Saturday, December 28, 2019

The Paradox of Corporate Entrepreneurship Free Essay Example, 2000 words

Corporations based on entrepreneurship blur the line between what is an acceptable practice and what is not, taking advantage of grey areas and loopholes in the legislation. The pursuit of profits inspired by entrepreneurial leaning by corporations influences them to identify grey opportunities for operations. In a capitalist manner, such undertakings can be justified as they may not directly breach any laws. However, this may be due to an oversight in legislative processes or ignorance on such loopholes. The lack of legislation guiding certain practices or outlawing certain acts does not make them moral or acceptable to society (Philips 2003, pp. 36-38). This, however, makes them acceptable practices to an entrepreneurial corporate venture. For instance, multinational corporations may sell products with carcinogenic or mutagenic risks in third world markets. Such products may be outlawed in the countries of origin, but not legislated upon in the foreign markets in developing countr ies. Whereas no legal mechanism may pin down corporations behaving in this manner, there exists no moral justification for such practices. Here, the firms are engaging in business that may be harmful to the perhaps oblivious consumers while taking advantage of failure in legislative capabilities. We will write a custom essay sample on The Paradox of Corporate Entrepreneurship or any topic specifically for you Only $17.96 $11.86/pageorder now This is a result of uncontrolled entrepreneurial action where such business opportunities are spotted, noted as illegal and exploited by the corporations. Entrepreneurship also leads to various aspects of corporations becoming defunct and disposed of. The much-maligned bureaucracy in corporations serves several essential functions for the corporation. According to Down (2010, p. 116), bureaucracy is commonly equated with red tape and blamed for inhibiting effectiveness due to complex and rigid procedures. However, a closer look at the issue opens up a number of positives brought to a corporation due to bureaucracy. Bureaucracy provides for control mechanisms within corporations and thus protects the firm from chaotic operations and ultimate falls.

Friday, December 20, 2019

American And Korean Culture Cultural Immersion Through...

Like many of my undergraduate peers, I have yet to discover my whole self. Having a multicultural background, in both American and Korean cultures, I felt as if I did not belong in either group due to characteristics that fit into neither category. Also being on the border of two very different health-care professions also inhibits me from fully submerging myself into a field of study. Throughout my adolescence to now, I have forced myself to conform to the American side but also felt a loss in a part of myself from the neglect towards my Korean side. I believe that I can learn how to embrace both cultures successfully by equalizing my exposure to South Korean culture, thus developing a holistic identity for myself. With the greater understanding of myself, I hope to figure out the best fit path for myself. During my future practice in the medical field I can incorporate the experience of cultural immersion through respect and acceptance of new cultures. Being able to embrace two cul tures, maturing myself, now will allow me to accept people and new ideas I will encounter during my education and career as well as mentor others to find themselves. Studying at Korea University, one of the best universities in South Korea, will obviously enrich my educational experience. Learning opportunities, including shadowing doctors in different countries, will help me understand non-Western perspectives, while allowing me to combine medical philosophies in my future practice. LearningShow MoreRelated Asian Americans in the Classroom Essay4678 Words   |  19 PagesAsian Americans in the Classroom Asians are one of fastest growing minority groups in America today. During this century, various factors at home and abroad have caused people from Asia to immigrate to the United States for better or for worse. Due to these factors, Americans and American teachers, in particular, need to educate themselves and become aware of the Asian American students’ needs in terms of success and happiness. Before beginning my research, I felt I had an easy subject: studyingRead MoreThe Paradox of Samsungs Rise4535 Words   |  19 Pagesprevious generation. Twenty years ago, few people would have predicted that Samsung could transform itself from a low-cost original equipment manufacturer to a world leader in RD, marketing, and design, with a brand more valuable than Pepsi, Nike, or American Express. Fewer still would have predicted the success of the path it has taken. For two decades now, Samsung has been grafting Western business practices onto its essentially Japanese system, comb ining its traditional low-cost manufacturing prowessRead MoreGoogle Organizational Culture9872 Words   |  40 Pages 2010 ISSN 1549-3652  © 2010 Science Publications Cultural Issues in the Business World: An Anthropological Perspective Michael P. Lillis and Robert Guang Tian Department of Business, Medaille College, New York Abstract: The significance of cultural influence on business has been widely recognized in both academic and business circles. A number of authors suggest that an anthropological approach is the most appropriate way to study cultural factors and assess their impact on an organizationalRead MoreStrategic Human Resource Management View.Pdf Uploaded Successfully133347 Words   |  534 PagesVIEW Strategic Human Resource Management Taken from: Strategic Human Resource Management, Second Edition by Charles R. Greer Copyright  © 2001, 1995 by Prentice-Hall, Inc. A Pearson Education Company Upper Saddle River, New Jersey 07458 Compilation Copyright  © 2003 by Pearson Custom Publishing All rights reserved. This copyright covers material written expressly for this volume by the editor/s as well as the compilation itself. It does not cover the individual selections herein thatRead MoreExploring Corporate Strategy - Case164366 Words   |  658 Pages22/10/2007 11:54 Page 600 600 Guide to the main focus of cases in the book Introduction to strategy Business environment: general Five forces analysis Capability analysis Corporate governance Stakeholder expectations Social responsibility Culture Competitive strategy Strategic options: directions Corporate-level strategy International strategy Innovation and Entrepreneurship Strategic options: methods Strategy evaluation Strategic management process Organising Resourcing Managing change StrategicRead MoreMarketing Mistakes and Successes175322 Words   |  702 PagesDESIGN DIRECTOR SENIOR DESIGNER SENIOR MEDIA EDITOR George Hoffman Lise Johnson Carissa Doshi Dorothy Sinclair Matt Winslow Amy Scholz Carly DeCandia Alana Filipovich Jeof Vita Arthur Medina Allison Morris This book was set in 10/12 New Caledonia by Aptara ®, Inc. and printed and bound by Courier/Westford. The cover was printed by Courier/Westford. This book is printed on acid-free paper. Copyright  © 2009, 2006, 2004, 2001, 1998, 1995, 1992, 1989, 1986, 1981, 1976 John Wiley Sons

