Thursday, October 31, 2019

Rights of self petitioning applicants Thesis Example | Topics and Well Written Essays - 6750 words

Rights of self petitioning applicants - Thesis Example ...............................23 5.4.3 Personal Responsibility & Work Opportunity Reconciliation Act....................................................................24 5.4.4 Illegal Reformation & Immigration Responsibility Act...........24 5.4.5 Women Immigrants Safe Harbor Act.......................................24-25 5.5 Battered Women Immigrants Not Covered by VAWA........................25-29 CHAPTER 6: SUMMARY AND CONCLUSION.........................................30-31 LIST OF FIGURES Figure 1: Legal status of foreign-born population, 2002 ABSTRACT Violence against women has been a problem plaguing society since time immemorial. In the American society, this issue came to the fore in the advent of the civil movements in the 1980s when women had the opportunity to gather together and confer with each other. Thus, were born legislations protecting women from violence, including violence which occurs within the confines of their own homes. The most remarkable of these laws was the 1994 Violent Against Women Act (VAWA hereafter) which was subsequently reauthorized first in 2000 and then in 2005. This law was remarkable not only for the financial assistance it gave to women victims but also the circumvention of prior laws which require women immigrants married to US nationals or permanent residents to wait for a period of two years before jointly applying with their spouses for permanent residence. Statistics show that violence against women is more prevalent in the case of women immigrants than in US born women. The US is multiracial country - a melting pot of various ethnic origins and people coming from various cultures. There are, to date, about 34 million people, more or less, in the country who are foreign-born and many of...This law was remarkable not only for the financial assistance it gave to women victims but also the circumvention of prior laws which require women immigrants married to US nationals or permanent residents to wait for a period of two years before jointly applying with their spouses for permanent residence. Statistics show that violence against women is more prevalent in the case of women immigrants than in US born women. The US is multiracial country - a melting pot of various ethnic origins and people coming from various cultures. There are, to date, about 34 million people, more or less, in the country who are foreign-born and many of these are women immigrants who suffer at the hands of people who exploit and abuse them because of their immigration status and their social isolation brought about by their foreign surroundings, language deficiency, economic dependency, cultural ethnicity. Many of them are undocumented immigrants who came into the country without proper documentation. Since the VAWA provisions on battered immigrant women are specific only to a particular type of women immigrants, the implication is that many of these battered women are left out in the cold with no hope of aid from the government. Violence against women is a societal ill long been present but has only been recently acknowledged.

Monday, October 28, 2019

The Story of an Hour Essay Example for Free

The Story of an Hour Essay Mallard is feeling, and how the to contradict each other. An irony of fate occurs when there is difference in what a character realizes what they want and how they are treated in the end. Mrs. Mallard in this short story is the abyss of irony of fate. â€Å"When the doctors came they said she had died of heart disease – of joy that kills† (Chopin 170). Mrs. Mallard spends the first half of the short story feeling intense guilt and sadness with the news that her husband has died. Later on in the story Mrs. Mallard realizes that she is now free, without her husband she can do what she wants. When Mrs. Mallard has finally come to terms with her husband’s death and learned that it is a good thing, her husband walks in the door. Mrs. Mallard sees her husband alive and drops dead of a heart attack. Mrs. Mallard truly lives up to the irony of fate because instead of her husband being dead and her being free, Mrs. Mallard dies and her husband is the one who is alive and free. The metaphor, simile, and the irony of fate that Kate Chopin uses in The Story of an Hour help the reader follow Mrs. Mallard on her journey from grief to joy. The metaphor helps the reader understand the sadness she is feeling. The simile shows how Mrs. Mallard is dealing with her grief after hearing the news of her husband’s death. The irony of fate shows how after accepting that her husband’s death means freedom to her, she dies and it shows the reader the irony in it all. The three literary devices help illustrate the journey Mrs. Mallard takes when learning of her husband’s death. The simile and metaphor illustrate her sadness and then the irony of fate illustrates how her acceptance and joy of her husband’s death is her true end.

