Monday, August 24, 2020

The Impact of Prejudice and Discrimination Research Paper

The Impact of Prejudice and Discrimination - Research Paper Example prejudgment or wrong observations and an inclination to sum up everybody having a place with that specific gathering as having an individual attribute, trademark, conduct, or highlight that is characteristic of the minority gathering. Individuals can some of the time be heedless to reality regardless of whether real perception misrepresents their mis-discernments because of a predictable refusal to see that a few people can be totally different from what they portray them as, all things considered. Subjection in America during its initial years is a genuine case of how partiality or separation can have dependable results whenever executed by a bigger gathering. Bigotry emerging from obliviousness, predisposition, bias, and separation brings about avoidance of a minority bunch from the political, financial, and social circles of society. Its belongings for the most part are negative particularly if bigotry is submitted efficiently and implanted in the mind of everybody which thus assists with propagating an inappropriate thoughts and wrong view of a minority gathering to such an extent that it turns out to be right around a perpetual element of a general public, conveyed starting with one age then onto the next age. Its evil impacts can be felt or found in lower earnings for the gathering and prohibition from circumstances for the most part concurred to individuals from everyone. One-sided treatment of minority bunches additionally consider severely the entire society since it is characteristic of its own bigotry and resoluteness towards others who numerous not share similar convictions. There were cases in the past in which segregation was very much reported in light of the fact that it was made authority arrangement and there are likewise ongoing cases in which separation isn't so conspicuous or plain yet at the same time brings about the orderly rejection of a minority gathering. All cases impactsly affect the minority individuals victimized. It is the point of this short paper to examine one occasion of segregation and partiality before and afterward talk about a later comparable occasion in contemporary occasions. The two occasions (past and

Saturday, August 22, 2020

Media coverage of Big Brother Essay Example for Free

Media inclusion of Big Brother Essay An investigation of how the famous figure Jade Goody was spoken to in media inclusion of Big Brother. Notwithstanding being the subsequent last ousted from the older sibling house, and separated from being well known in the open watchers eyes, Jade Goody has been depicted by the media as a truly questionable person whom is presumably named as the most exceedingly terrible housemate ever. In The Sun Jade has been uncovered, as an idiotic and drippy competitor who they firmly feel ought to be removed from the house as quickly as time permits due to their cliché methods of remarking about a person. The language in The Sun is lacking, Dated 18 June an article in The Sun utilizes different competitors in the house as their fundamental proof of her loudmouthed habits, which has affected and brought an uproar into a considerable lot of the media press for Big Brother. Jade carelessly, doesn't know about the outside world. The sun utilizes slang to get messages across to the peruser which puts the perusers mind in a condition of casualness, something they also can have a chuckle at. In article the press go excessively profound into her own life and utilize an inclusion about her criminal father to depict her outside life. They utilize this appellation so as to make pressure and bias about jades direct in the Big Brother house. Jade here is spoken to as a miscreant from an awful family who perhaps has a great deal of things that she can be differentiated too which characteristically is the manner in which The Sun name individuals. Being known as a pig and being removed, as a pig is anything but an exceptionally fulfilling approach to discover the thing the press has said about you. Jade in articles composed by The Sun. Another feature that starts utilizing her sexuality is the article dated June 19 in which the feature figuratively alludes to the sexual insinuation they make about her and PJ resting together, toe-employment to blows work is undertone of her sexual life. In that specific article the author attempted to make jade as an individual who is irritating as she is alluded to as loudmouthed jade, sorrowful which doesnt show her as a solid participator toward the start of something that can change her direction life. Utilizing Jades moms sexuality lesbian mother influences the general population as they are placed in spot where they are spellbound to imagine that it isn't right to not be hetero. To the open perusing an article about the sexual coexistence of big names interests them and carries amusement to their psyches, anyway it tends to be an extremely miserable thing to where the big name feels deceived by individuals around them. The articles composed by The Sun utilize numerous individual terms and stories to stand out that it appears that the media like to abuse her private life to general society for individual rights. In any case, it is by all accounts ailing in equity in light of the fact that doesnt jade have her privileges as a person? Her mom is portrayed as an unmarried Jackie Budden, which adds to the heap of individual issues. Does it truly make a difference if her mom wasnt wedded and it shouldnt truly have an impact or change o the manner in which jade will continue winning to second place. The Sun appear to be extremely predisposition, they dont appear to like jade goody on account of the way that her fathers in prison, her moms sexuality and the manner in which it contrasts from jade. Being a dental medical attendant has been differentiated to the way she doesnt appear to have helped individuals like her on the grounds that in the sun she has been assigned as the countries generally loathed. It shows that they utilize her occupation also to portray her disappointment in the house. Numerous different kinds of correlations are made about jade, for example in an another article her yawing got by a camera is differentiated to a primate mirroring jade which is somewhat amusing about her inclination. Numerous photos that are placed into the articles by The Sun depict her as an unflattering individual, large boobs all painstakingly chose to make her look ugly and not somebody youd especially need to follow in sync shrewd. In the Jade should keep her huge mouth shut article an image of disgustingly easting a pizza fits with the heading. Underneath they utilize a similar sounding word usage to draw out the quip in her. Another type of symbolism utilized by The Sun is an image of her bosom dropping out of her swimsuit which has a heading of Jade Boobs again which could be a clothing about her weight which isnt a decent method of speaking to somebody. All through her time in Big Brother The Sun utilized numerous appalling, biased remarks about Jade to it might be said engage the perusers. Anyway by introducing her as a pig, imbecile and numerous different types of negative and infamous depictions the sun made a derisive and unpleasant side to jade. In view of the homophobic, cliché notoriety that The Sun holds it fits the idea of the articles composed by them to remark upon her like this. Anyway in The Daily Mirror they utilize another method of introducing jade. In spite of the way that she may have been named a pig, a bovine it doesnt stop them making the counter Big Brother crusade, which they take complete, sides on Jade. The first page of the Daily Mirror has 3 pictures of Jade looking rather discouraged and segregated. She is wearing a cross; with a white top, which could be a strategy, this paper uses to draw out another side of Jade. Her honesty doubtlessly. The feature begins with Nobody Loves me, and underneath the image the correspondent has included his sentiments however I do. which makes tension just as energy to the perusers of who could be the individual who does, and why. The page 10 inclusion is fairly unique to the Suns writes about Jade as here she has been depicted as not the most honed pin but rather who cares. This is a defining moment to a debateable inquiry of whether jade is a positive or negative challenger. The article incorporates better photos of her grinning, seeming as though she can have a ton of fun and as an honest individual. The article itself is hopeful about jade Kevin OSullivan concedes that he has compassion toward the heavenly ms Jade which is fairly unexpected in sense for the individuals who have quite recently perused the sun articles on jade goody. The article utilizes antonyms from the articles that are extremely skeptical about her. The language here is increasingly thoughtful and near the heart. It appears to be increasingly agreeable in light of the fact that the peruser doesnt need to feel like they are pushed to accept each word. Anyway here she is put as a poor young lady who lavishly has the right to win. Anyway there are ridicules about how she wont win excellence challenges and how she is a blonde bumshell-sorry stunner which shows that the essayist in a manner sees her as disagreeable he attempts to keep it cautious. The article states how the reasons why they have made an enemy of elder sibling effort was on the grounds that they felt that they too fitted the group in this manner it was the ideal opportunity for a change. This speaks to jade as someone else, here in this article she isn't differently misused however gently remarked upon. It additionally appears that in light of the way that the sun has been remarked upon by numerous individuals the Daily mirror expected to abstain from being remarked upon as well. By making a thoughtful picture to the peruser they can help draw in more perusers. The day by day reflect by embracing the title The counter Big Brother battle appears to have removed them from war, since September eleventh. By putting another enemy of subject separated from it assists perusers with escaping from strain and to having some type of delicate amusement. Both article feel sorry for jade anyway in the sun they utilize individual remarks to make disruption by the perusers for jade goody though in The Daily mirror they attempt to make compassion and warmth. It truly involves choices made by the perusers of whom they favor one side on. Jade has been introduced rather ineffectively all through her time in Big Brother because of her looks and character. By making her as an individual that is incidentally a disappointment in the show they have had the option to catch a structure tattle segment for their perusers to appreciate.

