Sunday, January 26, 2020

Antivirus Research And Development Techniques

Antivirus Research And Development Techniques Antivirus software is the most booming product which has constant developments to be most up to date defensive detecting product competing with all other antivirus software products available in the commercial market. This thesis covers few techniques used by the antivirus products, a general background information about viruses and antivirus products, some research made on antivirus overheads which shows what overheads are introduced to the computer on using an antivirus products, a research made on one of the most important and common technique used by the antivirus software products to detect viruses which is signature based detection, also covers how antivirus software is updated and how new virus signatures are updated to the virus database. There is some research also on selected algorithms used by the techniques, here in this thesis it is explained how each selected algorithm works to detect the code or a file as an infected file or uninfected. In the experimentation, the expe riment is done to detect a virus using three selected popularly known antivirus software products, where reports shown by the three products are compared and concluded. Chapter 1: Introduction A life without computers cannot be imagined in the present life style where it plays a very important role though it might be any field one chooses from the millions. Computer is vulnerable to attacks which are most dangerous and hard to handle with. Just like humans even computers are attacked by viruses. A virus can be in a form of worm, malware or Trojan horses anything that infects the computer. The common source of these viruses is World Wide Web where a malicious person can spread the malware very easily. Many researchers found many methods or procedures to stop the attacks of virus that came up with many techniques or software to remove the viruses which are called Anti-Virus software. A computer virus spreads into the computer through emails, floppy disks, internet and many other sources. The spreading mechanism is usually from one computer to another where it corrupts data or deletes the data from the computer. The viruses mostly spread through internet or through emails which may have some hidden illicit software where the user unknowingly downloads the material into the computer. A virus can attack or cause damage to boot sector, system files, data files, software and also on system bios. There are many newer viruses which attack on many other parts of the computer. Viruses can spread by booting the computer using the infected file, executing or installing the infected file, or by opening the infected data or file. The main hardware sources can be floppy disks, compact disks, USB or external hard drives or a connection with other computer on an unsafe medium. This rapid growth of viruses is challenging the antivirus software in different fields like prevention of viruses, preparation, detection, recovery and control of viruses. Nowadays there are so many antivirus software tools that remove viruses from the PC and helps protect from future attacks. Antivirus raises privacy and security issues of our computers we work on which is a major issue. However, after taking so many safety measures the growth of viruses is rapidly increasing which are most dangerous and wider. In this thesis, a history on viruses and evolution of antivirus software is shown where I will explain about how viruses came into existence and what type of viruses evolved and antivirus software discovery. This general criteria of this thesis is mainly targeted on three selected techniques and is mostly concentrated one technique out of the selected three techniques and scanning methods of antivirus products and also gives a basic scenario of how an antivirus product adopts a framework to update the virus database and also gives some information about how a general computer gets an information to update the product to make it ready to defend against the zero-day viruses. A brief comparison of viruses based on types where the definitions and related threats of viruses will be explained and the working effects of each type of viruses are explained. The working of antivirus software on different types of viruses is explained. Analysis of the current antivirus techniques, showing both advantages and disadvantages. In chapter 2 gives you the general outline of the thesis in which you can know a general history of the viruses, evolution of the antivirus software. A definition to the virus, types of viruses, the most common methods or techniques used. In chapter 3 Literature Review, shows the research and review of some selected papers or literature that I found interesting about w antivirus software. In this chapter, there is research in which some antivirus products, techniques and algorithms compared according to the developments in the recent times. Chapter 4 Experimentation part of the thesis where the comparison of different commercial antivirus products based on their efficiency to detect a virus is shown and also the results are based on false positives, false negatives and hit ratios shown by each antivirus product. Chapter 5 Conclusion concludes the thesis summarizing research and experimentation done on antivirus products. Appendix holds relevant information about the undefined key words or frameworks used in this thesis. Chapter 2 Overview This chapter gives general information about the viruses and antivirus giving some basic information about the virus history and when the antivirus software evolved. There different types of viruses and are classified according to the attacking features. This chapter will lead to better understanding of the techniques used by the antivirus products and also gives you basic knowledge about different antivirus products. 