Tuesday, December 24, 2019

Essay on The Scientific Revolution - 1098 Words

There were three major revolutions at work during the sixteenth through the eighteenth centuries, the scientific revolution, the enlightenment revolution and the political revolution. All of these revolutions have shaped western thought and ideals to this day and continue even in this age to shape western thoughts and ideals. What brought us to our thinking of today? Which, if any of the three, were the most important in shaping our thoughts on science, politics, and our social structures? Or were each an independent revolution without consequences on the others? The scientific revolution and the change in thought that it produced was the foundation for the enlightenment revolution, and in turn the enlightenment revolution was the†¦show more content†¦He came up with multiple mathematical laws, with the integral one being the law of universal gravitation. Two other very important people in the progress of the scientific revolution were Francis Bacon (1561-1626) and Rene Descartes (1596-1650). Bacon formalized the empirical method, also known as empiricism. Empiricism is the theory of inductive reasoning that calls for acquiring evidence through observation and experimentation rather than reason and speculation. Descartes’ theory was Cartesian dualism. Descartes thought that you should doubt everything that could be doubted and then use deductive reasoning from self-evident principles to understand scientific laws. Both of these men’s theories make up the modern scientific method. (McKay, 2009, pp. 493-499) The enlightenment was heavily influenced by the scientific revolution. So much so that two of its three core concepts are the use of reason and the scientific method, along with progress. The new world view brought about by the scientific revolution brought people to believe that the same principles could be used to ascertain all aspects of life. Enlightenment thinkers believed if they could define the laws of human existence they could better their societies and therefore better the people. People began to question the unquestioned beliefs basedShow MoreRelatedThe Scientific Revolution1531 Words   |  6 PagesIn the book â€Å" The Scientific Revolution: A Very Short Introduction†, Lawrence Principe discusses the general occurring events of the scientific revolution, and overviews various in-depth details in relation to those events. People at the time highly focused on the meanings and causes of their surrounds, as their motive was to â€Å"control, improve and exploi t† (Principe 2) the world. In his work, Principe has successfully supported the notion that the Scientific Revolution stood as a period in time whereRead MoreScientific Discoveries Of The Scientific Revolution1548 Words   |  7 PagesScientific Revolution The Scientific Revolution refers to a time in history when developments in the sciences took off and changed the view of society regarding the earth and nature. Some of the relevant topics of this time were mathematics, astronomy, biology, physics and chemistry. Typically, the scientific revolution is considered the time in Europe starting around the end of the Renaissance period and lasting through the late 18th century. Between 1543 and 1700, Europe underwent many changesRead More The Scientific Revolution Essay1129 Words   |  5 Pages During the Scientific Revolution scientists such as Galileo, Copernicus, Descartes and Bacon wrestled with questions about God, human aptitude, and the possibilities of understanding the world. Eventually, the implications of the new scientific findings began to affect the way people thought and behaved throughout Europe. Society began to question the authority of traditional knowledge about the universe. This in turn, allowed them to question traditional views of the state and social order. NoRead MoreThe Scientific Revolution And Enlightenment1267 Words   |  6 PagesThe Scientific Revolution and Enlightenment, which spanned from the late 1500’s to 1700’s, shaped today’s modern world through disregarding past information and seeking answers on their own through the scientific method and other techniques created during the Enlightenment. Newton’s ‘Philsophiae Naturalis Principia Mathematica’ and Diderot’s Encyclopedia were both comp osed of characteristics that developed this time period through the desire to understand all life, humans are capable of understandingRead MoreEssay on The Scientific Revolution1263 Words   |  6 Pagesadvances. The Scientific Revolution began with a spark of inspiration that spread a wild fire of ideas through Europe and America. The new radical ideas affected everything that had been established and proven through religious views. The scientific revolution was more radical and innovative than any of the political revolutions of the seventeenth century.1 All of the advances that were made during this revolutionary time can be attributed to the founders of the Scientific Revolution. The revolutionRead MoreThe Scientific Revolution And The Enlightenment1528 Words   |  7 Pagessecularism to better themselves and understand the universe. As the sciences became more popular, skepticism about religious grew. A significant root of the Enlightenment was the Scientific Revolution (1500-1700) which pressed the use of reasoning, inquiry, and scientific method in order to arrive that the truth. The scientific revolution was an attempt to better understand our world through the use of reason and logic. It was characterized by numerous achievement including the shift from a geocentric (Earth-centered)Read MoreEssay on