Tuesday, July 21, 2020

Cyphort

Cyphort INTRODUCTIONMartin: Hi. Today we are at one of the safest places in Santa Clara, the Cyphort. Fengmin, who are you and what do you do?Fengmin: Yes. I’m a co-founder and also the Chief Strategy and Technology Officer od Cyphort.Martin: What is Cyphort?Fengmin: So at Cyphort, what we are really doing is we are offering the next generation advanced threat defense product. Think of it as a tool, but it’s a tool that is helping the enterprise IT people to really implement this new thinking about the best way to defend against advanced threat. And with that new thinking, new approach, our tool is actually designed to best help people implementing that new approach.Martin: When did you start this company, and what did you do before?Fengmin: The company was started in around March of 2011. And before that, I kind of did a few startups. And I’ll go back a little bit just to give you an idea. After I finished my PhD from Washington University in St. Louis, Missouri in the U.S., I spent a bout eight years on DARPA funded research projects, and that is mostly working on high speed networking and basically security. So for DARPA project, you typically actually build a prototype, not like National Science Foundation kind of project where you write papers.So that eight years, I always think of it as a training for me. Once around Year 2000, that’s where we saw a few security startups, the early days of intrusion prevention or detection products, we realized that we have been doing much more advanced technology and building prototype under the DARPA project. We believed a much better technology and solution compared to some of the startups. So that’s where I started having the initial idea of maybe I should create a startup. Actually, it’s around that time that I got the first opportunity, first call to do a startup in Silicon Valley. So that’s when I moved and started my first company called IntruVert Networks. That is really an intrusion prevention product compa ny.Followed by that company, we were basically acquired by McAfee. So we went to McAfee and I worked there for a few years to help integrate that product into McAfee portfolio. But then I went to start up my second one, that is, Bartel Networks, a next generation firewall, followed by also two years as a Chief Security Content Officer at FireEye.What I want to probably really point out, the main thing, I think, in this kind of past is always I tried to keep up with what the security threats are going, where it’s going, and how the IT infrastructure actually is evolving because a combination of those two really create or define new needs for tools for people to defend. So pretty much that’s kind of my career, how it has evolved, and even come into founding Cyphort is actually continuing on the same path and always trying to build the next best tool that IT people can use.Martin: Who are your customers?Fengmin: For us, the customer really includes all enterprise class companies. T he product is helping them to really protect the threats that are either coming from the external coming to their network or some threat landed on their network, actually moving laterally inside the network. It’s not going to be industrial sector-specific because, as you know today, that kind of threat problem is applicable to every sector. It’s only mainly determined by how sophisticated and at what stage their enterprise actually understands the problem. So it’s across the industry sectors.Martin: Fengmin, do you only help identify the threat, or are you also helping mitigate the threat?Fengmin: Yes. That’s a very good question. We built a product to actually best support this new, I would call it, paradigm shift in terms of how do you deal with advanced threat. What we realized was really for enterprise, the bottleneck, if you will, in advanced threat defense is really with the ability to detect the threat reliably, cover all the vectors of potential threat propagation, a nd also provide a very actionable, relevant results for them to take action. So once we realized that is the main problem, the Cyphort product was built with the focus on accurate detection and covering all the bases, make sure that you detect them, and also with very reliable and very relevant data to the enterprise under protection.But today what we don’t do is we do not provide a firewall function for you to do an enforcement. The reason we didn’t position the product this way is we realized that most of the enterprise already have one form or another next generation firewall or some of the security web gateway and they already made an investment. They have that product deployed, and those products are not doing the best defense for the enterprise because they do not know what data to use to actually make a blocking, for example. So if someone tells them this is the kind of data you use to do that blocking, they can block it well. So we come in to fill that gap and we want to provide that detection data.Martin: So this means that your main focus is identification of the threat and then you push this kind of information or the result of it, who’s the threat and who is not to the firewall, who will then decide if this a threat according to Cyphort, you won’t allowed it in?Fengmin: Correct. Actually, that brings us to this second notion. We talked about this new paradigm shift, right? The notion people say is you have to continuously monitor all the possible vectors and then you try to determine what exactly happened, what’s relevant to your environment, at what stage the attack is going, and then with this very specific data, you want to turn it into actionable data. So what we end up doing is associated with this notion is a notion of an ecosystem-based defense approach. So that’s when Cyphort detects something from Day 1, the product support is out of APIs. So it basically allows any other product to consume the results in a fashion that is read ily implementable for blocking something.Martin: How do you define a threat? Is spam also included in the definition?Fengmin: We would not consider the typical email spam you think in the past where someone is mainly sending an email, a lot of message just to spread maybe some rumors, right? What we are focusing on is think of malware pieces, maybe a piece of code, compared to the old days of the virus. Now the advanced one that comes in not only have a lot of attack payload but also have a lot of capability to try to hide itself and also have a lot of network-based communication to go back to the server. So that’s where the malware is really the most lethal weapon, if you will, for the modern threat, right? So the malware is really the focus, and then anything associated with that. So you mentioned the email. Although the spamming is not the focus, but email as a vector for the malware to get into the enterprise to infect someone’s machine. So we also cover the email. We make s ure we are able to extract the files and then inspect them to actually detect them as well.Martin: You have two sides of the equation. You have, on one side, the attackers, and you have on the other side something like Cyphort who is defending the company. And there’s always this kind of competition. One time the attackers are in the frontline, and sometimes the defenders. How do you keep up with the speed that the attackers are developing? Because they are using different strategies. How do you keep up to date?Fengmin: Yes. It’s very interesting, and this is indeed a challenge for us. One of the fundamental components in our detection technology is, in addition to use… people are all aware of this notion of sandboxing. Sandboxing is really useful to be able to detonate or run a piece of code and, based on behavior, try to determine if it’s malicious or not. Now, just using the sandbox to detonate it may not allow you to adapt and to cope with the new ones, but that’s how the old generation of the product typically implements a set of specific rules or look for a pattern, if-then-else kind of pattern or heuristics try to then determine if a piece of code is malicious or not.But for Cyphort, one of the things from Day 1, we realize what we need to do is to marry this detonation behavior-based with machine learning. So the machine learning allows us to do two things. Number one is indeed even for a piece of malware, we’ve already seen it’s something that maybe just happened, but by looking at the behavior of that and relying on the machine learning model to train and then build a more sophisticated mathematical model to predict and to generalize into the class of malware that have a similar behavior but it’s not the same thing. So we are able to detect that. That gives us the ability to detect unknown or you can also refer to as a zero day from a malware perspective.Then the second thing that machine learning allows us to do is once we have this systematic architecture, then if we are able to continuously monitor, use additional means to collect new samples and to do the training periodically and then release the new model into the product, now we have a continuous learning and adaptation. So of course to complement and support the second part, what we have been able to do is, in addition to collaborating with a lot of other entities, the threat intelligence, companies and also community-based feed out there, we also have built what we refer to as a crawler infrastructure in Cyphort labs. What the crawler infrastructure allows us to do is to constantly go out, use our own hardware-based sandbox to go out to the wide internet and to get our sandbox infected. When that happens, and then we have the collection of new exploit pack and new samples, and that feeds into our machine learning, so that’s really at least a main part of our approach how to keep up.Martin: This is also where my question relates to. I totally understan d if you have lots of users and you get lots of data that you can improve your machine learning algorithms for detecting those threats. But when you started out, you did not have that much of a customer behavior data. How did you convince the first customers to say, “Yes, I’ll go with Cyphort,” without you having that much data which machine learning algorithm you can apply to?Fengmin: Right. Of course, there are two parts to it. One part is indeed we need to leverage some existing collection of malware samples, and luckily with both some of the partners and also one of the well known ones that you’re probably aware of is Virus Total, and it probably has the largest collection of the malware samples. So by applying, using the existing samples, we are able to learn a model fairly recent. So that’s from the technical part. But then when it comes to engaging the customer, really I would say a few big steps that we have taken.Number one is indeed really be able to identify the key problem the customer is facing and also showing that we understand the customer’s problem, and also have a common understanding of the best approach to actually improve their defense.Once we have that conversation, then the next thing is we share how we build this product or the tool, how that tool would support this understanding of how to approach it.And once we have that, really the third step is basically almost all enterprise customers would require that we actually make the product available and for them to actually test drive it. So they would actually go through an evaluation on their network.Of course, in that process, we provide as much help to get them through the hurdle where they typically are always resource-limited, so we help them make it easy for them to install it on the live network and go through an evaluation period. So we are able to approach the customer that way, and we’re happy with what we have been able to do so far. Yes.Martin: Fengmin, how do yo u show the