Friday, December 27, 2019

Earning a Bachelors Degree in Paralegal Studies 2019

There is more than one road to a position as a paralegal. The National Association of Legal Assistants say that formal educational training is not always required. With hands-on experience through apprenticeship under an experienced attorney can match the standing of a certificate. Even though it may be possible to land a job as a paralegal without a degree, most individuals seeking this career will obtain an education in the field. These paralegal candidates may enroll in a certificate, associates, bachelors, or masters degree program. These can be obtained either on campus or online through many colleges and universities. There are a number of colleges and universities that offer online education programs and distance learning options these days. Entry level paralegal positions can be landed with an associates or bachelors degree. Some masters programs in paralegal studies can lead to legal administration positions. The responsibilities of a paralegal vary depending on the particular law firm you may be applying to. An associates degree typically focuses more on clerical work and law office management rather than detailed legal knowledge. A bachelors degree in paralegal studies will provide general education that covers history, mathematics, and English. .u74b129450017664fe9f4d33ecadadc54 { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u74b129450017664fe9f4d33ecadadc54:active, .u74b129450017664fe9f4d33ecadadc54:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u74b129450017664fe9f4d33ecadadc54 { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u74b129450017664fe9f4d33ecadadc54 .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u74b129450017664fe9f4d33ecadadc54 .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .u74b129450017664fe9f4d33ecadadc54:hover .postTitle { text-decoration: underline!important; } READ You and a Career in AdvertisingAccording to the National Federation of Paralegal Associations, a bachelors degree is becoming the standard level of education required for a paralegals position. The federation has set a general curriculum requirement for a bachelors degree in paralegal studies. General education should cover: English Composition/Grammar Mathematics Logic/Philosophy Speech/Communication Earth or Natural Science Political Science/History Sociology Humanities, including Philosophy Preferred electives include: Business Computer Science/Literacy Foreign Language Psychology Economics The practices and theories that undergraduates should be exposed to are: Litigation/Civil Procedure, Legal Research and Writing, Real Property Transaction, Business and Corporate Law Wills, Trust and Estate Planning and Family Law Torts Contracts. Also, Advanced Legal Research and Writing, Advanced Litigation/Civil Procedure, Bankruptcy, Debtor/Creditor Rights, Administrative Law, Pension/Profit Sharing, Law Office Economics and Management, Tax Law, Labor Relations/Employment Law, and Intellectual Property are classes that would prove beneficial. Most bachrlors degree programs in paralegal studies will include these or similar course offerings. Having a bachelors can provide the confidence and background necessary to apply at just about any law firm and apply for a paralegal position. .u3feeb6b57fd435e04e6e05610ca9b03b { padding:0px; margin: 0; padding-top:1em!important; padding-bottom:1em!important; width:100%; display: block; font-weight:bold; background-color:#eaeaea; border:0!important; border-left:4px solid #34495E!important; box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -moz-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -o-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); -webkit-box-shadow: 0 1px 2px rgba(0, 0, 0, 0.17); text-decoration:none; } .u3feeb6b57fd435e04e6e05610ca9b03b:active, .u3feeb6b57fd435e04e6e05610ca9b03b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; text-decoration:none; } .u3feeb6b57fd435e04e6e05610ca9b03b { transition: background-color 250ms; webkit-transition: background-color 250ms; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; } .u3feeb6b57fd435e04e6e05610ca9b03b .ctaText { font-weight:bold; color:inherit; text-decoration:none; font-size: 16px; } .u3feeb6b57fd435e04e6e05610ca9b03b .post Title { color:#000000; text-decoration: underline!important; font-size: 16px; } .u3feeb6b57fd435e04e6e05610ca9b03b:hover .postTitle { text-decoration: underline!important; } READ Earning Your Online Master's Degree in Education to Secure Your FutureRelated ArticlesDegree Programs for the ParalegalParalegal Career EducationA Paralegal Studies Degree OnlineGetting a Paralegal Degree OnlineParalegal Degree Options OnlineNursing and Health Care Degrees

