they used to do spend their time with technology like Laptop, PSP, games on the internet, TV and so on. It is because children no longer spend time playing and engaging in activities with their parents or siblings.For example, when we were young, we did not need any internet games to whereas we had our own game which is traditional games. It can actually build up a positive relationship between parents and children but these traditional games are slowly replaced by the current technology that can bring lots of fun. This example makes it clear that, advanced technology has replaced the traditional games which could create more interaction among family and friends. Unfortunately, children today are likely to play with technology instead of traditional games. During the ev ening, when parents used to sit and talk together or amuse their children, they now sit in front of a computer. It would seem that technology may have helped family life to deteriorate† (Johnston 2010). It is obvious that, the impact of technology could deteriorate a family because they are addicted to the current technology. Secondly, technology is slowly changing the way we communicate with others and affecting our personal relationship. It has left us with the chance to meet people in a much easier ways.Most people, both children and adults spend quite a lot of time in texting friends and relatives, wasting money and using text- speak as a way to communicate. Take Facebook as example, making a friend is now on a finger click, to gain a new friend you simply click on â€Å" add as friend† and the other person accepts or denies you. We are in the next wave of technology, where communicating with parents or friends is all on the internet and instantly done. â€Å"New s ocial networking sites are popping up everyday and people are taking advantage of them. You can see their away messages online and see what children are doing at that very instant. (Gupta 2011) When looking at this example, there is no doubt that it has led us to our hypothesis. If a child is heavy users of social networking sites then it will have a negative impact on their personal relationships. Thus, parents and children seem to spend less time in each other’s company and the time they do spend together often involves playing computer games or watching television. Most children are not getting enough exercise in today’s society, generally because parents can’t be bothered to take their children to the park, while being afraid of letting their children play outside by themselves.For many parents, being able to get in contact with their children by phone isn’t enough. Children will therefore spend most of their time hidden away in their bedroom, watchin g DVDs or playing computer games, while their parents sit around the house doing nothing particularly constructive with their time. â€Å"Technology is supposed to make life easier and give people more free time, but it seems that technology has undermined family life, actually eating into people’s time and affecting family relationships in a negative way. † (Wilkinson 2011)In conclusion, technology brings many benefits to people today, without technology people can’t do work more productively and efficiency. However, it has negative impact to human either. Interaction between family and friends are getting lesser and lesser. Although there are also advantages to having so much technology at your fingertips families may want to weigh up pros and cons to make sure that they achieve an even balance between a quality family lives. In my opinion, I would use technology to go my works but I will not let technology to influence my family and friends’ relationsh ip.

Tuesday, October 22, 2019

The Trojan War essays

The Trojan War essays I am doing my report on what happened before and during the Trojan War. The Trojan War was a war that Greece and Troy fought. The story of Troy is over 3,000 years old. The ancient Greeks sang the story of the war from memory. This war involves gods, half-gods, and mortals. The first book of the Iliad and the Odyssey was written in English in 1475. Most people have heard the ending, but the way it started should have been a happy thing, but it ended up bad. Hecuba, the queen of Troy, had a baby. Prophecy said that the baby would someday burn Troy down. So, when the baby was born, the King took the baby and went to kill it, but he couldnt. Then he gave it to a servant to kill. The servant took it to the top of a mountain and left it there to die. Then, when he returned five days later, he saw the baby being nursed by a female bear. He thought the baby was destined to live, so he secretly raised the baby. The babys name was Paris. When he grew up he was a cowherd. Now this boy was a very good judger; he judged contests between bulls. Zeus, the ruler of Mount Olympus (also known as the god of lightning), noticed that Paris was a very good judger. What he noticed came in useful during a wedding he went to. Two gods were getting married. Every god was invited except for Eris, the goddess of strife. Eris snuck in to the room, throws a golden apple into the party. The apple said, To the Fairest. The goddesses started to argue. Hera said, Im the most beautiful. I should have it. Then Athena said, Im more beautiful than you are, Hera. I think I should have it. Aphrodite said, Im more beautiful than all of you. I should have it. The goddesses asked Zeus who should have the golden apple. Zeus knew that if he picked one of the gods, the two others would be angry at him. So he remembered Paris was a good judger, so he gave to...

