Wednesday, December 25, 2019

Business Intelligence, Business, And Data Mining - 1544 Words

1. Introduction to Business Intelligence, Business Analytics and Data Mining Business Intelligence Business Intelligence is a process which includes different technologies and methods process for analysing data and presenting information which is helpful for top level management.BI includes various tools, application, and methodologies that enable organizations to collect data from internal and external sources, prepare that for analysis develop and run queries against the data and generate different kind of graphs and reports. Business Intelligence can analysis large amount of data easily and affectively .Identifying new threats and opportunities and implementing an effective and profitable strategy based on insight can provide business a market stability and long term stability. BI technologies provide past, current and future business conditions. Common functions of business intelligence technologies are reporting, online analytical processing, analytics, data mining, process mining, complex event processing, business performance management, benchmarking, text mining, predictive analytics and prescriptive analytics. The potential benefits of business intelligence programs include accelerating and improving decision making; optimizing internal business processes; increasing operational efficiency; driving new revenues; and gaining competitive advantages over business rivals. BI systems can also help companies identify market trends and spot business problems that need toShow MoreRelatedData Mining for Business Intelligence4558 Words   |  19 Pageslarge volumes of business data. The use of database systems in supporting applications that employ query based report generation continues to be the main traditional use of this technology. However, the size and volume of data being managed raises new and interesting issues. Can we utilize methods wherein the data can help businesses achieve competitive advantage, can the data be used to model underlying business processes, and can we gain insights from the data to help improve business processes? TheseRead MoreBusiness Intelligence And Data Mining262 6 Words   |  11 PagesCOMP 1615: Business Intelligence and Data Mining School of Computing and Mathematical Sciences Student Name : Sushrit Laxman Moundekar Student id : 000796184 Course Coordinator: Dr Ronan Cummins Department of Computing and Information System Table of Contents 1. INTRODUCTION 4 2. LITERATURE REVIEW 5 2.1 Business Intelligence for Retail in general 6 2.2 Business Intelligence beneficial for Retail 7 2.3 Advantages of using BI inRead MoreBusiness Intelligence Is The Gathering And Analysis1229 Words   |  5 Pages Business Intelligence Business Intelligence is the gathering and analysis of large amounts of information so as to gain insights that propagate strategic and tactical business decisions. Business Intelligence is the conglomeration of the processes and technologies which change data into information. It encompasses a wide category of technologies, including data warehousing, multidimensional analysis or online analytical processing, data mining and visualization, as wellRead MoreThe Process Of A Business Intelligence System1376 Words   |  6 Pagesimplementing a business intelligence system. It continues to describe the technologies involved in a business intelligence system, as well as the purpose of the system and how it can help companies become a leader in the industry. Lastly, the report contains facts about industries that have implemented a business intelligence solution, how they use it, and the benefits they reap from the implementation. The report covers multiple industries, but focuses on Chev ron oil company and analyzes its business intelligenceRead MoreBusiness Intelligence Is The Gathering And Analysis Essay1175 Words   |  5 PagesBusiness Intelligence Business Intelligence is the gathering and analysis of large amounts of information so as to gain insights that propagate strategic and tactical business decisions. Business Intelligence is the conglomeration of the processes and technologies which change data into information. It encompasses a wide category of technologies, including data warehousing, multidimensional analysis or online analytical processing, data mining and visualization, as well as basic queries and multipleRead MoreBusiness Intelligence Is The Gathering And Analysis Essay1214 Words   |  5 PagesBusiness Intelligence Business Intelligence is the gathering and analysis of large amounts of information so as to gain insights that propagate strategic and tactical business decisions. Business Intelligence is the mix of the processes and technologies which change data into information. It includes a wide category of technologies, including data warehousing, multidimensional analysis or online analytical processing, data mining and visualization, as well as basic queries and multiple types ofRead MoreWhy Data Mining Is The Extraction Of Knowledge From The Various Databases1329 Words   |  6 PagesData mining is the extraction of knowledge from the various databases that was previously unknown (Musan Hunyadi, 2010). Data mining consists of using software that conglomerates artificial intelligence, statistical analysis, and systems management in the act of extracting facts and understanding from data stored in data warehouses, data marts, and through metadata (Giudici, 2005). Through algorithms and lea rning capabilities data mining software can analyze large amounts of data and give the managementRead MoreBusiness Analysis : Business Intelligence And Analytics1545 Words   |  7 PagesToday’s business environment is increasingly complex and dynamic and organizations must adapt to these changes in order to remain competitive. As a result, organizations must continually realign their operations to meet these business environment pressures and challenges by being as responsive as possible to both their customers and competitors. One such tool that organizations and businesses can enlist in order to build stronger capabilities, improve performance, undertake better decision makingRead MoreHow Erp / Crm / Ecommerce Integrations Can Create A World Class B2b Platform1532 Words   |  7 Pagesgenerate some attractive side benefits such as the ability to gather business intelligence. Regardless of whether companies process that intelligence with self-service or specialized BI analytics software, the right ERP and CRM integrations are essential to the processes of mining data, connecting securely with third-party intelligence resources and predicting and responding to customer behavior. Gathering business intelligence from existing operations is one of the best ways to foster competitiveRead MoreInformation Technology And Business Intelligence1126 Words   |  5 PagesTECHNOLOGY AND BUSINESS INTELLIGENCE COMP.8002 SEMESTER 2, 2016 Assessment 1 Student Name: Arindam Haldar Student ID: 2007004468 TOC Introduction Page 3 Discussion Page 3 Conclusion Page 5 Referencing Page 6 INTRODUCTION: IT BI - An overview Data, math, statistics and programming are the most important parts of data science. Machine learning is a collection of algorithms which recognise pattern from data. Data mining discovers patterns

Tuesday, December 17, 2019

Analysis Edward Taylors Upon Wedlock, and Death of...

Edward Taylor’s Upon Wedlock, and Death of Children and Upon a Wasp Chilled with Cold are similar in their approach with the illustration of how beautiful and magnificent God’s creations are to humankind. However, each poem presents tragic misfortune, such as the death of his own children in Upon Wedlock, and Death of Children and the cold, enigmatic nature of human soul in Upon a Wasp Chilled with Cold. Taylor’s poems create an element of how cruel reality can be, as well as manifest an errant correlation between earthly life and spiritual salvation, which is how you react to the problems you face on earth determines the salvation that God has in store for you. In Upon Wedlock, and Death of Children, Taylor uses personification and†¦show more content†¦In turn, Edward Taylor’s ability to maintain strength and happiness, despite enduring gloomy times caused by tragic death, results in the spiritual salvation God embellishes amongst Taylor by allow ing Taylor’s other children to live to maturity. In Upon a Wasp Chilled with Cold, Edward Taylor uses a ‘wasp’ to illustrate the body of a woman. This wasp endures a â€Å"Bear that breathes a Northern blast† (Taylor l. 1), and the ‘Northern blast’ is a representation of the attitude that one possesses without the amicable love of God. The wasp â€Å"out extends/Unto the Sun, in great desire/To warm her digits at the fire.† (Taylor ll. 8-10), meaning the wasp wants to be embraced by the grace and salvation of God himself. The wasp eventually receives enough of the warm embrace of the Sun (in this case, the love and salvation of God), and is able to maneuver and fly home in a gleeful manner, all thanks to the glory of God. An argument could be made that the wasp using the Sun to warm itself up is similar in comparison to how human beings want to be under the warm embraces of God as well, especially in times of sadness, despair, or in times of when they have wrongfully sinned and need guidance from God. Near the end of the poem, Edward Taylor is putting himself in the same shoes as the wasp. Similar to the wasp, he too, is asking to be warmed by God’s salvation and grace while on the earthly life of humanity until it is his time to pass and meet God in Heaven. Near the

