Wednesday, October 9, 2019

Bill Gates had been friends since high school Essay Example for Free

Bill Gates had been friends since high school Essay Mike Basset and Bill Gates had been friends since high school. They’d competed for 1st place all the time. They’d spent hour’s together writing computer programs even before people heard in programming. They grew up together and even went to university and were joint top students. They both went in the programming business and soon each opened their own computer company Bill named his ‘Microsoft’ and Mike called it ‘Compufriek’. Bill was very successful and was very famous his products all across the globe he was well know for Windows and Microsoft office. On the other hand Mike was very good but only known in the United States but still lacking behind Bill. They both got married and had children. Mike’s wife Jenny was very jealous of Marry Mrs. Gates shoe always used to talk about how successful her husband is and the contacts he makes with Difrent Company’s across the world. Mike is also fed up his only ambition from when he was a boy was to run the best computer company and here his best friend his standing in his way. One day Mr. & Mrs. Gates invited the Bassets for a barbecue in their new mansion. It was exactly noon when the Bassets arrived at the Gates. â€Å"Hello Mike† said Bill, â€Å"how’s things going? † he asked. â€Å"Alright† replied Mike. They sat down at a table, Bill has dismissed all the servants so they could spend some time together and do everything like the old days. â€Å"I have just signed a deal with the Japanese,† â€Å"Worth a lot† saying Bill as proud as it gets. â€Å"Good I wish the best for you† replied Mike but in a not meaning it sort of way. â€Å"I am fed up of this he’s always boasting about himself, oh I wish I was as rich and famous like Bill† he was saying to himself. The day went on and they had dinner. The next day Mike’s wife started to nag she kept saying how come you’re not as rich as bill and you’re better than him, he couldn’t take it. That day he wanted to eat Chinese he went to his favorite Chinese restaurant ‘Chin Dragon’. They ate dinner and after a waitress came up to them, â€Å"do you want to try our new fortune cookies† â€Å"some people have been very lucky and even there dreams came true† she said. â€Å"Well ok get us two,† replied Mike â€Å"Right away† said the waitress. She went and came back after five minutes carrying a plate with 2 cookies. â€Å"There you go,† said the waitress Mike took his and snapped it in half and took the paper out. â€Å"What does it say? † Asked Mikes wife. â€Å"Fame and fortune will come very soon,† replied Mike. His wife then takes hers and snaps it in half and took her paper. â€Å"Mines say’s your loved ones will be rich and famous! † She told Mike. â€Å"Can it be that my dream will finally come true? † He said to himself. â€Å"What does this mean? † Asked Jenny. â€Å"I don’t know† Mike replied. â€Å"But lets go home I’m tired and I need a rest† he said. When they got home Mike couldn’t stop thinking about the fortune cookies. He kept wondering was this just a coincidence that he got this in a fortune cookie, even Jenny his wife got the same thing. Can this be true can his life ambition come true? No he thought it has to be a coincidence. That night he couldn’t sleep. He kept thinking if this was true what was going to bring him this fame and fortune? All he’s working on at this moment is a simple hacking program for him self because of free time. His wife wakes up. She asks him why isn’t he asleep. He tells her what he’s thinking about and she says, â€Å"I don’t think your going to get fame and fortune just like that†Ã'Ž â€Å"What do you mean? † he replied â€Å"Well, that hacking program you’re working on for fun† she says. â€Å"Yes what about it? † he replies anxiously. â€Å"Is it power full? She asks. â€Å"Yeah its pretty good† he replies but doesn’t have a clue what’s all this got to do with his fortune. â€Å"Why don’t you access Bills files and find out what he’s planning? † she says quietly. â€Å"You want me to betray my best friend. No forget about it† he replied angrily and went to bed. The next day he gets up and goes on his computer to do a bit of work. He kept working on his hacking program until it was finished. â€Å"Honey† he called. â€Å"I’ve finished my program. † Jenny walks in and congratulates him â€Å"Well no you need to test it! † she said. â€Å"Test it? † he replied. â€Å"Who on? † â€Å"I can’t try it on anyone its illegal† â€Å"Well test it on Bills I am sure he wont mind, you are his best friend† she tells him â€Å"Just see if it works properly and the switch it off† â€Å"Well ok† he replies and starts to test it he started to input and few numbers and letters and the put search. Bills name came up on the screen. He accessed his computer. â€Å"Look what’s that? † asked Jenny â€Å"Oh it will be some of his files† â€Å"I’ll close it now I know it works† he saidÃ'Ž â€Å"No† Jenny said, â€Å"just have a quick look, it won’t hurt† He sat there looking at Bill Gates files. His ambition took control of him. He spotted a file named ‘big plan’. He began looking through it. It was a massive program what was going to change the world. He froze. All his life he wanted fame and now he could get it but at his best friends cost. Jenny kept telling him to copy the file then alter it for him so he goes wrong. She called him a coward. He didn’t know what to do. His wife kept nagging him. He finally surrendered to his ambition and downloaded the file to his computer and started to alter Bills file completely. Jenny kept saying how wonderful he was and encouraged him to carry on. He was finished. He worked day and night on this program until one day he had finished it. Bill rang him up that day and said that his whole life just went wrong. The program contract with the Japs he made has fallen because his program didn’t work. Now he has to pay Billions of pounds in compensation and at the moment cant pay that amount so he had to sell half his company. At that moment guilt started to grow in Mikes heart. His best friends life has collapsed but his road is open. He felt very sorry for him and said he was busy. In the following week Mike made a contract with the British. He sold them Bill’s program for a 30 billion contract he got 50% of the shares. His name was known all across the globe and his program sold very fast. But now he was feeling very guilty he’s now the famous rich and famous one while his friend was under debt. In those weeks Bill didn’t even find out about Mike he was to busy sorting out his problem. He went and says the program a computer competition. He was absolutely stunned when it had looked just like the one he made. He gets a bit suspicious and goes to Mike’s home straight away. When he got there he didn’t even say hello to Mike the first thing he said was â€Å"that program of yours when did you start making it? † Mike hesitated a bit knowing Bills suspicion he replies â€Å"oh I’ve been on this special project for a long time, Its been a secret† Bill talked to him about it and went back home. Mike was feeling awful he probably just lost his best friend. His guilt grew more and more over the days past. He didn’t hear from Bill for a while now and was really scared. What he didn’t know was at this time Bill was trying to see if anyone had hacked is computer. He knew that it couldn’t be just anyone because his computer was protected with extra security. Bill spent hours trying to track down the thief. One day when Bill was on his computer he was going through a list of who opened the computer and when he say a weird number. He tried to find out what it meant but couldn’t. Meanwhile Mike was not leading a happy life. He was rich and famous. Didn’t even see his wife, she was always out and about. He couldn’t go out and show his face to the public they would just give him credit for the new program and that would make things worse. One week later something very unexpected happened when Mike was at home. The F. B. I came knocking at his door. â€Å"Can I help you? † he asked â€Å"Would you please come with us? † they replied. â€Å"What seems to be the matter? † Mike asked knowing he was caught. â€Å"You are under arrest for hacking into someone’s computer and steeling ideas and programs. † They replied in a disappointed tone of voice. At that moment he knew his life was over his ambition just destroyed his life. He went quietly with them. As stepping out of their car and going towards the police station he says Bill. â€Å"I’m sorry,† he said to him. â€Å"From all the people I didn’t want to think it was you† he replied in a disappointed way. Mike walked off with the agents and into the station. He was sentenced to 15 years in prison. All of the money from the program went to Bill Gates and he got all the credit. He managed to by back all his company and start dominating the computer world once again. Mike was finished he would never write another computer program again. Bill’s life returned to normal except for one thing he had no best friend beside him. Bill Gates had been friends since high school. (2017, Aug 21). We have essays on the following topics that may be of interest to you

