Sunday, January 26, 2020

Review of Data Duplication Methods

Review of Data Duplication Methods Mandeep Singh Abstract: -The cloud storage services are used to store intermediate and persistent data generated from various resources including servers and IoT based networks. The outcome of such developments is that the data gets duplicated and gets replicated rapidly especially when large numbers of cloud users are working in a collaborative environment to solve large scale problems in geo-distributed networks. The data gets prone to breach of privacy and high incidence of duplication of data. When the dynamics of cloud services change over period of time, the ownership and proof of identity operations also need to change and work dynamically for high degree of security. In this work we will study the concepts; methods and the schemes that can make the cloud services secure and reduce the incident of data duplication with use of cryptography mathematics and increase potential storage capacity. The purposed scheme works for deduplication of data with arithmetic key validity operations that redu ce the overhead and increase the complexity of the keys so that it is hard to break the keys. Keywords: De-duplication, Arithmetic validity, proof of ownership. INTRODUCTION Organizations that focus on providing online storage with strong emphasizes on the security of data based on double encryption [1] (256 bit AES or 448 bit), managed along with fish key algorithm and SSL encryption [2] based connections are in great demand. These organizations need to maintain large size data centers that have a temperature control mechanism, power backups are seismic bracing and other safeguards. But all these safeguards, monitoring and mechanism becomes expensive, if they do not take care of data duplication issues and problems related to data reduction. Data Deduplication [3] occurs especially when the setup is multi-users and the users are collaborating with each others work objects such as document files, video, cloud computation services and privileges etc. and volume of data grows expensively. In a distributed database management systems special care is taken to avoid duplication of data either by minimizing the number of writes for saving I/O bandwidth or de normalization. Databases use the concept of locking to avoid ownership issues, access conflicts and duplication issues. But even as disk storage capacities continue to increase and are becoming more cheaper, the demand for online storage has also increased many folds. Hence, the cloud service providers (CSP) continue to seek methods to reduce cost of DE-duplication and increase the potential capacity of the disk with better data management techniques. The data managers may use either compression or deduplication methods to achieve this business goal. In broad terms these technologies can be classified as data reduction techniques. The end customers are able to effectively store more data than the overall capacity of their disk storage system would allow. For example a customer has 20 TB storage array the customer may bet benefit of 5:1 which means theoretically 5 times the current storage can be availed. [(5*20 TB) = 100 TB]. The next section defines and discussed data reduction methods and issues of ownership to build trustful online storage services. Fig: Deduplication Process The next section defines and discussed data reduction methods and issues of ownership to build trustful online storage services. The purpose is to obtain a reducedrepresentation of a data set file that much smaller in volume yet provide same configure even, if the modified data in a collaborative environment. The reduced representation does not necessarily means a reduction in size of the data, but reduction in unwanted data or duplicates the existence of the data entities. In simple words the data reduction process would retain only one copy of the data and keep pointers to the unique copy if duplicates are found. Hence data storage is reduced. Compression [4]: It is a useful data reduction method as it helps to reduce the overall resources required to store and transmit data over network medium. However, computational resources are required for data reduction method. Such overhead can easily be offset due to the benefit it offers due to compression. However, an subject to the space time complexity trade off; for example, a video compression may require expensive investment in hardware for its compression-decompression and viewing cycle, but it may help to reduce space requirements in case there is need to achieve the video. Deduplication [3]: Deduplication is processed typically consist of steps that divide the data into data sets of smaller chunk sizes and use an algorithm to allocate each data block a unique hash code. In this, the deduplication process further find similarities between the previously stored hash codes to determine if the data block is already in the storage medium. Few methods use the concept comparing back up to the previous data chunks at bit level for removing obsolete data. Prominent works done in this area as follows: Fuse compress compress file system in user space. Files-depot Experiments on file deduplication. Compare A python-based deduplication command line tool and library. Penknife its used to DE duplicate informations in shot messages Opendedup A user space deduplication file system (SDFS) Opendedupe A deduplication based filesystem (SDFS) Ostor Data deduplication in the cloud. Opensdfs A user space deduplication file system. Liten Python based command line utility for elimination of duplicates. Commercial: 1). Symantec 2). Comm Vault. 