2.1 History of Viruses The computer virus is a program that copies itself to the computer without user permission and infects the system (Vinod et al. 2009). Virus basically means an infection which can be of many types of malware which include worms, trojan horses, rootkits, spyware and adware. The first work on computer programs was done by John Von Neumann in 1949 (wiki 2010). In his work he suggested that a computer program (the term virus was still not invented) can self-reproduce. The first virus was discovered in early 1990s which is Creeper virus. Creeper copies itself to other computers over a network and shows messages on the infected machine: IM THE CREEPER: CATCH ME IF YOU CAN. It was harmless but to catch the Creeper and stop it the Reaper was released. In 1974 Rabbit a program that spreads and multiples itself quickly and crashes the infected system after it reaches a certain limit or number of copies. In 1980s the virus named Elk Cloner has infected many PCs. The Apple II computer which was released in 1977 loads its operating system from the floppy disks, using these characteristics the Elk Cloner installed itself to the boot sector of the floppy disk and was loaded already before the operating system. Â ©Brain was the first stealth IBM-compatible virus. This stealth virus hides itself from being known and when detected it attempts to read the infected boot sector and displays the original, uninfected data. In 1987 the most dangerous virus got into news was Vienna virus which was first to infect the .COM files. Whenever the infected file was called it infects the other .COM files in the same directory. It was the first virus that was successfully neutralized by Bernd Fix and which leads to the idea of antivirus software. Then there were many viruses which were Cascade virus the first self-encrypting virus, Suriv Family virus which was a memory resident DOS file virus. Extremely dangerous virus was Datacrime virus which destructs FAT tables and cause loss of data. In 1990s there was Chameleon Virus, Concept virus and then CIH virus and in 2000s there were ILOVEYOU virus, My Doom Sasser. (Loebenberegr 2007) Vinod et al. 2009 defines computer virus as A program that infects other program by modifying them and their location such that a call to an infected program is a call to a possibly evolved, functional similar, copy of virus. To protect from the attacks, the antivirus software companies include many different methodologies for protecting against the virus attacks. 2.2 Virus Detectors The virus detector scans the file or a program to check whether file/program is malicious or benign. In this research there will be usage of some technical terms and detection methods which are defined below. The main goal for testing the file/program is to find for false positives, false negatives and hit ratio.(Vinod et. al. 2009) False Positive: This takes place when the scanner detects a non-infected file as a virus by error. They can be a waste of time and resources. False Negatives: This occurs when the scanners fail to detect the virus in an infected files. Hit Ratio: This happens when the virus scanner scans the virus. Detections are based on 3 types of malware which are: Basic In basic type the malware attacks the program at the entry point as shown in the figure 2.2.1. The control is transferred to virus payload as the entry point itself is infected. Infected Code Main Code Entry Infected by virus Figure 2.2.1 Attacking system by basic malware. (Vinod et al 2009) Polymorphic Polymorphic viruses are viruses which mutates by hiding the original code the virus consists of encrypted malware code along with decrypted unit. They create new mutants very time it is executed. The figure 2.2.2 shows how the main code or original code is encrypted by infected file to produce a decrypted virus code. Virus Code Decrypted Code Main Code Entry Encrypted by infected file Figure 2.2.2 Attacking system by polymorphic viruses. (Vinod et al 2009) Metamorphic Metamorphic viruses can reprogram themselves using some obfuscation techniques so that the new variants are not same as the original. It sees that the signatures of the subsets are not same as the main set. Form B Virus A Form A S1 S2 S3 Figure 2.2.3 Attacking system by metamorphic viruses. (Vinod et al 2009) The above figure 2.2.3 shows that the original virus and form of that virus have different signatures where s1, s2 s3 are different signatures. 2.3 Detection Methods 2.3.1 Signature based detection Here the scanners search for signatures which are sequence of bytes within the virus code and shows that the programs scanned are malicious. The signatures are developed easy if the network behavior is identified. Signature based detection is based on pattern matching. The pattern matching techniques evolved from times when the operating system was DOS. The viruses then were parasitic in nature and used to attack the host files and most common executable files. (Daniel, Sanok 2005) 2.3.2 Heuristic based detection Heuristics describe a method of scanning a virus by evaluating the patterns of behaviors. It takes the possibility of the file or program being a virus by testing the uniqueness and behavior matching them to the database of the antivirus heuristic which contains number of indicators. It is helpful to discover those viruses which does not have signatures or hides their signatures. It is also helpful to detect the metamorphic viruses (Daniel, Sanok 2005) 2.3.3 Obfuscation Technique This technique is used by the viruses to transform an original program into virus program using some transformation functions which makes the virus program irreversible, performs comparably with original program and has the functions of the original program. This technique is used mainly by metamorphic and polymorphic viruses. (Daniel, Sanok 2005) Antivirus Products There are many antivirus products available in the commercial market. Some of the most commonly used antivirus products are: McAfee G Data Symantec Avast Kaspersky Trend Micro AVG Bit Defender Norton ESET Nod32 Chapter 3: Literature Review 3.1 Antivirus workload characterization A research done by (Derek, Mischa, David 2005) shows an antivirus software package takes many ranges of techniques to check whether the file is infected or not. But from the observations of (Derek, Mischa, David 2005) to best difference between some antivirus software packages compare the overheads introduced by the respective antivirus software during on-access execution. When running antivirus software there is usage of two main models which are: on-demand. on-access. On-demand involves the scanning of the user specified files where as on-access can be a process that checks the system-level and the user-level operations and scans when an event occurs. The paper discusses the behavior of four different anti-virus software packages which run on a Intel Pentium IV being installed with Windows XP Professional. Considering three different