Friday, December 27, 2019

The Future Of Enlightenment - 996 Words

The Future of Enlightenment Balpreet Palha 214985881 Submitted in partial fulfillment of the requirements of HUMA 1910, York University Mark Terry, TA†¨ Tutorial # 3 Enlightenment was a prevalent topic in the 18th century. In 1784 Kant, Immanuel wrote An Answer to the Question: What is Enlightenment?. In which Kant sheds light on the distinction between public and private reason using many different instances. Kant proposes that public use of freedom is essential for enlightenment, but says the private reason is not as useful as public. Similarly, this paper will argue that public freedom can more effectively lead to enlightenment, but private reasoning can also lead to enlightenment using present day examples, comparing past and present circumstances and indulging into the outcome of both private and public reasons. Kant explains, â€Å"Enlightenment is man’s emergence from his self-imposed immaturity. Immaturity is the inability to use one’s understanding without guidance from another† (Kant, 35). Although immaturity in today’s linguistic language is thought of as being irresponsible or childish, Kant however uses immaturity to describe the incapability to be able to think on your own. Additionally Kant explains that an immature person becomes so dependent on others to make his decisions that he overlooks thinking for himself. Kant uses an analogy of restrained animals, like cattle and how they â€Å"will not dare take a single step without go-cart to which theyShow MoreRelatedThe Age Of Enlightenment And The Scientific Revolution1675 Words   |  7 Pagessocial norms and scientific advances. Although the industrial revolution and the scientific revolution represented a giant leap forward in human development, the Age of Enlightenment delivered the greatest influen ce for the future American society and planted the way for cultural and humanistic enrichment. The Age of the Enlightenment raised new concepts in education, democracy, and human freedom. The new humanistic philosophy promoted the polish of the human intelligence and made education a longingRead MoreAnalysis Of The Poem The Fountain 963 Words   |  4 Pagesworld of The fountain, there are three planes of existence which correlate to the past, present, and future/consciousness. Darren Aronofsky intertwines these three times periods creating a nonlinear perspective of time, but it is in line with the general plot of the movie. Aronofsky wants the viewer to link the time periods together where the past is the story depicted in the book, and the future can be seen as his consciousness. A character that stays apparent in these settings is Izzi. IzziRead MoreThe Enlightenment and the Emergence of Free Thinkers Essay781 Words   |  4 PagesThe Enlightenment brought a wave of new t hought and information into a society dominated by one controlling force: The Church. This final authority over the people in these dark times controlled them with religious dogma and powerful â€Å"suggestive† power over their state leaders. Being the largest and richest organization in the world for centuries gave The Church the ability to squash any free thinkers. Before the printing press, the majority of the educated and literate were the christian monksRead MoreThe Enlightenment : The Greatest Impact Of The Enlightenment945 Words   |  4 Pageswould be very different if the Enlightenment did not occur in the 18th century. With people like Immanuel Kant, Baron de Montesquieu, and John Locke, the Enlightenment was one of the most revolutionary events to ever occur. For example, Immanuel Kant explored human experiences, Montesquieu believed that there should be three branches of government, and John Locke believed in the social contract and the ability to own life, li berty and property. The ideas of the Enlightenment drastically changed the worldRead MoreEssay about Kants Views on Enlightenment505 Words   |  3 PagesKants Views on Enlightenment The best summary of Kants view of Enlightenment lies in the first paragraph of his essay An Answer to the Question: What is Enlightenment?: Sapere Aude. Translated dare to know, the phrase is the motto of enlightenment. For Kant, enlightenment means rising from the self-imposed stupor which substitutes obedience for reason and which atrophies mans ability to think for himself and develop his natural capacities. Laziness and cowardice prevent man fromRead MoreThe French Revolution And The Enlightenment1471 Words   |  6 Pagesof the French Revolution sparked by philosophies of Enlightenment, will impact the future. Historical figures such as Robespierre heading the Great Assembly will drive change in culture through the revolution, in hopes of achieving enlightened societies. The 18th century marks the beginning of modern history. The French revolution playing a role in furthering Enlightenment, will led to a chain of events that will change the course of the future and moderniz e the world through the intellectual andRead MoreAn Analysis of Candide Story by Voltaire1347 Words   |  6 Pagesâ€Å"Candide or Optimism† was written in the enlightenment era. Voltaire story is published in The Norton Anthology of Western Literature. Voltaire’s character, Pangolss, is a philosopher who teaches about God morals. Pangolss is also a mentor to Candide, who is the main character of the novel. Candide has a good heart but is also feel s very hopeless in life. Pangloss takes Candide under his wing and teaches him that â€Å"best of all possible worlds.† The enlightenment movement is seen closely in VoltaireRead MoreEssay on Life and its Quest: Personal Experience917 Words   |  4 Pagesgood or bad. Thus, no two people will have the same quest because every person is unique and will have a different life. There are an infinite amount of paths and choices that one can take, and that is what makes the quest in life worthwhile. Enlightenmen t in this sense is not knowing all about the world, but is rather finding an inner peace and happiness with oneself and one’s life by gaining new experiences. My father was the very person who opened up this view of life to my eyes. As a childRead MoreThe Objectivity Of The Enlightenment1156 Words   |  5 PagesThe objectivity of the enlightenment, which explains everything through mathematical and scientific laws, is in itself the impediment within progress because to detach the emotional aspect of reason within rationale results in fragmented knowledge; it is only when both realms of knowledge and emotion intertwine within the genius that progression will readily manifest and prosper in ratiocination. While certain personas and events in Arcadia typify Enlightenment characterization, others depict characterizationRead MoreBuddhism : Then And Now1035 Words   |  5 Pageshe saw it, there was no point in life if there was so much suffering. At age 29, Siddhartha set out into the world to find enlightenment. After a 6 year journey, after meditation, starvation, and torture, Siddhartha finally received his enlightenment. He was meditating under the Bodhi Tree in Bodh Gaya, India, and said he would not move until he gained perfect enlightenment. Devaputra Mara, demon of all demons brought an army of his kind to disturb Siddhartha during his meditation. When that did