Monday, October 21, 2019

Mustafa Kemal Atatürk, Republic of Turkey Founder

Mustafa Kemal Atatà ¼rk, Republic of Turkey Founder Mustafa Kemal Atatà ¼rk (May 19, 1881–November 10, 1938) was a Turkish nationalist and military leader who founded the Republic of Turkey in 1923. Atatà ¼rk served as the countrys first president from 1923 to 1938. He oversaw the passage of numerous reforms that were responsible for transforming Turkey into a modern nation-state. Fast Facts: Mustafa Kemal Atatà ¼rk Known For: Atatà ¼rk was a Turkish nationalist who founded the Republic of Turkey.Also Known As: Mustafa Kemal PashaBorn: May 19, 1881 in Salonica, Ottoman EmpireParents: Ali RÄ ±za Efendi and  Zubeyde HanimDied: November 10, 1938 in Istanbul, TurkeySpouse: Latife Usakligil  (m. 1923–1925)Children: 13 Early Life Mustafa Kemal Atatà ¼rk was born on May 19, 1881, in Salonica, then part of the Ottoman Empire (now Thessaloniki, Greece). His father Ali Riza Efendi may have been ethnically Albanian, though some sources state that his family was made up of nomads from the Konya region of Turkey. Ali Riza Efendi was a minor local official and a timber-seller. Mustafas mother Zubeyde Hanim was a blue-eyed Turkish or possibly Macedonian woman who (unusually for that time) could read and write. Zubeyde Hanim wanted her son to study religion, but Mustafa would grow up with a more secular turn of mind. The couple had six children, but only Mustafa and his sister Makbule Atadan survived to adulthood. Religious and Military Education As a young boy, Mustafa reluctantly attended a religious school. His father later allowed him to transfer to the Semsi Efendi School, a secular private school. When Mustafa was 7, his father died. At the age of 12, Mustafa decided, without consulting his mother, that he would take the entrance exam for a military high school. He then attended the Monastir Military High School and in 1899 enrolled in the Ottoman Military Academy. In January 1905, Mustafa graduated and began his career in the army. Military Career After years of military training, Atatà ¼rk entered the Ottoman Army as a captain. He served in the Fifth Army in Damascus until 1907. He then transferred to Manastir, now known as Bitola, in the Republic of Macedonia. In 1910, he fought to suppress the Albanian uprising in Kosovo. His rising reputation as a military man took off the following year, during the Italo-Turkish War of 1911 to 1912. The Italo-Turkish War arose from a 1902 agreement between Italy and France over dividing Ottoman lands in North Africa. The Ottoman Empire was known at that time as the sick man of Europe, so other European powers were deciding how to share the spoils of its collapse long before the event actually took place. France promised Italy control of Libya, then comprised of three Ottoman provinces, in return for non-interference in Morocco. Italy launched a massive 150,000-man army against Ottoman Libya in September 1911. Atatà ¼rk was one of the Ottoman commanders sent to repel this invasion with only 8,000 regular troops, plus 20,000 local Arab and Bedouin militia members. He was key to the December 1911 Ottoman victory in the Battle of Tobruk, in which 200 Turkish and Arab fighters held off 2,000 Italians and drove them back from the  city of Tobruk. Despite this valiant resistance, Italy overwhelmed the Ottomans. In the October  1912 Treaty of Ouchy, the Ottoman Empire signed away control of the provinces of Tripolitania, Fezzan, and Cyrenaica, which became Italian Libya. Balkan Wars As Ottoman control of the empire eroded, ethnic nationalism spread among the various peoples of the Balkan region. In 1912 and 1913, ethnic conflict broke out twice in the First and Second Balkan Wars. In 1912, the Balkan League (made up of the newly independent Montenegro, Bulgaria, Greece, and Serbia) attacked the Ottoman Empire in order to wrest away control of areas dominated by their respective ethnic groups that were still under Ottoman suzerainty. Through suzerainty, a nation maintains internal autonomy while another nation or region controls foreign policy and international relations. The Ottomans, including Atatà ¼rks troops, lost the First Balkan War. The following year during the Second Balkan War, the Ottomans regained much of the territory of Thrace that had been seized by Bulgaria. This fighting at the frayed edges of the Ottoman Empire was fed by ethnic nationalism. In 1914, a related ethnic and territorial spat between Serbia and the Austro-Hungarian Empire set off a chain reaction that soon involved all of the European powers in what would become World War I. World War I and Gallipoli World War I was a pivotal period in Atatà ¼rks life. The Ottoman Empire joined its allies (Germany and the Austro-Hungarian Empire) to form the Central Powers, fighting against Britain, France, Russia, and Italy. Atatà ¼rk predicted that the Allied Powers would attack the Ottoman Empire at Gallipoli; he commanded the 19th Division of the Fifth Army there. Under Atatà ¼rks leadership, the Turks held off a British and French attempt to advance up the Gallipoli Peninsula, inflicting a key defeat on the Allies. Britain and France sent in a total of 568,000 men over the course of the Gallipoli Campaign, including large numbers of Australians and New Zealanders. Of these, 44,000 were killed and almost 100,000 were wounded. The Ottoman force was smaller, numbering about 315,500 men, of whom about 86,700 were killed and over 164,000 were wounded. The Turks held on to the high ground at Gallipoli, keeping the Allied forces pinned to the beaches. This bloody but successful defensive action formed one of the centerpieces of Turkish nationalism in the years to come, and Atatà ¼rk was at the center of it all. Following the Allied withdrawal from Gallipoli in January 1916, Atatà ¼rk fought successful battles against the Russian Imperial Army in the Caucasus. In March 1917, he received command of the entire Second Army, although their Russian opponents withdrew almost immediately due to the outbreak of the Russian Revolution. The sultan was determined to shore up the Ottoman defenses in Arabia  and prevailed upon Atatà ¼rk to go to Palestine after the British captured Jerusalem in December 1917. He wrote to the government, noting that the situation in Palestine was hopeless, and proposed that a new defensive position be established in Syria. When Constantinople rejected this plan, Atatà ¼rk resigned his post and returned to the capital. As the Central Powers defeat loomed, Atatà ¼rk returned once more to the Arabian Peninsula to supervise an orderly retreat. The Ottoman forces lost the Battle of Megiddo in September 1918. This was the beginning of the end of the Ottoman world. Throughout October and early November, under an armistice with the Allied Powers, Atatà ¼rk organized the withdrawal of the remaining Ottoman forces in the Middle East. He returned to Constantinople on November 13, 1918, to find it occupied by the victorious British and French. The Ottoman Empire was no more. Turkish War of Independence Atatà ¼rk was tasked with reorganizing the tattered Ottoman Army in April 1919  so that it could provide internal security during the transition. Instead, he began to organize the army into a nationalist resistance movement. He issued the Amasya Circular in June of that year, warning that Turkeys independence was in peril. Mustafa Kemal was quite right on that point. The Treaty of Sevres, signed in August 1920, called for the partition of Turkey among France, Britain, Greece, Armenia, the Kurds, and an international force at the Bosporus Strait. Only a small state centered around Ankara would remain in Turkish hands. This plan was completely unacceptable to Atatà ¼rk and his fellow Turkish nationalists. In fact, it meant war. Britain took the lead in dissolving Turkeys parliament and strong-arming the sultan into signing away his remaining rights. In response, Atatà ¼rk called a new national election and had a separate parliament installed, with himself as the speaker. This was known as the Grand National Assembly of Turkey. When the Allied occupation forces tried to partition Turkey as per the Treaty of Sevres, the Grand National Assembly (GNA) put together an army and launched the War of Turkish Independence. Throughout 1921, the GNA army under Atatà ¼rk registered victory after victory against the neighboring powers. By the following autumn, Turkish nationalist troops had pushed the occupying powers out of the Turkish peninsula. Republic of Turkey On July 24, 1923, the GNA and the European powers signed the Treaty of Lausanne, recognizing a fully sovereign Republic of Turkey. As the first elected president of the new Republic, Atatà ¼rk would lead one of the worlds swiftest and most effective modernization campaigns ever. Atatà ¼rk abolished the office of the Muslim Caliphate, which had repercussions for all of Islam. However, no new caliph was appointed elsewhere. Atatà ¼rk also secularized education, encouraging the development of non-religious primary schools for both girls and boys. In 1926, in the most radical reform to date, Atatà ¼rk abolished the Islamic courts and instituted secular civil law throughout Turkey. Women now had equal rights to inherit property and divorce their husbands. The president saw women as an essential part of the workforce if Turkey was to become a wealthy modern nation. Finally, Atatà ¼rk replaced the traditional Arabic script for written Turkish with a new alphabet based on Latin. Death Mustafa Kemal became known as Atatà ¼rk, meaning grandfather or ancestor of the Turks, because of his pivotal role in founding and leading the new, independent state of Turkey. Atatà ¼rk died on November 10, 1938, from cirrhosis of the liver due to excessive alcohol consumption. He was 57 years old. Legacy During his service in the army and his 15 years as president, Atatà ¼rk laid the foundations for the modern Turkish state. While his policies are still debated today, Turkey stands as one of the success stories of the 20th century- due, in large part, to Atatà ¼rks reforms. Sources Gingeras, Ryan. Mustafa Kemal Atatà ¼rk: Heir to an Empire. Oxford University Press, 2016.Mango, Andrew. Atatà ¼rk: The Biography of the Founder of Modern Turkey. Overlook Press, 2002.

