Wednesday, August 26, 2020

Earthquakes result Free Essays

Tremors result from aggravation in the external layer of the Earth. This causes the vibration of the Earth’s surface. Another purpose behind the event of seismic tremors is the unexpected arrival of vitality that had been lethargic in the center of the Earth. We will compose a custom exposition test on Seismic tremors result or then again any comparable subject just for you Request Now This vitality makes strain in the stones, hence; it is moved as waves to the Earth’s surface (Bolt, 2005 ). The power or size and the timeframe that had passed decide the dangerous impact of a seismic tremor. The seismic waves and their force decide the ruinous intensity of a tremor. Auxiliary harms brought about by a quake rely upon the plan of the structure and the materials utilized in its development. Quakes contrast in greatness. They might be little or unnoticeable or they might be huge to such an extent that their power can be distinguished from inaccessible spots. The repercussions of a seismic tremor may make the twisting of the ground or harm structures. A few seismic tremors happen under the ocean and cause waves. Whatever the type of the seismic tremor, a large number of them imperil the lives of people through their ruinous power (Bolt, 2005 ). The outside of the Earth comprises of lithospheric plates. These plates are consistently moving and this causes compressional worries at their edges. The abrupt arrival of such pressure can be credited to quakes. Most quakes are caused because of the moving of these lithospheric plates. Over the span of their development, these plates slam into one another and tremendous tensional pressure is discharged through the flaws present in the earth’s outside. The vibrations of the seismic tremor spread all through the earth as waves. Shallow seismic tremors happen because of volcanic emissions, the falling of colossal rocks, avalanches and bomb blasts. Such seismic tremors are restricted to the territory encompassing the spot of such events (Earthquake, 2004). The effect of a quake spreads through an enormous region encompassing the focal point of the seismic tremor. The outside of earth breaks because of the transmission of flaws to the surface from inside the earth. This outcomes in even and vertical disfigurement of the surface for more than a few meters. There is no such exchange of flaws to earth’s surface during serious seismic tremors. Shallow quakes can be felt through the recurrent developments of the earth’s surface, which is named as flaw creep. The qualities of the ground decide the extent of an earthquake’s vibrations and its ruinous force. For example, waterway beds, or nonintegrated ground surface could convey the impact of a quake to huge region. While, zones comprised of bedrock transmit a seismic tremor that is essentially more vulnerable. Loss of human lives would be more in places where structures are not built to withstand huge stuns and vibrations. In those regions L floods of a tremor could cause the channel lines that flexibly gas to blast in this manner causing damaging flames (Earthquake, 2004). Wounds and passings could result from the breakdown of structures and sharp articles shipped by the breeze. Basic attributes could likewise bring about harms. For example, adaptable structures developed on bedrock endure less harm where as inflexible structures based on free soil endure more prominent harm. In uneven locales, tremors cause avalanches and landslides, which could lower the occupants. Seismic tremors that happen under the oceans could cause tidal waves, which offer ascent to dangerous influxes of water from the focal point of the quake and flood the urban communities on the coast (Earthquake, 2004) The unexpected development of rocks along a deficiency causes vibrations and the transmission of vitality through the Earth. Such waves are named as body waves and their spread is underground. These waves are named P waves or essential waves and S waves or optional waves. The last will in general dislodge the ground advances and in reverse and are therefore known as shearing waves (Bolt, 2006). The world encountered various seismic tremors in the year 1990. The Iranian quake in the long stretch of June of that year asserted about fifty thousand human lives and its power was estimated at 7. 7 on the Richter scale. Tremors are brought about by plate tectonics and a large portion of the seismic tremors happen in locales that are in nearness to the edges of the Earth’s plates. Deficiency movement is the principle explanation behind seismic tremors in these areas. Iran is situated on the limit between the Arabian and the Asian plates. Territories where there was no shortcoming action likewise experienced tremors, for example, Missouri in the US where a quake happened on the 26th of September 1990, Welsh outskirts and Sheffield in the UK supported a seismic tremor on the second of April and the eighth of February 1990 (Seismology: Earthquake Prediction, 2005). Stanford University created measures to anticipate the event of quakes by recognizing the variances in low recurrence radio waves that were transmitted through rocks a couple of hours before the event of a seismic tremor. This wonder is an aftereffect of electrical flows delivered by pressure in the stones and is additionally credited to the opening of minute breaks in the stones. Japanese researchers found that electromagnetic radiation was discharged before a tremor. (Seismology: Earthquake Prediction, 2005). Various seismic tremors happen in the oceans, which don't cause harm, however serious quakes happening in thickly populated zones could bring about gigantic annihilation to property and life. So as to confine the risks of a quake, it is important to build up an arrangement of seismic tremor forecast. At present the seismic hole hypothesis has met with some accomplishment in finding quake inclined areas. Most seismic tremors happen in the area of the San Andreas Fault in California since the North American plate and Pacific plate move past one another. The North Pole is being moved towards Japan at a moderate pace of six centimeters in at regular intervals by quakes. This float of post is as aftereffect of serious seismic tremors that happen along shore the Pacific Rim (Earthquake, 2005). In spite of the way that seismic tremors can't be forestalled the seriousness of the obliteration brought about by them can be relieved apparently by receiving reasonable correspondence methodologies, suitable basic structure of structures, actualizing a very much arranged strategy during a quake, properly instructing the general population and guaranteeing that more secure structure gauges are set up. A few nations have initiated quake security and administrative offices in light of the extreme harm caused to life and property by tremors. In regard of Tsunamis, an appropriate early admonition framework can fundamentally lessen the harm caused, because of the way that torrent waves are proliferated at low speeds. These waves are more slow than seismic P and S waves and travel at a tenth of the speed of seismic waves in the stones beneath. Therefore, seismologists have sufficient time available to them to caution the regions that could be influenced by the executioner waves (Bolt, 2006). The event of intraplate tremors is significantly less in contrast with plate limit seismic tremors. They happen because of the inner cracking of rock masses. Instances of such tremors were 1811 New Madrid quake and the 1812 Missouri seismic tremor, which were extremely serious. From the reports of the harm recorded, researchers have opined that their power ought to have been of the request for 8. 0 on the Richter scale (Bolt, 2006). Around 80% of the vitality discharged by quakes can be ascribed to the seismic tremors that occur in the region encompassing the Pacific Ocean. In excess of a thousand tremors of force more than 3. 5 in size happen in Japan every year. Another area that is infamous for seismic tremors is the western shore of North and South America (Pendick). One of the procedures utilized by seismologists so as to quantify quakes is the Richter greatness scale, which was created by Charles Richter. The Richter greatness is resolved based on the most extreme vibration quality and the good ways from earthquake’s focal point. This scale is logarithmic and as needs be, a 6 greatness seismic tremor is multiple times more grounded than a 5 size quake. Be that as it may, the Richter size is off base if the tremor being estimated is in excess of 310 miles from the seismograph. As needs be, seismologists created other tremor size scales; anyway these scales can't be applied to all sort of quakes because of the subsequent errors (Pendick). As the separation expands the seismic waves display lost quality. As a rule, the best impact of a quake will be at its focal point. A few quakes are ground-breaking to the point that the ground shaking can be more prominent than the speeding up because of gravity and this could bring about rocks and stones being moved into the air with incredible power. This really unfolded in 1897 when a significant seismic tremor happened in Assam, India (Pendick). In the USA, seismic tremors are a significant reason for misfortune to property and jeopardize around seventy †5,000,000 US residents. The misfortune brought about by tremors can be fundamentally alleviated by effective catastrophe arranging, selection of preventive estimates like actualizing better protects while developing structures and giving data about seismic tremors that could happen quickly to the masses. The U. S. Land Survey (USGS) is the group chief of the push to caution individuals in an opportune way with respect to quakes going to happen in the US (USGS Science Helps Build Safer Communities Earthquake Hazardsâ€A National Threat ). Seismic tremors asserted a huge number of human lives in the previous 500 years. In the year 1976, the notorious T’ang †Shan tremor that hit China asserted n

Saturday, August 22, 2020

Report relating to the recent financial crisis Essay

Report identifying with the ongoing budgetary emergency - Essay Example A significant quality in the author’s composition is the way where he offers deductive investigations of circumstances, which makes it workable for the peruser to interface the connections between institutional practices and the resultant unfavorable consequences for the American economy. From a critical perspective, the creator outlines the way wherein the financial business in America has utilized its enormous money related assets to bankroll arrangements through determined control of Congress. The demonstration of control happens through generously compensated Ivy League business analysts and monetary examiners who are paid huge entireties of cash to give persuading yet untruthful data about the issues of budgetary administration and financial arrangements. Therefore, it gets suitable to consider the way that the vast majority of the issues raised by the creator take a wide edge that interfaces the practices and approaches of different organizations inside a system that cer tifies the supremacy of momentary monetary benefits over long haul strategies by the corporate entertainers (Ferguson 44). The creator points out that the different monetary difficulties confronting America are subsidiary of the arrangements and practices received by Wall Street over the previous decades. Fergusson advances his contentions by roping in the adjustments in the legitimate structure, which have empowered private players in the economy to propel their private advantages to the detriment of financial development. For example, he refers to the expulsion of the 1933 Glass-Steagall Act, had set up and kept up some component of qualification between venture banks and business banks (Ferguson 51). The result of such activities were found in a wide scope of unscrupulous and amateurish strategic approaches that included credit default trades and different estimates that had the drawn out impact of destroying numerous areas of America’s economy. The book brings up a portio n of the significant escape clauses that have empowered the deceptive practices to continue in the American financial condition are to a great extent controlled by different monetary markers that associate with the various issues on which the monetary procedures are based. In such manner, the book opens up a profound examination of the shaky idea of the American monetary frameworks as far as their effect on the needy economies. Terrible corporate administration rehearses that flourish inside the American monetary framework are clarified as far as non-existent of laws that would be depended upon to reign in the corporate guilty parties. On this specific issue, the creator puts forth the defense for the survey of the present approaches in the American monetary part for the motivations behind imparting worth and great corporate practices. Such practices, as the creator contends, would shield the American economy from unfriendly impacts, for example, those that were seen during the 2008 monetary emergency. The emergency, as per Ferguson, was a finish of long stretches of debasement and regulated covetousness that have destabilized the American monetary framework and undermined the country’s financial force picture on the planet. The book offers projections about the conceivable outcomes of intermittent emergencies if the United States doesn't survey its approaches by creating money related and monetary shields to check against rampant corporate eagerness. A significant perspective

