Wednesday, October 30, 2019

A Report On Observation Assignment Example | Topics and Well Written Essays - 750 words

A Report On Observation - Assignment Example Introduction I spent about 10 hours observing at the SAY San Diego After School Program at Hearst Elementary in San Diego, CA. The children ranged from Kindergarten to 5th grade, which is approximately three to eleven years of age, and numbered up to 90, depending on the day. The program utilized the auditorium, cafeteria, outside eating area, and the playground of an older school. Snacks were served on each school day, and the children ate lunch together on one day (minimum day for the school). Each day also had between 45 and 90 minutes of play, some guided, some free time. Discussion The day care program highly observed hygiene measures. Teachers and students were expected to wash their hands after playing outdoors, before eating (and serving the food), and after using the restroom (Marotz, Cross, & Rush, 2011). Teachers are not allowed to enter the restrooms, unless there is an emergency, so they could only examine the cleanliness of children’s hands after they exited the restroom, but all children were examined to make sure the hands were clean looking. Any child who did not have clean hands was sent back in to wash with soap and water. It was hard to gauge the number of children who followed the correct procedure as many of the children are out of sight from the staff when washing their hands. Though when they washed their hands in the activity room, the result was about 65% followed the correct procedure. The general faults made were in making sure the backs of the hands got soaped up and in rinsing off the soap completely. This is because most of the children washed their hands in haste. When the children were being observed in this room, they were reminded of the correct way of washing their hands by observing their teachers of who always used the correct procedure (Marotz, Cross, & Rush, 2011). The school does not have access to warm water as all the taps are of cold water. The program cannot fix this fault. There were no children in diapers as most of the young children were old enough to use the restroom under the supervision of their teachers. The program and facility do a fantastic job on attempting to prevent infections. The school has two full-time custodians, who clean the areas inside and around the program. The workers cleaned all the surfaces that the children worked, played, and ate on. This they always did before the program opened. They did the same after they are used by the children. Each teacher also carries a first aid pack with him or her at all times. I only saw one child who needed a Band-Aid. Because of the rules and regulations handed down to the program by its parent non-profit committee and the school district that owns the facility, teachers are only allowed to put a Band-Aid on a child. They cannot help clean any wound, and they cannot put any medication on the area if it is not prescribed by a physician (Marotz, Cross, & Rush, 2011). I believe this could be fixed if the program could afford a nu rse on duty at all times, but unless the parents of the children decided to pay for it, that will not happen. The youngest children are kindergarteners, and all students in the program are expected to be potty trained. Teachers are always with children at the bathrooms, but they never go in with the children. I saw no safety issues that were out of the ordinary for the children during school time. They played on an asphalt playground that had dirt and sand that had blown on to it, so there was a slipping

Monday, October 28, 2019

Her First Ball Essay Example for Free

Her First Ball Essay My first impression of Leila simply from the first page of â€Å"Her First Ball,† was that she was an innocent girl that wasn’t completely satisfied with her current situation in life. Leila was portrayed as having a weak/inexperienced heart. For example, â€Å"†¦she couldn’t have helped crying because she was an only child, and no brother had ever said ‘Twig? ’ to her† (265), and for the fact that being different from the others bothered her. Despite her innocence and immaturity, she attempts to compose herself and act mature than she is capable of by â€Å"trying not to smile too much; she tried not to care† (265). Her life up to now wasn’t eventful or memorable in any way and she has a desire to cling onto the present/momentary excitement and not let go. â€Å"She would remember forever. It even gave her a pang to see her cousin Laurie throw away the wisps of tissue†¦as a keepsake, as a remembrance† (265), shows her emotions on how she wants to keep hold of every little detail of this first ball. I made the connection of this ball being her first in relation to not only the actual ball, but numerous ‘first times’ down her path of becoming mature. First time interacting with the opposite gender, feeling the lack of maturity amongst the other girls in the ladies’ room and first time in being hit in the head with reality, a frightening image from the fat man that Leila had never considered before, resulting in a somewhat loss of her previous innocence. I was able to relate to Leila’s situation of having missed out on the experiences of the ‘real world,’ such as the comparison between Leila and the Sheridan girls. Having lived in Abbotsford for my entire middle school life, I believe I missed out on experiences that I would have had if I lived out in the city (Surrey), seeing that Abbotsford is relatively an isolated/country city. Although I wasn’t as isolated as having the â€Å"nearest neighbor for fifteen miles† (265), I felt I could relate to Leila’s uncontrollable excitement that she felt while she was taking in her new surroundings. The impactful last sentence of the story, â€Å"She didn’t even recognize him again† (270), I found it almost eerie regarding the fact that it seemed like her memory was wiped blank. I questioned that even though her innocence was already long gone, whether that meant she would have to go through the same horrible process of being hit on the head by reality, as the first time she met the fat man and how she will be able to cope with the shock and sadness she feels every time. Throughout the reading, her style of writing, her word choices portrayed Leila’s perspective of her first ball in a magical/fantasy way. The presentation of a perfectly set up ball, â€Å"she clutched her fan, and gazing at the gleaming, golden floor, the azaleas, the lanterns, the stage at one end with its red carpet†¦how heavenly; how simply heavenly (267)! Every little detail was attractive and well suited to her fantastical desires. Leila was not yet revealed to the somewhat frightening reality that comes along with her magical world that is inevitable.

Saturday, October 26, 2019

Free Essays - The Supernatural in Hamlet :: Shakespeare Hamlet Essays

The Supernatural in Hamlet    The supernatural, is an integral part of the plays of William Shakespeare. In addition, the supernatural is, in fact, an integral part of the structure of the plot of Hamlet. The supernatural appears in Hamlet in the form of a ghost. The role of the supernatural is very important.    A ghost appearing in the form of Hamlet's father makes several appearances during the play. It first appears to the watch men, Marcellus and Bernardo along with Heratio, at the guardsmen's post. The ghost does not speak to them. It is not until the appearance of hamlet that the ghost does speak.    The conversation between the ghost and hamlet serves as a catalyst for Hamlet's last actions and provides us with insights into Hamlet's character. The information the ghost reveals insights Hamlet into action against a situation he is already uncomfortable with. It must be noted, that hamlet is not quick to believe the ghost. He states that maybe he saw a devil that abuses him due to his meloncaully. We are thus subjected to an aspect of Hamlet's character. Hamlet next encounters the ghost in his mother's room. The ghost wets hamlets appetite. Hamlet is now convinced of the ghost and listens to it. The question many ask is did the ghost mislead hamlet?    The ghost is the guiding force behind hamlet. It asks hamlet to seek revenge for king Hamlet's death. This propels him into a series of events that end in his death.    The appearance of the ghost to Hamlet caused him much confusion. He, at first, regards the ghost as questionable. Hamlet doesn't know if he should listen to the ghost. If this is the ghost of king Hamlet, then hamlet is obligated to listen to the ghost. This is the beginning of Hamlet's problems.    Hamlet's next problem is that of morality. He needs to morally justify the murder of Claudius because Hamlet is restrained by his conscience. He could not satisfy himself that avenging his father's death was the right thing to do. Although Hamlet does not act on instinct, he does understand what the ghost is telling him to do. He expresses no doubt if the ghost is an honest one, but his morality clearly stands in the way of action. Free Essays - The Supernatural in Hamlet :: Shakespeare Hamlet Essays The Supernatural in Hamlet    The supernatural, is an integral part of the plays of William Shakespeare. In addition, the supernatural is, in fact, an integral part of the structure of the plot of Hamlet. The supernatural appears in Hamlet in the form of a ghost. The role of the supernatural is very important.    A ghost appearing in the form of Hamlet's father makes several appearances during the play. It first appears to the watch men, Marcellus and Bernardo along with Heratio, at the guardsmen's post. The ghost does not speak to them. It is not until the appearance of hamlet that the ghost does speak.    The conversation between the ghost and hamlet serves as a catalyst for Hamlet's last actions and provides us with insights into Hamlet's character. The information the ghost reveals insights Hamlet into action against a situation he is already uncomfortable with. It must be noted, that hamlet is not quick to believe the ghost. He states that maybe he saw a devil that abuses him due to his meloncaully. We are thus subjected to an aspect of Hamlet's character. Hamlet next encounters the ghost in his mother's room. The ghost wets hamlets appetite. Hamlet is now convinced of the ghost and listens to it. The question many ask is did the ghost mislead hamlet?    The ghost is the guiding force behind hamlet. It asks hamlet to seek revenge for king Hamlet's death. This propels him into a series of events that end in his death.    The appearance of the ghost to Hamlet caused him much confusion. He, at first, regards the ghost as questionable. Hamlet doesn't know if he should listen to the ghost. If this is the ghost of king Hamlet, then hamlet is obligated to listen to the ghost. This is the beginning of Hamlet's problems.    Hamlet's next problem is that of morality. He needs to morally justify the murder of Claudius because Hamlet is restrained by his conscience. He could not satisfy himself that avenging his father's death was the right thing to do. Although Hamlet does not act on instinct, he does understand what the ghost is telling him to do. He expresses no doubt if the ghost is an honest one, but his morality clearly stands in the way of action.

Thursday, October 24, 2019

Analyzing the Storm. Essay -- essays research papers

The setting in this story creates the perfect environment for an adulterous affair. In Kate Chopin's "The Storm", Chopin not only creates the perfect setting but also uses the setting as a symbol of the affair. Most likely occurring in the late 1800's and taking place in the deep South, the story gives an account of an adulterous affair between Calixta, wife to Bobinot and mother to four year old Bibi, and Alcee, husband to Clarisse, during a terrible rain storm. The presence of the storm is not merely coincidental. It is the driving force behind the story and the affair. As the storm begins, climaxes and ends so does the affair and the story. From the opening we see that Chopin intends to use the storm to move the story forward. The story begins with Bobinot and Bibi inside the local store. As they attempt to leave they notice storm clouds approaching the town. Deciding to wait out the storm, they remain inside. Meanwhile, Calixta is at home sewing and unaware of the storm. Soon realizing the storm is approaching, she begins frantically running about the house closing windows and doors and retrieving clothes left on the porch. Seeking shelter from the rain, Alcee approaches as Calixta steps on to her front porch. Chopin writes, "As she stepped outside, Alcee Laballiere rode in at the gate" (96). By providing a terrible storm Chopin creates an ingenious setting for this chance meeting. Chopin's intentions become even more apparent im...