The Scientific Revolution1344 Words   |  6 PagesIn the centuries preceding the Scientific Revolution people attempted to understand natural phenomena through the lenses of doctrine and philosophical speculation. Scientists were content with to rely on a synthesis of Aristotelian framework and dogma in attempt to describe the world. During the Scientific Revolution scientists began to embrace empiricism as a way to better understand the intricacies of nature. Unlike today scientists during the Scientific Revolution didn’t see a dichotomy betweenRead MoreThe Scientific Revolution and Its Impact1291 Words   |  5 Pages Throughout the Scientific Revolution, scientists and natural philosophers created a new scientific world by questioning popular ideas and constructing original models. During the 1500s and 1600s, the concept of individualism, the principle of being independent and self-reliant, began to be applied to one’s life. People began to have individual thoughts and started to disagree with commonly believed ideas promoted by the Church. As this way of thinking expanded throughout Europe, scientists lookedRead MoreThe Scientific Revolution Essay1165 Words   |  5 PagesThe Scientific Revolution When comparing the views presented by both Aristotle and Copernicus, one must consider the circumstances under which these men lived to understand the differences. The most obvious of these is the time in history. Aristotle came almost 2000 years earlier in the astronomy field. While Copernicus had set out to glorify the great religion of his time, Aristotles views came 200 years before Christ was even born! Although the book gives the impression nothing of significanceRead MoreThe Scientific Revolution Of The Human History Essay1102 Words   |  5 Pages Scientific Revolution: An Important Event in the Human History The moments when I write these words are history, so we could say history deals with the past. However, the past has not passed completely. The future will also be history. History is a very dynamic notion and concept. What is history is really hard to define. Change is central to history. Yet, history is not only about details. There are certain things that demonstrate true history. These events have varied in time and space. Among

Sunday, December 15, 2019

Slavery Abuse †Modern Day Realities for Maid Free Essays

â€Å"At her death, the 19-year-old girl – who was 50 kg when she arrived in Singapore – weighed only 36 kg and had more than 200 injuries on her body. †(Lee, para. 3) The evolution of domestic workers in Singapore dates back to the mui tsai, migrant girls from China in the early 1890s who were the virtual slaves of the rich families. We will write a custom essay sample on Slavery Abuse – Modern Day Realities for Maid or any similar topic only for you Order Now They worked from dawn to dusk and into the wee hours of the morning. However, the number of foreign domestic workers started to grow only in the 1970s, a result perhaps of the economic boom then, and the desire for more leisure. The number continued to rise rapidly. In 2005, there were more than 140,000 foreign domestic workers in Singapore. (Chew, pg. 152) It may seem that maids working in a first world country like Singapore, has it easy off, compared to those working in second world countries, but there is a hidden claw that scars maids in this roaring Lion City. Some may say that maid abuse is not a widespread problem and that the irresponsible reporting of maid abuse by the local papers and television is the problem. On the other hand, others believe that maid abuse still remains a widespread problem. Singaporean, para. 12) Singapore maids undergo the risk of being abused due to financial and educational circumstances for their family, leaving them with psychological effects during and after abusive treatment. Foreign Domestic Workers come to Singapore in search for a job, without the protection of the Singapore government, to get them out of a poverty stricken life they have back in their hometown. The y earn money to be able to build a home and be able to afford a decent education and keep their children sufficiently fed and clothed. However, the cost of this may lead to a permanent psychological trauma caused by employers, which follows them for the rest of their lives after their contract is up, if they do not commit suicide. These abusers come from all walks of life: A school teacher had forced her maid to eat her own feces(Singaporean, para. 11), a father of two kicked and threw chairs at his maid(Singapore, para. 3), an air force staff sergeant tortured his sleep deprived maid by whipping her(Chong, para. 8), even children slap and hit their maids repeatedly to the encouragement of their parents(Rhonda, entry 5, para. ). Something has to change. Background Singapore for the past century has been a country growing in population and world status and recognition. Once an island of fishing village, and a British settlement, today Singapore is a republican country, which had undergone tremendous change. This is a result of the workforce Singapore has and its strategic location on the globe, being located off the southern tip of the Malay Peninsula, making it an ideal destination to port ship between traveling between the Indian and Pacific Ocean, thus being a highly growing and expanding nation. With a huge amount of Singapore’s society holding jobs that requires long hours, they hire helpers, maids, to lighten their work load for the chores they have to do. In 2005, there were more than 140,000 foreign domestic workers in Singapore(Chew, pg. 152), under the care of employers