test scenarios: A small executable file is copied from the CDROM to the hard disk. Executing a calc.exe And also executing wordpad.exe. All these executable files are running on the Windows XP Professional operating system. The antivirus packages used in this experiment were Cillin, F-Port, McAfee and Norton. The execution of the files are done using the before mentioned antivirus packages. Figure 3.1.1 shows the usage of these packages introduces some overheads during the execution which increases the time of execution. Fig 3.1.1 Performance degradation of antivirus packages (Derek, Mischa, David 2005) Then a test was made to know about the extra instructions executed when the file system operations is performed and also when loading and executing a binary. Taking the both scenarios a small binary of very less size is involved. It is found that the execution is dominated by some hot basic blocks in each antivirus package. A basic block is considered hot if it is visited more than fifty thousand times. To detect the behavior of antivirus software packages the (Derek, Mischa, David 2005) used the platform which was majorly targeted by the virus attacks and also must have the existence of some of the commercial antivirus software. A framework of simulator is introduced here called Virustech Simics this has architectural structure as shown in table 3.1.1. Virustech Simics is a simulator that includes a cycle-accurate micro-architectural model and used to get cycle-accurate performance numbers. Table 3.1.1 Virustech Simics architectural structures (Derek, Mischa, David 2005) Processor Model Processor Operating Frequency L1 Trace Cache L1 Data Cache L2 Cache Main Memory Intel Pentium 4 2.0A 2GHz 12K entry 8KB 512KB 256MB The goal behind the model is to confine the execution of antivirus software on a system. To achieve metrics the stream executed is passed to the simulator. To simulate the micro-processor, simics are configured. The host (simulator) executes the operating system loaded via simulated hard drive. On top of the operating system the researchers have installed and run the antivirus software and also the test scenarios are taken (see figure 3.1.2). After this the comparison is done between the baseline configuration execution (without the antivirus software installed) and the systems that are installed with four different antivirus packages. L2 Cache Copy/execute process Antivirus Process L1 Inst Cache L1 data Cache Operating System (Windows XP) Inst Stream Simulate micro-architecture Simulated Architecture HOST Fig 3.1.2 Multi Level architectural Micro Architectural simulation environment (Derek, Mischa, and David 2005) The table 3.1.2 shows the summary of five configurations. For each experiment an image file is created and loaded as a CDROM in the machine. The execution of the utility (contains special instructions) at the start and end of each collection was done in order to assist accurate profile collection. Table 3.1.2: Five environments evaluated: Base has no antivirus software running (Derek, Mischa, David 2005) Configuration Anti-Virus edition Version Base NAV PC-Cillin McAfee F-Port Norton Anti-Virus Professional 2004 Trend Micro Internet Security McAfee Virus scan professional F-Port Antivirus for windows 10.0.0.109 11.0.0.1253 8.0.20 3.14b The three different operations invoke anti-virus scanning. In first, a file from the CDROM to the hard drive was copied, and then the operating system accessories: calculator and wordpad are run accessing through a shortcut. After experimentation it is found that there is less than one percent difference in the work load parameters throughout the profile runs. Then on doing the antivirus characterization it is seen that there is a gradual increase in the cache activity which shows that the overheads released is smallest for F-Port and highest for Norton. The impact on memory while running the antivirus software shows that Norton and McAfee have larger footprints that the Base case, F-Port Cillin. 3.2 Development techniques a framework showing malware detection using combination of techniques There are several developments in techniques used by antivirus software. These techniques must be able to detect viruses which were not detected by previous techniques and this is what we say a development in technique. Antivirus software not only does detect a virus but also worms, Trojan horses, spyware and other malicious codes which constitute malware. Malware is a code or a program which intents to damage the computer with its malicious code. We can filter malware by use of specific antivirus software that installs detection techniques and algorithms. Several commercial antivirus programs uses a common technique called signature-based matching; this technique must be often updated to store new malware signatures in virus dictionary. As the technology advances plenty of malware writers aim to employ better hiding techniques, importantly rootkits became a security issue because of its higher hiding ability. There is a development of many new detection methods which are used to detect malware, machine learning technique and data mining technique. In this research Zolkipli, M.F.; Jantan, A.,2010 have proposed a new framework to detect malware for which there is a combination of two techniques signature based technique and machine learning technique. This framework has three main sections which are signature-based detection, genetic algorithm based detection signature generator. Zolkipli, M.F.; Jantan, A., 2010 defines malware as the software that performs actions intended by an attacker without consent of the owner when executed. Every malware has precise individuality, goal attack and transmission method. According to Zolkipli, M.F.; Jantan, A., 2010 virus is that malware, which when executed tries to replicate itself into other executable code within a host. What so ever, as technology advances creating malware became sophisticated and extensively improved since early days. Signature-based matching technique is most common approach to detect malware, this technique works by contrasting file content with the signature by using an approach called string scan that search for pre-defined bit patterns. There are some limitations which needs to be solved to this technique though it is popular and very reliable for host-based security tool. The problem with signature-based matching technique I it fails to detect zero-day