Monday, August 17, 2020

Nok Nok Labs

Nok Nok Labs INTRODUCTIONMartin: Hi, today we are in Palo Alto with Ramesh at Nok Nok labs. Hi Ramesh, how are you  and what do you do?Ramesh: Hi Martin, how are you doing?Martin: Awesome. What do you do?Ramesh: We are a company which is focusing on fixing the cyber security problem. As you know, strong authentication in cyber security is still focused on user ID’s and passwords. And if you see the latest online attacks that are happening in the industry, most of them are related to doing a cyber site attack and stealing all bunch of passwords from various users and those passwords being used at some other sites to commit fraud in financial markets and in healthcare markets. And these markets are pretty security and privacy centric. If we still are laying on user ID’s and password and we’re all vulnerable and with respect to what’s happening in the industry right now unlike earlier days when we were using internet for information access, now internet is being used for lifestyle management . And if we’re still trying to build our security base off user ID’s and passwords which are vulnerable and also unlike earlier, where we have used one or two accounts. Nowadays, we have fifteen to twenty accounts each, for  select works, banks, financial organization, online site. And it is becoming very difficult to keep track passwords and so we normally use two or three passwords to make our lives simple. But when a hacker goes to a server site and harvest a whole bunch of passwords, he will reuse on other financial institution and conduct transaction like you and do the fraud.So what we focus on is actually how do we do security without actually using user ID’s and passwords, how do we eliminate passwords.  And we focus on actually selling servers which we do online security without using passwords. So Nok Nok has two components to it; Nok Nok builds servers on a product called FIDO, faster identity online. Faster Identity online is an alliance, an open standing building committee body that was actually founded by me also. We, Nok Nok labs, have donated IP to the alliance. Alliance, now in 2009, has started to work, but we openly went out with FIDO alliance during Arisi conference in 2013, with six founding members in FIDO alliance. And today, 2015, we are about to 260 close to 250 companies in the alliance who actually endorse the protocols and contribute to the protocol. So that alliance, FIDO alliance is a non-profit organization. The purpose of the alliance is primarily to define the specs, and it wants the spec   working with the  global industry. Nok Nok is the first implementer of the protocol. There are two protocols in Fido; one is called UAF, the other one is called U2F. Nok Nok focus on UAF, UAF protocol, United Amitigation Framework. So the two entities that I wasâ€"FIDO alliance, I was one of three founders were FIDO alliance. But it was initiated by me and a other gentlemen name   Michael Ballot, he started Paypal and also another gent lemen by another gentleman named Taho Elgomarto he was the inland professor so we started FIDO alliance and in 2011 I founded Nok Nok Labs.Martin: Ok, interesting. And what is your background actually?Ramesh: My background is engineering electronics and then I came to this country working for IBM as an consultant, primarily in the cyber security space. And 1995 I started my first services company and that used to focus on taking the legacy mainframe based information system and migrating them to   internet and web technologies.Martin: What made you become an entrepreneur?Ramesh: Just like any other middle class family in India I came here after my studies and being entrepreneur and wanting to do something unique, wanting to do something different. We just started off, I found an opportunity of working in the mainframe space primarily and internet technology. So I found an opportunity to actually take some of those mainframe base application and move them to web based technology; fou nd an opportunity took that opportunity and formed by first web based company. And that company which was a resource company actually funded my second company which was a product company. And during those days I also was a founding member  of a company which did those video streaming on the web in 1998-1999 when people were doing graphics on the web we went and did the video streaming on the web. Actually we were one of the first two companies which did that and that company was acquired by Akamine. And then I also founded another  company which did the messaging on the cell phone like emails and other stuff. So I was one of the first few guys who did the email on the cell phone.And then I joined  Phoenix technologies as a senior Vice President during the tenure I was also a part of the city council of the federal government, advising on cyber security and stuff. And then I joined a company which was kind of struggling  called Validity Sensor which is a finger printing company. I w as drove the companys product strategy and market strategy and tried to turn the company around and that company became profitable in four years. That company also got acquired Synoptic.It was during those days what I found was the number of online attacks that were happening, the financial fraud that happening. And also we have interestingly moved from PC based community to a cell phone based community where screens are much smaller and then you want to access stuff from cell phone, such as touch screen user ID’s and passport is not always good, its not convenient, its not easy. And incidentally I was also CTO of  a fingerprint sensor company which actually identifies you without you actually entering   a user ID and password. I was actually trying to see how we increase the utility of fingerprint and that’s when I ran into Michael Ballot, he started Paypal. We started discussing, here is a big fraud that’s happening in the industry, which is a business pain and here is human pain where people are struggling to enter user ID and passwords, entering multiple passwords, a number of accounts is increasing. As long as you try to do security on the internet with the primary infrastructure still base on user ID and password, you’re actually not treating the disease, you’re treating the symptom.You really need to fix the problem, fix the disease. And we actually took a step back and if we were to do cyber security online litigation and on a clean slate, how do you do that. So that’s when I actually, with my team wrote the protocol which were the concepts of protocols based on which FIDO was formed. And then we donated that IP to FIDO alliance and then how my fifth company Nok Nok Labs got started and until now we raised about fifty million dollars with the company, Nok Nok Labs.The very work we do, FIDO alliance of integration, eliminates the passwords; the user doesn’t have to remember the passwords user name, the user doesn’t have to type the passw ord. Sever doesn’t know their password, and the more user authenticates himself to device, the device then authenticate back to me, servers.BUSINESS MODEL OF NOK NOK LABSMartin: But how does it authenticate? Just walk me through. Imagine, I am a normal customer an individual, and I want to authenticize, how does that work for example with a bank?Ramesh: So today, if you want to try to log on to the bank you use your user ID and password and that package gets send to the server. And as you are typing and sending you are vulnerable to many different attacks, it could be fishing attack, it could be manageable attacks or it could be dictionary attack or somebody can simply attack servers and get your credentials. In the new model, if you see Apple’s iPhone, iPhone 5 iPhone 6, Samsung Galaxy X 5 and S6, the  fingerprints facial recognition technologies is highly scaling, it’s becoming mainstream right now. I mean earlier we had cost issues and quality issues. Now  those things ar e coming together where now fingerprinting, iris technology, and facial technology is mature and it is deployable in mass scale and the cost have also comes down dramatically and thanks to iPhone embracing fingerprinting and that made fingerprinting mainstream technology now.Martin: But does that mean you’re mainly focusing on mobile security or is it also that you’re doing this for desktop?Ramesh: Same infrastructure  can be also be used by both PC, cell phone and tablet. So the way it works, you authenticate yourself to device using your fingerprint and facial recognition technology and something. And then there is a process if you are a user of the bank currently using user ID and password, next time that you have a FIDO enabled  phone or FIDO enabled PC you go log on using your password, servers then can recognize that   you have a FIDO component infrastructure device and then it walks you through a registration process.That registration process is simple: you look into the camera, you speak a phrase, touch the sensor, a single touch, a single phrase, or a single blink; any of these things, just this. You do that, and during that period there will be some typographic exchange that happening between the client and the servers. And the typographic signatures are generated on the client and sent to the server. I don’t want to get into too much detail, but there is a public and private key kind of security infrastructure. The private key is generated on the client and the public key is sent to the servers for that user for that device. From that moment onward, any authentication that happen between the servers and the client is based on that cryptographic signature on a challenge response basis. So next time when you want a authentication to be used, a service or a bank you simply go to the bank site and then you touch the finger, look into the camera for that single phase, then the response for the challenge that servers process for the device gets gen erated and that’s how you get authenticated.Martin: Is there a way to gain this? For example, imagine I would know that this mobile phone is attached to Ramesh, and by the way I would have a photo of Ramesh which I would put in front of the camera. This might be used for the facial recognition, voice, maybe something else.Ramesh: So the security is always an arms race. The current problem and security addressing security problem also depends on what kind of security problem you’re interested. Today, if you see majority of the attacks happening on network  cyber security. In most of them, the hackers don’t have motivation to attack one person. What they want to do is go back to sites like Yahoo, LinkedIn, Gmail. Go to a site where they can get hundred of millions of user accounts eBay attack.Martin: Yeah, right.Ramesh: So when you have user IDs and passwords at that scale, then what they want is much bigger. In FIDO, it has to be targeted attack that hacker really wants to att ack. You dont only have to have my picture or my fingerprint but you also have to have steal my device.Martin: I mean I totally understand that it makes it makes the authentication process safer â€" totally understood.Ramesh: Safer, simpler.Martin: Imagine, I want to really hack a company. Maybe then I wouldn’t try to hack via the authentication, but then I would just would like to hack the database, there are the companies that will still have the personally identifiable information.Ramesh: In the current scenario, you’re right, hackers are motivated to hack the server site not the device. When you’re attacking the server site in the older model you get user ID and password. So it’s easy. In the new model, when you attack the server, all you only get is a bunch of public keys. You wont be able to do any thing with that. You got to have private keys.Martin: Oh, good.Ramesh: The private key is stored on the client side. So you are actually turning the authentication process u pside down. You’re not providing a single point of attack for somebody in remote places like press releases of the last year, where a single hacker group has 1.2 billion account information from United States and all over the globe. 