3). Cloud Based: Asigra, Baracuda, Jungle Disk, Mozy. Before we engross further into this topic, let us understand the basic terms involved in the DE duplication process having in built securely features. Security Keys [5]: The security keys mainly consist of two types, namely first is Public Key and second is Private Key. The public keys are essentially cryptographic keys or sequences that can be obtained and used by anyone to encrypt data/messages intended for particular recipient entity and can be unlocked or deciphered with the help of a key or sequence in knowledge of recipient (Private Key). Private Key is always paired with the public key and is shared only with key generator or initiator, ensuring a high degree of security and traceability. Key Generation: It is a method of creating keys in cryptography with the help of algorithms such as a symmetric key algorithm (DES or AES) and public key algorithm (such as RSA) [6]. Currently systems such as TLS [7], SSH are using computational methods of these two. The size of the keys depends upon the memory storage available on (16, 32, 64, 128 bits) etc. Key Distribution: Before, any authentication process can happen both the parties need exchange the private and public keys. In typical public key cryptography, the key distribution is done using public server keys. The key generator or initiator keeps one key to himself/herself and uploads the other key to server. In case of SSH the algorithm used is Diffie-Hellman key [6] exchange. In this arrangement, if the client does not possess a pair of public and private key along with published certificate. It is difficult for the client to proof ownership. The Figure [1] shows the life cycle of Keys used for the sake of security. Fig 1: Life Cycle of Key Key Matching and Validation: Since, in most cases the private key is intended to reside on the server. And, the key exchange process needs to remain secure with the use of secure shell, this is a need to have a robust key matching algorithm so that no spoofing or manipulation occur in transient. Moreover, it is always recommended that a public key validation must be done before these keys are put into operation. Public key validation tests consist of arithmetic test [8] that ensure that component of candidate informs to key generation standard. Hence, a certificate authority [9] (CA) helps in choosing the trusted parties bound by their individual identities with the help of public key. This is stated in Certificate Produce Standards. Some third party validators use the concept of key agreements and others may use the concept of proof of possession mechanism. In POP mechanism [10], for the proper establishment of keys, the user interacting is required to work with CA using a natural function of the keys (either key agreement for encryption) or by using zero-proof knowledge algorithms [11] to show possession of private key. POP shows that user owns the corresponding private key, but not necessarily, that the public key is arithmetically valid. The Public key validation (PKV) methods show that public key is arithmetically valid, but not necessary that anyone who owns the corresponding key. Combination of these (POP and PKV) methods gives a greater degree of security confidence that can be useful for Deduplication operation. However, the only issues needs to be addressed is the overhead involved in public key validation. Improvements in arithmetic validity test can be done to improve the validation process, especially in concept of DE duplication area; where the message to be encrypted in data chunks and need to arithmetic validation and proof of ownership is to be done multiple times due to the collaborative nature of the data object. Most of the arithmetic tests validity are based on the generation and selection of prime numbers. It was in late 1989s many people came up with an idea of solving key distribution problem for exchanging information publicly with a use of a shared or a secret cipher without someone else being able to compute the secret value. The most widely used algorithms DiffieHellman key exchange takes advantage of prime number series. The mathematics of prime numbers (integer whole numbers) shows that the modulus of prime numbers is useful for cryptography. The Example [Table no. 1] clearly illustrates the prime number values gets the systematically bigger and bigger, is very usefu l for cryptography as it has the scrambling impact. For example: Prime Numbers in Cryptography and Deduplication: Prime numbers [13] are whole numbers integers that have either factors 1 or same factor as itself. They are helpful in choosing disjoint sets of random numbers that do not have any common factors. With use of modular arithmetic certain large computations can be done easily with reduced number of steps. It states that remainder always remain less than divider, for example, 39 modulo 8, which is calculated as 39/7 (= 4 7/8) and take the remainder. In this case, 8 divides into 39 with a remainder of 7. Thus, 39 modulo 8 = 7. Note that the remainder (when dividing by 8) is always less than 8. Table [1] give more examples and pattern due this arithmetic. 11 modulus 8=3 17 modulus 8=1 12 modulus 8=4 18 modulus 8=2 13 modulus 8=5 19 modulus 8=3 14 modulus 8=6 20 modulus 8=4 15 modulus 8=7 21 modulus 8=5 16 modulus 8=0 So onà ¢Ã¢â€š ¬Ã‚ ¦. Table 1: Example of Arithmetic of modus To do modular addition [14], two numbers are added normally, then divided by the modulus and get the remainder. Thus, (17+20) mod 7 = (37) mod 7 = 2. The next section illustrates, how these computations are employed for cryptographic key exchange with typical example of Alice, Bod and Eva as actors in a typical scenario of keys exchange for authentication. Step1: Sender (first person) and receiver (second person) agree, publicly, on a prime number X, having base number Y. Hacker (third person) may get public number X access to the public prime number. Step 2: Sender (first person) commits to a number A, as his/her secret number exponent. The sender keeps this secret. Receiver (second person), similarly, select his/her secret exponent. Then, the first person calculates Z using equation no. 1 Z = YA (mod X) à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (1) And sends Z to Receiver (second person). Likewise, Receiver becomes calculate the value C using equation no. 2 Z= YB (mod X) à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ (2) And sends C to Sender (first person). Note that Hacker (third person) might have both Y and C. Step 3: Now, Sender takes the values of C, and calculate using equation no. 3 CA (mod X). à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (3) Step 4: Similarly Receiver calculates using equation no. 4 ZB (mod X). à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. (4) Step 5: The value they compute is same because K = YB (mod X) and