Wednesday, December 11, 2019

BRL Hardy Australian Wine Company Samples †MyAssignmenthelp.com

Question: Discuss about the BRL Hardy Australian Wine Company. Answer: Marketingroles and responsibilities include managing themarketing activities of the company and developing strategies as per the company objectives. In this particular case the global brand strategy of BRL Hardy, an Australian wine company has been considered. The Australian wine industry had gone a lot of changes within few years. Therefore the company had to think carefully about the marketing pattern carefully in order to pursue a global brand strategy. As innovation is an important part of marketing therefore fortified wines became obsolete and vineyards were substituted by varieties of table wine. The changes in the wine industry were responsible for affecting the upcoming wine companies in Australia. That is why in order to pursue global brand strategy it becomes essential to practice responsive, future- proof, resilient and growth- oriented management. In order to ensure that the brand functions properly on a global context adaptability and flexibility are important. Philips is one of those brands which became successful by maintaining balance and thus made a big impact in the Chinese market. It is also important to adapt to the solutions based on technology as it is considered as the best benefit of brand management. If consistency, is maintained in the identity and marketing strategy of brand then it acts as a strategic guide. For instance, Unilever has made use of Percolate, a marketing software company for supporting global brand management practices. By modifying the structure of the organization and working actively global brand management can be improved. Initially the BRL Hardy Company was at the top of Australian wine selling companies and Carson, the managing director always felt proud about the situation. But the condition became different when he had to decide between the future strategies of the company and the implications on the international functions. This became a matter of concern for both Carson and Davies. In addition to that company managers had to decide on two competitive proposals for making new entry in the Australian wine market. Stephen Davies was appointed as a marketing manager of the BRL Hardy Company to evaluate the global operations. In doing so he found that the international operations were not at a very good stage, rather poor. This became a matter of tension for him and he started to think of ways by which this difference can be sorted. He made Quality Wines for the World the slogan of the company to build the perfect export strategy based on a premium quality of brand image. When both of these persons were in anxiety to save the company from distress Millar, the managing director of the parent company came to their rescue. He was the one who wanted Carson to be involved in this matter. Along with that he also wanted to make sure that the European activities are aligned with the strong and new strategies of the company so that they can remain in the top position in the market. In this way he did not even want to endanger the position of this company in the market as it was responsible for two- third of the export sales. Among the two proposal files that led Carson and Davies to worry about the future of the company, one of the files contained the proposed launch of Distinto, a new line of Italian wines. These were developed after collaborating with a Sicilian winery. It can be suggested that BRL Hardy should not launch Distinto in the UK even though Carson and his team was deeply involved in this project. This is because there was quite a lot of controversy among the Australian management. They were concerned about Mapocho which was another business sourcing pact. It was battling at that point to make a proper marketing launch and make the weakening relation with Chilean sourcing associate better. In such a critical situation it will not be a wise decision to ignore either of the two projects. The plan behind launching Distinto is to build an amazing image for it in the Mediterranean lifestyle. However it would not have been possible if the concentration of the managers is shifted to Mapocho. Thus one of the two projects needed to be compromised for the sake of the other. Since Mapocho was already launched in the market therefore it deserved better treatment than Distinto which was yet to be