Saturday, October 26, 2019

Economic Globalization And Offshore Sourcing Management Essay

Economic Globalization And Offshore Sourcing Management Essay In tune with increased economic globalization and offshore sourcing, global supply chain management is becoming a vital subject for many businesses and Somerset Furniture is one of the companies facing the challenges when set up its global supply chain. The business strategy constitutes overall direction to achieve corporate objectives and goals in long term, but supply chain strategy focuses on driving down operational costs, streamlining procedures and maximizing efficiencies. However, most companies have wonderful business strategies but most of them are unlikely designed a seamless supply chain strategy which can result in great failure when doing business overseas. In this case study, Somersets current approach to manage its supply chain resulted in poor business performance, the visible hazards and other negative factors frustrated Somerset included poor logistics management, ineffective order system and inventory management as well as inconsistency of product quality. In adopting a value chain, Somerset must incorporate and execute a robust supply chain management strategy for best-fit suppliers selection, further establish on how to work with supply partners, distributors, suppliers, customers or even customers customers as a way to remain competitive. Otherwise, the company will not survive. As the marketplace changes rapidly and becomes very competitive, it is critical that Somerset reinforces existing relationships and work together internally and externally. That being said, a well-practiced supply chain strategy results in value creation for the whole organization. In a nutshell, supply chains have shifted from a cost focus to a customer focus, until currently to a strategic focus, scrutinizing the success of a strategy is just as good as the companys capabilities to fully and properly execute all. A great supply chain strategic approach, connected with operational excellence, can provide success for not only the company in crisis but also its partners and customers. 1. Introduction Somerset Furniture is an established ornate residential home wood furniture company with over 50 years history in USA, renowned for producing quality and affordable furniture with a practical range of innovative design. To cope with the fast growing U.S. market, Somerset has developed its marketing strategy by introducing new product lines every few years and successfully gained creditable reputation during the last half of the twentieth century. The company was a pioneer in furniture manufacturing processes and in applying TQM principles to furniture manufacturing. However, Somerset soon faced with thorny problems emerging in mid-1990s, such as stiffer competition, high labour rates, diminishing profits. As a result, the company downsized the domestic manufacturing facility and labour force through outsourcing several internal furniture product lines to China manufacturers, this led to be very successful in reducing costs and increasing profits initially. By 2000, Somerset closed entire manufacturing facility in the United States and outsourced all of its manufacturing to suppliers in China and then set up global supply chain, at which a series of chain-reacting problems raised and affected business. The primary focus of this paper is to find out outsourcing solution and rectify the global supply chain strategy to be very competitive. The evaluation of Somersets approach on managing current supply chain both from strategic and tactical viewpoint will be addressed in Chapter 2. The subsequent Chapter 3 and 4 respectively describes the new strategic supply chain approach and then explains the transformational requirements for changing Somerset supply chain effectively and efficiently. The conclusion will be made in Chapter 5 outlining the study points for readers. Evaluation of Somerset Furniture Companys Approach to Managing Supply Chain from both strategic and tactical viewpoints. Somersets Existing Global Supply Chain Process Map Figure 2.1 Somersets Global Supply Chain Logistic Flowchart Source: Adapted from Fawcett, Ellram and Ogden (2007, p.218) Foreign Competition While Somerset formulated a good strategic marketing plan for continually launching new product lines every few years during half of the twentieth century, simultaneously, experienced the positive effects of applying the TQM in its furniture manufacturing and popularly is known as high-quality yet affordable wooden furniture provider in domestic market. However, since the mid-1990s, the company suffered from the stiffer competition, high labour rate and decreasing profits. To get out of this situation, Somerset started outsourcing several furniture product lines to China that helped benefit from cost-effective and reduced operating costs. Another strategy was reducing the manufacturing facility and labour force, to keep the low costs in line with the pace of outsourcing. It was very successful initially in reducing costs and increasing profits for the company. By 2000, Somerset decided to set up global supply chain and closed entire manufacturing facility in the United States by outsourcing all of its manufacturing to suppliers in China. Shipments of Raw Materials and Inconsistency of Product Quality Somersets global supply chain facilitates the wood shipments from the United States and South America to manufacturing plants in China. This shipment itinerary takes a long time to arrive China, therell be unexpected delays for processing shipment which incurs customer complaints and orders cancellation. Despite of long shipping time, the costs of shipment to the final destination and the raw material from US and South America are apparently high that reduced the profits. As the manufacturing plants employed Chinese workers to produce products by hand in China, it will cause discrepancies in product dimension and quality. Customers would ask for exchange or refund as the quality is not assured by hand-made. Poor Distribution Network and Transportation Management The finished furniture products are shipped by containers from Hong Kong or Shanghai to Norfolk, Virginia, once arrived, the containers are transported by truck to Somerset warehouses in Randolph Country, where all of retailers stores located and installed the furniture to prevent from damage during transport. Ineffective Order Management It is found that therere some critical flaws exist internally within Somersets global supply chain on its order processing and fulfillment system. Somerset processes orders weekly and biweekly and it takes 7-14 days to developing demand forecast and 12 -25 days for processing order which amount totally 22 to 45 days for purchase order to eventually complete. It requires another 60 days to produce product by hand when going into production. Poor Transportation Management As required by Chinese logistics, all finished furniture items have to be transported from the manufacturing plants to Chinese ports, which can take up to several weeks depending on trucking availability and schedules. Since 9/11, random security checks of containers will delay shipment for another one to three weeks and the trip overseas to Norfolk takes 28 days. Hence, from China to Norfolk port, it can take more than two months delivery time. Thereafter, clearing US customs can take another one to two weeks before local workers take another 1-3 days to unload containers and transfer the furniture onto truck to Somersets warehouse in Randolph County. Ineffective Inventory Management The variability of supply chain estimated is up to 40% for schedule deferment. Due to Somersets innovative conception to introducing new products frequently, it resulted in substantial excess inventories left over in warehouse where the obsolete furniture occupy precious space and increase high disposal and storage costs. Somerset proudly stands behind its products and customers can get a warranty period of 1 year from the date of purchase. It brought a serious problem for parts replacement, because China supplier is only able to provide these parts which are in production, but most of the parts are not produced anymore after 1-year guarantee period. Poor Product Quality Although quality auditors are employed by Chinese suppliers to perform quality audit every few weeks, Somerset still encounters several quality issues. Consequently, Somerset has to inspect every piece of furniture it receives from China due to retailers and customers complaints. 3. Development Justification of New Strategic Supply Chain Approach to be used by Somerset Foreign Competition Owing to fierce competition, Somerset has to close its entire US manufacturing facility and outsource all of its manufacturing to China to reduce costs and increases profits for the company. Outsourcing has become a common strategy that is adopted by all US companies and managing supply chains has now become a trend due to globalisation. It is felt that Somerset should have an outsourcing strategy which will continue to evaluate alternate low-cost furniture manufacturing plants around Asia or other regions. Depending on just low-cost China manufacturers which product its products by hand may not be a viable long term solution for its overall corporate or supply chain strategy. 3.2 Shipment of Raw Materials Consistency of Product Quality Somersets shipment of wood from the United States and South America to manufacturing plants in China is a costly and time-consuming process. Raw materials should be sourced from within China or from neighbouring countries around manufacturing facility to ensure low cost and better efficiency in materials movement. The China manufacturing plant produced all furniture products by hand, which is not only time-consuming, taking 60 days to finished the production, but also cause inconsistency of products quality. It is thus recommended that China manufacturing plant be ISO9000 certified, to provide Quality Assurance and invest in partial or fully automated machine to manufacture some of these furniture products so as to cut down the production lead-time and provide better consistency in products quality. In the meantime, the leader should take action of outsourcing another manufacturer in China to replace the current one, because the current plant may not have enough capital to purchase all necessary expensive equipment. Furthermore, the conversion from undeveloped factory to a qualified lean manufacturing facility cannot take place in one day since it is viewed as a long term transformation. Therefore, Somerset should outsource the production base to other China furniture manufacturing facilities, which comprise the following competencies: Lean manufacturing system implementation Lean manufacturing results in significant cost savings over a two to three year period. Specifically, manufacturing companies report significant reduction in raw materials, in-process inventories, setup costs, throughput times, direct labor costs, indirect labor costs, staff, overdue orders, tooling costs, quality costs, and the cost of bringing new designs on line (Swamidass 2002) ISO9000 certification Flexibility (refers to modification, design, machine, production lines and time flexibilities) Capacity (in terms of space, labor, equipment, IT and materials) 3.3 Better Distribution Network Transportation Management According to Chopra Meindl (2010), with regards to movement of products from factory to customer, there are six distinct distribution network designs for company to select one of them, as shown below: Manufacturer storage with direct shipping Manufacturer storage with direct shipping and in-transit merge Distributor storage with package carrier delivery Distributor storage with last-mile delivery Manufacturer/distributor storage with customer pickup Retail storage with customer pickup Somerset can select one of above distribution network to help in improving its distribution network. Choosing the manufacturer storage with direct shipping will help to eliminate the movement of furniture from Somerset warehouse to retail stores. This will have the advantages of better customers experience and lower inventory costs. Installation of hardware can therefore also be done at customers house instead of at retail stores. However, it has the disadvantages of higher transportation costs (because of increased distance and disaggregate shipping) and requiring investment in information infrastructure to integrate manufacturer and retailer. Another improvement in transportation is to eliminate export of raw materials from US to China by sourcing these materials from China or its neighbouring countries. This not only saves transportation time but also costs of materials. Purchasing department of Somerset will thus have the task to source for these new raw materials around Asia. 3.4 Effective Order Management The order processing and fulfillment system in Somersets global supply chain is too long and it is suspected that Somerset and Chinese manufacturing plant may not have the necessary information technology to enable the rapid sharing of demand and supply data. Per Harrison Hoek (2002), they mention that integration of demand and supply data so that an increasingly accurate picture is obtained about the nature of business processes, markets and consumers, can provide increasing competitive advantage. Figure 3.1 shows a conceptual model of how supply chain processes (supply, source, make, distribute and sell) are integrated together in order to meet end customer demand (cited by Harrison Hoek 2002, p.14): Figure 3.1 Integrating demand and supply chains Source: Harrison Hoek (2002, p.14) Another solution is to ensure that Somerset utilizes software for order processing which will automatically route for approval and issue purchase order in an efficient manner. There should also be policy in place to ensure that the approval routes are short and approving manager does not take too long to approve it. 3.5 Better Transportation Management Apparently, the Chinese logistics arrangement, depending on trucking availability and containers, causes wide times variability in shipment of finished furniture items from China ports to Norfolk. It is really critical for Somerset to have a good logistics/transportation manager to understand the root causes, select work with the Chinese suppliers to reduce this time and wide-variability to avoid delay shipment to customers. Langley et al. (2009) recommends proactive management approach to identify and solve transportation problems by reducing the number of carriers, negotiating with carriers, establishing carrier contracts with prescribed service levels, and modifying loading procedures. Hence, Somerset can negotiate and establish new contracts with Chinese suppliers or carriers to ensure that the finished products can depart China ports consistently at a shorter lead-time. In fact, Somerset should establish contracts with all transportation modes to ensure the required transportation service level and lead-times predictability. Other means of improvement and cost-effectiveness can be done through consolidating shipments and monitoring transportation service quality. 3.6 Effective Inventory Management It is highly recommended that Somerset adopts Just-In-Time (JIT) and Lean thinking concepts, as discussed by Harrison Hoek (2002), that can reduce delay, waste and inventory costs. Long-standing approaches to material control, such as reorder point stock control (ROP), economic order quantities (EOQ) and material requirements planning (MRP) can be made far more responsive by the application of JIT principle whereas lean thinking seeks perfection by gradually reducing waste from each of below four areas: Specifying value from the customer perspective Identifying the value stream ( through time-based mapping) Making the product flow through the supply network (by applying JIT principles) Letting the customer pull (through pull scheduling) Somerset may also adopt vendor-managed inventory (VMI) where it takes responsibility for monitoring sales and inventory in the retailers process. This information is used to trigger replenishment orders. As VMI is facilitated by willingness to share data, the use of integrated systems, and standard procedures, it is made more difficult by such factors as long replenishment lead times, inaccurate data, and unwillingness by either party to invest in systems support. Murphy Wood (2008) highlights tracking technology, radio-frequency identification (RFID) to keep track of inventory, which can further improve the efficiency in the supply chain network. 3.7 Better Product Quality The fact that Somerset has to inspect every piece of furniture it receives from China proves that China manufacturing plant must be ISO9000 certified and implement Quality Assurance System in-house. In addition, this will avoid the need to get quality auditors who are employed by Chinese suppliers to perform quality audit. A Quality Improvement Team should be formed in the China manufacturing plant and be trained so as to improve quality on a continual-basis. Somerset can also assist in the implementation of lean manufacturing for its outsourced China manufacturing plant or introduce Lean Six Sigma methodology to effectively control the process for better consistency in products quality. The requirements for the successful implementation of lean manufacturing, as per Swamidass (2002), are: All levels in the plant, from the production worker to the president must be educated in lean production philosophy and concepts. Top management must be totally committed to this venture and provide necessary leadership. Everyone must be involved in the change, and the internal customer must be empowered to play a vital role in this evolutional process. Everyone in the plant must understand that cost, not price, determines profit. The customer determines price, the plant determines the cost. Everyone must be committed to the elimination of waste. This is fundamental for becoming lean. The concept of standardization must be taught to everyone and applied to documentation, methods, processes as well as system metrics. 4. Evaluation Transformation Required In order to change the Somersets Supply Chain Philosophy from its traditionally position of functional independence to an integrated single entity, top management of Somerset has to ensure that conflicting functional objectives along the supply chain are reconciled and balanced. According to Barnes (2001), supply chain management requires a new approach to systems: integration is the key. Somerset must better manage its supply chain effectively through adapting the six building blocks for effective supply chain management (Harrison Hoek 2002) as follows: Develop a supply chain strategy Elements to be incorporated are: Customer service requirements Plant and distribution centre network design Inventory management Outsourcing and third-party logistics relationships Business processes Organizational design and training requirements Performance metrics and goals Gather supply chain information Enterprise resource planning (ERP) systems to facilitate the flow of information across their organization Develop effective partnerships and alliances Collaborative approach with key suppliers and customers for better decisions in procurement, production, inventory and fulfillment. Pilot new supply chain solutions Piloting initiatives on a small scale reduces risk and can encourage buy-in from others within the organization or supply chain. Elements to be included in any pilot projects are: Involvement of key stakeholders, suppliers, customers and employees. Selection of scope and environment Identification of critical success factors Organise for supply chain performance Organisational change for cross-functional instead of functionally based structures. Develop measurement system for supply chain performance Cross-supply chain instead of function focused measures: On time in full, outbound On time in full, inbound Internal defect rates New product introduction rate Cost reduction Order to delivery lead time Fiscal flexibility Somerset can also consider the proposal by Heinrich Betts (2003) to transform companys supply chain into adaptive business network. This new business model joins companies as partners, into an adaptable and flexible set of business relationships such that each company is able to respond more swiftly into changing market conditions and leverage the networks cumulative ability to: Plan and anticipate demand and supply. Execute plans efficiently and effectively. Sense events that affect the plans as those events occur, and analyze them for impact. Respond to and learn from ever-changing business conditions. Somerset can then move to an adaptive business network in four steps, as in Figure 4.1: Figure 4.1 The Four Steps of an Adaptive Business Network Step 1 Visibility: Sharing of information with partner companies. Many routine business processes with partners standardized. Information posted for common view on portal. Greater insight into business process and data accuracy problems. Step 2 Community: Moving day-to-day transactions to the portal. Establishment of minimum and maximum control thresholds. Reduction of inventory. Time savings via mechanizing transactions. Step 3 Collaboration: Sharing of customer demand data with members. Targeted replenishment of supplies. Responsibility transferred to supply replenishment vendors. Ability to reallocate inventory to fulfill maximum number of orders. Step 4 Adaptability: Time required for many tasks greatly decreased. Many tasks completely eliminated. Inventory and working capital dramatically reduced. New alliances, products, and revenue opportunities possible. Source: Heinrich Betts (2003, p.80) Harrison Hoek (2002) illustrates a number of transitional forces that need to be harnessed to give momentum to the change project, as structured in Figure 4.2 below: Figure 4.2 Transition forces Source: Harrison Hoek (2002, p.267) These 5 forces are described briefly as follows: Viability of current performance level Consider in light of market changes such as: Demographics Time-stressed customers One-to-one marketing The marketplace becomes the marketspace Perceived pay-off benefits from targeted performance Reap the potential benefits of e-business and benchmarking of improvement projects to quantify the potential benefits of making a change. Belief and enthusiasm Ability of project manager to communicate belief in the change process with enthusiasm. Ability to manage change Ability to plan the change, organizing the resources needed to make the change and managing the application of those resources in order to achieve the necessary outcome. Ability to operate in the new environment People in the organization must have the right skills, tools and techniques to operate the new process. The management of the new process will require a new set of performance measures to be in place so that its efficiency and effectiveness can be assessed. Specifically, there are several action items that are required to progressively (from Stage 1 to 3) change Somersets supply chain network to be effective and efficient, as illustrated in Table 4.1 below: Table 4.1 Action Items Required To Change Somersets Supply Chain Network Item Action Item Action To Be Taken Remarks 1 Foreign Competition Outsourced to China manufacturing plants Re-evaluate its capabilitycapacity Done 2 Shipment of Raw Materials from US Source raw materials in neighbouring countries of China Stage 1 3 Poor Distribution Network Manufacturer storage with direct shipping to customers Stage 3 4 Ineffective Order Management Integrating demand and supply data using technology Stage 2 5 Poor Transportation Management Re-negotiate new contracts with all transportation modes Stage 2 6 Ineffective Inventory Management Implement JIT approach and pull system scheduling Stage 3 7 Poor Product Quality Get China manufacturing plant ISO9000 certified Stage 1 However, the implementation of change in business is often frustrating and difficult, particularly in supply chains as it has to be undertaken in a coordinated manner across and between several organizations. It is therefore important to gain agreement from the top level of all companies involved before wide-scale changes can be made. 5. Conclusion In this case study, Somersets approach to manage its supply chain resulted in poor business performance. The visible hazards and other negative factors frustrated Somerset included poor logistics management, ineffective order system and inventory management as well as inconsistency of product quality. In adopting a value chain, Somerset must incorporate and execute a robust supply chain management strategy for best-fit suppliers selection, further establish on how to work with supply partners, distributors, suppliers, customers or even customers customers as a way to remain competitive. Otherwise, the company will not survive. In addition, top management of Somerset has to lead and motivate not only all internal functional teams, but also external suppliers and partners, to work as an integrated entity in the new strategic supply chain network, so as to achieve the overall corporate objectives. In a nutshell, supply chains have shifted from a cost focus to a customer focus, until currently to a strategic focus, scrutinizing the success of a strategy is just as good as the companys capabilities to fully and properly execute all. A great supply chain strategic approach, connected with operational excellence, can provide success for not only the company in crisis but also its partners and customers.