Sunday, October 20, 2019

How to Make Your Mark as a Brand New Manager

How to Make Your Mark as a Brand New Manager The responsibility of being put in charge of a team comes with a lot of obligation. Of course, the higher ups expect you to meet established goals. But what often gets overlooked is your duty to the employees who report to you. Here are some tips on how to be a straightforward and reliable boss who will gain the respect and allegiance of your staff. Be a LeaderIt’s tempting to buddy up to your employees in order to establish a camaraderie, but the truth is that you are their manager and it’s hard to completely loosen up around you. Make specific requests and realize people will be hesitant to speak out against you if they don’t agree. Make sure they know if the door open for ideas that differ from yours.Be Direct and SpecificIf you have expectations and limitations, lay them out up front. No one likes to spend hours brainstorming just to be told their vision is too expensive or consuming to take on. Time is precious–when you give instructions, think about what you would like to be told if you were the employee in order to be your most productive.Be RespectfulIf you’re taking over a new team, realize that they were a group with ideas and output before you came along. Even if you don’t agree with how they operated before you arrived, tread lightly with criticism–any negativity might seem like a direct attack.Be TrustingWork must go on, even as you get up to speed on your new role. You won’t be able to be directly involved in all the goings on of your team as you get your bearings. Trust that everyone is there to do a good job.Establishing a solid manager-employee relationship from the outset will do wonders for your time at a company. If your team is on your side (and they know your on theirs!) they’ll go the extra mile to perform at the top of their game.

Saturday, October 19, 2019

It's Only Marijuana Case Study Example | Topics and Well Written Essays - 1500 words

It's Only Marijuana - Case Study Example According to the government, over 20 million Americans smoked Marijuana in 2012 alone, and there are approximately 11 million Americans smoking Marijuana habitually. This is happening despite the fact that the government has outlawed the use of Marijuana. Cannabis, popularly known as Marijuana is a drug that people use either for recreational or medicinal reasons. Since its discovery in 1920’s, people had been using it majorly for recreational purposes until 1970’s when they started using it as a medicinal drug. Various scientists have suggested that Marijuana can play a significant role in healing glaucoma, hypertension, or depression (Gerdes, 2002). Additionally, people living with Hiv/Aids can take Dronabinol, which has cannabis, and cannabis can treat anorexia that emanates when a patient of this kind undergoes chemotherapy. Clearly, there is little doubt that Marijuana is a useful substance that can treat some diseases. Across the world, people use Marijuana for recreational or medicinal reasons. However, some have gone ahead to use it for their own pleasure. This is the reason why all over the world, there is a talk on the legalization of Marijuana. The topic of Marijuana legalization is one of the ethical concerns that various stakeholders continue to discuss on various platforms across the globe. In this paper, I focus on ethics of Marijuana. The paper will dwell on the how people use this drug and whether it have advantages or otherwise. Through the concept of utilitarianism, the paper will explain the concept of ethics, and through ethical egoism, the paper will highlight some of the ethical issues surrounding the legalization of Marijuana (Fuller, 2010). The primary ethical dilemma about marijuana has always been its legalization. However, before we discuss the issue in lengthy, we need to understand the effects of Marijuana in order to make the figure out the short-term and

Friday, October 18, 2019

Analyzing Al-Qaeda Essay Example | Topics and Well Written Essays - 750 words

Analyzing Al-Qaeda - Essay Example Its associates have carried out attacks against prospects in a range of countries around the world, the most prominent being the September 11, 2001 attacks that were on the twin towers and the pentagon in New York and Northern Virginia. After the September 11 attacks, the United States government started a wide military and intelligence operation commonly known as the War on Terrorism, with the objective of dismantling al-Qaeda and killing or capturing its operatives and members. The leadership of this terrorist organization is held by Osama bin Laden, an active character in Soviet invasion of Afghanistan. Second to him in the organization is Ayman al Zawahiri who is an Egyptian surgeon. Apart from this other regional leaders also exist. One senior al-Qaeda member, Muhammad Atef was killed in the U.S. air strikes in Afghanistan, and another top commander, Abu Zubaydah, was arrested in Pakistan in March 2002. In March 2003, Khalid Sheikh Mohammed the mastermind behind the 9/11 attacks, and al-Qaeda's treasurer, Mustafa Ahmed al-Hawsawi were also captured in Pakistan. The Al Qaeda network basically extracts its funds and financing from extremists around the world and the Arab world that is rolling in money from oil exportation. When Soviet invasion in Afghanistan had to be stopped United States itself funded Osama bin laden, but since the first terrorist attacks the funding was stopped. INFRASTRUCTURE The organization does not operate from a single head quarter but from different locations and through different groups. Any terrorist act performed by the organization is accepted in a video tape usually launched after the activity. The organization has branches in hundred countries around the globe including the United States. Anti terrorist campaigns have successfully broken Al-Qaeda's cells in the United States, Albania, Germany, Italy, France, Spain, United Kingdom, and Uganda. PLANNING There are different planners for different activites, mostly people related to the region of the terrorist activity are selected for planning the terrorist activity that is going to take place. After the fall of the talibans in Afghanistan the main head quarters of Al Qaeda has been shattered and now the organization operates from different locations through out the world. Al Qaeda has targeted American and other Western interests, Jewish targets and Muslim countries it sees as corrupt or non religious plus the the Saudi monarchy. The list of attacks include. Bomb attacks on Madrid commuter trains, which killed nearly 200 people and resulted in more than 1,800 injuries. Car bomb attacks on three compounds in Riyadh, Saudi Arabia. Car bomb attack and an attempt that did not succeed to shoot down an Israeli plane with missiles, both in Mombasa, Kenya. Attack on a French tanker off the coast of Yemen. Many bombings in Pakistan Explosion of a fuel tanker in Tunisia. The major Hijacking attacks on the World Trade Center and the Pentagon. Bombings of the U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania. The main methods of attacking used are suicide bombing, planting bombs at locations and hijacking planes. The attacks have led to the death of millions of innocent people and have left a mark of terror on people,