customer whether there is a malware? For example, if I’m looking at a company and the emails they are getting. And what I understood is that you are also scanning some kind of files, whether there’s malware included or not, for minimizing that the system is breached. How do you do this in minimal? Is it just that you have some kind of bar which says, “Okay, 95% chance there’s malware included,” or if there is a special threshold the email doesn’t go through? What’s the process?Fengmin: Yes. For us, actually in Cyphort product, we end up using multiple inspection message, we refer to. Because we realize for the modern attack, the malware, they can come in different ways and also they all have their sophisticated kind of evasive behavior in them. Some of them may evade a traditional virus scan, like a static analysis, right? You look at a code, how the code structure looks like, and then the behavior based on when some of them actually are able to detect if th ey are being watched in a sandbox, they may stop running. So what we end up doing is once we realize this, then whenever we get a piece of code that we feel this unknown, they could be a malware-carrying file, then we actually go through both static analysis, looking for known patterns, and also we have repetition data referenced to Virus Total, in addition to our own more kind of sophisticated static analysis and behavior. So in this case, what it means is when we decide if something is really bad, indeed there is typically a kind of a range of behavior, and you can almost think there is a threshold.Today what we have done is intentionally not expose that kind of slider to the customer but we are able to take into account of this multiple methods of inspection, then we look at those information together. So for the machine learning, indeed we actually come up with the behavioral-based score. They range basically, let’s say, from a 0 to 100, that kind of scale. And we choose a thr eshold based on our training and also we in the future can allow customers to set based on how aggressive they are.But the interesting thing, it’s helpful when we use both Virus Total and static multiple kind of method is if something is already known…because you expect, right? They don’t always use something totally new. There are a lot of them that use some existing things. So that’s the benefit of the product. If they use something that is not new, then additional methods, including the Virus Total, actually give us a context, and in that case, it’s fairly black and white. And we can even tell them what are the other products already, be this bad or the same thing, and then what the names they are referring them to. And then we can basically compare that with what our machine learning is telling us. So they both help us to improve the machine learning. At the same time, we can tell the customer if something is already known, potentially how long ago they have been out t here versus all the way to something really new. So that way, the customer, based on how aggressive they want to respond to it, they could choose different path towards it.BUSINESS MODEL OF CYPHORTMartin: Fengmin, let’s talk about the business model of Cyphort. How are you making money with it? Is it a SaaS model or is it something like an installment fee?Fengmin: Yes. That’s a very good question because we always have to make money. So in this particular case, the current model is we choose a software of virtual appliance-based delivery model but it’s subscription-based. So we have seen a lot of customers. The subscription-based one gives them some flexibility, at the same time gives them more like a steady kind of cadence for them to make the budget decisions. So the thing really, so far it worked the best for us, is really the software-based delivery along with support for virtualized environment. And in this case, we can be deployed both on premise and also when they choos e to, like we have customers where already most of their computing have gone to AWS, and so in that case, they can actually deploy our product in the AWS environment as well.The way the product is designed, because it’s API-based and software-based delivery, it allows it to be easily deployed and also provides a service in a SaaS model. So we are actually right now working on that based mainly on the customer demand because in the initial set of customers, we’ve definitely seen more customers want to have products deployed on premise because there is still some concern about their data going out of their network.Martin: Are you somehow differentiating the SaaS products maybe based on volume or based on number of employees of the customer or some other metric?Fengmin: Oh, the pricing model you are referring to? Yes. Right now, actually we have a pretty much unified pricing model that is based on the protected bandwidth.Martin: What’s that?Fengmin: So the notion is let’s say y ou may have multiple links, network action links you have to watch. So on that link, you know what the typical amount of traffic is going through it, so then you purchase our product based on that expected amount of data that we have to inspect and then detect and then protect. So actually that’s also one thing that we have got very positive customer feedback. What ends up happening is let’s say you purchase five gigabits worth of the traffic and then the Cyphort product does not limit the customer how many links that you are monitoring, maybe how many servers you deploy to monitor this link. So for them, that is very flexible because you may have multiple offices and distributed across the globe and then you don’t have different pricing models. It’s the total amount of protected link bandwidth.Martin: Fengmin, how did you acquire the first customers, and did any of the process for customer acquisition change over time?Fengmin: Yes, and that’s a very good question. The ini tial customer is really based on some of the connections, in this case, both the connection, let’s say, with the executive team and also the connection, for example, with our venture capital funding partner. That is very typical practice. It’s more about initially with the connection we have someone that is willing and open their ears to listen to us, and that is very important. But then quickly as the time goes, today we have a lot of customers, now they’re already coming through a very typical funnel. You think of that process from you have mind share and you have lead generation. So that means now it becomes at scale operation because those customers, because they know they have heard about Cyphort and they have a problem, then they see Cyphort as a potential contender for that, then that’s how value comes in. Today our customers, both from that kind of normal channel, at the same time they become much larger customers compared to the early set.Martin: Sure. Is it mainly driven currently by inbound marketing, or is it also that you have a direct sales force which goes out to meet potential clients and then tries to acquire them?Fengmin: Yes. We actually have. Cyphort has, I think, maybe a very interesting, very initial result. We were so happy we were doing so well. As you imagine, most of the enterprise company products, you always rely initially on a direct sales force to go after the account. But then for Cyphort, as actually even early this year, we already have several dozen partners.Martin: Distribution partners?Fengmin: Correct, and these are the ones… So it’s very rare in even my past several companies. At this early stage, we have so many partners and signed with us, and actually today we definitely have over 50% of our deals directly coming through the partner source versus our direct sales.Martin: And can you describe this kind of partners? Are they more some kind of antivirus or firewall programs, or are they consulting companies, or what type of companies?Fengmin: Yes. Actually, one example I would mention is this company called Optiv. They used to be there were two companies. One is called FishNet. The other one is called Accuvant. These are the companies that they have their own labs. They also have their own, of course, sales engineer and the whole workforce from the marketing all the way to product. So they typically help the customer define a set of solutions for their security protection needs. So these are really major players, and they help both for getting the customer and also, of course, some of the training and support, installation also are coming from them. So those two companies actually, a few months ago, they merged and they became Optiv. And we are one of the very select few small set of partners that they have.Martin: Over the last four years, what have been the major obstacles while building and growing Cyphort? How did you manage those obstacles?Fengmin: I think for us, the main things are all related to scaling up the sales, and this is where, of course, one of the things that we learned is, for instance, the kind of product. We are indeed an advanced threat defense product, so if you compare it to the old generation of some of the security products, they are more complex, and that means going to the enterprise, there are more dependencies with other product and also there is the education of the customer aspect. So we have basically at the same time not only helped to educate the customer for their adoption of the newer approach, the better approach for defense, at the same time to basically improve the product because you always scale from smaller customer in the key features then to more mature at scale features and for what we refer to as enterprise readiness. It’s really talking about more deployment scenarios and more other products to integrate with and also to account for different kinds of IT configuration. So most of our work has been along these lines, along with scaling up the sales force. That’s the main challenge in the last few months.ADVICE TO ENTREPRENEURS FROM FENGMIN GONG In Santa Clara (CA), we meet co-founder and CSO of Cyphort, Fengmin Gong. Fengmin talks about his story how he came up with the idea and founded Cyphort, how the current business model works, as well as he provides some advice for young entrepreneurs.INTRODUCTIONMartin: Hi. Today we are at one of the safest places in Santa Clara, the Cyphort. Fengmin, who are you and what do you do?Fengmin: Yes. I’m a co-founder and also the Chief Strategy and Technology Officer od Cyphort.Martin: What is Cyphort?Fengmin: So at Cyphort, what we are really doing is we are offering the next generation advanced threat defense product. Think of it as a tool, but it’s a tool that is helping the enterprise IT people to really implement this new thinking about the best way to defend against advanced threat. And with that new thinking, new approach, our tool is actually designed to best help people implementing that new approach.Martin: When did you start this company, and what did you do before?Fengmin: The company was started in around March of 2011. And before that, I kind of did a few startups. And I’ll go back a little bit just to give you an idea. After I finished my PhD from Washington University in St. Louis, Missouri in the U.S., I spent about eight years on DARPA funded research projects, and that is mostly working on high speed networking and basically security. So for DARPA project, you typically actually build a prototype, not like National Science Foundation kind of project where you write papers.So that eight years, I always think of it as a training for me. Once around Year 2000, that’s where we saw a few security startups, the early days of intrusion prevention or detection products, we realized that we have been doing much more advanced technology and building prototype under the DARPA project. We believed a much better technology and solution compared to some of the startups. So that’s where I