Tuesday, October 8, 2019

Love brief a case Essay Example | Topics and Well Written Essays - 500 words - 2

Love brief a case - Essay Example The duo purchased recording equipment and recorded conversations with officials with a view to proving harassment and spoke of filing a law suit. It was the constant encounters with the authorities that ultimately gave way to a plan to kill certain officials. After Green informed the detective of his suspicions, he agreed to wear recording equipment in conversations with the appellant. Thereafter, Green turned over a recorded conversation he had with the appellant in which the plans were discussed. The threat was deemed serious and the FBI were brought in. Thereafter the appellant and his girlfriend were under surveillance. Identified victims were informed and some relocated out of fear. Subsequent conversations between Green and the appellant were recorded and the appellant and his girlfriend began purchasing equipment and making plans in furtherance of the plan. As the appellant and his girlfriend at a store purchasing the last of the equipment they were arrested. The appellant gav e his consent to a search of his home and shop in which equipment for making a bomb was discovered. Other equipment was discovered at the appellant’s shop. Although the appellant’s Miranda rights were read to him, he waived the right to remain silent and offered various explanations for the equipment found in his possession. Legal Issues: The appellant raised several issues on appeal. The evidential grounds related to a complaint that the was not enough evidence to convict him on the RICO charge. The appellant also argued that prior bad acts were improperly admitted into evidence and that allowing victim impact evidence deprived him of his right to a fair trial. Legal Reasoning: The Supreme Court of Ohio reasoned that victim impact evidence was properly admitted by the trial judge because it demonstrated the seriousness of the offences. The court also reasoned that the appellant’s claim of insufficient evidence on the RICO count was without