Wednesday, October 23, 2019

Mutations

Cancer is a disease of genes that gone out of control. Certain genes that direct the orderly replication of cells have malfunctioned and cause the cell to divide unabated. Eventually, these damaged cells spread into neighboring cells of other tissues and multiply all over the body. All cancer is genetic in origin, that is, it is initially set off by altered genes. However, just a tiny portion of cancer is inherited: a mutation carried in reproductive cells, passed on from one generation to the next, and present in cells throughout the body. Most cancers come from random mutations that develop in body cells during one's lifetime – either as a mistake when cells are going through cell division or in response to injuries from environmental agents such as radiation or chemicals. Cancer usually arises in a single cell. The cell's progress from normal to malignant to metastatic appears to follow a series of distinct steps, each one controlled by a different gene or set of genes. Several types of genes have been implicated. Oncogenes normally encourage cell growth; when mutated or overexpressed, they can flood cells with signals to keep on dividing. Tumor-suppressor genes normally restrain cell growth; when missing or inactivated by a mutation, they allow cells to grow and divide uncontrollably. (The inherited genes that predispose for breast and ovarian cancer, Li-Fraumeni syndrome, retinoblastoma, Wilms' tumor, and familial adenomatous polyposis are malfunctioning tumor-suppressor genes.) DNA repair genes appear to trigger cancer – and perhaps other inherited disorders – not by spurring cell growth but by failing to correct mistakes that occur as DNA copies itself, letting mutations accumulate at thousands of sites. (Genes that have been linked to hereditary colon cancer are such â€Å"proofreader† genes.)   

Tuesday, October 22, 2019

Lab report toothpickase Essays

Lab report toothpickase Essays Lab report toothpickase Paper Lab report toothpickase Paper As time went on and towards the end of the two minutes the rate started to stay the same. The trend between the Control and the Trail 2- Enzyme Mutation (Tied Fingers) graph is that Trail 2 produced fewer reactions, averaging at 1 toothpick per 10 second, in the same amount of time. This is because the enzymes index and middle finger were taped together, preventing it to conduct efficient work. The trend between the Control and the Trail 3- Enzyme Mutation (Breaking two at a time) graph is that the line displayed an initial increase, then a gradual decline. Finally, the rate increased once again and hen started to stabilize. This applies to the graph of Trail 3 where the enzyme broke two toothpicks at a time to increase the substrate. SOURCES OF ERROR Possible Errors The toothpicks used were not all the same. The toothpicks that were broken may not all of been completely broken in half. The enzyme may have looked during the breaking of the toothpicks. The recorder or counter may have made a mistake while counting the toothpicks. Influence of Error A particular brand of toothpicks may have been stronger than others, which would slow the reaction rate because more force would have to be exerted urine the reaction. The toothpicks that arent broken completely in half do not count as a reaction therefore they could not influence the reaction rate. If the enzyme looks while conducting the reaction then it doesnt count towards the reaction rate and then decreasing it. If a reaction was accidentally over looked that couldve increased or decreased the reaction rate, then the data is inaccurate Control of Error The brand could have been controlled by keeping all of the same toothpicks together and only using those. The clean break of toothpicks could have been enthroned by the enzyme making sure that the break was complete by feeling the substrate. The error of looking could have been prevented by blind folding the enzyme. The error of inaccurate counting could have been prevented by doing more trails. This wouldnt prevent the mistake since it is human error but, it could validate accuracy. CONCLUSION The hypothesis for Trial 2 was if the enzyme has a weakening mutation then the reaction rate will be slower compared to the Control Trials. The hypothesis was supported because based off of the data and trends of the graph the reaction ate averaged at 1 toothpick per 10 seconds while the Control Trials reaction rate averaged at 2. 5 toothpicks every 10 seconds. This decrease in reaction rate is due to the mutation of taping the enzymes index finger and thumb together. As shown in the Reaction Rate vs Time graph, you may notice a decrease in the reaction rate over 120 seconds by the green line. The decrease in reaction rate between the control and this case of a mutated enzyme that is shown can be attributed to the hindering mutati on of the dominant hand. Since taping the index finger and thumb together was the only thing changed this mutation was expansible for the decrease in reaction rate. This can relate to the present world because scientific studies have shown that some mutated enzymes will have fewer reactions with the substrates therefore they decrease the reaction rate. The hypothesis for Trial 3 is if the enzyme has a strengthening mutation then the reaction rate will be quicker compared to the Control Trial. This hypothesis was refuted because due to the evidence presented in the data graphs and tables, the reaction rate averages at about one broken toothpick every 10 seconds while the Control averaged at about 2. Toothpicks every 10 seconds. The initial increase and the gradual decline of the reaction rate can be attributed to the mutation of the enzyme breaking two toothpicks at a time. Referencing the orange line on the Reaction Rate vs Time graph there was an overall decrease in the reaction rate compared to the Control Trials, the purple line. This decrease in reaction rate between the mutated abilities of the enzyme and the control indicates that by incre asing the amount of toothpicks the enzyme could break even caused a decrease in the reaction rate. Since breaking two toothpicks at a mime was the only thing changed this mutation was responsible for the decrease in reaction rate. I can relate this to real life situations because if more used products are in the way of the new substrates then it will be hard to identify which one can be used. After completing this experiment I am led to conclude that the reaction rate of an enzyme will fluctuate between high and low amounts of reactions but it will ultimately decrease as the substrates become harder to find. INTRODUCTION The problem during this experiment was needing a physical representation of enzyme action. In order to do this we simulated enzyme reactions through breaking toothpicks. In the experiment one person is the enzyme and will be breaking the toothpicks. The other members of the group will be writing down the quantitative results, timing the reactions, or counting the reactions. After that you will find the reaction rate of each trial. At least two trials need to have been changed in a way that would alter your results. You can compare your results using a line graph. There you will be able to see how each reaction rate is different. Finally you can conclude why. An enzyme is a catalyst therefore it can decrease the activation energy that is needed to start a chemical reaction but still increase the rate of the chemical reaction. Enzymes exist in living things and are found as proteins in cells. A substrate is a specific reactant that an enzyme acts on. Each enzyme has a specific substrate that it will only act on. The different conditions that an enzyme is exposed to, whether it be temperature, mutation, or increased substrates, will affect the reaction that an enzyme has. Catalysts are needed to speed up the process of essential chemical reactions that occur at an organisms body temperature. When substrates bind to an enzyme the chemical bonds start to grow weaker resulting in the need for less activation energy in order to break the bonds. In this experiment there were many roles. One person of a group acts as an enzyme for the whole experiment. Specifically, their index finger and thumb on their dominant hand is the enzyme. The toothpicks are the substrate. The active site, where the substrate and enzyme fit together, is in between your finger and thumb.