launched. Moreover, even though the idea of this Italian wine was appreciated but many questions were raised before its approval. The management had negative feeling about this particular brand because of previous ventures gone badly. There was an issue in deciding between the managers of the company whether to launch Banrock Station in the UK. The UK based management had become successful in developing a reasonable amount of commitment to Kellys Revenge. It was a brand that was built up to react to the UK market opportunity. On the other hand the parent company was more concerned about the promotion of Banrock Station because this product was successfully launched in Australia before and that is why they wanted to continue it as an international brand without modifying the price level. The company should launch Banrock station in the UK because it was positioned in the market as an environmental- friendly product where the profits were partly allocated to the conservation groups. If it would be launched in the UK then the price would be kept similar to that of Kellys Revenge. The product would be considered as an instant success for the Australian market and tends to be the largest selling imported brand in New Zealand. Moreover, the Banrock Station should be launched in UK because Davis and Millar were convinced of the potential of this brand at an international level. They also convinced the BRL Hardy companies in other places such as Europe and North America to put their best efforts behind it. It was accepted by Canadian managed to be launched immediately because they had foreseen the benefits behind it. The ample benefits that were being received from this brand should not be overlooked. There was a constant issue between the launching of Kellys Revenge on one hand by the UK management and Banrock station on the other hand by the parent company. It can be suggested that Kellys Revenge should not be launched in UK. As it has been discussed in the report that Banrock Station will also be launched in the same price level of Kellys Revenge to succeed in the new market. Moreover, Banrock Station was also a potentially global brand and Davies and Millar was convinced by that. Kellys revenge could stand nowhere in front of its competing brand. Millar added to this explanation that when Kellys Revenge was taken to UK, it failed to appeal to the marketers. Instead, Banrock Station was successful in getting compliments in the UK market. This was counted as a great opportunity for positioning the brand in the UK market. Therefore it will be a great decision to stop the launch of Kellys Revenge in the UK market because nobody would like to put the companys reputation at stake. Banrock Station was already successful in appealing to the consumers in its production stage because of its conservation efforts. That is how the company could gain its reputation as a potential global brand. Bibliography Bartlett, C.A., 2001.BRL Hardy: Globalizing an Australian Wine Company. Harvard Business School Pub.. Bianchi, C., 2015. Consumer brand loyalty in the Chilean wine industry.Journal of Food Products Marketing,21(4), pp.442-460. Bianchi, C., Drennan, J. and Proud, B., 2014. Antecedents of consumer brand loyalty in the Australian wine industry.Journal of wine research,25(2), pp.91-104. Carsana, L. and Jolibert, A., 2017. The effects of expertise and brand schematicity on the perceived importance of choice criteria: a Bordeaux wine investigation.Journal of Product Brand Management,26(1), pp.80-90. Ertimur, B. and Coskuner-Balli, G., 2015. Navigating the institutional logics of markets: Implications for strategic brand management.Journal of Marketing,79(2), pp.40-61. Fleming, A., Park, S.E. and Marshall, N.A., 2015. Enhancing adaptation outcomes for transformation: climate change in the Australian wine industry.Journal of wine research,26(2), pp.99-114. Gmez, M., Lopez, C. and Molina, A., 2015. A model of tourism destination brand equity: The case of wine tourism destinations in Spain.Tourism Management,51, pp.210-222. Logan, S., 2016. Wine and viticulture journal marks 30 years.Wine Viticulture Journal,31(3), p.7. Rowley, M., 2017. Supply and demand: Supply and demand dynamics for Australian wine following vintage 2016.Wine Viticulture Journal,32(3), p.58. Saltman, Y., Johnson, T., Wilkinson, K. and Bastian, S., 2015. Australian wine consumers acceptance of and attitudes toward the use of additives in wine and food production.