Sunday, December 8, 2019

Dubliners By James Joyce Essay Example For Students

Dubliners By James Joyce Essay A collection of short stories published in 1907, Dubliners, by James Joyce, revolves around the everyday lives of ordinary citizens in Dublin, Ireland (Freidrich 166). According to Joyce himself, his intention was to write a chapter of the moral history of country and chose Dublin for the scene because the city seemed to e the centre of paralysis (Friedrich 166). True to his goal, each of the fifteen stories are tales of disappointment, darkness, captivity, frustration, and flaw. The book is divided into four sections: childhood, adolescence, maturity, and public life (Levin 159). The structure of the book shows that gradually, citizens become trapped in Dublin society (Stone 140). The stories portray Joyces feeling that Dublin is the epitome of paralysis and all of the citizens are victims (Levin 159). Although each story from Dubliners is a unique and separate depiction, they all have similarities with each other. In addition, because the first three stories The Sisters, An Encounter, and Araby parallel each other in many ways, they can be seen as a set in and of themselves. The purpose of this essay is to explore one particular similarity in order to prove that the childhood stories can be seen as specific section of Dubliners. By examining the characters of Father Flynn in The Sisters, Father Butler in An Encounter, and Mangans sister in Araby, I will demonstrate that the idea of being held captive by religion is felt by the protagonist of each story. In this paper, I argue that because religion played such a significant role in the lives of the middle class, it was something that many citizens felt was suffocating and from which it was impossible to get away. Each of the three childhood stories uses religion to keep the protagonist captive. In The Sisters, Father Flynn plays an important role in making the narrator feel like a prisoner. Mr. Cotters comment that a young lad run about and play with young lads of his own age suggests that the narrator has spent a great deal of time with the priest. Even in death, the boy can not free himself from the presence of Father Flynn (Stone 169) as is illustrated in the following passage: But the grey face still followed me. It murmured; and I understood that it desired to confess something. I felt my soul receding into some pleasant and vicious region; and there again I found it waiting for me. The boy feels the need to get away from the priest, but this proves to be impossible. When he ran away into his pleasant and vicious region, the priest was still therehaunting him. In fact, even before the narrator is thoroughly convinced that the priest is dead, he is worried that Father Flynn will haunt him (Stone 169): In the dark of my room I imagined that I saw again the heavy grey face of the paralytic. I drew the blankets over my head and tried to think of Christmas. These passages convey the idea that the boy was afraid of the priest and felt somewhat freed by his death. This is further proven when the boy, after having seen the card announcing the death of the priest, thinks it strange that neither nor the day seemed in a mourning mood and even felt annoyed at discovering in self a sensation of freedom as if had been freed from something by death. This feeling of freedom suggests that the boy understood that he was a captive of Father Flynn, and thereby, also a captive of the church. With the Fathers death, perhaps the death of his captivity came as well. The idea of religious bondage can be seen in An Encounter by examining the relationship between the boys and Father Butler. When Leo Dillion is caught reading The Apache Chief in class, everyones heart palpitated as Father Butler frowns and looks over the pages. Shortly thereafter, the narrator claims that his rebukepaled much of the glory of the Wild WestBut when the restraining influence of school was at a distance began to hunger again for wild sensations. .u1ed9c99106067b7c6e10c51e37a47cc7 , .u1ed9c99106067b7c6e10c51e37a47cc7 .postImageUrl , .u1ed9c99106067b7c6e10c51e37a47cc7 .centered-text-area { min-height: 80px; position: relative; } .u1ed9c99106067b7c6e10c51e37a47cc7 , .u1ed9c99106067b7c6e10c51e37a47cc7:hover , .u1ed9c99106067b7c6e10c51e37a47cc7:visited , .u1ed9c99106067b7c6e10c51e37a47cc7:active { border:0!important; } .u1ed9c99106067b7c6e10c51e37a47cc7 .clearfix:after { content: ""; display: table; clear: both; } .u1ed9c99106067b7c6e10c51e37a47cc7 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u1ed9c99106067b7c6e10c51e37a47cc7:active , .u1ed9c99106067b7c6e10c51e37a47cc7:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u1ed9c99106067b7c6e10c51e37a47cc7 .centered-text-area { width: 100%; position: relative ; } .u1ed9c99106067b7c6e10c51e37a47cc7 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u1ed9c99106067b7c6e10c51e37a47cc7 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u1ed9c99106067b7c6e10c51e37a47cc7 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u1ed9c99106067b7c6e10c51e37a47cc7:hover .ctaButton { background-color: #34495E!important; } .u1ed9c99106067b7c6e10c51e37a47cc7 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u1ed9c99106067b7c6e10c51e37a47cc7 .u1ed9c99106067b7c6e10c51e37a47cc7-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u1ed9c99106067b7c6e10c51e37a47cc7:after { content: ""; display: block; clear: both; } READ: Acid Rain (1317 words) Essay This passage demonstrates the control the church has over the opinions and thoughts of the narrator. In addition, if Father Butler is considered a symbol of the church, the fear felt by the students at the prospect of his disapproval and the freedom they feel when the restraining influence of the church was at a distance prove the suffocating nature of religion. It is from this stifling existence that the narrator yearns to escape. This is further illustrated when Leo Dillion doesnt appear for the ditch day because he worries that they might meet Father Butler or someone out of the college. Even though Father Butlers influence on the boys thoughts dwindles when school lets out, he is always in their minds. His presence in their thoughts, especially at time when they are planning an activity for which they could be punished, is a parallel to the feeling of a sinner who worries what Gods punishment will be. These passages prove captivity because the purpose of ditching class was to escape the rigid and stifling world and to find excitement in the unknown. However, even in the midst of the possibility of freedom, the boys cant help but think of what would happen if Father Butler found them. In Araby, although there is no clergyman, the theme of religious captivity is still present in Mangans sister, who is a symbol of the Virgin Mary. Just as a statue of the Madonna is lit from behind, on a pedestal, and defined in shadow, Mangans sister is lit from a lamp behind a half-opened door, while she waits on the steps for her brother to come inside, in the shadows of dusk. Just like the Virgin Mary, Mangans sister is worshiped by the narrator and therein lies the prison. Her image accompanied me even in places the most hostile to romance. The protagonist in Araby is obsessed with Mangans sister and can not escape seeing her image everywhere he goes. This is further illustrated in the following passage: I chafed against the work of school. At night in my bedroom and by day in the classroom her image came between me and the page I strove to read. In addition the religious imagery conjured by Mangans sister, the bazaar itself is also a religious symbol. This is shown in the following excerpt from Harry Stones explanation of symbolism in Araby: The interior of the building is like a church. The great central hall, circled at half its height by a gallery, contains dark stalls, dim lights, and curtained, jar-flanked sanctuaries. Joyce wants us to regard this temple as a place of worship (Stone 175). In fact, even the narrator proves to understand the religious symbolism when he says I recognized a silence like that which pervades a church after a service. The narrators trip to the bazaar is journey, but even here he can not escape the images of religion. Even here he can not escape the image of the Virgin Mary. He sees a young saleslady standing at a door of one of the stalls, flirting with two men. This is paralleled by the image of Mangans sister standing in her doorway flirting with the narrator. When he realizes the parallelism, he experiences an epiphany. His worshiped angel is only a girl, just like the ordinary girl who stands before him now (Stone 175). When he realizes how he has been deceiving himself, his eyes burned with anguish and anger. When the boy realizes the hold the church has had on him, he feels enraged and disgusted. Religious imagery and the use of religion as a captor from which the protagonists yearn to escape can be seen in each of the first three stories of Dubliners. Just as Father Flynn haunts the boy in The Sisters, and the boys in An Encounter can not escape the presence of Father Butler, the protagonist of Araby is obsessed with Mangans sister and can not escape seeing her image everywhere he goes. All three characters are haunted and all three desire freedom. In The Sisters, this feeling is articulated in the protagonists feeling of freedom that came with the death of Father Flynn. .u776969439811bfdf45805409bfd5f061 , .u776969439811bfdf45805409bfd5f061 .postImageUrl , .u776969439811bfdf45805409bfd5f061 .centered-text-area { min-height: 80px; position: relative; } .u776969439811bfdf45805409bfd5f061 , .u776969439811bfdf45805409bfd5f061:hover , .u776969439811bfdf45805409bfd5f061:visited , .u776969439811bfdf45805409bfd5f061:active { border:0!important; } .u776969439811bfdf45805409bfd5f061 .clearfix:after { content: ""; display: table; clear: both; } .u776969439811bfdf45805409bfd5f061 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u776969439811bfdf45805409bfd5f061:active , .u776969439811bfdf45805409bfd5f061:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u776969439811bfdf45805409bfd5f061 .centered-text-area { width: 100%; position: relative ; } .u776969439811bfdf45805409bfd5f061 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u776969439811bfdf45805409bfd5f061 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u776969439811bfdf45805409bfd5f061 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u776969439811bfdf45805409bfd5f061:hover .ctaButton { background-color: #34495E!important; } .u776969439811bfdf45805409bfd5f061 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u776969439811bfdf45805409bfd5f061 .u776969439811bfdf45805409bfd5f061-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u776969439811bfdf45805409bfd5f061:after { content: ""; display: block; clear: both; } READ: Pitch perception Essay In An Encounter, it is expressed with his desire to break out of the weariness of school-life for one day at least. In Araby, this craving for freedom is not realized until the narrators epiphany when he finally understands the hold the church has had on him. Because the three stories use religion as a prison, they can be seen as a set. Works Cited Friedrich, Gerhard. The Perspective of Joyces Dubliners. Twentieth-Century Literary Criticism: Volume 35. Ed. Paula Kepos. Detroit: Gale Research Inc., 1990. 166-169. Levin, Harry. James Joyce: A Critical Introduction. Twentieth-Century Literary Criticism: Volume 35. Ed. Paula Kepos. Detroit: Gale Research Inc., 1990. 159-164. Stone, Harry. Araby and the Writings of James Joyce. Twentieth-Century Literary Criticism: Volume 35. Ed. Paula Kepos. Detroit: Gale Research Inc., 1990. 171-177.

Sunday, December 1, 2019

TCP/IP Security Essays - Computer Network Security, Cyberwarfare

TCP/IP Security The TCP/IP protocols, the basis for today's Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generation Internet protocol that, among other goals, seeks to fix many of the current flaws in the current Internet IPv4 protocol. Security in protocols and applications not essential to TCP/IP (such as HTTP, FTP, and SMTP) are not discussed in this paper. Introduction In the early 1980's, specifications were finished for the TCP and IP protocols. These two protocols could be considered the most important in the world today - they are the basis of the Internet. Over the past decade, the Internet has grown from a small network connecting a small community of researchers to its present state - a gigantic global network connecting people of all types. The huge success of the Internet has, for the most part, been quite beneficial. The Internet has evolved from a specialized project to a general-purpose tool. However, the growth of the Internet has created problems with security. The TCP and IP protocols were designed when the Internet was small, and users generally trusted each other. The protocols lack many features that are desirable or needed on an insecure network. In this paper, we present a number of problems that arise with using TCP/IP on today's network, solutions or work-arounds for these problems, and how the protocols for tomorrow's Interne t, such as IPv6, will help eliminate these problems. 1. Introduction to TCP/IP TCP/IP is the backbone of the internet today. Comprised of two protocols, TCP and IP, the TCP/IP protocol suite is one of the most widely used. We present a brief introduction to the two protocols. For a detailed discussion of the two protocols we refer the reader to the RFC's for IP [RFC 791], and TCP [RFC 793]. 1.1. Internet Protocol The Internet Protocol (or IP as it generally known), is the network layer of the Internet. IP provides a connection-less service. The job of IP is to route and send a packet to the packet's destination. IP provides no guarantee whatsoever, for the packets it tries to deliver. The IP packets are usually termed datagrams. The datagrams go through a series of routers before they reach the destination. At each node that the datagram passes through, the node determines the next hop for the datagram and routes it to the next hop. Since the network is dynamic, it is possible that two datagrams from the same source take different paths to make it to the destination. Since the network has variable delays, it is not guaranteed that the datagrams will be received in sequence. IP only tries for a best-effort delivery. It does not take care of lost packets; this is left to the higher layer protocols. There is no state maintained between two datagrams; in other words, IP is connection-less. Versio n IHL Type of Service Total Length Identification Flags Fragmentation Offset Time to Live Protocol Header Checksum Source Address Destination Address Options Padding Figure 1. IP Header The IP Header is shown in Figure 1. The Version is currently set to 4. In order to distinguish it from the new version IPv6, IP is also referred to as IPv4. The source address and the destination address are 4-byte Internet addresses. The Options field contains various options such as source based routing, and record route. The source based routing allows the sender to specify the path the datagram should take to reach the destination. Record route allows the sender to record the route the datagram is taking. None of the IP fields are encrypted and there no authentication. It would be extremely easy to set an arbitrary destination address (or the source address), and IP would send the datagram. The destination has no way of ascertaining the fact that the datagram actually originated from an IP address other than the one in the source address field. It is easy to see why any authentication scheme based on IP-addresses would fail. 1.2. Transmission Control