Thursday, October 24, 2019

Boadicea Essay -- essays research papers

Boadicea was she a powerful ruler, or a merciless general? Many questions arise when you begin to explore her accomplishments or many would even say failures. Most of the information on Boadicea has been derived from myths and most of what is written about her is from the words of her Roman enemies. During the creation and rule of the Roman Empire, Rome would constantly be aiming to take over the entire known world. Consequently Boadicea and her people of Britannia clashed. Julius Caesar was the first to take over Britain; he forced 6 powerful barbarian tribes to become a part of the Roman Empire. Iceni was amongst them, which happened to be the tribe of the famous Boadicea and her husband Prasutagus. However, Caesar and his army left that same year because they found the conditions too cold. Later in 43 AD Claudius Nero came into power. A man who was both cruel and pitiless, in his lifetime he managed to not only kill both his wives, his brother, and his mother but was known to go around the streets at night killing random men. Nero who wanted so badly to earn the respect of his Roman citizens decided to retake Britain. Boadicea was born into aristocracy in the year 30 AD she then married the ruler of the Iceni tribe. She had two daughters during their marriage. When the Roman army invaded her city her husband Prasutagus agreed to leave all his accumulated wealth to the Roman Emperor. Prasutagus did this in the hope that his country would be taken in piece but Nero did no...

Wednesday, October 23, 2019

Montana 1948

Practise Essay Montana 1948 â€Å"Don’t blame Montana! † He said, â€Å"Don’t ever blame Montana! † Who is to blame for the events of 1948? Discuss Montana 1948, by Larry Watson is novel set in American mid-west that raises a question who was to blame for the tragic events that occurred that summer. David Hayden the narrator of Montana re-collects powerful information that uphold his father Wesley Hayden losing control of himself and his emotion to his daughter-in-law due to the fact, she commented it was the â€Å"wild west† who was to blame.It became vibrant to the reader, that in response to Wesley’s actions that Montana was truly important to him and he would not accept anyone that held Montana responsible from the events the occurred within the summer of 1948. By clearly stating that Montana was not to blame, Sheriff Hayden means that it was the whites in Montana as well as his family and himself who were held responsible from the events that arose within the summer of 1948. The whole white population within Mercer County were partly responsible for the terrible events of Montana 1948.The social environment was one that favoured the white people’s value and discriminated against the Indians. The Indian’s lived away from the whites in little reservations allowing the Indians to have little or no contact with the white people. This had already proved the racial treatment within Montana. Furthermore Ollie Young Bear was an Indian but he was accepted from the whites because he lived as white. He was successful through every aspects of life and married a white woman. But the Indians, on the other hand had regard believing that Ollie young bear wouldn’t â€Å"be happy until he was white. The white societies within Montana were all well aware of the crimes committed by Frank against the Indians. When Wesley and Gail were to take action on the claims made by Marie about Frank’s wrongdoings, Dav id heard a remark made by Daisy McAuley saying â€Å"Just the squaws though. † Daisy comment showed a racial statement about Indian women. It appeared that Daisy was justifying against Franks actions, because in her eyes Indian women were worthless and deserved the way they were being treated.After the conversation between Gail and Daisy, Gail informed Wesley that it was â€Å"around town more than you realize. † Gail’s statement proved that a lot of the citizens within Montana knew of Franks activities but choose to â€Å"look away† just like Len, Deputy Sheriff chose to do. It was the racial treatment of the white people that overlooked Frank’s actions which led them responsible for what occurred within the summer of 1948. Julian Hayden is the head of the family and holds great power within his family and the community.Therefore Wes has a boundless deal of obedience and loyalty towards him. When Gail informs Wes of Frank’s actions, Wesâ₠¬â„¢ first response was â€Å"I don’t want this getting back to my father. † This showed how important it was to Wes, that his father doesn’t not get upset. However, it turned out Julian already was well aware of his favourite son’s wrongdoing but took it as a joke by stating â€Å"I wouldn’t be surprised if there weren’t some young ones out on the reservation who look a lot like your brother. Julian chose to side with Frank, as he thought very little of the Indians as he considered them to have lower status compared to the whites. Julian challenged Wes’ arrest of his brother by saying â€Å"Some Indian thinks he put his hands where he shouldn’t and you’re pulling out your badge? † Furthermore Frank also holds some responsibility to what happened in Montana. He abused his power as a doctor which led him to murder Marie Little Soldier and eventually commit suicide.Frank’s status in the community was that he was a genuine war hero and a doctor but sadly, he misused his status by molesting Indian girls and in some cases raping innocent women during private medical sessions. Frank was smart, because he knew no one would comfort him for his action because of the reputation of his family name and by the fact he had power. When he went to examine Marie at Wesley’s house, he made an assumption about Indian and how â€Å"they are used to being treated by the medicine man. But a doctor comes around and they think he’s the evil spirit. Throughout the novel, Wes makes a deal with Frank for him to stop what his doing and he wouldn’t press charges, but when Frank murdered Marie just to ‘get rid’ of his past and all the evidence, Wes doesn’t hesitate to arrest his brother. Thus, Julian and Frank hold a countless obligation to the events that occurred within the summer of 1948. Finally, the keepers of the law, Sheriff Wesley Hayden and his deputy Len McAuley must hold responsibility for what events went wrong during the summer on 1948. As sheriff, Wes had a duty to ensure the law was being upheld equally for both races.He failed to do this for a long time, first by denying his brother’s offences â€Å"I’m sure he does things to all his patients† and later by denying his arrest, â€Å"he’ll have to meet punishment in the hereafter. I won’t do anything to arrange it in this life. † Due to his lack of responsibility it led to the heartbreaking death of Marie and David’s entry fee of having to see his Uncle Frank at their house on the day of her death, this impacted Wesley to act upon his brother Frank. As a result of Wes arresting Frank, it causes further complications within the family.Julian responded by trying to free Frank by using violence and then Frank taking his life. Wesley finally realized that postponing justice from an earlier stage of the events had himself in some contribution to the tragic deaths of Marie and Frank. It was Wes himself, who failed to uphold the law, had failed Marie and all the Indian women; therefore he must be blamed for the tragedy, not Montana itself. However, Len failed to uphold his role as Deputy Sheriff, which acted upon his role in the tragedy.He obligated the Hayden’s, it was them that gave him his position as deputy â€Å"I have this job. Deputy Sheriff, which I owe to your granddad and your dad†, therefore he believed in â€Å"knowing when to look and when to look away. † Therefore, Len was both powerless and unwilling to challenge Wes’s inactions. Together, both these representatives of the law hold a responsibility to the events which occurred within Montana 1948. Montana 1948 clearly states that the events that occurred within the summer could not be blamed on the state itself.The Hayden was part of a culture that distinguished against the Indian people and overlooked crimes against these people . Due to the racism treatment the Indians coped from the white people it led Frank to get away with his corruptions. It seemed that the power, wealth and influence the Hayden had within the community was much more important than the rights of the Indians to receive justice and respect. Julian and Frank also take part of the blame due to them taking benefit of the power they had.In delaying justice for so long in order to protect his family, Wesley found himself denying justice towards the Indians and having obligation in the deaths of Marie and Frank. Wesley obviously admits that Montana shouldn’t be blamed for the events the occurred within the summer of 1948, when he attacks his daughter-in-law by defending a topic that meant a lot to him. He indicates that the white citizens that lived in Montana at the time, his family and he himself were the ones who were to blame for the tragic events that occurred within Montana 1948.

Tuesday, October 22, 2019

Franklin Pierce - 14th President of the United States

Franklin Pierce - 14th President of the United States Franklin Pierces Childhood and Education: Pierce was born on November 23, 1804 in Hillsborough, New Hampshire. His father was politically active having first fought in the Revolutionary War and then served in various offices in New Hampshire including being Governor of the State. Pierce went to a local school and two academies before attending Bowdoin College in Maine. He studied with both Nathaniel Hawthorne and Henry Wadsworth Longfellow. He graduated fifth in his class and then studied law. He was admitted to the bar in 1827. Family Ties: Pierce was the son of  Benjamin Pierce, a Public Official, and  Anna Kendrick. His mother was prone to depression. He had four brothers, two sisters, and one half-sister.  On  November 19, 1834, he married  Jane Means Appleton. the daughter of a Congregationalist Minister. Together, they had  three sons all of whom died by the age of twelve. The youngest, Benjamin, died in a train accident soon after Pierce was elected president. Franklin Pierces Career Before the Presidency: Franklin Pierce began practicing law before being elected as a member of the New Hampshire legislature 1829-33. He then became a U.S. Representative from 1833-37 and then Senator from 1837-42. He resigned from the Senate to practice law. He joined the military in 1846-8 to fight in the Mexican War. Becoming the President: He was nominated as the candidate for the Democratic Party in 1852. He ran against war hero Winfield Scott. The main issue was how to deal with slavery, appease or oppose the South. The Whigs were divided in support of Scott. Pierce won with 254 out of 296 electoral votes. Events and Accomplishments of Franklin Pierces Presidency: In 1853, the U.S. bought a stretch of land now part of Arizona and New Mexico as part of the  Gadsden Purchase. In 1854, the  Kansas-Nebraska Act  passed allowing settlers in Kansas and Nebraska territories to decide for themselves whether slavery would be allowed. This is known as  popular sovereignty. Pierce supported this bill which caused great dissension and much fighting in the territories. One issue that caused a lot of criticism against Pierce was the Ostend Manifesto. This was a document published in the New York Herald which stated that if Spain was not willing to sell Cuba to the U.S., the United States would consider taking aggressive action to get it. As can be seen, Pierces presidency was met with much criticism and dissension. Therefore, he was not renominated to run in 1856. Post-Presidential Period: Pierce retired to New Hampshire and then traveled to Europe and the Bahamas. He opposed secession while at the same time speaking in favor of the South. Overall, though, he was antiwar and many called him a traitor. He died on October 8, 1869 in Concord, New Hampshire. Historical Significance: Pierce was president at a critical time in American History. The country was becoming more polarized into Northern and Southern interests. The issue of slavery became once again front and center with the passage of the Kansas-Nebraska Act. Obviously, the nation was headed towards a confrontation, and Pierces actions did little to stop that downward slide.

