Wednesday, August 26, 2020

Earthquakes result Free Essays

Tremors result from aggravation in the external layer of the Earth. This causes the vibration of the Earth’s surface. Another purpose behind the event of seismic tremors is the unexpected arrival of vitality that had been lethargic in the center of the Earth. We will compose a custom exposition test on Seismic tremors result or then again any comparable subject just for you Request Now This vitality makes strain in the stones, hence; it is moved as waves to the Earth’s surface (Bolt, 2005 ). The power or size and the timeframe that had passed decide the dangerous impact of a seismic tremor. The seismic waves and their force decide the ruinous intensity of a tremor. Auxiliary harms brought about by a quake rely upon the plan of the structure and the materials utilized in its development. Quakes contrast in greatness. They might be little or unnoticeable or they might be huge to such an extent that their power can be distinguished from inaccessible spots. The repercussions of a seismic tremor may make the twisting of the ground or harm structures. A few seismic tremors happen under the ocean and cause waves. Whatever the type of the seismic tremor, a large number of them imperil the lives of people through their ruinous power (Bolt, 2005 ). The outside of the Earth comprises of lithospheric plates. These plates are consistently moving and this causes compressional worries at their edges. The abrupt arrival of such pressure can be credited to quakes. Most quakes are caused because of the moving of these lithospheric plates. Over the span of their development, these plates slam into one another and tremendous tensional pressure is discharged through the flaws present in the earth’s outside. The vibrations of the seismic tremor spread all through the earth as waves. Shallow seismic tremors happen because of volcanic emissions, the falling of colossal rocks, avalanches and bomb blasts. Such seismic tremors are restricted to the territory encompassing the spot of such events (Earthquake, 2004). The effect of a quake spreads through an enormous region encompassing the focal point of the seismic tremor. The outside of earth breaks because of the transmission of flaws to the surface from inside the earth. This outcomes in even and vertical disfigurement of the surface for more than a few meters. There is no such exchange of flaws to earth’s surface during serious seismic tremors. Shallow quakes can be felt through the recurrent developments of the earth’s surface, which is named as flaw creep. The qualities of the ground decide the extent of an earthquake’s vibrations and its ruinous force. For example, waterway beds, or nonintegrated ground surface could convey the impact of a quake to huge region. While, zones comprised of bedrock transmit a seismic tremor that is essentially more vulnerable. Loss of human lives would be more in places where structures are not built to withstand huge stuns and vibrations. In those regions L floods of a tremor could cause the channel lines that flexibly gas to blast in this manner causing damaging flames (Earthquake, 2004). Wounds and passings could result from the breakdown of structures and sharp articles shipped by the breeze. Basic attributes could likewise bring about harms. For example, adaptable structures developed on bedrock endure less harm where as inflexible structures based on free soil endure more prominent harm. In uneven locales, tremors cause avalanches and landslides, which could lower the occupants. Seismic tremors that happen under the oceans could cause tidal waves, which offer ascent to dangerous influxes of water from the focal point of the quake and flood the urban communities on the coast (Earthquake, 2004) The unexpected development of rocks along a deficiency causes vibrations and the transmission of vitality through the Earth. Such waves are named as body waves and their spread is underground. These waves are named P waves or essential waves and S waves or optional waves. The last will in general dislodge the ground advances and in reverse and are therefore known as shearing waves (Bolt, 2006). The world encountered various seismic tremors in the year 1990. The Iranian quake in the long stretch of June of that year asserted about fifty thousand human lives and its power was estimated at 7. 7 on the Richter scale. Tremors are brought about by plate tectonics and a large portion of the seismic tremors happen in locales that are in nearness to the edges of the Earth’s plates. Deficiency movement is the principle explanation behind seismic tremors in these areas. Iran is situated on the limit between the Arabian and the Asian plates. Territories where there was no shortcoming action likewise experienced tremors, for example, Missouri in the US where a quake happened on the 26th of September 1990, Welsh outskirts and Sheffield in the UK supported a seismic tremor on the second of April and the eighth of February 1990 (Seismology: Earthquake Prediction, 2005). Stanford University created measures to anticipate the event of quakes by recognizing the variances in low recurrence radio waves that were transmitted through rocks a couple of hours before the event of a seismic tremor. This wonder is an aftereffect of electrical flows delivered by pressure in the stones and is additionally credited to the opening of minute breaks in the stones. Japanese researchers found that electromagnetic radiation was discharged before a tremor. (Seismology: Earthquake Prediction, 2005). Various seismic tremors happen in the oceans, which don't cause harm, however serious quakes happening in thickly populated zones could bring about gigantic annihilation to property and life. So as to confine the risks of a quake, it is important to build up an arrangement of seismic tremor forecast. At present the seismic hole hypothesis has met with some accomplishment in finding quake inclined areas. Most seismic tremors happen in the area of the San Andreas Fault in California since the North American plate and Pacific plate move past one another. The North Pole is being moved towards Japan at a moderate pace of six centimeters in at regular intervals by quakes. This float of post is as aftereffect of serious seismic tremors that happen along shore the Pacific Rim (Earthquake, 2005). In spite of the way that seismic tremors can't be forestalled the seriousness of the obliteration brought about by them can be relieved apparently by receiving reasonable correspondence methodologies, suitable basic structure of structures, actualizing a very much arranged strategy during a quake, properly instructing the general population and guaranteeing that more secure structure gauges are set up. A few nations have initiated quake security and administrative offices in light of the extreme harm caused to life and property by tremors. In regard of Tsunamis, an appropriate early admonition framework can fundamentally lessen the harm caused, because of the way that torrent waves are proliferated at low speeds. These waves are more slow than seismic P and S waves and travel at a tenth of the speed of seismic waves in the stones beneath. Therefore, seismologists have sufficient time available to them to caution the regions that could be influenced by the executioner waves (Bolt, 2006). The event of intraplate tremors is significantly less in contrast with plate limit seismic tremors. They happen because of the inner cracking of rock masses. Instances of such tremors were 1811 New Madrid quake and the 1812 Missouri seismic tremor, which were extremely serious. From the reports of the harm recorded, researchers have opined that their power ought to have been of the request for 8. 0 on the Richter scale (Bolt, 2006). Around 80% of the vitality discharged by quakes can be ascribed to the seismic tremors that occur in the region encompassing the Pacific Ocean. In excess of a thousand tremors of force more than 3. 5 in size happen in Japan every year. Another area that is infamous for seismic tremors is the western shore of North and South America (Pendick). One of the procedures utilized by seismologists so as to quantify quakes is the Richter greatness scale, which was created by Charles Richter. The Richter greatness is resolved based on the most extreme vibration quality and the good ways from earthquake’s focal point. This scale is logarithmic and as needs be, a 6 greatness seismic tremor is multiple times more grounded than a 5 size quake. Be that as it may, the Richter size is off base if the tremor being estimated is in excess of 310 miles from the seismograph. As needs be, seismologists created other tremor size scales; anyway these scales can't be applied to all sort of quakes because of the subsequent errors (Pendick). As the separation expands the seismic waves display lost quality. As a rule, the best impact of a quake will be at its focal point. A few quakes are ground-breaking to the point that the ground shaking can be more prominent than the speeding up because of gravity and this could bring about rocks and stones being moved into the air with incredible power. This really unfolded in 1897 when a significant seismic tremor happened in Assam, India (Pendick). In the USA, seismic tremors are a significant reason for misfortune to property and jeopardize around seventy †5,000,000 US residents. The misfortune brought about by tremors can be fundamentally alleviated by effective catastrophe arranging, selection of preventive estimates like actualizing better protects while developing structures and giving data about seismic tremors that could happen quickly to the masses. The U. S. Land Survey (USGS) is the group chief of the push to caution individuals in an opportune way with respect to quakes going to happen in the US (USGS Science Helps Build Safer Communities Earthquake Hazardsâ€A National Threat ). Seismic tremors asserted a huge number of human lives in the previous 500 years. In the year 1976, the notorious T’ang †Shan tremor that hit China asserted n