Media Market Report of UK media outlet based on Mediatel Essay

Media Market Report of UK media outlet based on Mediatel - Essay Example Undoubtedly, the term ‘mass media’ is deceivingly a very simple term; however, it incorporates a wide variety of different institutions, which opposes each other in diverse scopes, techniques, and cultural frameworks. The purpose of these media institutions is same to provide information and entertainment to the general masses. The U.K. is among the frontline of these media institutions and shares a wide number of these media institutions with the viewers, both nationally and internationally. Being one of the most prominent and famous channel worldwide and obviously the U.K., the British Broadcasting Corporation has been able to cater the needs of the audience in the most effective and efficient manner. The purpose of this media report is to study, investigate, and discuss the subsidiary channel of the BBC, i.e. BBC One in reference to its performance, its audience and the revenues it has been able to generate. Moreover, the report will also highlight the past and future drifts, which the channel had observed and will probably witness in the future. When someone types this interesting three letters i.e. BBC on Google, you will be provided a list of different entertainments and services provide through a number of different mediums. The British Broadcasting Corporation (BBC), which came into existence in October 1922, however, the channel, which we are discussing in this report BBC One, was on aired on 2, November 1936 as the Flagship Channel of BBC. It was observed as the very first television channel rendering services to the audience in high resolution (Gray & Bell, 2013). The channel was renamed as BBC TV in 1960, until 1997 when it was again renamed to BBC One. Charlotte Moore is the present channel controller for BBC One since June 2013. The Channel because of its uninterrupted broadcasting of programs enjoys a variety of the audience in UK. There are different sister channels to BBC One including BBC Two, Three, Four, News, and BBC

Thursday, October 17, 2019

Law And Contract Resit Case Study Example | Topics and Well Written Essays - 1250 words

Law And Contract Resit - Case Study Example In this case four issues arise and these are noise and vibrations disturbing Pub's customer, Bloggs & Co Builders used the student car park to the jib of a crane, construction vehicles are constantly blocking the entrance of Public house owner and they work continues on site Saturday and Sunday mornings as a result the pub manager was disturbed.Winfield and Jolowicz defence private nuisance as an unlawful interference with a person's use or enjoyment of land, or some right over, or in connection, with it. This principle is neatly encapsulated in the words of Lord Wright in Sedleigh-Denfield v Callaghan1, where he said that a balance has to be maintained between the right of the occupier to do what he likes with his own and the right of his neighbour not to be interfered with. From it is implicit that as between neighbours, some measure of interference with the use and enjoyment of each other's land is permissible.The test is one of 'reasonable user' balancing the interest of defendan ts to use their land as legally permitted against the conflicting interest of claimants to have quite enjoyment of their land. It is a not a test of reasonable care. In Rapier v London Tramways Co2 held that it is no defence to prove that the defendant had taken all reasonable care to prevent the nuisance occurring. The Court will look at the result of defendant's conduct. In Cambridge Water v Eastern Counties Leather3, it was held that if the user is reasonable the defendant is not be liable for consequent to his neighbour's enjoyment of his land. In order to be able to sue for a Private nuisance, the claimant must have a proprietary interest in the land affected. In Malone v Laskey4 and Hunter v Canary Wharf Ltd5 it was held that landowners and tenants have right to bring an action but excludes mere licensee. So from the fact of the question it can be said pub owner and owners of public house and Birmingham City University may bring an action under private nuisance. But in question it is not clear whether pub manager was owner, tenant or license of the premises. However the location is an important factor. The locality in which the claimant's premises are situated is a second factor which assists the Courts in determining whether the interference complained of is sufficiently substantial to amount to a nuisance. The expectations of a claimant, in terms of comfort, peace and quiet, will naturally vary according to the location of his house or business. The point was succinctly made in Sturges v Bridgeman6, in which case a physician complained about the noise generated by a neighbouring confectioner who was operating a pestle and motor. Thesinger LJ stated that what would be a nuisance in Belgrave Square would not necessarily be so according to the area in which it occurs. The emission of smoke from a factory would not be considered a nuisance in an industrial estate, but would be likely to be found to be a nuisance in a largely residential area. In Gillingham BC v Medway (Chatham) Dock Co. Ltd7 held that a good example is the transformation of the London docklands from an industrial area to a now exclusive residential development. In this case it was held that planning permission which had been granted to change the use of an old naval dockward into commercial port should be taken into have effective a change in the character of the neighbourhood. The Court held that planning permission is not enough by itself to change the nature of the locality, although this may occur as a matter of fact due to investment in the area. The CA took the view in Wheeler v JJ Saunder Ltd8

Computer networks Essay Example | Topics and Well Written Essays - 1000 words

Computer networks - Essay Example When the size W of the window gets to 0, transmission is stopped. Increasing the size of the windows enhances the bandwidths and makes the connection more efficient. Considering the basic functionality of the window size, that is holding the data by a device from its peer at any one time, increasing the size will then make the device to hold more data in the buffer at a time. This will enhance efficiency of communication. Over reliance on cumulative acknowledgements can cause data transfer inefficiency due to packet loss. Selective acknowledgement allows the receiver of the packets to be able to accept packets that are discontinuous but received correctly. This is in addition to the last successful contiguous byte that was received. This is the same situation that happens in a basic acknowledgement. In this mode, the acknowledgement specifies the SACK blocks and they are then conveyed through starting and ending sequence numbers. The SMTP processes the email address of the recipient in the same domain. When the names correspond, the message is directly routed to the POP3 server or the IMAP server. In this case, it is routed to the SMTP. In the case of the local client who is sending an email over the network, there will be no communication with another domain server. This communication will be from the internal mail server 10.1.0.10 from 10.1.0.10/8. On getting the email address, the SMTP server can connect to the recipient SMTP server. For the local client, this communication is maintained within the same server. For sending an email over the internet, the information is passed over to the border router. b) A DNS lookup occurs when a device supporting an IP asks the DNS server for the IP address that is associated with a certain domain name. When looking for postmaster@myertor.com, the series of lookups that will take place include; the primary DNS server will be seeking to establish the IP address for postmaster@myertor.com. The first request will

Wednesday, October 16, 2019

Law And Contract Resit Case Study Example | Topics and Well Written Essays - 1250 words