started having the initial idea of maybe I should create a start up. Actually, it’s around that time that I got the first opportunity, first call to do a startup in Silicon Valley. So that’s when I moved and started my first company called IntruVert Networks. That is really an intrusion prevention product company.Followed by that company, we were basically acquired by McAfee. So we went to McAfee and I worked there for a few years to help integrate that product into McAfee portfolio. But then I went to start up my second one, that is, Bartel Networks, a next generation firewall, followed by also two years as a Chief Security Content Officer at FireEye.What I want to probably really point out, the main thing, I think, in this kind of past is always I tried to keep up with what the security threats are going, where it’s going, and how the IT infrastructure actually is evolving because a combination of those two really create or define new needs for tools for people to defend. So pretty much that’s kind of my career, how it has evolved, and even come into founding Cyphort is actually continuing on the same path and always trying to build the next best tool that IT people can use.Martin: Who are your customers?Fengmin: For us, the customer really includes all enterprise class companies. The product is helping them to really protect the threats that are either coming from the external coming to their network or some threat landed on their network, actually moving laterally inside the network. It’s not going to be industrial sector-specific because, as you know today, that kind of threat problem is applicable to every sector. It’s only mainly determined by how sophisticated and at what stage their enterprise actually understands the problem. So it’s across the industry sectors.Martin: Fengmin, do you only help identify the threat, or are you also helping mitigate the threat?Fengmin: Yes. That’s a very good question. We built a product to actually best support this new, I would call it, paradigm shift in terms of h ow do you deal with advanced threat. What we realized was really for enterprise, the bottleneck, if you will, in advanced threat defense is really with the ability to detect the threat reliably, cover all the vectors of potential threat propagation, and also provide a very actionable, relevant results for them to take action. So once we realized that is the main problem, the Cyphort product was built with the focus on accurate detection and covering all the bases, make sure that you detect them, and also with very reliable and very relevant data to the enterprise under protection.But today what we don’t do is we do not provide a firewall function for you to do an enforcement. The reason we didn’t position the product this way is we realized that most of the enterprise already have one form or another next generation firewall or some of the security web gateway and they already made an investment. They have that product deployed, and those products are not doing the best defense for the enterprise because they do not know what data to use to actually make a blocking, for example. So if someone tells them this is the kind of data you use to do that blocking, they can block it well. So we come in to fill that gap and we want to provide that detection data.Martin: So this means that your main focus is identification of the threat and then you push this kind of information or the result of it, who’s the threat and who is not to the firewall, who will then decide if this a threat according to Cyphort, you won’t allowed it in?Fengmin: Correct. Actually, that brings us to this second notion. We talked about this new paradigm shift, right? The notion people say is you have to continuously monitor all the possible vectors and then you try to determine what exactly happened, what’s relevant to your environment, at what stage the attack is going, and then with this very specific data, you want to turn it into actionable data. So what we end up doing is associate d with this notion is a notion of an ecosystem-based defense approach. So that’s when Cyphort detects something from Day 1, the product support is out of APIs. So it basically allows any other product to consume the results in a fashion that is readily implementable for blocking something.Martin: How do you define a threat? Is spam also included in the definition?Fengmin: We would not consider the typical email spam you think in the past where someone is mainly sending an email, a lot of message just to spread maybe some rumors, right? What we are focusing on is think of malware pieces, maybe a piece of code, compared to the old days of the virus. Now the advanced one that comes in not only have a lot of attack payload but also have a lot of capability to try to hide itself and also have a lot of network-based communication to go back to the server. So that’s where the malware is really the most lethal weapon, if you will, for the modern threat, right? So the malware is really t he focus, and then anything associated with that. So you mentioned the email. Although the spamming is not the focus, but email as a vector for the malware to get into the enterprise to infect someone’s machine. So we also cover the email. We make sure we are able to extract the files and then inspect them to actually detect them as well.Martin: You have two sides of the equation. You have, on one side, the attackers, and you have on the other side something like Cyphort who is defending the company. And there’s always this kind of competition. One time the attackers are in the frontline, and sometimes the defenders. How do you keep up with the speed that the attackers are developing? Because they are using different strategies. How do you keep up to date?Fengmin: Yes. It’s very interesting, and this is indeed a challenge for us. One of the fundamental components in our detection technology is, in addition to use… people are all aware of this notion of sandboxing. Sandboxing is really useful to be able to detonate or run a piece of code and, based on behavior, try to determine if it’s malicious or not. Now, just using the sandbox to detonate it may not allow you to adapt and to cope with the new ones, but that’s how the old generation of the product typically implements a set of specific rules or look for a pattern, if-then-else kind of pattern or heuristics try to then determine if a piece of code is malicious or not.But for Cyphort, one of the things from Day 1, we realize what we need to do is to marry this detonation behavior-based with machine learning. So the machine learning allows us to do two things. Number one is indeed even for a piece of malware, we’ve already seen it’s something that maybe just happened, but by looking at the behavior of that and relying on the machine learning model to train and then build a more sophisticated mathematical model to predict and to generalize into the class of malware that have a similar behavior bu t it’s not the same thing. So we are able to detect that. That gives us the ability to detect unknown or you can also refer to as a zero day from a malware perspective.Then the second thing that machine learning allows us to do is once we have this systematic architecture, then if we are able to continuously monitor, use additional means to collect new samples and to do the training periodically and then release the new model into the product, now we have a continuous learning and adaptation. So of course to complement and support the second part, what we have been able to do is, in addition to collaborating with a lot of other entities, the threat intelligence, companies and also community-based feed out there, we also have built what we refer to as a crawler infrastructure in Cyphort labs. What the crawler infrastructure allows us to do is to constantly go out, use our own hardware-based sandbox to go out to the wide internet and to get our sandbox infected. When that happens, a nd then we have the collection of new exploit pack and new samples, and that feeds into our machine learning, so that’s really at least a main part of our approach how to keep up.Martin: This is also where my question relates to. I totally understand if you have lots of users and you get lots of data that you can improve your machine learning algorithms for detecting those threats. But when you started out, you did not have that much of a customer behavior data. How did you convince the first customers to say, “Yes, I’ll go with Cyphort,” without you having that much data which machine learning algorithm you can apply to?Fengmin: Right. Of course, there are two parts to it. One part is indeed we need to leverage some existing collection of malware samples, and luckily with both some of the partners and also one of the well known ones that you’re probably aware of is Virus Total, and it probably has the largest collection of the malware samples. So by applying, using the ex isting samples, we are able to learn a model fairly recent. So that’s from the technical part. But then when it comes to engaging the customer, really I would say a few big steps that we have taken.Number one is indeed really be able to identify the key problem the customer is facing and also showing that we understand the customer’s problem, and also have a common understanding of the best approach to actually improve their defense.Once we have that conversation, then the next thing is we share how we build this product or the tool, how that tool would support this understanding of how to approach it.And once we have that, really the third step is basically almost all enterprise customers would require that we actually make the product available and for them to actually test drive it. So they would actually go through an evaluation on their network.Of course, in that process, we provide as much help to get them through the hurdle where they typically are always resource-limited , so we help them make it easy for them to install it on the live network and go through an evaluation period. So we are able to approach the customer that way, and we’re happy with what we have been able to do so far. Yes.Martin: Fengmin, how do you show the customer whether there is a malware? For example, if I’m looking at a company and the emails they are getting. And what I understood is that you are also scanning some kind of files, whether there’s malware included or not, for minimizing that the system is breached. How do you do this in minimal? Is it just that you have some kind of bar which says, “Okay, 95% chance there’s malware included,” or if there is a special threshold the email doesn’t go through? What’s the process?Fengmin: Yes. For us, actually in Cyphort product, we end up using multiple inspection message, we refer to. Because we realize for the modern attack, the malware, they can come in different ways and also they all have their sophisticated kind of evasive behavior in them. Some of them may evade a traditional virus scan, like a static analysis, right? You look at a code, how the code structure looks like, and then the behavior based on when some of them actually are able to detect if they are being watched in a sandbox, they may stop running. So what we end up doing is once we realize this, then whenever we get a piece of code that we feel this unknown, they could be a malware-carrying file, then we actually go through both static analysis, looking for known patterns, and also we have repetition data referenced to Virus Total, in addition to our own more kind of sophisticated static analysis and behavior. So in this case, what it means is when we decide if something is really bad, indeed there is typically a kind of a range of behavior, and you can almost think there is a threshold.Today what we have done is intentionally not expose that kind of slider to the customer but we are able to take into account of this