Thursday, December 19, 2019

Diversity in classroom - 943 Words

My first field experiment was very necessary for me to observe the ways of a successful teacher. It contributed to me learning how to deal with diversity, classroom control, and accommodation for different learning styles. In my field experiment, I focused on diversity and how it plays a huge part in how the students interact and learn within the classroom. Diversity simply put, is to have variety or differences inside of a group. Diversity in the classroom may include: exceptionalities, culture, language, learning style and gender. Different types of diversities in a classroom can if not recognized, and accommodated for hinder the learning environment. As a successful teacher, it is necessary to demonstrate an understanding for diversity†¦show more content†¦I could barely hear what was being said but body language showed that the student was frustrated and that Dr. Benson understood why and how to help accommodate the student. Once he took time with one student he allowed them to continue on their own, while he moved to the next student. Some good dispositions that I noticed Dr. Benson had were humility, confidence, patients, and openness. These dispositions served as a way to make the students comfortable with the diversity in the classroom. No student felt out of place and I believed it was because they felt accepted and not judged. They were taught when they got something wrong and rewarded with cookies when they were correct. One thing I appreciated was how in on part of the class the students were given the chance to correct their peer class work which according to Dr. Benson helped them retain the information better. The course text supports the assumption that all students can learn. I agree completely with the text and know that it is important that students have the opportunity to learn in a way that best fit them. Teachers that have one way of teaching tend to neglect the students that don’t flourish in that particular style. Also I know that dispositions of the teacher can either encourage student learning or hinder it. Students tend to do better in subjects they enjoy and enjoy the subject if they are attracted to theShow MoreRelatedDiversity in the Classroom1546 Words   |  7 Pagesiverse learning profiles in the class roomDiverse Learning Profiles in the Classroom By Phillip Anton INTRODUCTION Teachers are faced with the challenge of students bringing with them, vastly different experiences, cultures, interests and abilities. These characteristics can have a great impact on how students learn. Teaching to such a diverse group requires teachers to be more flexible and place a greater emphasis on the individual. Through the aid of variety and choice, teachers can differentiateRead MoreDiversity And Diversity Within The Classroom1550 Words   |  7 PagesDiversity in the classroom means realizing that every student is unique in their own way. Diversity has always been a part of the classroom, but in today’s society, it is even more important to embrace and promote the different cultures. When a teacher values diversity, this attitude will trickle down and impact students in a positive way. It is not enough to just talk about being diverse, teachers must show they embrace multiculturalism through their actions. For example, when asking studentsRead MoreDiversity in the Classroom Essay888 Words   |  4 PagesDiversity in classrooms can open student’s minds to all the world has to offer. At times diversity and understanding of culture, deviant experiences and perspectives can be difficult to fulfill, but with appropriate strategies and resources, it can lead students gaining a high level of respect for those unlike them, preferably than a judgmental and prejudiced view. Diversity has broad ranges of spectrums. Students from all across the continent; students from political refugees, indigenous AmericansRead MoreManaging Diversity in the Classroom2069 Words   |  9 PagesManaging Diversity in the Classroom Introduction In a regular classroom, there is a wide range of diversity of students. They are different in gender, culture, social class and learning ability. Some students may have learning difficulty or disability. When they receive education in school, it is necessary to adopt special education strategies. In this essay, I am going to suggest some educational skills and strategies for managing and teaching students with dyslexia in Mathematics lessons. DyslexiaRead MoreCultural Diversity in the Classroom754 Words   |  4 PagesDiane Uonites Cultural Diversity in the Classroom March 13, 2016 Sean Diana Part One: Collage: Personal Cultural Identity My ancestors came from Germany, Sweden, and Norway. My ancestor’s journey was by ship and landed in Ellis Island. What I value about my culture is my family and how important they are. I also value how we depend on one another to get through the day. Sisters, brothers, nieces and nephew, son and daughters. To be an American is to have the freedom to do what I wantRead MoreGraduation Speech : Classroom Diversity1591 Words   |  7 PagesClassroom Diversity I teach first grade in a public school. I have eighteen students in my class, eight girls and ten boys. In my classroom, I have a very diverse group of students. Some of the diversity in my classroom is very obvious and some is not. A lot of my students come from different racial, ethnic and religious backgrounds. Some of the diversity is not that visible. All students learn differently; meaning they have different learning styles, different levels of motivation and differentRead MoreDiversity in the Classroom Essay examples876 Words   |  4 Pagesanalyze the word diversity when examining the need for diversity within a classroom. According to Websters New Pocket Dictionary, diversity means variety, a number of different kinds. I often discuss and read about diversity in terms of cultural backgrounds; the unification of histories and stories from people from all over the world. Although, I believe that in a higher-educational setting, diversity can also be discussed as the a cceptance of the various minds within a classroom. I believe thatRead MoreCultural Diversity Within The Classroom1288 Words   |  6 PagesCultural Diversity in the Classroom-What Every Teacher Needs to Know Most teachers in the United States are Caucasian English speakers who do not have much experience teaching students from other areas of the world. The cultural differences that this creates can often put teachers at odds with their students. Sometimes the cultural beliefs of the teachers may even clash with those of the students which can end up preventing the student from having a positive or successful learning experience. TheseRead MoreEducational Diversity Within The Classroom777 Words   |  4 PagesEducational diversity in today’s classroom is easily attainable because human differences are desired. As teachers, we have a strong moral obligation to share our passion for learning with our students, but we often doubt our effectiveness. As educational leaders and administrators, it is our mission to implement a student-centered approach to learning and to facilitate a community of learning. With the students in the center of our decisions and behaviors, it is imperati ve that we consider allRead MoreStudent Diversity and Classroom Management1041 Words   |  5 PagesStudent Diversity and Classroom Management Classroom Management is imperative to a successful school year because it includes all of the practices and procedures that allow teachers to teach and students to learn. Without appropriate classroom management, even the best lesson plans will fail to succeed because it has such a huge impact on student achievement. Successful classroom management should begin the minute students walk into the classroom on the first day of school. Procedures and