Saturday, August 22, 2020

Report relating to the recent financial crisis Essay

Report identifying with the ongoing budgetary emergency - Essay Example A significant quality in the author’s composition is the way where he offers deductive investigations of circumstances, which makes it workable for the peruser to interface the connections between institutional practices and the resultant unfavorable consequences for the American economy. From a critical perspective, the creator outlines the way wherein the financial business in America has utilized its enormous money related assets to bankroll arrangements through determined control of Congress. The demonstration of control happens through generously compensated Ivy League business analysts and monetary examiners who are paid huge entireties of cash to give persuading yet untruthful data about the issues of budgetary administration and financial arrangements. Therefore, it gets suitable to consider the way that the vast majority of the issues raised by the creator take a wide edge that interfaces the practices and approaches of different organizations inside a system that cer tifies the supremacy of momentary monetary benefits over long haul strategies by the corporate entertainers (Ferguson 44). The creator points out that the different monetary difficulties confronting America are subsidiary of the arrangements and practices received by Wall Street over the previous decades. Fergusson advances his contentions by roping in the adjustments in the legitimate structure, which have empowered private players in the economy to propel their private advantages to the detriment of financial development. For example, he refers to the expulsion of the 1933 Glass-Steagall Act, had set up and kept up some component of qualification between venture banks and business banks (Ferguson 51). The result of such activities were found in a wide scope of unscrupulous and amateurish strategic approaches that included credit default trades and different estimates that had the drawn out impact of destroying numerous areas of America’s economy. The book brings up a portio n of the significant escape clauses that have empowered the deceptive practices to continue in the American financial condition are to a great extent controlled by different monetary markers that associate with the various issues on which the monetary procedures are based. In such manner, the book opens up a profound examination of the shaky idea of the American monetary frameworks as far as their effect on the needy economies. Terrible corporate administration rehearses that flourish inside the American monetary framework are clarified as far as non-existent of laws that would be depended upon to reign in the corporate guilty parties. On this specific issue, the creator puts forth the defense for the survey of the present approaches in the American monetary part for the motivations behind imparting worth and great corporate practices. Such practices, as the creator contends, would shield the American economy from unfriendly impacts, for example, those that were seen during the 2008 monetary emergency. The emergency, as per Ferguson, was a finish of long stretches of debasement and regulated covetousness that have destabilized the American monetary framework and undermined the country’s financial force picture on the planet. The book offers projections about the conceivable outcomes of intermittent emergencies if the United States doesn't survey its approaches by creating money related and monetary shields to check against rampant corporate eagerness. A significant perspective