who hire these helpers from one of the 700 maid agencies in Singapore. (Chew, pg. 152) These employers may hold high paying jobs or high posts in the company they work for, but there is always a hidden side to people. In 1997, Singapore has reported 157 cases, 89 cases in 1998, 82 cases in 1999. (Sierakowski, pg. 133) it may seem that there is a downward trend with maid abuse cases of such in Singapore, however, there was 87 cases in 2000 and it has since been rising. (Chew, pg. 133) The cases of abusive behavior implicated upon the employer’s helper, usually happens behind closed doors of the employers resident: be it in their HDB’s (government funded Housing and Development Board in Singapore), landed properties, condominiums or private properties. The implications of such abusive inflictions on their helpers, causes physiological traumas embedded forever with their helpers. Unfortunately, some of these traumas unfortunately do end with the loss of lives. Description The idea of maid abuse parallels the idea of slavery. In Singapore, there was no term known as maid abuse till the recent decade. Each year, an average of 90 maids report the abuse cases and are documented into the system, however, many goes unheard. (Chew, pg. 33) The basic ideology of maid abuse happens when a worker under the employment of an employer is ill treated to an extent that would cause side effects to a person physically and mentally. A recent case of maid abuse consisted of a maid being kicked in the belly, slapped, and thrown multiple items at her for not preparing curry puffs as instructed properly. This maid, suffered injuries to her arms and toes, but managed to flee the apartment and reported the abuse to the police. The abuser, Mat Nooh, a father of two, and teacher, was found guilty, and this particular case was settled. Singapore, para. 2) It is important to know that even a person holding a profession as a teacher, who provides an education to others, and is a highly respected job that others trust and seek information from, is able to carry out such abusive behavior towards a fellow human being. It leads us to question the fact of how much a person can appear to be what he is not, question the true identity of others. However, not all abused are able to take the physical and psychological abuse. There was another maid who is referred to as Imelda, had acquired bruises all over her body. She alleged that her employer’s brother had hit her repeatedly whenever he would get drunk. In January 1988, he had handed her his knife and told her to kill herself. By doing this action, the employer’s brother had not only physically abused the maid, but also had imprinted the underlying idea that Imelda was useless and would be better off to the world to be dead. Imelda has initially fled to Philippine Community Center, which has since been closed down, to take refuge. However the psychological impact of the matter was too much for her to take, and she had plummeted from the hospital window, to her death. (Sampang, pg. 8) This is significant to the fact that the abuse of a maid does not stop when the maid leaves the abusive environment, but the effects of it continue to linger in her subconscious mind and it would impair her judgment and thought process in the future due to the abusive acts inflicted upon the maid. Leaving a permanent psychological scar on the maid, forever. There are laws in Singapore that protect helpers, for the most part, from being hurt physically, being wrongfully confined and outraged of modesty, but, it is important to note that foreign domestic workers are not protected under the Employment Act, 1968(Chew, pg. 53), that all employees in Singapore are protected by. If you enter a foreign country to work in it as a domestic helper and you realize that the government of that country does not protect you the way it protects the other 5. 5 million people living in the same country, it results in not just fear in the back of your mind but it trips a wire that subconsciously tells you, you are not of the same value of others. Analysis A psychological effect on a person doesn’t require drastic measures to happen before changes in a person’s mind occur. Even a simple thing such as that, maids who are employed by couples are often made by the employer’s wife to cut their hairs short and not to wear any makeup so they will be less attractive to the employer(Perlez, para. 25), may be of mental harm towards a maid. This may not seem to be a big deal, however not being able to look good for herself, psychologically impairs the person to think that she is ugly and not worth the trouble, consequently causing a decrease of self respect , ego and insecurity in looks, with the possibly of resulting in the state of depression. In simple terms, the maid turns suicidal as a result of abuse. However, the effect of maid abuse does not stop there, but carries on as a chain reaction. If a child sees his/her parents abusing their maid when they are young, the child will think that it is the norm and would carry this trait into the future, and would abuse the possible maid he/she would employ. Abuse may not only be in the form of physical contact between the two parties, derogatory verbal statements made about these domestic helpers may also be considered as an abuse. It may not seem that verbal statements could be an abuse, however when you start referring to a person as said ‘maid’, it lowers a person’s self-respect and in their subconscious mind, they feel like they are being told that they are worth less than others as they have to ‘serve’ their employers. However, in this