Tuesday, November 26, 2019

The Southern Defeat essays

The Southern Defeat essays It is often said that the south couldnt have won the civil war, well this essay is going to reflect the various ways in which the Southern states attempted to fight a losing battle from the beginning. The economic dependency of the South on cotton on slavery was well known, whereas the North had companies and technology. The advantage also lay with the North because of reasons such as better communication and transportation, and even more soldiers. The leadership in the North under Abraham Lincoln was more orginized than the that under Jefferson Davis. In the 1850's the North was more urban with a higher population due to all the Irish and German immigrants. By1860, almost all of the biggest cities were in the North. The North also had almost 3/4 of the railroads, and more telegraph lines to send messages instantly. The North had a lot more industry also, with its factories the north was able to mass produce guns, where as the plantations in the south were making.. cotton? well who do you think will win the war! (Source 1) The South had more slaves and more cotton. This was not any sort of military advantage as I said, and it just proved to the North how reliant the south was on them. The first attack at Fort Sumter was poorly organized and was expected by the North. Lincoln had wanted to attack, but kept the troops in moderation there so they didn't waste their men. This worked well because it worked out as he wanted and their were less casualties than their would have been if he had more of his men go. Once the war began, the military expertise of Ulysses S. Grant for the North made it an uphill battle for the South. His military skill alone was enough to give Robert E. Lee's forces in the South serious problem, but the Union army also greatly outnumbered the South's troops. Though Lee would prove to be a worthy general, his strategic downfall at Gettysburg would begin the destine loss for the South. (Source...

Friday, November 22, 2019

Five Great Feature Ideas for Writers

Five Great Feature Ideas for Writers It doesnt matter whether youre a full-time reporter, a part-time blogger, or a freelancer, all writers need a steady source of feature story ideas. Sometimes, a great feature story will land in your lap, but as a seasoned journalist will tell you, relying on chance is no way to build a portfolio of impressive writing. It takes diligence and hard work, writers say. Tips for Writers Always take notes:  You may discover a great subject for a story on your way to the grocery store or meet by chance at a social event. Inspiration can strike at any time. Keep a small notebook or use a note-taking app on your smartphone to jot down ideas as they strike you.Listen: When you do interview someone, remember to let them do most of the talking. Ask questions that cant be answered with a simple yes or no, such as, Tell me how that made you feel?Keep an open mind: Its easy to make snap judgments and assumptions, but a good writer must keep his or her prejudices at bay. Your job is to be objective and learn as much about your subject as possible.Pay attention: How do your sources behave? What does the location look like? What events are occurring? Information like this, as well as direct quotes from a source, will give your reader a fuller appreciation of your writing and subject matter.Accuracy matters: Check all of your data to make sure theyre accurate, triple-check fact s, and make sure youve proofread for spelling, punctuation, and grammatical errors. Remember, it takes a long time to develop a reputation for fairness and accuracy, but just a single mistake to tarnish it. Ideas and Topics Features convey information and facts just like a breaking news story. But a feature is usually much longer and more nuanced than a hard news story, which usually just contains the most relevant or recent factual information. Features allow room for analysis and interpretation, narrative progression, and other elements of rhetorical or creative writing. These five topics are a good place to start if youre looking for feature ideas. Some topics may require days or even weeks of research before you can write a story, while other subjects can be covered in just a few hours.   Profile: Interview a prominent or interesting person in your community and write a profile of them. Possible profile subjects could include the mayor, a judge, a musician or writer, a military veteran, a professor or teacher, or a small business owner.Live-in: Arrange to spend some time at a local homeless shelter, hospital emergency room, nursing home, police precinct or courthouse. Describe the rhythms of the place and the people who work there.News: Talk to community leaders about local issues and trends. Crime, education, taxes, and development are perennial topics of interest to readers, but sports, arts, and cultural events are also newsworthy. Potential sources include city council members, community and grassroots organizations, and local institutions.On-the-spot: Cover an event in your community and write a story on deadline about it. Ideas could include the opening of an art exhibit, a talk by a visiting lecturer or expert, a charity event like a fundraising run, a parade, and so on. Review: Attend the production of a local concert, play or other cultural event and write a review. Or interview the musicians or actors involved and write a story about them. Resources and Further Reading Curtis, Anthony. â€Å"How to Write a Feature Story.† Journalism Skills, University of North Carolina-Pembroke, 2011.â€Å"How to Write a Profile Feature Article.† New York Times Learning Network, High Wire, 1999.Klems, Brian A. â€Å"The Secret to Writing Stronger Feature Articles.† Writers Digest, FW Media, 2 July 2014.

Thursday, November 21, 2019

Large project success Essay Example | Topics and Well Written Essays - 250 words

Large project success - Essay Example The advantages of risk management are vital to a projects success. Addressing the risks in the right manner decreases the problems within the project (Susser, 2012). The next step to deal with the risks is to assign ownership. Assigning of ownership refers to identifying the right person to be responsible for a certain risk in case it occurs. The identified person is accountable to either decrease the threat or capitalize on the opportunity. The people responsible should identify the possible causes of their assigned risk. The other step is to estimate the risks. Upon identifying the risks, it is the responsibility of the IT project managers to assess the likelihood of the threat. Among the approach to estimate the risk is to make an effective probability and multiply it with the amount it will cost to resolve. This provides an impact value related to the risk. Another step to take is to analyze the risk. Analyzing the risk includes getting answers to what the risk is about, its effects, and causes. After analyzing, the other step is to manage the risk. This includes planning and immediately implementing a response to the risk. These plans inclu de transferring the risk, avoiding the source of the risk, minimizing the risk, and accepting it. Once these steps are followed, it is evident that the IT projects risks will be dealt with effectively (Kendrick,

Tuesday, November 19, 2019

Leadership photo narrative Essay Example | Topics and Well Written Essays - 750 words

Leadership photo narrative - Essay Example She couldn’t wait to get there. Lana was excited, confident of meeting expectations and thereby earning the love and respect of her new colleagues. Lana had been offered a job as a computer technician in a prestigious firm that prided themselves on employing and empowering the differently abled. They subscribed to the school of thought that believed in person-centric planning for the required service and support systems for their employees with disabilities and consulted with a highly acknowledged team of Human Services professionals. Life seemed to have so much to offer that lovely morning that Lana had quite forgotten the hard time she had had just some time ago when boarding the bus. Looking at Lana’s bright and happy face and twinkling eyes, no one could have suspected how severely challenged the young woman was. Her peculiar condition made every physical action a little battle in itself. Some strange muscular dysfunction made her a contradictory combination of a sharp and agile mind in a physically challenged body that labored to obey simple signals from her brain. What a struggle every step she took was! Only she knew how much courage it took to go on doggedly determined to achieve her objective- sometimes as commonplace as climbing the rather high steps of the bus. However, Lana had been lucky to have a great family and caregivers. Her parents and siblings together with her teachers at the special school she had recently graduated from had helped her become what she was today. Lana was a trained information technology or IT professional. At her computer and on the internet, she was a wizard and that was exactly what had got her this job in the city. But Lana had learned much more than merely computer skills. She had learned to accept a stranger’s helping hand appreciating his or her genuine concern instead of feeling humiliated. She had learned to ignore the pitying glances of others better-abled than she. Above all she had