Monday, August 17, 2020

Nok Nok Labs

Nok Nok Labs INTRODUCTIONMartin: Hi, today we are in Palo Alto with Ramesh at Nok Nok labs. Hi Ramesh, how are you  and what do you do?Ramesh: Hi Martin, how are you doing?Martin: Awesome. What do you do?Ramesh: We are a company which is focusing on fixing the cyber security problem. As you know, strong authentication in cyber security is still focused on user ID’s and passwords. And if you see the latest online attacks that are happening in the industry, most of them are related to doing a cyber site attack and stealing all bunch of passwords from various users and those passwords being used at some other sites to commit fraud in financial markets and in healthcare markets. And these markets are pretty security and privacy centric. If we still are laying on user ID’s and password and we’re all vulnerable and with respect to what’s happening in the industry right now unlike earlier days when we were using internet for information access, now internet is being used for lifestyle management . And if we’re still trying to build our security base off user ID’s and passwords which are vulnerable and also unlike earlier, where we have used one or two accounts. Nowadays, we have fifteen to twenty accounts each, for  select works, banks, financial organization, online site. And it is becoming very difficult to keep track passwords and so we normally use two or three passwords to make our lives simple. But when a hacker goes to a server site and harvest a whole bunch of passwords, he will reuse on other financial institution and conduct transaction like you and do the fraud.So what we focus on is actually how do we do security without actually using user ID’s and passwords, how do we eliminate passwords.  And we focus on actually selling servers which we do online security without using passwords. So Nok Nok has two components to it; Nok Nok builds servers on a product called FIDO, faster identity online. Faster Identity online is an alliance, an open standing building committee body that was actually founded by me also. We, Nok Nok labs, have donated IP to the alliance. Alliance, now in 2009, has started to work, but we openly went out with FIDO alliance during Arisi conference in 2013, with six founding members in FIDO alliance. And today, 2015, we are about to 260 close to 250 companies in the alliance who actually endorse the protocols and contribute to the protocol. So that alliance, FIDO alliance is a non-profit organization. The purpose of the alliance is primarily to define the specs, and it wants the spec   working with the  global industry. Nok Nok is the first implementer of the protocol. There are two protocols in Fido; one is called UAF, the other one is called U2F. Nok Nok focus on UAF, UAF protocol, United Amitigation Framework. So the two entities that I wasâ€"FIDO alliance, I was one of three founders were FIDO alliance. But it was initiated by me and a other gentlemen name   Michael Ballot, he started Paypal and also another gent lemen by another gentleman named Taho Elgomarto he was the inland professor so we started FIDO alliance and in 2011 I founded Nok Nok Labs.Martin: Ok, interesting. And what is your background actually?Ramesh: My background is engineering electronics and then I came to this country working for IBM as an consultant, primarily in the cyber security space. And 1995 I started my first services company and that used to focus on taking the legacy mainframe based information system and migrating them to   internet and web technologies.Martin: What made you become an entrepreneur?Ramesh: Just like any other middle class family in India I came here after my studies and being entrepreneur and wanting to do something unique, wanting to do something different. We just started off, I found an opportunity of working in the mainframe space primarily and internet technology. So I found an opportunity to actually take some of those mainframe base application and move them to web based technology; fou nd an opportunity took that opportunity and formed by first web based company. And that company which was a resource company actually funded my second company which was a product company. And during those days I also was a founding member  of a company which did those video streaming on the web in 1998-1999 when people were doing graphics on the web we went and did the video streaming on the web. Actually we were one of the first two companies which did that and that company was acquired by Akamine. And then I also founded another  company which did the messaging on the cell phone like emails and other stuff. So I was one of the first few guys who did the email on the cell phone.And then I joined  Phoenix technologies as a senior Vice President during the tenure I was also a part of the city council of the federal government, advising on cyber security and stuff. And then I joined a company which was kind of struggling  called Validity Sensor which is a finger printing company. I w as drove the companys product strategy and market strategy and tried to turn the company around and that company became profitable in four years. That company also got acquired Synoptic.It was during those days what I found was the number of online attacks that were happening, the financial fraud that happening. And also we have interestingly moved from PC based community to a cell phone based community where screens are much smaller and then you want to access stuff from cell phone, such as touch screen user ID’s and passport is not always good, its not convenient, its not easy. And incidentally I was also CTO of  a fingerprint sensor company which actually identifies you without you actually entering   a user ID and password. I was actually trying to see how we increase the utility of fingerprint and that’s when I ran into Michael Ballot, he started Paypal. We started discussing, here is a big fraud that’s happening in the industry, which is a business pain and here is human pain where people are struggling to enter user ID and passwords, entering multiple passwords, a number of accounts is increasing. As long as you try to do security on the internet with the primary infrastructure still base on user ID and password, you’re actually not treating the disease, you’re treating the symptom.You really need to fix the problem, fix the disease. And we actually took a step back and if we were to do cyber security online litigation and on a clean slate, how do you do that. So that’s when I actually, with my team wrote the protocol which were the concepts of protocols based on which FIDO was formed. And then we donated that IP to FIDO alliance and then how my fifth company Nok Nok Labs got started and until now we raised about fifty million dollars with the company, Nok Nok Labs.The very work we do, FIDO alliance of integration, eliminates the passwords; the user doesn’t have to remember the passwords user name, the user doesn’t have to type the passw ord. Sever doesn’t know their password, and the more user authenticates himself to device, the device then authenticate back to me, servers.BUSINESS MODEL OF NOK NOK LABSMartin: But how does it authenticate? Just walk me through. Imagine, I am a normal customer an individual, and I want to authenticize, how does that work for example with a bank?Ramesh: So today, if you want to try to log on to the bank you use your user ID and password and that package gets send to the server. And as you are typing and sending you are vulnerable to many different attacks, it could be fishing attack, it could be manageable attacks or it could be dictionary attack or somebody can simply attack servers and get your credentials. In the new model, if you see Apple’s iPhone, iPhone 5 iPhone 6, Samsung Galaxy X 5 and S6, the  fingerprints facial recognition technologies is highly scaling, it’s becoming mainstream right now. I mean earlier we had cost issues and quality issues. Now  those things ar e coming together where now fingerprinting, iris technology, and facial technology is mature and it is deployable in mass scale and the cost have also comes down dramatically and thanks to iPhone embracing fingerprinting and that made fingerprinting mainstream technology now.Martin: But does that mean you’re mainly focusing on mobile security or is it also that you’re doing this for desktop?Ramesh: Same infrastructure  can be also be used by both PC, cell phone and tablet. So the way it works, you authenticate yourself to device using your fingerprint and facial recognition technology and something. And then there is a process if you are a user of the bank currently using user ID and password, next time that you have a FIDO enabled  phone or FIDO enabled PC you go log on using your password, servers then can recognize that   you have a FIDO component infrastructure device and then it walks you through a registration process.That registration process is simple: you look into the camera, you speak a phrase, touch the sensor, a single touch, a single phrase, or a single blink; any