Monday, October 21, 2019

Cloud Computing Industry Analysis Essays

Cloud Computing Industry Analysis Essays Cloud Computing Industry Analysis Essay Cloud Computing Industry Analysis Essay Report 2012 Cloud Computing Industry Analysis Submitted ByRomi Narang (197) Suryadeep Gumber(212) Rajesh Anuragi (196) Smith Rakesh (194) Neha Chavan(221) Neha Agrawal (224) Chandrika Gailot(229) 1/10/2012 Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. Cloud Computing . 3 WHAT ARE THE NECESSITIES OF CLOUD COMPUTING? . 5 What are the needs of PaaS, IaaS, SaaS (Cloud Families)? . 6 Pricing Models .. 9 PESTLE Analysis . 11 Technological Infrastructure required for Cloud Computing 17 Cloud Computing Drivers Vs Inhibitors . 8 Global cloud computing market size Future growth . 22 CLOUD COMPUTING AFFECTING FIRM BOUNDARY .. 25 Web 2. 0 and Cloud Computing 31 Porter’s 5 Forces Analysis .. 35 1. Cloud Computing Cloud computing refers to the provision of computing resources like computing power, applications, computing infrastructure and business processes in manner that is scalable as per requirement and can be shared in order to gain economies of scale. These provisions are delivered as a service over the internet (or any other electronic network) and the service can be accessed by the end users via a computing device. The data and application related information relevant to the end users business/personal needs is stored on remote servers. The term ‘cloud’ is used for the abstraction of the complex network infrastructure that is used for providing the service. [1] Figure 1. Logical Diagram for Cloud Computing: [2] Office building analogy for cloud[4] A more effective way to explain the concept of cloud computing is to compare it with an office building. An office building can accommodate multiple companies belonging to different types of industries. Although some companies can go for privately managed maintenance/servicing of their own office, it will be extremely economical and cost effective for all companies to go for shared services that are used by all. These will mostly comprise of some essential and fundamental utility services. Likewise, Cloud computing enables sharing of the computing resources, management of which by a single company could be taxing and uneconomical. The flexibility, immediate availability and cost effectiveness of the maintenance, hardware and platform development offered by cloud computing can be compared with the electricity coming out of every wall of an office building, the underlying technical aspects being abstracted from the user. Figure 2: Cloud computing compared to shared office space[4] Players in the Cloud computing world: [1] Vendors: Provide applications and enabling technology, infrastructure, hardware, and integration. Partners: Collaborate with the vendors and provide support services to customers. Business Leaders: Either use or evaluate various types of cloud computing offerings. Types of Cloud computing services:[3] Private Cloud: The cloud is owned by a particular customer with the required infrastructure and technology residing either on-site or off-site. This type of service is costly but provides better security. Public Cloud: The cloud is owned by a large organization or company specializing in cloud computing services. The cloud can be rented for use to anyone willing to pay for it. It is the cheapest type of cloud computing service but because of its public nature it is deemed to be less secure. Hybrid Cloud: It consists of multiple private and public clouds. 2. WHAT ARE THE NECESSITIES OF CLOUD COMPUTING? 1. Information Technology penetrated in day to day life very fast With the starting of Internet era, most of the people and majority companies in the world became dependent on the services you could get to with a click of the mouse. The best example may be the free email (Gmail/Yahoo mail), the chat technology (Yahoo Messenger), Social Networking websites (YouTube, Facebook, Twitter). One can’t imagine life without them. That’s where the cloud was born. You need cloud data centers to run that stuff. 2. Cheaper source of Technology One may look for quality or ease of access but in the end the main thing that’s at the top of everybody’s mind is the economy. Cloud data centers are fundamentally different because they are built for very large user numbers and for a particular focus. Traditional data centers cannot compete on cost. In fact it’s no competition on the cost front. 3. Go Green In the scenario where environment is one of the biggest concerns, cloud computing seems as a perfect option as there is no paper etc required. The data is saved over internet as digital signals. Nowadays digitization of everything is becoming a trend among all top multinational companies. 4. The never ending and always expanding data The data is ever increasing and it probably always will. It seems to grow at about 60% a year and it doesn’t pause for breath. It won’t stop, even if you cry at it. But like old email, you never access most of the data and at the same time you also don’t want to delete it. So saving it all in the cloud makes sense clearly. 5. Unlimited Access This is almost impossible to stop users accessing anything they want on the Internet. One may be able to blacklist some web sites (adult sites etc) but one can’t want to prevent users from finding useful capabilities on the Internet. And those are cloud apps by any definition. There’s a wealth of it and it’s a boon to us. 6. No need for continuous software development Cloud computing is the best way of software development. There was always two types of software development; the mission critical stuff that gives us business traction, and the rest. We need not to worry for it. It’s the competition that drives the software development and thus making it cost effective. 7. Emergence of cloud computing as an ecosystem The cloud computing has created an environment and hence various companies and developers create applications that support this environment, just like Google which is no more a website but an ecosystem. [4] 3. What are the needs of PaaS, IaaS, SaaS (Cloud Families)? PaaS: What is it? [5] The way of renting hardware, operating systems, storage and network capacity over the Internet is called PaaS(Platform as a Service). It allows the customer to rent virtualized servers and associated services for running existing applications or developing and testing new ones. Features:[8] 1. All the services needed in the process of making an application like developing, testing, deploying, hosting and maintaining applications is integrated into the same platform. 2. It is very user friendly as different user interfaces can be easily created using various web tools available in PaaS. . Various users can simultaneously use the same application process because of it’s â€Å"tenant architecture† feature. 4. It is used for billing and subscription management. 5. Integration can be done via common standards with web services and databases. 6. It has built in feature to handle load balancing and failover. Revenue: Figure 3[9] Players: Amazon, IBM, Microsoft, Rightscale, Wip ro, Adobe, Oracle, Vmware, TCS, Sales Force, Google, VirtuStream, NetMagic. Which industry can use it and why? [11] Telecommunications industry can use PaaS. With the advent of 3G and popularity of Mobile VAS, PaaS products like Flypp that enable telcos with faster go-to market applications and reduce risk and operational overheads are predicted to see increased adoption. SaaS: What it is? [5] The model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet is known as SaaS (Software as a Service) Features[8] 1. 2. 3. 4. It is used in commercial applications for accessing web It has a central hub for software management It uses the star network model for oftware delivery It has a feature called â€Å"application programming interface† which is used to link different softwares 5. Time to time upgradation of software and recovery of system patches is not required to be monitored by the SaaS users. Revenue Figure 4[9] Players: IBM, Microsoft, Synage, Wipro, Oracle, Vmware, TCS, Salesforce, Google, VirtuStream, NetMagic. Which industry can use it and why? [11] Healthcare industry can use SaaS. With medical tourism flourishing, India is slowly becoming a haven for healthcare services. Healthcare industry is also advancing its IT platforms to touch the global standards. This industry’s key worry of system consolidation can be addressed by SaaS solutions. Iaas: What it is? [7] A model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components is called IaaS (Infrastructure as a Service). The service provider owns the equipment and is responsible for housing, running and maintaining it. The client has no obligations and he only pays on a per-use basis. Features:[8] 1. Dynamic scaling can be done 2. It allows access to multiple users on single hardware 3. It is based on the model of utility pricing and hence has a variable cost 4. Resources are distributed as a service. Revenue Figure 5[10] Players: Amazon, Go Grid, Wolf Frameowrks, Microsoft, Rightscale, Wipro, Oracle, Vmware, TCS, Google, IBM, Net Magic, Reliance Data Centre. Which industry can use it and why? [11] Government and public sector can use IaaS. With current e-governance initiatives driving on a PPP model, immense investments are being made on the IT infrastructure front. For projects like Aadhaar, the UIDAI is contemplating on the adoption of a cost-effective cloud based model that can provide effective and scalable processing of large databases. 4. Pricing Models Elastic pricing or Pay-as-you-Use model Elastic pricing model is a model that incurs less wastage and lower costs as under this system customers are charged based as per their usage and consumption of a service. As the users are keenly aware of the cost of doing business and consuming a resource (since it’s coming from their pockets) therefore the awareness of cost and selective usage is quite prominent. When to use it? 1. When there is Unpredictability of resources . 2. When there is limitation of budget. Fixed or Subscription based pricing The simplest pricing option where the customer organization is billed on a fixed monthly basis is known as fixed pricing. The consumer is billed the same amount every month without consideration for actual usage. When to use it? 1. When requirements are well defined. 2. When more control over the budget is required. 3. When it is required to use the cloud for a longer periods. Spot pricing for cloud It is a new concept in cloud computing, where market forces will decide the pot pricing model i. e. , when the demand of computing and storage resources is higher than the price of services will be higher and vice-versa. Cloud chargeback Customers are charged on the basis of usage. Benefits of this model are: 1. 2. 3. 4. Resource utilization can become more visible. Forecasting, budgeting and capacity planning can be facilitated. It encourages the use of new emerging technologies. It facilitates justification and allocation of cost to their stakeholders and business units. Adoption of cloud computing models in India Findings on the basis of survey done by EY recently: 1. 2. 3. 4. Annual contract based modelling is mostly opted by large enterprises. Resource based usage model is adopted by SMB segment in majority. Potential customers are not satisfied with single pricing model. Pricing structures offered by vendors should be easy to understand, transparent and cost efficient. Figure 6 [61] 5. PESTLE Analysis Figure 7 Political Regulations Even with Internet’s rise to the Horizon, it took many years for policy makers to set up common norms and procedures regarding the internet’s usage. With the current popularity of cloud computing policy makers are more proactive in addressing technological changes. Regulations are still at a very nascent stage for Cloud computing: There are various government policies involved in that need to be incorporated by vendors to successfully implement cloud. There are various issues like security, privacy, location and ownership of data, that hinder the growth of cloud computing. Some vendors like Amazon Web Services have addressed certain issues by deploying local infrastructure in main markets (US and EU). [12] Government projects Cloud computing has the potential to provide good level government service deliveries to the people despite the government agencies suffering from resource constraints. US government has an estimate to spend almost USD 20 billion on cloud computing related products. Figure 8[13] The federal government has a complete cloud related strategy that can be described below. ? Develop a decision framework that can be used to migrate services to cloud ? Find the services that can be migrated to Cloud and their time frames ? Calculate the resources required to move the services to cloud. Figure 9[13] Economic Various multinational companies have reduced their IT spending in lieu of the economic slowdown that has hit the economy hard. JP Morgan recently cut their IT spending. 14] Cloud computing helps cut costs in following ways ? By lowering opportunity cost of running technology. When it comes to technology only 20% of the time and effort goes into running technology which is where all the value lies. By using Cloud computing the 80-20 can be reversed as time required to manage the OS and hardware gets considerably reduced. ? Capital expenditure shifts to op erating expenditure. Figure 10[15] ? Renewed focus on core activities With the movement from traditional operation to cloud, A company gets a lot of time focus on its core activities. Recently, Netflix moved on to the Amazon Cloud service (AWS EC2). Social Figure 11[18] Internet has been the most disruptive social phenomenon of the past couple of decades and has found its use in both professional and personal activities. The number of internet users is close to 2. 