Sunday, November 17, 2019

Creative Writin Essay Example for Free

Creative Writin Essay The sun filters in through the leaves of the trees. The midday sun casts dancing shadows over the well-worn table-top. The tables are set for lunch guests paper napkins, ashtray, salt and pepper shakers, and toothpicks all indicate that the table is ready for a guest. The floor is cleanly swept and all the furniture carefully arranged to create a pleasant and inviting atmosphere. Two new picture frames lean against the wall – one of a dancing woman and the other a blank wooden backing. Soon these new images will join the walls already decorated with art. A local artist uses the wall space to display his abstract paintings. The room is filled with blues, oranges, yellows, and reds. The colors seem to practically illuminate the room. Behind the computers are pictures from the sea – both pictures depicting dolphins and underwater diving adventures. The computers are ready for use. Three armed sentinels standing in a row. There is a motorcycle helmet next to one, with a set of keys. Next to the second is a half-empty water glass. The chairs are empty, and the screens are poised in the middle of email composition. The door to the office stands open, and the regular attendant sits in the chair. He is engrossed in something on the screen, probably a game that he’s been playing, probably not a newspaper article. The restaurant staff are all huddling around the hostess stand. Occasionally, one will venture out and wipe an empty table. There is very little noise today, and aside from one group sitting at two tables pushed together, there is no one else eating. The group looks like it is here for business, each person has a set of papers out before them and the discussion seems led. Everyone is calm and organized. The scent of pizza drifts into the air. The wood fire stove at the back has been fired up, and the scent of cheese and wood fills the air. Glasses clink together in the background as the dishwashers keep busy. THE UNFAMILIAR The place is silent. There are computers, but no sounds of keys being pushed. There is staff, but they are not chit-chatting or engaging in conversation. Even the large group talking in low tones, when talking at all. Ah, a distant clink of water glasses. Someone must be active in the kitchen. Despite the sun streaming through the windows, the place has an ethereal light. The walls are adorned with bizarre paintings – no forms can be discerned and the colors are garish. They are all done in primary colors and seem to be uncontrolled expressions of lines and colors with no coherent overall theme. The way the paintings are spaced along the walls adds to the social displacement. An empty picture frame along the wall begs to be filled, to become the link between the abstract art and underwater scenes adorning the walls. The computer terminals only hint at human existence. There is an abandoned motorcycle helmet, which cannot be too abandoned because there is a set of keys next to it, and an open email program. But there is no one to be seen. An empty water glass holds the seat next to the motorcycle helmet. Are these physical placeholders for non-existent people? There is a man in the office. He looks as though if people disappeared in front of his eyes, he wouldn’t even notice. He is so engrossed in his computer screen – is he playing a game? His eyes are not even blinking. This level of interest is the polar opposite of the interest shown by the staff. The staff remains huddled around the hostess stand, paying no attention to the one group inside, or to the missing people from the computer terminals. The tables suggest readiness for occupants, napkins, toothpicks, ashtrays, and salt and pepper are ready for use. They stand guard over the empty tables.

Thursday, November 14, 2019

The Oppression of Caliban in The Tempest Essay -- Tempest essays

The Oppression of Caliban in The Tempest William Shakespeare's, "The Tempest," provides insight into the hierarchy of command and servitude by order of nature. This play uses the relationship between its characters to display the control of the conqueror over the conquered. It also shows how society usually places the undesirable members at the bottom of the chain of command, even though they may be entitled to a higher social status. For example, the beginning of the play opens with a scene on a boat in the midst of a terrible storm. The boatswain, who is under the command of the royal party, attempts to keep the boat from sinking. Members of the royal party, however, persist in interfering with his duties. The boatswain retorts, "What cares these roarers for the name of the king? To cabin! Silence! Trouble us not"(I, I, 16-18). He is trying to warn his superiors that if he does not let him do his job, everyone will die, and it will not matter who has power over whom. The superiors, however, still take offense to this comment and label him a blasphemer. Caliban, an unfortunate character in this play, suffers from similar constant abuse because he is of the lowest social rank in his community. Critic John W. Draper describes Caliban's position in relation to the other characters when he says,      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   "Of all the characters in Shakespeare, Caliban is the   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     most fully and repeatedly/ described, though not always   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     consistently; and his bodily parts seem to show little/   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     relation to his humor or his character except that both   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     are monstrous. Monsters/ were popular; and, as Trinculo   Ã‚  Ã‚  ... ... "Monster Caliban.."Caliban. Ed. Harold Bloom. New York: Chelsea House Publishing, 1992. 89-94. Evans, G. Blakemore. Ed. The Riverside Shakespeare. by William Shakespeare. 1552- 1616. Boston: Houghton Mifflin Company, 1974. Leininger, Lorie Jerrell. "The Miranda Trap: Sexism and Racism in Shakespeare's Tempest." The Tempest: Critical Essays.Ed. Patrick M. Murphy. New York:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Routledge, 2001. 223-229. Smith, James. "Caliban." Caliban. Ed. Harold Bloom. New York: Chelsea House Publishing, 1992. 124-150. Vaughan, Virginia Mason. "Caliban's Theatrical Metamorphoses." Caliban. Ed. Harold Bloom. New York: Chelsea House Publishing, 1992. 192-206. Vaughan, Alden T. & Virginia Mason. "Shakespeare's Caliban: A Cultural History." New York: University Press, 1991. Wilson, Daniel, LL.D. "Caliban: The Missing Link." London: Macmillan and Co., 1873.