seemingly dark and grim topic, there is a glimmer of hope for this matter. If we are able to raise awareness within the community, then the rate of abuse cases would decline over time, consequently saving the lives of possible future victims. Solutions H. O. M. E (Humanitarian Organization for Migration Economics), is one of the charities in Singapore that is helping out the situations of abused maids in Singapore. H. O. M. E helps these maids by offering them to be told of their rights and options in their own native tongue. In addition to that, H. O. M. E aids abused migrant workers by informing the MOM (Ministry of Manpower) of the case an d follows up onto it, be it negative or embarrassing towards the ministry. (Maid, para. 24) H. O. M. E also provides referral services, shelter, income-generating opportunities, and legal aid to abused migrant workers. It helps workers navigate the justice system in Singapore and has been cultivating a working relationship with the Ministry of Manpower and sending countries’ embassies to respond to cases of abuse. (Maid, para. 54) An idea to a new solution would be to create an advertisement campaign to educate the young public. This would be the solution to the maid abuse problem. It would be to educate the young to prevent these problems in the future, as the past has already happened. The condition of maid abuse cannot be changed overnight by campaigning about it. The elder generation’s mindsets have already been written in stone and so it would be hard to sway their mindset. However, the younger generation is easily influenced and so by educating them on respect of other human beings regardless of their ethnicity and background, it would prove to be worthwhile, with the outcome of a new generation of people who would respect, understand and have more compassion. Even though MOM had held a photographed campaign against the abusive behavior towards maids, I felt that I could approach my campaign from a totally new and different perspective. The advertisement campaign could consist of three different compositions that mirror the layout of TIME magazine, so the viewer would be draw to see the image. The first could consist of an image of an abused maid cowering in a dark corner, accompanied with shocking text as topics. The second could consist of an image of a shadowed fist about to strike maid, accompanied with socking text as topics. The third could consist of a picture of an abused maid with a tear rolling down her cheek, portraying her cry for help. The campaign will be up on the internet alongside being posted in strategic locations around my school, for maximum exposure. This campaign could possibly have a very strong impact on the audience. However, the limitation of this would be the amount of audience that this would receive, and if they would even care. Conclusion There are many implications to the extent of abuse possible. Even in this magnificent Lion City, Singapore, there are abusive behaviors occurring to the employed helpers of households. This leaves a mental imprinted scar in he minds of such victims through and subsequent to abusive treatment. The abused will feel that they are inferior to the general public and start to decline into the start of depression, with the possibility of resulting in death. However, there are solutions to the problem at hand, by raising awareness within the community. Maids have plunged from top stories of buildings, slit their wrist, starved, beaten and abused to death. We must not let them die in vain. Each and every one of them has a story to tell. Let us carry their voices on. How to cite Slavery Abuse – Modern Day Realities for Maid, Papers

Saturday, December 7, 2019

ICT Service Management Quantum Computing System †Free Samples

Questions: 1. What is Debian GNU/Linux? 2.Why Marissa Mayer Failed. Fox Business? 3.Why Target failed in Canada. Answers: Quantum Computing The quantum computing refers to the application of quantum mechanics in the computing system. It is an advanced technology which can solve several contemporary issues in the computing system. The quantum computing can increase the speed of the computers by manifolds and with the help of t several complex mathematical and logical problems can be solved easily. The traditional computing system is based on the binary number system wherein the binary codes one and zero are used to encode and process the information. Contrary to it, the quantum computing uses qubits which is the unit of information in the quantum nature. It is analog in nature and quantum synonymous of classical bit. It is a two-state quantum mechanical system. The qubits are developed around the phenomenon of superposition and entanglement. Therefore, qubits can remain in the state of one, zero or any stat of quantum superposition of the qubits. Therefore, the quantum system has higher capabilities than the classical com puters. The quantum computers take the advantage of the quantum particles which are subatomic in nature and can exist in more than one state at a time. Due to the nature of the quantum particles, the operations can be completed much more quickly and with less amount of energy. The quantum computers are hundred times faster than the traditional computers. Although, the quantum computers are not available commercially, several multinational organizations are making efforts so that they will be available for commercial and scientific purposes. The quantum computing has several benefits such as it can be used complex natural phenomenon and development of medicines with complex chemical formula. The quantum system also has applications in development or breaking difficult codes. It is also beneficial for the development of superconductor materials or pharmaceutical drugs and studying their nature. 