1.2 billion accounts that’s how they harvest the whole thing. In this model, when they go and try to steal secrets from the server, they are no secrets on the servers anymore. All they have are public keys, you won’t be able too much with public keys.Martin: Ramesh, what are the major customers of Nok Nok Labs.Ramesh: So like I was mentioning earlier, the FIDO protocol has two components. There needs to be a client component, there needs to be a server. So unless there is a client, you dont have a business for the server side. Nok Nok makes money selling servers. Our first deployment was with Paypal. Paypal has used Nok Nok servers and we worked with Samsung where we actually put the FIDO clients on the mobile phones of Galaxies S5 and Galaxies S6. Now the next deployment of FIDO of Nok Nok servers is with be in Alipay in China, where again we provide the same servers to them, as Samsung phones and other phones that they chose to use where they deployed FIDO, they can use it. The latest one that we deployed  is Docomo entity.Martin: Who is that?Ramesh: Docomo in Japan. That is the biggest carrier in Japan. They have close to 65 million subscribers. Docomo has embraced FIDO at one go. The entire Docomo ID infrastructure now does not use password, uses Nok Nok severs; and completely eliminates password. If you are using Docomo services, Docomo phones now they are no password. You simply either look into the camera. They have actually deployed a fingerprint. They have actually deployed an iris scanning. It works seamlessly. We never had an issue- we deployed it in May. These are the first three major customers we started to work with. As you can see its not normal for a start up company to go after companies like Docomo, Paypal and Alipay as their first customers.Martin:  Definitely.Ramesh: And also deploy at a scale at that we deploy; at very high consumer scale.Martin: And how is the revenue model working?Ramesh: So like I was mentioning earlier. Client is free, we initially with the first version of FIDO we did the clients ourselves, but Microsoft is part of FIDO alliance now and they’ve actually announced recently that Windows 10 will have FIDO infrastructure in them. SnapDragon and Qualcom have announced that they embrace FIDO. Armies buy FIDO. You can go to FIDO Alliance.org and see the members. You can see how many members there are there.Now, Nok Nok has also enabled iPhone 5 and iPhone 6 to use FIDO infrastructure and we have support for that. We, basically, as we are going we expect the client side to be embraced by the operating system people, like Microsoft, Google, Apple kind of people. And we basically focus on selling servers. We have a multi-factor authentication server that we sell to th e people, we deploy to people. We dont host servers, we sell servers, its an enterprise sale.  And if you’re Docomo, you’re a financial institution if you’re bank of Germany, what you simply do is buy the server from us, use our SDK to deploy to your mobile app, internet browser plugin and you’re ready to go.Martin: Why did you choose the selling mode only and not as SAP for example doing sales and service model?Ramesh: We are actually a product company just like SAP company. The only difference is a difference between conventional ERP companies and us it that ERP is full application, and we are an infrastructure business. We don’t sell application, we sell infrastructure.Our server will have to go and integrate with some of the existing application like for instance SAP can deploy our server. SAP has various kind of application that they sell like digital workflow, process management,  supply chain. They are various things that they sell. All of them currently use the var ious user IDs and passwords to get in. SAP can choose to embrace FIDO and then buy a Nok Nok sever. And now all servers can be password free.ADVICE TO ENTREPRENEURS FROM RAMESH In Palo Alto (CA), we meet founder and FIDO Visionary of Nok Nok Labs, Ramesh Kesanupalli. Ramesh talks about his story how he came up with the idea and founded Nok Nok Labs, how the current business model works, as well as he provides some advice for young entrepreneurs.INTRODUCTIONMartin: Hi, today we are in Palo Alto with Ramesh at Nok Nok labs. Hi Ramesh, how are you  and what do you do?Ramesh: Hi Martin, how are you doing?Martin: Awesome. What do you do?Ramesh: We are a company which is focusing on fixing the cyber security problem. As you know, strong authentication in cyber security is still focused on user ID’s and passwords. And if you see the latest online attacks that are happening in the industry, most of them are related to doing a cyber site attack and stealing all bunch of passwords from various users and those passwords being used at some other sites to commit fraud in financial markets and in healthcare markets. And these markets are pretty security and privacy cen tric. If we still are laying on user ID’s and password and we’re all vulnerable and with respect to what’s happening in the industry right now unlike earlier days when we were using internet for information access, now internet is being used for lifestyle management. And if we’re still trying to build our security base off user ID’s and passwords which are vulnerable and also unlike earlier, where we have used one or two accounts. Nowadays, we have fifteen to twenty accounts each, for  select works, banks, financial organization, online site. And it is becoming very difficult to keep track passwords and so we normally use two or three passwords to make our lives simple. But when a hacker goes to a server site and harvest a whole bunch of passwords, he will reuse on other financial institution and conduct transaction like you and do the fraud.So what we focus on is actually how do we do security without actually using user ID’s and passwords, how do we eliminate passwords .  And we focus on actually selling servers which we do online security without using passwords. So Nok Nok has two components to it; Nok Nok builds servers on a product called FIDO, faster identity online. Faster Identity online is an alliance, an open standing building committee body that was actually founded by me also. We, Nok Nok labs, have donated IP to the alliance. Alliance, now in 2009, has started to work, but we openly went out with FIDO alliance during Arisi conference in 2013, with six founding members in FIDO alliance. And today, 2015, we are about to 260 close to 250 companies in the alliance who actually endorse the protocols and contribute to the protocol. So that alliance, FIDO alliance is a non-profit organization. The purpose of the alliance is primarily to define the specs, and it wants the spec   working with the  global industry. Nok Nok is the first implementer of the protocol. There are two protocols in Fido; one is called UAF, the other one is called U2F. N ok Nok focus on UAF, UAF protocol, United Amitigation Framework. So the two entities that I wasâ€"FIDO alliance, I was one of three founders were FIDO alliance. But it was initiated by me and a other gentlemen name   Michael Ballot, he started Paypal and also another gentlemen by another gentleman named Taho Elgomarto he was the inland professor so we started FIDO alliance and in 2011 I founded Nok Nok Labs.Martin: Ok, interesting. And what is your background actually?Ramesh: My background is engineering electronics and then I came to this country working for IBM as an consultant, primarily in the cyber security space. And 1995 I started my first services company and that used to focus on taking the legacy mainframe based information system and migrating them to   internet and web technologies.Martin: What made you become an entrepreneur?Ramesh: Just like any other middle class family in India I came here after my studies and being entrepreneur and wanting to do something unique, wa nting to do something different. We just started off, I found an opportunity of working in the mainframe space primarily and internet technology. So I found an opportunity to actually take some of those mainframe base application and move them to web based technology; found an opportunity took that opportunity and formed by first web based company. And that company which was a resource company actually funded my second company which was a product company. And during those days I also was a founding member  of a company which did those video streaming on the web in 1998-1999 when people were doing graphics on the web we went and did the video streaming on the web. Actually we were one of the first two companies which did that and that company was acquired by Akamine. And then I also founded another  company which did the messaging on the cell phone like emails and other stuff. So I was one of the first few guys who did the email on the cell phone.And then I joined  Phoenix technolog ies as a senior Vice President during the tenure I was also a part of the city council of the federal government, advising on cyber security and stuff. And then I joined a company which was kind of struggling  called Validity Sensor which is a finger printing company. I was drove the companys product strategy and market strategy and tried to turn the company around and that company became profitable in four years. That company also got acquired Synoptic.It was during those days what I found was the number of online attacks that were happening, the financial fraud that happening. And also we have interestingly moved from PC based community to a cell phone based community where screens are much smaller and then you want to access stuff from cell phone, such as touch screen user ID’s and passport is not always good, its not convenient, its not easy. And incidentally I was also CTO of  a fingerprint sensor company which actually identifies you without you actually entering   a user ID and password. I was actually trying to see how we increase the utility of fingerprint and that’s when I ran into Michael Ballot, he started Paypal. We started discussing, here is a big fraud that’s happening in the industry, which is a business pain and here is human pain where people are struggling to enter user ID and passwords, entering multiple passwords, a number of accounts is increasing. As long as you try to do security on the internet with the primary infrastructure still base on user ID and password, you’re actually not treating the disease, you’re treating the symptom.You really need to fix the problem, fix the disease. And we actually took a step back and if we were to do cyber security online litigation and on a clean slate, how do you do that. So that’s when I actually, with my team wrote the protocol which were the concepts of protocols based on which FIDO was formed. And then we donated that IP to FIDO alliance and then how my fifth company Nok Nok Labs go t started and until now we raised about fifty million dollars with the company, Nok Nok Labs.The very work we do, FIDO alliance of integration, eliminates the passwords; the user doesn’t have to remember the passwords user name, the user doesn’t have to type the password. Sever doesn’t know their password, and the more user authenticates himself to device, the device then authenticate back to me, servers.BUSINESS MODEL OF NOK NOK LABSMartin: But how does it authenticate? Just walk me through. Imagine, I am a normal customer an individual, and I want to authenticize, how does that work for example with a bank?Ramesh: So today, if you want to try to log on to the bank you use your user ID and password and that package gets send to the server. And as you are typing and sending you are vulnerable to many different attacks, it could be fishing attack, it could be manageable attacks or it could be dictionary attack or somebody can simply attack servers and get your credentials. In t he new model, if you see Apple’s iPhone, iPhone 5 iPhone 6, Samsung Galaxy X 5 and S6, the  fingerprints facial recognition technologies is highly scaling, it’s becoming mainstream