Tuesday, November 12, 2019

Communication Technologies Essay

In this assignment I am going to describes different types of communication devices. For example Switches, Routers, etc. Then I am going to explain the principles of signal theory. After this I will look at difference methods of electronic communication and transmission used. Communication Devices Switches – These are mainly used for local area networks (LAN). The reason behind this is that they can be used to bridge a lot of computers together. They do look like hubs but they can vary in speed. They are more intelligent due to the fact that they can send out packets from a set port. There is advantage of using a network switch, they can be used with an Ethernet cable or a fibre optic cable and they still will work perfectly fine. When connecting a router or a server in an LAN or WAN network it is slightly easier because you would just need one cable which would mostly need to a fibre optic cable, so you can get the maximum rate of transfer speed. Routers – They are mainly used for connecting one network to another. They are meant for handling information and forwarding to another network connected to the router. You can either connect using wireless or a cable. Normally an Ethernet cable is used to connect the computer networks. Hubs – Also known as a concentrator or a multiport repeater. Used in a star or a hierarchical network setup to connect the station or the cable segments. There are two main types of hubs: passive & active. Active takes the incoming traffic, amplifies the signal and then forwards it all the ports. In a passive hub it simply divides the incoming traffic and forwards it. A hub can be used to manage and allow individual port configuration and traffic. Hubs operate on the physical layer of the OSI model and they are protocol transparent. This means that they do have the ability to set upper layer protocols such as IP, IPX or a MAC addresses. Hubs just extend them do not control the broadcast or collision domains. Bridges – Used to increase the performance of a network by dividing it into separate collision domains. Even though they are more intelligent than hubs due to the fact that they operate at the Data Link layer of the OSI model, they still are not able to control the upper layer protocols. On a separate segment they store the MAC addressing table of all nodes. Basically it takes the incoming frames and checks the destined MAC address and lookups it up against the store MAC addressing table and decides what to do. If the frame is comes from the same port as the destined port than it simply discards the frame. If the destined location is not known than it will be flooded throughout the outgoing ports and segments. Repeaters -One of the less complex hardware of the networking world, because it basically runs at the physical layer of an OSI model, so it is not aware of the frame formats and upper layer protocols. Repeater basically is used to expand a LAN network over large distance regenerating a signal. When using a repeater remember the 5-4-3 rule which means that a maximum distance between two hosts on the same network is 5. Use only maximum of 4 repeaters in a network and only 3 segments can be populated. Gateways – Very intelligent devices, they work at the Transport Layer protocol. This is higher than the Upper Layer protocol. This means that can manage and control IP, IPX and MAC addressing. They allow IPX/SPX clients to IP/TCP uplink network to connect to the internet. A gateway in simple terms is like a post office. All the information is sent to it and then as a post office knows the number of houses in the area in the same way a gateway would know all the ports and direct it there. Cell Phones – It is a piece of device which is used by a lot of people. It is a portable version and more advanced version of a normal home phone. It lets you voice calling, text messaging, the some other advanced phones even allow video calling and internet browsing. Cell phone is a full duplex device therefore you can connect it to your computer and use it as a modem even though it would be very slow. The newer released phones are somewhere near capable of the proper modem speeds. DCE & DTE devices – Data Communication Equipment (DCE) is basically equipment which allows communication with a Data Terminal Equipment (DTE). In another words DTE ends the communication line and a DCE provides the path of communication. An example of an DCE is an modem and a computer is a DTE. Fax Machine – A device which allows you to send paper copies using PSTN lines to other people. It can also be used to send memos and other information as well. It uses the phone line to transmit the data that is sent. A fax machine has a sensor to read the data and the end of it. It will encode the black and white that it picks on the paper and moves it to the receiving end. It will compress the data before transmitting it. As soon as it receives the data it decodes and decompresses the data so it can arrange it in the way that it scanned it from the original document. There are a lot of things in a fax machine that allow it to do its function. It consists of a source projecting a light beam, a rotating cylinder and a photo electric cell. It also has paper feed like a printer. E-Mail – Email also which is the short form for electronic mail. You can use e-mail to stay in contact with your friend/family even colleagues. It does it by finding out the person you want to email he’s email address and then you will send him an email and click send and then that person will receive it. Signal Theory When talking about signal theory data is represented by digital format which is dependent on binary or base 2 principles. Analogue and digital frequencies are used for transmitting signals along a medium link. Analogue records the waveform as they are. Digital on the other hand turns the analogue signals normally to sets of number. Analogue signals can have varying amplitude and frequency. Amplitude analyzes the loudness of the signal and Frequency determines the pitch of the signal. â€Å"Pitch† mostly used to refer to low and high notes. If the frequency is lowered than you get a low note and if the opposite is applied than you get a high note. Bit is a binary digit which represents value of 0 which is normally off and 1 which is normally on. Bit can also be referred to as a electrical pulse which is generated by the inner clock in the control unit or data register. Bit can also be used for digital electronics which is another system that uses digital signals. Manipulation o f a bit within the memory of a computer can be kept in a steady level on a storage device as a magnetic tape or disc. Byte which is made up of 8 bits is a unit measurement used for information stored on a computer. Synchronous & Asynchronous Communication To sum up synchronous communication it is when interaction with data takes place it is done in real time. On the other hand asynchronous or delayed communication is when any data which is archived or stored and accessed later. It is important to choose the most effective delivery mode because it directly impacts the level of interaction that is going to take place. Synchronous It does not use start or stop bits but instead it synchronizes the transmission speed with receiving and sending end of transmission using the clock signals specifically built for each of the components. After this constant streams of data are transmitted between two sources. Because no start or stop bits are involved data transmission is faster, but more problems occur because if latency takes into effect then the synchronization clock will be out of timing therefore the receiving node will get the wrong timings that have been acknowledged in the protocol sending and receiving data. If this happens then data can be corrupted, missing or even wrong message. There are ways around this which take time. You could use check digits and re-synchronize the clocks so that you can verify that the transmission has been successful and has not been interrupted. Advantages of using synchronous transmission are that lower overhead and more data can be transmitted and data transmission rates are al so faster. The drawbacks of using synchronous transmission is obviously more prone to problems, it is more expensive and more complex. Asynchronous Opposite to synchronous it uses start and stop bits to mark the start and end of a transmission, this means that 8 bit ASCII characters would be transmitted using 10 bits because the use of start and stop bits. For example (1)10111111(0) the bracketed out one and zero at the start and end mark the start and end of a transmission. This tells the receiving either the first character is transmitting or finished transmitting. This method of transmission is normally used when data is sent occasionally as opposed to in solid stream. Benefits of using asynchronous data is that it works out cheaper because timing is not that important and it is also simple because both end do not require synchronization. Drawback are that if a large amount of data is to be transmitted it would take a long time this is because a lot of bits are only for control uses they do not contain any useful information. Bandwidth is used to define how much volume a medium can transmit. Basically it is the maximum rate at which data can be transmitted across mediums. The more bandwidth a wire can handle the higher transmission rates can be achieved. It can also high transmission rates for multiple users. But there are restrictions in place such as if a user has been transmitting a lot of data between a period of time then a temporary limit will be put on. This is quite common with ISP’s. To stop this happening to you best thing to do is not to download a lot at the same time and also close programs which use the bandwidth continuously. Radio Transmission Radio is a way of transmitting signals using varied tones which convey a message of electromagnetic waves with a frequency. Electromagnetic radiation travels in direction of oscillating electromagnetic fields which go through the air and vacuum of space. Changes in radiated waves such as amplitude, frequency or phase allow information to be carried systematically. If the radio waves pass through electrical conductors the oscillating fields induce an alternating current in the conductor. This could be detected and changed into sound or any other type of signal which is able to carry information. Every radio system has a inbuilt transmitter this is the source which allows electrical energy that produces a alternating current of a desired frequency of oscillation. The inbuilt transmitter also has a system which changes some properties of the energy produced to impress a signal on it. This change could be as simple as turning the signal on or off. Change could be more complex such as alternating more subtle properties such as amplitude, frequency, phase or combination of all three properties. The modulated electrical energy is sent via the transmitter to an antenna. Antenna changes the alternating current electromagnetic waves; this allows the waves to transmit in the air. There are drawbacks of using radio. First is attenuation can happen, this basically means the longer the wave has travelling to get to its destination the more weaker it gets. Most obvious example of this would be someone listening to FM radio in the midlands; the further he goes away from the midlands the more signal gets weaker. Microwave An electromagnetic based wave which has a range or wavelength of up to 30 GHz. Currently microwaves are getting more popular due to advancing technologies. Microwave offers high bandwidth at low cost. Most common problem with microwave transmission is reflection. Microwaves are common used for radar which pickup planes and helicopters flying in the air. Microwaves will hit the plane or helicopter and reflect back and gets calculated giving the position of the flying object. Waves are reflected due to a barrier which stops the wave from going further so it hits the barrier and reflects back. Reflection affects the signal if the reflection is not good then the reflection won’t happen therefore a dead or a blank signal will be received. To minimize the effect try staying close the satellite. Wireless protocols such as Bluetooth use microwaves to transmit. Satellite Satellite is a orbiting piece of hardware which has been left floating in the air from big companies like Microsoft, satellite can be used for communication. There are also other types of satellites which are used for spying or used for online maps such as Google maps, Microsoft live maps or another services. Satellites provide high bandwidth solutions. Satellite is categorized as a WAN because it uses high speed & long distance communication technology which allows them to connect to computers. Attenuation also affects satellite connection due to the same reason. If a satellite is not in the required position and starts transmitting signal it will not reach television so they might not work properly or correctly. Satellite dish has to be in the same direction as the satellite. Satellite signals reach television using a transmission antenna which is located at an uplink facility. The facility has an uplink satellite dish which would be around 9-12 meters in diameter. The bigger the diameter of the satellite the more accurate signals and better signal strength from the satellite is received. The satellite dish would be pointed towards the satellite and the uplinked signal is received by the transponder at a certain frequency. This frequency is normally C-band (4-8 GHz) or KU-band (12-18 GHz). The transponder then retransmits the signal back to the earth. NTSC, PAL or SECAM are three broadcast standards used through out the world. NTSC is normally used in the US, Canada, Japan, Mexico, Philippines, South Korea and other countries. PAL which stands for Phase Alternating Line is an colour encoding system which is used by over 120 countries in the world. In a few years time most of the countries will stop using PAL and either change to DVB-T SECAM It is sequential colour with memory is the analogue colour television system. SECAM was Europe’s first colour t elevision standard and France currently uses it. The analogue signals for the three broadcasting types are transmitted via a satellite link scramble or unscramble. The analogue signal is a frequency modulated and transformed for a FM to something called baseband. The baseband fuses the audio and video sub carrier. The audio sub is further demodulated to provide a raw audio signal. Digital TV’s that transmit via satellites are normally based on open standards such as MPEG and DVB-S. MPEG which stands for Moving Pictures Experts Group is a compressed format which code moving pictures and associated audio information. There is also MPEG 2 which is a digital television signal which is broadcasted via terrestrial cable and direct broadcast satellite TV systems. DVB-S which stands for Digital Video Broadcasting is a standard for satellite TV’s which forward error coding and modulation. It is used by every single satellite that serves a continent. Standards Organizations There are difference types of standard organizations. These are the various types of standard organizations TIA/EIA, RS-232, IEEE, ISO, OSI and Manchester Encoding. ISO/OSI – International Standards Organization’s Open System Interconnect (ISO/OSI) is the standard model for networking protocols and distributed applications. ISO/OSI defines seven network layers. 