Monday, October 21, 2019

How to write for non-accountants - Emphasis

How to write for non-accountants How to write for non-accountants Finance is a murky place for many people. Money comes into the bank account and it goes out again. And the process in between is something of a mystery. But even if your clients are financially savvy, it can still be difficult to explain money matters. Accounting has its own language and is often riddled with jargon that even experienced business people can sometimes find difficult to understand. (I know: Im one of them.) Writing financial information in accountingese can waste time and money. If your clients are unclear about what your figures mean, theyll ask for further clarification. A single document could lead to several hours of unnecessary (and frustrating) follow-up phone calls. Thats one reason why the tide is turning in the financial industry. Leading firms such as Deloitte, Ernst Young and Grant Thornton have commissioned specialist writing training programmes. And more accounting firms are following suit, adopting plain English in all their written communications. The other is that the Financial Services Authority keeps a watchful eye on adverts for financial products and services that are misleading. So as a finance professional, you still have to make sure your writing is not just legal, but effective. Here are six steps to clear client communication. One: put your reader first Many accountants overestimate the knowledge their clients have. Even if you have been working with a client for many years, theres no guarantee they really understand the nuances of finance. Get back to basics by asking yourself the following questions: What is the document about? Who will read it? How much do they already know about the subject? What do they absolutely need to know? How important is the subject to them? How interested are they in the subject? Use the answers as a guideline for the amount of detail that you need to include in your document. Two: avoid a mind-dump of ideas Whether youre writing an email, contract or report, do plenty of ground work before putting pen to paper. Brainstorm all your ideas using a mind map and then put your points in order of importance. If youre having trouble getting started, ask yourself the questions: Who? What? Where? When? and Why? Becoming clear in your thinking helps you to create clearly structured documents that are easy to follow. Three: communicate technical terms in plain English Financial abbreviations and other technical terms can be useful when communicating with colleagues but they can confuse clients. For example, the term accrual rate may seem simple but it still needs to be accompanied by an explanation of how the interest is built up. Similarly, never assume that your clients will understand terms such as smoothing, arbitration and cap and collar rate. You dont need to dumb down your writing, just make sure you provide clear, concise explanations. Four: avoid verbosity Often though its the words in between the jargon that cause the problem. Never add in redundant words into your writing. For example, I herein enclose details of your asset classes for the aforesaid investment, as requested sounds complicated, archaic and stilted. A much simpler way of writing it is, I enclose details of your investments, as requested. Five: opt for verbs instead of nouns Verbs help to give sentences movement and life. So write, We will decide on our next steps on Monday, rather than A decision will be made on our next steps on Monday. The word decide is more powerful than decision. And the first sentence is also written in the active voice, so it is punchier. Six: keep sentences short and sweet Aim for your sentences to be a maximum of 20 words. If you make your sentences longer, its likely your readers will have trouble making sense of what you mean. Remember, clear language makes sound business sense. It sends out the message that you have nothing to hide and that your words are as transparent as your financial dealings. Robert Ashton is the Chief Executive of Emphasis.

Sunday, October 20, 2019

How to Answer the 10 Toughest Interview Questions

How to Answer the 10 Toughest Interview Questions Everyone is nervous on interviews, but with a little practice and guidance, you will be able to confidently answer the most difficult interview questions and land the job. To help you prepare, here 10 of the toughest interview questions and how to answer them.1. â€Å"Tell Me About Yourself†This question can be tricky because the interviewer is essentially aiming to discover who you are as a person and how well you fit with the company.Full Answer   6 Steps to Answering ‘Tell Me About Yourself’ During a Job Interview2. â€Å"Why Should I Hire You?†In an interview, few questions can throw off a candidate’s poise like the simple, â€Å"Why should I hire you?† After all, it seems redundant. What have you been talking about this entire time, if not the reasons why the company should hire you?!Full Answer   6 Dos and Don’ts for Answering â€Å"Why Should I Hire You?†3. â€Å"Where Do You See Yourself in Five Years?†When you ’re sitting in an interview, there’s a good chance that most of your mental real estate lately has been going toward this day. So when the interviewer asks you where you see yourself in five years, it can be a bit of a jolt to suddenly think about the long term.Full Answer   How to Answer â€Å"Where Do You See Yourself in 5 Years?†Ã‚  4. â€Å"What’s Your Perfect Day?†Recently, it came out that Facebook’s head recruiter’s favorite interview question to ask is more like a personal essay question. â€Å"On your very best day at work- the day you come home and think you have the best job in the world- what did you do that day?†Now that this is making the viral rounds, don’t be surprised to hear it in your non-Facebook interviews as well. Here are some tips for breaking the question down and being ready to pounce on it.Full Answer  Ã‚  How to Answer the â€Å"What’s Your Perfect Day?† Interview Question5. â€Å"The Salary Question†The job application process has a number of separate stages: applying, interviewing, job offer, then salary negotiation and acceptance. Most employers stick to this, and let the money talk wait until things are further along. But if they jump the gun and ask you up front for a) your current salary or b) desired salary, what do you do?Full Answer   How to Answer the Salary Question in an Interview6. â€Å"Can I Contact Your Current Employer†If anyone asks where you were today, you were at a dentist’s appointment. Right? The vague â€Å"appointment,† always in the middle of the day, is a classic tactic for interviewing for new jobs while you’re still at your current one. You just put up your â€Å"out of office† message and hope no one notices that you’re awfully dressed up for a Wednesday. However, your slick cover story could be blown if the interviewing company contacts your current one.Full Answer   How to Answer â€Å"Can I Contact Your Current Employer?†7. â€Å"Why Have You Had So Many Jobs?†You’re sitting in the interview, and things are going fine, when the hiring manager looks up from your resume, eyebrow raised, and asks the question you’ve been dreading: â€Å"You’ve had an awful lot of jobs, haven’t you? Can you walk me through that?†Full Answer   How to Answer â€Å"Why Have You Had So Many Jobs?†8. â€Å"Aren’t You Overqualified For This Position?†In an ideal world, we’d all be applying for (and getting) a job that is a perfect, snug fit for our skills, experience, and career goals. In the real world, that’s not always an option. Maybe you were laid off, and are seeking a foot (any foot!) back in the door of your career path. Perhaps you’re feeling stalled in your current job, and are looking to move back a step or two to get new skills and experience. Whatever the reason, it co uld very well lead to the dreaded â€Å"aren’t you overqualified for this position?† question in an interview.Full Answer   The Best Way to Answer the â€Å"Aren’t You Overqualified?† Interview Question  9. â€Å"Why Are You Leaving This Position?†Chances are, the interviewer will ask you why you’re looking to leave your current job- or if you’re currently unemployed, why you left your last job.Full Answer   How to Answer the 5 Most Common Interview Questions10. â€Å"What Changes Would You Make if You Came On Board?†Watch out!   This question can derail your candidacy faster than a bomb on the tracks  and just as you are about to be hired. No matter how bright you are, you cannot know the right actions to take in a position before you settle in and get to know the operation’s strengths, weaknesses key people, financial condition, methods of operation, etc.   If you lunge at this temptingly baited question, y ou will probably be seen as someone who shoots from the hip.

Saturday, October 19, 2019

Summary Analysis essay Example | Topics and Well Written Essays - 1000 words

Summary Analysis - Essay Example The opening sections of the article in question consist of a reflection on the need to find a suitable metaphor to describe social computing. Taking the tone of a lecturer, McLeran explains how metaphors can break old patterns of thought by linking previously unconnected items or idea together. The main linguistic strategy for encouraging new thinking is the juxtaposition of normally unrelated concepts. Exploration of the connotations of these disparate concepts then brings to light features that the two items or ideas have in common or in contrast and the process of comparison can result in striking new kinds of understanding. The register of the article is a clever mix of formal and casual. The use of letters to denote concepts taken from the fields of mathematics, as in the example â€Å"This kind of association creates syllogistic metaphors: if A is a metaphor for B and B is a metaphor for C, is not A a metaphor for C?† (McLeran p. 1). The technical term syllogistic is tak en from the fields of philosophy and logic, and its Greek etymology as well as its application in these fields indicates that the author expects his readers to keep up with his intellectual level. A more casual tone is adopted later in the article with the use of lexis such as â€Å"a couple of interesting metaphorical mappings† (McLeran p. 1). There is a grammatical error in the phrase â€Å"limit an individuals ability to progress† which suggests that the author has not proofread his own work very effectively and incidentally that the work has not been subjected to editing. This marks the piece out as more towards the informal end of the academic discourse spectrum. In terms of structure, the article is quite unusual for an academic piece. There are no traditional academic headings such as â€Å"introduction†, â€Å"literature review†, â€Å"hypothesis† etc., and there is no clear statement of methodology. The piece has headings but these are mor e like journalistic key phrase headings than academic formal structure headings. The article ends on a section announcing some â€Å"questions which arise from the metaphor† (McLeran, p 1) and this is, however rather typical of a standard academic research article. Having proposed and defined his new idea, the author considers some objections, and concludes that the idea is good and then opens up the discussion to other academics who might be interested to formulate a reply. In a chain of reasoning McLeran likens metaphors to a springboard, and then a springboard to jazz music, and from there he makes a conceptual leap to jazz, which also involves courageous departures from safe and predictable tracks to something much more freely formed and exciting. He goes too far, perhaps in defining social computing as â€Å"a kind of abstract language† (McLeran, p. 1) because it is very difficult to imagine what an abstract language actually is. An abstract language suggests some thing incomprehensible and difficult, whereas both jazz and social computing are delightfully easy to follow, with some complex attributes but many more familiar aspects. In short, therefore, the author is somewhat carried away in his elaborate definitions of social computing but he settles down on the metaphor of jazz as the answer to the professor’