multi ple methods of inspection, then we look at those information together. So for the machine learning, indeed we actually come up with the behavioral-based score. They range basically, let’s say, from a 0 to 100, that kind of scale. And we choose a threshold based on our training and also we in the future can allow customers to set based on how aggressive they are.But the interesting thing, it’s helpful when we use both Virus Total and static multiple kind of method is if something is already known…because you expect, right? They don’t always use something totally new. There are a lot of them that use some existing things. So that’s the benefit of the product. If they use something that is not new, then additional methods, including the Virus Total, actually give us a context, and in that case, it’s fairly black and white. And we can even tell them what are the other products already, be this bad or the same thing, and then what the names they are referring them to. And the n we can basically compare that with what our machine learning is telling us. So they both help us to improve the machine learning. At the same time, we can tell the customer if something is already known, potentially how long ago they have been out there versus all the way to something really new. So that way, the customer, based on how aggressive they want to respond to it, they could choose different path towards it.BUSINESS MODEL OF CYPHORTMartin: Fengmin, let’s talk about the business model of Cyphort. How are you making money with it? Is it a SaaS model or is it something like an installment fee?Fengmin: Yes. That’s a very good question because we always have to make money. So in this particular case, the current model is we choose a software of virtual appliance-based delivery model but it’s subscription-based. So we have seen a lot of customers. The subscription-based one gives them some flexibility, at the same time gives them more like a steady kind of cadence for th em to make the budget decisions. So the thing really, so far it worked the best for us, is really the software-based delivery along with support for virtualized environment. And in this case, we can be deployed both on premise and also when they choose to, like we have customers where already most of their computing have gone to AWS, and so in that case, they can actually deploy our product in the AWS environment as well.The way the product is designed, because it’s API-based and software-based delivery, it allows it to be easily deployed and also provides a service in a SaaS model. So we are actually right now working on that based mainly on the customer demand because in the initial set of customers, we’ve definitely seen more customers want to have products deployed on premise because there is still some concern about their data going out of their network.Martin: Are you somehow differentiating the SaaS products maybe based on volume or based on number of employees of the cus tomer or some other metric?Fengmin: Oh, the pricing model you are referring to? Yes. Right now, actually we have a pretty much unified pricing model that is based on the protected bandwidth.Martin: What’s that?Fengmin: So the notion is let’s say you may have multiple links, network action links you have to watch. So on that link, you know what the typical amount of traffic is going through it, so then you purchase our product based on that expected amount of data that we have to inspect and then detect and then protect. So actually that’s also one thing that we have got very positive customer feedback. What ends up happening is let’s say you purchase five gigabits worth of the traffic and then the Cyphort product does not limit the customer how many links that you are monitoring, maybe how many servers you deploy to monitor this link. So for them, that is very flexible because you may have multiple offices and distributed across the globe and then you don’t have different pricing models. It’s the total amount of protected link bandwidth.Martin: Fengmin, how did you acquire the first customers, and did any of the process for customer acquisition change over time?Fengmin: Yes, and that’s a very good question. The initial customer is really based on some of the connections, in this case, both the connection, let’s say, with the executive team and also the connection, for example, with our venture capital funding partner. That is very typical practice. It’s more about initially with the connection we have someone that is willing and open their ears to listen to us, and that is very important. But then quickly as the time goes, today we have a lot of customers, now they’re already coming through a very typical funnel. You think of that process from you have mind share and you have lead generation. So that means now it becomes at scale operation because those customers, because they know they have heard about Cyphort and they have a problem, then they see Cyphort as a potential contender for that, then that’s how value comes in. Today our customers, both from that kind of normal channel, at the same time they become much larger customers compared to the early set.Martin: Sure. Is it mainly driven currently by inbound marketing, or is it also that you have a direct sales force which goes out to meet potential clients and then tries to acquire them?Fengmin: Yes. We actually have. Cyphort has, I think, maybe a very interesting, very initial result. We were so happy we were doing so well. As you imagine, most of the enterprise company products, you always rely initially on a direct sales force to go after the account. But then for Cyphort, as actually even early this year, we already have several dozen partners.Martin: Distribution partners?Fengmin: Correct, and these are the ones… So it’s very rare in even my past several companies. At this early stage, we have so many partners and signed with us, and actually today we d efinitely have over 50% of our deals directly coming through the partner source versus our direct sales.Martin: And can you describe this kind of partners? Are they more some kind of antivirus or firewall programs, or are they consulting companies, or what type of companies?Fengmin: Yes. Actually, one example I would mention is this company called Optiv. They used to be there were two companies. One is called FishNet. The other one is called Accuvant. These are the companies that they have their own labs. They also have their own, of course, sales engineer and the whole workforce from the marketing all the way to product. So they typically help the customer define a set of solutions for their security protection needs. So these are really major players, and they help both for getting the customer and also, of course, some of the training and support, installation also are coming from them. So those two companies actually, a few months ago, they merged and they became Optiv. And we a re one of the very select few small set of partners that they have.Martin: Over the last four years, what have been the major obstacles while building and growing Cyphort? How did you manage those obstacles?Fengmin: I think for us, the main things are all related to scaling up the sales, and this is where, of course, one of the things that we learned is, for instance, the kind of product. We are indeed an advanced threat defense product, so if you compare it to the old generation of some of the security products, they are more complex, and that means going to the enterprise, there are more dependencies with other product and also there is the education of the customer aspect. So we have basically at the same time not only helped to educate the customer for their adoption of the newer approach, the better approach for defense, at the same time to basically improve the product because you always scale from smaller customer in the key features then to more mature at scale features and for what we refer to as enterprise readiness. It’s really talking about more deployment scenarios and more other products to integrate with and also to account for different kinds of IT configuration. So most of our work has been along these lines, along with scaling up the sales force. That’s the main challenge in the last few months.ADVICE TO ENTREPRENEURS FROM FENGMIN GONGMartin: We always tried to help first time entrepreneurs make less errors. What type of lessons have you learned over the last 10 years maybe, and some kind of lessons that you can share with the audience?Fengmin: Yes. A few things definitely, I think, that come off the top of my head and I’ve seen more entrepreneurs still having this issue.Number one, I would say, and also coming from a technical background myself is really for them to avoid falling in love with their technology, and they always think of their technology as the best, can solve everything. So that is where they tend to forget about the cus tomer side because oftentimes you have to have a direct connection to the customer pain and the problem. So that is one thing that happens a lot with entrepreneurs.And of course, the next one is more related to the product ease of use, ease of deployment. And for people with an engineering or technology background, they always think, “This is so easy for me,” but then you have to basically to put yourself in the customer’s shoes. In that case, maybe it’s not that easy. You have to make it easier for the customer.And then the third one, I would say, it happens a lot with first time entrepreneurs is they always are eager to present a big solution. So I refer to it as maybe the tendency to boil the ocean, where if indeed you have a good idea, you should solve the most urgent problem with that one or two features and you should show customer traction, and then you can move on. So that is a mistake they make, oftentimes also would give, for example, the venture capitalist the imp ression that they really don’t understand. They lack the focus. So those are some of the main things.Of course, when it comes to the team and then culture, there are some things, I feel, it’s also very important because being a startup company in general, to maintain a very innovative culture is probably the utmost for the team efficiency and everything else. So that’s sometimes the founders, and they have to balance it out. When you look for people with big company experience, hopefully they leave most of the big company operation culture behind, right? That will be one interesting thing to watch out for.Martin: And how do you check whether somebody is fitting into a startup based on the innovative culture?Fengmin: I think this is where… For instance, one example is certain developers or technical people, they are very strong but then maybe their thinking always says, “You give me as specific a task as possible for me to perform, then I just deliver to that,” versus som eone says, “I just want to understand what we are trying to build. What is this supposed to do?” And that’s what we call the objective, and then they actually can think about the best way to do it, versus you have everything specked out, exactly you implement this way and that way. So that will be very fundamental. Some people are very comfortable in working in one mode versus the other. And for startup, typically you would want to look for people who have a little experience and also willing, open to share and not to hesitate to say, “This is a better way to do it.” That will be a good way to look at people.Martin: Fengmin, thank you so much for your time and for sharing your knowledge.Fengmin: Thank you. It’s my pleasure.Martin: And next time if you are having a really big website and you are thinking about threats that are maybe coming at your company, just look at Cyphort. Maybe this is a good solution for protecting your website.Fengmin: Thank you.Martin: Welcome.Fe ngmin: My pleasure to share the thoughts.Martin: Thanks.