Wednesday, December 11, 2019

Conference on Detection of Intrusions †Free Samples to Students

Question: Discuss about the Conference on Detection of Intrusions. Answer: Introduction On 12th June 2017, A web hosting company named Nayana from South Korea was badly hit by a ransomware attack. A report stated that more than 150 of its Linux servers were out of order which resulted in making 3400 clients website unavailable (Everett, 2016). This particular type of ransomware looks for different files in web server and encrypts them. After that a ransom was demanded against the safety recovery of the file ( Cabaj, Gregorczyk Mazurczyk, 2016). Nayana used the older version of Apache and PHP, both of them were released back in 2006. In addition, it uses 2008 edition of Linux kernel. All the tools used by Nayana were found to be back dated. All these factors helped the attackers to attack easily ( DeMuro, 2016). Certain precaution must be taken to reduce the risk of ransomware attacks like the systems should be patched for new vulnerabilities. Cyber health check programs must be conducted on regular basis to check the cyber risk exposure of various companies. Employees of various organization must be trained against phishing email so that they can easily recognize them. These mails were mainly used as a method for delivering ransomware attacks (Everett, 2016). In the month of June, a South Korean web hosting firm named Nayana has been badly hit by a ransomware attack named Erebus (Mercaldo et al., 2016). More than 150 of their Linux server were put out of order which resulted in unavailability of 3,400 client website ( DeMuro, 2016). Erebus ransomware is also known as cryptovirus which is named after Greek God of darkness. The ultimate goal of this Erebus ransomware is to attack different files on the Web servers and to encrypt them. After that a ransom is demanded for the safety recovery of the files (Hampton Baig, 2015). At first the attackers demanded 550 bitcoins and after several negotiation the deal ended on 400 bitcoins. The ransom has been demanded in three installments. It is a questionable part on the company part that it does not have any back up for those important data (Kharraz et al., 2015). As per some report, Nayana website runs on back dated Linux kernel. Basically it uses older version of Apache and PHP (Mercaldo et al., 2016). The company does not invested a single penny on their web development which gave a wonderful option to the attackers to attack their website and demand a ransom (O'Gorman McDonald, 2012). Erebus ransomware looks for different files on the web server and after that it encrypts them. After that a ransom is demanded for the safety recovery of their files. These ransomware took place as the South Korean company named Nayana has been badly hit and more than 150 of its linux server are damaged (Rajput, 2017). In this case a ransom equating to 550 bitcoin has been demanded and after negotiation the deal has been settled on 400 bitcoin with the attackers (Mercaldo et al., 2016). Nayana website mainly uses older version of Apache, PHP and Linux kernel. Due to this reason, the attacker easily hacked the web server of this particular company (Kharraz et al., 2015). A report stated that Erebus uses RSA algorithm to change the AES keys of windows and which will ultimately change its encryption keys (Rajput, 2017). Erebus is not the first ransomware virus to affect the various networks running on Linux, there are many others discovered back in the year of 2014(O'Gorman McDonald, 2012). Certain measures can be taken to reduce the risk of ransomware attack like the systems from various organizations must be regularly patched for new updates, penetration test must be run in various systems to check holes in the respective systems, Cyber health check up plans must be conducted in various firms to check the cyber risk exposure of their systems (Everett, 2016). Employees of different organization must be trained to recognize phishing emails which are used as method for delivering ransomware. Systems of various organization must be updated with latest firmware and anti-virus softwares. Organization should consult with agencies like ISO-27001 complaint ISMS to improve their security services ( Cabaj, Gregorczyk Mazurczyk, 2016). Agencies like these help various organizations in the matter of security. These agencies work with various firms