Thursday, December 19, 2019

Eliminating the Price Effect of an Index Automatically...

By the attempt to eliminate the price effect from an index fund, the fundamental index managers change the set-up of the index in such a way that it automatically changes the basic characteristics of the index. As shown in exhibit 10 of the Research Affiliate case, fundamental indices usually not only deal with a higher turnover ratio but also with a higher net expense ratio, for implementing the fundamental strategy in reality seems to go hand in hand with higher costs. Looking at commonly used multiples in exhibit 11, we see no surprises. While the P/E ratio for the RAFI index is only slightly smaller compared to the Russell 1000 index, the Price to Book/Cash Flow/Sales ratio is fundamentally lower in all categories for the RAFI index. More interesting is the fact that the RAFI index is composed of companies with an on average lower market capitalization as well as a higher leverage ratio, which might be a hint that the RAFI is also taking on more risk to produce the excess returns. Even though Research Affiliates uses several methods to eliminate a bias towards a specific sector/type of company, research shows that fundamental indices are clearly more exposed to value and small stocks, which is further illustrated in exhibits 12 14. Looking at exhibits 11 13 we directly observe RAFI’s strong exposure towards financial institutions. Citigroup and Bank of America alone account for roughly 15% of the index while Citigroup is not even found within the 10 largestShow MoreRelatedShow How Transactions in Derivatives Can Be Used to Either Hedge Risk or to Open Speculative Positions.2767 Words   |  12 Pagesvolatility and complexity of financial markets. A diverse range of new financial products have been created to enable market participants to handle the risks arising from trade in securities and to speculate on future expected movements in securities prices, without direct trade in the assets themselves. Derivative contract creates a promise to deliver or trade an underlying product at some time in the future. TheRead MoreExxon Mobile Merger13851 Words   |  56 PagesExxon-Mobil Merger: An Archetype ABSTRACT: In response to change pressures, the oil industry has engaged in multiple adjustment processes. The 9 major oil mergers from 1998 to 2001 sought to improve efficiency so that at oil prices as low as $11 to $12 per barrel, investments could earn their cost of capital. The Exxon-Mobil combination is analyzed to provide a general methodology for merger evaluation. The analysis includes: the industry characteristics, the reasons for the merger, the nature of the dealRead MoreEssay on Solution Manual-Investment22189 Words   |  89 PagesMiller Chapter 1 A Brief History of Risk and Return Concept Questions 1. For both risk and return, increasing order is b, c, a, d. On average, the higher the risk of an investment, the higher is its expected return. 2. Since the price didn’t change, the capital gains yield was zero. If the total return was four percent, then the dividend yield must be four percent. 3. It is impossible to lose more than –100 percent of your investment. Therefore, return distributions are cut off onRead More7 Megatrends 203026297 Words   |  106 PagesROLAND BERGER STRATEGY CONSULTANTS TREND COMPENDIUM 2030 START INDEX TRENDS CONTACT This document is optimized for color prints 1 About the TREND COMPENDIUM 2030 WHAT IS IT? The   TREND   COMPENDIUM   2030   is   a    global   trend   study   compiled   by   Roland    Berger   Strategy   Consultants It   describes   seven   megatrends   that   will    shape   the   world   over   the   next   20   years All   trends   have   a   broad   impact   on   how    we   do   business    Therefore,   Roland   Read MoreCompensation Management9389 Words   |  38 Pagesorganization, which minimize wastage, and enhance overall efficiency. It also helps organization to reduce the cost of production and maximize profits. Q2.a) What is the concept of Cost? What are the different elements of cost? Ans2a. Cost is the basic amount of expenses a businessman is likely to incur to be able to manufacture or process one unit of proposed product. Prior to starting of any business, a businessman has to prepare a rough sketch of the product he wants to produce. And he has toRead MoreDifferent Approaches to Corporate Reporting Regulation22097 Words   |  89 Pagesregulation; IFRS; US GAAP; SEC; standard-setting, mandatory disclosure; political economy Downloaded by [University of Nottingham-Ningbo] at 20:16 12 January 2013 1. Introduction and overview Corporate reporting regulation has seen substantial changes in recent years. Many of them were in response to corporate reporting scandals and perceived shortcomings during ï ¬ nancial crises around the world. Moreover, there has been a concerted effort to converge countries’ reporting standards. But despiteRead MoreOrganizational Culture by Charles Handy29094 Words   |  117 Pages | | Key Terms Average number of covers Prime Cost Average sale Sales Average sale per customer Sales mix Average sale per server Sales price Controllable cost Seat turnover Cost Semivariable cost Cost per dollar of sale Total cost Cost percent Total covers Cover Total number sold Directly variable cost Total sales FixedRead MoreFinal Answers 1 Essay12505 Words   |  51 Pagesas current trends in modern manufacturing operations. What is the relationship, if any, between these trends? Can you cite any examples? Mass Customization is personalization of products and services for individual customers at a mass production price. Traditionally customization and low cost have been mutually exclusive. Mass production provided low cost but at the expense of uniformity. Customization was the product of designers and craftsman. Today, new interactive technologies, like the InternetRead MoreMerger and Acquisition: Current Issues115629 Words   |  463 Pagescountry of origin. A catalogue record for this book is available from the British Library. Library of Congress Cataloging-in-Publication Data Mergers and acquisitions : current issues / edited by Greg N. Gregoriou and Karyn L. Neuhauser. p. cm. Includes index. ISBN 0-230-55379-6 (alk. paper) 1. Consolidation and merger of corporations. I. Gregoriou, Greg N., 1956– II. Neuhauser, Karyn L. HD2746. 5. M4365 2007 338.8’3—dc22 2007021799 10 16 9 15 8 14 7 13 6 12 5 11 4 10 3 09 2 08 1 07 Printed and boundRead MoreUK - Analysis Report31935 Words   |  128 Pagesstandards of living, but income inequality is still apparent A recent report released by the UN declared that, for the first time in more than 100 years, the standard of living in the UK had surpassed that of the US. According to the Human Development Index 2008–09 published by the United Nations Development Program (UNDP), the UK ranks 21st in terms of human development. However, the government is faced with the challenge of income disparity. Relative inequality has increased and the government has fallen