virus attack or zero-day malware attack. Zero-day malware attack are also called new launch malware. To store and capture a new virus pattern for upcoming use, some number of computers needs to be infected. Figure 3.2.1 shows an automatic malware removal and system repair was developed by F.Hsu et al. 2006 which has three important parts such as monitor, a logger, and a recovery agent. The framework solves two problems: Determines the un-trusted program that breaks the system integrity. Removal of un-trusted program Untrusted Process Trusted Process Logger Recovery agent Monitor Operating System Figure 3.2.1: Framework for monitoring, logging recovery by F.Hsu et al. 2006 The framework is used to monitor and enter logs of the un-trusted program. This framework is capable of defending known and unknown malware, though it does not need any prior information of the un-trusted programs. And from the user side there is no need of modifying any current programs and need not observe that the program is running in the framework as the framework is invisible to both known and unknown malware. A sample of this framework was used on the windows environment and shows that all the malware changes can be detected compared to the commercial tools which use the signature based technique. Machine learning algorithm was tested and applied on the malware detection technique. In order to classify the signature-based technique limitations that particular technique was using an adaptive data compression. The two restrictions of signature-based technique according to Zolkipli, M.F.; Jantan, A., 2010 are: It is not compulsory that all malicious programs have bit patterns which are proof of their malicious nature and are also not recorded in virus dictionaries. Many forms of bit patterns are taken by obfuscated malware that will not work on signature-based technique. Genetic Algorithm (GA) takes the full advantage of system limitations that are used to detect zero day malware or the day malware was launched. The algorithm was used to develop a detection technique called IMAD that analyzes the new malware. To oppose the restrictions of signature-based detection technique this technique has been developed. Data mining is another technique which was applied on malware detection much before. The standard data mining algorithm classifies every block file content as normal or used to categorize potentially the malware. To defeat the limitations of signature-based antivirus programs an Intelligent Malware Detection System known as IMDS was developed. This system used Object Oriented Association which adapts OOA_Fast_FPGrowth algorithm. A complete experimentation on windows API file sequence was done which re called PE files. The huge gathering of PE files was taken from the King Soft Corporation antivirus laboratory which is used to compare many malware detection approaches. The results show that IMDS system shows the best results than Norton and McAfee. The proposed framework has two techniques combined which are signature-based technique and GA technique. It was designed to resolve two challenges of malware detections. How to detect newly launched malware (Zolkipli, M.F.; Jantan, A., 2010) How to generate signature from infected file (Zolkipli, M.F.; Jantan, A., 2010) Signature Generator S-Based Detection GA Detection Figure 3.2.2: Framework for malware detection technique (Zolkipli, M.F.; Jantan, A., 2010) The main components are s-based detection, s-based generator and GA detection(see figure 3.2.2). The s-based detection acts first in defending the malware, then GA detection is the second layer which is another defense layer that is used to detect newly launched malware. After creating the new signature from zero-day malware these signatures are used by signature based detection technique. Signature based detection is a fixed examining method used on every antivirus product. This is also called a static analysis method. This decides whether the code is malicious or not by using its malware characterization. This technique is sometimes also called scan strings. In general every malware has one or more patterns of signature which has unique characters. Antivirus software searches through data stream bytes, when a program is executed. Database of antivirus software has thousands of signatures it scans through each signature comparing it with the program code which is executed. For comparing purposes searching algorithm is used, the comparison is usually between program code content with the signature database. The Zolkipli, M.F.; Jantan, A., 2010 chooses this technique at the beginning of the framework because of its effective detection of well known viruses. This technique was used in this framework in order to develop the competence of computer operation. G.A detection technique is one of the most popular technique that is used to detect newly launched malware. This is used to learn approaches to resolve algebraic or statistical research problems. This is a machine learning technique which applies genetic programming that learns a evolving population. Chromosomes are used for data representation which is used in this algorithm, chromosomes are bit string values, new chromosomes are developed from a bit string combinations from existing chromosomes. Basing the nature of the problem the solution for the problem is given. Crossover and mutation are 2 types of basic operations in GA, to solve the issues concerned with polymorphic viruses and new types of malware this technique was introduced in this framework. By using this technique codes of malware using hidden technique can also be detected which only because of its learning and filtering aspects of virus behavior.( Zolkipli, M.F.; Jantan, A., 2010) S-based generator generate string patterns are used by signatures which are used to characterize and identify the viruses. Forensic experts started creating signatures once a new virus sample is found, based on the virus behavior these signatures are created. All the antivirus products creates their own signatures and accessing records they are encrypted in case there are more than one antivirus software installed on the computer. As soon as a signature is created the signature database is updated with it. Every computer user requires updating the antivirus product with the database in order to defense against the new viruses. Signature pattern is 16 bytes and to detect 16 bit virus 16 bytes is more than enough.