1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application I will be only be explaining in-depth the first network layer: Physical. This layer defines what cable or physical medium to be used. There are lots of different types of cable thinnet, thicknet, TPC, UTP. All of these mediums are functionally the same. The major difference between the various cables is the cost, convenience, installation and maintenance. Converters from one media to another operate at this level. TIA/EIA – Telecommunications Industry Association & Electronics Industries Alliance (TIA/EIA), state the standards which should be used laying cables in a building or a campus. TIA/EIA describes how a hierarchical topology should be laid out. A system where a main cross connect system is used and connected using a star topology using a backbone cabling through a intermediate or a horizontal cross connect. This type of cabling or similar is also used for laying out telecommunication cables. The backbone cabling method will be used to connect the entrance facilities to the main cross connect. In areas such as office a horizontal cross connect for the consolidation of the horizontal cabling, which extends into a star topology. Maximum stated horizontal cable distance should anywhere between 70M-90M. This applies to TTP (Twisted Pair Cable), but the fibre optic horizontal cabling has a set limit of 90M. IEEE – Institute of Electrical and Electronics Engineers allows the development of â€Å"Electro Technology† which in other words applies to electricity applied to technology. Societies like the IEEE Computer Society are subsidiaries of the IEEE itself. This standards organization also publishes journals. Devices such as digital camera need set amount of bandwidth speed so it uses a IEEE plug. Any device that uses the IEEE standard uses a twisted pair cable. Signalling Standards NRZ- It stands for Non Return to Zero. It is a binary code normally used for slow speed synchronous and asynchronous transmission interfaces. Ones is represented as a small voltage and zero is negative voltages. They are transmitted by either by set or constant DC voltages. It also uses additional synchronisation so it dose not lose any bits in the process. NRZ-L – Non Return to Zero Level is similar to NRZ, but it not a binary code. Same as NRZ one is represented as small voltage, but zero is also represented as a small voltage but it is not as big voltage as one, Therefore it allows more data to be send without a lot of signal change. NRZ-M – Non Return to Zero Mark again similar to NRZ, but one is actually represented by a change in physical state and zero is represented as change in physical state. This basically means that there is no voltage when there is no change in physical state. RS-232 – This standard applies to serial data transfer such as the 9 pin serial connecters which are commonly used on a computer motherboard. The data is sent in as time series of bits. Synchronous & Asynchronous is both supported by this standard. This standard and states the number of control circuits that can be or need to be used to connect the DCE & DTE terminal with one another. Data and control circuits which are signalled from a DTE connected to a DCE or vice versa will always flow and operate in one direction this is called half duplex. Only full duplex allows data to be sent and received in both directions at the same time. Manchester Encoding – Data bits which are represented by transitions from a logical state another is called Manchester encoding. This is a digital type encoding. In this encoding the signal is self clocking because the length of every data bit is set by default. Depending on the transition direction the state of the bit can be analyzed. In Manchester encoding the signal synchronizes itself. This is an advantage because this will decrease the error rate and optimize the reliability. But on the other hand it is also a disadvantage because the amount of bits sent in the original signal when transmitted has be twice the amount of bits from the original signal. Differential Manchester – Also known as Conditioned Diphase (CDP). It is a encoding method which uses data and clock signal as fused to create a self-synchronizing data steam. Similar to Manchester encoding it uses present or absent transitions to represent logical value. TTL – Transistor Transistor Logic is a binary code which either uses high voltages between 2.2V and 5V to represent one and no voltages between 0V and 0.8V to represent a zero Name Specification Maximum Length/Speed Advantages Disadvantages Cat.5 Cable RJ45 Connector. Made from Copper, PVC, Plastic Length:100 M Speed:100 Mbit/s Cheapest type of cable, Mostly unshielded & more prone to electrical noise. Cat.6 Cable RJ45 Connector. Made from Copper, PVC, Plastic Length:100 M Speed: 10 Gbit/s Very fast transmission. Unshielded & more expensive than Cat.5 Cat.7 Cable RJ45 Connector. Made from Copper, PVC, Plastic Length:100 M Speed:100 Gbit/s Extremely fast and less interference Incredibly expensive and mostly likely be manufactured till 2013 Bluetooth Mostly Copper for the circuitry, Plastic for casing. Length: 100 M Speed:1 Gbit/s Send from cell phones, do not need wires to connect, Most of the phone are equipped with it Open and other people can access your phone if not protected. Quite slow when sending and receiving on a cell phone. Infrared Receiver, Antenna and Transmitter, Copper & Plastic Length: 40 km Speed: 4 Mbit/s Shorter wave than microwaves, not as harmful. Less interference. Microwaves Antenna & Receiver. Length: 1 M Speed: 300 GHz Good for sending data over longer distances Dangerous, if something that uses microwaves e.g. cell phone for too long. Too much interference Wi-Fi Wi-Fi Signal Transmitter. Length: 95 M Speed: 5 GHz Usable anywhere in the house, can even be used as a hotspot in public places e.g. airports, cafà ¯Ã‚ ¿Ã‚ ½, etc Other people can also access it so many connections can make it slow. Satellite Dish and a satellite in orbit Length: 22,000 Miles Speed: 40 Mbit/s Connection from anywhere in the world. Delay of up to 500 millisecond due to rain or moisture Fibre Optic LED/Laser Connector. Glass, Plastic, PVC. Length: 40,000 Speed: 10 Gbit/s Extremely fast speeds can be achieved without the use of switches, hubs, etc over long distances Simply expensive to buy. Radio Transmitter & Receiver Length: 100 Miles Speed: 300 GHz Available anywhere in the world. Very limited range and gets easily affected by interference. Name Specification Advantages Disadvantages Coaxial Diameter: 6 mm / Resistance: 85.2 km Capacity: 70 km at 1KHz Cheap. 500 meters length. It very reliable Expensive and hard to install Fibre Optic Diameter: 2 microns. Good for transmission over long distance because it is immune to magnetic interference. Electrical interference protected. Stretches up to 3000 meters. No noise is generated Very expensive and over time the sent signal will get weaker because of signal reflecting. UTP/Cat.5 Foiled and uses copper wire. Stretches up to 100 meters. Easy installation and transmission rates reaching up to 1 Gbps. Very open to interferences. STP Foiled and also uses copper wire. Shielded. Length up to 100 meters. Transmission rates between 10-100 Mbps Expensive heavy and big in physical size. Radio Uses antenna to transmit. Signal can be refracted. No wires needed and very long distances capable. Signal gets weaker the more time taken to reach the destination. Security is a problem very open for hackers. LAN This is type of network which covers a small office, home or a school network. A LAN uses either wired Ethernet or wireless RF technology. Using a LAN can be much easier when there is a printer available or sharing a file throughout the network. Updating software is much easier because updating software will automatically update all the other software’s. LAN has much higher transmission rates because it is wired connection rather than wireless. Ethernet and Wi-Fi as most widely used technologies, however many others such as token rings have been used before. This relates to standard IEEE 802.2. This standard allows two connectionless and one connection orientated operational mode: Type 1 which allows frames to be sent to a single destination or multiple destinations on the same network is a connectionless mode. Type 2 is the oriented operational connection mode. In this mode it uses something called sequence numbering which makes sure that when the data is send it gets to the destination in the correct order and not a single frame has been lost. Type 3 which is also a connectionless service, but only support point to point communication. Infrared is related to this service because in computer infrared network it can receive and transmit data either through the side of the device or the rear side of the device. When connections are made using Microsoft Windows Infrared the same method used for LAN connections can be used. Infrared technology has been extended to allow more than two computers to be connected semi permanent networks. The advantage of a LAN is that the same physical communication path can be shared by multiple devices. For example it there is a printer, a computer and the internet connection the LAN will allow connections to the printer and it will also allow connections to the internet. If a software is loaded onto the file server that all the computers on the network can use it. There are quite a few drawbacks of a LAN network. For example security measures need to be taken so that users cannot access unauthorised areas. It is quite hard to setup the network. Skilled technicians are needed to maintain the network. Yet the biggest disadvantage is that if the file server goes down than all the other computers on the network are affected as well. WAN This type of network covers a wider area. It is used over high speed, long distance communications such as computers in two different areas. A WAN can also be shared. For example two occupants in two buildings can share the wireless connection to a third person, or a business or anyone or anything they wish to do so. Data is safe, secure and quick when it is transmitted between two computers. WAN can also be used to connect different types of networks together for example a WAN network connected to a LAN networks. The reason behind this is that it is AppleTalk. It is a cheap LAN architecture which is a standard model built for all Apple Macintosh computers and laser printers. It also supports Apple LocalTalk cabling scheme as well as Ethernet and IBM token ring. AppleTalk can connect to standard computers which do not have AppleTalk. This all relates to FDDI standard which stands for Fibre Distributed Data Interface. It is a backbone of a wide area network. It uses fibre optic cable to transmit data up to supported rate of 100 Mbps. An advantage of a WAN it allows secure and fast transmission between two computers. Data transmission is inexpensive and reliable. Sharing a connection is easy as well because it allows direct connectivity. A WAN also allows sharing of software and resources to other workstations connected on the network. Disadvantage of a WAN network is that the signal strong all the time so anyone trying to hitchhike a connection can use the WAN connection it is not protected. WAN are slow and expensive to set-up. They also need a good firewall to stop intruders using the connection. Networking Mediums Different types of medium are used for different types of topologies. Coaxial Cable It is normally used to connect telecommunication devices which used for broadband connection which use high transmission rates to transfer data. The cable is insulated using a braided shield which is also known as a screen. It protects the cable from electromagnetic interference. It has higher capacity than a standard copper wire. Therefore it allows radio frequencies and television signals to be transmitted. Various types of coaxial cables are available which can be used for thin Ethernet which are used for networking 10Mbps connections lengthening up to 200 meters. There is also thick Ethernet cable is also used for 10Mbps connections but stretching up to 500 meters. Unshielded Twisted Pair (UTP) coaxial cable has been used in the past when building networking using thick or thin Ethernet. Ethernet cables quite expensive but they are still used because they carry more data then a telephone wire and it is less susceptible to interference. Optical Fibre Optical fibre also known as a fibre optic cable uses light to transmit data. Light is made using a laser or LED is sent down a fibre which is thin strand of glass. Fibre optic is about 2 microns in diameter which is 15 times thinner than a single human hair. Optic fibre is not affected by electromagnetic interference. It is cable of higher than data transmission rates, ideal for broadband usage. Fibre optics are manufactured in two different types the single mode and multi mode. The difference between the two is quite obvious single mode uses one beam of light to transmit data to longer distance of around 3 km but the multimode uses multiple beams of light to transmit data but only to shorter distance of 2 km. This allows more data to be sent simultaneously. It is normally used for broadband transmission as mentioned before because it is faster at transmission than any other cable currently available. Fibre optic also has an advantage of long distance transmission because light propa gates through the fibre with little attenuation compared to electric cables. Not many repeaters are needed for long distance. Data travelling using the fibre can reach rates of unto 111 Gbps. Fibre optics also restrict high voltages travelling from end to end of a fibre to another end. It also restricts cross talk and environmental noise between signals transmitting to different cables. UTP (Unshielded Twisted Pair) & STP (Shielded Twisted Pair) UTP and STP both use copper wires which are known to man as one of the oldest types of transmission media methods. STP is insulated with a metallic plastic foil which is all under the plastic sheath. This insulating is expensive to make that’s why it is more expensive than normal cable. Even though STP cable is shielded there is still crosstalk. It cannot be eliminated. Both UTP & STP individual wires are twisted together so it creates there is less crosstalk. Core of each of the type of cable is a very good conductor and easy to work with. Media which can be used with UTP is internet, because it is easy to install, maintain, less expensive and allows higher transmission rates. The media used with STP is also internet, but it is more expensive and difficult to install. The advantage is that there is less interference. It is difficult to install because it has to be grounded at both ends. Improper grounding will result I metallic shielding acting as a antenna and it will pick u p unwanted signals. Due to the cost and difficult to install and maintain it is hardly used in Ethernet networks. It is mainly used in Europe. Crosstalk Crosstalk means that signal that are transmitting in different circuits interfering with each other. Crosstalk happens because unwanted signals interfere with another channel transmitting undesirably. Electrical Noise Noise is when an electrical signal is transmitted across a wire which is not the sent signal by the user, but it is another signal which has been picked up randomly. Twisted pair cables eliminate the interference because they are twisted with each other so they cancel out each other. The thickness and varied insulation of a cable and its capacitance of the wires will cause noise. For example when there is communication on a telephone and either person cannot hear the message clearly this is caused by noise affecting the signal. This is known as crosstalk, as mentioned before crosstalk is when signal is affected by electromagnetic field around a wire. Electric noise cannot be eliminated but can be minimized by taking caution. Keep cables away from electrical equipments and shield the cable weather it is a fibre optic or a STP. Checksum It is a method used for error-checking the received data against a calculated checksum. For example when a data is received by the designated node the checksum error detection method will create a new calculation and check it against the old calculation to check weather the same result it received. This makes sure the data has not been altered in any way when it was transmitting. The checking of the data is called checksum function or checksum algorithm. Cyclic Redundancy Check (CRC) CRC is another type of error-checking technique used in data communication. A CRC character is generated at the end of the transmission. The produced CRC character’s value depends on the hexadecimal value of ones in the data block. The node receiving the transmission makes a similar calculation and compares it to the source node and it the values are different then it asks for retransmission of the data. Frame It is a collection of bits sent over a medium. It contains physical address and control information. It also contains error-detection methods like CRC. The size and role of the frame is all dependent on the type of protocol, which is often used synonymously with packet. When the data is split and if necessary it is sent to Ethernet frame. The size of the Ethernet frame varies between 64 and 1,518 bytes. It uses the IEEE 802.3. It contains address, length, data and error checking utility. The data is passed onto the lower level components corresponding to OSI’s Physical layer. This converts the frames into bit-stream and sends it over the transmission medium. Other network adapters on the Ethernet receive the frame and analyze it for the destination address. If the destination address match of the network adapter, the adapter software simply processes the incoming frame and the passes the data to higher levels of the protocol stack. Packets It is a unit of data sent across networks. When a computer transmits data it will split or divide it into packets when it reaches the defined node it is transformed into the original transmission. Also known as a datagram it contains two parts. The header which acts as a envelope and the other part is the payload which is contents. Any message sent over the size of 1,500 bytes is fragmented into packet for transmission. When packet filter is put into place the header of incoming and outgoing packet is analyzed and decides whether to let them pass or restrict the packet, this is decided based on network rules. Data Transmission Modes & Methods There are three different ways transmission can take place. Data transmits either using simplex, half duplex or full duplex mode. There are two different ways how data is transmitted. Data can be transmitted via serial or via parallel transmission. Simplex Simplex data can only travel in one direction. Television and radio broadcasting are example of simplex. Fibre optic works with simplex mode. Simplex is good for satellite communications. TV signal is the proof that satellite communication is good because the transmission is good and clear. Simplex is rarely used for computer based telecommunications. Half Duplex Half duplex data can travel both ways but only in one direction. Coaxial cable works in half duplex mode. Radio is a example of half duplex because the signal reaches the destination and comes back to the original source. Communication between networks also works at half duplex. If a node is transmitting a message and another node wants to transmit it has to wait till the token ring comes back. Full Duplex In full duplex data can travel in both directions and at the same time. The bandwidth is divided in both directions. UTP/STP mediums work at full duplex. For example Bluetooth is a full duplex because data can be received and sent by both devices. Another example is landline telephone because both end of the phone can speak and listen to each other. Serial Transmission In serial transmission one bit is sent at a time. It is good for communication between several participants. Serial transmission is slow. When the data is sent it is dissembled by the source and reassembled by the receiver. Parallel Transmission Parallel transmission is when every bit is sent simultaneously but using separate wire. Basically when data is parallel channel transmitted for i.e. 8 bits or a byte everything is sent simultaneously therefore it’s faster than serial because serial channel would send the 8 bits or byte one by one. Most common example is communication between a printer and the computer.

