Friday, January 24, 2020

Essay --

During my 3 years at Hindustan Petroleum Corporation Limited (HPCL) as a Maintenance Planning engineer, I breathed planning and organizing. Working for a multi-billion dollar enterprise, I saw the effects of operational efficiencies on the balance sheet. This relevant exposure has shaped my decision to pursue a career in Industrial Engineering, a field that strives to increase productivity and efficiencies by systematic study and innovation. Working at HPCL’s 7.6MMTPA refinery, I was a part of the team that ensured that all units were maintained well to operate at optimal capacity, round the clock. I was responsible for preparing schedules and planning for the men, machinery and material for maintenance activities. It was in this role that I experienced firsthand, the need and applicability of scientifically managed and optimized processes in the industry. During an outage of the Fluidized Catalytic Cracking Unit (FCCU), a faulty spare gasket had kept the start-up of the unit on hold. I was chosen to procure the replacement, for which I had to fly 500 miles on a moment's notice, having to manage the gasket as my luggage. This trip was satisfying, not just because it brought down the potential loss margins from $250,000 to $70,000, but because I learnt the importance of judicious planning in extenuating losses. After this, I led a 4 person team to catalogue and update equipment spare parts in a database. With lessons learnt during the previous outage, I compiled a checklist that leverages the database to streamline and double-check the material planning process, reducing the probability of a last-minute emergency. 28 months and 7 major unit shutdowns later, in January 2013, I was made team-lead for planning a revamp of a Crude h... ...nt of pursuing graduate studies is to enhance my existing knowledge and skills, so that I can realize my vision of unlocking the potential of process optimization in small and medium scale enterprises in nations with developing economies such as India. For now, though, my focus is on garnering specialized knowledge and skills and furthering my industry experience. UC-B is a college with professional expertise like no other. Being a part of the Graduate community at UC-B with their collaborative inter-cultural community will help develop my personality. The teaching approach at UC-B of encouraging by challenge is ideal for a passionate learner like me. With a hope that you will find the potent combination of talent and determination in me as something that will add value to the legacy of UC-B, I am looking forward to be a part of the esteemed UC-B graduate community.