sender computed CA (mod X) = (YB) A (mod X) = YBA (mod X). Secondly because Receiver used Z = YA (mod X), and computed ZB (mod X) = (YA) B (mod X) = YAB (mod X). Thus, without knowing Receivers secret exponent, B, sender was able to calculate YAB (mod X). With this value as a key, Sender and Receiver can now start working together. But Hacker may break into the code of the communication channel by computing Y, X, Z C just like Sender and Receiver. Experimental results in cryptography, show that it ultimately becomes a discrete algorithm problem and consequently Hacker fails to breaks the code. The Hacker does not have any proper way to get value. This is because the value is huge, but the question is how did sender and receiver computed such a large value, it is because of modulus arithmetic. They were working on the modulus of P and using a shortcut method called repeated squaring method. The problem of finding match to break the code for the hacker becomes a problem of discrete algorithm problem. [15] From the above mention in this paper, it can be deduced that the athematic validity part of the security algorithm computations can also be improved by reducing number of computational steps. For this purpose Vedic mathematical methods such as [17], especially where the resources (memory to store and compute) keys are constrained. Example: Base Type Example on how compute exponents using Vedic Maths If the base is taken less than 10 9^3= 9-1 / 1ÃÆ'-1 / (1ÃÆ'-9) / 1ÃÆ'-1ÃÆ'-9 = 8 /1 / -9 / 9 = 81 / -9 / 9 = 81 9 / 9 = 72 / 9 = 729 If the base is taken greater than 10 12^3= 12 + 2 / 2 ÃÆ'- 2 / + (2 ÃÆ'- 12) / 2ÃÆ'- 2 ÃÆ'- 12 = 14 / 4 / + 24 / 48 = 144 / +24 / 48 = 144 +24 / 48 = 168/ 48 = 1728 Life Cycle of Data and Deduplication: The life cycle of digital material is normally prove to change from technological and business processes throughout their lifecycle. Reliable re-use of this digital material, is only possible. If the curation, archiving and storage systems are well-defined and functioning with minimum resource to maximum returns. Hence, control to these events in the Life Cycle is Deduplication process and securely of data. Table: 1 recent works in key management applied in De duplication area S. No. Authors Problem undertaken Techniques used Goal achieved Junbeom Hur et al. [1] Build a secure key ownership schema that work dynamically with guaranteed data integrity against tag inconsistency attack. Used Re-encryption techniques that enables dynamic updates upon any ownership changes in the cloud storage. Tag consistency becomes true and key management becomes more efficient in terms of computation cost as compare to RCE (Randomized convergent encryption). However the author did not focused their work on arithmetic validity of the keys. Although the lot of work has been done on ownership of keys. Chia-Mu Yu et al. [18] Improve cloud server and mobile device efficiency in terms of its storage capabilities and of POW scheme. Used improved of flow of POW with bloom filter for managing memory without the need to access disk after storing. Reduced server side latency and user side latency. Jorge Blasco et al. [19] Improve the efficiency of resources (space, bandwidth, efficiency) and improve security during the DE duplication process. Improved the working of bloom filter implementation for its usage in POW scheme and thwart a malicious client attack for colluding with the legitimate owner of the file. Experimental resources suggest the execution time increase when size of file grows but in case of proposed scheme it helps in building a better trade off between space and bandwidth. Jin Li et al. [20] Build an improved key management schema that it more efficiency and secure when key distribution operation access. The user holds an independent master key for encrypting the convergence keys and outsourcing them to could this creates lot of overhead. This is avoided by using ramp secret sharing (RSSS) and dividing the duplication phase into small phase (first and block level DE duplication). The new key management scheme (Dekey) with help of ramp scheme reduces the overhead (encoding and decoding) better than the previous scheme. Chao Yang et al. [21] Overcome the problem of the vulnerability of client side deduplication operation, especially when the attacker trys to access on authorized file stored on the server by just using file name and its hash value. The concept spot checking in wheel the client only needs to access small functions of the original files dynamic do efficient and randomly chosen induces of the original file. The proposed scheme creates better provable ownership file operation that maintains high degree of detection power in terms of probability of finding unauthorized access to files. Xuexue Jin et al. [11] Current methods use information computed from shared file to achieve. DE duplication of encrypted. Data or convergent encryption into method is Vulnerable as it is based well known public algorithm. DE duplication encryption algorithm are combined with proof of ownership algorithm to achieve higher degree of security during the DE duplication process. The process is also argument with proxy re-encryption (PRE) and digitalize credentials checks. The author achieved anonymous DE duplication encryption along with POW test, consequently the level of protection was increased and attacks were avoided. Danny Harnik et al. [22] Improve cross user (s) interaction securely with higher degree of privacy during DE duplication. The authors have described multiple methods that include:- (a). Stop cross over user interaction. (b). Allow user to use their own private keys to encrypt. (c). Randomized algorithm. Reduced the cost of operation to secure the duplication process. Reduced leakage of information during DE duplication process. Higher degree of fortification. Jingwei Li et al. [23] The authors have worked on the problem of integrity auditing and security of DE duplication. The authors have proposed and implemented two methods via Sec Cloud and Sec Cloud+, both systems improve auditing the maintain ace with help of map reduce architecture. The Implementation provided performance of periodic integrity check and verification without the local copy of data files. Better