right now. I mean earlier we had cost issues and quality issues. Now  those things are coming together where now fingerprinting, iris technology, and facial technology is mature and it is deployable in mass scale and the cost have also comes down dramatically and thanks to iPhone embracing fingerprinting and that made fingerprinting mainstream technology now.Martin: But does that mean you’re mainly focusing on mobile security or is it also that you’re doing this for desktop?Ramesh: Same infrastructure  can be also be used by both PC, cell phone and tablet. So the way it works, you authenticate yourself to device using your fingerprint and facial recognition technology and something. And then there is a process if you are a user of the bank currently using user ID and password, next time that you have a FIDO enabled  phone or FIDO enabled PC you go log on using your password, servers then can recognize that   you have a FIDO component infrastructure device and then it walks you through a registration process.That registration process is simple: you look into the camera, you speak a phrase, touch the sensor, a single touch, a single phrase, or a single blink; any of these things, just this. You do that, and during that period there will be some typographic exchange that happening between the client and the servers. And the typographic signatures are generated on the client and sent to the server. I don’t want to get into too much detail, but there is a public and private key kind of security infrastructure. The private key is generated on the client and the public key is sent to the servers for that user for that device. From that moment onward, any authentication that happen between the servers and the client is based on that cryptographic signature on a challenge respon se basis. So next time when you want a authentication to be used, a service or a bank you simply go to the bank site and then you touch the finger, look into the camera for that single phase, then the response for the challenge that servers process for the device gets generated and that’s how you get authenticated.Martin: Is there a way to gain this? For example, imagine I would know that this mobile phone is attached to Ramesh, and by the way I would have a photo of Ramesh which I would put in front of the camera. This might be used for the facial recognition, voice, maybe something else.Ramesh: So the security is always an arms race. The current problem and security addressing security problem also depends on what kind of security problem you’re interested. Today, if you see majority of the attacks happening on network  cyber security. In most of them, the hackers don’t have motivation to attack one person. What they want to do is go back to sites like Yahoo, LinkedIn, Gmail . Go to a site where they can get hundred of millions of user accounts eBay attack.Martin: Yeah, right.Ramesh: So when you have user IDs and passwords at that scale, then what they want is much bigger. In FIDO, it has to be targeted attack that hacker really wants to attack. You dont only have to have my picture or my fingerprint but you also have to have steal my device.Martin: I mean I totally understand that it makes it makes the authentication process safer â€" totally understood.Ramesh: Safer, simpler.Martin: Imagine, I want to really hack a company. Maybe then I wouldn’t try to hack via the authentication, but then I would just would like to hack the database, there are the companies that will still have the personally identifiable information.Ramesh: In the current scenario, you’re right, hackers are motivated to hack the server site not the device. When you’re attacking the server site in the older model you get user ID and password. So it’s easy. In the new model, when you attack the server, all you only get is a bunch of public keys. You wont be able to do any thing with that. You got to have private keys.Martin: Oh, good.Ramesh: The private key is stored on the client side. So you are actually turning the authentication process upside down. You’re not providing a single point of attack for somebody in remote places like press releases of the last year, where a single hacker group has 1.2 billion account information from United States and all over the globe. 1.2 billion accounts that’s how they harvest the whole thing. In this model, when they go and try to steal secrets from the server, they are no secrets on the servers anymore. All they have are public keys, you won’t be able too much with public keys.Martin: Ramesh, what are the major customers of Nok Nok Labs.Ramesh: So like I was mentioning earlier, the FIDO protocol has two components. There needs to be a client component, there needs to be a server. So unless there is a client, you dont have a business for the server side. Nok Nok makes money selling servers. Our first deployment was with Paypal. Paypal has used Nok Nok servers and we worked with Samsung where we actually put the FIDO clients on the mobile phones of Galaxies S5 and Galaxies S6. Now the next deployment of FIDO of Nok Nok servers is with be in Alipay in China, where again we provide the same servers to them, as Samsung phones and other phones that they chose to use where they deployed FIDO, they can use it. The latest one that we deployed  is Docomo entity.Martin: Who is that?Ramesh: Docomo in Japan. That is the biggest carrier in Japan. They have close to 65 million subscribers. Docomo has embraced FIDO at one go. The entire Docomo ID infrastructure now does not use password, uses Nok Nok severs; and completely eliminates password. If you are using Docomo services, Docomo phones now they are no password. You simply either look into the camera. They have actually deployed a fingerprint. The y have actually deployed an iris scanning. It works seamlessly. We never had an issue- we deployed it in May. These are the first three major customers we started to work with. As you can see its not normal for a start up company to go after companies like Docomo, Paypal and Alipay as their first customers.Martin:  Definitely.Ramesh: And also deploy at a scale at that we deploy; at very high consumer scale.Martin: And how is the revenue model working?Ramesh: So like I was mentioning earlier. Client is free, we initially with the first version of FIDO we did the clients ourselves, but Microsoft is part of FIDO alliance now and they’ve actually announced recently that Windows 10 will have FIDO infrastructure in them. SnapDragon and Qualcom have announced that they embrace FIDO. Armies buy FIDO. You can go to FIDO Alliance.org and see the members. You can see how many members there are there.Now, Nok Nok has also enabled iPhone 5 and iPhone 6 to use FIDO infrastructure and we have su pport for that. We, basically, as we are going we expect the client side to be embraced by the operating system people, like Microsoft, Google, Apple kind of people. And we basically focus on selling servers. We have a multi-factor authentication server that we sell to the people, we deploy to people. We dont host servers, we sell servers, its an enterprise sale.  And if you’re Docomo, you’re a financial institution if you’re bank of Germany, what you simply do is buy the server from us, use our SDK to deploy to your mobile app, internet browser plugin and you’re ready to go.Martin: Why did you choose the selling mode only and not as SAP for example doing sales and service model?Ramesh: We are actually a product company just like SAP company. The only difference is a difference between conventional ERP companies and us it that ERP is full application, and we are an infrastructure business. We don’t sell application, we sell infrastructure.Our server will have to go and int egrate with some of the existing application like for instance SAP can deploy our server. SAP has various kind of application that they sell like digital workflow, process management,  supply chain. They are various things that they sell. All of them currently use the various user IDs and passwords to get in. SAP can choose to embrace FIDO and then buy a Nok Nok sever. And now all servers can be password free.ADVICE TO ENTREPRENEURS FROM RAMESHMartin: Ramesh, imagine a child comes to you, a younger one like 15, 16 and wants to start a company but doesnt know whether he should do it or what he should care for. What is your advice you would share with him?Ramesh. At anytime any opportunity or any business gets nurtured of pain. If you should able to identify either business pain or human pain and you have a solution for that; theres the starting point. People, don’t go to CVS and Walgreens to buy vitamins, they go to buy painkillers. When there is a pain, people want to address it   immediately. If there is a vitamin  they don’t go there, that’s not priority.So when you want to start a company, first you need to know, you don’t necessarily need to know details, you don’t necessarily need to know how to fix it, but you should be able to know that there is a pain. Coming back to the pain point, it has to be able to fix the human pain or it has to be able to fix the  business pain. If it can fix either one of them like  for instance security. When security was a pain, people recognized it. You have, people seriously talking scamming, online scamming, money and password scamming, smart cards scamming, all kinds of things. That actually complicates the users experience but it solves the business pain.Martin:   and then you have trade off.Ramesh: That’s the trade off. What FIDO does is conventionally. Security means, more security means unusable; unusable in the sense of difficult to use. If you want to make sure that I’m strong, I keep on asking more and more question. What is your dog name in 1972? This is the kind of thing they will ask in a financial institution. They will ask your social security number and they will ask what is your childhood best friend’s name. These are all passwords, you keep up adding the staff.So what it means by that if I really want to assert that’s who you are then I ask more questions, put you through so much pain. What Nok Nok and FIDO do is we provide more security at the same time make it very very usable. For me on an iPhone, typing a password is much more difficult than just doing this and done. So what we do is actually, we increase security and also make it extremely usable that’s why I keep throwing in the word a single touch, or a single phrase or a single blink. We make it stronger, at the same time extremely usable.Martin: What is, what would you say to the young person if he says actually I cannot identify a problem worth solving?Ramesh: Then there is no company to be built. You got to know what you’re solving. If you are trying to do something without solving a problem, then there is no company there. Even if you want to start a nonprofit / charitable organization its still solves some problem which is helping people.Martin: Thank you so much, Ramesh, for your time.Ramesh: Sure, no problem.Martin: And next time when you really want to start a company, don’t just start a company, focus on a problem and really identify that is the big problem that is worth solving  and if you don’t find a problem just dont start a new company, work your way through and maybe over the time you will find a problem that is worth solving.Ramesh: That’s almost how all other things get started. Unless you go through the pain, you won’t know the problem. I would strongly recommend to people to actually work at some places if they don’t have any idea like probably a big company like Dell was started in Utah Austin by Michael  Dell where he saw people needed computer as diffi cult to go out and get them started online. So it doesn’t have to be that you have to work you don’t have to work. You just have to feel the pain. If you see the pain and that pain is not be unique to you, it should be a general pain, and you’re fixing general pain then you have a company to start with.Martin: Great! Thanks you so much and good luck with Nok Nok Labs.Ramesh: No problem. Thank you so much.