23 billion[18] and growing. Figure 12[12] Internet users Since cloud being an internet based technology its adoption has a greater probability. The future generation will no doubt be connected through the internet for both personal and professional lives. Social media has grown from strength to strength and now even companies are focused towards the use of social networking to find opportunities for their growth. Technical Technology has taken great strides over the last 2 decades and IT infrastructure and service sharing has become a great source of growth for some companies. With high speed of internet, low connectivity issues, higher security standards and modularization of environments, it has become easier to implement cloud. Figure 13[12] IBM IT Transformation Roadmap The IBM IT transformation road map suggests how the IT has transformed over the years and it is headed straight towards the adoption of cloud computing on a major level. LEGAL There is currently no legal framework designed for the adoption on cloud computing. There are local regulations on free flow of information between countries. Figure 14[16] There are a few questions that are raised by the law structure when cloud is being implemented. 1. Who is the controller? 2. Which law is applicable 3. Transfer outside the country? The future of legal policies appear uncertain and they can easily keep a lid on growth of cloud computing Environmental IT contributes 2% of the world’s CO2 emissions in the world which is the same as the Airline industry[12]. Other than CO2 emission IT produces 2 million tones of electric waste as well. Cloud Computing is one of the ways to reduce the environmental impact of IT industry. Most of the electric waste would become obsolete with the evolution of cloud computing. Figure 15[17] Total PESTLE Impact Diagram Figure 16[12] 6. Technological Infrastructure required for Cloud Computing Following Infrastructure is needed for Cloud computing: 1) 2) 3) 4) Computing Infrastructure Network Infrastructure Storage Infrastructure Linking Infrastructure a. Linking to Network b. Linking to Storage Depending upon the service required (IaaS or PaaS or SaaS), these infrastructure elements can be owned by the client or the Cloud service provider. As per the CIO. com article are as follows: [1] , there are seven important aspects of any cloud infrastructure, these 1) Heterogeneous System Support Other than leveraging the latest software and hardware systems, the cloud infrastructure should also be compatible with the legacy and traditional systems of the organization and should also support the existing infrastructure. 2) Service Management In order to make the cloud offering successful, the cloud service should be able to provide proper resource (e. g. CPU cycle or storage etc) guarantees, transparent metering rules of the service and proper billing cycles. Also, the service should be able to be managed and deployed easily and quickly. 3) Dynamic Workload and Resource Management For providing truly on demand and virtualized services, it is important for any cloud infrastructure to manage the resources and workload as per the required service level agreement to the consumer. And hence in case of peak load, prioritize resources in order to be highly efficient and performance driven. 4) Reliability, Availability and Security Reliability, Availability and Security are important aspects of any service, whether it is provided through cloud or through the traditional model. Hence any cloud infrastructure should provide a smooth transition to the cloud service without compromising on any of these aspects of the system. 5) Integration with Data Management tools It is possible that cloud computing management solutions do not fully take the place of the traditional systems and data centers. Hence the cloud infrastructure should be able to integrate with these out of the box systems and data centers to provide a hassle free service to the clients. 6) Visibility and Reporting An important feature of the cloud service is the ‘pay as per-use’ facility. Hence to fully achieve this objective, the cloud infrastructure should support detailed levels of visibility and reporting regarding the usage, service level agreements, compliances, system and network performances, billing schedules etc. 7) Administrator, Developer and End User Interface Most Cloud infrastructures provide user interfaces and portals to hide the cloud service complexities from the end user and in a way also provide the ability to manage these cloud services in a simple yet comprehensive way. [19] 7. Cloud Computing Drivers Vs Inhibitors Inhibitors for Cloud Computing A report published by IBM [20] (IBM Academy of Technology, Thought Leadership White Paper, October 2010) based on the survey conducted on 110 Cloud implementation Projects, revealed that the major concerns for implementing Cloud were issues involving security, lack of perceived value proposition by the customers, lack of standardization and lack of funding for implementation. Some of the other factors include- complexity concerns, lack of skills, concerns about reliability and availability of cloud, technical immaturity etc. Figure 17 Source: IBM Academy of Technology, Thought Leadership White Paper, October 2010 [20] Security [20] Security is one of the major concerns specially in public cloud implementations. Most customers are worried about the privacy and integrity of their data. The concerns may increase even more if the cloud is shared among other customers, who may be your competitors. Hence according to the IBM survey most companies are interested in implementing the private cloud (instead of going for the public Cloud). Standardization [20] As Cloud Computing is an emerging technology, the processes and implementations are not yet standardized. Each of the Cloud implementers provides their own solutions. There are no industry wide standards yet developed for Cloud computing. Hence this lack of hardware requirements, software, operating system and processes act as an inhibitor for implementing cloud. Value Proposition [20] Implementation of Cloud is much easier if value which it provides in terms of meeting the business requirements and cost benefits can be explained to the customer. Hence lack of tools and models that assist the customers to calculate the return on investment and value proposition pose a deterrent in cloud implementation. Complexity and Integration [20] Most customers today run a host of applications including numerous legacy tools. Customers are looking integrated solution for all their applications from the cloud providers. Hence the doubts over integrating all solutions and also reducing complexity are one of the concerns of the customers in implementing cloud. According to Keane White paper [21] on â€Å"Cloud Computing – Clear thinking about its risks, benefits and success factors† impediments to cloud Adoption are as follows: 1) 2) 3) 4) 5) Security Privacy / Compliance Immaturity of vendors / Offerings Risk Mitigation Legacy Applications Drivers for Cloud Computing BENEFITS [20] The study conducted by IBM based on 110 Cloud implementations revealed following results: ? ? ? Around 80% of clients acknowledge benefits in sharing of IT resources through highly virtualized infrastructure by implementing cloud. Around 60% achieved ease-of-use through self service with rapid delivery. Taking about public clouds specifically ? ? ? Ease-of-use is 85% (as compared to 60% overall by both public and private cloud users) 68% benefit from pay-as-you-go Charging model 63% benefit from Internet / Web based Cloud Figure 18 Source: IBM Academy of Technology, Thought Leadership White Paper, October 2010 [20] According to Keane White paper [21] on â€Å"Cloud Computing – Clear thinking about its risks, benefits and success factors† benefits of Cloud solution are as follows: 1) 2) 3) 4) 5) 6) Cost Capability / Scalability More Green Organization Agility Collaboration Focus According Deloitte report on â€Å"Cloud Computing – Forecasting Change – Market overview and Perspective† [22] Figure 19 Source: Deloitte Report on Cloud Computing – Forecasting Change – Market overview and Perspective [22] Deloitte’s perspective on perceived and real impact of cloud Inhibitors [22] Figure 20 Source: Deloitte Report on Cloud Computing – Forecasting Change – Market overview and Perspective [22] 8. Global cloud computing market size Future growth According to the report called â€Å"Sizing the Cloud† of independent research firm Forrester Research the global cloud computing market would fetch the $241 billion by 2020[1] as compared to $40. 7 billion in 2010. It could be possible cause of rapidly growing of cloud computing services. Figure 21 According to this report, Software-as-a-service(SaaS) would have a significant share in the total revenue. This segment would offer more opportunity growth than any other segments. The SaaS would have the leading position in the Cloud Computing market by holding the $92. 8 billion by 2016[23]. According to IDC by 2015[24] nearly 24% of the software purchaseswould be service enabled software. SaaS delivery will have the share of around 13. 1% of worldwide software revenue and 14. 4% for applications. Global Corporate Mobile SaaS Market will be at $1. billion in 2011 and will grow to $3. 7 billion by 2016 with Compound annual growth rate of 25. 8% according to latest Strategy Analytics Wireless Enterprise Strategies. It will be possible by integration of business application on smartphones, tablets and other wireless devices[25]. Deloitte has estimated that cloud based usage will replace 2. 34% of IT spending in 2014 and further it will rise to 14. 49% in 2020[26]. Figure 22[ 26] Cisco’s Global Cloud Index forecasted that the transition of workloads from traditional data centres to cloud data centres will exceed in 2014. This year would be the crucial year when workloads through cloud data centres (51%) would be higher than the traditional data centres (49%) for the first time. If this trend would be continued then cloud workloads would be dominating to the traditional work load by 2015. The Compound annual growth rate expected to be at 22% during 2010-15[27]. Fig 23[27] According to Gartner, Insurance industry would have a higher rate of cloud adoption (34%) compared to their enterprise counterparts (27%) in the Small Medium Business (SMB) category. Fig 24[28] Complete analysis of Cloud Computing in Asia [8] Fig 25[30] Indian Market In terms of market size, Indian market holds only $990 million compared to global market $ 109 billion7. It is predicted that India would be having market of $3-4 billion by 20157according to Zinnov Management Consulting. On the other hand Nasscom and Deloitte consulting estimated that Indian market would be worth of $16 billion by 20207. It is also estimated that India would have a huge potential growth in future cause of millions of Small Medium Business who are not able to afford to invest in the expensive business software solutions. Vishnu Bhatt, head of cloud services at Infosys says that, â€Å"About 60 per cent of enterprise workloads will be on the cloud in five years, from the current nonexistent levels†. Four different types of market opportunity are there in the India. Roughly 25 per cent of the Indian market is in â€Å"private cloud† business cause of security reasons. Other three opportunities lies in the â€Å"public cloud† as Saas, PaaS, in Iaas. Independent software vendors (ISVs) like†Infosys, Wipro etc. † are the middle players who serve to small clients from the big players like Microsoft and Salesforce. The entire cost is borne by the end users, on an average the ISVs make around 20-30 per cent of the total revenue. Around 3000 ISVs are there in India and nearly 1000 of them have tied up with the Microsoft and Salesforce. So we can say Indian cloud market mostly depend on the ISVs[29]. 9. CLOUD COMPUTING AFFECTING FIRM BOUNDARY Start-ups Cloud computing reduces initial investments of the start-ups by reducing capital investment in a data center. In cloud computing the infrastructure for data storage is provided by the cloud providers which help start-ups in reducing their investment. Cloud computing does not eliminate the development cost but helps start-up companies to focus on their core competency without hiring people with expertise. Cloud computing also helps different software companies (start-ups) to expand their offering by partnerships with big firms (exa-IBM). [32, 33] Due to this lowered capital cost the companies were able to prove their products on less initial capital. . In 2011, 1339 companies received a total of US $5. 