Law And Contract Resit - Case Study Example In this case four issues arise and these are noise and vibrations disturbing Pub's customer, Bloggs & Co Builders used the student car park to the jib of a crane, construction vehicles are constantly blocking the entrance of Public house owner and they work continues on site Saturday and Sunday mornings as a result the pub manager was disturbed.Winfield and Jolowicz defence private nuisance as an unlawful interference with a person's use or enjoyment of land, or some right over, or in connection, with it. This principle is neatly encapsulated in the words of Lord Wright in Sedleigh-Denfield v Callaghan1, where he said that a balance has to be maintained between the right of the occupier to do what he likes with his own and the right of his neighbour not to be interfered with. From it is implicit that as between neighbours, some measure of interference with the use and enjoyment of each other's land is permissible.The test is one of 'reasonable user' balancing the interest of defendan ts to use their land as legally permitted against the conflicting interest of claimants to have quite enjoyment of their land. It is a not a test of reasonable care. In Rapier v London Tramways Co2 held that it is no defence to prove that the defendant had taken all reasonable care to prevent the nuisance occurring. The Court will look at the result of defendant's conduct. In Cambridge Water v Eastern Counties Leather3, it was held that if the user is reasonable the defendant is not be liable for consequent to his neighbour's enjoyment of his land. In order to be able to sue for a Private nuisance, the claimant must have a proprietary interest in the land affected. In Malone v Laskey4 and Hunter v Canary Wharf Ltd5 it was held that landowners and tenants have right to bring an action but excludes mere licensee. So from the fact of the question it can be said pub owner and owners of public house and Birmingham City University may bring an action under private nuisance. But in question it is not clear whether pub manager was owner, tenant or license of the premises. However the location is an important factor. The locality in which the claimant's premises are situated is a second factor which assists the Courts in determining whether the interference complained of is sufficiently substantial to amount to a nuisance. The expectations of a claimant, in terms of comfort, peace and quiet, will naturally vary according to the location of his house or business. The point was succinctly made in Sturges v Bridgeman6, in which case a physician complained about the noise generated by a neighbouring confectioner who was operating a pestle and motor. Thesinger LJ stated that what would be a nuisance in Belgrave Square would not necessarily be so according to the area in which it occurs. The emission of smoke from a factory would not be considered a nuisance in an industrial estate, but would be likely to be found to be a nuisance in a largely residential area. In Gillingham BC v Medway (Chatham) Dock Co. Ltd7 held that a good example is the transformation of the London docklands from an industrial area to a now exclusive residential development. In this case it was held that planning permission which had been granted to change the use of an old naval dockward into commercial port should be taken into have effective a change in the character of the neighbourhood. The Court held that planning permission is not enough by itself to change the nature of the locality, although this may occur as a matter of fact due to investment in the area. The CA took the view in Wheeler v JJ Saunder Ltd8

Tuesday, October 15, 2019

Digital Tools That Increase Academic Success For The Adult Learner Research Paper

Digital Tools That Increase Academic Success For The Adult Learner - Research Paper Example In laymans terms, a digital tool can be defined as computer software, hardware or internet-based systems that support the learning process. A study conducted by Power and Thomas (2007) aimed at investigating how the use of Information and Communication Technology (ICT) affects learning among teachers showed that laptops and handheld computers enhanced their professional development. In this study, Power and Thomas (2007) asserts that the respondents reported that continued use of these tools improved efficiency as they could study at a place and time of their convenience. These computers were fitted with other supporting tools that allowed them to take pictures to support their lessons, plan their lessons at home and subsequently transfer the course plans to school computers, and could also create audios for use in teaching (Power and Thomas, 2007). In this regard, digital tools enhance adult learning through ensuring easier planning of learning activities. Facebook, as a digital tool is important in adult learning as learners today connect with friends through social sites such as facebook and Blogger. Sara, an adult 18 year old college student cited by Bhatt (2012) affirmed the use Facebook to communicate with her classmates on issues associated with her course. Other digitals tools she asserts to use for support in learning for discussing with friends and classmates include her Gmail account and Blogs (Bhatt, 2012). Facebook, as a digital tool can also be used to communicate directly with other learners particularly through video links and can therefore be beneficial for sharing ideas, conducting discussions, and sharing posts relating to course materials. By supporting discussions, digitals tools enhance adult learning through information sharing. Communications and discussions relating to course materials in social sites are made possible by the internet. According to

Monday, October 14, 2019

Break Before University Essay Example for Free

Break Before University Essay It goes without saying that people like having the things they don’t have. Students always want to have a break after a long time they were very busy with studying, especially before they come to universities – a new environment with lots of challenging. It’ll be not good for a student to have a year break before going to university because it’s really a waste of time, and they might forget their knowledge. Today, both of adults and children always try to learn hard. Knowledge is unlimited; we never have everything in our mind. We learn bit by bit every day. If one stops working for one day, one eventually loses his knowledge. For one year, people can learn a lot of knowledge and experience, and you’ll be worse than others. Secondly, if you have a break for one year, it will take you more than one year to come back your work. In some case, the inertia is so great that one can’t go back to school.  Last but not least, one might forget your lessons easily when one doesn’t practice. When one comes to a university, one’ll continue learning your program in high school in a different way. One’ll have to learn by himself more than following teachers. It takes a lot of times to learn this new habit. Taking a long break seems like a cool idea, but I will not jeopardize my college education. A student will have to coup with many problems after such a break. One should consult his teachers and his parents before making that decision.