Sunday, May 24, 2020

ROMANS HEIRS TO GREEK AND HELLENISTIC CIVILIZATION

IN WHAT WAYS WERE THE ROMANS HEIRS TO GREEK AND HELLENISTIC CIVILIZATION? The Hellenistic civilization marked an important time in Greek culture. This was the period between 323 and 31 BC, at one point the Greek society changed from being withdrawn and localized to an aggressive multinational, unprotected, and eager culture that infused together southwest Asia and eastern Mediterranean. The Hellenistic world involved many different people but the Greeks’ thinking and way of life influenced most of the matters.1 Every aspect related to culture followed the beliefs of the Greeks and this led to the Greek language becoming established, as the official language of this area. The following arguments are centralized around†¦show more content†¦Moreover, the law did not allow women to hold office, but the men who held offices were allowed to seek counsel of their wives and this could only be done in private. Conversely, equality of men and women was more in the Roman society than it had been in the Greek culture. Professor Roy Mathews and Dewitt Platt centralized their arguments around political humanities of the western world, and around the period for the Hellenistic civilization. This is when the institutions and culture of other nations interacted with the Greek’s in order to create a multicultural and varied civilization. From their definition, this would seem to suggest that Rome should not be counted as Hellenistic civilization because of the controversial time lines. Nonetheless, Rome was situated in the ideal geographical location, which naturally created a varied and multicultural civilization due to its expansion and methods of conquering people. This explanation indicates that Rome was an heir to Hellenistic civilization even though it does not fit according to the definition given by Professor Mathews and Platt. Professor Noble, on the other hand, explains how the fall of the Roman Empire led to the rising of three great civilizations of, the Byzantine Empire, medieval Eur ope, and the Islamic caliphate.8 Professor NobleShow MoreRelatedEssay on the Role of Women in Ancient Greece14417 Words   |  58 Pagespolitically inï ¬â€šuential that ancient scholars blamed them for Sparta’s decline as a major power. And this was not simply another example of the enlightenment for which ancient Greece is famous: By most measures, Sparta was the least enlightened of the many Greek city–states.2 The most democratic city–state, and the source of the greatest art, philosophy, and so forth, was Athens, where women were not allowed to own property, received little education, and faced severe restrictions on their ability to move

Wednesday, May 13, 2020

Motives of Adolf Hitler in Audens Epitaph on a Tyrant...

Adolf Hitler was a very powerful man, and had a disturbing vision of how the world should be. W.H. Auden was interested in Adolf Hitler, and this interest can be seen in Auden’s poetry. September 1, 1939 and Epitaph on a Tyrant are two poems in which Auden scrutinizes Hitler’s actions. Auden uses symbolism in these two poems to illustrate the different aspects of Hitler’s life and actions. To begin with, Epitaph on a Tyrant personified Hitler’s obsession with â€Å"perfection of a kind.† The obsession with â€Å"perfection† that Hitler held and the dream of a world where blonde hair and blue eyes ruled upset Auden. To attempt genocide on all non-Aryan races was an atrocity and Epitaph on a Tyrant embodied Auden’s emotions of the ethnic cleansing†¦show more content†¦With the army he had raised, Hitler was able to invade Poland on September 1, 1939 and instigate the largest scale war to date. Speaking of September 1, 1939, the poem September 1, 1939 sheds a lot of light on Hitler’s regime. September 1, 1939 gives insightful knowledge stating, â€Å"From Luther until now / That has driven a culture mad.† This sums up the reason that could explain why Hitler was obsessed with the Aryan race. Lutheran is a religion that is prevalent in most of Germany. The founder, Martin Luther, was anti-Semitic. For this reason, many Germans were brought up to be anti-Semitic. Martin Luther’s principles no doubt had a large influence on the German people, especially the Nazis. September 1, 1939 gave reasons as to why the Nazis and Hitler held such hatred towards minority groups. September 1, 1939 also questions Hitler’s past and shows how parenting may have had a large effect on Hitler’s future actions. To understand Hitler’s past, one must â€Å"find what occurred at Linz.† Hitler grew up in the town of Linz, which is in Austria. His father frequently beat him when he was g rowing up and denied Adolf the right to follow Adolf’s dream and become an artist. During the war, Hitler turned Linz into an artillery practice field and blew it to smithereens.

Wednesday, May 6, 2020

Auto Biography Free Essays

was born and brought up in Houston, Texas. Ours is a family of four with my parents, me and my younger brother. The schooling years of my life were toughest. We will write a custom essay sample on Auto Biography or any similar topic only for you Order Now I struggled a lot in my studies. The standardized procedure of education never interested me. I was an average student throughout my academic life. Extra-curricular activities like sports, drawing, crafts, etc. were my favorite things. I just remember that it was the second semester of 8th grade when I stood first in class. However, it didn’t serve any purpose in motivating me to take up studies seriously. I enjoyed understanding the concepts more than just memorizing ready-made notes. After completion of my schooling and college in the science stream, I chose to become a painter. It was a weird decision taken by me at that time. Today, however, I don’t regret it at all. My career in painting began a smoothly and I was more than happy to grab the right opportunity for which I was waiting so long. Today, I am happy with my life and enjoy it to the fullest. The positive attitude to face hardships brought out the best in me. Today I am looking forward to face the challenges of life in a positive manner. The content presented in the example above gives only a rough idea of how an autobiography should start; one can use a similar write up as an example of autobiography for college projects. Writing an autobiography is a huge effort and requires patience to put the facts and experiences in a proper manner. Autobiographies are detailed accounts of a person’s life and should be written with care and responsibility. The autobiography sample provided in the article above provides an idea about how to write about yourself in an interesting manner. Autobiographies are detailed accounts of our lives which help in remembering the happy and sad moments as well. One can draw inspiration from the tough times of the past and move on in life with a positive attitude. Read more at Buzzle: http://www. buzzle. com/articles/autobiography-sample. html How to cite Auto Biography, Essay examples

Monday, May 4, 2020

Future of VoIP Technology Essay Example For Students

Future of VoIP Technology Essay Future of VoIP TechnologyVoIP is a relatively new technology and so the benefits are just beginning to be realized. VoIP technology has the ability to completely change the telephone industry as we know it. Big changes are in store for the way we use telephones and this section will address some of the changes to expect. Obstacles still stand in the way of progression and there are problems that need to be addressed before this technology can take over. Individuals have some great things to look forward to. Many already communicate over the internet for free (not including ISP cost) in a simple fashion by chat rooms, instant messaging, and email. Some are already using VoIP to replace their current telephone provider due to the lower costs available. Almost everyone in the United States has a cell phone that connects wirelessly to cellular networks located in nearly every city. Wireless internet is becoming rapidly mainstream now and this offers new opportunity for VoIP technology. N ew pocket PC phones are being developed to incorporate support for Wi-Fi as well as cellular networks. These phones will be able to switch from the users Wi-Fi connection to cellular networks and visa versa on the fly. Currently phone calls are directed to a location, but in the future phone calls will be directed to a person. Phone service will switch totally to VoIP once Wi-Fi networks are available to the extent of current cellular networks. Businesses are already currently reaping the benefits of VoIP because of savings in service charges. The technology offers far more than cost savings especially for the business world. Companies can get multiple locations serviced and communicate to each of the locations as if they were all located in the same building; with only an extension number. Digital music can be uploaded to a server and replayed for calls that are on hold. Eventually each employee will be able to use their PDA cell phone for both business and personal calls. The phone will connect to the Wi-Fi network in the building and all calls will be forwarded to the IP address of that phone. More than half of network managers from organizations with 500 or more employees plan to implement VoIP products or services during the next year. (VoIPWatch.com) Businesses have some great opportunities to gain from switching to VoIP and should start to look and determine whether it is right for them. One of the largest obstacles VoIP needs to overcome is the issue of security. Just taking a look into the email of any person can show why this is the case. Spam is rampant in email and VoIP phones would be subject to the same spam problems. Scripts could be written to call numbers and speak or play the ad on the users cell phone. This could wreak havoc without proper laws and measures implemented to prevent this. There is also the issue of hackers gaining access to calls over the Internet. VoIP devices such as IP phones, Call Manager, Gateways, and Proxy servers inherit the same vulnerabilities of the operating system or firmware they run on top of. (Intrusion Prevention) This means that VoIP communications can be compromised based on flaws in the operating system that running the application. There are many things to overcome before VoIP can become the standard, but the future looks very bright. Intrusion Prevention: The Future of VoIP Security. 2004. TippingPoint Technologies, Inc. Retrieved 7 August 2005 http://www.infosectoday.com/Articles/VoIP%20Security.pdfVoIP Company News. 2000. VoIPWatch. Retrieved 7 August 2005 http://www.voipwatch.com/article.php3?sid=128