( Zolkipli, M.F.; Jantan, A., 2010) This generator takes the behavior of virus which identified by the GA detection. The signature pattern of the virus is generated and is added to virus database as a new signature for the signature based detection. To replace the forensic experts task this framework was proposed. This creation of framework was lot useful in detecting the new virus signature, and to improve the efficiency and performance of the computer. 3.3 Improving speed of signature scanners using BMH algorithm. This paper discusses about the problem of detecting viruses using signature scanning method that relies on fast pattern matching algorithm So basically in this technique the pattern is a virus signature which is searched for anywhere in the file. This algorithm is an expensive task which affects the performance frequently. Many users may find it impatient if the pattern matching algorithm does not work fast and consumes lot of time. So to avoid this faster pattern matching algorithm is used to the scanner which is Boyer-Moore Horspool algorithm when compare d to Boyer-Moore algorithm and Turbo Boyer Moore algorithm proved to be the fastest pattern matching algorithm. In technical terms, a virus has three parts which are trigger, infection mechanism and payload. The main mechanism which is infection mechanism part actually looks for fatalities and frequently avoids multiple infections. After looking for fatalities it might overwrite the fatalities or can attach itself at the beginning of the file or at the end of the fle. Trigger is actually a event which specifies when the payload has to be executed. The payload is the foundation of malicious behavior which actually can be corruption of boot sector or manipulating files. To detect a virus and to disinfect the infected file are two most important tasks of algorithms used by antivirus software. So defense system code of the algorithm must have a part that is able to detect any type of virus code. There are four types of basic detection techniques. Integrity Checking Signature Scanning Activity Monitoring Heuristic Method. Integrity checking technique: This program gives checker codes that can be checksums, CRCs or hashes of files that are used to check viruses. Regularly the checksum are re-computed and is compared against the previous checksums. In case the two checksums does not match it is indicated that the file is infected since the file is modified. This technique detects the virus presence by detecting the change in files and also is capable to detect new or unknown viruses. But this technique has several drawbacks. Firstly, the primary checksum calculation has to be performed on a virus less clean system so the technique can never detect viruses if system is infected. Secondly there are lots of false positives if the system is modified during execution. (Sunitha Kanaujiya, et., al 2010) Signature scanning technique: This technique is used on large scale to detect virus. This reads data from a system and to that it applies pattern matching algorithm to list of existing virus patterns in case it matches with the existing patterns it is a virus. This scanning technique is effective but the pattern database needs frequent updating which is very easy. There are several advantages of this scanner one of it is the scanning speed for this technique can be increased, it can also be used to detect other types of malicious programs like Trojan horses, worms, logic bombs, etc. So mainly for the virus it is only signature of the virus which is needed and update it to the database. This technique is used on many viruses due to this reason. Activity monitoring technique: This technique is used to monitor the behavior of programs executed by some other programs these monitoring programs are known as behavior monitor and they stay in main memory. The behavior monitors alarms or do some action to prevent the program when it tries to do some unusual activities like interrupting tables, partition tables or boot sectors. The database maintains every virus behavior that is supposed to be. The main disadvantage is when the new virus uses another infecting method that is not in the database and in this scenario finding virus is helpless. Secondly viruses avoid defense by activating earlier in the boot sequence prior to the behavior monitors. And also viruses modify the monitors

Saturday, January 18, 2020

Boeing Internal Analysis

Boeing Internal Analysis Purpose This report discussed the components of internal analysis, competitive advantage, and strategic competitiveness of Boeing Company. This is done by analyzing the tangible & intangible resources, capabilities, and core competencies in order to clarify Boeing’s strengths and weaknesses. Resources Exhibit 1 Tangible| Intangible| Manufacturing plants| Boeing’s digital design software| Composite and metal materials| Dynamic assembly line| Headquarters building| â€Å"Moonshine teams† strategy|Machinery used for lean production| Boeing’s brand name| Financing/ Launch aid from NASA | | Boeing’s newest jet, the 787, is made out of composite plastics and carbon fiber in order to be more efficient and comfortable. The new materials allow the plane to be pressurized at a lower elevation, which results in less jet lag. Also, the cabin humidity can be raised to around 20% because these materials do not corrode like metals. Through the use of lean productions, Boeing significantly reduced the cost of machinery used for manufacturing, along with inventory costs.For financial resources, Boeing received $12 billion from NASA to develop technology. They also received $1 billion in loans from Mitsubishi, Kawasaki, and Fuji for the development of the 787. Furthermore, Boeing had received launch aid from U. S. Government subsidies. Boeing has a reputation as one of the best manufacturers of commercial and military jets. Its strong brand and name represents the position in the aerospace industry. Boeing has encountered some scandals in upper management, however they are trying to restructure its reputation and make a comeback.Capabilities Exhibit 2 Capability| Valuable| Rare| Costly to imitate| Non-substitutable| Dynamic Assembly| Yes| Yes| Yes| Yes| Lean Production| Yes| Yes| Yes| Yes| Composite Materials| Yes| Yes| Yes| Yes| Lean production at Boeing was a very important and effective decision. They were able to de sign equipment that cost amazingly less and was much more efficient than the machines they were using at the time. A router was built for 0. 