Friday, May 22, 2020

The Power Of Expectancy Effects On Cognitive Performance

The Power of Expectancy Effects on Cognitive Performance Abstract Expectancy and placebo effects on cognitive performance haven’t been well studied. A 2 (‘Salvia’, Placebo) x 2 (Congruent, Incongruent) mixed experimental design was adopted to determine the role of expectancy in receiving a salvia capsule on selective attention. Olken, Flegal and Zajdel (2008) found that the expectation of receiving salvia can improve cognitive performance. In the current study, 102 second year undergraduate psychology students were allocated to the placebo condition and the ‘salvia’ condition. In the salvia condition, it was predicted that participants would expect that they were receiving salvia which would thus improve their cognitive performance which would lead them to perform better on the selective attention task than those in the placebo condition. Results showed that participants in the Salvia condition had significantly faster reaction times than the placebo condition both in congruent and incongruent conditions which sugg ests that expectancy plays a significant role in the mediation of the placebo effect and can thus improve cognitive performance supporting Olken, Fiegal and Zajdel (2008) findings. Introduction According to expectancy theory, the placebo effect is mediated directly by conscious expectation (Amanzio 2001). This is due to the psychosocial factors that are associated with the context of the treatment such as environmental cues which suggests what the treatmentShow MoreRelatedGroup Decision-Making, Leadership, Influence and Power: Illustrations from the Film ‚Äà º12 Angry Men‚Äà ¹1048 Words   |  5 PagesLeadership, Influence and Power: Illustrations from the Film â€Å"12 Angry Men† Stephen Pulla 804 859 874 BMGT 310 April 20, 2012 Victor Rosochalsky â€Å"The cognitive evaluation theory is contradictory to reinforcement and expectancy theories† There are three motivation theories that will help increase an individual’s motivation to perform better at certain tasks. The three theories of motivation are the Expectancy theory, the ReinforcementRead MoreCom 530 Week 3 Organizational Communication Essay1115 Words   |  5 Pagesevents that leads the human society while in emergency crisis. The American Red Cross has the ability to mobilize the power of volunteers as well as the generosity of donors. The reader will be given a brief description on how different leadership styles affects the group communication within the American Red Cross. The reader will also be given an analysis of the different sources of power found in the organization and how will these affect the organization communication. It is imperative that the readerRead MoreThe Expectancy Theory Model Of Harry s Motivation1154 Words   |  5 PagesDiscussion Question Use the expectancy theory model to predict Harry s motivation to achieve high or acceptable performance in his job. Identify and discuss the factors that influenced this motivation. Harry will engage in high or just acceptable performance effort under the conditions described. Valence scores range from -1,0 to +1.0. All expectancies are probabilities ranging from 0 (no change) to 1.0 (definitely will occur). The effort level scores are calculated by multiplying each valenceRead MoreCompare Intrinsic and Extrinsic Motivators1199 Words   |  5 Pagesmotivation? Process that accounts for an individuals intensity, direction persistence of effort towards attaining a goal. Why motivation is needed? – To increase job satisfaction – To increase productivity How motivation works? Motivation = Performance = Productivity = Rewards Intrinsic and Extrinsic Motivation Intrinsic motivation (Internal) Motivation factors that are driven from within the individual; an interest or enjoyment in the task itself †¢ †¢ †¢ †¢ †¢ †¢ †¢ Fun Skill development andRead MoreOrganization Behavior And Its Impact On Human Behavior1531 Words   |  7 Pagesthrough tactics or incentives. If we analyze from theories such as Alderfer s ERG theory, Abrahan Maslow s hierarchy of needs or McClelland s Achievement Need Theory if we fulfill or help in get the needs of person like achievement, affiliation, power or self esteem then that person automatically motivate to do work with their full of efforts. A Person only need a motivation to do their work because if someone motivate his/her friend, worker, relative or boss by psychology then he/she can do theirRead MoreManagerial Processes Organizational Behavior1657 Words   |  7 Pageswas found that a â€Å"core self-evaluation, correlates with employee job satisfaction. They also found that one of the primary causes of the relationship was through the perception of the job itself. Thus, it appears that the most important situational effect on job satisfaction is linked to core self-evaluation†(Saari Timothy 396). As evidenced it is a personal mindset that determines job satisfaction. Job satisfaction is also related to organizational citizenship behavior (OCB). Organizational citizensRead MoreBuad 304 Study Guide Midterm 11134 Words   |  5 Pagesfailures externally. Shortcuts we use in judging and perceiving others: †¢ Selective Perception – tendency to selectively perceive what we see based on our own interests and experiences. †¢ Halo Effect – tendency to a general impression of someone based on a single characteristic. †¢ Contrast Effect – your evaluation of a person is altered because of the person who directly preceded them. †¢ Stereotyping – judging someone based on your perception of the group they belong to. Self FulfillingRead MoreThe Negative Effects Of Depression And Diseaseing1153 Words   |  5 PagesBeta Accumulation, Neurogenesis, Behavior, and the Age of Rats, analyzed the adverse effects of these amyloid intermediates on â€Å"neuronal viability, synaptic plasticity, and synaptic function†(Church, Miller, Freestone, Chiu, Osgood, Machan, J. T., Silverberg, 2014 p.530).Scientists have found the most productive way to prevent these plaques is to maintain a healthy diet. If the public understands that there are ways to either postpone or eliminate symptoms of this neurocognitive disease, it givesRead MoreChanging The Structure Of An Organization2240 Words   |  9 Pageschange is limited influential power. The wrong people in the organization are being listened to and the lower management has no influence. These are the critical and most important employees and the backbone to the company; therefore, without any influence the effectiveness of the whole organization is harm ed. Another factor into why an organization fails to recognize the need for change is cognitive disability. The organization is not being innovation and lack cognitive flexibility. The effectivenessRead MoreThe Key Of Getting Success2085 Words   |  9 Pagesused by managers to produce best outcome in an efficient and effective manner. This explanation have three key elements : energy, direction and determination to accomplish goals( Stephen Mary , P. Robbins,Coulter, 2012.).This is the strength or power which must be required by the individuals and efforts and hard work are directed to produce persistence organization’s objective. The trend which is used by many organizations on employees or work environment to achieve organizational goals. There