Monday, March 30, 2020

Net Present Value and Fiat free essay sample

Team members: Inaki aizbitarte, Urko Ortega, Davide Rotta, Simone Zou, Pasquale Reitano INTRODUCTION The company that we have decided to consider for this analysis is the Italian factory Fiat spa. Fiat is a global group with a clear focus in the automobile sector. Through its various businesses, it designs, produces and sells automobiles and related components and production systems. Fiat was one of the founders of the European car industry and today, as a result of its partnership with Chrysler, has a manufacturing and commercial base of sufficient scale to compete as a global automaker. The Fiat group after the entered in the American market with the acquisition of the quota of majority of Crysler is found again of forehead, over that to a new market, also to a new coin with all those that can be the risks over how commercial also those financial. Nevertheless, right now, the exchange rate between these two currencies is 1 euro =1. We will write a custom essay sample on Net Present Value and Fiat or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 118 dollars so in order to make easier the case we will use 1. 31 to round it up. The politics of the Group related to the management of the risk of change foresee, as a rule, the coverage of the future commercial flows that you/they will have bookkeeping demonstration within 12 months and of the orders acquired (or committed in progress) to put aside from their expiration. It is reasonable to believe that the relative effect of coverage suspended in the Reserve of cash flow hedge will primarily be in relief to economic account in the following exercise. The Group is exposed to consequential risks by the variation of the rates of change, that you/they can influence on its economic result and on the value of the clean patrimony. Particularly: Whereas the societies of the Group sustain costs denominated in different currencies by those of denomination of the respective proceeds, the variation of the rates of change can influence the Result operational of such societies. In 2012, the general amount of the commercial flows directly statements to the risk of change you/he/she has been equivalent to 10% around of the billing. Gives the last budget of Fiat the total billing of 83 billion of euro therefore the figure that we will go to analyze is equal to 830 million of Euro. CASE STUDY The Group, which operates in numerous markets worldwide, is naturally exposed to market risks stemming from fluctuations in currency and interest rates. The exposure to currency risk is mainly linked to the difference in geographic location between the Group’s manufacturing activities and its commercial activities, resulting in cash flows from exports denominated in currencies that differ from those associated with production activities. The Group uses various forms of financing to cover funding requirements for its industrial activities and for financing customers and dealers. Moreover, liquidity for industrial activities was also principally invested in variable-rate or short-term financial instruments. The Financial Services companies normally operate a matching policy to offset the impact of differences in rates of interest on the financed portfolio and related liabilities. Nevertheless, changes in interest rates can result in increases or decreases in revenues, finance costs and margins. Consistent with its risk management policies, the Group seeks to manage risks associated with fluctuations in currency and interest rates through the use of financial hedging instruments. Despite such hedges being in place, sudden fluctuations in currency or interest rates could have a material adverse effect on the Group’s business prospects, earnings and/or financial position. Our analysis in relation what could be a real need for the company wich we may be faced as being an exporter of products in USA where there is a a different currency than the euro will have to face the uncertainties of the market. We will simulate three dfferent scenarios where there will be a fluctuation of the exchange tax, after that we will describe what did happen in 2000 when GM acquired 20% ownership of the Italian car manufacturer doing a mistake with the value of NPV. SCENARIOS Here we start to analyze a scenario where the exchange increase of 10%. We have the exchange rates 1,31 dollars/euros for 830 millions of dollars. Here we have an opposite scenarios where the exchange rates decrease of 10%. We have the exchange rates 1,31 dollars/euros for 830 millions of dollars In these two sceneries we have been able to observe as a small variation of the 10 percent can influence so much a firm that bewitches so many millions of dollars like Fiat. Here in this example we have a simulation of what could happen if Fiat want fix the tax of change for the next 6 months. FIAT use a foreign subsidiary in  US  that will be sending it 10 million dollars in six months. FIAT will need to swap the dollar for the dollars it will be receiving from the sub. In other words, they have a long dollars and short euros. It is short euros because it will need to purchase them in the near future. The company can wait six months and see what happens in the currency markets or enter into a currency forward contract. To accomplish this, it can short the forward contract, or dollar, and go long the euro. The company goes to a Bank and receives a quote of 1. 2483 in six months. This allows FIAT to buy euros and sell dollars. Now they will be able to turn its 10 million dollars into 10 million/1. 2483 =8,010,895 euros in six months. Six months from now if rates are at 1. ,FIAT will be ecstatic because it will have realized a higher exchange rate. If the rate has increased to 1. 2, they would still receive the 1. 2483 it originally contracts to receive from THE BANK, but in this case, they will not have received the benefit of a more favorable exchange rate. NET PRESENT VALUE We can define Net Present Value like the difference between the present value of the future cash flows from an investment and the amou nt of investment. Present value of the expected cash flows is computed by discounting them at the required rate of return. For example, an investment of $1,000 today at 10 percent will yield $1,100 at the end of the year; therefore, the present value of $1,100 at the desired rate of return (10 percent) is $1,000. The amount of investment ($1,000 in this example) is deducted from this figure to arrive at net present value which here is zero ($1,000-$1,000). A zero net present value means the project repays original investment plus the required rate of return. A positive net present value means a better return, and a negative net present value means a worse return, than the return from zero net present value. It is one of the two discounted cash flow techniques (the other is internal rate of return) used in comparative appraisal of investment proposals where the flow of income varies over time. Connected with Fiat we can do an example of like a uncorrect evaluation of NPV would be able to failed a company. In 2000 General Motors (GM) acquired 20% ownership of the Italian car manufacturer Fiat for a price of $2. 4 billion. As with most acquisitions, the initial outlook painted by the companies was rosy. They formed joint ventures in Europe and Latin America, and these ventures saved the companies a combined $2. billion over the first five years of the agreement. It would seem that, with savings like this, the partnership was working out pretty well, but Fiat began losing money. For example, the company lost about $1. 7 billion in 2002, and $1. 3 billion in 2004. The 2002 losses were particularly hard on Fiat, and the company almost went bankrupt. The Italian Government stepped in and helpe d Fiat, but GM stayed out. As a result, GMs stake in Fiat was cut to 10%. In early 2005 GM wrote off its remaining interest in Fiat, meaning that GM put a value of zero on its Fiat investment. Unfortunately for GM, under the terms of the original deal, Fiat had the option to force GM to buy the remaining 90% of the company. The deal would include Fiats $10 billion in debt. If GM valued its 10% stake in Fiat at nothing, how do you think GMs management felt about buying the other 90%? The answer came in February 2005. GM paid Fiat $2 billion just to avoid having to take over Fiat, thereby giving a whole new meaning to the phrase ‘fiat money’. More recently GM was given assistance by the US Government to save the company from failing.

Saturday, March 7, 2020

Life of Toussaint LOuverture essays

Life of Toussaint L'Ouverture essays The country we know today as Haiti ('mountainous land?) was at one time the French colony of Saint-Domingue. Located on the island of Hispaniola, it was the place where Christopher Columbus established his first settlement in the New World. In 1967, it was formally recognized as Saint-Domingue. Many things have happened in Saint-Domingue. Slavery, fires, and rebellion have gone on in Saint-Domingue. Many people took control and lost control of Saint-Domingue. Saint-Domingue had many slaves and plantations. One group of slaves where called the mulattoes orpeople of color.? Men and women were beaten, branded, maimed, and killed, often in ways that only the most depraved mind could imagine. Many slaves ran away to the mountains where they lived as maroons in isolated spots beyond the reach of a special colonial slave patrol, staffed only by mulattoes. By 1791, there were at least 500,000 slaves, most of who worked on plantations where sugarcane, cotton, coffee, and indigo were grown. There was a slave named Toussaint L?Ouverture, who had lived all his life at Breda plantation, about fifteen miles from the capital. He was forty-seven years old and in comparison to the other slaves on the island, he had enjoyeda good and comfortable life?. The owner treated the slaves with a degree of compassion and kindness that was known throughout the colony. Ouverture was born on May 2, 1743, which was then the Feast of All Saints. He was named Francois Dominique Toussaint. As a boy, Toussaint Breda, as he was called then, was sickly and thin as a stick. People around him gave him a nickname that meantfragile stick.? His father was brought as a slave from Africa. Ouverture also rode and looked after the horses. When they became ill, he used his knowledge of medicinal herbs and his skill as ahorse doctor? to heal their aches and pains. He also enjoyed the story of Spartacus, a slave who led a large rebellion of sla ...

Thursday, February 20, 2020

The reasons why the British, from Parliament to the Expeditionary Essay

The reasons why the British, from Parliament to the Expeditionary Forces, were defeated by a less trained and weaker American army in the American Revolutionary - Essay Example How could a group of colonies spread out over a vast region with no central government or treasury and an army that was inadequately trained and equipped possibly defeat the British who were the most powerful military force at that time? Britain had ruled over the thirteen colonies in America for more than 200 years prior to the Revolution. By the beginning of the Revolution, the wars against France fought on both sides of the Atlantic had burdened Britain with a massive national debt. To ease the national debt, Parliament imposed taxes on the colonists believing it only fair that they bear part of the expenses incurred by the British military in protecting them from Indian attacks and French invasions. The Stamp Act taxed paper goods sent to the colonies. It was the first of these laws while, with the tea tax, was one of the most infamous of these laws. The colonists thought taxation without representation in the British government to be unjust and openly protested these laws which led to hostilities between British troops and the Massachusetts Minutemen in 1775. This and other conflicts with the ‘Red Coats’ led to colonists forming the Continental Congress which immediately created the Continental Arm y and in 1776, signed the Declaration of Independence (The American Revolution, 2006). The Americans, outmatched by more than three-to-one, were predictably defeated in the majority of battles that occurred during the war’s first year. However, the Americans’ fortune began to change following the victories at Saratoga and Germantown in 1777. These important first triumphs gave increased credibility to what had previously been widely considered as an unorganized, minor uprising certain to be vanquished by the mighty British army. By 1778, France had become convinced that Britain stood the chance of being defeated. Wanting nothing more than this,

Tuesday, February 4, 2020

How are the causes of the french revolution portrayed through the Essay

How are the causes of the french revolution portrayed through the visual arts - Essay Example Popular violence defined the French Revolution whose slogan was Liberty, Equality and Fraternity. Violent turmoil, which included the trial and execution of the king, warfare involving every major European power, vast bloodshed and repression during the Reign of Terror marked these changes. Napoleonic Wars, two separate restorations of the monarchy, and two additional revolutions are the subsequent events that one can trace to the Revolution as modern France took shape. Many causes brought about the French Revolution one major cause being the disputes between the different types of social classes in French society. The social structure of France was divided among three groups that included the First Estate, the Second Estate and the Third Estate. Each of these social groups had different types of people who presented the different views of the people within their structure. The Church or the Clergy was the First Estate, which during the ancient regime was equal in terms of its economic, social and spiritual power. Being the first estate, the church owned approximately 10 per cent of all the land in France. It paid no taxes but collected a tax on income or a tithe to support church activities such as running schools and caring for the poor. Of the entire clergy in France, about one-third of them served as parish priests who usually lived a hardworking life. They lived in luxury in Versailles, Paris and other major cities in France. Having approximat ely 1 to 2 per cent of the population, this Estate was the minority of the people in France. However, there were many poor clergymen in this Estate, and they too were going to support the Revolution. The Second Estate in French life was the nobility who made up less than 2 percent of the population and enjoyed extensive rights and privileges. Like the First Estate, they hardly paid any taxes but they taxed the peasantry. Nobles were generally the