Wednesday, December 11, 2019

Campaign Exploiting SMB Vulnerability †MyAssignmenthelp.com

Question: Discuss about the Campaign Exploiting SMB Vulnerability. Answer: Introduction: As a telecommunication giant, Verizon serves millions of customers who rely on its infrastructure to conduct their communications. This outcome makes the company a major source of information as clients continuously use its systems to exchange data, a facility that was breached earlier in the year. As reported by the companys representatives in July, the companys systems were compromised which left records of more than 14 million customers exposed. Now, according to the company, the attack was propelled by user negligence as the companys subcontracted organization failed to secure the data. In all, the customers affected did not prescribe to any unique service or product but included all the customers that contacted the customers care service within the six months prior to the attack(Sicilian, 2017). Now, the customer care services were held in a separate system as compared to other operations which helped isolate the attack. Nevertheless, the separate system did hold customers sensitive data including names, addresses and contact numbers as is the norm with most customer care services. Moreover, some customers did contact the centre to make inquiries on their access pins which led to their exposure when the breach occurred. However, according to the organization, the data breach was contained after being discovered by an independent Software researcher who hailed from Upguard security firm(Wisner, 2017). The attack, how and why? Verizon placed full blame on a third party member, who according to them was subcontracted to deal with the customer care service. In essence, Verizon had been using a cloud facility to host the communications made between its customers and itself. This cloud facility was set up using the Amazon S3 infrastructure as provided by Amazon web service (AWS). In addition to this, the company had given another party member the control of this service and were thus responsible for monitoring as well as maintaining the system. NICE Systems was the organization subcontracted by Verizon to manage the cloud infrastructure that hosted the customer care service(Deahl, 2017). So how did the breach occur? Well, at the time of the attack, an employee of the subcontracted company (NICE) failed to secure the data contained within the cloud servers. This error led to the exposure of millions of records as outlined above, moreover, the breach highlighted the extent of the data contained on the online servers as they had extensive log records from residential customers who were in contact with Verizon. However, even more worrying was the depth of the information uncovered as there were minimal reductions or any form of encryption. In fact, when viewed by the public eye the records contained clear text data that gave details such as names, security PINs and addresses. Furthermore, some records also contained the customers account balances. In all, the communications made between the organization and its customers were fairly displayed to the masses(Wisner, 2017). Why the attack occurred? (Vulnerability at hand) After the breach had occurred several investigations were conducted by independent researchers who later discovered that the subcontracted organization (NICE systems) had also undergone into a partnership with another organization. Therefore, the customer care service owned by Verizon had been subcontracted to an organization that had also taken another subsequent partner. Now, the other party member involved was Orange, a France based organization that also dealt with telecommunication services(Kumar, 2017). Nevertheless, the official cause of the attack was a misconfigured setting within the security protocols of the cloud infrastructure. Cloud infrastructures are known to have extensive security requirements owing to the amount of data they hold and the connections they use to facilitate this storage. For one, the internet is used as the main access platform which is well known to be pervasive, containing many security challenges. Therefore, the attack at hand occurred due to an error in the security settings which require an adamant security policy. Moreover, the continuous and subsequent chain of subcontractors made it even more difficult to ascertain the security measures put in place(Daitch, 2017). The possible solutions Cyber-security is always a challenging endeavour as there are so many considerations to be made. For one, the data used is continuously transmitted via multiple communication channels which have different users, who have different intentions. Secondly, the users involved are anonymous which makes accountability a difficult issue. Now, the problem is further intensified when a