of these things, just this. You do that, and during that period there will be some typographic exchange that happening between the client and the servers. And the typographic signatures are generated on the client and sent to the server. I don’t want to get into too much detail, but there is a public and private key kind of security infrastructure. The private key is generated on the client and the public key is sent to the servers for that user for that device. From that moment onward, any authentication that happen between the servers and the client is based on that cryptographic signature on a challenge response basis. So next time when you want a authentication to be used, a service or a bank you simply go to the bank site and then you touch the finger, look into the camera for that single phase, then the response for the challenge that servers process for the device gets gen erated and that’s how you get authenticated.Martin: Is there a way to gain this? For example, imagine I would know that this mobile phone is attached to Ramesh, and by the way I would have a photo of Ramesh which I would put in front of the camera. This might be used for the facial recognition, voice, maybe something else.Ramesh: So the security is always an arms race. The current problem and security addressing security problem also depends on what kind of security problem you’re interested. Today, if you see majority of the attacks happening on network  cyber security. In most of them, the hackers don’t have motivation to attack one person. What they want to do is go back to sites like Yahoo, LinkedIn, Gmail. Go to a site where they can get hundred of millions of user accounts eBay attack.Martin: Yeah, right.Ramesh: So when you have user IDs and passwords at that scale, then what they want is much bigger. In FIDO, it has to be targeted attack that hacker really wants to att ack. You dont only have to have my picture or my fingerprint but you also have to have steal my device.Martin: I mean I totally understand that it makes it makes the authentication process safer â€" totally understood.Ramesh: Safer, simpler.Martin: Imagine, I want to really hack a company. Maybe then I wouldn’t try to hack via the authentication, but then I would just would like to hack the database, there are the companies that will still have the personally identifiable information.Ramesh: In the current scenario, you’re right, hackers are motivated to hack the server site not the device. When you’re attacking the server site in the older model you get user ID and password. So it’s easy. In the new model, when you attack the server, all you only get is a bunch of public keys. You wont be able to do any thing with that. You got to have private keys.Martin: Oh, good.Ramesh: The private key is stored on the client side. So you are actually turning the authentication process u pside down. You’re not providing a single point of attack for somebody in remote places like press releases of the last year, where a single hacker group has 1.2 billion account information from United States and all over the globe. 1.2 billion accounts that’s how they harvest the whole thing. In this model, when they go and try to steal secrets from the server, they are no secrets on the servers anymore. All they have are public keys, you won’t be able too much with public keys.Martin: Ramesh, what are the major customers of Nok Nok Labs.Ramesh: So like I was mentioning earlier, the FIDO protocol has two components. There needs to be a client component, there needs to be a server. So unless there is a client, you dont have a business for the server side. Nok Nok makes money selling servers. Our first deployment was with Paypal. Paypal has used Nok Nok servers and we worked with Samsung where we actually put the FIDO clients on the mobile phones of Galaxies S5 and Galaxies S6. Now the next deployment of FIDO of Nok Nok servers is with be in Alipay in China, where again we provide the same servers to them, as Samsung phones and other phones that they chose to use where they deployed FIDO, they can use it. The latest one that we deployed  is Docomo entity.Martin: Who is that?Ramesh: Docomo in Japan. That is the biggest carrier in Japan. They have close to 65 million subscribers. Docomo has embraced FIDO at one go. The entire Docomo ID infrastructure now does not use password, uses Nok Nok severs; and completely eliminates password. If you are using Docomo services, Docomo phones now they are no password. You simply either look into the camera. They have actually deployed a fingerprint. They have actually deployed an iris scanning. It works seamlessly. We never had an issue- we deployed it in May. These are the first three major customers we started to work with. As you can see its not normal for a start up company to go after companies like Docomo, Paypal and Alipay as their first customers.Martin:  Definitely.Ramesh: And also deploy at a scale at that we deploy; at very high consumer scale.Martin: And how is the revenue model working?Ramesh: So like I was mentioning earlier. Client is free, we initially with the first version of FIDO we did the clients ourselves, but Microsoft is part of FIDO alliance now and they’ve actually announced recently that Windows 10 will have FIDO infrastructure in them. SnapDragon and Qualcom have announced that they embrace FIDO. Armies buy FIDO. You can go to FIDO Alliance.org and see the members. You can see how many members there are there.Now, Nok Nok has also enabled iPhone 5 and iPhone 6 to use FIDO infrastructure and we have support for that. We, basically, as we are going we expect the client side to be embraced by the operating system people, like Microsoft, Google, Apple kind of people. And we basically focus on selling servers. We have a multi-factor authentication server that we sell to th e people, we deploy to people. We dont host servers, we sell servers, its an enterprise sale.  And if you’re Docomo, you’re a financial institution if you’re bank of Germany, what you simply do is buy the server from us, use our SDK to deploy to your mobile app, internet browser plugin and you’re ready to go.Martin: Why did you choose the selling mode only and not as SAP for example doing sales and service model?Ramesh: We are actually a product company just like SAP company. The only difference is a difference between conventional ERP companies and us it that ERP is full application, and we are an infrastructure business. We don’t sell application, we sell infrastructure.Our server will have to go and integrate with some of the existing application like for instance SAP can deploy our server. SAP has various kind of application that they sell like digital workflow, process management,  supply chain. They are various things that they sell. All of them currently use the var ious user IDs and passwords to get in. SAP can choose to embrace FIDO and then buy a Nok Nok sever. And now all servers can be password free.ADVICE TO ENTREPRENEURS FROM RAMESH In Palo Alto (CA), we meet founder and FIDO Visionary of Nok Nok Labs, Ramesh Kesanupalli. Ramesh talks about his story how he came up with the idea and founded Nok Nok Labs, how the current business model works, as well as he provides some advice for young entrepreneurs.INTRODUCTIONMartin: Hi, today we are in Palo Alto with Ramesh at Nok Nok labs. Hi Ramesh, how are you  and what do you do?Ramesh: Hi Martin, how are you doing?Martin: Awesome. What do you do?Ramesh: We are a company which is focusing on fixing the cyber security problem. As you know, strong authentication in cyber security is still focused on user ID’s and passwords. And if you see the latest online attacks that are happening in the industry, most of them are related to doing a cyber site attack and stealing all bunch of passwords from various users and those passwords being used at some other sites to commit fraud in financial markets and in healthcare markets. And these markets are pretty security and privacy cen tric. If we still are laying on user ID’s and password and we’re all vulnerable and with respect to what’s happening in the industry right now unlike earlier days when we were using internet for information access, now internet is being used for lifestyle management. And if we’re still trying to build our security base off user ID’s and passwords which are vulnerable and also unlike earlier, where we have used one or two accounts. Nowadays, we have fifteen to twenty accounts each, for  select works, banks, financial organization, online site. And it is becoming very difficult to keep track passwords and so we normally use two or three passwords to make our lives simple. But when a hacker goes to a server site and harvest a whole bunch of passwords, he will reuse on other financial institution and conduct transaction like you and do the fraud.So what we focus on is actually how do we do security without actually using user ID’s and passwords, how do we eliminate passwords .  