Friday, October 18, 2019

Field project Essay Example | Topics and Well Written Essays - 1250 words - 1

Field project - Essay Example Most of the Buddhists describe Buddha as a true teacher who awakened them from their ignorance. By this, Buddha ensured that they attained the highest form of happiness that humans can ever achieve. After all these years, Buddhists still believe and practice their culture. I interviewed Ashoka, a strong Buddhist, on some aspects of their religion and I was surprised at some of their practices. Beliefs One of the strongest beliefs of Buddhists is that there is no supernatural being, unlike other religions such as Christianity and Islam. Their god was human and so they believe that all people are equal and should respect each other. Buddhists also believe that whatever they hear or read has to be tested. This is unlike most religions that discourage testing of anything that has been said by their gods. Buddhists, however, believe that if something is written in their holy books, then they have the right to test it to be assured that it is true. This, therefore, creates a faith that is transparent and where followers are not subjected to impossible temptations that they cannot overcome and question. Buddhists have the right to question their holy books as well as their god if they have evidence to do so (Patrick, 1982). Buddhists also have many gods. Unlike most religions which followers only believe in one god, Buddhists have a varying number of gods. Some have as many as thousands of gods while others have no god at all. For this, Buddhists believe that one should never argue about the existence of god and they have a saying that they would rather die than argue on god’s existence. The other major belief of Buddhists is the karma belief. This is the belief given especially to children. They are told that if they do wrong, they will get karma which in most cases is considered to be the exact equivalent of what wrong the child has done. Due to this, most of the Buddhist children are upright and in most cases would avoid wrong things. One of the most practic ed beliefs about Buddhists which Ashoka gave me a quick review of is the importance of listening to teachers. Buddhists believe that it is very important for people to listen to their teacher’s advice. They believe that teachers are chosen by Buddha and if one wants to prosper and avoid bad ways, they have to listen to their teachers. It is for this reason that most of the Buddhist teachers are always elderly due to the experience that is needed to attain that position. Teachers are, therefore, much respected people in the society and a Buddhist will never disobey their teacher’s advice. Festivals According to Ashoka, festivals are like the only factor that unites Buddhists all over the world. She informed me that during those early days, it was a tradition for all Buddhists to come together and celebrate the full moon. During this time, they would all gather under the full moon and listen to various teachings and try as much as they could to meditate with their specif ic chants. Even though this festival is losing its taste due to the movement of Buddhists all over the world, it is still a common practice. Apart from this festival, there is the main Buddhist festival that creates a strong sense of belonging to all Buddhists. Their main ritual is known as the Puja and it is always performed by the teacher. The teacher is at the center while the other members of the group are outside and answer to the calls made by the teacher. This practice, according to Ashoka, is practiced to encourage their meditation and normal practices. Ashoka

Consumer Math Essay Example | Topics and Well Written Essays - 250 words

Consumer Math - Essay Example The value of the annuity after five years will be the sum of all the deposits plus the interest earned over a period of five years. Another example where an annuity can be applied in one’s personal finances is when one plans for one’s retirement fund. An individual may decide to put in $2,000 at the end of each year for the next 20 years into an IRA. If the IRA promises a return of 12 percent per year compounded annually, the individual will get a certain amount from the IRA after 20 years. In making investments, annuities are very relevant. Several options are presented to individuals who want to make an investment. One such example is deciding whether to make a lump sum deposit or a periodic deposit for several years. If the interest rates are equal and the maturity date is the same, one has to decide which alternative will be more profitable. The examples presented above are just some applications of consumer math, specifically annuities. Indeed, it is essential for every individual to understand the concepts covered by consumer math because it has a huge impact on one’s personal finances. Chatham Central Schools. (n.d.). Consumer math – Annuities and the TVM solver. Retrieved May 10, 2012, from chathamcentralschools.com:

Transcontinental Railroad Essay Example | Topics and Well Written Essays - 1000 words

Transcontinental Railroad - Essay Example â€Å"The California Legislature took a hand in the issue in 1855-6, fearing that Congress might relax its energies, and urged a speedy construction of a railroad, but the jealousy of politicians delayed the initiative† (San Francisco News Letter, 1925). During this period, short line railroads were being made in the Mid West. The credit of starting the enterprise goes to Leland Stanford. One day, as he was passing the Collis P. Huntington store in Sacramento, Leland Stanford saw the wagons being loaded. With the development of traffic, Leland Stanford realized the need of a quicker and improved carrier service, so he discussed the matter with Collis P. Huntington, Charles Crocker, and Mark Hopkins. All of them mutually consented that a railroad connection with the East was needed. â€Å"Charles Crocker was a leading direction, and the spirit of dominant energy in pressing construction through and over all obstruction† (San Francisco News Letter, 1925). The water transp ortation met the needs of America in the pre-Civil War period. In the early 1830s, locomotives arrived in America from the Great Britain, and greatly inspired the local people of America, who were already eagerly waiting for the year-round transportation service that would be punctual unlike the riverboats and the canal barges. The railroad was just about to become the mode of transportation of the industrial America by 1860, when a tracks’ network ran across the eastern half of America. The great concern at that time was of its payment. There were two main options for payment; either the private investors would finance the railroads, or the railroads could be the enterprises of the state. America selected the free enterprise unlike most of the European countries. The government played a great role in it. Railroads were lured by a lot of states and localities with financial aid’s offers. The federal government promoted the interregional rail construction by means of la nd grants. However, the most significant boost was a legal corporation which assisted in the collection of private capital in prodigious amounts. In this way, people who had invested in the railroads were saved as they bore only the risk of the invested money rather than being personally liable for the debts of the railroad. The responsibility of making the railroad was given to the construction companies. A vast majority of those companies were financial structures. â€Å"Hiring contractors and suppliers often involved persuading them to accept the railroad’s bonds as payment and, when that failed, wheeling and dealing to raise cash by selling or borrowing on the bonds† (Henretta, 2009, p. 498). Most of the construction companies were very corrupt. The promoters tried to pocket a significant percentage of the total funds reserved for construction of the railroads. Factories were rapidly established in America during the 1870s. The products of these factories including paper, textile, and fabrics replaced the home-made articles. With the economical surge of America, a new kind of demand arose. â€Å"Railroads needed locomotives; new factories needed machinery; cities needed trolley lines, sanitation systems, and commercial Structures†

Thursday, October 17, 2019

TypeWriter Essay Example | Topics and Well Written Essays - 1750 words

TypeWriter - Essay Example Creativity and innovation that leads to technological advancement started a long time ago. The form of communication among people and especially leaders in the 1500s was through writing. The quest to achieve more efficiency in writing led to the invention typewriters in 1860s. A typewriter is a machine that can be mechanical or electromechanical used in creating characters on a piece of paper. The technology on a typewriter involves transfer of ink or carbon impression on a set piece of paper by striking characters on a key-board. Keys are attached to type bars that are in a circular basket under the platen. Striking hard the keys transfers a marking on the molded head of the type bar. The paper used in the process is wrapped around a cylinder that mounted on a carriage. The carriage moves after striking a type bar to allow the specific spacing of words and letters. The keyboard is organized in a manner to make it easier for the operator to type the characters. After the invention, the machine become popular and was used in different areas such as homes, by writers, and offices to create writing on paper for different purposes. The increased use of the typewriters came to a halt in the early 1980s when word processor in a computer became popular due to its efficiency compared to a typewriter. However, the typewriters have not been completely wiped out. Different places of the world such as India and certain parts of Africa are still using the machine. The machine has undergone a series of changes all with the aim of improving it proficiency in serving the intended purpose. Earlier innovations and trials had been made regarding the creation of a printing device, but the first successful typewriter was made by Sholes and Glidden in 1870. It was known as the Remingtons typing machine. The intended purpose of the machine was to ensure legal documents produced were neat, legible, and of a standard format. Creativity in this machine

The Attack On 911 Essay Example | Topics and Well Written Essays - 1000 words

The Attack On 911 - Essay Example This research will begin with the statement that the 911 attack is known as the worst terrorist that the American history that changed the lives of the citizens and the world at large. The attack refers to a sequence of well- organized terrorist attacks that were instigated by the Al Qaeda in New York City. Terrorists hijacked two passenger airlines and flew them into buildings in suicide attacks. Two planes were crashed into the World Trade Centre and two hours following the attack the two Towers caved in. The fires and debris fully or partially destroyed the structures that were in the surrounding. Another airline crashed into the West wing of the Pentagon resulting in its partial destruction. The fourth airliner crashed in Pennsylvania but was meant to crash in Washington D. C. Most Americans were interested in finding out the individuals who were behind the worst terrorist attack in history. Investigation showed that nineteen terrorists hijacked four airlines and all of them were from the Middle East. It was clear that all of them belonged to the renowned Al Qaeda terrorist faction that was headed by Osama bin Laden who was among the most sought-after terrorists in the modern times. Al Qaeda is known to be a well- organized terrorist group that practices extreme Islam practices. Members of this group are also immensely opposed to Western nations mainly the United States. They termed the 9/11 attack as a revenge mission against the US.

Wednesday, October 16, 2019

Transcontinental Railroad Essay Example | Topics and Well Written Essays - 1000 words

Transcontinental Railroad - Essay Example â€Å"The California Legislature took a hand in the issue in 1855-6, fearing that Congress might relax its energies, and urged a speedy construction of a railroad, but the jealousy of politicians delayed the initiative† (San Francisco News Letter, 1925). During this period, short line railroads were being made in the Mid West. The credit of starting the enterprise goes to Leland Stanford. One day, as he was passing the Collis P. Huntington store in Sacramento, Leland Stanford saw the wagons being loaded. With the development of traffic, Leland Stanford realized the need of a quicker and improved carrier service, so he discussed the matter with Collis P. Huntington, Charles Crocker, and Mark Hopkins. All of them mutually consented that a railroad connection with the East was needed. â€Å"Charles Crocker was a leading direction, and the spirit of dominant energy in pressing construction through and over all obstruction† (San Francisco News Letter, 1925). The water transp ortation met the needs of America in the pre-Civil War period. In the early 1830s, locomotives arrived in America from the Great Britain, and greatly inspired the local people of America, who were already eagerly waiting for the year-round transportation service that would be punctual unlike the riverboats and the canal barges. The railroad was just about to become the mode of transportation of the industrial America by 1860, when a tracks’ network ran across the eastern half of America. The great concern at that time was of its payment. There were two main options for payment; either the private investors would finance the railroads, or the railroads could be the enterprises of the state. America selected the free enterprise unlike most of the European countries. The government played a great role in it. Railroads were lured by a lot of states and localities with financial aid’s offers. The federal government promoted the interregional rail construction by means of la nd grants. However, the most significant boost was a legal corporation which assisted in the collection of private capital in prodigious amounts. In this way, people who had invested in the railroads were saved as they bore only the risk of the invested money rather than being personally liable for the debts of the railroad. The responsibility of making the railroad was given to the construction companies. A vast majority of those companies were financial structures. â€Å"Hiring contractors and suppliers often involved persuading them to accept the railroad’s bonds as payment and, when that failed, wheeling and dealing to raise cash by selling or borrowing on the bonds† (Henretta, 2009, p. 498). Most of the construction companies were very corrupt. The promoters tried to pocket a significant percentage of the total funds reserved for construction of the railroads. Factories were rapidly established in America during the 1870s. The products of these factories including paper, textile, and fabrics replaced the home-made articles. With the economical surge of America, a new kind of demand arose. â€Å"Railroads needed locomotives; new factories needed machinery; cities needed trolley lines, sanitation systems, and commercial Structures†

Tuesday, October 15, 2019

The Attack On 911 Essay Example | Topics and Well Written Essays - 1000 words

The Attack On 911 - Essay Example This research will begin with the statement that the 911 attack is known as the worst terrorist that the American history that changed the lives of the citizens and the world at large. The attack refers to a sequence of well- organized terrorist attacks that were instigated by the Al Qaeda in New York City. Terrorists hijacked two passenger airlines and flew them into buildings in suicide attacks. Two planes were crashed into the World Trade Centre and two hours following the attack the two Towers caved in. The fires and debris fully or partially destroyed the structures that were in the surrounding. Another airline crashed into the West wing of the Pentagon resulting in its partial destruction. The fourth airliner crashed in Pennsylvania but was meant to crash in Washington D. C. Most Americans were interested in finding out the individuals who were behind the worst terrorist attack in history. Investigation showed that nineteen terrorists hijacked four airlines and all of them were from the Middle East. It was clear that all of them belonged to the renowned Al Qaeda terrorist faction that was headed by Osama bin Laden who was among the most sought-after terrorists in the modern times. Al Qaeda is known to be a well- organized terrorist group that practices extreme Islam practices. Members of this group are also immensely opposed to Western nations mainly the United States. They termed the 9/11 attack as a revenge mission against the US.