irrespective of their location (Hampton Baig, 2015). These agencies have a experience of many years. It is a advise to various organi zation that they should have back up of their important data in two to three locations ( DeMuro, 2016). The employees of different companies are advised to avoid installation of unknown third party softwares in their systems as it provide an gateway to such ransomware (O'Gorman McDonald, 2012). From the above discussion, it can be concluded that cyber security is a great issue among various IT experts ( Cabaj, Gregorczyk Mazurczyk, 2016). It risk some important and valuable data of an organization. Certain issues must be taken into account like the systems from various organizations must be regularly patched for new updates, penetration test must be run in various systems to check if there are any holes in it (Kharraz et al., 2015). This ransomware took place due to usage of older version of Apache, PHP and Linux kernel in the systems and websites (Hampton Baig, 2015). Employees of different organization must be trained to recognize phishing emails which are used as method for ransomware attack (Rajput, 2017). Ransomware is nothing but a type malicious software that affects the hard drive of various system (Mohurle Patil, 2017). The ultimate goal of ransomware is to encrypt the data so that it become inaccessible. After that a ransom is demanded against those encrypted files (Matthies, Keller Lim, 2012). In the case of WannaCry attack, many business and computer users from all over the world are requested for a ransom of 300-600 bitcoins. Ransomware is consider as one of fastest growing cyber-crime in the world(Akkas, Chachamis Fetahu, 2017). To deal with the ransomware attack a technique known as kill switch is launched (Martin, Kinross Hankin, 2017). According to a report more than 150 countries are affected due to this wannacry ransomware attack. It affected more than 300,000 systems of various organizations (Asch, Mattock Hosek, 2013). Ransomware is a malicious software which damages the hard drives of various computer systems (Martin, Kinross Hankin, 2017). Microsoft deserve some blame for its poor security which resulted in Wannacy ransomware attack (Matthies, Keller Lim, 2012). The main problem behind his attack is that most of the system across the globe have windows operating system that have either automatic updates enabled or are so backdated that they cannot use automatic updates provided by Microsoft (Mejia Gonzalez, 2016). The ultimate goal of this ransomware is to create copies of different files before deleting the original files from the system. After that victim needs a decryption key to access those encrypted copies (Collier, 2017). Among the entire nations, UK has been affected the most. Many health care services of United Kingdom have been affected due to this malware attack. Many global organization and business are affected due to this ransomware attack. In this attack the biggest issue is that the users cannot access systems data which resulted in the loss of productivity of these firms (Young Yung, 2017). Initially the attackers choose phishing mail as the mode of delivery of this malware. Till no cases of data breach has been found where private information has been accessed and altered. WannaCry is developed using a piece of NSA code which has been released by a group of hacker known as Shadow Brokers (Mohurle Patil, 2017). Due to this ransomware, Giant firms like Nissan Motors, FedEx and Russia bank sberbank are also affected (Martin, Kinross Hankin, 2017). In the beginning phishing emails are chosen as the mode of delivery of this malware. This ransomware attacked a known vulnerability present in the older version of Microsoft windows (Collier, 2017). After that a patch has been released by Microsoft to tackle the attack of this ransomware (Mejia Gonzalez, 2016). The main mode of spreading of this malware is the malicious software which have been downloaded in the computers through various links of computers. WannaCry is build with capability that appears to have properties like same vulnerability (Young Yung, 2017). After capurting various systems, wannnacry comes out with kill switch URL in the systems in order check whether the malware is in sandbox environment or not (Akkas, Chachamis Fetahu, 2017). Now if the respective URL does not respond back then malware starts to encrypt the files