Personal statement should have values like community, practicality, accountability, personal development, and religion.

I come from a background where contribution to the community and strong brotherhood is important. When I came from Pakistan (South Asia) to the U.S 3 years ago, I had language barriers, religious differences because I’m a Muslim which held me back from having lots of friends or good academic performance or even understanding of the system, but every year I have improved upon my weaknesses and kept moving forward.

Maybe discuss strong cultural values of south Asians, challenges after migration to U.S and personal development and belief in faith and a better understanding of the system in U.S? I have also improved my English tremendously too.

If there are any better alternatives, I would be happy to know about that too.

Report Sections:

1. Cover Page

2. Table of contents

3..Introduction Present the reason why the report is being written, the nature of the opportunity you are facing, the scope of your research, sources of materials and what conclusion you reached (direct approach). This is a brief statement about which company you preferred as your number 1 choice of an employer. (There are several possible conclusions you might draw you prefer 1 of the companies over another, or both companies are appealing to you; or neither company meets your requirements.) You will also forecast what you will be writing about in the rest of your paper.

4.Company Evaluations In this section, you will present your evidence. You will report for each company the following:
    Company Background and History
    SWOT analysis (Strengths, Weaknesses, Opportunities, threats) Each part has to have its own paragraph with a proper in-text citation.

5.Conclusion Compare and contrast the advantages and disadvantages of each company and give your final reasons for choosing one company over the other.

6. Next Steps – What will be your next steps in following up on this report as you begin planning for your career. What do you need to do to be ready to begin your job search and choose a company

7. Reference page following APA guidelines 7th edition

Two companies need to be analytical is in the Annotated Bibliography which I attached.
All the resources which you might have no access to, I have attached as pdfs, you must use all the sources from Annotated Bibliography

Part I: To cover in Intro: 

Describe the Doctors pay arrangement/system

Socio/Economic/Legal factors that affect doctors remuneration

Whats there, whats not there.

what other groups getting paid 

what were paid last period what is happening in the economy (inflation, unemployment) AND their actions may affect these other things (The effort-and-reward bargain Extrinsic versus Intrinsic)

Your paper should be based on your own analysis of the primary source readings.
Give the paper a title, centered, underlined, and place it just above the first paragraph.

The 1911 revolution radically ended the Qing dynasty (1644-1911), the last empire of China, and led to, as many intellectuals hoped, a new and modernized country. Lu Xun (Lu Hsun), as a critical thinker who lived during this period, observed and experienced the political, social, and cultural transformations. As you saw from his stories, Lu Xun felt himself to be part of a new culture/society but founds himself living in a culture/society that was old. In this paper, use Lu Xuns stories (The New Years Sacrifice, My Old Home, and Regret for the Past), to discuss the impact of the 1911 revolution on Chinese society. You need to identify at least three contradictions/changes/problems that the revolution brought to China.  These contradictions/changes/problems might be relevant to the issues such as urban-rural differences, gender and family relations, Chinas traditional ideology, class differences, the gap between ideal and reality, and etc. You need to locate three or more scenes from Lu Xuns stories and use them as evidence to support your points. You should plan to summarize the scenes and quote directly from the stories, using footnotes to cite your evidence.

Footnote your quotations and your use of information or ideas derived from any other writer. Your first citation to a source should provide the author’s full name; the full title of his or her work; and (for published books and articles) the place and date of publication; and the specific page or pages. In subsequent citations of that source you need use only the author’s last name, a brief version of his title, and the page number.
NOTE: please locate your footnote number at the end of a sentence, not in the middle.