Sunday, October 13, 2019

Characteristics of Java Language

Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply Characteristics of Java Language Characteristics of Java Language Chapter 2 Literature review About Java:- Initially java language is named as Oak in 1991, which is designed for the consumer electronic appliances. Later in 1995 the name was changed to Java. Java was developed by James Gosling, a development leader in sun micro system. Oak was redesigned in 1995 and changed the name to java for the development of the applications which can be run over internet. Using the java language, java programs can be embedded in to the html pages. Java is not only limited for the web applications, it is also useful to develop the stand alone applications. Java has a feature called OOPs, which make it more familiar. Object oriented programming replaced the old traditional techniques i.e. procedural programming. Characteristics of java:- Simple:- Java language is simple than the previous languages such as c and c++. Java eliminates the pointers concept which is earlier present in c and c++. Java also has a properties i.e. automatic allocation of memory and garbage collection, where as in c/c++ the garbage collection and allocation of memory will be done by the programmer which is a complex task. Object oriented:- All the programming languages apart from the c++ are procedural languages which are paradigm of procedures. Java programming language is object oriented because java uses the concept of the object. In java everything will depend on objects i.e. creating the objects and making objects to work together. The overall functionality of the high level program will depends on the objects. Because java is object oriented program it provides great range of reusability, modularity and flexibility. Distributed:- Java uses the http and ftp which are internet protocols, in order to have access the files over the network. So by using this libraries which are in java can easily make file transfers over the network which is connected to internet. Interpreted:- In order to run the java programs we need interpreter. When the java programs are compiled it produces the byte code, which is machine understandable language. The byte code which is produced after the compilation is machine independent, so that it can run on any system using java interpreter. Most of the compilers will convert the high level language instructions to the low-level machine understandable language as machine cant understand the high level instruction. The machine code can only be executed on that compiled native machine. For example a source code is compile on windows platform, the executable file produced after cant be executed on other platforms apart from the windows. But, coming to java it is different i.e. the source code is compiled once and the executable byte code can be run on any platform using java interpreter. The main functionality of the interpreter is, it converts the byte code to the machine language of the target machine. Robust and secure:- Java programming is more reliable. At the time of the execution time java shows all the errors. In java bad and error prone language constructs are eliminated. Java eliminated the concepts such as pointers, due to this there is no corruption of data and overwriting the memory locations. In the same way java supports the exception-handling, which makes java more reliable and robust. Java forces the programmer to write the code for the exceptions, which may occur during the execution of the program. So that program can be terminated successfully, without any error stopping the execution flow of the program. Java also provides the lot of security. Security is important over the network because the computer will be attacked by the external program. Java provides the security that; it encounters the applets for the un-trusted sources. Architecture- neutral:- Java is a interpreted language, which enables java as a architectural neutral i.e. platform independent. We can write the program once and it can be executed on any platform with the help of the Java Virtual Machine (JVM). The java virtual machine can be embedded on the operating system or on web browser. Once the part of the java code is loaded into the machine, it is verified. Byte code verification play a major role, as it check all the code generated by the compiler will not corrupt the machine on which the code is loaded. At the end of the compilation, byte code verification will be done; in order to make sure thats the code is accurate and correct. So the byte code verification is the integral to the compilation and execution. Due to the property of architectural neutral had by java, it is portable. The program once written can be run on any platform without recompilation. Java does not provide any platform specific features. In other languages, such as Ada where the large integer varies according to the platform it runs. But in the case of java the range of the numbers are fixed. Java environment is portal to every operating system and hardware. Multi-threaded:- It is defined as the programs ability to perform several tasks (or) functions simultaneously. The multithreading property is embedded in the java program. Using the java programs we can perform the several tasks simultaneously without calling any procedures of the operating system, which is done by the other programming languages in order to perform the multi-threading. Constant Pool:- Every program i.e. class in java, has a array of constants in the heap memory called as the constant pool, which is available to that class. Usually it is created by the java compiler. The constants encode all the name of the (methods, variables and constant that are presented in the constant pool) which is used by particular method of any class. Each individual class i.e. stored in heap memory has a count of how many constants are there and also has offset which specifies how far in to the class description itself the array of constants begins (Laura Lemay, Charles L.Perkins, and Micheal Morrison, n.d). The constants are represented (or) typed in the special coded bytes and which has a very well defined format, when these constants are appeared in the .class file for the java class file. JVM instructions refer to the symbolic information in java, rather than relying on the run time layouts of the class, methods and fields. Sun Java Wireless Toolkit:- Sun java wireless toolkit CLDC (connected Limited Device Configuration) is a group of tools which is used to develop the applications for the mobiles and for other wireless equipments (or) devices. Although the sun java wireless toolkit is based on the MIDP (Mobile Information Device Profile), it also supports many other optional packages, which make a sun java wireless toolkit as a great tool for developing many applications. It can be supported on the windows and Linux. All the users who have account on the host machine can access this tool either singly or simultaneously. It allows you to use a byte code obfuscator to reduce the size of your MIDlet suite JAR file. It also supports many other standard Application Programming Interfaces (APIs) which are defined by the (JCP) Java Community Process program. Even though, the sun java wireless toolkit did not come up with an obfuscator, it is configured in a way that it supports the ProGaurd. All you need to do is, just simply to download the ProGuard and place it in the system, which sun java wireless tool kit can find it. But due to the flexible nature of the tool, it allows any kind of the obfuscator. BCEL:- BCEL full abbreviation is Byte Code Engineering library. The BCEL helps you to dig the byte code of the java classes. BCEL gives the utmost power on the code because it works at the individual JVM instructions, even though the power comes with cost in complexity. Using the BCEL, we can transform the existing classes transformation or we can construct the new classes. The main difference between the BCEL and Javassist is javassist provides the source code interface where as the BCEL is developed in the intension to work at the level of the JVM assembly language. BCEL is good because the approach it uses is low level, which is very helpful to control the program at the instruction level. Compared to Javassist it is more complex to work with the BCEL. BCEL has the capability to inspect, to edit and to create binary classes in java. There are 2 hierarchy components in the BCEL, in which one component is used to create the new code and the other component is used to edit (or) update the existing code. The inspection of the class aspect in the BCEL mainly deals with the duplication whatever available in the java platform using the Reflection API. This duplication is necessary (or) mandatory in classworking because we generally dont want to load the classes on which we are working until they are modified fully. Org.apache.bcel.classfile package provides all the definition which is related to inspection-related code.org.apache.bcel package provides the basic constant definitions. JavaClass is a class which is the starting point of the package. The JavaClass plays a role in accessing the information of the class using the BCEL same as like java,lang.Class does using the regular reflection in java. The JavaClass has a methods to get the information like structural information about the super classes and interfaces, to get the information of the class i.e. information about the field and methods in the class. The JavaClass will provide access to the some internal information about the class, including constant pool and identifiers. It also represents the Byte stream which is the complete binary class representation. If the actual binary class is parcel, then we can create the instance for the JavaClass. To handle the parsing BCEL provides a class called org.apache.bcel.Respository. The representation of the classes are parsed and cached by the BCEL by default, which are on the JVM path, to get the actual binary classes representation from the org.apache.bcel.util.respository instance. org.apache.bcel.util.respository is an interface which is source for binary classes representations. Changing the classes:- Not only the accessing the components of class, org.apache.bcel.Classfile.JavaClass also provide certain methods, in order to provide the