8bn in first-time financing (an increase of 7% in capital raised and an inc of 19. % in deal numbers, compared with the same period in 2010). The data shows that Venture capitals are taking interest in investing on these small amounts since the risk is low. This helps the entrepreneurs in cracking more deals as supported by data. [34] SMB’s Cloud computing will help SME’s in modeling their business. Since it is cost effective, now companies are targeting these small and medium size businesses. These firms were not able to implement ERP due to high cost and lack of IT infrastructure. Now due to cost cut of the infrastructure they can use cloud for their business. iON will enhance India’s global competitiveness by giving 35 million Indian SMBs access to world-class, simple-to-use and scalable technology tools. SMBs can use the power of iON to build their business advantage and compete on the global stage,† said N Chandrasekaran, chief executive officer and managing director, TCS, and chief architect, iON, in a statement. [35] The table below shows the share of small medium businesses in different countries. In India Tata Consultancy Service is targeting $1 billion revenue from these small and medium businesses firm [36] over five years. Figure 26[37] A survey taken from Zoomerang (in April 2011) for small and medium businesses has shown that 77% of the small and medium businesses are not using cloud computing for their businesses and 52% of them will use cost effective IT management and maintenance sources. Figure 27 [39] A report published by Microsoft has shown that there is high potential for cloud adoption in SMBs. As per the report the number of companies with between 11 and 25 employees will potentially double till next wave. In 101 – 250 employee segment 33% companies will adopt cloud in the next wave. [38] Figure 28[38] Cost effectiveness of cloud computing will help startups and SMB’s in adopting it ,which in turn will help them in making their process efficient and as the result â€Å"SMBs will be able to challenge big businesses†. [40] Venture Capital Investment The diagram below shows the growth of public cloud and its comparison with the overall IT. The public cloud services are growing strongly with a rate of 18%, which is a positive sign for the companies providing cloud services. 42] This growth is also attracting the Venture Capitalist. Currently, not much of the investment is done on this sector and there is a strong chance of investment. [43] Figure 29[42] Venture capital is also affected by government regulations. A report published by Josh Learner shows the impact of copyright policy changes on Venture capital investment in cloud computing companies. The data provided i n the table in Appendix A has shown the investment of venture [41] capital quarter wise for cloud service firms in U. S. A. Figure 30[41] The figure below shows the ratio of investment in cloud computing companies to investment in all IT companies. A drastic change can be seen in the graph after the copyright policy changes. [10] Figure 31[41] A survey taken in 2012 by Deloitte regarding global trends in venture capital shows the confidence level of investors of different countries in different industries. The first graph shows the confidence level of venture capital investment sector wise and the second graph shows the confidence level of respondent’s country in cloud computing. 44] Figure 32[44] Figure 33[44] According to the article of NASSCOM Deloitte â€Å"Deconstructing the cloud The new growth frontier for Indian IT – BPO sector† cloud computing will affect by making (below points are directly taken from the article) [40] Lines blur between consumer and enterprise IT – Initially innovation was driven by enterprises but now trends have been changed and innovations are driven by custom er segment also e. g. blogging, social networking and cloud is fast helping merge this divide between consumer and enterprise. IT drives arket-facing differentiation for businesses Cloud will be a net positive impact on existing service lines while opening up new â€Å"product† opportunities Cloud have a net positive impact on existing service line revenues, though traditional IS outsourcing and testing service providers will have to re-invent existing models Uptake will vary across industries because of different drivers and barriers Cloud will alter the industry landscape commoditization of IT through cloud computing will reduce entry barrier bringing some new breed competitors. Partnerships and alliances will be key to succeed in the Cloud ecosystem [40] 10. Web 2. 0 and Cloud Computing Web 2. 0 and Cloud computing have changed the way we develop, deploy and use computer applications. The World Wide Web had seen a transition from traditional publishing model to the new collaborative information creation model. [45] Web 2. 0 uses network as a platform for sharing information, creating content, making a virtual community, in contrast to the websites where users can simply read the text (passive viewing of content). Web 2. includes some of the most widely known and used applications blogs, social networking sites, YouTube, wikis, Twitter, web applications etc. [46] Figure 34: Web 1. 0 web 2. 0 Structure [47] Cloud computing services in nature are Web applications which deliver desirable computing services on demand. It is thus a natural technical evolution that the Cloud computing acquires the Web 2. 0 technique. [50] Cloud computing defines the way the appl ications are deployed. It offers infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). As per the requirement of resources, the processing power and memory gets allocated in an elastic manner. [45] The cloud is often misinterpreted as a combination of clusters and grids. However, in reality, clouds are next-generation data centres which are dynamically provisioned as per the user demand used for personalized resource collection for fulfilling specific user needs and accessible through â€Å"Web 2. 0† technologies. [51] Web 2. 0 and Implications on cloud computing Web 2. 0 contributes to the front end of the business, cloud computing contributes to the back end of the business. Combining both, web 2. 0 cloud computing, both front end as well as some of the back end of the business can be outsourced. The work can be performed from anywhere, teams may not be at the same location thus collaborating the information using, web 2. 0 tools, cloud, mobile technologies. This is the concept of virtualized organizations. [53] Statistical Support David Osimo shows how web 2. 0 applications have grown masively. He uses the data from Technorati, Wikipedia, Myspace, Youtube and Nielsen-Netratings for analysis. His findings can be seen in Figure 2.. [10] Figure 35: Growth of Web 2. 0 applications [54] Cloud computing is addressing two different market needs [50] 1. Large scale web applications (‘web 2. 0 markets’) – scale-out cloud E. g. Google Traditional data centre computing (‘enterprise market’) server clouds E. g. Microsoft 2. Figure 36: Evolution of World Wide Web [48] Cloud computing is integral to web 2. 0. It brings all sorts of user data along with operating system online and enables content sharing platform making the use of storage devices unnecessary. Web 2. 0 provides the collaborative functionality that helps in sharing documents and making changes on a real time basis regardless of their locations. This along with cloud computing allows for online storage of data avoiding the use of hardware, data centres as well as software replaced by online web applications like Google documents. There can be two kinds of customers for cloud [49] Those that need to scale up (achieve higher scale) at low costs 2. Those that want to eliminate data centre model and choose pay-as-you-go model 1. Many technologies like grid computing, peer to peer computing contribute directly to cloud. Thus, web 2. 0 provides users the capabilities of easy sharing and accessibility of data with anyone, from anywhere. Applications like Google doc, face book are managed by cloud storing huge amount of user data at one place and making it readily available to everyone anytime. These applications are one type of services, software as a service. Users have their own hardware at place, and use their own platform to run these cloud applications. The software resources like application servers, database servers, IDE etc. re not required. Other kind of services include application as a service where users have their own hardware at place and rent platforms from cloud to develop customized software. Finally infrastructure as a service means the complete virtualization of business with storage at cloud. Hardware and computing also need not be performed at the site but takes place in cloud. Resources li ke storage, computing power are not required. [52] With the advent of web 2. 0, cloud computing got a boost as people could create and access any amount of information without having to worry about its storage. Google is the best example. It provides many services and applications like, Google doc, spreadsheet, YouTube all of which are cloud based and help sharing information on a real time basis. The real time sharing of knowledge is what is made possible though combination of the two. Cloud is incorporated in the next version of web 2. 0 retaining the features of web 2. 0 and adding new ‘elasticity’ to the whole application or business deployment. 11. Porter’s 5 Forces Analysis Threat of new entrants ? ? ? ? Low barriers to entry Relatively lower development costs Low fixed costs Huge potential market Bargaining power of suppliers: ? ? High for few big players. Can depend on the type of service provided. Bargaining power of buyers: Existing competitive landscape ? ? Intense rivalry. Presence of big, small niche players. ? ? Dependent on the size of the buyers. SMEs’ power can increase with standardization of offerings. Threat of substitutes: ? Mild threat from open source computing Figure 38 1. Existing competitive landscape: The Cloud computing market comprises of both small and big players causing intense rivalry. But there is a large variety in the type of products and services required by customers and so there is room for big, small and niche players. There are the big players providing end-to-end services like IBM, Amazon, Microsoft etc, pure players like Salesforce and niche players like Dell-BOOMI (specializes in Cloud Integration), Rackspace (leader in managed hosting services) and small players like Zenith. [55][56] 2. Suppliers’ bargaining power: Since there is a huge potential for demand from SMEs and few big players like Google, Amazon and IBM, the bargaining power of suppliers is quite high. Bargaining power could vary according to the type of service provided. E. g. In case of an IaaS service, switching cost for customers might not be very high since the offering is largely undifferentiated, but same cannot be said for a SaaS offering. Also there are is no clear rule of law for regulation of the data stored on the cloud. Data stored on the cloud could be subject to less stringent action by the regulatory authority than that stored on a personal computer. This could make the switching costs for the customers quite high. [57][58] 3. Buyer’s bargaining power: Bargaining power of buyers can be said to be dependent on the size of the buyer’s business. In case of SMEs, the bargaining power can be said to be low since many of the suppliers in the cloud computing market are large corporations. Whereas the buyer’s bargaining power can substantially dominate the supplier if the buyer itself is a large organization. The bargaining power of SMEs can increase if with the standardization of the services which will be facilitated with establishing proper regulatory compliances. [57] 4. Threat of new entrants: With the huge potential market among the SMEs, it is expected that many new entrants from the SME segment itself will enter the Cloud computing market with low cost offerings. This expectation lies on the fact of low fixed costs, relatively lower costs of developing a product and low barriers to entry. [57][59][60] 5. Threat of substitutes: Open source computing can be considered as a substitute for Cloud computing services. But it can be expected that the SMEs will prefer Cloud computing over open source due to higher switching costs in case of open source and lower costs of cloud computing services. [57] References Online: 1. Hurwitz et al. , (2010) Cloud Computing for Dummies [online]. Wiley Publishing Inc. NJ. http://books. google. co. in/books? id=_TvnVbFSYsQClpg=PP1ots=u7GJ5I6STGdq=cloud% 20computingpg=PT10#v=onepageq=cloud%20computingf=false google. co. in/url? source=imglandingct=imgq=http://files. messe. de/007/medi a/04bilder/aufloesungsunabhaengig/2011_3/cb11bielastischrechnen. jpgsa=Xei=jqxJULO WHsHrrQeVuoDICAved=0CAkQ8wc4kgIusg=AFQjCNFaG0Yc_Ym8Uya7F3ei130cbaQbVQ 2. Jamsa, K. Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile, Security and More [online]. Jones Barlette Learning, Wall Street, Burlington. http://books. google. co. in/books? id=msFk8DPZ7noClpg=PP1ots=oW3KUl1HDmdq=clou d%20computingpg=PR2#v=onepageq=cloud%20computingf=false 4. Trends and technologies in the CRM world. [online] allthingscrm. com/cloudcomputing/the-importance-of-cloud-computing. html (Accessed 5 September 2012) 3. 5. Search Cloud Computing. [online] http://searchcloudcomputing. techtarget. com/definition/Platform-as-a-Service-PaaS (Accessed 5 September 2012) 6. Search cloud computing. [online] http://searchcloudcomputing. echtarget. com/definition/Software-as-a-Service (Accessed 5 September 2012) 7. Search cloud computing. [online] http://searchcloudcomputing. techtarget. com/definition/Infrastructure-as-a-Service-IaaS (Accessed 5 September 2012) 8. Ben, K. (2012) ‘understanding the cloud computing stack: Saas,IaaS,PaaS’ *online+ rackspace. com/knowledge_center/whitepaper/understanding-the-cloudcomputing-stack-saas-paas-iaas (Accessed 5 Sep tember 2012) 9. Deloitte,(2009) Cloud Computing – Forecasting Change – Market overview and Perspective. [online]https://www. deloitte. om/assets/DcomGlobal/Local%20Assets/Documents/ TMT/cloud_-_market_overview_and_perspective. pdf (Accessed 6 September 2012) 10. Morgan Stanley,(2011) Cloud Computing takes off. [online] morganstanley. com/views/perspectives/cloud_computing. pdf (Accessed 6 September 2012) 11. Frost Sullivan, Cloud Computing Services. [online] http://corporate. sify. com/uploads/CloudServices-F-S. pdf (Accessed 6 September 2012) 12. Callewaert, Robinson and Blatman, 2010 Market overview and Perspective: Cloud computing. Deloitte. https://www. deloitte. com/assets/DcomGlobal/Local%20Assets/Documents/TMT/cloud