Monday, January 27, 2020

An Exploration Of The Poems Of Keats English Literature Essay

An Exploration Of The Poems Of Keats English Literature Essay John Keats was an English poet who was born and died in 31st October 1795 23rd February 1821. He died of tuberculosis at a very young age but produced some amazing poetry in his time. He was one of the main figures of the Romantic Movement and along with Lord Byron and Percy Bysshe Shelley he was one of the second generation Romantic poets. Keatss poetry was characterised by elaborate word choice and sensual imagery. His poems remain among the most popular poems in English literature. All three of these poems relate and they all contain imagery of beauty of the earth and nature. This may have been due to the fact that Keats was part of the Romantics along with William Blake, William Wordsworth, Samuel Taylor Coleridge, George Gordon or sometimes known as Lord Byron and Percy Bysshe Shelley. John Keats is very good at the effect of imagery as when you read his poems a visual picture is created in your mind. Also he uses onomatopoeia to create sound within the poem though this effect is mainly within To Autumn. An example of this is at the end of To Autumn on line 33 and gathering swallows twitter in the skies which not only is an onomatopoeia but also it shows the beauty of nature and the season of autumn. This poem is full of these features and this gives the poem life making you think and also maybe remember if you have experienced the same in your lifetime. As well as sensory imagery Keats has used many different techniques in all his writing for example alliteration, enjambment, metaphors, emotive language, repetition, personification and onomatopoeia. I found the poem above called To the Nile and the first thing that caught my eyes was pyramid and crocodile! I realised that in nature respects it was very similar to the other two poems I am studying but it was about a completely different topic which I thought might be a good change. To Autumn and La Belle Dame sans Merci are both about autumn, weather, England etc so Egypt with the strong sun was as far from it. The Nile is personified. It is praised as a beautiful river having a great effect on nature due to the river helping the surrounding land with water to help everything grow and flourish. To Autumn is a beautiful poem describing all the joys of nature and describing a day with the maturing sun and how the air is drowsd with the fume of poppies. When I was reading it I thought that it may relate to his death as he is relating it to his life and he says that he is in autumn and winter is the end/death and he knows he is near his death bed. This is due to tuberculosis which most of his family had suffered from. To Autumn contains many onomatopoeias for example flowers for the bees giving the zzz sound in the word bees which creates the effect that the bees are in the same room. Also oozing creating an overflowing thought as you read it. Keats creates many sounds and gives a visual picture of what he is talking about by including many techniques such as onomatopoeia, personification, For example To autumn which is saying it is written two somebody called autumn or possibly the sun which conspires together and this is how plants get their energy. Also there are examples of alliteration for example clammy cells or hours by hours. The way he uses all of these techniques and the colourful picture he portrays shows why his poems remain among the most popular poems in English literature. I think that in this poem Keats is saying that he regrets that he did not make the most of the days of summer and all that is on offer full-grown lambs loud bleat from hilly bourn. This is also onomatopoeia because is it expressing sounds. La Belle Dame Sans Merci translates as the beautiful woman with no mercy. This is shown in the poem in lines 35 to 48. The emotive language used by Keats shows the suffering. Words like ail, lily, haggard and woebegone. He has used the poem as a metaphor for his life and here he has used flowers to link his love for nature with his health for example Lily on thy brow on line 9. A lily is the flower which presents death but is also links to nature which is continued throughout the poem. Another example of using flowers for the link is a fading rose on line 11. This means the rose which is normally a very bright colour very often red is dying because as flowers die they lose their colour and the whole flower weakens and the flower head falls down to face the ground rather than stay up straight due to the loss of water and nutrients which normally keeps a flower alive. He says the rose is fading so this translates to the fact that he is also dying and losing health day by day. This poem is a very sad poem which is the complete opposite of To Autumn because it is talking about how he loses the love of his life which could be referring to his life and that the woman that he is slowly losing is relating to his life and how his life due to his condition of tuberculosis is fading away and slipping from his hands. Another interpretation of this poem is that he is relating the poem to Fanny Brawne who during his life time was the love of his life. They met when Keats moved house and ended up being fannys next door neighbour after the death of Tom Keats (his brother). Keats had a complete undying love for this woman however this did not bring fulfilled happiness for him. If it is about a woman but not fanny then it may be about a fantasy woman that he is seduced by she took me to her elfin grot there she wept and sighd full sore but then as death approached this dream is pulled away from him by his illness and death. The love is showed in this poem by the things that he does for her I made her a garland for her head and she found me roots of relish sweet. These two quotes are showing how much he loved her and how they were exchanging gifts to one another to portray their love for each other. In both To Autumn and La Belle Dame Sans Merci Keats talks about sweetness. In La Belle Dame Sans Merci roots of relish sweet and her elfin grot which are two great examples of the sweetness portrayed. In To Autumn however you can hear the full-grown lambs loud bleat from the hilly bourn and all its twinà ¨d flowers. These are very helpful to make the poem flow and so create a soft lullaby feeling which makes you want to read on. To the Nile is a sonnet because it has 14 lines. Sonnets are very short and are a compressed version of a poem. They contain many ideas in a small space and this means it is quite a powerful way of portraying an idea. To autumn there is a consistent rhyme scheme of A, B, A, B, C, D, C, D etc however La Belle Dan Sans Merci does not have any rhyme scheme. To conclude I think that Keats was a very powerful poet. He expressed his feelings in his writing and although he did not live long due to tuberculosis he produced some outstanding work. He moved to Italy in 1820 with a friend called Joseph Severn due to his condition and the doctor had advised to his that he needed to get away from London air. This change of country prolonged his life alone and palely loitering. Through studying the three poems that I have used in this essay I have realised the strength in each of the poems and the feelings Keats was trying to portray. I found that all three poems linked in many ways and I now have a much clearer understanding of each of these poems.

Sunday, January 19, 2020

Automobile Industry Pest Analysis Essay

1. Political Factors A) Environment Concerns: Leading to the quest for eco-friendly cars, people would prone to buy hybrid or even pure electric cars in the future. B) Government Regulations: Limitation on high emission car purchase, and the restrictive passage of autos in downtown area, as well as the limitation on license plate (number plate) in huge cosmopolitans. C) Some pioneering states in the US have started to set the rules to govern robotized motoring (autonomous driving). 2. Economic Factors. A) Economic growth has shifted from traditional strong western countries (US, West Europe, specifically) to other parts of the world, especially, East and Southeast Asia, Africa, and South America. B) Auto Markets in developed countries are saturated: High rate of auto owning, stable population and household quantity. The auto market there is typically of substitution of old car with new ones. C) Public Transportation Infrastructure including high speed rail network, intercity light-rail network, etc, will be perfected in developing countries. D) Fuel cost is on the wing, driving demand for mini-car, A-Class, Compact car. 3. Social Factors. A) In developing countries, owning a car is not only means of transportation but also a need of social status. B) People’s awareness of environment protection is growing. 4. Technological Factors. A) Technology for Electric Engine is maturing, and battery capacity is increasing. Some countries have started to establish infrastructure for electric charging stations. B) The aim to eliminate casualty caused by transportation accident will be met by the adoption and perfection of automatic pilot (unmanned driving). Google has started the trial operation of a fleet of autonomous driving cars. California and Nevada have set rules to govern robotized monitoring. Trend & Segment of Profitable Market for Automobile: 1. Smaller cars such as Mini-cars, A-Class passenger cars, and compact cars will have larger shares of market. 2. Eco-friendly cars and high-tech cars with auto-pilot function will lead the market. 3. Markets with high growth potential will be in developing countries or the so-called emerging economies. Supporting Data: GDP Growth Rate Index: (Source: World Bank) Country Name| 2008| 2009| 2010| 2011| Macao SAR, China| 3.3 | 1.7 | 27.0 | 20.7 | Qatar| 17.7 | 12.0 | 16.6 | 18.8 | Mongolia| 8.9 | -1.3 | 6.4 | 17.5 | Turkmenistan| 14.7 | 6.1 | 9.2 | 14.7 | Ghana| 8.4 | 4.0 | 8.0 | 14.4 | Panama| 10.1 | 3.9 | 7.6 | 10.6 | Timor-Leste| 14.6 | 12.8 | 9.5 | 10.6 | Iraq| 9.5 | 4.2 | 0.8 | 9.9 | Liberia| 10.5 | 13.8 | 10.9 | 9.4 | Zimbabwe| -17.7 | 6.0 | 9.6 | 9.4 | China| 9.6 | 9.2 | 10.4 | 9.3 | Solomon Islands| 7.3 | -1.2 | 7.0 | 9.0 | Papua New Guinea| 6.7 | 5.5 | 8.0 | 9.0 | Argentina| 6.8 | 0.9 | 9.2 | 8.9 | Eritrea| -9.8 | 3.9 | 2.2 | 8.7 | Turkey| 0.7 | -4.8 | 9.2 | 8.5 | East Asia & Pacific (developing only)| 8.5 | 7.5 | 9.7 | 8.3 | Uzbekistan| 9.0 | 8.1 | 8.5 | 8.3 | Estonia| -4.2 | -14.1 | 3.3 | 8.3 | Rwanda| 11.2 | 6.2 | 7.2 | 8.3 | Sri Lanka| 6.0 | 3.5 | 8.0 | 8.3 | Kuwait| 5.0 | -5.2 | 3.4 | 8.2 | Lao PDR| 7.8 | 7.5 | 8.5 | 8.0 | Equatorial Guinea| 10.7 | 4.6 | -0.5 | 7.8 | Ecuador| 7.2 | 0.4 | 3.6 | 7.8 | Kazakhstan| 3.3 | 1.2 | 7.3 | 7.5 | Maldives| 12.2 | -4.7 | 5.7 | 7.5 | Tajikistan| 21.2 | 3.9 | 6.5 | 7.4 | Nigeria| 6.0 | 7.0 | 8.0 | 7.4 | Ethiopia| 10.8 | 8.8 | 9.9 | 7.3 | Mozambique| 6.8 | 6.3 | 6.8 | 7.1 | Cambodia| 6.7 | 0.1 | 6.0 | 7.1 | Georgia| 2.3 | -3.8 | 6.3 | 7.0 | Congo, Dem. Rep.| 6.2 | 2.8 | 7.2 | 6.9 | India| 3.9 | 8.2 | 9.6 | 6.9 | Paraguay| 4.2 | -3.5 | 14.2 | 6.9 | Peru| 9.8 | 0.8 | 8.8 | 6.8 | Saudi Arabia| 4.2 | 0.1 | 4.6 | 6.8 | Bangladesh| 6.2 | 5.7 | 6.1 | 6.7 | Uganda| 8.7 | 7.2 | 5.9 | 6.7 | Upper middle income| 6.1 | 2.0 | 7.8 | 6.6 | South Asia| 3.9 | 7.4 | 8.6 | 6.5 | Zambia| 5.7 | 6.4 | 7.6 | 6.5 | Indonesia| 6.0 | 4.6 | 6.2 | 6.5 | Tanzania| 7.4 | 6.0 | 7.0 | 6.4 | Moldova| 7.8 | -6.0 | 7.1 | 6.4 | Middle income| 5.7 | 2.7 | 7.7 | 6.4 | Low & middle income| 5.7 | 2.7 | 7.7 | 6.4 | Sierra Leone| 5.5 | 3.2 | 4.9 | 6.0 | Chile| 3.7 | -1.0 | 6.1 | 6.0 | Low income| 5.7 | 4.7 | 6.1 | 6.0 | Colombia| 3.5 | 1.7 | 4.0 | 5.9 | Vietnam| 6.3 | 5.3 | 6.8 | 5.9 | Lithuania| 2.9 | -14.7 | 1.3 | 5.9 | Palau| -6.1 | -4.6 | 0.3 | 5.8 | Lesotho| 5.4 | 2.9 | 5.6 | 5.8 | Europe & Central Asia (developing only)| 3.9 | -6.0 | 5.8 | 5.8 | Afghanistan| 3.6 | 21.0 | 8.4 | 5.7 | Botswana| 2.9 | -4.8 | 7.0 | 5.7 | Uruguay| 7.2 | 2.4 | 8.9 | 5.7 | Lower middle income| 4.6 | 5.2 | 7.3 | 5.7 | Kyrgyz Republic| 8.4 | 2.9 | -0.5 | 5.7 | Haiti| 0.8 | 2.9 | -5.4 | 5.6 | Bhutan| 4.7 | 6.7 | 11.8 | 5.6 | High income: nonOECD| 2.7 | -1.3 | 7.3 | 5.6 | Oman| 12.8 | 1.1 | 4.0 | 5.5 | Latvia| -4.2 | -18.0 | -0.3 | 5.5 | Among the countries with a REAL GDP growth rate on or above 5.5%, most of the countries are in South America, Africa, and Eastern Europe. GDP Growth Rate Map: (Source: World Bank). The darker the color, the higher the GDP growth rate of the country. We can see that major economic growth are all out of the traditional western countries. Recently, countries buying most cars are: (Source: http://visual.ly/2012-global-car-sales-statistics).