degree of proof of ownership process integrated with auditing. Kun He et al. [24] Reduce complications due to structure diversity and private tag generation. Find better alternative to homomorphic authenticated tree. (HAT) Use random oracle model to avoid occurrence of breach and constructs to do unlimited number of verifications and update operations. DeyPoS which means DE duplicable dynamic proof of storage. The theoretical and experimental results show that the algorithm (DeyPoS) implementation is highly efficient in conditions where the file size grows exponentially and large number of blocks are there. Jin Li et al. [25] The provide better protected data, and reduce duplication copies in storage with help of encryption and alternate Deduplication method. Use hybrid cloud architecture for higher degree of security (taken based) , the token are used to maintain storage that does not have Deduplication and it is more secure due to its dynamic behavior. The results claimed in the paper shows that the implemented algorithm gives minimal overhead compared to the normal operations. Zheng Yan et al. [26] Reduce the complexity of key management step during data duplication process But implement less complex encryption with same or better level of security. This is done with the help of Attribute Based Encryption algorithm. Reduce complexity overhead and execution time when file size grows as compared to preview work. Summary of Key Challenges Found The degree of issues related to implementation of Crypto Algorithms in terms of mathematics is not that difficult as compared to embracing and applying to current technological scenarios. Decentralized Anonymous Credentials validity and arithmetic validity is need to the hour and human sensitivity to remain safe is critical. In certain cases, the need to eliminate a trusted credential issuers can help to reduce the overhead without compromising the security level whole running deduplication process. Many algorithms for exponentiation do not provide defense against side-channel attacks, when deduplication process is run over network. An attacker observing the sequence of squaring and multiplications can (partially) recover the exponent involved in the computation. Many methods compute the secret key based on Recursive method, which have more overhead as compared methods that are vectorized. Some of the vectorized implementations of such algorithms can be improved by reducing the number of steps with one line computational methods, especially when the powers of exponent are smaller than 8. There is a scope of improvement in reducing computational overhead in methods of computations of arithmetic validity methods by using methods such as Nikhilam Sutra, Karatsuba. CONCLUSION In this paper, sections have been dedicated to the discussion on the values concepts that need to be understood to overcome the challenges in De-duplication algorithms implementations. It was found that at each level of duplication process (file and block) there is a needs for keys to be arithmetically valid and there ownership also need proved for proper working of a secure duplication system. The process becomes prone to attacks, when the process is applied in geo-distributed storage architecture. The complexity for cheating ownership verification is at least difficult as performing strong collision attack of the hash function due to these mathematical functions. Finding the discrete algorithm of a random elliptic curve element with respect to a publicly known base point is infeasible this is (ECDLP). The security of the elliptic curve cryptography depends on the ability to the compute a point multiplication and the mobility to compute the multiple given the original and product po ints. The size of the elliptic curve determines the difficulty of the problem. FUTURE SCOPE As discussed, in the section mathematical methods such as Nikhilam Sutra, Karatsuba Algorithm [27] may be used for doing computations related to arithmetic validity of the keys produced for security purpose as it involves easier steps and reduce the number of bits required for doing multiplication operations etc. Other than this, the future research work to apply to security network need of sensors that have low memory and computational power to run expensive cryptography operations such public key validation and key exchange thereafter. [1] J. Hur, D. Koo, Y. Shin and K. Kang, Secure data deduplication with dynamic ownership management in cloud storage, IEEE Transactions on Knowledge and Data Engineering, vol. 28, pp. 31133125, 2016. A. Kumar and A. Kumar, A palmprint-based cryptosystem using double encryption, in SPIE Defense and Security Symposium, 2008, pp. 69440D69440D. M. Portolani, M. Arregoces, D. W. Chang, N. A. Bagepalli and S. Testa, System for SSL re-encryption after load balance, 2010. W. Xia, H. Jiang, D. Feng, F. Douglis, P. Shialane, Y. Hua, M. Fu, Y. Zhang and Y. Zhou, A comprehensive study of the past, present, and future of data deduplication, Proceedings of the IEEE, vol. 104, pp. 1681-1710, 2016. J. Ziv and A. Lempel, A universal algorithm for sequential data compression, IEEE Transactions on information theory, vol. 23, pp. 337343, 1977. P. Kumar, M.-L. Liu, R. Vijayshankar and P. Martin, Systems, methods, and computer program products for supporting multiple contactless applications using different security keys, 2011. S. Gupta, A. Goyal and B. Bhushan, Information hiding using least significant bit steganography and cryptography, International Journal of Modern Education and Computer Science, vol. 4, p. 27, 2012. K. V. K. and A. R. K. P. , Taxonomy of SSL/TLS Attacks, International Journal of Computer Network and Information Security, vol. 8, p. 15, 2016. J. M. Sundet, D. G. Barlaug and T. M. Torjussen, The end of the Flynn effect?: A study of secular trends in mean intelligence test scores of Norwegian conscripts during half a century, Intelligence, vol. 32, pp. 349-362, 2004. W. Lawrence and S. Sankaranarayanan, Application of Biometric security in agent based hotel booking system-android environment, International Journal of Information Engineering and Electronic Business, vol. 4, p. 64, 2012. N. Asokan, V. Niemi and P. Laitinen, On the usefulness of proof-of-possession, in