Sunday, October 20, 2019

Die Lorelei by German Poet Heinrich Heine

Die Lorelei by German Poet Heinrich Heine Heinrich Heine was born in Dà ¼sseldorf, Germany. He was known as Harry  until he converted to Christianity when he was in his 20s. His father was a successful textile merchant and Heine followed in his fathers footsteps by studying business. He soon realized he did not have much aptitude for business and switched over to law. While at the university, he became known for his poetry. His first book was a collection of his travel memoirs called Reisebilder (Travel Pictures) in 1826. Heine was one of the most influential German poets in the 19th century, and German authorities tried to suppress him because of his radical political views. He was also known for his lyrical prose, which was set to music by classical greats, such as Schumann, Schubert, and Mendelssohn. The Lorelei One of Heines famous poems, Die Lorelei, is based on a German legend of an enchanting, seducing mermaid who lures seamen to their death. It has been set to music by numerous composers, such as Friedrich Silcher and Franz Liszt.   Here is Heines poem:   Ich weiss nicht, was soll es bedeuten,Dass ich so traurig bin;Ein Mrchen aus alten Zeiten,Das kommt mir nicht aus dem Sinn.Die Luft ist kà ¼hl, und es dunkelt,Und ruhig fliesst der Rhein;Der Gipfel des Berges funkeltIm Abendsonnenschein.Die schà ¶nste Jungfrau sitzetDort oben wunderbar,Ihr goldenes Geschmeide blitzet, Sie kmmt ihr goldenes Haar.Sie kmmt es mit goldenem KammeUnd singt ein Lied dabei;Das hat eine wundersame,Gewaltige Melodei.Den Schiffer im kleinen SchiffeErgreift es mit wildem Weh;Er schaut nicht die Felsenriffe,Er schat nur hinauf in die Hà ¶h.Ich glaube, die Welllen verschlingenAm Ende Schiffer und Kahn;Und das hat mit ihrem SingenDie Lorelei getan. English translation (not always translated literally): I dont know what it meansThat I am so sadA legend of  bygone daysThat I cannot keep out of my mind. The air is cool and night is coming.The calm Rhine courses its way.The peak of the mountain dazzlesWith evenings final ray.The fairest of maidens is sittingUp there, a beautiful delight,Her golden jewels are shining,Shes combing her golden hair.She holds a golden comb,Singing along, as wellAn enthrallingAnd spellbinding melody.In his little boat, the boatmanIs seized by it with a savage woe.He does not look upon the rocky ledgeBut rather high up into the heavens.I think that the waves will devourThe boatman and boat in the endAnd this by her songs sheer powerFair Loreley has done. Heines Later Writings In Heines later writings, readers will note an increased measure of irony, sarcasm, and wit. He often ridiculed sappy romanticism and over exuberant portrayals of nature. Though Heine loved his German roots, he often critiqued Germanys contrasting sense of nationalism.  Eventually, Heine left Germany, tired of its harsh censorship, and lived in France for the last 25 years of his life. A decade before he died, Heine became ill and never recovered. Though he was bedridden for the next 10 years, he still produced a fair amount of work, including work in Romanzero und Gedichte and Lutezia, a collection of political articles. Heine did not have any children. When he died in 1856, he left behind his much younger French wife. The cause of his death is believed to be from chronic lead poisoning.

Saturday, October 19, 2019

Gloak's Safe-Action Advertisement Essay Example | Topics and Well Written Essays - 500 words

Gloak's Safe-Action Advertisement - Essay Example The guy in the add looks like has military. Hes ex Drill Instructor at Marine Corp. He has military clothing on that civilian wear He narrates how a thug tried to kick upon the front door of house; while he was successful in opening the front door, what lied ahead of him became one of his worst night mares ever. The customer expresses his amazement at the tenacity with which a loaded Gloak protected him and his family. This is one of the many amazing stories that Gloak intends to collect through this promotional campaign. At the bottom center of the page, the Gloak spokes person asserts how she hears these remarkable stories every other day. The on-lookers are prompted to send in their stories of Gloak on Facebook page of Gloak and get a chance to appear in a Gloak ad. The paper will elaborate on the advertisement, its appearance, the target market that it is intended for, it’s branding through the advertisement, the ethos pathos and logos. It will critique the advertisement i n greater depth over its strengths and weaknesses. The Gloak ad speaks to consumers in various ways –both direct and in-direct. Through the given story, the ad speaks to the customer by telling him the gun will protect him no matter what the circumstances are. No matter how drastic the situation or how tough the encounter, Gloak will protect them.

Friday, October 18, 2019

Interventions Heart Disease- Malaysia Essay Example | Topics and Well Written Essays - 500 words

Interventions Heart Disease- Malaysia - Essay Example According to the Malaysian National Census data, the demographic pattern of Malaysia was found to be rapidly changing, with the rural population speedily decreasing. Thus, the data indicated that the distribution of the Malaysian population by the year 2000 was 40.4 % as rural population and 59.6% comprising of the urban population (Department of Statistics Malaysia, 2009). In this respect, there has been a drastic change in the health state of Malaysia, where the non-communicable diseases have rapidly increased as the major causes of death compared to the communicable diseases (Anand, et al. 2008). Thus, the rapid change in the social geographical setting from the rural-based population to a more urban-based population serves as one of the major factors influencing the rate and geographical distribution of heart disease in Malaysia (Chia & Srinivas, 2009). The social demographic patterns have indicated that there has been a rapid change of lifestyle in this country courtesy of urbanization, resulting to the increase of the heart disease risk factors, such as obesity. Statistics have indicated that the rate of obesity in Malaysia has tripled within the decade closing the 20th century, with the obesity rate registered in the country increasing from 4.4% in 1996 to 14% in 206 (Department of Statistics Malaysia 2009). Further, the health data statistics have also indicated that the rate of hypertension has increased from 33% to 43% in the same period, while the rate of diabetes mellitus has been found to have doubled for the same period. Another aspect of the lifestyle change is the rise in the rate of tobacco use in the urban areas of Malaysia, where hypertension has also been observed to have the highest rate of prevalence (Chia & Srinivas, 2009). Thus, following this geographical and social lifestyle transformation, the ischaemic heart disease and cerebrovascular

Data Model for Fitness Centre Case Study Example | Topics and Well Written Essays - 750 words

Data Model for Fitness Centre - Case Study Example It is only for the targeted people. This means that to attract new customer, one need to do target marketing. The basic requirement of target marketing is the identification of the prospect clients. This database keeps a track of the visitors and the activities performed by them. So when the centre wants to target new clients, it can not only get the address of the prospective clients to send brochures and other promotional stuff, but also the activities performed by them. This information tells the centre that what activities they prefer. So these pamphlets will be highlighting the attributes of those activities. The centre can periodically generate a report to find out the level of usage of the equipments. If the centre knows that which equipment is being used heavily, it can add quantity of those equipments. If the centre finds that some equipment is not used adequately, it can research for the reason of its less usage. The reason can either be its improper placement, lack of awareness about how to use it and so on. Thus, the centre can take appropriate decisions. The entities mentioned in the beginning are particularly chosen because these entities provide the basic ground for the database. Any business activity can not be done without including these entities. The attributes in each entity were chosen keeping in view their significance to the core business activity. For example, in the 'material_resource' table, we have not included depreciation method since it is not so useful for the core business activity. But the age of the member is essential to determine the fitness activity interests in various age

Thursday, October 17, 2019

Do Student-Athletes in College Look At Their Coaches As Parent Figure Research Proposal

Do Student-Athletes in College Look At Their Coaches As Parent Figure - Research Proposal Example As the paper discusses with many of research studies in the theme of relationship between a coach and the athletic students in schools focusing on the leadership attributes and the moral and ethical relations, few studies have focused on the acceptable mode of handling the athletes by the coaches. With such perceptions as have been shown to hold in people’s views concerning the way that coach-student relationship should be, there lacks a standard tool on which the interactions and attitudes towards each other should be understood. There exists a gap in literature on whether students perceive their coaches as parent figures or not and what would be the factors that influence such perceptions. The lack of such literature from past studies and related academic materials shows the necessity to have a structured study into the theme in order to shape future studies and understanding of the theme. This study is aimed at establishing a qualitative justification through research study on whether the athletic students in colleges perceive their coaches as parents or not. This study is aimed at establishing whether student-athletes perceive their coaches as parents or otherwise through a qualitative analysis of the opinions by the athletes. The study is also focused on bridging the gap that currently exists between the literatures on student coach perceptions especially in the athletics and contribute towards shaping future research studies in the theme.