Science and Technology Essay Example for Free

Science and Technology Essay Yan Wang (Corresponding author) School of Economics and Management, Changchun University of Science and Technology 7989 Weixing Road, Changchun 130022, China Tel: 86-431-8521-7930 Abstract At present, the world economy is shifting to the model of knowledge-based economy, knowledge and technology to economic growth has greatly exceeded the sum of the contribution of capital, labor and natural resources and become the most important economic factors, economic growth rely on scientific and technological progress than before, scientific and technological innovation is more important than ever before, it is becoming the main causes and the most direct driving force of a region or countrys economic growth and development. This paper starts from the meaning of regional scientific and technological innovative competence; analyze the composition and upgrade mechanism of regional scientific and technological innovative competence. Keywords: Regional scientific and technological innovative competence, Composition, Upgrades mechanism 1. Introduction Since the Austrian-American economist Schumpeter put forward the concept what is a kind of innovative changes in the production function for the first time in † Economic Development Theory† which published in 1912, and particularly emphasizes on economic changes, such as reduced costs, the economic balance broken, brutal competition and the economic cycle itself, should be mainly attributable to Innovation , henceforth the innovation has been the hotspot of international study , but in different countries, different periods of time, it has been given to the different characteristics. 2. Meaning of Regional scientific and technological innovation Regional scientific and technological innovation meanly that in the given region , under the regional context, science, technology, education, economy and other factors shape the incorporate development mechanism , is the regional system whose main body is enterprise and include local government, education and scientific research units, intermediary organizations. It relies on the strength of regional science and technology innovation, uses resources of regional scientific and technological innovation effectively, coordinates the inter-regional cooperation in science and technology and competition, and achieves efficient allocation of scientific and technological innovation resources (personnel, knowledge, inputs) and the structural optimization, promotes the extensive development of regional scientific and technological innovation and the application , promotion and popularization of innovative product. And then create and develop the competitive advantage to ensure regional economic development. Regional scientific and technological innovation system is the network which regional science and technology organizations, universities, business interact and develop together. This innovative system has the main features of the system, but is open. The System bear the task of putting the high-tech science and technology into the development of regional economic variables, promoting the regional industrial structure modernization and optimization, so as to ensure regional economic and social sustainable development. From the practice of each regional economic development, the regional competitive ability especially the strength of sustainable competitiveness mainly depends on its scientific and technological ability. From the successful experience of developed countries, generally the regional scientific and technological innovative competence should have 8 parts, such as the capability of independent innovation, comprehensive utilization of extra-territorial technology, supply of the innovative system, open up new markets, management innovation, development of new resources, coordination and advanced thinking ability. 3.1 Capability of Independent Innovation To understand independent innovation, first of all, is a direction. It emphasizes that we need innovative thinking, based on our own strength, innovation as much as possible. At the same time, do not rule out studying others. Innovation can be divided into 3 categories: (1) integration independent innovation, it is the organic integration of a variety of related technologies to form products and industries with market competitive; (2) introduce or imitate innovation, based on the introduction of foreign advanced technology, to promote positi vely digestion, absorption and re-innovation; (3) originality independent innovation, that is, through their own new technology research and invention, and developed a new or next generation products. Their Common ground is the unique core technology which has the intellectual property and on the basis to form the value of new products. The capability of independent innovation is the region (enterprises) use effectively innovative resources, establish a new technology platform or change the core technology and achieve independent intellectual property, so that the region will continue to enhance its core competitiveness ability and obtain sustainable competitive advantage in the market competition, in the process of technological innovation to express organic colligation of various ability. 3.2 Capacity of Comprehensive Utilization of Extra-territorial Technology Capacity of comprehensive utilization of extra-territorial technology mainly refers to the extraterritorial appropriate technology. The so-called appropriate technology, not high-tech necessarily, as long as suiting the stage of regional economic development, to make the region access to sustainable development capacity t hrough using and popularization of technology. Capacity of comprehensive utilization of extra-territorial technology indicates that the region under circumstances of lacking originality as individual, and attract the extraterritorial appropriate technology for its own using, the focus is on the basis of digestion and absorption, improvement and innovation or change the core technology to produce new products. However, because partial or minor changes, it is commonly difficult to apply to the patents and not have independent intellectual property rights. Comprehensive utilization of extra-territorial technology is a better choice, such as the backward areas implement catch-up strategy. 3.3 Capacity of the supply of innovative system Regional scientific and technological innovation required system collaboration of the whole society and can not be separated from regulation and control of system norms and policy guidance and support of government, such as a series of taxation, finance, industrial technology, personnel incentives. If no such systems and policies, technological innovations will no step. Mechanism is as shown in Figure 1. 3.4 Capacity to Open Up New Markets Explicit manifestations of capacity of regional scientific and technological innovation are able to produce the high-tech, high value-added products which can meet market demand and consumers agree to accept, and then through market exchange to successfully realize the value compensation. And Japans low-volume, diversification Toyota production model has been exceed Americas high-volume, low diversification† the new winter system, and its drawbacks are that the production scale is small and production cost is high. Therefore, opening up new markets and expanding market size are imperative to obtain economies of scale. 3.5 Capacity of Management Innovation With the advent of a knowledge-based economy, science and technology change with each passing day, market competition is growing, complexity and difficulty of regional scientific and technological innovation is greater, so whether if can the government management system innovates with the time from the government-funded, creation purchase, nail down orientation, the patent system, tax incentives, direct investment, and integration innovation, continue to management innovation and strengthen policies to encourage scientific and technological innovation are particularly important. 3.6 Capacity to develop new resources Resources are the basis for regional economic development, and agelong supply of resources is the basis for sustainable development of the region. Throughout the regional resources system, the vast majority of resources (in particular, non-renewable mineral resources) lack flexibility in supply in the near future. Therefore, continue to develop new resources to provide sustainable supply of resources to promote regional sustainable economic development is one of main mission of regional scientific and technological innovation and also a main component of regional scientific and technological innovation competence. 3.7 Capacity of advanced thinking In economic development, we say the idea is everything, and in science and technology innovation, we believe that advanced thinking decides everything. Since the difficulty of original innovation: firstly, rely on the accumulation of knowledge; secondly, rely on inspiration of a handful genius. Where does inspiration come from? In fact, it comes from the advanced thinking ability of scientists. Scientists only have the advanced thinking ability can sudden blaze inspiration and to create original innovative, to produce a new product; scientists only have the advanced thinking ability to be possible to set a variety of existing technologies form integrated innovation, and developed new improved products; only have the advanced thinking ability can enhance its digestion and absorption capacity of imported technology, and on this basis to form introduction innovation, access to their own intellectual property rights. If government does not have an advanced thinking ability , will not be able to formulate scientific strategies for regional economic development, but also impossible to provide system supply in favor of scientific and technological innovation, would be impossible to upgrade the capacity of regional scientific and technological innovation. 3.8 Capacity of Coordination Regions itself is a complex economic and social system, inside and outside of the region have a variety of economic and interest actors, in the course of economic operation, if let the market mechanism to allocate freely, there would exist the case of market failure, such as externalities and public goods, especially in science and technology innovation system to promote regional economic development. In nature, science and technology is a kind of public goods of strong spillover effects, free-rider phenomenon is more likely appear; the external effects of scientific and technological achievements are also great and positive; R D investment is great, but results and earnings are uncertainty, so it is a high-risk, high investment activity, only one or a few enterprises can not be completed. Therefore, the Government of the Organization Coordination ability is very important and necessary. 4. Upgrade Mechanism of Regional Scientific and technological innovation Competence From economic development practice of developed countries such as the US and Japan, to keep the competitiveness of the regional economy than ever, using regional scientific and technological innovation to promote regional economic development. Therefore, we must form upgrade mechanism of regional scientific and technological innovation capacity. Learning from international successful experience, generally we should do the following four areas: 4.1 Construct the Regional Scientific and Technological Innovation System Which Main body is enterprises Looking from outside mechanism, we must intensify system reforms; to achieve separation of political from capital, separation of government from enterprises, rely on preferential policies, legal protection and market incentives to turn enterprises into the investors, beneficiary, risk takers, main body of research and development, main body of decision-making of technological innovation,; analysis from internal mechanisms, we must implement modern enterprise system, through system innovation, such as property rights system, incentive systems, organizational systems, to promote technological innovation; through capital market to achieve enterprises’ strategic restructuring and the survival of the fittest, accelerate the technological transformation of traditional industries, establish the benefits and risk-driven mechanisms of technological innovation, promote large and medi um-sized enterprises to establish a sound scientific research and development institutions, as soon as possible to form a number of large-scale enterprises group with independent innovation ability and to match multi-national corporations; change the approach that state-owned enterprise managers appointed by the superior, and gradually establish and perfect the market selection and wash out mechanism of enterprise managers, establish an effective entrepreneurship motivation, discipline and supervision mechanism, bring into play fully the entrepreneurs’ soul and core role in technological innovation. 4.2 Construct the Experts Community of Regional Economic Development In the era of knowledge economy, knowledge is the first resources or key resources of regional economic development, and people are carriers of knowledge who use knowledge to innovate and change the world; we say the idea determines everything, the idea is wrong and then all are wrong, the idea refers to that of government leaders and entrepreneurs; even if the region has more scientific and technological resources, if not to be organized reasonably and optimize the configuration, it can not form a strong scientific and technological innovation capacity of region to promote regional economic development, thus need the outstanding intellectual leader in knowledge fields. Therefore, in order to enhance the capacity of regional scientific and technological innovation, we must establish experts community of regional economic development. The key to harmony and unification management system is that government should strengthen communication and coordination. (1) Internal coordination problem of government departments. Government would understand more about the factors which affects capabilities of regional scientific and technological innovation and it’s role in their own scientific and technological innovation system. Summarize the successful experience of the relevant bodies and generalize them at other agencies, utilize new or existing forum, among government, enterprises, colleges and research institutions to discuss the common problems to influence on regional scientific and technological innovation system development; (2) the problem of co-ordination between business and government. Try to recognize explicitly that there are partnership and common benefits between the support of regional science and technology innovation system of state-owned enterprises and the private sector, to enhance their mutual com plementarily. At present, more and more activities of state-owned enterprises run out that of private sector. Therefore, it is necessary to strengthen the coordination between them so that they can only work together for regional technological innovation system to make their own contribution; (3) to strengthen regional peoples understanding of scientific and technological innovation system. Try to let people know the importance of innovative activity, as well as the means by which the people to support innovation, improve the well-known degree of the award in the technological development field; (4) to reinforce inter-regional and international cooperation, to strengthen recognition of the excellent Technology Center to encourage inter -regional and even cross-border cooperation in science and technology. 4.4 Construct the perfect investment and financing system of regional scientific and technological innovation The upgrade of regional scientific and technological innovation capability depends on a great deal of R D inputs, no abundant risk capital, same as the car does not oil, the whole system of regional scientific and technological innovation are not functioning. And rely on financial investment only, capacity is limited, or there would be Chinese Tsukuba situation; if only rely on corporate investment, because the risks may be difficult to do so. Therefore, must be guided by government policies favoring to form a perfect, including government, financial institutions and non-governmental organizations, diversified, market-oriented, new-style risk investment and financing system. 5. Conclusion In a word, each region should base on understanding of composition of regional scientific and technological innovative competence and its upgrade mechanism, combing with its own practice of regional economic development, to constitute the countermeasures to upgrade the competence. References Wang, Delu. (2000). Grow up of Region- Studies on Regional Innovation Theory and Cases. Beijing: Aviation Industry Press. Wang, yan. (2007). Theoretical Research on Independent Innovation for Regional Economic Development [D]. PhD thesis.