Thursday, January 16, 2020

Cyber crime Essay

The proliferation of the use of internet technology for some time now has seen the growth of crimes that are committed over the net which is also referred to as the cyberspace. These crimes are referred to as cyber-crime. Basically cyber-crime is part of electronic crime and it is a criminal activity that is executed through computer network (Balkin, 2007). Traditionally the term espouses such crimes as fraud, theft, forgery, blackmail, and other illicit activities that are done over the network. However as the use of computer networks have increased and more types of computer crimes have come up and the definition of the crimes has also become expounded. The web is a worldwide thing in which materials are posted and accessed from all corners of the world. This worldwide coverage of the net gives rise to a diversity of information that is found in the net and it follows that cyber-crimes are a worldwide crimes. The nature of the differences in cultures in the world for example give rise to a need make sure the net is an objective platform of information dissemination, be it religious, social, or political material. The growth of business over the internet; e-business has also brought in another type of cyber crime whereby people may defraud potential customers of their money by advertising goods, services or even jobs that are non existent. Other types of cyber crimes exist, and they shall be looked at in the following discussion. According to the USA’s Department of Justice, there have been very many cases of cyber-crime that are reported annually. This made the US government to join hands with the European council’s Convention against Cyber crime in 2006. Look more:Â  the issues concerning identity theft essay Types of cyber-crimes The crimes that are common in the cyber are fraud. Fraud is a dishonest misrepresentation of facts that is intended to cause loss for somebody else and benefit the fraud doer. This includes changing inputs in internet in unauthorized manner, altering or deleting data that is already stored in the net, altering existing system tools, manipulating bank systems so as to make unauthorized access to bank ATM’s (Shinder, 2002). Offensive content is another form of cyber crime. Harmful contents of websites are considered as cases of cyber crime. Also distasteful or offensive the information carried in a cyber sites is not allowed. All materials that have the potential of inciting hate crimes in societies, materials that encourage political rebellion, or blasphemous material are not allowed also as they are basically offensive in significant manner. If these kinds of materials are found posted on the web their owners are accused of cyber crime. The reason for the restriction of these materials is that they lead to hostilities based on faith, race, etc that the modern world does not have a place for. Harassment is another type of crime that occurs over the net. It includes the circulation of derogatory comments, and obscenities that are directed at certain individuals that are based on their aspects of gender, religion, race, sexual orientation or national identity. This is mainly done through news groups, e mails with hate messages, and chat rooms. Another crime that is supported by the net is drug trafficking. Drug trafficking is done through the net in that the illegal substance sellers use encrypted e-mail and other available internet technologies. The substances themselves are delivered to the buyer after they make payments. This crime leads to more sales for the drug sellers since the trade is restricted in most countries and the intimidated users of the drugs resort to this option as a save haven. Cyber terrorism is another kind of cyber crime. This crime is the coercion or intimidation of organizations or the government to advance a certain persons political or social goals. This is done by launching attacks on their computer networks, and the information stored there using computer. This vice can be defined as an act of terrorism that is committed via the use of computer resources or cyberspace. It ranges from simple propaganda to the use of the internet to commit a serious terrorist attack (Blane, 2003). Hacking activities are classified as acts of cyber terrorism. This activity is the attacking of websites of families, individuals, and groups within a network, in order to collect information that is useful for criminal activities such as blackmailing, robberies, or ruining the activities of the web owners. A Canada case in 2000, which involved a Mafia boy who had committed 54 counts of illegal access to computers, is a classical case of cyber crime. The defendant also faced ten counts for mischievous data attacks on dell computer, yahoo, among other companies’ websites. There are many let downs in the fight against cyber crime. Many countries around the world lack systems and laws that are aimed at combating the crime. In extreme cases there are nations that condone or encourage some cyber crimes. In many of the countries the burden of fighting cyber-crime is left to corporations that are affected in one way or the other by the vice. Some of the countries have laws against the crime but the law is not implemented while others have proposals for the law but they have not made the law. Nigeria here serves as an example of such a country which has a good plan for fighting the crime only that the proposals have not been made into law. The bill addressing the crime is in the national assembly waiting to be discussed. If the bill were passed, cyber criminals would be prosecuted and duly punished. This go slow attitude is seen in many countries that don’t seem to realize the danger that cyber-crimes pose to the victims. In any case government agencies like the police force, and crime investigation departments are among the leading victims of cyber crimes. Also politicians get lots of cyberspace blackmail and hence they should be in the forefront of finding a solution to the problem. Again cyberspace crimes are an image destroying affair. For instance a cyber-criminal operating from a country A to injure a victim in country B destroys the overall image of their country and this may translate to less trust for his country in the eyes of other countries. The result of this may be economical loss of for the country that hosts the cyber-criminals as web based companies refrain from investing in the country (Yar, 2006). Protections against cyber-crimes The enactment of laws against cyber crime by the governments has been a move in the right direction. In US there are such laws as; Computer Abuse and Fraud Act that address issues of fraud that is related to computers, SPAM act that is intended to at controlling assaults of non solicited pornography. Other laws address extortion threats, identity theft, wire fraud, electronic communications privacy, and secrets of trade (Thomas, 2000). Legal frameworks that address each emergent form of cyber-crime should be made. The laws that are made should be implemented and avoid the situations from the past where some of the laws have not been put into practice. There should be cooperation with among the stakeholders concerned in the cyber-crime inclusive of all operators and technical solution providers in the sector. Such cooperation is a fast way to eliminating cyber criminals as their life in the community will be made difficult. The operators of cybercafes should not involve themselves with people who abuse the internet and commit the crimes. Public awareness on the crimes should be instituted. This campaign should inform the public about the dangers involved in the crimes. Awareness about cyber-crime should be created among members of the society so as to cut the number of cases that are likely to occur if the people are not aware. The structure of the Europe’s convention against cyber-crime is that nations who become signatories of it harmonize their national laws, improve their investigative capacity on the matter and cooperate with other nations in the fight against the crimes. If this convention is adopted internationally it is able to stop the problem to a great extent. This is due to the trans-border nature of the problem. Since the net is used and violated worldwide then a workable solution to the problem should be worldwide. If the convention is not adopted in all countries, and cyber-criminals continue to operate freely there still will be effects on those countries that have ratified the convention (Shinder, 2002). On top of all this, victims of cyber-crimes should report the cases to the authorities for actions to be taken. Cyber criminals should be named and shamed so that they may cease from the practice. Conclusion Cyber crimes are very prevalent in today’s world and all actions that is required should be done to curb them. The current actions taken against the crimes are not enough and more should be done to address the problem as it posses a grave danger to the entire population of the world as it has the potential to influence political, social and economical wellbeing of communities, individuals and institutions. Protection of the self’s interest can only be guaranteed through the concerted efforts of all stakeholders and nations in fighting the crime. References Balkin, J. (2007). Cybercrime: Digital Cops in a Networked Environment NYU Press Blane, J. (2003). Cybercrime and Cyberterrorism. Nova Publishers Shinder, D. (2002). Scene of the Cybercrime: Computer Forensics Handbook. Syngress Thomas, D. (2000). Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. Routledge Yar, M. (2006). Cybercrime and Society: Crime and Punishment in the Information Age. SAGE http://www. usdoj. gov/criminal/cybercrime/ http://computerworld. co. ke/articles/2008/11/10/nigerian-govt-rated-low-curbing-cybercrime

Wednesday, January 8, 2020

Modern Dream Essay Tom Ford And The Modern Day Jay Gatsby

Modern day Gatsby Tom Ford? More like the modern day Jay Gatsby. Why are they the same person from different time eras you may ask? Well, here is why: Both Jay and Tom are Rich, but they were not born into their money they both worked hard for getting to where they are now. The only differences between Tom and Jay is the mystery on how they got their money. Tom Ford went to school and created his own fashion line which is where all of his money came from and some of it came from the movies he was in. Now, Jay Gatsby? Well, there is a different story about that, he said he got it from a pharmaceutical store chain that he made and ran, but there was rumors that he was mostly a bootlegger which is where he mostly got his money from. In†¦show more content†¦He and this Wolfshiem bought up a lot of side-street drug-stores here and in Chicago and sold grain alcohol over the counter. Thats one of his little stunts. I picked him for a bootlegger the first time I saw him, and I wasnt far wrong. (284) This was the time that Tom Buchanan confronted Gatsby about his illegal doings, but Gatsby didn’t care he doesn’t mind when other people know what he does to make his money as long as he doesn’t get locked up because he knows that Tom won’t tell on him in the book. So, both of the paragraphs tie into each other because it deals with money and how they got it. The next paragraph will talk about how Tom Ford and Jay Gatsby are different from each other by how they got their money. In the last paragraph i touched on how both of these men got their money but i didn’t really go into full detail on how it is really different. Jay Gatsby got his money illegally while Tom Vaughan 3 Ford got his money the normal way which is actually going to school for all years needed, and starting it from the bottom if needed. Tom went to school for years, got different jobs and finally was able to start his own clothing line â€Å"Tom Ford† from the bottom up. Jay Gatsby on the other hand had it really different because it was a really different time back then. He went to school for a while but went to war at the age of