The Impacts Employee Motivation has on Organisationalperformance Dissertation

The Impacts Employee Motivation has on Organisationalperformance - Dissertation Example A highly motivated employee is hugely productive in the context of the company. However on the other hand employees who are less motivated works less effectively (Management help, n.d.). The purpose of the study is to underpin the fact that how employee motivation helps an organization to get success in the market place. In other words the primary intention behind the study is to uncover the impacts employee motivation has on organizational performance. The topic was chosen on assessing the factors that are significant for an organization. Nevertheless the study revealed motivation as one of the crucial factor for an organization. ... A primary research will be also carried out to get better insights of the topic. The report will be divided into five sections. The first section will be about the introduction to the vital concepts of the study, in the second section a literature review of the topic will be carried out. Once the literature review ends, the report will clearly depict the methodology to be followed for doing the research. The next section will be about data collection and analysis. In this section mainly primary data will be collected, analyzed and meaningful information will be portrayed. Finally the report will conclude, by answering the research questions and addressing the research objectives. 1.1 Defining Motivation Motivation is imperative for an organization as it offers large number of benefits. Some of the evident benefits of having a motivated workforce within the organization are increased productivity and improved efficiency, helps in achieving the organizational goals, creates a friendly relationship within the organization, makes the workforce stable, and it also assists in utilizing the resources properly. Furthermore it also offers other benefits in the context of an organization. It leads to high performance, reduces the employee turnover rate, decreases the rate of absenteeism, portrays a better organizational image, industrial relations become superior and it also helps the organization to get adapted with the changing business environment (Singla, 2011, p.389). Different employees join an organization with diversified needs and demands. The background of the employees such as education, culture, attitude, perception, values, beliefs and location and the way of their upbringing are different. The objective of every

Wednesday, October 16, 2019

Do Student-Athletes in College Look At Their Coaches As Parent Figure Research Proposal

Do Student-Athletes in College Look At Their Coaches As Parent Figure - Research Proposal Example As the paper discusses with many of research studies in the theme of relationship between a coach and the athletic students in schools focusing on the leadership attributes and the moral and ethical relations, few studies have focused on the acceptable mode of handling the athletes by the coaches. With such perceptions as have been shown to hold in people’s views concerning the way that coach-student relationship should be, there lacks a standard tool on which the interactions and attitudes towards each other should be understood. There exists a gap in literature on whether students perceive their coaches as parent figures or not and what would be the factors that influence such perceptions. The lack of such literature from past studies and related academic materials shows the necessity to have a structured study into the theme in order to shape future studies and understanding of the theme. This study is aimed at establishing a qualitative justification through research study on whether the athletic students in colleges perceive their coaches as parents or not. This study is aimed at establishing whether student-athletes perceive their coaches as parents or otherwise through a qualitative analysis of the opinions by the athletes. The study is also focused on bridging the gap that currently exists between the literatures on student coach perceptions especially in the athletics and contribute towards shaping future research studies in the theme.

Tuesday, October 15, 2019

LL Bean Inc Case Study Example | Topics and Well Written Essays - 500 words

LL Bean Inc - Case Study Example However, by the time of his death, the company had grown immensely with annual sales averaging about $4.75 million and the number of employees standing at 200 (Schleifer, 1993, p. 2). The grandson expanded and modernized the business while sticking to his grandfather’s rule, â€Å"Sell good merchandise at a reasonable profit, treat your customers like humans beings, and they’ll always come back for more† and by 1991, the company was a leading catalogue manufacturer and retailer in outdoor sporting field (Schleifer, 1993, p. 2). Currently, the company has diversified into selling outdoor recreation equipment and clothing. L.L Bean opted not to expand its retail operations and instead stuck with the only retail store they had opened at Freeport. Leon Gorman explained this decision saying the catalog business and retail business were different and both required different types of management styles (Schleifer, 1993, p. 2). However, a Consumer Report survey ranked L.L.Bean as the most customer satisfying ‘mail-order’ company in the U.S. among its major competitors such as Eddie Bauer, Talbot’s, Land’s End and Orvis. In addition, the company’s product line was classified as hierarchical and whose highest level of aggregation is occupied by Merchandise Groups such as men’s and women’s apparel, footwear and accessories, camping equipment among many others (Schleifer, 1993, p. 2). Below each Group is Demand centers such as sweaters, pants, skirts, jackets among many others. The hierarchy continued with Item sequences followed by individual items distinguished b y color, which formed the basis of forecasting and purchases to replenish stock (Schleifer, 1993, p. 3). The problem of inventory management is a bone of contention, in this case. The problem of making forecasts for each individual item stocked by the company has been the main challenge facing the company because it’s hard to match demand and supply for items

The Cask of Amontillado Essay Example for Free

The Cask of Amontillado Essay In Edgar Allan Poe’s horrific tale of â€Å"The Cask of Amontillado† readers witness a journey of two people wondering through an underground graveyard leading to a tragic and twisted end. Most readers assume that the character of Montresor is a male figure. All of the actions of Montresor, throughout the course of the story, are full capabilities of a woman. It could be possible that our two characters had a love affair before our gruesome tale plays out. Let us say that Montresor is a mistress of Fortunado. He insults her in front of another man, couple, or lover publicly; as it is never said what the insult is specifically. Upon this insult Montresor, our female character, is so enraged with adrenaline and emotion that she plots a plan to show Fortunado that she is a force to be reckoned with. While the adrenaline pulses through her veins she disassembles the wall with ease and preps it for the demise of the unsuspecting enemy. As most have heard or witnessed in everyday life, powerful surges of adrenaline can cause people to do tasks they normally would have no strength to accomplish. As she lures our ironically unfortunate Fortunado through the musty, damp tunnel of underground, she taunts him. Or could this be her feminine compassion coming to the surface of the reality that is to be Fortunado’s fate? As she continues to suggest turning around on the journey, she comforts him and his cold as though she could be having second thoughts. Montresor has a compassionate heart and conscious. A man would rarely show these traits. Finally, she has him right where she wants the insulting character. The taste of revenge returns. She remembers why she has brought our victim to his bone chilling demise. She replays the time or countless times that Fortunado has insulted her publicly and she shows him what he deserves. Bone by bone, she finds pleasurable satisfaction in her plan. As the saying goes, â€Å"Hell hath no fury like a woman scorned†.