Thursday, May 7, 2020

Alcoholism Disease or Choice - 1778 Words

Alcoholism: Disease or Choice? Danielle M Ellis WVNCC Abstract Webster’s New World Dictionary defines alcoholism as a chronic condition which is mainly characterized by excessive and compulsive consumption of and dependence on alcohol as well as nutritional and mental disorders. This definition depicts alcoholism as a disease that is beyond one’s control. It has however been argued in some circles that alcoholism is a choice and the idea of alcoholism as a disease is a myth. Since it is an individual choice to take alcohol, alcoholism is a consequence of free will. Both sides of the debate are discussed in this paper and it is my conclusion that there is strong evidence that suggests that alcoholism is a disease that needs treatment.†¦show more content†¦This means that there is no way one could be arrested for an illness, thus disqualifying alcoholism as a disease. The law puts in place sanctions against alcoholism in order to control behavior that is caused by the wrong choice, not because of a disease. Schaler (1991) c ontends that one should argue that alcoholics need support and education about the effects of alcoholism and how to curb the habit. It is suggested that the notion of treatment for alcoholism is misinformed. Alcoholism is a Disease The concept of alcoholism as a disease originated in the 19th century with Dr. Benjamin Rush. This doctor advanced radical ideas claiming that those who overindulged in alcohol had a disease. However he was mostly discredited because of his assertions that being black and political dissentions were also to be regarded as diseases. Before 1891 the word alcoholic had not been used to refer to a person who took alcohol uncontrollably. Drunkenness was however not acceptable in this era. Since the 19th century it has been widely accepted that alcoholism is a disease and it requires compassion and treatment just like any other disease. Room (1983) stipulates that in 1951, the World Health Organization identified alcoholism as a disease and this was also done in 1956 by the American Medical Association. Sociologists have advanced various theories on why alcoholism should be treated as a sickness. Room (1983) suggested that thereShow MoreRelatedIs Alcoholism A Disease Or A Lifestyle Choice?1933 Words   |  8 Pageswhether alcoholism is a disease or a lifestyle choice. One blogger expressed her opinion about how alcoholism is genetic and that parents, about how it is genetic that anxiety and depression is inherited from parents leading, to becoming an addict. But the blogger by the name of andrew69055 stated, â€Å"People would do well to work more on resolving anxiety and depression rather than using alcohol disease as an excuse†¦People need hope and motivation and the handed out excuse that it’s a disease is destructive†¦Read MoreIs Alcoholism a Disease?691 Words   |  3 PagesAlcoholism as a disease? Alcoholism today is not considered as a moral failure, majority of the people view it as a disease. Alcoholism is a chronic primary and progressive disease and it can also be fatal in some instances. It is termed as a chemical disease as it breaks down in the stomach as well as bringing a different effect on the brain of the alcoholic as compared to a non-alcoholic. Alcoholism can be classified as a biological disease since the chemical predisposition of alcohol consumptionRead MoreAlcoholism : Is Alcoholism A Disease?929 Words   |  4 PagesAlcoholism has raised many debates over the truth of its nature. Many scholars argue that alcoholism can be treated as a disease. Such approach to defining alcoholism means denying that alcohol abusers own a choice. In consequence, the treatment related differs and may or may not actually help alcoholics recover. A wrong diagnostic of this addiction can lead to serious health issues; therefore, it is vital to answer the following question: Is a lcoholism a disease? Most experts in this field criticisesRead MoreAlcoholism : Is It A Disease?1564 Words   |  7 Pagesquestion what it is about alcohol that makes a person become dependent? Is it a choice or is it a side effect of the drug itself? In other words, is it a disease? In order to come to a conclusion on the topic, we must first define the nature of disease itself. According to Webster’s dictionary, it is â€Å"a condition that prevents the body or mind from working normally†. Based on this definition, alcoholism is a disease. This is to say, however, the general populace can agree upon the definition decidedRead MoreThe Effects Of Alcoholism On The Alcoholic874 Words   |  4 PagesThe best way to fix alcoholism is to treat it as a disease that needs to be cured. Alcoholism is definitely a problem and causes harm to both the alcoholic and the people around them, but it does so in a much different way than a disease such as cancer. Instead, alcoholism is a disease of both physical and mental dependence. Most diseases are treated by surgery or medication, but the only way to fix the problem of alcohol abuse is by changing the mindset of the alcoholic. This is why HazeldenRead MoreAlcoholism Addiction And An Addiction Essay1356 Words   |  6 PagesTraditionally speaking, alcoholism is an addiction to consuming alcohol. There are some organizations and people out there that would combat that widely accepted thought, and consider it a disease over an addiction. What is the difference between a disease and an addiction? To determine the appropriate label, both definitions and the actions that give them that specific definition must be examined. There is a line that separates what is a disease and what is an addiction and there are many differentRead MoreAn Alcoholic : Societal Views Vs. Reality1103 Words   |  5 Pageswhen it comes to alcoholism, in order to understand Alcoholism properly we must consider both the disease and the treatment. In 1956 the AMA (American Medical Association) classified Alcoholism as a disease. The association’s definition of alcoholism is a primary, chronic disease with genetic, psychosocial, and environmental factors influencing its development and manifestations. In this case the term â€Å"primary† is used to indicate that it is a disease that can lead to other diseases such as CirrhosisRead MoreAlcoholism : The Misuse And Addiction1361 Words   |  6 PagesAlcoholism: The Misuse and Addiction â€Å"I know my limit†, â€Å"Just one more drink†, and â€Å"I’m not drunk† are common phrases people often associate with being an alcoholic. While is true that some alcoholics can use such phrases, that is not what makes them an alcoholic. Alcoholics or rather anyone who happens to drink a little too much, are marked as being alcoholics. But what does it really mean to be an alcoholic? Or better yet, what does it mean to suffer from Alcoholism? Over the years, a controversialRead MoreFactors, Symptoms and Treatment of Alcoholism Essay1199 Words   |  5 PagesAlcoholism is a chronic disease with genetic, psychosocial, and environmental factors. The disease is often progressive and fatal if left untreated. It is characterized by impaired control over alcohol use despite adverse consequences, and distortions in thinking. There are critics who disagree with calling Alcoholism a disease despite the definition on the word disease which means an involuntary disability but the fact that alcoholism is a disease is widely accepted within the medical and scientificRead MoreIs Alcoholism Really a Disease?1042 Words   |  4 PagesStudies of Aging Neurodegenerative Disease and Alcoholism†, Eberling and Jagust suggest that for the past 200 years, people have classified alcoholism as a disease, but recently a large portion of the medical community has started to disagree with this diagnosis. Despite common misconception, Alcohol Anonymous was not the originator of the classification of Alcoholism as a disease. Dr. Benjamin Rush created the concept in 1784, and alcoholism has been considered as a disease since then (Eberling and Jagust