Monday, October 7, 2019

Ethical Issues in Business IP Week 5 Essay Example | Topics and Well Written Essays - 1000 words

Ethical Issues in Business IP Week 5 - Essay Example Another vital aspect of ethics in business is ensuring safety in the workplace. Based on the fact that employees are major resources in any company, employers should take initiatives to safeguard them from high temperatures, poor ventilation, fire and poor lighting. In this way, illnesses that may increase the rate of absenteeism will be significantly reduced. Introduction As businesses engage each other in a stiff competition, some employers have taken initiatives to enhance the payments of their employees and senior managers as a way of retaining them and improving their productivity. However, some managers have little or no concern of the welfare of their employees thus rising the question of how much are investors willing to emulate ethics in the work places. One of the major ethical concerns is the amount of compensation and benefits provided to their employees and their immediate family members. In the same way, safety in the work places is a key issue that employers should not overlook. In this regard, I have chosen the topic of ethics in compensation of the employees and safety in the work places as a way of ensuring that employees are fairly treated in the work places. Similarly, my target audience is the employers and the investors who are focused at increasing their profits at the expense of their employees. ... Wages and benefits To ensure that employees remain loyal towards their companies, employers have major role to play of ensuring that salaries and benefits paid to their workers are sustainable and motivating. One of major issue that creates poor relationship between the employees and the employers is the high compensation paid to the executives while other employees are not taken into consideration. Majority of employers have various options about the amount of compensation and wages that is paid to their employees. For example, some companies believe that the mandated minimum salaries by the federal government are sufficient to maintain their employees (Robbins & Judge, 2007). In the same way, some employers believe they are at liberty to pay anything to the workers and as such employees should take any job regardless of the wages they receive. Investors should ensure ethics are upheld in their companies by providing flexible benefits. Some of the major benefits that a firm should g ive their employees include health insurance, paid vacations, training, paid sick leaves as well as retirement benefits among others. Additionally, employers should ensure flexible working hours to ensure that their employees address private matters that may affects the concentration of the workers thus reducing their productivity (Resnik, 2009). To develop professional abilities of their employees and make them focused on achieving their goals as well as those of the entire company, managers should apply advancement programs. Such programs should be undertaken during annual leaves or in the evenings after work. To ensure adequate compensation and flexible

Sunday, October 6, 2019

Intervention in Personal Finance for Medical Residents Essay

Intervention in Personal Finance for Medical Residents - Essay Example The seminar on financial planning gave an overview on personal finance (income and spending), debt management, taxes, insurance, and retirement savings. A key information given during the seminar was on retirement plans available during residency, that residents have a choice either on going with the retirement account provided by the university (automatic enrollment) or county hospital (not automatic) or opt to invest in mutual funds, university-managed or from a mutual fund service company. For the study, 52 or 84% out of 62 internal medicine interns of the University of California-San Francisco attended the 90-minute seminar. Immediately before the seminar, they were given a test assessing their financial literacy as well as a pre-intervention survey. After the seminar, the interns filled up the post-intervention survey, asking their opinion on whether such seminar was valuable or not. In May 2004, two to ten months later, the residents were asked to complete the change allocation survey. Only 25 residents out of the 46 who responded attended the seminar. Findings and implications: On financial literacy, the average score was 40% of a 20-question

Saturday, October 5, 2019

Human Resources Questions Coursework Example | Topics and Well Written Essays - 2000 words

Human Resources Questions - Coursework Example These barriers often prevented the access of women or needful people in the rightful-places such as in educational institutions or for employment. Affirmative action was the result of the slavery and the injustice done by the white race towards the Anglo-Americans. The citizens of America got opportunities of employment and education on the basis of their color code. The term affirmative action comes from the age old concept of equity or justice. The discrimination done between the black and the white and injustice of the ruling class of America in the twentieth century was the cause for affirmative order. After Barrack Obama became the president of America, it was felt that the affirmative action was no longer required. This is because it became clear from the fact that the citizens, the country and its governing body has understood the importance of providing equal opportunity to people round the world in their country for employment and for getting into educational institutions or other rightful places. This is the actual meaning of globalization (Rubio, 2001, p. 1-2). Generally it is seen that that the performance appraisal depends on the feedback of the employees or the superiors of the company, but the advent of teamwork, training and development of the employees and customer services have shifted the focus of collecting feedback just from employees and superiors to the customers, peer groups and even subordinates as shown in figure 1. This is also called multiple feedback approach for conducting performance appraisal and it is also called 360 degree evaluation. Several past research have shown that 360 degree method of evaluation is accurate, reliable and authentic source of information. In this method the supervisors, subordinates, peers, customers are included to assess the performance of an employee. Considering the organizational culture and the mission of the company,