third party member is involved, as the subcontracted company will escalate the risks involved based on their security procedures. Therefore, the first solution would be to eliminate the third party members who are handling Verizons data, in fact, Verizon itself should handle its own data and if necessary engage a cloud service provider directly. However, they should have the ultimate control of the cloud infrastructure to ensure the best security procedures are put in place and followed(Verizon, 2017). In addition to this, the company should consider the nature of the problem at hand, where millions of records containing customers sensitive information are used. The organization should also consider the cloud infrastructure and the security requirements involved. Therefore, a detailed security policy should be implemented to guide the technical staff in deploying the online resources. Now, this policy would have access procedures to manage the availability of the information used. Furthermore, the same policy would enact cryptographic techniques of transmitting the information, having the right encryption, authorization and authentication. This final solution would help contain the datas confidentiality and integrity attributes that were lost because of this attack(Verizon, 2017). Identified by many as the greatest cyber-attack ever conducted in modern time, the WannaCry attack took out thousands of computers connected online. The attack was so severe that some places around the world faced full system shutdowns that to date are still being felt by the users as the malware used was deeply rooted within the online infrastructure. Furthermore, unlike other ransomware attacks, the malware at used employed extensive vulnerabilities within computer systems to advance its course and failed to have substantial weaknesses that could defeat it. In all, WannaCry was a new form of ransomware attack that infiltrated thousands of computers worldwide. In fact, at the start of the attack, an estimated 100 countries were affected including more than 200,000 systems(Sherr, 2017). Now, the attack was traced back to the United States where a black hats hacking group accessed the NSAs (National Security Agency) hacking tools which contained several techniques of compromising systems as outlined in it, cyber-weapons division. This group known as Shadow Brokers used the tools through a system vulnerability to infect many computers around the globe. In the attack, some of the countries affected were Russia, United Kingdom, China and Spain, where multiple systems from various business sectors were compromised(Mullin Lake, 2017). Those affected and how At the start of the attack in May, the initial reports estimated that more than 45,000 computers were affected across 99 different countries. Moreover, the attack did not isolate or target any specific field but instead used different networking connections to conduct its illicit actions. Nevertheless, some countries were more affected than others as most of their industries were heavily compromised as outlined by the aftermath of the attack. These countries were the United Kingdom, Russia and Spain. In the UK, the health sector was heavily affected as witnesses by medical practitioners and patients who were unable to conduct their daily activities. According to most of the staff employed by the health ministries, the NHS system (National Health System) was unavailable for consultation as many computers were permanently disengaged having ransom notes. These ransom notes demanded a substantial ransom amount of $300 in order to restore the data and files contained within the machines. This outcome forced the industry to halt its services across the country as the parties involved could not access the necessary data or records (medical records)(GReAT, 2017). In Russia and Spain, the private sector was hard hit as evidenced by the number of private companies affected. To start with, Russias banking industry was compromised which affected business operations. Moreover, a few public sector organizations and institutions were affected including the health and interior ministries. On the other hand, Spain saw its second largest telecommunication firm and electrical company compromised when the attack took down some of the systems used by Telefonica and Iberdrola. In some of these organizations, the management was forced to turn off their systems in an attempt to contain the problem(Sherr, 2017). Attack process WannaCrys problems started with Shadow Brokers who accessed NSA hacking tools that contained multiple vulnerabilities of computer systems. In these tools was a Windows vulnerability known as EternalBlue which was caused by a faulty messaging block protocol. Now, the protocol at hand was the Server Messaging Block (SMB), which is normally used to establish network