Monday, October 14, 2019

Analysis of Docker Technology

Analysis of Docker Technology What is the technology? Docker is a software containerization platform. What does it do and how does it improve upon previous technologies? Docker allows users to run multiple different software packages, including multiple instances of the same piece of software within an isolated virtual container. The behaviour and features are similar to that of running a virtualized operating system, such as allowing isolation from the host machines operating system, the ability to run multiple instances of the same software package simultaneously and the storage of applications in a format that can be transferred between physical machines. Traditional virtualization hypervisors such Hyper-V, ESXi and Xen all rely on each virtualized instance to have their own complete operating system, drivers, libraries and software packages to be installed and running. Docker moves away from this method and instead provides an abstraction layer between the host operating systems kernel and the containerization application. The containerized applications are configured to share the same operating system and libraries. This removes the overhead of running multiple instances of these items reducing system resource utilization. In addition to the performance benefits, Docker maintains the security features provided by virtualization hypervisors. Docker containers are configured to use virtualized network interfaces allowing segregation, VLAN tagging and inter-container networking amongst other features. The Docker container files are self-contained allowing them to be transferred freely between different physical hardware without the need for reconfiguration. This has also led to multiple repositories of Docker containers to be created, allowing the public to upload and share pre-configured open-source software packages. How might it transform computers and devices using it? Tell us some scenarios. By converting from using a traditional virtualized operating based configuration, end users can increase the utilization by running more software on less physical hardware. This in turn will reduce hardware, energy and other related costs and improve efficiency when deploying new software instances. Web hosting services could increase the amount of services existing hardware could provide and increase efficiency when deploying new services. For example, each WordPress installation could be configured in individual containers while accessing a shared SQL database, rather than each installation requiring a full virtualized operating system to be deployed per instance. Software developers can also take advantage of Docker to assist with their development and deployment cycles. Software can be configured and optimized on developers local machines or development servers and be easily transferred to quality assurance teams and finally to production environments. Why is it interesting and important? Docker is an important step forward from traditional virtualization technology. The software has been developed under the open-source Apache License 2.0 allowing anyone to take part in development and to also freely use and modify any components for their own project both personal and commercial providing they follow the licensing requirements in their scenario. By consolidating existing infrastructure energy emissions will be reduced, reducing the carbon footprint of users. Other consumables used in certain operations can also be reduced, such as water in server farm cooling configurations and physical space used allowing more compact configurations. Management and maintenance of software packages can also be improved. If issues are found with particular software version updates, providing the previous container is kept the singular application can be rolled back rather than the entire operating system. What is the device? Ring an IoT connected doorbell What does it do? How would you use it? Tell us some scenarios. Ring is a doorbell with an integrated camera, microphone, speaker, motion sensor and is internet connected via WiFi. By connecting the doorbell to the internet it is able to alert the user via a smartphone app when the doorbell is rung or the motion sensor is triggered. The user can then check the video feed from the door, to determine who is at the door. In response, the user can then choose to activate the speaker function to speak with the person at the door using the smart device, similar to that of a traditional intercom system. The device also saves its video recordings to a cloud service allowing the footage to be viewed anywhere using a compatible smart device. The device can be used in a number of ways. If the user is expecting a parcel and is not at the address at the time of the delivery, they will be alerted on their smart device when the doorbell is rung. Once the user is alerted via their smart device, they can then activate the video feed to confirm who is at the door and then use the speaker to advise the courier to leave the parcel in a safe location. Home security can also be improved by using the device. The video recording functionality will be triggered with any motion near the front door, even if the doorbell is not rung. This footage will then be stored off-site via a cloud storage service. In the unfortunate event of a break in, the intruder will be unable to destroy the footage, which can then be used to assist authorities in subsequent investigations. In addition, some insurance providers may offer reduced insurance premiums when such devices are installed. Briefly outline the devices interesting software/hardware/networking. In what way does computer technology transform or realise the device? Ring is provided with a mobile application that allows the doorbell to be paired with the users iOS or Android based mobile device. The doorbell has an integrated WiFi adapter which is used to connected to the users home WiFi network to provide internet access to the device. This allows the doorbell to provide notifications to the smart device application regardless of if the user is at home on the same network or are located elsewhere, provided they have access to an internet connection. The doorbells integrated motion sensor and camera add further functionality previously not possible. The camera used has been selected for its low-light performance, in combination with infra-red LEDs to provide illumination to the recorded footage without any light being visible to the human eye. This enhances its ability to be an inconspicuous security device. Recorded footage is saved off-site using a cloud storage service. This is used by the mobile application to provide the user with the ability to watch footage while away from their local network and to provide an archive solution without requiring a large amount of local storage. Why is the device an interesting or important example of embodiment? As defined by Professor Tony Hey in his book The Computing Universe: A Journey through a Revolution Butler Lampsons third age of computing is about using computers for embodiment that is, using computers to interact with people in new and intelligent ways This is shown through the Ring doorbell, in the way it allows the user to connect with the outside world in a new way. It provides the user the ability The ring doorbell provides a new way for users to connect with the outside world. It removes the need for a person to be home to accept parcels, it tracks motion which can provide the user with a greater sense of security at home all through the adoption of technology. Week 2 What are the devices? Device 1: Smartwatch Device 2: PC Characterise the computing requirements of the two devices? Device 1: CPU A smartwatch requires a CPU(Central Processing Unit) to process all machine instructions provided by applications and the operating system. Most smartwatches use an ARM architecture CPU. Bluetooth Bluetooth is a networking protocol used for the smartwatch to communicate with the host device (usually a smartphone). NFC NFC (Near Field Communication) is a networking protocol used for communicating with external devices. This is commonly used in contactless payment systems GPS GPS (Global Positioning System) is geolocation system used to provide location data to the device. This is commonly used for maps and navigation systems Battery A custom made lithium-ion battery. Used to provide power to all the components in the device. To recharge the battery either a port is provided to connect the watch to a power source or wireless charging is implemented to provide from a wireless power source Display A display is used to provide visual interface for providing information to the user. Touch interface A touch interface (Also known as a digitizer) is used to allow the user to interact with the smartwatch by touching on the display. Touch screens are commonly used due to the limited space on a smartwatch for other methods of interfacing with the device, such as buttons. RAM RAM (Random Access Memory) is required for the CPU to store data while is processing instructions. RAM is volatile memory and is not used for persistent data storage. Persistent Storage Persistent storage is required to store the operating system, applications and user data. This is commonly a form of NAND flash memory due, as it offers compact storage with no moving parts which could be damaged in a device that is moved during operation. Speaker Speakers are used to provide aural feedback to the user. Microphone A Microphone is used to receive aural data from the users, for example a phone call will require the Sensors There are numerous sensors located on a smartwatch that each monitor a different function.Most smartwatches have an Accelerometer to monitor acceleration, a Barometer to measure atmospheric pressure, a Gyroscope to measure the angle of the device, a Heart Rate monitor to measure pulse and an ambient light sensor to determine the backlight of the screen. GPU The GPU (Graphics Processing Unit) is used to accelerate the creation of visual elements. This is commonly integrated as part of the CPU in smartwatches due to size constraints. WiFi WiF is a networking protocol used to transmit data in a local network. This is used in a smartwatch to provide network connectivity when the host device (e.g. smartphone) is not available. Device 2: CPU A PC requires a CPU(Central Processing Unit) to process all machine instructions provided by applications and the operating system. Most PCs use an x86 architecture CPU. RAM RAM (Random Access Memory) is required for the CPU to store data while is processing instructions. RAM is volatile memory and is not used for persistent data storage. Persistent Storage Persistent storage is required to store the operating system, applications and user data. This can be a mechanical hard disk drive, utilizing magnetic platters to store data or a solid state disk which uses NAND flash memory to store data. Network Adapter A network adapter is required to connect the PC to a local network. This can be achieved through a range of interfaces including a wired ethernet connection or a wireless WiFi connection. Some systems will have both options available. GPU The GPU (Graphics Processing Unit) is used to accelerate the creation of visual elements. This can either be integrated into the CPU or can be provided through a discrete graphics adapter, for enhanced performance. USB Ports Power supply A power supply is required to convert mains AC power into DC power required to power the individual PC components. Some PCs (such as laptop computers) may utilize a battery to provide an additional power source Video Ports Audio Ports C. Device 1 Device 2 CPU Physically bigger, more Powerful Can run hotter, active cooling x86 based Physically smaller, slower Must run cooler, no active Cooling Arm based STORAGE Space for multiple drives Mix of mechanical and solid state drives Raid capabilities Solid state storage Physical constraints Less storage NETWORK ADAPTORS Can use wireless or wired connections Must be wireless Wifi Nfc 2. Moores Law Why might Moores Law come to an end soon? Explain based on current technologies. Moores Law was originally conceived in 1965 when Intel co-founder Gordon Moore posted an article about microprocessors. In the article Moore observed that the number of transistors in integrated circuits doubles roughly every 12 months. After 10 years once more data had become available Moore updated his theory from 12 months to 24 months. Intels latest processors are built using a 14 nanometer manufacturing process, however production of Intels next generations of processors with 10 nanometer transistors has already been pushed back by a year. Intel have stated that this was not a one-off occurrence and that they are not able to continue to keep up with the rate they used to. This shows that Moores law is now coming to an end too. One main reason that Moores law slowing down and potentially coming to an end is that its not possible to continue to keep shrinking transistors, while maintaining a functional device at the rate that is required to continue improving at the rate theorized. As MOSFET transistors follows the principles of quantum mechanics, as the transistors shrinks it makes it harder to determine if it is in the 0 or 1 state. The electrons inside the transistor can travel through devices with little resistance, therefore as the transistors get smaller, the resistance also gets lower which eventually lead to quantum mechanical phenomenon described as tunnelling rendering MOSFET based transistors non-functional. https://www.technologyreview.com/s/601102/intel-puts-the-brakes-on-moores-law/ http://spectrum.ieee.org/semiconductors/devices/the-tunneling-transistor Discuss a new or future technology which might overcome these technological limitations. Instead of trying to find ways to prevent quantum tunneling in transistors, researchers are investigating a new transistor design called TFET or Tunneling Field Effect Transistors. This style of transistor is designed to manipulate when quantum tunneling occurs in a controlled manner. This allows for transistors to be produced at an even smaller scale than MOSFETS can be without quantum tunnelling becoming a negative side-effect. Another advantage of this technology is that has the potential to be implemented in place of MOSFETs without the need for technology that implements them to be completely redesigned due to the similarities between TFET and MOSFET transistors. http://berc.berkeley.edu/tunneling-field-effect-transistors-beyond-moores-law/ https://engineering.nd.edu/news-publications/pressreleases/more-energy-efficient-transistors-through-quantum-tunneling What might be the ramifications if Moores Law comes to an end or slows down? If Moores Law comes to an end or slows down, the rate at which processor performance improves will decrease. This would reduce the rate at which new technologies are developed and would slow innovation in field relying on technology. 