Wednesday, December 4, 2019

Conference on Foundations of Genetic Algorithms †MyAssignmenthelp

Queston: Discuss about the Conference on Foundations of Genetic Algorithms. Answer: Introduction: The encryption process in the recent time is playing a very vital role in every sphere. The message which is send from one person to another have to be secured and has to be seen that it is not in hand of nay user expect the actual recipient of the message. In Symmetric key encryption each of the computer system has a secret key. The secret key can be used to encrypt a packet of information mainly with the main propose of protecting it from other users before it is send over the network to another computer system (Goyal, Koppula Waters, 2017). In the process of sending message with the indicated encryption process it is very important to know the computer which is going to interact with in order to install the key. The drawback aspect of the process is that the transfer of key is very much important and it has to be seen that the key does not reach anyone else than the intended recipient. Symmetric key is very similar to secret code that each of the two computers which are interacti ng must know in order to complete the communication process (Prajapat Thakur, 2016). In Symmetric key encryption each of the computer system has a secret key is can be considered as the most important and the most beneficial aspect of the encryption technology related to Symmetric key encryption process. The public encryption can be referred to as a system of cryptography that mainly consists of two keys a public key and the private or the secret key. The public key is basically known to everyone and on the other hand the private and the secret key are known only to the intended end user of the message. The main aspect in this cryptographic function is that the two keys are related in a way that only the public key can be used to encrypt the message and only the corresponding private key which is related to the public key can be used to encrypt the message from the recipients side (Bellare, Kane Rogaway, 2016). The security aspect involved in the technology is that it is virtually impossible to generate the private key if some user knows the public key. From the hackers point of view it is generation of the private is a hard job at hand, so the message is transferred in a secured manner. The hashing function is almost available in all application which is related to the information system (Waters, 2016). The technology is very much important from the users point of view with the security aspect related to the internet and the communication medium. The hash function is mainly a mathematical function which is used to convert an input value which is numerical and convert it into a numerical value which would be compressed. The value which is returned by the hash function is termed as message digest or in order words hash value. Technique Used For Confidentiality and Authentication Hashing is the most popular implementation of the cryptography which uses different aspect of security which can directly insure Confidentiality and authentication (Koppula et al., 2017). In computer security aspect the term confidentiality and the authentication play a very vital role. Everybody who access the network want their data to be secured and no one expect the intended person would not get access to the data stored in the server or over the network. There are two direct application of the hash function which is based on cryptographic property. If the password is stored in a normal text it would be directly accessible to anyone. Instead of this mostly login procedures store hash values of the related password in the file. The intruder who has the intention of hacking the password would only see the hashes of the password, even if access to the password is made (Goyal, Koppula Waters, 2017). Logging with the password or deriving the password would not be possible, this is due to the factor that hash function mainly processes the property with are related to the pre- image resistance (Altman et al., 2016) The integrity data check is the most common application of the hash function. The main aspect in the process is the generation of the checksums on the data files. The integrity check helps the user to detect whether any change is made to their original file (Appelt et al., 2016) the concept how ever does not give any sort of assurance related to the originality aspect. The concept is useful on if the user is somewhat sure about the originality of the file or the data. The Denial of service attack is mainly an attack in which the system, server or the traffic which is related to the network is flooded with resources and as a result of which it makes it very difficult for the user to use them accordingly. The server is in this scenario is flooded with inappropriate request that any task or job cannot be achieve from the system. The attack crashes the server and it can be dealt by merely restarting or rebooting the system. There can be different ways in which accompany can be protected from the denial of service attack. Two most effective way in order protect are stated below Create an action plan in advance The main aspect in this case is not waiting for the attack; it is the intelligence in response to the potential risk before the attack is done. The main focus should be on the creation of a system that absorbs a DDoS attack potential. Thought the precaution measure before the intended action takes place is not 100% foolproof it does not help in