You must reply to at least three colleagues in a manner that extends the discussion. A simple “I agree/disagree” will not be accepted. respond in a manner that further extends the discussion.

post 1

Hedging is something that I have found very fascinating in the past and believe that it is a very important aspect of investing.  Hedging is defined as an investment that is made with the intention of reducing the risk of adverse price movements in an asset. Normally, a hedge consists of taking an offsetting position in a related security.  There are many different hedging strategies with different benefits and downsides.  Buying call options is one very important hedging strategy to utilize.  Call options themselves don’t generate financial gains in a falling market, however, they reduce losses.  A call option is a contract, between the buyer and the seller of the call option, to exchange a security at a set price.  This can help an investor be able to maintain that set price on a security in a time of market volatility, while also keeping the potential upside of that security if the market is to surge. 

https://seekingalpha.com/article/4132044-upsides-and-downsides-of-4-popular-hedging-strategies

post 2

In todays highly globalized world, companies operate all over the world depending on where costs would be less than their domestic market. However, changes in foreign currency exchange rates can increase losses or reduce profits. Options can be a very smart strategy to implement in order to mitigate risks with foreign currency. For example, Boeing would benefit from hedging due to their global positioning. According to Junu Kim at Boeing, the companys executives request quotes with foreign suppliers and manufacturers in both US dollars and the foreign currency with hedging to negotiate savings of between five and ten percent (Kim, n.d.).

          Specifically, if Boeing has a contract to pay 10 million in Japanese yen in 6 months, and they believe the yen will appreciate compared to the US dollar, they can purchase a call option to minimize the loss of the appreciating yen. If the exchange rate is currently 1 USD: 111.58 YEN, Boeing could purchase a call option for 105 YEN for 6 months. If the YEN increases to 95, Boeing could purchase 10 million in Japanese yen for $95,238.10 instead of the regular exchange price in 6 months of $105,263.16. This would be a savings of more than $10,000 USD (less the cost of the premium) which would obviously be preferable to Boeing.

Kim, J. How Treasury is supporting Boeing’s efforts to expand its global presence. https://www.boeing.com/news/frontiers/archive/2003/august/i_fof1.html.

post 3

Hedging a portfolio is something that I have had some experience in during a previous finance class. Hedging is attempting to diversify the risk out of a portfolio or at least minimize the risk to a portfolio. There are many methods to hedge the risk of a product, but the method should depend on the product. For example, if I were to try to hedge the price of coffee for a company because  there is a risk of price increase due to rain patterns, I would hedge the price of coffee for a company by purchasing futures contracts on coffee now to lock in prices. However, this can be risky if it is a different industry like the oil. Oil hedging was common for airlines prior to the pandemic but now the price of hedging is getting more expensive. The article below says that the pandemic and the resulting plunge in air travel have caused airlines to largely abandon oil hedges against higher oil prices, thus making it more expensive for oil producers to lock in higher oil prices on the options market (Kennedy, C. ,2020). Premiums for the puts and calls are rising in the oil market because the risk is going up. It seems to be worth it to pay higher premiums to protect an investment in fuel but not worth it if the fuel never gets used.

References

Kennedy, Charles (2020, Oct.9) Air Travel Collapse Makes Oil Hedges More Expensive. Oil Price.com. Web. Retrieved on Nov. 5, 2020 from <https://oilprice.com/Latest-Energy-News/World-News/Air-Travel-Collapse-Makes-Oil-Hedges-More-Expensive.html>

Explore and explain each of the following items in your initial response:

1. Using critical thinking explain how crime analysis using GIS mapping technology may be applied to a crime of your choice e.g., serial serial rapist etc. In doing so, discuss at least one Crime-Mapping Strategy discussed in the literature and how you would use it.

2. Is crime mapping an effective tool in combating crime?  Why?  Describe how crime mapping can be used to support tactical operations.

For this case study, you will compose a 2-3 page paper that addresses the following:
Select an issue or problem that exists (or has existed) within the topic of Employee and Labor Relations
Provide a brief overview of the issue/problem (typically, the background information is one paragraph)
Detail and elaborate the specific laws and regulations associated with the topic or concept
Based on your understanding of human resources gained in this and previous courses, discuss how the organization should resolve (or should have resolved) the issue or problem.
You must use at least one citation from the course materials (or previous course materials) and clearly state how your proposed strategy would have resolved the issue.
The paper is graded based on completeness of the exercise. Professionalism, grammar, and spelling are considered as criteria for grading, including proper APA for all sources used. Include headings in the work to identify each area discussed.