1. Debian GNU/Linux? The Linux operating system refers to the system which uses the Linux kernel and package management system. The Linux operating system can be downloaded from one of the Linux distributions such as Ubuntu or Debian. A classic Linux distribution system contains Linux kernel, GNU tools and desktop environment. All the available software in the operating system contains free and open-source software which is allows modifications to the original software. Several times, the Linux software includes propriety software which is not available in the original software system. Basically, a Linux distribution system can be defined as an assortment of application and utility software packaged together with Linux kernel. The Debian system is developed with the emphasis of developing a free operating system. The Debin system are either based on Linux kernel or FreeBSD kernel. The operations system refers to the set of programs which assist then user to run the machine. The Debian operating system is one of the most popular personal computer and network servers and most often used as a base for the operating system. The efficiency of the Debian software can be increased by incorporating it with the Linux distribution system. The Debian operating system is commonly used by the business organizations as it is secure, cost-effective and easy to use. The Debian software package was made up of a large number of software packages which includes executable, scripts, documentation and configuration. The Debian operating system also requires a maintainer who is responsible for keeping track of bugs in the software and recent updates. It has an effective e bug tracking system which ensures that all the problems are solved and resolve quickly. Workstation for Windows Recently, the virtualization technology has developed quickly due to its immense applications in the computing field. With the help of virtualization, an organization can create a several virtual versions of a single device which can run on a single platform. With the help of virtualization, virtual versions can be created of computer hardware platforms, storage devices and computer network resources. The virtual machines can be categorized into two categories, namely, type-1 and type-2 machines. The type-2 virtualization products are the low-level programs which allow multiple operating system to run simultaneously on single computer system. They use software or firmware to allocate the resources in real-time. It controls the internet traffic and memory management. The type-2 virtualization machine run on a host operating system. The type-2 virtiualzation software are most common as the system administrator can buy the software and install it in the server which they already had. Th e Type-2 virtualization machine can be used to mainly run on client system wherein the efficiency is not the primary issue and where support to a large number of input or output device are required. The support can be provided by the host operating system. VMware Workstation is a hosted hypervisor or virtualization machine which is popularly use by the business organizations. VMware Workstation runs on 64-bit operating system and can run on Windows as well as Linux operating system. The hypervisor can be used to set up virtual machines on a physical computing device. Later, the physical machine and the virtual machine can be used concurrently. There are also free of cost version available which can be used for non-commercial purposes. The VMware software product can provide stable and secure desktop virtualization platform for running several virtual machines. DCCP-Datagram Congestion Control Protocol DCCP protocol is a transport layer protocol which can be used to control datagram congestion. It is an effective measure to control internet fall down if it is caused by traffic congestion in the distribution system. The congestion control trait of the protocol is achieved by using the mechanism of reliable acknowledgements and their delivery. The acknowledgements are delivered in the form of packets rather than the bytes and provide dynamic congestion control. DCCP can also offer negotiable blocking control mechanisms; however, the bandwidth consumption will increase with the additional features. It implements reliable connection setup and congestion notification is provided at each instance. In DCCP protocol, the congestion mechanism is immediately application without the requirement of any protocol in the network layer. The DCCP protocol is based on TCP and UDP protocols; however, it is a better version and has additional functionalities. The DCCP protocol is commonly used to cont rol the congestion in the transportation layer. It also has other applications such as identifying the sequence number of packets, maintaining data integrity and identification of port number so that devices with same IP address can communicate with each other. With DCCP protocol, the overall efficiency of communication system is increased as it results in efficiency acknowledgement between transmitter and receiver increased congestion control and enhanced the overall efficiency of the system. It is useful for application which has time constraint on the delivery of the data. Some of the common examples of such applications are internet telephony and streaming media. In these applications, the old messages or data packets become stale and new data packets are