mitigating the risk to a extent. The action plan might consist of the following aspects. Implementation of a sensor so that it gives an indication whenever a website is down. Dumping of logs should be provided in any case of any malicious activity. Construction of ISP in order to get the understanding about the free and the paid DDoS protection plans and its implementation (Chen et al., 2016) Confirmation should be obtained with the DNS TTL ( time to live) for system which are prone to attack in the near future The result of the DDoS attack accounts in a unprecedented amount of traffic in the server which is beyond imaginations. Putting emphasis on the hacker an ideal time to jack into the website is when a huge amount of traffic is concentrated (Gollmann, Meier, 2006). Therefore the best way to notice quickly the attack is by looking out for the situation of the abnormal traffic in the website. It can be estimated the amount of traffic in a particular website in a pre defined time, whenever the rate increases the DDoS attack may be in active mode. Staying alert with it monitoring and setting the threshold time or limit when the traffic goes beyond a certain level will help an individual to protect themselves from the DDoS attack (Antonakakis et al., 2016) Rules of working in secure areas Maintaining the integrity with the physical security for the secure areas. Confirmation that the door is closed with the access of the area. Never leave the door open or unattended while working in the area. Never allow the access of unsupervised personal by a contractor or technician with the role of maintaining (Ling Chen, 2016). Maintaining the integrity of the environment in the area which is secured. Do not involve food, hazardous material or drinks in such an area. Never store any equipment like tools, cleaning supplies, ladder, ceiling tiles, unused servers, etc). Maintenance of the fire protection unit is very much essential. Report of any building mechanical failure such as door not working in proper condition, a water leak or a burned out bulb light (Chen et al., 2016) Limitation of action with regards to authorized and appropriate activities. An approval from the ITS request should be taken in order of all the changes made in the infrastructure and production system. The response on the production system in a n emergency or equipped failure must be accordingly followed by emergency request for change. If not responsible or authorized never open the cabinet for equipment In many situation there can be a case that accidently switching of or damage of computer equipment is done in such case the ITS service desk should be approached. Computer security mainly involve in securing the computer system and preventing it from unauthorized access. The task of securing a system is very much challenging. Hackers are considered to be upper hand than the normal people with emphasis on the technological knowledge aspect . However securing the computer system is very essential in order of protecting the data Updating the system regularly: the operating system should be updated at least ones a month in order to keep the system updated. Installing the recent patches and security installation can help in securing the aspect. Internet Browser: the browser is considered as the most important aspect in order to achieve connectivity to the internet. One of the most renowned browsers is the Mozilla Firefox which is mainly open source software. This is advantageous because the personal who are involved with the security aspect can easily fix the bugs and build better security features which are involved in the aspect. Another important aspect of Firefox is that it is Add- one or implementation of extensions, this aspect can help in building the build in security and features which are related to the privacy aspect. Software aspect: unwanted software can directly affect or infect the computer system, if during the downloading of the software it is not taken care of. The source of the software is the main aspect here and it should be ensured that there is bundling of additional wanted program with the legitimate software. If the computer system has java installed in it, it should be disabled as stated by the Homeland Security. Java is responsible for many malware attacks on the computer which are unsuspecting from the users point of view. Virus and malware: A virus can implement anything that a normal computer program can do. The virus spreads by infecting files or the area involved in the system and then it makes copy of itself. On the other hand some computer viruses are not harmful at all others may damage the data files and some destroy the files and some can directly spread to other computer systems. Malwares is considered as a broad category of threads which are related to the computer including unwanted programs and spyware that may get installed in the system without the proper knowledge of the user of the computer system. an spyware program may be included with other softwares. The spyware can reach the intended system when a download is ion activated such as a music file.. The user should be conscious of the pop- up boxes where a answer to a question is asked in aspect of yes and no. Firewalls An intrusion detection system is mainly designed in order to maintain all the inbound and outbound activity of the network and identify and pattern which may be assumed to be suspicious that may be an indication of someone attacking or attempting to break into the network (Korman Avidan, 2016). The intrusion detection system is