The Gothic period illustrates that there are no precise dates for the ending of one style and the beginning of another. However, this was a time of rich decorative motifs and beautiful cathedrals that was directly influenced by the Romanesque era and will also be repeated in later times. 

Choose one Romanesque Cathedral (Canterbury Cathedral) and Gothic Cathedral (Notre Dame) to compare and/or contrast and explain how the later Gothic example is reflective of your Romanesque example. 

Analyze the interior and exterior of both buildings and use specific terminology to describe both in a three-paragraph minimum essay.  How many stylistic similarities can you find?  What differences do you observe?  Pay particular attention to the use of sculpture as exterior adornment. How does the sculpture relate to its context?  Please provide jpeg images to illustrate your examples.

Make sure to include a list of your research sources and sources for your images and to provide critique/responses to your classmates work.

Week 4 Readings and Media

Please review the following for this week:

    Vic (J.R.) Winkler, Securing the Cloud, Cloud Computer Security Techniques and Tactics, 2011, Chapter 4
    Mell P, Grance T. The NIST Definition of Cloud Computing Version 15; 2009, National Institute of Standards and Technology, Information Technology Laboratory.
    Ross, R, et al. NIST Special Publication 800-53 Revision 4, Recommended Security Controls for Federal Information Systems, Computer Security Division Information, Technology Laboratory, National Institute of Standards and Technology Gaithersburg, MD 20899-8930.

—————————————————————————————-

Week 4 ASSIGNMENT: (3 pages)

Write the answers in a separate document that you can upload (e.g., Microsoft Word file). Precede each answer with the question and its corresponding number.

Some threats to virtualized systems are general in nature, as they are inherent threats to all computerized systems (such as denial-of-service, or DOS, attacks). Other threats and vulnerabilities, however, are unique to virtual machines. Many VM vulnerabilities stem from the fact that a vulnerability in one VM system can be exploited to attack other VM systems or the host systems, as multiple virtual machines share the same physical hardware.  Various organizations have conducted security analysis and proof-of- concept (PoC) attacks against virtualized systems, and their research regarding security in virtual environments highlights some of the vulnerabilities exposed to any malicious-minded individuals.  Some of these attacks are listed below.  Please provide a description of each of these attacks as they relate to VMs:

1.    Shared clipboard (1/2 page)
2.    Keystroke logging (1/2 page)
3.    VM monitoring from the host (1/2 page)
4.    Virtual machine monitoring from another VM (1/2 page)
5.    Virtual machine backdoors (1/2 page)
—————————————————————————————-
Week 4 DISCUSSION: Cloud Architecture Security (1 page)

Write one page using this weeks reading and media. APA Format and provide two references at a minimum.

VM sprawl is a general term describing the propagation of virtual systems across the enterprise in an uncontrolled way. Rogue machines can consume resources and bandwidth as well as present new vulnerabilities with virtual machines that are not being patched and monitored.  Forensics cannot be conducted in the virtual environment in which these machines arent even visible to the organization. Should an event occur, organizations need to not only know what part of the network is affected, but also be able to roll back network and system records in time to determine what happened.

Please give your thoughts on what types of tools and/or technical approaches might be useful to address these situations.

Explore and explain each of the following items in your initial response:

1. Using critical thinking explain how crime analysis using GIS mapping technology may be applied to a crime of your choice e.g., serial serial rapist etc. In doing so, discuss at least one Crime-Mapping Strategy discussed in the literature and how you would use it.

2. Is crime mapping an effective tool in combating crime?  Why?  Describe how crime mapping can be used to support tactical operations.