2% cost of their larger one and a drill machine was built for 5% cost of the previous model.They used a hay loader to put the seats into the planes, rather than using a crane, which reduced production time from twelve hours down to only two hours. Production of landing gear components took 32 moves over 10 months, but with the lean production strategy it only took 3 moves and the time span was reduced to 25 days. Dynamic assembly was an important change at Boeing as well. Before, planes had to be jacked into position at one station, worked on, down-jacked from the station, and moved with a power cart to the next station.This process could take up to two, ten hour shifts. By using a sled that drags the plane two inches per minute, Boeing reduced production time in half. Core Competencies One of Boeing’s core competencies would be utilizin g composite plastics in the manufacturing of their jets. This is valuable because it allows them to build a jet that can travel faster, farther, and with more comfort than on previous jets. It can be considered costly to imitate because when Airbus built a model to compete, the A350, its performance was unable to compare to that of Boeing’s 787.The composite materials are non-substitutable because it is currently the highest grade technology jet manufacturing industry. It is rare because only Boeing and Airbus are in the commercial jet industry, and Airbus’s model cannot compare. Another core competency would be Boeing’s ability to use lean production. This is valuable because it allowed Boeing to free up 1. 3 million square feet of space and sell seven buildings by switching to a â€Å"just-in-time† inventory. Also, they were able to reduce costs of equipment and speed up the manufacturing process drastically.It is socially complex because it uses numero us different strategies to create one finished product. There are no substitutes that compare to lean production as far as time and money savings, and it is rare because Airbus and Boeing are the commercial jet companies to use it. The third core competency is Boeing’s dynamic assembly line. This was a valuable change to Boeing because it reduced assembly time by 50%, or from 22 days down to 11 days. The planes move 80 feet every shift and lights determine the status of the assembly line.Dynamic assembly lines are costly to imitate and rare due to the size of the plant and the components used in order to pull such a large craft throughout the building. The only substitute of a dynamic assembly line is a static assembly line, and the dynamic one performs much more efficiently. Weaknesses * Ineffective top management Boeing was recently faced with the scandals which hurt the reputation of Boeing. The top management recognized the problem and tried to figure it out by effective management strategies. * Outsourcing In 1997, Boeing lost $1. billion against their earnings due to problems with the supply of critical components. They had to halt the production of the 737 and the 747. In 2006, suppliers for Boeing’s 787 fell behind schedule which resulted in a delay of production. Value Chain Analysis The industry value chain is the process from the suppliers of the raw material to the end customers who demand the service of transportation. Boeing found itself in the crucial situation of having lost market share to Airbus. Boeing had to act in response by enhancing customer benefits to recapture an advantage over its competitors.The fundamental idea was an innovative renovation in the supply chain process, which would redefine Boeing’s role as a coordinator and integrator rather than simply the manufacturer. At the heart of the supply chain transformation process was the strategy to outsource more than 70% of the 787’s production. Boeing int roduced new project management techniques by sharing risk with partners. The companies sharing risk transformed the entire 787 program. The risk shared by partners in investing their own capital in the 787 program cut approximately 55% of Boeing’s development cost required for the program, which was $6 billion.Boeing’s outsourcing process has dramatically reduced the manufacturing time from roughly two weeks to as little as three days. Saving such significant time greatly decreases labor and inventory costs for the company as outsourced components reach the assembly site with pre-fitted sub-systems. This approach streamlines and adds efficiencies to the assembly process. (Boeing value chain report, 2010) Competitive Advantage * Works more with both its customers and suppliers to design and build the best aircrafts on the market. R&D departments which are able to design and implement better aircrafts which reduce the costs and make more efficiency. * Flexible work sched ules for the employees. * Boeing’s name and brand bring a strong competitive advantage between Boeing and Airbus. Exhibit 3 Profitability ratios| Boeing| Airbus| Net profit margin| 3. 6%| 0. 3%| Gross profit margin| 18. 02%| 11. 95%| Asset turnover| 1. 1| 0. 55| Return on assets| 6. 16%| 1. 07%| The profitability ratios show that Boeing had a moderate and good profitability compare with other company (such as Airbus).The return of assets of over 6 % shows an overall strong earning power of Boeing’s total assets. Strategic Competitiveness Boeing has implemented outsourcing to build better and more efficient airplanes by using portions of other companies’ knowledge and research with their own. This has helped them produce airplanes at a much lower cost. Boeing's strategy was to develop the 787 at a very low cost. By doing this, Boeing believes it can compete with Airbus' new Super Jumbo project. Boeing focused on medium capacity aircraft which can hold 250 people, whereas Airbus focused on super jumbo jets, which contain 550 people.Overall Boeing has achieved higher quality and efficiency. Boeing pins its hope on a different strategy and does not take the hub-and-spoke concept as a given. The Boeing 787 is the solution for non-stop, point-to-point flights between secondary cities. Conclusion Boeing’s ability to develop lean production, use of composite materials, and dynamic assembly methods are their strengths. Their weaknesses include poor upper management and unreliable outsourcing. In the future, Boeing needs to find higher quality upper management and more reliable suppliers.