containing important data by using a method known as AES-128 cipher (Asch, Mattock Hosek, 2013). After the successful encryption of these files a ransomware note is displayed on the victims machine. This ransomware attack has the tendency to scan the internet IP and infect other systems linked on the with IP (Matthies, Keller Lim, 2012). Attacks like this ransomware can be prevented by using certain measures like backup of important data, installation of latest updates on the system, Installation of antivirus software, enabling security protections. Back up of important data is ensured on a regular basis and after taking the backup it is advised to remove the device from the system so that malware infection cannot spread to your system. The ultimate notion of the malware is to block the access of important data (Collier, 2017). Now on the contrary if the user has a backup of all important data then the ransomware cannot affect the system. The system, software and devices must be updated from time to time. User must be updating their systems to current version of windows to minimize the attacks of various malware (Mejia Gonzalez, 2016). Antivirus softwares must be installed on every possible devices and it must be updated on regular basis. Developers from all across the globe are working very hard to track upgradation in various malware and their systems software updation, on the contrary this is only possible with the help of latest updates (Asch, Mattock Hosek, 2013). Security protection on the user device must not be disabled, if it is disabled then it may make the device more open to malware attack. Now if a user is a victim of malware attack then he should contact the respective IT services firm or he may contact the respective cyber insurance organization if the company has a cyber insaurance (Mohurle Patil, 2017). Conclusion From the above discussion it can be concluded that organization from all across the globe must create cyber security awareness among their employees. On 12 May 2017 the ransomware attack known as WannaCry infected the various systems (Akkas, Chachamis Fetahu, 2017). A mechanism known as Kill switch has been developed by researchers to stop the effect of this malware attack. Security awareness program must be conducted in the various nations. Cyber security in different firms must be improved in order to cut the impact of various malwares (Young Yung, 2017). References Akkas, A., Chachamis, C. N., Fetahu, L. (2017). Malware Analysis of WanaCry Ransomware. Asch, B. J., Mattock, M. G., Hosek, J. (2013).A new tool for assessing workforce management policies over time. Rand Corporation. Collier, R. (2017). NHS ransomware attack spreads worldwide. Martin, G., Kinross, J., Hankin, C. (2017). Effective cybersecurity is fundamental to patient safety. Matthies, C. F., Keller, K. M., Lim, N. (2012).Identifying barriers to diversity in law enforcement agencies. Rand Corporation. Cabaj, K., Gregorczyk, M., Mazurczyk, W. (2016). Software-Defined Networking-based Crypto Ransomware Detection Using HTTP Traffic Characteristics.arXiv preprint arXiv:1611.08294. DeMuro, P. R. (2016). Keeping Internet Pirates at Bay: Ransomware Negotiation in the Healthcare Industry.Nova L. Rev.,41, 349. Everett, C. (2016). Ransomware: to pay or not to pay?.Computer Fraud Security,2016(4), 8-12. Hampton, N., Baig, Z. A. (2015). Ransomware: Emergence of the cyber-extortion menace. Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., Kirda, E. (2015, July). Cutting the gordian knot: A look under the hood of ransomware attacks. InInternational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment(pp. 3-24). Springer, Cham. Mercaldo, F., Nardone, V., Santone, A., Visaggio, C. A. (2016, June). Ransomware steals your phone. formal methods rescue it. InInternational Conference on Formal Techniques for Distributed Objects, Components, and Systems(pp. 212-221). Springer, Cham. O'Gorman, G., McDonald, G. (2012).Ransomware: A growing menace. Symantec Corporation. Rajput, T. S. (2017). Evolving Threat Agents: Ransomware and their Variants.International Journal of Computer Applications,164(7). Mejia Gonzalez, N. J. (2016). Three Essays on Obesity. Mohurle, S., Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017.International Journal,8(5). Young, A. L., Yung, M. (2017). Cryptovirology: The birth, neglect, and explosion of ransomware.Communications of the ACM,60(7), 24-26.