Saturday, January 11, 2020

Indra Nooyi: Keeping Cool in Hot Water

Indra Nooyi joined PepsiCo in 1994 and was named president and CFO in 2000. Nooyi has directed the company's global strategy for more than a decade and led PepsiCo's restructuring, including the 1997 divestiture of its restaurants into Tricon, now known as Yums! Brand. Because of her desire to win, Nooyi fought hard for PepsiCo’s successful $3. 3 billion acquisition of Tropicana in 1998, eyeing the transaction as a vehicle to increase PepsiCo’s earnings and enhance its image as a premium brand for convient foods and drinks.The crowning glory in her career was serving as lead negotiator of PepsiCo's $13. 8 billion acquisition of the Quaker Oats Company in 2001, which led to her being named one of the top five officers at her company, which also brought Gatorade to PepsiCo. As the highest-ranked Indian American woman in corporate America, Nooyi led some of PepsiCo's most significant strategic moves. In 2007 she became the fifth CEO in PepsiCo's 44-year history.According t o Business Week, since she started as CFO in 2000, the company's annual revenues have risen 72%, while net profit more than doubled, to $5. 6 billion in 2006. Nooyi was named on Wall Street Journal’s list of 50 women to watch in 2007 and 2008, and was listed among Time’s 100 Most Influential People in The World in 2007 and 2008. Forbes named her the #3 most powerful woman in 2008. Fortune ranked her the #1 most powerful woman in business in 2009 and 2010. On the 7th of October 2010 Forbes magazine ranked her the 6th most powerful woman in the world.The information in this articles is just a more in depth description than our text book had given of the impact that Indra Nooyi has had on the PepsiCo. I found all of these article worth while. I enjoyed learning about Indra Nooyi and the great strides she has made for herself and for the PepsiCo. I think it is great to hear of the changes and advancements that Pepsi is undergoing with Indra Nooyi in the lead. She has prove n herself to be a wonderful role model and example for others to follow. I'm interested to see how Pepsi continues to grow with her as CEO.

Friday, January 3, 2020

One Percenters Motorcycle Gang

The term One-Percenters originated from the July 4, 1947, annual Gypsy Tour race sanctioned by the American Motorcyclist Association (AMA) which was held in Hollister, California. The  Gypsy Tour race,  which was the  pià ¨ce de rà ©sistance of motorcycle racing events during that time, was held at different locations across America and had been previously held in Hollister in 1936. The Event A location near the town was chosen again in 1947 partly because of  its  long relationship with bikers and various biker-related events that were held throughout the years, and also because of the welcome the   AMA  received by the town merchants who knew the positive impact it would have on the local economy. Approximately 4,000 attended the  Gypsy Tour  race and many of the riders and non-riders ended up celebrating in the town of Hollister. For three days there was a lot of hard-core beer drinking and street racing that went on in the town. By  Sunday,  the California Highway Patrol was called in armed with tear gas to help put an end to the event. The Aftermath After it was over, there was a record of about 55 bikers being arrested on misdemeanor charges. There were no reports of property being destroyed or of looting and not a single report of any local people being harmed in any way. However, the San Francisco Chronicle ran articles that exaggerated and sensationalized the event. Headlines like  Riots... Cyclists Take Over Town and words such as â€Å"terrorism† described the general atmosphere in Hollister over the holiday weekend. To top it off, a  San Francisco Chronicle  photographer by the name of Barney Peterson  staged  a photograph of an intoxicated biker holding a bottle of beer in each hand while leaning against a  Harley-Davidson motorcycle,  with broken beer bottles scattered on the ground. Life magazine picked up on the story and in the  July 21,  1947,  edition it ran  Petersons staged photograph   on full-page display titled, â€Å"Cyclist’s Holiday: He and Friends Terrorize Town.†Ã‚  Ultimately, to the dismay of the AMA, the image sparked both fascination and concern about the violent, unruly nature of the growing subculture of motorcycle groups. Afterward, films about motorcycle clubs with members depicting bad behavior began hitting the movie theaters.  The Wild One, starring  Marlon Brando, brought particular attention to gang-type behavior displayed by members of motorcycle clubs. The event became known as the Hollister Riot although there is no documentation that an actual riot occurred and the town of Hollister invited the race back, other cities across the country believed what the press reported and it resulted in numerous cancelations of the  Gypsy Tour races. AMA Responds It was rumored that the AMA defended the reputation of its association and member, with an alleged press release stating that, The trouble was caused by the one percent deviant that tarnishes the public image of both motorcycles and motorcyclists and going on to say  that 99 percent of bikers are law-abiding citizens, and the one percent are nothing more than outlaws.   However,  in 2005 the AMA denied credit for the term, saying that there was no record of any AMA official or published statement that originally used the one percent reference. No matter where it actually originated from, the  term caught on  and  new outlaw motorcycle gangs   (OMGs) emerged and embraced the concept of being referred to as  one-percenters. The Impact of War A number of veterans returning from the Vietnam War joined motorcycle clubs after being ostracized by many Americans, especially within their same age group. They were discriminated against by colleges, employers, often spat upon when in uniform and some considered them nothing but government-grown killing machines. The fact that 25 percent were drafted into the war and that the rest were trying to survive it did not seem to sway opinions. As a result, in the  mid-1960-70s, a  surge of outlaw motorcycle gangs emerged across the country and created their own association which they proudly called, One Percenters.  Within  the association, each club could have its own rules, operate independently and given a designated territory.   The outlaw motorcycle clubs; the  Hells Angels, Pagans, Outlaws, and Bandidos emerged as what authorities  refer to the Big Four with hundreds of other one-percenters clubs existing within the subculture. Differences Between Outlaws and One Percenters Defining the differences (and if any exists) between outlaw motorcycle groups and one-percenters depends on where you go for the answer. According to the AMA,  any motorcycle club that does not adhere to AMA rules is considered an outlaw motorcycle club. The term outlaw, in this case, is not  synonymous with criminal or illegal activity. Others, including some outlaw motorcycle clubs, believe that while all one-percent motorcycle clubs are  outlaw  clubs, meaning that they do not follow AMA rules, not all outlaw motorcycle clubs are one-percenters, (meaning that they do not participate in illegal activity. The Department of Justice does not differentiate between outlaw motorcycle gangs (or clubs) and one-percenters. It defines one-percenter  outlaw motorcycle gangs as being highly structured criminal organizations, whose members use their  motorcycle clubs as conduits for criminal enterprises.