And we focus on actually selling servers which we do online security without using passwords. So Nok Nok has two components to it; Nok Nok builds servers on a product called FIDO, faster identity online. Faster Identity online is an alliance, an open standing building committee body that was actually founded by me also. We, Nok Nok labs, have donated IP to the alliance. Alliance, now in 2009, has started to work, but we openly went out with FIDO alliance during Arisi conference in 2013, with six founding members in FIDO alliance. And today, 2015, we are about to 260 close to 250 companies in the alliance who actually endorse the protocols and contribute to the protocol. So that alliance, FIDO alliance is a non-profit organization. The purpose of the alliance is primarily to define the specs, and it wants the spec   working with the  global industry. Nok Nok is the first implementer of the protocol. There are two protocols in Fido; one is called UAF, the other one is called U2F. N ok Nok focus on UAF, UAF protocol, United Amitigation Framework. So the two entities that I wasâ€"FIDO alliance, I was one of three founders were FIDO alliance. But it was initiated by me and a other gentlemen name   Michael Ballot, he started Paypal and also another gentlemen by another gentleman named Taho Elgomarto he was the inland professor so we started FIDO alliance and in 2011 I founded Nok Nok Labs.Martin: Ok, interesting. And what is your background actually?Ramesh: My background is engineering electronics and then I came to this country working for IBM as an consultant, primarily in the cyber security space. And 1995 I started my first services company and that used to focus on taking the legacy mainframe based information system and migrating them to   internet and web technologies.Martin: What made you become an entrepreneur?Ramesh: Just like any other middle class family in India I came here after my studies and being entrepreneur and wanting to do something unique, wa nting to do something different. We just started off, I found an opportunity of working in the mainframe space primarily and internet technology. So I found an opportunity to actually take some of those mainframe base application and move them to web based technology; found an opportunity took that opportunity and formed by first web based company. And that company which was a resource company actually funded my second company which was a product company. And during those days I also was a founding member  of a company which did those video streaming on the web in 1998-1999 when people were doing graphics on the web we went and did the video streaming on the web. Actually we were one of the first two companies which did that and that company was acquired by Akamine. And then I also founded another  company which did the messaging on the cell phone like emails and other stuff. So I was one of the first few guys who did the email on the cell phone.And then I joined  Phoenix technolog ies as a senior Vice President during the tenure I was also a part of the city council of the federal government, advising on cyber security and stuff. And then I joined a company which was kind of struggling  called Validity Sensor which is a finger printing company. I was drove the companys product strategy and market strategy and tried to turn the company around and that company became profitable in four years. That company also got acquired Synoptic.It was during those days what I found was the number of online attacks that were happening, the financial fraud that happening. And also we have interestingly moved from PC based community to a cell phone based community where screens are much smaller and then you want to access stuff from cell phone, such as touch screen user ID’s and passport is not always good, its not convenient, its not easy. And incidentally I was also CTO of  a fingerprint sensor company which actually identifies you without you actually entering   a user ID and password. I was actually trying to see how we increase the utility of fingerprint and that’s when I ran into Michael Ballot, he started Paypal. We started discussing, here is a big fraud that’s happening in the industry, which is a business pain and here is human pain where people are struggling to enter user ID and passwords, entering multiple passwords, a number of accounts is increasing. As long as you try to do security on the internet with the primary infrastructure still base on user ID and password, you’re actually not treating the disease, you’re treating the symptom.You really need to fix the problem, fix the disease. And we actually took a step back and if we were to do cyber security online litigation and on a clean slate, how do you do that. So that’s when I actually, with my team wrote the protocol which were the concepts of protocols based on which FIDO was formed. And then we donated that IP to FIDO alliance and then how my fifth company Nok Nok Labs go t started and until now we raised about fifty million dollars with the company, Nok Nok Labs.The very work we do, FIDO alliance of integration, eliminates the passwords; the user doesn’t have to remember the passwords user name, the user doesn’t have to type the password. Sever doesn’t know their password, and the more user authenticates himself to device, the device then authenticate back to me, servers.BUSINESS MODEL OF NOK NOK LABSMartin: But how does it authenticate? Just walk me through. Imagine, I am a normal customer an individual, and I want to authenticize, how does that work for example with a bank?Ramesh: So today, if you want to try to log on to the bank you use your user ID and password and that package gets send to the server. And as you are typing and sending you are vulnerable to many different attacks, it could be fishing attack, it could be manageable attacks or it could be dictionary attack or somebody can simply attack servers and get your credentials. In t he new model, if you see Apple’s iPhone, iPhone 5 iPhone 6, Samsung Galaxy X 5 and S6, the  fingerprints facial recognition technologies is highly scaling, it’s becoming mainstream right now. I mean earlier we had cost issues and quality issues. Now  those things are coming together where now fingerprinting, iris technology, and facial technology is mature and it is deployable in mass scale and the cost have also comes down dramatically and thanks to iPhone embracing fingerprinting and that made fingerprinting mainstream technology now.Martin: But does that mean you’re mainly focusing on mobile security or is it also that you’re doing this for desktop?Ramesh: Same infrastructure  can be also be used by both PC, cell phone and tablet. So the way it works, you authenticate yourself to device using your fingerprint and facial recognition technology and something. And then there is a process if you are a user of the bank currently using user ID and password, next time that you have a FIDO enabled  phone or FIDO enabled PC you go log on using your password, servers then can recognize that   you have a FIDO component infrastructure device and then it walks you through a registration process.That registration process is simple: you look into the camera, you speak a phrase, touch the sensor, a single touch, a single phrase, or a single blink; any of these things, just this. You do that, and during that period there will be some typographic exchange that happening between the client and the servers. And the typographic signatures are generated on the client and sent to the server. I don’t want to get into too much detail, but there is a public and private key kind of security infrastructure. The private key is generated on the client and the public key is sent to the servers for that user for that device. From that moment onward, any authentication that happen between the servers and the client is based on that cryptographic signature on a challenge respon se basis. So next time when you want a authentication to be used, a service or a bank you simply go to the bank site and then you touch the finger, look into the camera for that single phase, then the response for the challenge that servers process for the device gets generated and that’s how you get authenticated.Martin: Is there a way to gain this? For example, imagine I would know that this mobile phone is attached to Ramesh, and by the way I would have a photo of Ramesh which I would put in front of the camera. This might be used for the facial recognition, voice, maybe something else.Ramesh: So the security is always an arms race. The current problem and security addressing security problem also depends on what kind of security problem you’re interested. Today, if you see majority of the attacks happening on network  cyber security. In most of them, the hackers don’t have motivation to attack one person. What they want to do is go back to sites like Yahoo, LinkedIn, Gmail . Go to a site where they can get hundred of millions of user accounts eBay attack.Martin: Yeah, right.Ramesh: So when you have user IDs and passwords at that scale, then what they want is much bigger. In FIDO, it has to be targeted attack that hacker really wants to attack. You dont only have to have my picture or my fingerprint but you also have to have steal my device.Martin: I mean I totally understand that it makes it makes the authentication process safer â€" totally understood.Ramesh: Safer, simpler.Martin: Imagine, I want to really hack a company. Maybe then I wouldn’t try to hack via the authentication, but then I would just would like to hack the database, there are the companies that will still have the personally identifiable information.Ramesh: In the current scenario, you’re right, hackers are motivated to hack the server site not the device. When you’re attacking the server site in the older model you get user ID and password. So it’s easy. In the new model, when you attack the server, all you only get is a bunch of public keys. You wont be able to do any thing with that. You got to have private keys.Martin: Oh, good.Ramesh: The private key is stored on the client side. So you are actually turning the authentication process upside down. You’re not providing a single point of attack for somebody in remote places like press releases of the last year, where a single hacker group has 1.2 billion account information from United States and all over the globe. 