considered to be passive in the sense that its suggests user of the suspicious activity taking place not prevent them. There are two types of filter associated with the filtering process of the IDSs which are deep packet inspection and packet stream analysis (Hoffmann et al.,2016). The deep packet inspection role is not only limited on the footer and the header of the packet of the information but also looks into the content of the packet (the data part) in order to search for illegal statement and criterias that are predefined. This allows the firewall to make appropriate decision about the aspect of whether to allow or disallows the packet of the data in order to get through the route of the internet. Delving into the content with the packet is done by the DPI by which it allows determination to be made with respect to the packet are finally allowed traveling into the network (Desai et al., 2016) The Deep packet inspection enforced a strong foothold in the aspect of the security. The DPI offers just more than the examination of the packet of the data (Thorup, 2017). The network management tools which can a future player in the security aspect of networking gather the deep packet inspection information in order to create a better knowledge and understanding of the network traffic, performance related to network and unifying applications. The concept also provides an additional advantage of information that are implemented and user for network trending, forensics and analytics with network (Roy, 2017). Packet Stream Analysis The packet stream analysis can be used in both way legitimately or illegitimacy. When the technology is used legitimately the packet sniffer identifies any transmission error for the network and data. The most important function of the technology is the network detection. The process of packet capture is very much similar in the essence of telephone wiretapping in basic sense detecting anything which is going through the computer network (Weiss, Y., Torralba Fergus, 2009). Monitoring the network problem and troubleshooting any problem when it arises can also be an advantage of the implementation. The Packet sniffer has a variety of function which would be very much beneficial in the near future. By this mean it can help defend in detection of attempt of intrusion, detect misuse of the network ,monitoring momentum with the data , debug communication in the server, filter out suspect content, isolate and detect exploited system, gather statistic on the network issues. Thus it can be stated that these method serves as a primary point for the monitoring purpose of the network. References Altman, Y., Keren, A. Y., Krupkin, I. (2016). U.S. Patent No. 9,306,971. Washington, DC: U.S. Patent and Trademark Office. Antonakakis, E., Perdisci, R., Lee, W., Ollmann, G. (2016). U.S. Patent Application No. 15/384,025. Appelt, D., Nguyen, D. C., Briand, L. (2016). Automated Testing of Web Application Firewalls (No. TR-SnT-2016-1). Bellare, M., Kane, D., Rogaway, P. (2016, August). Big-key symmetric encryption: resisting key exfiltration. In Annual Cryptology Conference (pp. 373-402). Springer Berlin Heidelberg. Chen, P., Ong, Y. C., Page, D. N., Sasaki, M., Yeom, D. H. (2016). Naked black hole firewalls. Physical review letters, 116(16), 161304. Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X. (2016). Dual-server public-key encryption with keyword search for secure cloud storage. IEEE transactions on information forensics and security, 11(4), 789-798. Desai, M., Patel, S., Somaiya, P., Vishwanathan, V. (2016). Prevention of Distributed Denial of Service Attack using Web Referrals: A Review. Gollmann, D., Meier, J. (2016). Computer SecurityESORICS 2006: 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings (Vol. 4189). Springer Science Business Media. Goyal, R., Koppula, V., Waters, B. (2017, April). Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 528-557). Springer, Cham. Hoffmann, H., Daily, M. J., Holland, G. D., El Defrawy, K. (2016). U.S. Patent No. 9,336,239. Washington, DC: U.S. Patent and Trademark Office. Koppula, V., Pandey, O., Rouselakis, Y., Waters, B. (2016, June). Deterministic public-key encryption under continual leakage. In International Conference on Applied Cryptography and Network Security (pp. 304-323). Springer International Publishing. Korman, S., Avidan, S. (2016). Coherency sensitive hashing. IEEE transactions on pattern analysis and machine intelligence, 38(6), 1099-1112. Ling, H., Chen, Z. (2016). U.S. Patent No. 9,503,425. Washington, DC: U.S. Patent and Trademark Office. Mell, P., Grance, T. (2017). The NIST definition of cloud computing. Prajapat, S., Thakur, R. S. (2016). Optimal key size of the AVK for symmetric key Encryption. Covenant Journal of Informatics and Communication Technology, 3(2). Roy, S. (2017). Denial of Service Attack on Protocols for Smart Grid Communications. In Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 50-67). IGI Global. Sinclair, G., Olson, R., Falcone, R. (2017). U.S. Patent No. 9,721,099. Washington, DC: U.S. Patent and Trademark Office. Thorup, M. (2017, January). Fast and powerful hashing using tabulation. In Proceedings of the 14th ACM/SIGEVO Conference on Foundations of Genetic Algorithms (pp. 1-1). ACM. Waters, B. (2016, June). Deterministic Public-Key Encryption Under Continual Leakage. In Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings (Vol. 9696, p. 304). Springer. Weiss, Y., Torralba, A., Fergus, R. (2017). Spectral hashing. In Advances in neural information processing systems (pp. 1753-1760).