liberty to change (or) alter the classes. The class component can be set to the new values by using those methods. Although those are of no direct use much, because the other classes in the package dont support constructing the new versions of the components that are building. There are certain classes in the org.apache.bcel.generic package that will provide the editable versions of the same components there in the org.apache.bcel.classfile classes. Org.apache.bcel.generic.ClassGen is the starting step (or) point for the creating the new classes. This also useful to modify the existing classes, to do this one, there is a constructor that takes a JavaClass Instance in order to initialize ClassGen class information. Once you modified the changes to the class, then we get the usable (or) useful class representation from ClassGen instance, in order get the usable representation of the class, we need to call any method that returns the class called JavaClass. Later it will be converted into the binary class information. It is little bit confusing, in order to eliminate this confusion, it is better to write a wrapper class for eliminating some differences. In order to manage the construction of the various class components, org.apache.bcel.generic provides many other classes apart from the ClassGen. It has a class called ConstantPoolGen , which is used to handle the constant pool. FieldGen, MethodGen classes which are used to handle the Fields and the methods in classes. For the working with the sequence of the JVM instructions there is other class called Instruction List. org.apache.bcel.generic also provides the classes for the each and every type instructions which are executed over JVM. We can create the instance for these classes directly some times and in other times by using the helper class called org.apache.generic.InstrcutionFactory. The main advantage of this helper class is, it handles are the book keeping details of the each and every instruction constructing for us( i.e. adding the items to the constant pool as required for the instructions). Sand Mark:- Sandmark is a tool i.e. developed to measure the performance of the software protection algorithms and effectiveness of the methods that are preventing the software from the piracy issues, water tampering and reverse engineering techniques. Sandmark is also has an ability to find which algorithm is most resiliences to the attacks and have a least performance of over head. There are many software protections are proposed both in software and hardware. The hardware protections are there from the dongle protection and now tamper-proof software. The sandmark tool is developed to evaluating and implementing the software-based techniques such as code obfuscation (making code complex to understand) and water tampering. History of reverse engineering:- Reverse engineering most probably starts with Dos (disk operating system) based computer games. The aim is to have full life and armed for the player to finish the final stage of the game. In that way the technique of reverse engineering came in to picture, it is just to find the memory locations where the life and number of weapons are stored and modifying the values of that memory locations. So that, the player can changes the values and gets through the final stage and win the game. Thats why memory cheating tools such as game hack came in to existence. Reverse Engineering:- Reverse engineering is the process of the understanding the particular aspects of the program, which are listed below To identify the components of the system and the interrelationship between the components. And enhance the components of the system and to improve the performance and scalability of the system (or) subsystem. Software reverse engineering is a technique that converts a machine code of a program (string 0s and 1s usually sent to logic processor) back in to the programmable language statements which is called as source code. Software reverse engineering is done to get the source code of the program because to know how the particular parts of the program performs particular operations in order to improve the program functionality or to fix the bugs in the program or to find malicious block of statements in the software if any. Generally, this reverse engineering will take place in older industries on machines. But now it is frequently used on computer hardware and softwar e. The important contents like data formats, algorithms what the programmer used to implement the software and ideas of the programmer (or) company will be revealed to the 3rd person by violating the security and privacy issues using reverse engineering technique. Reverse engineering is evolving as a major link in the software lifecycle, but its growth is hampered by confusion (Elliot J.chilkofsky James H.Cross ii, Jan 1990). Reverse engineering is generally implemented to improve the quality of the product, to observe the competitors products. Forward engineering is the process of moving from the high level abstracts (or) from the initial requirements stage (objectives, constraints and proper solution to the problem), logical, and independent designs (specification of the solution) to the final product i.e. implementation (coding and testing).; whereas the reverse engineering is the process of moving from the final product to the initial requirements stage in order to under the system logically, why particular function (or) action is being performed. By knowing the system logically, the flaws and errors in the system can be rectified and helps to improve the systems functionality when the source code of the application is not available. For this sake the concept of the reverse engineering techniques is evolved. Fig 1: reverse engineering and related process are transformations between or within the abstract levels, represented here in terms of life cycle phases. (Elliot J.chilkofsky James H.Cross ii, Jan 1990) Reverse engineering in and of itself doesnt mean changing the subsystem or developing the new system based on the existing. It is a process of examination (or) understanding the program (or) software but not replication (or) change. Reverse engineering involves very broad range of aspects such as starting from the existing implementation, recreating or recapturing the design ideas and extracts the actual requirements of the existing system. Design recovery is the most vital subset of the reverse engineering because in which knowledge of the domain, external (or) outer side information and deduction or fuzzy reasoning are added to the investigated (or) subjected system in order to find the high level abstract of the system, normally which is not obtained by directly observing the system. According to the Ted BiggerStaff: Students Paper: Ted BiggerStaff: design recovery recreates design abstractions from a combination of code, existing design documentation(if available), personal experience, and general knowledge about problem and application domains. Design recovery must reproduce Re-engineering is termed as renovation and reclamation, is the examination and altering the subjective system again to construct in the new form and the implementation of the new system. Re-engineering involves some form of reverse engineering i.e. to obtain the high level of the abstract of the existing system followed by forward engineering. This may be changes according to the new requirements that were not previously implemented in the system. While re-engineering is not super type of the forward engineering and reverse engineering but it uses the forward engineering and reverse engineering. Objectives:- The primary goal of the reverse engineering is to enhance the overall comprehensibility of the system for the both maintenance and new development. Cope up with the complexity. In order to meet the complexity and shear volumes of the system we have to develop a better methods i.e. automated support. In order to extract the relevant information reverse engineering methods and tools should be combined with the CASE environments. So that decision makers can control the process and product in system evolutions. Alternative views should be generated. Comprehension aids such as graphic representation as been accepted for long time. However maintaining and creating them is becoming difficult in the process. Reverse engineering facilitates the generation or regeneration of the graphical representation in the other forms. While many designers work on single diagrams such as data flow diagrams where as the reverse engineering tools will give the other graphical representations such as control flow diagrams, entity relation diagrams and structure charts to aid the review and verification process. To identify the side effects. Both haphazard initial design and intentional modifications to the system can lead to unintentional ramifications and side effects that affect the system performance. Reverse engineering can provide better observation than we can observe by forward engineering perspective. So it makes us to solve that ramifications and anomalies before users intimate them as bugs. Component reuse. Software reusability is becoming the more essential part in developing the new products in the software field. Reverse engineering can be able to help to detect the candidates for reusable components from the present system. To recover the lost information. When the continuous evolution of the long lived system which will lead to loss of information. In order to preserve the old information of the system design; design recovery of reverse engineering techniques is used. Many reverse engineering tools try to extract the structure of the legacy systems with the intension to pass this information to software engineers in order to re-engineer or to reverse engineer the existing component. Code reverse engineering:- During the evolution of the software, many changes will apply to the code, to add any functionality which is to be added and to change the code in order to rectify the defect and enhance the systems performance (or) quality. Systems with the poor documentation only the code will be reliable solution to get information about the system. As a result, the process of reverse engineering is focused on understanding the code. Thus reverse engineering has good and bad ends. Obfuscation:- Java provides platform independence