1.2 billion accounts that’s how they harvest the whole thing. In this model, when they go and try to steal secrets from the server, they are no secrets on the servers anymore. All they have are public keys, you won’t be able too much with public keys.Martin: Ramesh, what are the major customers of Nok Nok Labs.Ramesh: So like I was mentioning earlier, the FIDO protocol has two components. There needs to be a client component, there needs to be a server. So unless there is a client, you dont have a business for the server side. Nok Nok makes money selling servers. Our first deployment was with Paypal. Paypal has used Nok Nok servers and we worked with Samsung where we actually put the FIDO clients on the mobile phones of Galaxies S5 and Galaxies S6. Now the next deployment of FIDO of Nok Nok servers is with be in Alipay in China, where again we provide the same servers to them, as Samsung phones and other phones that they chose to use where they deployed FIDO, they can use it. The latest one that we deployed  is Docomo entity.Martin: Who is that?Ramesh: Docomo in Japan. That is the biggest carrier in Japan. They have close to 65 million subscribers. Docomo has embraced FIDO at one go. The entire Docomo ID infrastructure now does not use password, uses Nok Nok severs; and completely eliminates password. If you are using Docomo services, Docomo phones now they are no password. You simply either look into the camera. They have actually deployed a fingerprint. The y have actually deployed an iris scanning. It works seamlessly. We never had an issue- we deployed it in May. These are the first three major customers we started to work with. As you can see its not normal for a start up company to go after companies like Docomo, Paypal and Alipay as their first customers.Martin:  Definitely.Ramesh: And also deploy at a scale at that we deploy; at very high consumer scale.Martin: And how is the revenue model working?Ramesh: So like I was mentioning earlier. Client is free, we initially with the first version of FIDO we did the clients ourselves, but Microsoft is part of FIDO alliance now and they’ve actually announced recently that Windows 10 will have FIDO infrastructure in them. SnapDragon and Qualcom have announced that they embrace FIDO. Armies buy FIDO. You can go to FIDO Alliance.org and see the members. You can see how many members there are there.Now, Nok Nok has also enabled iPhone 5 and iPhone 6 to use FIDO infrastructure and we have su pport for that. We, basically, as we are going we expect the client side to be embraced by the operating system people, like Microsoft, Google, Apple kind of people. And we basically focus on selling servers. We have a multi-factor authentication server that we sell to the people, we deploy to people. We dont host servers, we sell servers, its an enterprise sale.  And if you’re Docomo, you’re a financial institution if you’re bank of Germany, what you simply do is buy the server from us, use our SDK to deploy to your mobile app, internet browser plugin and you’re ready to go.Martin: Why did you choose the selling mode only and not as SAP for example doing sales and service model?Ramesh: We are actually a product company just like SAP company. The only difference is a difference between conventional ERP companies and us it that ERP is full application, and we are an infrastructure business. We don’t sell application, we sell infrastructure.Our server will have to go and int egrate with some of the existing application like for instance SAP can deploy our server. SAP has various kind of application that they sell like digital workflow, process management,  supply chain. They are various things that they sell. All of them currently use the various user IDs and passwords to get in. SAP can choose to embrace FIDO and then buy a Nok Nok sever. And now all servers can be password free.ADVICE TO ENTREPRENEURS FROM RAMESHMartin: Ramesh, imagine a child comes to you, a younger one like 15, 16 and wants to start a company but doesnt know whether he should do it or what he should care for. What is your advice you would share with him?Ramesh. At anytime any opportunity or any business gets nurtured of pain. If you should able to identify either business pain or human pain and you have a solution for that; theres the starting point. People, don’t go to CVS and Walgreens to buy vitamins, they go to buy painkillers. When there is a pain, people want to address it   immediately. If there is a vitamin  they don’t go there, that’s not priority.So when you want to start a company, first you need to know, you don’t necessarily need to know details, you don’t necessarily need to know how to fix it, but you should be able to know that there is a pain. Coming back to the pain point, it has to be able to fix the human pain or it has to be able to fix the  business pain. If it can fix either one of them like  for instance security. When security was a pain, people recognized it. You have, people seriously talking scamming, online scamming, money and password scamming, smart cards scamming, all kinds of things. That actually complicates the users experience but it solves the business pain.Martin:   and then you have trade off.Ramesh: That’s the trade off. What FIDO does is conventionally. Security means, more security means unusable; unusable in the sense of difficult to use. If you want to make sure that I’m strong, I keep on asking more and more question. What is your dog name in 1972? This is the kind of thing they will ask in a financial institution. They will ask your social security number and they will ask what is your childhood best friend’s name. These are all passwords, you keep up adding the staff.So what it means by that if I really want to assert that’s who you are then I ask more questions, put you through so much pain. What Nok Nok and FIDO do is we provide more security at the same time make it very very usable. For me on an iPhone, typing a password is much more difficult than just doing this and done. So what we do is actually, we increase security and also make it extremely usable that’s why I keep throwing in the word a single touch, or a single phrase or a single blink. We make it stronger, at the same time extremely usable.Martin: What is, what would you say to the young person if he says actually I cannot identify a problem worth solving?Ramesh: Then there is no company to be built. You got to know what you’re solving. If you are trying to do something without solving a problem, then there is no company there. Even if you want to start a nonprofit / charitable organization its still solves some problem which is helping people.Martin: Thank you so much, Ramesh, for your time.Ramesh: Sure, no problem.Martin: And next time when you really want to start a company, don’t just start a company, focus on a problem and really identify that is the big problem that is worth solving  and if you don’t find a problem just dont start a new company, work your way through and maybe over the time you will find a problem that is worth solving.Ramesh: That’s almost how all other things get started. Unless you go through the pain, you won’t know the problem. I would strongly recommend to people to actually work at some places if they don’t have any idea like probably a big company like Dell was started in Utah Austin by Michael  Dell where he saw people needed computer as diffi cult to go out and get them started online. So it doesn’t have to be that you have to work you don’t have to work. You just have to feel the pain. If you see the pain and that pain is not be unique to you, it should be a general pain, and you’re fixing general pain then you have a company to start with.Martin: Great! Thanks you so much and good luck with Nok Nok Labs.Ramesh: No problem. Thank you so much.