sent instead of accessing lost packages. In the DCCP connection, there are two types of packages which include data traffic and the acknowledgement traffic. Inside the digital heist that terrorized the worldand only made $100k. Recently, a large number of companies and countries were affected by WannaCry ransom software which was a worldwide cyber-attack. It is a ransomware cryptoworm which targets the computers which run on the Windows operating system. It encrypts the data so that the user cannot access the computing system and demand ransom from bitcoin cryptocurrency. The attack infected more than twenty three thousand computers in more than one fiftycountries. The WannaCry ransomware spread over large networks and the internet. It easily infected the computers which were not updated with recent software updates. Moreover, it directly infected all the exposed systems. The attack garnered the attention of the international media as the vulnerability was previously identified by the US National Security Agency; however, instead of informing the organization, build their own offensive work. The existence of the vulnerability was revealed by The Shadow Brokers and later Microsoft become aware of the vulnera bility and produced a security update. In the initial phase, the worm use the EternalBlue to enter the internal system of the computer and take exploit the issue in the Server Message Block (SMB) protocol of the Microsoft Windows. Later, the malware installs DoublePulsar, which is an implant tool which implements the WannaCry ransom package from the backdoor process. The malware works in the similar process as that of other ransomware as it firstly find and encrypts a significant amount of data files in the system and then display a ransom note informing the user that they need to pay a ransom amount in bitcoin currency. It is also a network worm as it contains a transport mechanism which scans vulnerable systems and use different mechanism to gain access and other tools to execute a copy of itself. Delta Problems Included a Fire at Data Center. Data Centre fires are a major issue in large business organizations which needs to deal with the large amount of data and information. The data center fire occurs due to excessive heat generated in the system due to continuous usage. In 2016, a data center fire occurred in the computing networks of US Airline Delta in which a large amount of flights were delayed and the flight schedule was disturbed. The data centers are crucial for the daily operations of the business and the most significant threat to the data centers is that of fire. It can damage the whole data of the data centers and the information once lost cannot be retrieved. In severe incidence, the fire blaze can spread rapidly and cause heavy damage to the infrastructure. The fire blaze can spread quickly and halt the operations of the whole organization. The data center fire in the Delta Airlines also caused heavy damage to the regular operations of the organization. A large number of flights were delayed and the custome rs have to wait for a prolong period of time in spite of booking flights earlier It causes dissatisfaction among the customers which may damage the reputation of the organization and may result in the loss of the customer base. A business organization can reduce the risk associated with the data fire by installing software which is capable to monitor the temperature of the data center rooms. If temperature of the data center exceeds particular limit, the software can alarm the authoritative person by ringing an alarm or sending a message. The Biggest Trends Impacting Retail Innovation. Rocket Space Crowdsourcing is a recent phenomenon which has occurred with the emergence of the internet. The companies are using crowdsourcing to attain contributions from the internet users which can include freelance services and ideas. It is cost optimization model in which the companies can obtain infrequent services from internet users. It also fosters diversity and assists a company to take hold of customers taste and preference. In the crowdsourcing model, the work is divided among the volunteers so that cumulative result can be obtained for the organization. The crowdsourcing model is different from the outsourcing business model as outsourcing is achieved through experienced professionals. In crowdsourcing, the business organizations use a mixture of variety of approaches for the selection of volunteers from the internet. These volunteer can provide services or ideas or suggestions in different category. Crowdsourcing increases the speed, quality and the diversity of operations. Sundial Brands have successfully employed the crowdsourcing approach for increasing the productivity of the organization. It is one of the leading companies in consumer products in Africa. The company uses consumer feedback in manufacturing of the products. It gives special attention to the feedback and the suggestions provided by the users and use them in their future product. For instance, the company manufactured a product with rosemary oil; however, the consumers complained that rosemary oil is not ideal for pregnant customers. As a result, the company replaced the rosemary essence with that of peppermint. Zomato Reports Security Breach; Data Of 17 Mn Users Stolen. The data theft and security has become a major concern for the business organizations in the present internet age. All the small and big business organizations are using digital and online mediums to store the consumer data and sensitive information of the organization. It includes various