Proceedings of the 2nd Annual PKI Research Workshop, 2003, pp. 122127. X. Jin, L. Wei, M. Yu, N. Yu and J. Sun, Anonymous deduplication of encrypted data with proof of ownership in cloud storage, in Communications in China (ICCC), 2013 IEEE/CIC International Conference on, 2013, pp. 224229. D. Whitfield and M. E. Hellman, New directions in cryptography, IEEE transactions on Information Theory, vol. 22, pp. 644654, 1976. H. Riesel, Prime numbers and computer methods for factorization, vol. 126, Springer Science Business Media, 2012. R. A. Patel, M. Benaissa, N. Powell and S. Boussakta, Novel power-delay-area-efficient approach to generic modular addition, IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 54, pp. 12791292, 2007. Repeated Squaring, Wednesday March 2017. [Online]. Available: http://www.algorithmist.com/index.php/Repeated_Squaring. [Accessed Wednesday March 2017]. Table of costs of operations in elliptic curves, Wednesday March 2017. [Online]. Available: https://en.wikipedia.org/wiki/Table_of_costs_of_operations_in_elliptic_curves. [Accessed Wednesday March 2017]. Calculating Powers Near a Base Number, Wednesday March 2017. [Online]. Available: http://www.vedicmaths.com/18-calculating-powers-near-a-base-number. [Accessed Wednesday March 2017]. C.-M. Yu, C.-Y. Chen and H.-C. Chao, Proof of ownership in deduplicated cloud storage with mobile device efficiency, IEEE Network, vol. 29, pp. 5155, 2015. J. Blasco, R. D. Pietro, A. Orfila and A. Sorniotti, A tunable proof of ownership scheme for deduplication using bloom filters, in Communications and Network Security (CNS), 2014 IEEE Conference on, 2014, pp. 481489. J. Li, X. Chen, M. Li, J. Li, P. P. Lee and W. Lou, Secure deduplication with efficient and reliable convergent key management, IEEE transactions on parallel and distributed systems, vol. 25, pp. 16151625, 2014. C. Yang, J. Ren and J. Ma, Provable ownership of files in deduplication cloud storage, Security and Communication Networks, vol. 8, pp. 24572468, 2015. D. Harnik, B. Pinkas and A. Shulman-Peleg, Side channels in cloud services: Deduplication in cloud storage, IEEE Security Privacy, vol. 8, pp. 4047, 2010. J. Li, J. Li, D. Xie and Z. Cai, Secure auditing and deduplicating data in cloud, IEEE Transactions on Computers, vol. 65, pp. 23862396, 2016. K. He, J. Chen, R. Du, Q. Wu, G. Xue and X. Zhang, Deypos: deduplicatable dynamic proof of storage for multi-user environments, IEEE Transactions on Computers, vol. 65, pp. 36313645, 2016. J. Li, Y. K. Li, X. Chen, P. P. Lee and W. Lou, A hybrid cloud approach for secure authorized deduplication, IEEE Transactions on Parallel and Distributed Systems, vol. 26, pp. 12061216, 2015. Z. Yan, M. Wang, Y. Li and A. V. Vasilakos, Encrypted data management with deduplication in cloud computing, IEEE Cloud Computing, vol. 3, pp. 2835, 2016. S. P. Dwivedi, An efficient multiplication algorithm using Nikhilam method, 2013.

Friday, January 17, 2020

The Motives for Holding Inventory Explained

In the hustle and bustle of the Christmas season, retailers stock their inventory with dozens of Christmas items in anticipation of the holiday rush. When Christmas has passed, the store is left with Christmas items that did not sell. To make room for the next calendar holiday, the retailer will sell their Christmas overstock at extreme discounts. Whatever doesn’t sell will be restocked in inventory for the next Christmas season. The retailer is able to get a jump-start for the next Christmas season by placing last year’s Christmas inventory out in October. A good business operation understands that there will be times when holding inventory becomes crucial in their success. From not wanting to spend additional funds on restocking, to preparing for fluctuations in market conditions, motives for holding inventory are indispensable in inventory management. There are 4 motives for holding inventory: Production smoothing, inventories as a factor of production, stock-out avoidance, and work in progress (Gregory, 2007). Production smoothing, the first of the four motives, involves preparing for fluctuations in sales, as well as seeking a more economically sound way to continue production. When sales offset production either positively or negatively, inventories will rise or fall. With production smoothing, it is more logical to produce items at a constant rate (Gregory, 2007). The second motive is consideration for inventories as a factor of production. Let’s say that a drama teacher is looking for a Christmas tree in June for his â€Å"Christmas in July† production. The overstock from last year’s Christmas season assists in the retailer not losing business because they restocked Christmas trees that didn’t sell from last year. The third motive, stock-out avoidance, protects a business from contractual risk, as well as lost sales in the event of high demand (Fafechamps, 1997). With contractual risk, both the business and the client run the risk of not adhering to a contract, but in  the way of business, holding inventory provides better odds that the business will have what the client requires in order to conduct business and comply with their contract (Fafechamps, 1997). In addition to this motive, being prepared for unexpected demand is imperative in keeping business. For example, an unexpected freeze in the fall could cause people to shop in droves for firewood. The retailer who does not meet the demand will lose business and retain the reputation of not being sufficiently stocked. The final motive, although not really a motive at all, is work in progress. Any unfinished item in the store must also be counted as inventory (Gregory, 2007). If you have ever walked into a store to buy a specific item and found that the store does not have it in stock, you may avoid the store all together in the future. Holding inventory is important for both the business and the customer. It ensures repeated business and makes for smooth sailing. References: 1.  Ã‚  Ã‚  Ã‚  Ã‚   Gregory, Mankiw & Cronovich, Ron C. (2007) Investments and Inventory. January 2007. www.cwu.edu/~wassellc/ECON%20302/Investment.pdf. 2.  Ã‚  Ã‚  Ã‚  Ã‚   Fafechamp, Marcel, Gunning, Jan W. & Oostendorp, Remco. (1997) Inventory, Liquidity and Contractual Risk in Marketing. January 2007.   