Thursday, January 9, 2020

Ideas, Formulas and Shortcuts for Dissertation Writing Service

Ideas, Formulas and Shortcuts for Dissertation Writing Service All you will need is to specify your demands and earn a payment. It's very vital to provide detailed and clear requirements in order to prevent any confusion from the very start. There's nobody correct method. Other essay services might be more efficient regarding their operations but they're not quite as effective as us. If you are searching for the very best writing services online, you're in the ideal spot. It's understandable that one may find aid from time to time, and that's just what the goal of custom writing services is. If you are seeking an academic writing service that could manage all your assignment and project demands, you are, quite simply, at the appropriate location. Be part of our happy clients who have found the very best essay service online and are enjoying the advantages of it. Also, it is going to be indeed helpful if you were able to supply the writer with the textbook you are using i n class or any extra materials which will see to it that the writer employs the most relevant sources while completing the paper. Essaymama's Writing Blog provides interesting insights in addition to suggestions to help writers and internet users enhance their work. Moreover, our site blog incorporates free writing tips and tutorials to help prospective clients in addition to for students who only require academic guidance. What Everybody Dislikes About Dissertation Writing Service and Why Should you need an essay at the moment for a very good price, there is actuallyn't a better company to visit. Virtually every order has a different price since it is dependent on a few vital elements. No matter your academic level, if you've got a demand for any of these products or services, we're prepared to go to work for you. How quickly you require the job done can seriously impact your total cost. Dissertation Writing Service Can Be Fun for Everyone Interested clients can readily get the essential information and details they need from our site. What's more, our service is entirely legal and legitimate If you're looking for reviews, we've included an open feedback section within the heart of the website. It is completely private. Customer service is valuable to us, which explains why we are here whenever you require, we would like you to feel fully supported each step of the manner. Dissertation Writing Service Secrets That No One Else Knows About Employ a specialist in any field you will need to compose your outstanding essay our writers supply the very best essay writing service since they have degrees in all disciplines. Our pro essay writers will be present to make it simpler on you. Last, the writers from Ultius offer unmatched quality and originality when it regards the last sample essay you get. You're able to rest easy knowing a real professional will be carefully crafting your essay to assist you receive the best possible grade. Our purpose is to supply the ideal essay writing service there's online to supply you with the ideal essay custom to your requirements. There's an array of reasons why students may fail to be in a position to compose their essays and the reason why they would require a paper writing service to help them out. Our primary job is to assist you with your essays when you're not able to write them yourself. It is possible to acquire an essay written in no more than three hours, and therefore don't be scared to get in contact if you get a tight deadline. What you have to do is to fill out the purchase form, make a payment, and in a few minutes, you will receive your individual essay helper. As time continues, you begin to grind to a halt. Should you need something in under a day it'll be considerably more costly than if you needed it in ten days. Let our team know the sort of paper you require, the variety of pages required, and when you require it by. So, you may rest assured your term paper service is going to be delivered by means of a pro. In any case, everybody has the chance to observe drafts and check ready papers. All papers are individual to every individual. New Ideas Into Dissertation Writing Service Never Before Revealed You have most likely reviewed lots of businesses, and a few of them claim to extend the cheapest custom writing. As a consequence from using our services, you will be given a custom-written paper you are able to use for your own purposes. There's no need to worry that anybody could possibly know that you're using our expert services. The exact same editorial quality check procedure is included with the essay revision service process too. Which is the reason we screen our writers' degrees and qualifications until they write for all of us. It is possible to skip reading my dissertation to learn why. Quite frequently, students do not understand how and where to begin writing. You basically have to complete papers for the interest of writing and to have a great grade. Understanding how the Ultius essay ordering process works will make sure you are both informed and conscious of what's happening at every step along the purchase. You're able to speak to the writer throughout the procedure, in the event you have more ideas or wish to clarify something. You adore the work, and you're enjoying the procedure for finding answers. Therefore, should you need help with an essay no issue!

Wednesday, January 1, 2020

William Blake’s Revolution - 3088 Words

Blake’s Songs of Experience was published in 1794 against the backdrop of Robespierre’s Reign of Terror and England’s war with France. Blake, an English Jacobin who, as his biographer Gilchrist writes, â€Å"courageously donned the famous symbol of liberty and equality—thebonnet-rouge—in open day; and philosophically walked the streets with the same on his head† (93), was by this date becoming increasingly disenchanted in his hopes for sweeping political reform in England. One does not often speak of Romantic poets as political activists. (1) The image of the Romantic poet most common is the one put forth by Stanley Applebaum, who writes, â€Å"Even today the word poet conjures up the Romantic notion: an individualistic, inspired seer revealing†¦show more content†¦This realization leads the speaker to the conclusion that a person has some creative part to play even in the most banal perceptions. Wordsworth writes, [. . .]Therefore am I still / A lover of the meadows and the woods, / And mountains; and of all that we behold / From this green earth; of all the mighty world / Of eye, and ear,—both what they half create, / And what perceive; [. . . .] (27-8) In Wordsworth’s estimation, every individual ‘half creates’ every impression she perceives through her senses five. The individual nature of the