Friday, October 4, 2019

An analysis of Vitamins a short story by Raymond Carver Essay

An analysis of Vitamins a short story by Raymond Carver - Essay Example Patti attests to it herself on claiming that in early years of her youth, it is something she would not figure herself doing or one that occurs to be a last resort. While it generally sounds to be freaking a hell out of the female characters in Patti, Sheila, and Donna, the storyteller being the only guy among them exhibits the opposite or passive role in relation to the three. His function appears to serve a neutralizing effect in the middle where similarities reflect across the intertwined lives of the three women who have spanned control of themselves beyond his weak influence at providing comfort. As an irony in the theme, the vitamins sold by Patti, Sheila, Donna, and the hospital where he works are altogether symbolic of a prevention or cure to sickness however, as these characters remain attached to their conventional situation, the routine with vitamins and hospital augments the conflict and no resolution is found in the absence of external intervention or consideration of po ssible alternatives that would shift the level of personal undertaking for each. (2) Do the main characters' personalities, behavior and goals change during the story? If so, how? Significant change is not evident in the outlook and the way by which the narrator manages getting confronted by the challenges set by Patti. He briefly states in the beginning that Patti was first unemployed and by deciding to reverse this fate and give herself respect on working to sell vitamins makes positive hint or direction at progress from the initial condition as Patti even reaches the point of having people put under her supervision. This status, nevertheless, becomes unfulfilled since the state of economy and consumerism turns out not in favor of supplement acquisition, implying that in reality there exists a number of concerns far more worthy of savings and investment than vitamins are. In the manner R. Carver channels the thoughts and observations of the narrating main character, a reader can f eel a degree of needing to promote an element of transformation in his life as well as how this might impact that of Patti’s. As the story proceeds to gather the cast in a Christmas party to somewhat alleviate and enliven the dull, sickening mood with the bad economic trend of vitamin business, Sheila triggers rivalry with the male narrator yet escapes to make way for Donna in weaving new circumstances for Patti’s lover. A sense of seduction through Donna’s character takes the storyteller to an attempt at infidelity, leaving his fed-up partner to yield to a momentary space and grasp beyond the world with Patti in a newer dimension at Off-Broadway with Donna. Somehow, he develops another perspective in an appreciation of Khaki who seems to love his work as a bouncer, as opposed to Patti. Clearly, this event suggests that he is up for a change or for something to challenge his way out of the lifeless endeavor and depressed mode of living. At the instant Nelson com es over with Benny to lure Donna with money and gradually snatch here away from him, he allows a couple of moments to pass as if no real peril lurks. Here,