Sunday, May 24, 2020

ROMANS HEIRS TO GREEK AND HELLENISTIC CIVILIZATION

IN WHAT WAYS WERE THE ROMANS HEIRS TO GREEK AND HELLENISTIC CIVILIZATION? The Hellenistic civilization marked an important time in Greek culture. This was the period between 323 and 31 BC, at one point the Greek society changed from being withdrawn and localized to an aggressive multinational, unprotected, and eager culture that infused together southwest Asia and eastern Mediterranean. The Hellenistic world involved many different people but the Greeks’ thinking and way of life influenced most of the matters.1 Every aspect related to culture followed the beliefs of the Greeks and this led to the Greek language becoming established, as the official language of this area. The following arguments are centralized around†¦show more content†¦Moreover, the law did not allow women to hold office, but the men who held offices were allowed to seek counsel of their wives and this could only be done in private. Conversely, equality of men and women was more in the Roman society than it had been in the Greek culture. Professor Roy Mathews and Dewitt Platt centralized their arguments around political humanities of the western world, and around the period for the Hellenistic civilization. This is when the institutions and culture of other nations interacted with the Greek’s in order to create a multicultural and varied civilization. From their definition, this would seem to suggest that Rome should not be counted as Hellenistic civilization because of the controversial time lines. Nonetheless, Rome was situated in the ideal geographical location, which naturally created a varied and multicultural civilization due to its expansion and methods of conquering people. This explanation indicates that Rome was an heir to Hellenistic civilization even though it does not fit according to the definition given by Professor Mathews and Platt. Professor Noble, on the other hand, explains how the fall of the Roman Empire led to the rising of three great civilizations of, the Byzantine Empire, medieval Eur ope, and the Islamic caliphate.8 Professor NobleShow MoreRelatedEssay on the Role of Women in Ancient Greece14417 Words   |  58 Pagespolitically inï ¬â€šuential that ancient scholars blamed them for Sparta’s decline as a major power. And this was not simply another example of the enlightenment for which ancient Greece is famous: By most measures, Sparta was the least enlightened of the many Greek city–states.2 The most democratic city–state, and the source of the greatest art, philosophy, and so forth, was Athens, where women were not allowed to own property, received little education, and faced severe restrictions on their ability to move

Wednesday, May 13, 2020

Motives of Adolf Hitler in Audens Epitaph on a Tyrant...