creative process seems to be a common link which might tie all the Romantic poets together. Coleridge’s poem, â€Å"The Rime of the Ancient Mariner,† reinforces this conclusion through the fate of the mariner. The mariner tells the wedding guest, Since then, at an uncertain hour, / That agony returns: / And till my ghastly tale is told, / This heart within me burns. (80) The focus is upon the mariner. Not only is his journey largely solitary, but the recitation of his tale is not for the edification of others, but for the relief of his own agony. Yes, his tale has a moral. For , the narrator writes of the wedding guest, â€Å"A sadder and a wiser man, / He rose the morrow morn† (81). But making his fellow men wiser, though sadder, is not his business. His is a self-interested, individualistic endeavor. One is curious as to the roots of the Romantic poet’s emphasis upon the individual, a shift from the eighteenth century’s literaryShow MoreRelatedSociological Criticism of William Blake’s Poetry Essay1506 Words   |  7 Pagespolitical and economic ideas of communism and social inequality. William Blake, a Romantic poet, frequently wrote on the topic of class oppression and his opposition to the exploitation of the proletariat by the capitalists. Blake’s ideology and preference towards an equalitarian society quite closely mirror the theories of Karl Marx. Analyzing Blake’s poetry from a Marxist perspective paints a clearer picture of the motives behind Blake’s anger towards social inequality. Poems such as â€Å"The Chimney Sweeper†Read MoreWilliam Blake s The Tyger1132 Words   |  5 PagesWilliam Blake’s â€Å"The Tyger† and Tragedies William Blake wrote a set of poems in his collection Songs of Innocence and Songs of Experience. Some of the poems in each collection were meant to be read together to show the difference between innocence and experience. Many people question why Blake wrote a two part series to his poems and what they could actually mean. Two specific poems, â€Å"The Lamb† and â€Å"The Tyger,† were meant to be read together. â€Å"The Lamb† is a part of Blake’s Songs of Innocence andRead MoreEssay on Biography of William Blake1631 Words   |  7 Pagesyourself with influence and inspire your work and success. William Blake was a famous artist, engraver and poet. However, it was not until 1863 that he became famous when Alexander Gilchrist published his biography(Blake, William, and Geoffrey Keynes).Blake and his poetry have been compared to Shakespeare (Kathleen Raine). As an artist Blake was equated to Michelangelo. Being born during the time of both the American a nd French Revolution, William Blake was against both the Church and the State. BlakeRead More Essay of Comparison between The Tiger and The Lamb, poems by William Blake1506 Words   |  7 PagesEssay of Comparison between The Tiger and The Lamb, poems by William Blake The Tiger and The Lamb were poems by William Blake, a poet who lived in the 18th century. In this essay I am going to compare the two poems and examine links between them relating to rhymes, patterns and words used. Blakes background relates on the poems he wrote, and many of his works reflected his early home life. Blake in his childhood was an outcast, a loner, and didnt have many friends. His family believed Read MoreWilliam Blake Had A Strict Standard On How His Poems Should1431 Words   |  6 Pages William Blake had a strict standard on how his poems should appear. In his poems, he was not very concerned with grammar or spelling, even though he was writing in a time much after the official English language had been created. Much of his spellings are very old-fashioned to us and at times can sound very awkward. Even his readers in his time found that the wording and spelling of phrases and words was quaint. William Blake also used forms of punctuation that were not considered to be standardRead MoreWilliam Blake s Poetry Of Innocence And Happiness1417 Words   |  6 PagesWilliam Blake was a poet, painter, and engraver, who was born in Soho, London on November 28th 1757. Blake lived in London at a time of great political and social change. The Industrial Revolution took place in 1760, the American Revolution began in 1775, and the French Revolution began in 1789, and all of these revolutions greatly influenced William Blake’s writing. Blake wrote his world famous Son gs of Innocence in 1789 and later combined it with additional poems titled Songs of Innocence and ofRead MoreWilliam Blakes Influence Of Literature1303 Words   |  6 PagesWilliam Blake William Blake’s poetry was heavily influenced by the Christian Bible, which is quite uncommon for the English Romantic poets. In fact, he is even known as the final religious poet of Britain. This tendency toward using the Bible in his literature derived from his avid reading of this holy book during his childhood. There is little information about any other schooling he might have had outside of reading this book. However, his writing was unique from other Christian writings as heRead MoreComparison and contrast between Blake and Wordsworths views on London with poems London and London, 1802 respectively.1454 Words   |  6 PagesPoetry was an outsider to the cold, efficient, emotionless environment of the Industrial Revolution. Romantics of all arts criticized the changing ways of life and idealized the pre-industrial revolution era. London was the haven to this revolution, and the hell to all poetry. William Wordsworth and William Blake both denounced Londons new environme nt with their poems London, 1802 and London respectively. Both authors were against this transformation of the city because it destroyed all beautyRead More William Wordworths London and William Blakes Upon Westminster Bridge1041 Words   |  5 Pagesanalysis of the texts and using background research. Refer to styles, techniques and effects of the poetry. Give your own responses. Both William Wordworths London and William Blakes Upon Westminster Bridge were written at the turn of the 19th century in Georgian times to illustrate the authors views of London. During this period the industrial revolution was in full swing and the population was growing at alarming rates. The population increase was due to advancements in medicine, whichRead MoreRomanticism in The Marriage of Heaven and Hell by William Blake1393 Words   |  6 PagesRomanticism in William Blakes Poem William Blake was a poet, painter, and a printmaker all during the period in literature known as the Romantic time period. The Romantic time period, also known in Literature as Romanticism began in Europe, mainly France and Britain around the 1800s (Barker) and it was first defined as a tool to in literature and literary criticisms (Galitz). The Romantic period did not just focus on literature, but also on the subjects of art and knowledge which was fueled