Wednesday, May 6, 2020

Tesla Motors Free Essays

string(53) " several rewards including 6 Car of the Year Awards\." Andrew Martin COMM 336 Informative Paper 4/4/2013 Tesla Motors Tesla Motors is a car company that designs, manufactures and sells electric vehicles. This public company was founded in 2003 by Ian Wright, JB Straubel, Marc Tarpenning, Martin Eberhard and most notably Elon Musk. Its headquarters is located in Palo Alto, California, with its main production plant in Fremont, California. We will write a custom essay sample on Tesla Motors or any similar topic only for you Order Now The company was named after Nikola Tesla, a renowned electrical engineer and physicist. Its goal is to increase the number of EV’s (Electric Vehicles) available to the market to help make it more mainstream. Currently, Tesla motors have produced two models, the Tesla Roadster and the Model S, and has unveiled a third, the Model X. In the Future, the company plans to produce family-sized minivans, electric SUV crossovers, and electric fleet vans for municipal governments. Other business includes collaborations with other companies such as Toyota, Mercedes, Daimler, Freightliner Trucks and Panasonic. Although the company has earned much success, it has hit its share of bumps along the way such as lawsuits, recalls and founder disputes. The company began when two teams wanted to start an electric car company and since their goals were similar, they joined forces to better their chances of success. The most famous of these entrepreneurs, and one of the most important and iconic figures to the company, is Elon Musk. His success began with his first company Zip2, which was bought out by Compaq for $304 million. Then he co-founded what eventually became PayPal, which was bought out for $1. 5 billion by Ebay. Elon co-founded a third company named SpaceX in 2002 where he is currently the CEO and CTO. SpaceX is a shipping company, in that it ships cargo with huge Falcon 9 rockets into space, supplying NASA’s cargo to the International Space Station. This leads us to his co-founding of Tesla Motors, where he oversaw the company’s first car, the Tesla Roadster and eventually took the position of CEO. Tesla Motors is not the first car company to produce pure EVs. In fact, EVs have been around since the 1800’s and outnumbered combustion engine vehicles. Since then, combustion cars held the market and EVs were for the most part out of the automobile scene until the 1900s. GM and several other car companies produced experimental EV’s in limited numbers but their motives were self serving, including fulfilling government emission mandates. GM’s EV1 was leased only and were crushed after the lease was up 3 years later. EV’s first found a foothold in the auto market with the introduction of the hybrids. Toyota’s Prius was the first mass-produced hybrid gasoline electric car, which was introduced to the global market in 2001. To date, the Prius has sold over 2. 5 million cars worldwide and is the world’s best selling hybrid. Since then, many other companies have produced their own versions of hybrids such as the Chevy Volt, and the Nissan Leaf, the world’s top selling EV. From the start, the Tesla Motor company has had a strategy for entering the market as an EV auto maker. It is difficult enough to start a new car company without a long built reputation, but to enter a new and uncharted market is bold and very risky. To do this, Tesla first would build a sports car with low production numbers in order to prove their technology. Next, they would shift do to luxury models that are more affordable and their last step is to build affordable EVs to compete with economy cars already on the market. In 2008, Tesla Motors started selling its first EV, the Tesla Roadster, which was just a Lotus Elise with a Tesla electric drive system. It was designed to compete with other sports cars in its price range. Not only was it Tesla Motors first production vehicle, it was the first highway-capable all-electric vehicle in serial production for sale in the US, and the first production car to use lithium-ion batteries, allowing it also to be the first all-electric car to have a range greater than 200 miles per charge. Its 288HP electric engine allows it to accelerate 0-60 in just 3. 7 seconds. This power has allowed it to win the Monet Carlo Alternative Energy Rally and the Federation Inernationale di I’Automobile. The EPA rates the Roadsters range at 244 miles but at 25mph, it can accomplish 300 miles, the urrent distance record for a production EV. Production ceased in 2012 and over 2,250 Roadsters have been sold worldwide. Tesla’s next move was to build a more practical 4 door sedan for a broader market. These would be built at the Tesla Factory in Fremont, California. Unlike the Tesla Roadster, the entire car would be built at the factory rather than just putting a motor in a n existing car. The Model S is the first production car to come out of the newly purchased factory and deliveries began in June of 2012. Three packages are available, with the Performance package boasting 420 hp and an EPA range of 265 miles. Although the car weighs over 2 tons, its low center of gravity allows for excellent handling and because it’s driven by an electric motor with no gear box, it can still accelerate from 0 to 60 mph in 4. 4 seconds. Another difference of the Model S over the Roadster is its charging ability. An optional supercharger can add 150 miles of range in just 30 minutes and can fully charge the cars battery in just one hour. Tesla is adding Supercharging stations across the country and is free to use for Tesla owners. These Supercharging stations are solar powered and any extra power is fed back into the grid. From a normal 110V/12A outlet, one our adds 5 miles of range and from a 220V/40A oulet, one our adds 31 miles of range. The Model S has received much appraise and has one several rewards including 6 Car of the Year Awards. You read "Tesla Motors" in category "Papers" The Model S starts at just $62,000 for the basic model and its top model costs $87,400 USD. In 2014, the Tesla Factor will start full production of its second EV, the Model X. This model is an SUV with several innovations and some impressive performance. First, it doesn’t have side mirrors but instead uses cameras to reduce its coefficient of drag, making it more aerodynamic. Next, it has uses hinged falcon-wing doors, allowing easier access for rear passengers. The performance model has two motors, allowing for four-wheel drive and accelerates from 0 to 60 in just 4. 4 seconds. Its range is similar to the Models S and is said to be 270 miles. Although it weighs 10% more, it shares 60% of the Model S components including its 17† touchscreen control panel, but unlike the Model S, it has two touchscreens on the steering wheel for multi-function control. In order to build its EVs, Tesla Motors first needed to find a place to build its line of cars. It first planned to build a factory in Albuquerque, New Mexico but was canceled and a factory in San Jose, California was also canceled due to cost. Fortunately, the economy went south in 2008 and the NUMMI plant occupied by both GM and Toyota was abandoned. In 2010, Tesla Motors purchased the factory building for $42 million. Most of the 370-acre facility is unused and the only activity seen is the Tesla Factory’s production of the Model S. Not only did Tesla acquire the 5,500,000-square-foot main building, but they also acquired over $17 million in manufacturing equipment and parts, making the start-up cost of Tesla Motors less. Currently, around 1,000 workers are employed at the factory, producing 20,000 vehicles a year. Along with its own line of vehicles, Tesla Motors also has several collaborations with some well known company’s. Daimler’s Mercedes line had Tesla build electric powertrain components for its A-Aclass E-Cell, which has a 124 mile range. Only 500 of these cars were built in Europe to test the market. Another project Tesla is currently working on for Daimler is the power train for the Smart Fortwo vehicle. In July of 2010, Toyota announced that it would be working with Tesla Motors to produce an electric version of the RAV4. Toyota converted 35 RAV4s for evaluation, using the power pack from Tesla’s Model S and powertrain components. Freightliner Trucks are also working with Tesla, using their battery packs for their Custom Chassis Electric Van. At Tesla, workers have passion for doing the right thing for the world. People are overworked and underpaid, but are endlessly fueled by a desire to tackle one of the most important challenges society has ever faced, protecting the planet. Giving future generations a good place to live is important to everyone at Tesla, unlike some other companies. One example was GM’s EV-1 electric car, which was built in the late 1990s. GM didn’t build an EV-1 to help the planet, but rather to fulfill a California mandate for a zero-emission vehicle. After fulfilling this mandate, all EV-1s were repossessed from lease and most were crushed. Unlike GMs self sabotaged EV-1, Tesla’s Model S and other models are out to create a paradigm shift and it all starts with the corporate culture. Tesla’s internal communication mediums include phones, pagers, video networking, email and everything a normal office would expect to have. A less obvious, but perhaps the most important type of internal communication is person to person. Tesla’s offices allow for this by leaving the office open. Different teams are all in the same room, so that communication is done on a personal level from one department to another. This open environment office space approach helps the synergy of the entire Tesla team. Being a high tech auto company, Tesla also communicates externally by all the ways a tech company should. Their website includes a forums section that allows owners and non owners to make posts and comments on a number of Tesla topics. This is a way for customers and enthusiast to communicate with the company directly on the site. Tesla also keeps a blog on their site to keep the community up to date with the company. Along with their website, Tesla also has a Twitter, Google+, Facebook and Vimeo pages. Tesla also has the ability to directly communicate with their cars aswell. When a new firmware version comes out for the car, it can automatically download and update the new firmware. In one case, a Telsa customer was trying to charge his car at one of Tesla’s super chargers but the car would not charge. The owner called Tesla and they were able to send a firmware update within an hour, which fixed the problem. Another public relation strategy is to off the superchargers free to Tesla costumers for life. Some of the communication challenges for Tesla have been the negative media about the company. One incident included a lawsuit with the BBCs popular auto show called â€Å"Top Gear. † Tesla’s Roadster was featured in an episode and it was written in the script for the car to rail. Overall, the episode put down the car in a negative way. Tesla Motors took them to court but the case was not successful for Tesla. Another incident was a NYT reporter giving the car a negative review. In defense, Tesla released data to compare what the journalist said and how the car was actually driven. In the end, the journalist was discredited. In general, Tesla Motors and its vehicles have a very positive public relationship. Before the Model S was released to customers with reservations, Tesla held events that would allow customers to test drive the car in order to ease the tension of eager clients. These events were also good opportunities for reporters to get a look at the new EV. Since then, there have also been many other events, showcasing the car. Elon Musk and other important head figures of the company often speak at these events. Other positive publicity and exposure has been done though the media. The National Geographics Channel had an episode of â€Å"Megafactories Supercars† covering the Tesla Factory as it produces the Model S. Another popular outlet for Tesla media are videos available on sites such as Vimeo and Youtube and the Tesla website. How to cite Tesla Motors, Papers

Sunday, April 26, 2020

Rules of Mariige During the 14th Century free essay sample

The Rules of Marriage During the Fourteenth Century The rules of marriage during the fourteen century were really different to the rules of marriage today. The play Romeo and Juliet took place in the fourteenth century which meant that the marriage rules applied to them. . Obedience, blessings and Finances from both sets of parents were needed for someone to get married during the fourteenth century. During the fourteenth century the parents had to choose a husband for their daughter’s. Girls couldn’t choose their own husband. Romeo and Juliet wanted to get married but Juliet’s parents had to choose the husband for her and they chose County Paris. In the fourteenth century marriages were done by arrangement. Marriages were arranged for social, economic and political reasons. Women were not allowed to choose who they wanted to marry. However, sometimes men were able to choose their bride. Marriage was not based on love. We will write a custom essay sample on Rules of Mariige During the 14th Century or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Husbands and wives were generally strangers until they first met. If love was involved at all it came after the couple had been married. Even if love did not develop through marriage, the couple generally developed a friendship of some sort. The arrangement of marriage was done by the childrens parents. In the fourteenth century children were married at a young age. Girls were as young as 12 when they married, and boys as young as 17. The arrangement of the marriage was based on monetary worth. The family of the girl who was to be married gives a dowry, or donation, to the boy she is to marry. The dowry goes with her at the time of the marriage and stays with the boy forever. But today couples marry each other because they actually love one another. They don’t do it because they have to; they do it because they want to. Also, a girl’s parents doesn’t choose their husband for her they choose their own. The rules of marriages during the fourteenth century apply to Romeo and Juliet. Juliet wanted to marry Romeo but her parents had the right to choose the husband for her. The Montague’s who were Juliet’s parents were enemies with the Capulet’s which were Romeo’s parents. That made it very unlikely for the Montague’s to choose Romeo as Juliet’s husband. They chose County Paris to marry Juliet. She couldn’t do anything about it. She never told her parents about her love with Romeo fearing their reaction towards her about loving one of the Capulet’s. The rules of marriage back then did apply to Romeo and Juliet which made them unable to get married. The only way they could’ve got married was if the Montague’s chose Romeo as Juliet’s husband. But since each of their families were enemies it was impossible.