Adolf Hitler was a very powerful man, and had a disturbing vision of how the world should be. W.H. Auden was interested in Adolf Hitler, and this interest can be seen in Auden’s poetry. September 1, 1939 and Epitaph on a Tyrant are two poems in which Auden scrutinizes Hitler’s actions. Auden uses symbolism in these two poems to illustrate the different aspects of Hitler’s life and actions. To begin with, Epitaph on a Tyrant personified Hitler’s obsession with â€Å"perfection of a kind.† The obsession with â€Å"perfection† that Hitler held and the dream of a world where blonde hair and blue eyes ruled upset Auden. To attempt genocide on all non-Aryan races was an atrocity and Epitaph on a Tyrant embodied Auden’s emotions of the ethnic cleansing†¦show more content†¦With the army he had raised, Hitler was able to invade Poland on September 1, 1939 and instigate the largest scale war to date. Speaking of September 1, 1939, the poem September 1, 1939 sheds a lot of light on Hitler’s regime. September 1, 1939 gives insightful knowledge stating, â€Å"From Luther until now / That has driven a culture mad.† This sums up the reason that could explain why Hitler was obsessed with the Aryan race. Lutheran is a religion that is prevalent in most of Germany. The founder, Martin Luther, was anti-Semitic. For this reason, many Germans were brought up to be anti-Semitic. Martin Luther’s principles no doubt had a large influence on the German people, especially the Nazis. September 1, 1939 gave reasons as to why the Nazis and Hitler held such hatred towards minority groups. September 1, 1939 also questions Hitler’s past and shows how parenting may have had a large effect on Hitler’s future actions. To understand Hitler’s past, one must â€Å"find what occurred at Linz.† Hitler grew up in the town of Linz, which is in Austria. His father frequently beat him when he was g rowing up and denied Adolf the right to follow Adolf’s dream and become an artist. During the war, Hitler turned Linz into an artillery practice field and blew it to smithereens.

Wednesday, May 6, 2020

Auto Biography Free Essays

was born and brought up in Houston, Texas. Ours is a family of four with my parents, me and my younger brother. The schooling years of my life were toughest. We will write a custom essay sample on Auto Biography or any similar topic only for you Order Now I struggled a lot in my studies. The standardized procedure of education never interested me. I was an average student throughout my academic life. Extra-curricular activities like sports, drawing, crafts, etc. were my favorite things. I just remember that it was the second semester of 8th grade when I stood first in class. However, it didn’t serve any purpose in motivating me to take up studies seriously. I enjoyed understanding the concepts more than just memorizing ready-made notes. After completion of my schooling and college in the science stream, I chose to become a painter. It was a weird decision taken by me at that time. Today, however, I don’t regret it at all. My career in painting began a smoothly and I was more than happy to grab the right opportunity for which I was waiting so long. Today, I am happy with my life and enjoy it to the fullest. The positive attitude to face hardships brought out the best in me. Today I am looking forward to face the challenges of life in a positive manner. The content presented in the example above gives only a rough idea of how an autobiography should start; one can use a similar write up as an example of autobiography for college projects. Writing an autobiography is a huge effort and requires patience to put the facts and experiences in a proper manner. Autobiographies are detailed accounts of a person’s life and should be written with care and responsibility. The autobiography sample provided in the article above provides an idea about how to write about yourself in an interesting manner. Autobiographies are detailed accounts of our lives which help in remembering the happy and sad moments as well. One can draw inspiration from the tough times of the past and move on in life with a positive attitude. Read more at Buzzle: http://www. buzzle. com/articles/autobiography-sample. html How to cite Auto Biography, Essay examples

Monday, May 4, 2020

Future of VoIP Technology Essay Example For Students

Future of VoIP Technology Essay Future of VoIP TechnologyVoIP is a relatively new technology and so the benefits are just beginning to be realized. VoIP technology has the ability to completely change the telephone industry as we know it. Big changes are in store for the way we use telephones and this section will address some of the changes to expect. Obstacles still stand in the way of progression and there are problems that need to be addressed before this technology can take over. Individuals have some great things to look forward to. Many already communicate over the internet for free (not including ISP cost) in a simple fashion by chat rooms, instant messaging, and email. Some are already using VoIP to replace their current telephone provider due to the lower costs available. Almost everyone in the United States has a cell phone that connects wirelessly to cellular networks located in nearly every city. Wireless internet is becoming rapidly mainstream now and this offers new opportunity for VoIP technology. N ew pocket PC phones are being developed to incorporate support for Wi-Fi as well as cellular networks. These phones will be able to switch from the users Wi-Fi connection to cellular networks and visa versa on the fly. Currently phone calls are directed to a location, but in the future phone calls will be directed to a person. Phone service will switch totally to VoIP once Wi-Fi networks are available to the extent of current cellular networks. Businesses are already currently reaping the benefits of VoIP because of savings in service charges. The technology offers far more than cost savings especially for the business world. Companies can get multiple locations serviced and communicate to each of the locations as if they were all located in the same building; with only an extension number. Digital music can be uploaded to a server and replayed for calls that are on hold. Eventually each employee will be able to use their PDA cell phone for both business and personal calls. The phone will connect to the Wi-Fi network in the building and all calls will be forwarded to the IP address of that phone. More than half of network managers from organizations with 500 or more employees plan to implement VoIP products or services during the next year. (VoIPWatch.com) Businesses have some great opportunities to gain from switching to VoIP and should start to look and determine whether it is right for them. One of the largest obstacles VoIP needs to overcome is the issue of security. Just taking a look into the email of any person can show why this is the case. Spam is rampant in email and VoIP phones would be subject to the same spam problems. Scripts could be written to call numbers and speak or play the ad on the users cell phone. This could wreak havoc without proper laws and measures implemented to prevent this. There is also the issue of hackers gaining access to calls over the Internet. VoIP devices such as IP phones, Call Manager, Gateways, and Proxy servers inherit the same vulnerabilities of the operating system or firmware they run on top of. (Intrusion Prevention) This means that VoIP communications can be compromised based on flaws in the operating system that running the application. There are many things to overcome before VoIP can become the standard, but the future looks very bright. Intrusion Prevention: The Future of VoIP Security. 2004. TippingPoint Technologies, Inc. Retrieved 7 August 2005 http://www.infosectoday.com/Articles/VoIP%20Security.pdfVoIP Company News. 2000. VoIPWatch. Retrieved 7 August 2005 http://www.voipwatch.com/article.php3?sid=128