Thursday, October 3, 2019

Information Systems Security Survey Essay Example for Free

Information Systems Security Survey Essay The University of Nebraska Medical Center (UNMC) is an institution that was built back in the 19th century. UNMC’s mission is to improve the health of Nebraska through premier educational programs, innovative research, the highest quality patient care, and outreach to underserved populations (UNMC, 2004). As an institution with key interest to privacy of its students, staff and subordinate staff, UNMC has adopted various policy guidelines to ensure information security system. The Information Security Management Plan (ISMP) describes its safeguards to protect confidential information. These safeguards are meant among another reason to: Ensure the confidentiality of data Ensure the integrity of data Ensure the availability of data Protect against anticipated threats or hazards to the security or integrity of the information UNMC has adopted information security industry best practices to implement its information security system (UNMC, 2014). They have become so effective that during 2011, a Hitrust Gap assessment was performed, and no significant gaps were found within its security program. The worksheet below outlines how these programs have been rolled out by different offices in the university. Worksheet: Information Security Program Survey Security Area Responsible Party / Office of Primary Responsibility Known Vulnerabilities / Risks Countermeasures / Risk Mitigation Strategy Acquisition (systems/services) Information Security Office Breach of the confidentiality clause All service providers must undergo an evaluation process to verify they are qualified. Contracts have a confidentiality clause whose breach terminates the contract. Asset management System Administrator Poor asset management Proper policies and procedure in place  to ensure effective asset management. Evaluation to ascertain the qualifications of asset managers. Audit and accountability Information Security Office Dishonest employees disclosing confidential information to third parties Every application contains a log that must be maintained to meet regulatory requirement. There is Information security Incident Response plan to handle any notable strange events. Authentication and authorization System Administrator Covered data may be transferred to third parties without authorization Employees are provided with user name and password to access the data. Employees are trained on developing a secure password. There are control policies in place governing access to this information. Business continuity Information Security Office Non-coordination and miscommunication between employees All employees are supposed to keep contact information of co-workers and supervisors to seek for help in case of any emergency. Compliance management Compliance Officer the Information Security Officer Employees failure to comply with the set guidelines, policies and procedure There is a compliance form that is filled before a major project is undertaken by the enterprise. The form is to ensure that no new risk is introduced to the enterprise. Configuration control System Administrator Compromised system security Every configuration must have a password. Each password must have at least ten characters. The password must be encrypted at all times. Data System Administrator Data may be intercepted during transmission Database with security keys is available to authorized employees only. Access to classified data is allowed to limited employees. Information security plan ensures security of covered data. Hardware System Administrator Destruction of hardware in disaster Only employees with technical know-how of operating hardware are allowed to use them. The hardware are encrypted for security purposes. Hardware backup system. Identity management Information Security Office Unauthorized covered data and information transfer through third parties Identity Management Program (IDM) outlines procedure for issuing credentials based on the NIST guidance. Checks are done on employees prior to their employment. Incident management Command Centre Incident Response Team Physical loss of data in a disaster An Incident Reporting and Response Plan is in place to report and respond to any  identified risk. Availability of a well-trained incident response team. Command Centre is established to manage emergency. Maintenance procedures Change Advisory Board (CAB) Existing patches within the security system A release process is in place to ensure that the changes do not affect non-primary system. Patching policies for workstations to ensure security. Media protection and destruction Information Security Office Unauthorized access covered data as well as information Data storage policies define how data stored in the media is to be protected. Data is only stored in a secured data centre or encrypted medium. Network System Administrator Unauthorized access to the network Network traffic is controlled by Cisco enterprise-class firewall where inbound connects are only allowed to DMZ. Internal trusted network is provided via an encrypted VPN tunnel. Technical perimeter is established to bar direct access from the internet to the Internal Trusted Area. Planning Information Security Office Poor planning that compromise management of the security system Contingency plan is in place to handle any eventuality. Employees are encouraged to store data on network file servers for backup. All backups are surely stored and marked for easy identification during emergencies. Personnel System Administrator Loss of data integrity Employees are only employed after exhibiting minimum security requirement. Information Security Addendum are to be signed for confidentiality purposes. An insider who ensures that all legal requirements are followed before access is granted must accompany outsiders accessing information. Physical environment System Administrator Physical safety of the environment may be compromised through attacks and burglary No unauthorized personal is allowed within the data centre premises. The data centers are controlled by keycard access. Policy Information Security Plan Coordinator Policies may be misinterpreted by the employee The University’s security policy is enshrined in the Privacy, Confidentiality and Security of Patient Proprietary Information Policy and the Computer Use and Electronic Information Security Policy. The two policies require that authorized people can only access this information. The policies are reviewed every two years to make them in tandem with the prevailing circumstances. Operations The Information Security Officer and the Infrastructure Team  Failure for operations to comply with the system security policy An operation must fill a compliance Checklist or a Security Risk Assessment form for review to verify that no new risk is introduced to the enterprise. Outsourcing System Administrator Unauthorized disclosure of security information by third parties Outsourced vendors must comply with UNMC Policy No. 8009, Contract Policy. Vendors accessing classified student information must sign the GLB Act contract addendum. Risk assessments Information Custodian Poor method of risk assessment that may downplay the actual impact of a risk Security assessment I conducted annually. All applications must meet the organizations security policies and procedure. Software System Administrator Software may be infected with a virus Software should not be installed unless the user trusts it. Vendor update and patches must be installed unless directed otherwise. Software license must be retained to get technical assistance. Training System Administrators and Information Custodians Misuse of security system Loss of data integrity Employees are trained on information security system before they are employed. System administrators and information custodians are annually trained on Specific Information Security Policy and Procedure. References UNMC. (March 2014) Strategic Plan 2010-2013. Retrieved from http://www.unmc.edu/wwwdocs/strategic-plan_06-10_v3-brochure1.pdf United States Government Accountability Office. (February 2010). ELECTRONIC PERSONAL HEALTH INFORMATION EXCHANGE: Health Care Entities Reported Disclosure Practices and Effects on Quality of Care. Retrieved from http://www.gao.gov/new.items/d10361.pdf UNMC. (February 9, 2004). Information Security Plan. Retrieved from http://www.unmc.edu/its/docs/UNMCInformationSecurityPlan-Sept2010.pdf