3. Non Von Neumann Processors Investigate a non von Neuman processor such as a graphics processor, FPGA or signal processor. How and why is it different from a general purpose CPU such as you might find a phone or PC? An FPGA or Field-programmable gate array is a type of integrated circuit that can be digitally re-programmed after it has been manufactured, unlike for example, the logic within a microcontroller which is hardwired during manufacturing. This It allows the user to program custom digital circuits using hardware description language to suit their requirements. FGPAs are sold without any pre-programmed instructions and are instead sold based on the physical features of the FGPA such as how many logic gates or how much memory it has, making it a very flexible device. As FPGAs can be reprogrammed without any need to change the physical hardware, this lends them to being used heavily in development and prototyping environments. Developers can create and update the logic throughout the development process without the need to purchase new hardware each time a change needs to be made. This is different to hardware such as a x86 CPU which cannot be reprogrammed and only supports the provided instruction sets. http://download.springer.com.ezp01.library.qut.edu.au/static/pdf/116/bok%253A978-1-4302-6248-0.pdf?originUrl=http%3A%2F%2Flink.springer.com%2Fbook%2F10.1007%2F978-1-4302-6248-0token2=exp=1490752308~acl=%2Fstatic%2Fpdf%2F116%2Fbok%25253A978-1-4302-6248-0.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Fbook%252F10.1007%252F978-1-4302-6248-0*~hmac=b61cb59b461de816fe408c9ab730e0d9cd6ab12d55885171f66b3c880d9aafaa 3-5 Week 3 OS 1 IBMs z/OS IBM z/OS is a operating system designed to be run solely on IBM mainframe computers. Mainframe computers are large, high-end computers designed specifically for processing large amounts of data, often used by large organizations. IBM describe the key features of the z/OS operating system as its stability, security and high availability (IBM, 2014, para. 1). OS 2 Embedded Linux Embedded Linux is a term used to cover the Linux operating system being used on embedded computer systems. These embedded systems are generally very low-end computers, designed to run a very specific and minimal set of software that are then embedded inside another product, for example they can be found in some models of washing machine to offer further functionality. Linux is described as being flexible and open (Siever et al., 2003, p.1-3) which offers developers to ability to customize it to their exact needs and requirements. Comparison and contrasting Both of these operation systems are designed to run very specific types of workloads. The z/OS mainframe operating system is designed to process and analyse large data sets to provide in-depth insight on the data (IBM, 2015). The operating system is designed to handle very high performance workloads and to run as quick and efficiently as possible. Embedded Linux operating systems are designed to run a very specific workload such a smart TVs interface with as minimal overheads as possible due to the hardware restrictions of the low-power systems that are used in most Embedded Linux implementations (Simmonds, 2015, p.1-12). Both systems are designed to run specific processes, however the z/OS operating system is designed to run processes on high-end hardware on a large scale, whereas the Embedded Linux operating system is most commonly used on low performance hardware on a small scale. Open Source Software Security/Flexibility Open source software gives users the option to modify and adapt software to their needs. As the entire source code is publicly available and the software can be adapted, used within another software package or re-released as a different product, depending on the license type the original developer released the software under (Open Source Initiative, 2016). This also provides security to users, as they can audit the code themselves for security issues and if required patch the source code directly, rather than relying on a third party to find and resolve any potential issues. Cost Licenses for closed source commercial operating systems can range from a few hundred dollars up to thousands of dollars per installation (Microsoft, 2016). This can become very expensive for businesses that rely on a large amount of physical and virtualized operating systems. Open source software has no licensing costs associated with it, which can significantly reduce licensing costs, depending on the use case. This is also applicable to embedded platforms, which are generally designed to have a low cost per unit. Open source software can remove software and operating system licensing costs, helping to maintain a low cost per unit. Operating System Arch Linux a lightweight and flexible LinuxÂÂ ® distribution (Arch Linux, 2017) How are new features developed? New features developed in two main ways. The first of which is by the individual package developers, for example new features to the Netcat package will be developed by the Netcat developer community. Arch Linux package maintainers are then responsible for packaging new releases for the Arch Linux operating system and adding them to the Arch Linux package repository. The second way features are developed are by the Arch Linux developer team (Arch Linux, 2017). The features they develop range from developing and implementing software developed specifically for the operating system, to configuration and modification of third party packages and managing what packages are included and how they are used in the base operating system installation. How do new features make their way into a release? Arch Linux doesnt follow a traditional fixed release cycle, rather it employs a rolling release model (Arch Wiki, 2017) which allows individual components to be updated as soon as they are deemed ready. Packages are updated as soon as the maintainer has deemed the package stable and ready for release, after which it is upload and added to the repository. This model aims to remove the stagnation between fixed releases and instead aims to keep all at their latest releases. References: Arch Linux. (2017). A simple, lightweight distribution. Retrieved March 23, 2017, from https://www.archlinux.org/ Arch Linux. (2017). Arch Linux Developers. Retrieved March 23, 2017, from https://www.archlinux.org/people/developers/ Arch Wiki. (2017). Frequently asked questions. Retrieved March 23, 2017, from https://wiki.archlinux.org/index.php/Frequently_asked_questions IBM. (2014). Mainframe operating system: z/OS. Retrieved March 23, 2017, from https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_opsyszosintro.htm IBM. (2015). IBM z/OS Fueling the digital enterprise. Retrieved March 23, 2017, from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=cainfotype=ansupplier=897letternum=ENUS215-267 Microsoft. (2016). Pricing and licensing for Windows Server 2016. Retrieved March 23, 2017, from https://www.microsoft.com/en-au/cloud-platform/windows-server-pricing Open Source Initiative. (2016). Licenses and Standards. Retrieved March 23, 2017, from https://opensource.org/licenses Siever, E., Weber, A., Figgins, S. (2003). Linux in a nutshell (4th ed.) Sebastopol, CA: OReilly. Simmonds, C. (2015). Mastering embedded linux programming (1st ed.). GB: Packt Publishing. Week 4 Network 1 WiFi WiFi (also known as Wireless LAN or WLAN) is a network technology designed as a replacement to LAN cabling and is developed around the IEEE 802.11 specification. The IEEE 802.11 specification is the standard dictating the use of the 802.11 radio frequency that WiFi uses to transmit data wirelessly (Tjensvold, 2007). Within the 802.11 specification there are a range of protocols that have been developed, with the current standard being the 802.11ac revision. This specification has support for speeds over 1Gb/s, depending on the antenna configuration in use. The range of a WiFi signal is generally quite short at approximately 20-25 metres depending on obstructions. This makes it good for use in home and business environments where access points can be installed where WiFi signal is required, but makes it a poor choice for larger area networks, such as mobile phone data. WiFi power usage is split between the access point and the client receiving the data. The access point uses significa ntly more power to broadcast the signal than the client device needs to receive it (Zeng, 2014). The latency provided by modern WiFi specifications, such as the 802.11ac revision offers low latency communication between clients and access points. The exact latency the client will note, will be dependant on the band being used (either 2.4GHz or 5Ghz in the case of 802.11ac), obstructions and the amount of antenna in use on the access point. Security of WiFi networks is dependant on how they are configured. A basic home configuration using outdated security technologies such as WEP or WPA1 to authenticate users is at risk of unauthorized users gaining access to the network. WPA2 authentication offers a stronger level of security by implementing the AES-CCMP algorithm. WiFi networks can also be vulnerable to MITM (Man in the middle) attacks, where a potential attacker can attempt to spoof the WiFi network, which clients may unsuspectingly connect to which will then allow the attacker to see any traffic of the connected clients. The effectiveness of this type of attack can be counte racted by ensuring traffic is being transmitted over secure protocols such as HTTPS and SSH, which will render the intercepted data unreadable (Joshi, 2009). Network 2 Bluetooth 4 and Bluetooth Low Energy (BLE) Bluetooth 4 is a short range network technology developed by the Bluetooth Special Interest Group. Bluetooth 4 covers a range of specifications including Bluetooth low energy, Bluetooth High speed and Classic bluetooth. Bluetooth is used for short range personal area (PAN) and ad-hoc networks, primarily in portable devices such as smart phones. Bluetooth devices are classified into 3 classes, depending on the transmission power of the device and the intended usable range. Class 1 devices have 100 mW transmission power and are designed to be used at ranges of up to 100 meters, class 2 devices have 2.5 mW transmission power and are designed for use at up to 10 meters and class 3 devices have 1 mW of transmit power and are only usable at ranges of under 10 meters. Class 1 and 2 are the most commonly used types, with class 1 devices generally being used in desktops, laptops and other devices with a large battery or mains connected power supply. Class 2 devices are generally used in porta ble devices such as smart phones, IoT connected devices and wireless headsets. Class 2 still allows for a usable range while keeping power usage to a minimum (Wright, 2007). The Bluetooth specification has 4 different security modes in which devices can operate. The security mode in which the device will operate will be selected based on the Bluetooth standard in use on both devices. Bluetooth 2.1 and later devices have a mandatory requirement to use security mode 4, proving both devices support it. Service mode 4 forces encryption for all services, providing security for all communications except for service discovery (Padgette, 2012). Compare and contrast fibre optic and wireless technologies within the context of a National Broadband Network (NBN) for Australia. Fibre Optic (FTTP) The National Broadband Network (NBN) provides a range of connection types with fibre optic technology being utilised in multiple service types including fibre to the premises (FTTP), fibre to the node (FTTN) and fibre to the distribution point (FTTdp) (NBN, 2017). Fibre optic connections use a optical fibre cable that uses light to transmit data. This type of cable transmits data faster, further and with a lower latency than the traditional copper cable which transmits data by electrical impulses. As this technology relies on a physical connection to the premises it is not practical to utilize this technology for remote locations, however for areas with higher population densities supplying broadband via FTTP is more practical as the cost per premises is decreased and reduces load on wireless services. Fibre optic cable is not affected by signal degradation as significantly as copper cabling and is therefore able transmit data across long distances more effectively . As the cable transmits data by light pulses the cable is resistant to any noise and ground vibrations interrupting or degrading the signal. Fibre optic cable is also able to supply much higher bandwidth connections (Malaney, 2010), with NBN already offering 1Gbps products to service providers, although this product is not currently being on-sold to consumers due to factors including demand and pricing accordin