Thursday, January 9, 2020

Midnight in Paris - 2167 Words

Frank Vargas Professor Beverly Whitson English 52 24 March 2014 The Era We Live In What’s one of the worst parts about living life? It can be not being able to find that one true love in life, or even living with regret in your heart. I always hear conversations about people being together with a person they don’t love, or people talking about something they wish they could have done when they had the chance, but were too concerned about another factor in their lives, now having to live life full of regrets. Like Gil Pender says, â€Å"That’s just the era we line in†¦Ã¢â‚¬  In the 2011 film, Midnight In Paris, written and directed by Woody Allen, tells the story of Gil Pender’s, played by Owen Wilson, longing for self-fulfillment and his love†¦show more content†¦According to Rolling Stone Magazines Peter Travers, Wilson’s performance is pitch perfect to capturing the humor and gravity that Gil Pender’s role demanded. I have to agree with Travers because Wilson took on a few scenes where we were able to reco gnize his comedic rooms from other films. USA Today’s Claudia Puig doesn’t applaud Wilson’s performance as I do. She refers to his work to less than convincing of a novelist with a passion for Fitzgerald or Hemingway like he does in the film. Puig argues that unlike his comedy films like Wedding Crashers or Zoolander, Wilson does a mediocre job on the film. Based on the film, Wilson is able to keep the audience thinking and believe that he is a dedicated and talented writer. Pete Hammond of Box Office Magazine, declares Allen’s romantic comedy to be a delightful film giving Gil what he wants every night taking him back to the golden era of 1920’s Paris, to be Wilson’s best work in years. Hammond took the words right out of my mouth; it’s indeed Wilson’s best work since his comedy film, Wedding Crashers. Jon Maguire from Confessions of a Film Critic, sums that Wilson plays a key performance to a film romanticizing Paris’ beauty a good one. Of course I’m not arguing with Maguire, only adding onto what he critiques is that Wilson keeps he audience engaged for the duration of the film keeping us on the edge of our seats. I heart the talkies givesShow MoreRelatedEssay on Midnight in Paris1672 Words   |  7 Pages The star-studded romantic comedy Midnight in Paris is one of Woody Allen’s most recent films which he did both, wrote and directed. It is a film about a man named Gil (Owen Wilson) who travels to Paris with his fiancà ©e’s parents in order to expand his imagination and he ends up embarking on a journey to the 1920s while walking the streets of Paris at night. Not only is this film engaging and witty, but it also manages to provide both, overt and covert examples of postmodernism in film. By analyzingRead MoreBook Review : Midnight Magic By Woody Allen1104 Words   |  5 PagesParis’ Midnight Magic For nearly fifty years, Woody Allen has been writing and directing lucrative films and television shows. One of his most recent productions is a film called Midnight in Paris that has multiple famous actors and actresses playing the main roles. This fantasy film takes place in the most popular city destination, Paris, a city known for its breathtaking sites. The film often alternates between different time periods such as the 1890s and 1920s due to a type of time travel theRead MoreGil Pender Reflection Paper739 Words   |  3 Pagesexperiences of Gil Pender at the end of Midnight in Paris, one might think him mad, intoxicated, dumb, or a mixture of all three. After all, none of what he said could be real, right? However, looking deeper into the knowledge and wisdom that he gained from the supposed escapades he went on, the experiences that Gil Pender may or may not have actually experienced actually seemed to help his piteous life. Here in this gained knowledge and wisdom is where Midnight in Paris displays an epistemological truthRead MoreAnalysis Of Trifles By William Shakespeare849 Words   |  4 Pagesending exposing the women as the true insiders. My group had a really good claim and supportive evidence to back it up throughout the PowerPoint. Our style was very creative and very humorous. Group 1 decided to do â€Å"Midnight in Paris† their claim was that, Midnight in Paris, directed by Woody Allen, effectively challenges the viewer’s notion of insiders and outsiders through the portrayal of the main character, Gil Pender, a Hollywood screenwriter and self-proclaimed â€Å"old soul† struggling withRead MoreA Little Over A Year Ago941 Words   |  4 PagesA little over a year ago, I was lucky enough to take a trip to Europe. The first destination, Paris. Arriving at Paris may have been the most exhilarating experience I have ever felt. All my life, I wanted to visit Europe and feel its history around me, and there I was standing there ready to take it all in. Besides, I may have watched Midnight in Paris, with Owen Wilson, Rachel McAdams and Tom Hiddleston (my love for the Hiddles is real), for like the tenth time before the flight. However, it neverRead MoreSummary Of Juliet And The Nurse 1232 Words   |  5 Pagesgreat wife, and that she needs to consider marrying Paris. Juliet seems to be a little confused I see. As she still looks around in astonishment, â€Å"who is this Paris you speak of.