sensitive pieces of information such as trade secrets and bank details of the organization. Therefore, it is important to implement security measures to protect this information. Recently, a few hackers have stolen the consumer data of online food ordering app named Zomato. The company has reported the theft of user records of some seventeen million application users. The stolen data contained the email addresses of the users as well as their passwords. However, the company succeeded to protect the payment information and the credit card details of the users. The hashed passwords of the users were protected by theoretical decryption by brute force algorithms. The companies use the hashed passwords for security reasons as they are random-looking characters which cannot be decrypted easily. The hacker has stolen the data and published the data on the dark web up for sale. In the present case, the hacker was cooperative and wanted to promote security in the IT enterprises. As the ransom, the hacker demanded big bounty program for the ethical hackers. The hacker also shared how he/she entered the security system and accessed the sensitive information. The incidence shed light on the system vulnerability in security systems. 2. Marissa Mayer Failed. Fox Business The technological inventions have transformed the lives of people all across the globe. With the advent of the information age, frequently new inventions and products have been introduced which have transformed the lives of the people and supported different processes. It is important to embrace the technological advancements and innovations frequently otherwise, the business organizations may fail. At the turn of 21st century, Yahoo was considered as one of the leading technological business organization in the world. It has majority of market share and had an immensely popular web portal. However, it focused and relied only on that web portal rather than venturing into diversified business. The biggest mistake of the organization was to rely solely on its web portal rather than diversifying its business. As a result, now Yahoo is behind other technology companies such as Google, Microsoft and Facebook. Initially, the company had the opportunity to buy Google and Facebook; however, it was reluctant to buy the companies at high market price. Later, the company lagged behind other companies and failed to regain its importance. It also lacked in assessing the market demands and customer preference. If the company would have been able to assess the customer demands and requirements, it would have adapted itself with the changing times. 3. Target failed in Canada. Target Corporation is one of the leading retailers of the USA after Walmart. In 2015, the company tried to enter the foreign markets and chose Canada as its first international destination. The target market was chosen as a large number of Canadians used to cross orders for shopping. The people were already aware of the brand which will be beneficial for the organization. The decision for international expansion was also fueled by the decision that that the market of the USA has become stagnant and the competition has arisen as a large number of international retail companies have ventured into the market. However, the decision of the company to enter into the Canadian market was a complete failure. The company bought the retail outlets of leading retailer of the country in several locations. It presumed that the customers will be attracted towards the discount; however, there was lack of market research as there was not large price difference between the local competitors and the Ta rget Corporation. Moreover, there were several supply chain issues in the operations of the organization. It resulted in limited order and products on the shelf. A large number of customers did not switch their retail companies and the customers who did not switch were frustrated due to lack of products. References Collins, K. (2017). Inside the digital heist that terrorized the worldand only made $100k. Quartz. Retrieved on 23 May 2017 from https://qz.com/985093/inside-the-digital-heist-that-terrorized-the-world-and-made-less-than-100k/ Debian. (2017). What is Debian GNU/Linux? Retrieved on 23 May 2017 from https://www.debian.org/releases/stretch//amd64/ch01s03.html.en DWave. (2017). Quantum Computing. Retrieved 22 May 2017 from https://www.dwavesys.com/quantum-computing How Does Internet Work. (2013). Datagram Congestion Control Protocol. Retrieved on 23 May 2017 from https://howdoesinternetwork.com/2013/dccp-datagram-congestion-control-protocol Mayerowitz, S. (2016). Delta Problems Included a Fire at Data Center. US News. Retrieved on 23 May 2017 from https://www.usnews.com/news/business/articles/2016-08-11/delta-computer-outage-included-small-fire-at-data-center Mishra, A. (2017). Zomato Reports Security Breach; Data Of 17 Mn Users Stolen. Inc42. Retrieved on 23 May 2017 from https://inc42.com/buzz/zomato-data-theft-17mn/ Puri, R. (2017). The Biggest Trends Impacting Retail Innovation. Rocket Space. Retrieved on 23 May 2017 from https://www.rocketspace.com/corporate-innovation/the-biggest-trends-impacting-retail-innovation Tobak, S. (2016). RIP Yahoo: Why Marissa Mayer Failed. Fox Business. Retrieved on 23 May 2017 from https://www.foxbusiness.com/features/2016/07/26/rip-yahoo-why-marissa-mayer-failed.html VMware. (2017). Workstation for Windows. Retrieved on 23 May 2017 from https://www.vmware.com/in/products/workstation.html Wahba, P. (2015). Why Target failed in Canada. Fortune. Retrieved on 23 May 2017 from https://fortune.com/2015/01/15/target-canada-fail/