Saturday, November 9, 2019

A Case Study on Tesla Motors

A CASE STUDY ON TESLA MOTORS Cost/Benefit Analysis In concern, every determination that has to be made requires thorough rating. And one of the most convenient and straightforward methods to make this is through Cost/Benefit Analysis. In CBA, an appraisal of the entire value of all the benefits of a certain undertaking is compared to that of the value of the costs that are needed in order to recognize such undertaking ( Watkins, n.d. ) . In order for the assessor to come up with a better angle of comparing, these values must be expressed into a unvarying unit of measuring. Normally, in calculating CBA, the values of the cost and benefits are converted into their pecuniary value. Once all the costs and benefits of the undertaking have been taken into consideration, comparing may be done. If the value of the benefits outweighs that of the costs, it means that the undertaking is a worthwhile enterprise. The following point of rating would be the computation of the break-even point – the clip at which the benefits of the undertaki ng pay off the costs ( Hill, 2012 ) . It would be most preferred to hold a shorter payback period. By and large, CBA helps concern people to make up one's mind whether or non to set about a peculiar undertaking. It allows them to border the best and appropriate undertaking aims. Furthermore, CBA can be used to fix the necessary resources every bit good as develop before and after steps of the project’s success. For illustration, the move to advance more ecological operations and procedures for the company may necessitate a Cost/Benefit analysis to find the chance of its realisation. As the corporate universe is going more and more aware of the effects of Climate Change, companies are looking to implement environment-friendly patterns in their offices. The same holds true for immense fabrication companies. CBA allows the companies to measure likely additions and losingss that these actions may convey. Tesla Motors: A Case Study in Environmental Impact Background and Operations of Tesla Motors Leading the coming of a more sustainable transit system and its inventions, Tesla Motors has established rather a repute in the automotive industry. Since its constitution in 2003, the company has grown to be the biggest maker of electric autos in the market. It has contributed more than 50,000 autos in roads all over the universe as of today ( Tesla Motors, n.d. ) . Its chief end is to make a transit system that is more environment-friendly and sustainable. Electric autos are charged at place and do non necessitate refuelling of gasolene unlike the autos designed by other makers. Quite expectedly, these zero-emission autos were non easy accepted in the market as they were deemed impractical, non to advert consumers were non truly impressed with their instead tacky design. Fortunately, Tesla Motors was able to toss that equation. By let go ofing their trailblazer electric athleticss auto for the high-end market, the Tesla Roadster, they were able to capture the attending of auto partisans and alter the face of the green auto market. After let go ofing the Roadster, Tesla pushed for more infinite in the industry by let go ofing their luxury saloon, the Tesla Model S in 2012. More and more consumers are looking to purchase electric autos because of the inventions that were done by the company. In fact, reserves for their following theoretical account releases are already stacking up. There is much expectancy for the Tesla Model X and Model 3 releases. How Green is a Tesla Green Car? The really intent of an electric auto is to advance energy invention ; and Tesla Motors’ end is to accomplish this without doing any negative impact on the environment. However, a new engineering such as the advanced green auto production can non be made to go through without being exhaustively criticized by the populace. Green autos are, by rule, more environment-friendly than the conventional fuel-based autos. The procedure, by which it is being manufactured, on the other manus, says otherwise. Furthermore, green autos do run on electricity. But, how is electricity being processed? Does it non come from coal and crude oil excessively? All things considered, is a Tesla green auto viridity after all? The company admits that the grade of being environment-friendly of their autos – take the Model S for illustration, largely depends on where and how frequently the auto is being driven. In the US, each province has a different mix of energy beginnings that fundamentally goes into their grid. In other words, a â€Å"cleaner† beginning of electricity makes a Model S a more environment-friendly auto. By and large, it is still cleaner than the internal-combustion design of their rivals in footings of emissions-per-mile ; sing the efficiency of battery-powered autos in change overing stored energy into a utile signifier ( Oremus, 2013 ) . Tesla Motors and the Campaign for Environmental Sustainability Tesla Motors have established its run to advance a greener personal conveyance system through its electric vehicles ; but how does it impact the environment in the industrial context? Are its procedures and operations considered as environment-friendly? The company is really much aware of the fact that they are indirectly let go ofing C emanations through power workss – sing that electricity is the chief power beginning of the vehicles. This is the ground why Tesla moves to advance the absolute remotion of indirect C emanations by utilizing Supercharger Stations that merely uses grid electric power from solar panels ( Walsh, 2014 ) . Furthermore, Tesla is teaming up with SolarCity to supply electric auto proprietors an option to bear down their autos utilizing solar panels in their several places. This is like hitting two birds with one rock. By extinguishing the demand for coal-based electricity beginning, they are indirectly cut downing C emanations in the ambiance ; and they are advancing the usage of renewable energy beginning at the same clip. Tesla is fundamentally work outing the world’s dependance on gas. Through their radical inventions in electric vehicle engineering, they have addressed an issue that has been thought as an improbableness for many old ages. By doing more convenient accommodations in their electric autos, and at the same clip turn outing that electric autos are so effectual, Tesla has convinced more consumers to sponsor their merchandise. The company is winning more and more conflicts as they advance into bigger ventures. In order to provide to their turning consumer demands, Tesla is constructing their very foremost Gigafactory. Panasonic will be a immense investor in this undertaking, along with Tesla’s other major spouses. The best thing about this gigafactory is the company’s program to run it chiefly on air current and solar energy. Nevada is the perfect site for the mill because it is where the biggest solar power works in the universe is located. Tesla does non merely function as a leader in electric auto engineering, it is besides going a theoretical account for other companies to see more environment-friendly procedures. Coal excavation and processing has created many environment-related issues and are still doing jobs in many topographic points around the universe. If Tesla becomes successful in extinguishing the demand for non-renewable beginnings of energy in order to bring forth electricity, it can alter the face of the car industry everlastingly. Not merely will it dramatically cut down the C emanations that are released to the ambiance, it will besides extinguish the issues that are brought about by the processing of electricity that is coming from natural resources. Tesla Motors and the Competitive Industry Of class, Tesla Motors is non the lone company that has entered the green auto market. Even though the industry for green autos is non that large compared to the conventional car market, it can be said that competition is non excessively slack. In fact, Toyota, Ford, Nissan, and Honda are considered as the biggest rivals for Tesla. Audi, Volkswagen, and BMW are looking to fall in the green auto industry shortly. And these are reasonably immense companies. Can Tesla maintain its topographic point in the industry without being squeezed out by elephantine auto makers? What is its competitory advantage? Unlike the remainder of the car makers, Tesla is 100 % in the green auto industry. Therefore, their focal point is merely within that market. Research and development is entirely dedicated for this intent, leting the company to make better inventions. Besides, Tesla has about 5-year caput start over the other companies. While other companies are still constructing their green auto designs, Tesla is already smoothing its ain. The hereafter of the automotive industry is tilting towards the use of renewable beginnings of energy. This fundamentally means that other companies who are on the other side of the industry are at a immense disadvantage. Oil is about to run out ; but solar power is limitless. Sooner or subsequently, they will hold to switch to a more sustainable beginning of energy. Tesla Motors and the Future of Green Car Technology At the minute, Tesla’s precedence is to maximise its production in order to run into the demands for the Model S and Model X in the market. They are holding problems in run intoing client demands with their very limited production. But the populace can rest assured that Tesla will non halt making better inventions for their merchandises. Once the gigafactory has been installed, Tesla’s following focal point will be on the development and betterment of machine-controlled driving engineering. As a affair of fact, the company’s CEO, Mr. Elon Musk has announced the release of their partially self-driving vehicle by 2017 ( Boyadjis, Rassweiler, & A ; Brinley, n.d. ) . As the engineering for zero-emission autos advancement, the issues sing the car companies’ impact on the environment is being addressed bit by bit. Someday, there will come a clip when vehicles will entirely depend on solar power – among other renewable energy beginnings. It may non wholly work out Global heating, but it will assist the universe get at that place one measure at a clip. Mentions Boyadjis, M. , Rassweiler, A. , & A ; Brinley, S. ( n.d. ) . Object moved. Retrieved from hypertext transfer protocol: //www.ihs.com/articles/features/tesla-motors.html Hill, R. ( 2012, September ) . Attention Required! | CloudFlare. Retrieved from hypertext transfer protocol: //www.mindtools.com/pages/article/newTED_08.htm Oremus, W. ( 2013, September 9 ) . How green is a Tesla? Electric cars’ environmental impact depends on where you live. Retrieved from hypertext transfer protocol: //www.slate.com/articles/technology/technology/2013/09/how_green_is_a_tesla_electric_cars_environmental_impact_depends_on_where.html Tesla Motors. ( n.d. ) . About Tesla | Tesla Motors. Retrieved from hypertext transfer protocol: //www.teslamotors.com/about Walsh, T. ( 2014, November 1 ) . Investing in Socially Responsible Companies: Tesla Motors Inc. Retrieved from hypertext transfer protocol: //www.fool.com/investing/general/2014/11/01/investing-in-socially-responsible-companies-tesl-2.aspx Watkins, T. ( n.d. ) . An Introduction to Cost Benefit Analysis. Retrieved from hypertext transfer protocol: //www.sjsu.edu/faculty/watkins/cba.htm