† Lady Capulet explains them that Paris is a handsome young man from the next town over, has come to your father asking him if he can marry you. Juliet gets very upset, â€Å"You can’t just decide this for me! I am too young to get married, I’m not ready. I dont even know this Paris boy, how do you expect me to spend the rest of myRead MoreSamuel Beckett ¨s Novel Molloy and Its Particular Style, Theme and Similarities to Author James Joyce1214 Words   |  5 Pagescondition deteriorates, eventually forcing him to rely on a crutch much like Molloy. This breakdown is also reinforced narratively by a shift in Moran’s tone over the course of the novel’s second half. Consider, for instance, the opening paragraph: It is midnight. The rain is beating on the windows. I am calm. All is sleeping. Nevertheless I get up and go to my desk. I can’t sleep. My lamp sheds a soft and steady light. I have trimmed it. It will last till morning. I hear the eagle-owl. What a terrible battle-cryRead MoreThe Paris Peace Accord945 Words   |  4 Pages The Paris Peace Accords were negotiated between the United States and North Vietnam on January 1973. It was intended to establish peace in Vietnam and end the Vietnam War. The United States would end any direct U.S. military involvement, and it temporarily stopped the fighting between North and South Vietnam. The settlement included a cease-fire throughout Vietnam. In addition, the United States agreed to the withdrawal of all U.S. troops and advisors and the permanent deactivation all of theRead MoreEssay about Rapid Changes During the Jazz Age755 Words   |  4 Pagessigned. Following Armistice Day a new era began. New ideas and trends swept over the world after WWI in the era called the Jazz Age. During the Jazz Age, Paris became the center of the artistic movement. Artists of all sorts from every corner of the globe traveled to Paris. Ernest Hemingway was there during this time, and his life in 1920s Paris is documented in his memoir A Moveable Feast. Along with Hemingway, F. Scott and Zelda Fitzgerald, Salvador Dali, Pablo Picasso, and Cole Porter were allRead More The Peopls Princess Essay1449 Words   |  6 PagesWilliam and Prince Henry. nbsp;nbsp;nbsp;nbsp;nbsp;The tragic death of Diana, Princess of Wales occurred on Sunday August 31, 1997; following a car accident in Paris, France. The vehicle in which the Princess whas tracelling was involved in a high-speed accident in the Place de lAlma underpass in certral Paris shortly before midnight on Saturday August 30th. The Princess was taken to the La Pitie Salpetriere Hospital, where she underwent two hours of emergency surgery before being declared deceases

Wednesday, January 1, 2020

Julius Caesar Character Analysis - 842 Words

When it comes down to identifying true friends, not everyone will show loyalty in the same way. In the play Julius Caesar by William Shakespeare, Brutus and Antony have flaws and varying beliefs which led them down different paths, as well as individual ways of displaying this ardent behavior. Everyone has different faults or quirks that can get in the way and cause us to do some pretty hurtful things. But Shakespeare shows us that although these flaws produce bad outcomes, they might have more positive intentions. Brutus wants to help as many people as he could, whereas Antony believes that under Caesar, Rome could be great. So he decides to defend Caesar rather than join Brutus. They both have good intentions and chose the route they†¦show more content†¦Antony goes out of his way to argue for and defend Caesar at his funeral by giving a speech to the people, â€Å"...I thrice presented him a kingly crown/ Which he did thrice refuse...You all did love him once, not withou t cause:/What cause withholds you then to mourn for him?† (3.2.97-106). He tells the people that he was more honorable than Brutus made him out to be, and that under his rule Rome would have prospered. Even though Antony does these things, later on in the play he starts doing more for himself rather than for Caesar’s legacy. He swears vengeance on the people, even after he knows that Caesar loved them. He believes he is helping Caesar and â€Å"getting vengeance’, but in reality he is just betraying Caesar’s values without realizing. Although they both disagreed on some things, Antony and Brutus had a common theme: they both fought for what they believed in. When someone is loyal to a person, they do everything in their power to protect and support them, and that’s exactly what they did. In society, believing in oneself, and speaking up for one’s own beliefs is considered an admirable trait, and many strive for it. Although it can be positive in the fact that a person speaks their own mind and shares their ideas, but it can also have adverse outcomes. In the case of Brutus and Antony for example, they ended up starting a war just because they were battling for their values. One can have varying opinions on who was in the wrong, but toShow MoreRelatedCharacter Analysis of Julius Caesar1421 Words   |  6 PagesJulius Caesar Character Analysis Cassius Strengths and Weaknesses Cassius was one of the conspirators against Cesar and proves to be a powerful character in Shakespeares, Julius Caesar. He has much strength and very few weaknesses and this helped him achieve small goals that led to his main