connection across the application layer of the TCP/IP model. It is through this protocol that computers are able to share, read and write files across the networking connections they use. Moreover, it is through the same protocol that computers request services from other computers within their connections. Therefore, when compromised, the intruders could fully access a machine with minimal limitations(Liptak, 2017). WannaCry, having established this vulnerability, used the following procedure to attack systems across the world. First, the intrusion started by establishing a connection with the target machine, a function that was successfully done by the SMB handshake while exploiting the vulnerability of the protocol. Secondly, an encrypted file containing the malware program was sent to the machine. This program known as a payload contained the stager (starter) of the malware. Preventing the attack (Solution) According to experts, the attacks occurred because computer users failed to update their Windows systems. In essence, the initial versions of Windows computers contained the vulnerability established by the NSA but were later fixed by the subsequent update patches. Therefore, the first solution to the problem would have been to update the computers connected to the worldwide web. However, the developers (Windows) were at fault as they failed to highlight the extent of the vulnerability as it would have helped to push its customers to acquire the necessary solution. Windows should have prioritised the update feature to the customers having failed to secure the systems during its development stage(EY, 2017). On the other hand, the organizations affected should have had better security protocols to manage the attack. For one, most of these organizations facilitated the infiltration as they had minimal isolations within their networking infrastructures. Therefore, another possible solution would have been the isolation of the networks in use, either through firewalls or even through DMZs (demilitarised Zones). These features would have contained the problem in most of the organizations that were severely affected(CERT-EU, 2017). References CERT-EU. (2017). WannaCry Ransomware Campaign Exploiting SMB Vulnerability. CERT-EU Security Advisory 2017-012, Retrieved 29 August, 2017, from: https://cert.europa.eu/static/SecurityAdvisories/2017/CERT-EU-SA2017-012.pdf. Daitch, H. (2017). 2017 data breaches - the worst so far. Data breach technology personal, Retrieved 29 August, 2017, from: https://www.identityforce.com/blog/2017-data-breaches. Deahl, D. (2017). Verizon partner data breach exposes millions of customer records. The Verge, Retrieved 29 August, 2017, from: https://www.theverge.com/2017/7/12/15962520/verizon-nice-systems-data-breach-exposes-millions-customer-records. (2017). WannaCry ransomware attack. Technical intellignece analysis, Retrieved 29 August, 2017, from: https://www.ey.com/Publication/vwLUAssets/ey-wannacry-ransomware-attack/$File/ey-wannacry-ransomware-attack.pdf. GReAT. (2017). WannaCry ransomware used in widespread attacks all over the world. Secure list, Retrieved 29 August, 2017, from: https://securelist.com/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/78351/. Kumar, M. (2017). Over 14 million Verizon customers' data exposed on unprotected AWS server. The hacker news, Retrieved 29 August, 2017, from: https://thehackernews.com/2017/07/over-14-million-verizon-customers-data.html. Liptak, A. (2017). The WannaCry ransomware attack has spread to 150 countries. The Verge, Retrieved 29 August, 2017, from: https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-attack-spread-150-countries. Mullin, G., Lake, E. (2017). MALICIOUS VIRUSWhat is Wannacry ransomware? Malware used to cripple NHS in 2017 cyber attack. The Sun, Retrieved 29 August, 2017, from: https://www.thesun.co.uk/tech/3562470/wannacry-ransomware-nhs-cyber-attack-hackers-virus/. Response, S. S. (2017). What you need to know about the WannaCry Ransomware. Symantec official blog, Retrieved 29 August, 2017, from: https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware. Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet, Retrieved 29 August, 2017, from: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/. Sicilian, R. (2017). Verizon suffers client data breach. Identity force, Retrieved 29 August, 2017, from: https://www.identityforce.com/blog/verizon-suffers-client-data-breach. Verizon. (2017). 2017 Data Breach investigation report. Executive Summary, Retrieved 29 August, 2017, from: https://www.knowbe4.com/hubfs/rp_DBIR_2017_Report_execsummary_en_xg.pdf. Wisner, M. (2017). Verizon customer information exposed in data breach. Fox buisness, cybersecurity, Retrieved 29 August, 2017, from: https://www.foxbusiness.com/markets/2017/07/13/verizon-customer-information-exposed-in-data-breach.html.