to the software programs so that software programs will run independently on any platform. All the programs are compiled in order get intermediate code format i.e. A class file consists of a stream of very large amount of information regarding the program methods, variable and constant enough to do reverse engineering. When a company develops the program (or) software in java and sell this product in intermediate code format to the other organization by not giving the original software. The organization who buys the program (or) software will simply change (or) modify the software by violating the security and privacy issues of authorised company; by simply applying the reverse engineering technique. This reverse engineering will be done by the software developers, automated tools and decompilers. Java byte code can be easily decompiled, which makes reverse engineering technique easier in java. In programming context Obfuscation is described as, making program code more difficult to read and understand for security and privacy purposes of the software. Decompilers can easily extract the source code from the compiled code, in that point of view protecting the code secretly will make impossible. So the growth of obfuscators increased rapidly in order to keep effectively smoke screen around the code. Code obfuscation is the one of the most prominent and best method to protect the java code securely. Code obfuscation makes program to understand difficult. So that code will be more resistant to the reverse engineering. There are 2 byte code obfuscation techniques that are: source code obfuscation byte code obfuscation Source code technique is simply changing the source code of the program, where as byte code obfuscation is changing the classfile of the program (functionality is same as the source code). There several obfuscation techniques to prevent java byte code from decompilation. For example consider a set of class files, S, becomes another set of class files S through an obfuscator. Here the set of class files of s and s are different, but they produce the same output. Example:- class OHello { public OHello() { int num=1; } public String gHello(String hname){ return hname; } when the above code is passed through the simple obfuscator (such as Klass Master), the following code will be generated. class aa { public static boolean aa; public aa() { int aa=1; } public String aa(String ba){ return ba; } By observing the above code the class name OHello is changed to the aa and the gHello method name is changed to the aa. It is more difficult to read the program with aa than a OHello. By this way less information will be interpreted and understand to the reverse engineers. This is just a simple example by renaming the class variables and class method names. Categories of obfuscation techniques:- Description of Obfuscation techniques:- One way of obfuscating the source program by the obfuscators is replacing a symbol of a class file by illegal string. The replacement might be the private are even worst ***. Other techniques usually obfuscator will use targeting the specific decompilers (Mocha and Jode) is inserting a bad instruction in the code. The example is Let us taken an example with bad instruction, lets take the original code (decompiled): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return and after obfuscation the code is as follows (names are not changed, not to make complex): Method void main(java.lang.String[]) 0 new #4 3 invokespecial #10 6 return 7 pop By observing the above routine we notice that a pop instruction is added after the return statement. The last and final statement in the method that has return type should be return statement, but in the above routine a pop keyword is inserted which make the routine not to be executed for ever. Lexical obfuscation:- Lexical obfuscation changes the lexical structure of a program by scrambling the identifiers. All the names of classes, fields and methods which are meaningful symbolic information of java program, is renamed with meaningless name i.e. useless names. An example obfuscator for lexical obfuscation is crema. Obfuscator is defined as the program that automatically makes the transformation in the classfile in order obfuscate the classfile, to undo the reverse engineering technique to produce the source code from the class file. Layout obfuscation:- Layout obfuscation dealt with changing the layout structure of the program i.e. done by 2 basic methods Renaming the identifiers Removing the debugging information. Above 2 will make program code less informative to the reverse engineers. Layout obfuscation techniques use the one way functions such renaming the identifiers by random symbols, removing the comments, unused methods and debugging information. Though the reverse engineers can understand the obfuscated code i.e. done by layout obfuscation, it consumes the cost of reverse engineering. Layout obfuscation techniques are most commonly used in the code obfuscation. All most all obfuscators of java will use these techniques. Control obfuscation:- Changing the control flow of the program. It is easiest way to do and which make reverse engineer to find the code what exactly. For example consider a code in which a there is a method A(). Here another new method called A_Dummy() will be created and in the program Data Obfuscation:- Data obfuscation mainly deals with breaking up the data structures used in the program and encrypting the literals. This includes changing the inheritance, restructuring the arrays, making the variable names constant etc. In that way data obfuscation affect the data structures of the program. Thus data obfuscation make impossible to obtain the original source code of the program. More viable source code obfuscation methods are based on composite functions, which are Array Index Transformation, Method Argument Transformation, and Hiding Constant. The obfuscation techniques that are based on composite functions make the computation complex and extensive use of these techniques make the software to respond slowly. Some source code obfuscation methods are directed at the object oriented concept; Class Coalescing, Class splitting, and Type Hiding. Other source code obfuscation techniques may include; false refactoring, restructure arrays, inline and outline methods, clone methods, split v ariables, convert static to procedural data, and merge scalar variables. The obfuscation techniques that work over object oriented concept and other techniques like restructure arrays, split variables, merge scalar variables may distort the logic of the software, so these must be carefully used. The employment of obfuscation technique like outline methods, clone methods, convert static to procedural data increase the size of a class file without providing any significant advantage. In lining a method results in an unresolved method call when some other class calls the in lined method. Advanced obfuscation techniques for byte code:- There are several obfuscation techniques to prevent java byte code from de-compilation. Many of these tools are simply to change the names of the identifiers with the meaningless names which are stored in byte code. Many crackers can understand the actual source code, even though identifier name are changed, but it will take more time to understand. Traditionally, when a program is compiled to machine code, most of the symbolic information will be stripped off, after the compilation of the program. When the program is compiled, the address of the variable and functions of the program will be denoted by the identifiers. Even though de-compilation of such compiled code is difficult, but still it is possible to decompile the code. We say protection techniques are difficult if and only if the time and effort taken by the cracker to crack the software should be with more cost and effort. Cracking time to crack software is more than a re-writing a program, then its of no use and waste of time and valueless. Java became the most popular because of benefits that it is providing. One of the major benefits is portability i.e. compiled program can run on any platform i.e. platform independent. When the program is compiled it produces independent byte code. Java uses the symbolic references rather than the traditional memory addresses. Therefore, the names of methods and, variables and types are stored in a constant pool with in a byte code file. There are many commercial de-compilers (P C, 2001, Vliot 1996, hoeniche 2001 etc.). When the program is decompiled, it extracts the program almost identical to the source code. Making use of decompiler to extract the source code becomes the lethal weapon to intellectual property piracy. Obfuscation technique is used to stop de-compilation of the byte code. The main aim of obfuscation technique is to make decompiled program harder to understand i.e. more time and effort to understand the obfuscated code. Obfuscation scope:- Java application consists of one or more packages. A programmer might divide the program in to packages. He can also use the packages that are in standard library and proprietary libraries. Only the part of the program developed by the developer will be given outside. The proprietary library is not distributed due to the copyright restrictions. Obfuscation scope termed as the part of the program obfuscated by the obfuscation techniques, i.e. the part of the program/software developed by the developer is protected not the entire software. The package that serves as the utilities for the standard library and proprietary libraries not obfuscated. Candidates considered for identifiers scrambling:- An identifier will denote the following terms in java http://www.cis.nctu.edu.tw/~wuuyang/papers/Obfuscation20011123.doc the bytecode file. By default, parameters and local variables are stripped and deleted (or) removed from the byte code. The names of the local variables and parameters are stored in the LocalVariableTable in the byte code, if the debug info is enabled. But, by default the de-bug info is enabled in java compiler. If the local variable is not found, de-compilers itself create the names for local variable and parameter, which makes program after reverse somewhat understandable. Even, if we rename the names of the variables and parameter in LocalVariableTable, good decompiler will simply