goal of killing Caesar. One of Cassius strengths is his ability to influence people using flattery and pressure. In Act 1, Scene 2, Cassius demonstrates this strength by influencing Brutus to think moreRead MoreJulius Caesar Character Analysis Essay1017 Words   |  5 Pages The author of Julius Caesar is William Shakespeare, an English poet, playwright, and actor, widely regarded as the greatest writer in the English language. He was born on July 13 in 1564 and died in 1616. It was written to be a tragedy and was one of the seventh plays written off true events that happened in Roman time. Also includes Coriolanus, Antony, and Cleopatra. Drama of the play focuses on Brutus’ struggle between the conflicting demands of honor, patriotism, and friendship. Opens with â€Å"twoRead MoreJulius Caesar Character Analysis1332 Words   |  6 PagesBrutus’s Wife Of all female characters in Shakespeare, few possess the vigor and assertion that Portia demonstrates in Shakespeare’s classic political tragedy, Julius Caesar. Overshadowed by all of the chaos and unrest in the life of our protagonist, Brutus, a complex emotional and ethical journey is taking place, represented by Portia, Brutus’s wife. Portia exists in the text to shed light and understanding on an arch that isn’t always as apparent to the audience. In production of the play, directorsRead MoreJulius Caesar Character Analysis899 Words   |  4 PagesApparently, the North Star is also a pincushion. William Shakespeare’s play Julius Caesar, is about the assassination of the titular future king and the aftermath of this event. Julius Caesar was loved by all the common people but hated by the aristocracy. Many characters in this play end up dying due to this event. Many of them had thought themselves immortal. As a genius playwright, Shakespeare was able t o include hidden messages in his plays. In this specific play, he was able to demonstrateRead MoreJulius Caesar Character Analysis852 Words   |  4 Pagesdislike people. In this play, Julius Caesar, there were many different characters with many different personalities. I believe that Soothsayer is the most honorable character, and I believe that Brutus is the most corrupt. I believe that Soothsayer is the most honorable character for multiple reasons. One reason I believe this is because he tried to warn Caesar two times about the Ides of March. Caesar marked him as unimportant, and he ignored Soothsayer. Despite Caesar saying he was unimportant, heRead MoreJulius Caesar Character Analysis1546 Words   |  7 Pagesmight, or will, start taking advantage of them. In one of Shakespeare’s plays, The Tragedy of Julius Caesar, it demonstrates that being too trusting of someone could end with bad consequences. In The Tragedy of Julius Caesar, one of the main characters, Brutus, trusted his best friend, Cassius, with everything. Brutus trusted that Cassius was right about him being a new ruler of Rome, how killing Caesar would make a safer and better living space for the community, and that the people would supportRead MoreJulius Caesar Character Analysis785 Words   |  4 Pageslanguage† (Keach 253). In the play Julius Caesar, William Shakespea re uses metals to add emphasis to the play. These references to metal are used in the play as a form of characterization, as a way to establish the mood, and as a way to explain the ideas of the characters. The characterization helps the audience to have a better understanding of the characters and their personalities, the mood further explains what the characters are feeling in relation to Caesar and his death, and they emphasizeRead MoreJulius Caesar Character Analysis2014 Words   |  9 PagesJulius Caesar is a play about the death of Julius Caesar and how his death affects the Roman Empire. The play was written in 1599 by William Shakespeare. Even though the play is about Julius Caesar, the main character isn’t Julius Caesar, but really is Brutus. Brutus deals with internal conflict during the play because at first he doesn’t want to cause any harm to his emperor but Cassius convinces him that the other senators and he should do something about Caesar. Cassius is another senator forRead MoreJulius Caesar Character Analysis Essay834 Words   |  4 Pageswas once a friend that ended up costing someone’s life. In the play Julius Caesar the entire situation gets out of hand, Caesar had still thought his true friend, Cassius, was loyal to him. Cassius is to be known of betraying, his once good friend, Caesar. Even someone as loyal as one may think, everyone’s potential can be unexpected and hazardous. The situation gets even more out of control as Cassius decided to deceive Caesar, only then to hurt him in the end. Cassius appears to be a threat, althoughRead More Brutus Character Analysis in Shakespeares Tragedy of Julius Caesar964 Words   |  4 PagesCharacter Analysis: Brutus William Shakespeares play, The Tragedy of Julius Caesar, was mainly based on the assassination of Julius Caesar. The character who was the mastermind behind the assassination was, ironically, Marcus Brutus, a senator and close friend to Julius Caesar. But what would cause a person to kill a close friend? After I examined Brutus relationship towards Caesar, his involvement in the conspiracy and his importance to the plot it all became clear. Brutus had one particular