Thursday, November 7, 2019

TTC essays

TTC essays The T.T.C, as we all depend on, is supposed to be a great means of transportation provided by the government. Everybody relies on the T.T.C because it transport millions of people everyday. Students, especially, are very dependent on the public transportation, since majority of student cannot drive yet. We especially need it to get to school, or going to work and other commitments we may have. T.T.C is supposed to help us get places, and although it is our only public transportation, I am entirely against them. I do not agree with their decisions to go on strikes, which often comes once a year, this affects everyone especially students. Not to mention, a number of bus drivers lack courteous behavior. Finally, in respect to the rules, most bus drivers are way too strict in enforcing those rules. I feel the T.T.C takes advantage of our necessity to public transportation. Almost every year, the T.T.C goes on strikes, demanding raises. Their privilege of being a Union, gives them the idea that they have the right to go on strike and demand a raise. The people who suffer the most out of this are the students, because we the majority are very dependent on buses. We need them to get to and from school. Since most teenagers do not know how to drive, or live very far from the school. Not to mention, after every strike the prices on tickets increase. They fail to acknowledge Students financial situations. Some of us cannot afford to buy tickets every week. Does this mean that if you live far from the school and you cannot buy tickets, you cannot get your education? This should never be the case. They should consider us more than themselves. Or maybe the government should not give them so much. T.T.C employees are making more money than they should. It is very annoying when they constantly going on strike, they are greedy and always want ...

Tuesday, November 5, 2019

F-8 Crusader in the Vietnam War

F-8 Crusader in the Vietnam War The F-8 Crusader was the last fighter designed for the US Navy that utilized guns as its primary weapon. Entering service in 1957, it saw combat during the Vietnam War both as a fighter and ground attack aircraft. Variants of the F-8 remained in use with the worlds air forces and navies into the 1990s. Background In 1952, the US Navy issued a call for a new fighter to replace its existing aircraft such as the Grumman F-9 Cougar. Requiring a top speed of Mach 1.2 and landing speed of 100 mph or lower, the new fighter was to utilize 20 mm cannons in lieu of the traditional .50 cal. machine guns. This change was made as studies during the Korean War found that .50 cal. machine guns caused insufficient damage. Among the companies to take up the US Navys challenge was Vought. Design Development Led by John Russell Clark, the Vought team created a new design which was designated the V-383. The aircraft incorporated a variable-incidence wing which rotated 7 degrees during take-off and landing. This allowed the aircraft to achieve a higher angle of attack without affecting the pilots visibility. For this innovation, the design team won the 1956 Collier Trophy for achievement in aeronautics. Clarks variable-incidence wing was mounted high on the aircraft which required the use of light, short landing gear that were housed in the V-383s fuselage.   The V-383 was powered by a single Pratt Whitney J57 afterburning turbojet capable of 18,000 lbs. of thrust at full power. This gave the aircraft a top speed in excess of 1,000 mph and the type would become the first American fighter to achieve such speeds. Unlike future fighters, the V-383s afterburner lacked zones and could only be employed at full power. Responding to the Navys armament requirements, Clark armed the new fighter with four 20 mm cannons. To supplement the guns, he added cheek pylons for two AIM-9 Sidewinder missile  and a retractable tray for 32 Mighty Mouse FFARs (unguided folding fin aerial rockets). This initial emphasis on guns made the F-8 the last American fighter to have guns as its principal weapons system. Competition Entering the Navys competition, Vought faced challenges from the Grumman F-11 Tiger, the McDonnell F3H Demon (a precursor of the F-4 Phantom II), and the North American Super Fury (a carrier version of the F-100 Super Sabre).  Through the spring of 1953, the Vought design proved its superiority and the V-383 was named the winner in May. The F-11 Tiger also moved ahead to production though its career proved short due to issues with its J56 engines and the Vought aircrafts superior performance. The following month, the Navy placed a contract for three prototypes under the designation XF8U-1 Crusader. First taking to the skies on March 25, 1955, with John Konrad at the controls, the XF8U-1, the new type performed flawlessly and development progressed rapidly.  As a result the second prototype and the first production model had their inaugural flights on the same day in September 1955. Continuing the accelerated development process, the XF8U-1 began carrier testing on April 4, 1956. Later that year, the aircraft underwent weapons testing and became the first American fighter to break 1,000 mph.   This was the first of several speed records set by the aircraft during its final evaluations. F-8 Crusader - Specifications (F-8E): General Length: 54 ft. 3 in.Wingspan: 35 ft. 8 in.Height: 15 ft. 9 in.Wing Area: 375 sq. ft.Empty Weight: 17,541 lbs.Loaded Weight: 29,000 lbs.Crew: 1 Performance Power Plant: 1 Ãâ€" Pratt Whitney J57-P-20A afterburning turbojetCombat Radius: 450 milesMax Speed: Mach 1.86 (1,225 mph)Ceiling: 58,000 ft. Armament Guns: 4 Ãâ€" 20 mm (0.787 in) Colt Mk 12 cannonsRockets: 8 Ãâ€" Zuni rockets in four twin podsMissiles: 4 Ãâ€" AIM-9 Sidewinder air-to-air missiles, 2 x AGM-12 Bullpup air-to-ground guided missilesBombs: 12 Ãâ€" 250 lb bombs or 4 Ãâ€" 1,000 lb (450 kg) bombs or 2Ãâ€" 2,000 lb bombs Operational History In 1957, the F8U entered fleet service with VF-32 at NAS Cecil Field (Florida) and served with the squadron when it deployed to the Mediterranean aboard USS  Saratoga  later that year. Quickly becoming the US Navys top daytime fighter, the F8U proved a difficult aircraft for pilots to master as it suffered from some instability and was unforgiving during landing. Regardless, in a time of rapidly advancing technology, the F8U enjoyed a long career by fighter standards. In September 1962, following the adoption of a unified designation system, the Crusader was re-designated the F-8. The next month, photo reconnaissance variants of the Crusader (RF-8s) flew several dangerous missions during the Cuban Missile Crisis. These began on October 23, 1962 and saw RF-8s fly from Key West to Cuba and then back to Jacksonville. The intelligence collected during these flights confirmed the presence of Soviet missiles on the island.   Flights continued for six weeks and recorded over 160,000 photographs.  On September 3, 1964, the final F-8 fighter was delivered to VF-124 and the Crusaders production run ended. All told, 1,219 F-8s of all variants were built. Vietnam War With the US entry into the Vietnam War, the F-8 became the first US Navy aircraft to routinely battle North Vietnamese MiGs.  Entering combat in April 1965, the F-8s from USS Hancock  (CV-19)  quickly established the aircraft as an agile dogfighter, though despite its last gunfighter moniker, most of its kills came through the use of air-to-air missiles.  This was partly due to the high jam rate of the F-8s Colt Mark 12 cannons. During the conflict, the F-8 achieved a kill ratio of 19:3, as the type downed 16 MiG-17s and 3 MiG-21s. Flying from smaller Essex-class carriers, the F-8 was used in fewer numbers than the larger F-4 Phantom II. The US Marine Corps also operated the Crusader, flying from airfields in South Vietnam.   Though primarily a fighter, F-8s also saw duty in ground attack roles during the conflict. Later Service With the end of the US involvement in Southeast Asia, the F-8 was retained in frontline use by the Navy. In 1976, the last active duty F-8s fighters were retired from VF-191 and VF-194 after nearly two decades of service. The RF-8 photo reconnaissance variant remained in use until 1982, and flew with the Naval Reserve until 1987. In addition to the United States, the F-8 was operated by the French Navy which flew the type from 1964 to 2000, and by the Philippine Air Force from 1977 until 1991.