Tuesday, December 3, 2019

One way I believe college will differ from high sc Essays

One way I believe college will differ from high school is that you won't always be guided in everything you do on a daily basis. Professors will expect the students to do their work on their own time and take responsibility with their schoolwork. While as in high school, teachers were more persistent in making sure students did their work in and outside of class, in college this is on your time and your money. Another way I see college being different than high school is the grading scale. Usually all high schools have the same, if not a relevant scale for their grades. In college I can imagine grades being wider ranged and more chunks of points for certain projects and tests. The final way I think college will differ from high school is the lifestyle. High school was fun don't get me wrong, but there was something about it that felt compacted. There was always a sense, at least for me that I was trapped and couldn't escape. I imagine the college experience being more f ree and fresh, with a lot of responsibility coming with it. When I was in high school I never really knew what I wanted to do once I graduated, but latel y I've been more intrigued by some type of work with law enforcement, or coaching in sports. A passion I have always had even at a young age was sports, so it would be amazing to do anything with that type of work. If someone asked me to pick a specific job in the law enforcement field, I would have to pick becoming a state trooper. State troopers seem like they have a good and tolerable job, but I know the training and process to become one is likely difficult. Some characteristics that I think will translate to college success are being dedicated and outgoing. Dedication to my studies would p ut me in a much better place rather had I not been dedicated. I always think it's important to have fun no matter what I do, so being outgoing would allow me to dodge a lot of unwanted stress and headaches. A college education to me would mean quite a few things to me. In today's society it's rare to find a good , stable job without having a college education, so by having one that would already put me on track to providing for myself. I just want to prove people that doubt me wrong; I wasn't always the best student or person in high school so transitioning to better habits is something I want to do. A strategy I could use to become successful in college is being ambitious, but keeping it within range and possible. I have to make sure that what I'm trying to do is not only achievable for me as a person, but within my reach. College is a different experience for most, including me, and with that comes new encounters and situations for all. So being ambitious but realistic allows me to reach my goals without any surprises or difficulties. A couple qualities I could use to also help me succeed in college are patience and drive. Patience is a big part in almost everything people do on a consiste nt basis, so with being patient you acknowledge that not everything is going to fall in place all at once. Having drive is actually in line with being patient as well, as both are for the most part self-driven and entirely up to the student. In high school I could for the most part barely study or even skip it all together for my work and still get by. Drive is going to be an important quality to attain because in college I can already tell that you won't be able to get by just doing the absolute minimum. Having drive means a student will be driven to succeed in his/her academics and to not settle for any less. When I was in high school I can say that I only studied for about 1-2 hours per week, and maybe even less. That was a combination of not being totally committed to school and just flat