Wednesday, December 4, 2019

Joe DEustachio Essays (1791 words) - Artificial Intelligence

Joe D'Eustachio Principles of Microeconomics Dr. Newman November 10, 2017 What is the Future of Artificial Intelligence? What is the future of Artificial intelligence? One Smithsonian article raised an interesting question while I was doing research . The author of the article , Emily Matchar, asks " A rtificial intelligence is already used to diagnose sick patients , perform customer service tasks and teach college courses . But can AI outsmart Wall Street? " AI already does so much, and it has not even been around for very long . While John McCarthy is regarded as the father of AI for coining the term in the Dartmouth Conference in 1956 , I believe it has come farther in terms of technological advancement than McCarthy could have ever dreamed . In 1965 , John McCarthy held what would be known as the birthing of artificial intelligence in the Dartmouth Conference . He challenged leading researchers at the time through various advanced research topics in order to set the foundation for how AI was meant to be studied and utilized in the world . Livinginternet . com states that " This conference and the concepts it crystallized gave birth to the field of AI as a vibrant area of interdisciplinary research , and provided an intellectual backdrop to all subsequent computer research and development efforts ." Throughout history , artificial intelligence has been limited to programs and software for computers and other smaller and more menial technology . This is due to the fact that the technology that was being used to research AI was, at the time , insufficient . However, the human race as been developing not only the technology used to study AI , but AI itself . Today , you see robotic toys that can move on their own , cars that are capable of driving themselves, and even a walking/talking robot that can show emotion . All of this is possible due to AI . AI has even taken over in cell phones and speakers . Siri , perhaps one of the most popular reasons people buy iPhones , is a very famous modern-day AI . Originally it started out as a female-voiced personal assistant in the iPhone 4S, but through the generations of iPhone, Siri was developed and you can make it male or female . Even Alexa, who is part persona l assistant, and a speaker for music, has made a huge splash in the market . Other personal assistants include Cortana, who is for Windows Mobile, and Google Now, which is for android . All of these personal assistants do virtually the same things ; the only difference is the creator . These are all just some of the ways AI are used in everyday life . Video games are also a huge source of AI investment . According to beebom.com, " First-person shooters like Far Cry and Call of Duty make significant use of AI, with enemies that can analyze their environments to find objects or actions that might be beneficial to their survival ; they'll take cover , investigate sounds, use flanking maneuvers, and communicate with other AIs to increase their chances of victory . As far as AI goes, video games are somewhat simplistic, but because of the industry's huge market, a great deal of effort and money are invested every year in perfecting this type of AI . " With all of this tech booming, it is hard to say that AI is not a leading cause for market growth . However, R . L . Adams , a software engineer, who studies AI, believes AI to be something other than what is marketed on mainstream media . " A true artificially-intelligent system is one that can learn on its own . We're talking about neural networks from the likes of Google ' s DeepMind, whichcan make connections and reach meaningswithout relying on pre-defined behavioral algorithms . True A . I . can improve on past iterations, getting smarter and more aware, allowing it to enhance its capabilities and its knowledge ." This goes beyond what you see in robotic toys and other menial AI technologies . Those show just a mere