Monday, October 14, 2019

Threats To Ict System And Organisations Information Technology Essay

Threats To Ict System And Organisations Information Technology Essay Scanners Various methods are used by people to attack systems using scanners. People are able to download scanners from the internet in order to scan addresses and obtain information about TCP ports. People can discover IP addresses by mapping using DNS. Hackers use this potential tactic assuring what systems are active and available to hack. Range of addresses This is a scanner which is very simple, visual and fast at scanning as it searches for a range of addresses. Deep probe in order to reveal essential information of a device then completing a deep probe is the useful way moreover, it can also be used when there is a remote fault. Scanning a wireless system If there is no encryption can result wireless systems to be very vulnerable. When looking at mobile networking, wireless access points need to be established as they can be accessed when connected to the laptop, PDA, or mobile. Windows has a feature that contains a tool that can allow you to click on a network icon for your wireless network connection. ARP poisoning Within the system these are known as switch based networks that are very secure as they create micro-segments. However, there is still an issues of attack in many networks. In order to tackle this problem, the memory must be monitored of many network by checking MAC address as they appear in locations more than once: here is a diagram to help your understating Default Gateway Victim Victim Default Gateway Man in the middle Magic disk are known to be boot disks that can be downloaded on the internet for the purpose of restarting the computer and subvert the operating system. There are some very good magic disks for instance the ultimate boot CD that can resolve issues of viruses and Trojans moreover, drive, hardware and operating system failures. In order to avoid anyone using a magic disk it is vital is password lock the BIOS and also USB sticks, floppy disks and CD/DVDs should not be used as boot devices. Key loggers Key loggers are applications that are used to record key stroke also can be used for mouse activities then interestingly sends the information to a file or in some case that are often used remote network location. There are very difficult to track as they are hidden but can be found using anti-virus software application. If suspecting there is a threat, run a protocol scanner, which works by looking at contents of every data packet. Access causing damage to data or jamming resources Unauthorised access to software can result to damaged data or restricting resources. There are attacks that can access systems without the need of damaging however, an intrusion can always have an effect on the system. Virus Attacks in all computer systems, virus attacks can occur when rogue code has entered in to the system. Viruses work by hiding themselves in ordinary executable code. They can damage the system by opening and closing the CD/DVD door, swapping key responses or can spread themselves by self reproducing and can serious damage the hard drive. There are virus scanners which will detect a virus by opening the file and scanning the code. Trojans Trojans are programs with a hidden identity and seem to look as a program or a file in which it can be normal or harmless to your PC. Worms Worms have a process of forwarding through the use of emails from the data of your contact list. Piggybacking, Tunnels and probes Knowledge is required for data for when forging data or spoofing and that knowledge network programming languages ranging from; Java, C++ or VB.NET. Hackers have the ability to hand craft a data packet in order for an application to be forced or information given away by server, lead to a service attack or piggyback/tunnel in which that happens into a system via an acceptable protocol. Phishing and Identity theft This is a recent developed method that allows unauthorised to systems. Phising works by luring people into showing their personal information in which this is done through social engineering for instance; when you receive emails supposedly to be from banks saying ISP etc. asking you to follow this link to lead you to their site in order for you to change your details in which that can be a HTTPS which that can be in operational. Natural Disasters Natural disasters can occur to many systems ranging from power outage, flood or fire leading to serious major damage. Organisations have computer systems that are specifically built to cope with these series of issues. The disaster policy have several ways to implement the following: Remote storage of all data to be done in daily back up Duplication of critical servers Malicious damage constantly there are malicious damages occurring internal and external to systems. Malicious damage can be caused by external hackers. The hackers then attack the systems. There are many security ways of preventing this however, hackers always find a way to do what they do best. Technical Failure There is always technical failure that occurs a lot now at days for instance when sever storages are lost, or bad internet connection that can cause disruption to the whole organisation. The large use of network technology for instance voice, video and CCTV can lead to a commercial damage and disrupt the security of the system. Human Errors Human errors occur unpredictably however, it does happen very frequently due many things for instance being forgetful, ignorant, or having lack of knowledge. This then results to system failure. Users can forget to back up data which then leads to loss of data is something happens to the system etc. Theft An Organisation or individuals can be damaged heavily in which that can be long lasting impact due to theft of data. Theft occurs in the cyber sense in which that is known as to be hacking, or physically removing data by CD/DVDs, memory sticks etc. Integrity and completeness of data This is a critical matter integrity and completeness of data as damaged can be caused if there is incorrect data. Incorrect data can result to distress and legal action especially the data in medical records, police systems as well as credit reports. You need to have appropriate people to check the data correctly maybe of customers or personal details by asking a colleague or customer to check if correct. Physical Security Systems can be safe with the latest the latest anti virus and firewall however, that is all useless if anyone can have access to the sever room and manages to get critical data on to a USB memory stick by copying the data. In organisations there should be security features that need to be present; lock and key security, equipment identificatyion, CCTV, Detection of intrusion etc. Lock and Key Security There is a need to secure devices such as laptops by inserting a padlock chain. In buildings there are many locks and key systems that operates a system that is master/submaster system. Equipment Identification this involves stolen properties identified for instance if a computer from school/college is stolen, it can be identified from the marking clearly showing ownership and origin which can lead to prosecution. Equipment can be identified through the use of indelible ink which labels the property of the owner in which it is invisible and ultra-violet sensitive ink. CCTV (Closed circuit television) This involves cameras used 24/7 in monitoring people or events. There are several advantages to its use for instance, central centres that are centralised can be monitored, a record of 24/7 events are maintained, and lastly mentioning that CCTV is at present to prevent bad behaviour to occur. Intrusion detection systems intrusion detections are used by many organisations which can detect human presence in many ways. The operate through various ways for instance, body heat is sensed by passive infrared, detect many movements through the use of microphones, doors and windows have circuit breakers for access etc. Staff visitor identification systems many from small to large organisations have systems that can identify staff or visitors in order to prevent unknown people to access. People can be identified through the use of identity cards in which it is a must for everyone in the premises to wear them. Biometrics Biometrics involves the use of finger printing to recognise, retinal scans and voice recognition. Fingerprint recognition this biometric form is commonly used in detecting in crime scenes. Our fingers contain a water solution which enables the detection on finger printing to work. There are several scanners that finger prints by detecting ridges in our fingers. Finger printing can also work in identification for passports and visa. Retinal Scans The retina is located at the rear of the eye and it is very similar to a finger print as it contains unique configuration. However, there is a difference between them as a finger print can be changed when the skin is removed through cuts or burns whereas it is impossible for the retina to be changed unless someone attempts to tamper with the eye bow which is highly unlikely. Iris scanning This is another unique identification eye method which is the iris. The difference between the retina is that the iris can be scanned when the recipient is wearing glasses or contact lenses. Voice Recognition This form of biometric is not being commonly used as voice can change due to various reasons for instance if someone is ill, stressed or has a throat infection that can affect someones voice. Software and network security Organisations all need to have security, techniques to manage data and technologies in order to combat intrusion and superverion of computers that are networking to prevent data being damaged or resources being affected. Encryption Encryption involves the conversion text, images and media information in to a format. RSA encryption is a Ron Rivest, Adi Shamir and Len Adleman in they are mathematicians who enforced the public/private key encryption through the use of prime numbers. In encryption there are many ciphers that exist for instance Caesar cipher, in which relies on simple key of changing one letter with the letter a fixed number of places down the alphabet. The operation of this works by using shift of four places meaning A becomes E and B becomes F etc. DES (Data Encryption Standard) is a cipher uses key 56 bits in length in which this can be mathematically explained. A public/private key can be used by RSA encryption; with an example of how the security certificate is issued by a website. As the creation of a key is done the certificate is a public key part of the exchange. Call back Dial up systems use call back where remote workers or network administrators are able to dial into a network or devices that have network and it will then call them back. In order to call back the number is pre-configuared. Users are unable to connect from any location but only the ones which are trusted and registered lines. Handshaking When data is being sent through a medium in WAN systems it in which it is not trusted, in order to obtain the trust the devices are each tested in a challenge as it carriers username and password in order to indentify the device. Diskless networks There are common ways data is stolen for instance when data is transferred from a computer to a mobile device storage. Backups Backing up data is important in order to restore critical data to assure that it is safe and secure, if data is not backed up very frequently will result the organisation loosing data in which that can be costly. Audit logs Audit logs are used for the purpose to keep records of network and database activity to also have a record of who has done what, when they did it and where. There are various purposes for instance, to maintain records that are detailed on how many systems are being used. Syslog is a commonly used system that is able to store simple, auditable records system activities. Firewall Configuration This enables users to be able to remove filters depending on various conditions: IP Addresses: Every machinery running of the internet each has an assigned address called the IP address. The IP addresses consist of 32 bit number and can be understood as octets in number which is decimal dotted. Domain Names: The sequence of numbers that produces the IP addresses can be hard to be remembered since a change of IP addresses tends to occur. Norton Security has a firewall as well as the Norton 360. How to check your FIREWALL settings Windows has a firewall that can be configured through control panel by opening it. The exceptions tab need to be selected and you will view a list of automatically configured expectations. You then select the add pot option. Virus Protection software Firstly, computers can be a victim of virus, worms and Trojan attack from the internet access as well as emails. There are various ways of protecting the computer from such things which are sadly created by virus writers A virus scanner can only be used when the user initiates it. There is a virus start up scanner that begins to run as soon as the booting process begins by checking for sector viruses. A memory resident scanner software checks for incoming emails as well as browser document by doing an automatic check on the environment of the computer. There are various types anti viruses all ranging with different abilities and some are much more secure than others and can be downloaded on the internet. These anti viruses can work through doing file emulation, file analysis, Heuristic-based detection, Malicious activity detection and Signature based detection. An anti virus basically examines the files for known recognisable viruses through the virus dictionary as well as to identify unrecognisable activities of behaviour in the computer to see if an infection may be occurring. A virus dictionary consist of list of viruses known and to be put by the producer of the software and so when an anti virus detects a virus it then refers to the dictionary to confirm, then initiates the deletion of the infection or it can quarantine the virus in order for it not to be accessible to other programs as well as stopping it from spreading or the attempt re-creating its self. Anti viruses also consist of suspicious alert in which it immediately alerts the user if it is suspecting or has suspected of a threat occurring then it ask the user if they want to proceed or what to do. The most destructive and spreads widely is argued to be the macro viruses, and mostly affects Microsoft as they need to overcome their security flaws in the out look in order to pr event this destruction occurring to the documents. A common way how viruses normally access the computers is through networking of local networks even through the internet by going through unprotected security patches which can be holes in the software or having an infected sent thought the use of email, downloads or disk sharing. Some of the viruses may set in to Excel or word file or has been created to initiate through email, and as soon as the computer it is infected it can carry on its destruction to other computers without the awareness from the user. Anti virus software updates are highly vital as new viruses can be created and the older softwares may not be able to protect you from it. VIRUS It is called a virus because it spreads everywhere and enables data to be deleted as well as corrupt files. WORM Worms have a process of forwarding through the use of emails from the data of your contact list. TROJANS Trojans are programs with a hidden identity and seem to look as a program or a file in which it can be normal or harmless to your PC. POLYMORPHING This is a clever ability a virus has for when changing its appearance, size, signature for every turn it attacks the computer because it makes it difficult for a virus software to recognise it. Software Utility Purpose Screenshot VIRUS PROTECTION Anti-Virus Protection Anti-Spyware E-mail Scanner ID Protection Link Scanner Resident Shield VIRTUAL PRIVATE NETWORKS (VPNs) Organisations are able to communicate from site to site in a public system through the use of VPN for instance the internet, via tunnel in which that is the route for all encrypted traffic. VPNs have a trusted connection on a system that has not been trusted. Passwords Managing passwords is very essential, organisations must ensure that the protection of the password is very safe to prevent troublesome. If the password is forgotten will lead to many problems. The password must not be written down Change the password for at least every 3 months Put a very strong password Software Update Software update is very important as it ensures that the system is safe from possible faults and vulnerabilities from various application. When the software updates it is an automatic update in order to remove the need of worrying on the update of the system. REFERENCES USED BTEC National Information Technology Practitioners Book 1 by Jenny Lawson

Sunday, October 13, 2019

Significance Of Ritual In North American Indian Religion Essay

Significance of Ritual in North American Indian Religion When scholars study religion, the tendency exists to focus on the mythological aspects of the religion in an attempt to understand the major underlying concepts present. However, an equally rewarding study often can be accomplished through the careful analysis of the religion's ritual aspects. This is especially true when studying North American Indian religions where there is an abundance of elaborate rituals that play a significant role in their culture. By closely examining the details and symbolism of ritual movements, we can gather some basic understanding of what is seen to be of value in a certain theology. While most Native American rituals tend to be mono-cultural, there are a few rituals that frequently appear in many different regions and tribes across North America. Two of these widespread rituals are the ritual of the "sacred pipe," and sweat lodge ceremonials. The sacred pipe ritual is loaded with symbolic meaning, and offers a generous insight into Native American belief systems. This essay will first look at the dynamics of the sacred pipe ritual and offer some explanation into its religious significance, then draw some parallels to the more common sweat lodge ceremony. If a recurring spiritual theme appears in separate rituals, it can be considered evidence of a consistent, structured belief system. The use of smoking pipes in Native American cultures is a popular and very ancient practice. Direct predecessors of the modern pipe appear 1,500 years ago, and other less relevant pipes can be found as far back as 2,500 years ago. The distinguishing characteristic of the sacred pipe is that the bowl is separable from the long stem, and the two parts are kept apart except during ritual use. The pipe is seen as a holy object and is treated with much respect. This type of ceremonial pipe was used by tribes ranging from the Rocky Mountain range to the Atlantic, and from the Gulf of Mexico to James Bay. It did not penetrate into Pacific coast or Southwest cultures, where tubular pipes were preferred. Inter-tribal trading helped the practice of this particular ritual spread rapidly, because in order for peaceful trade relations to take place some form of ritual had to be observed. Resp... ...placed on directions, especially east and west which is obviously derived from the path of the sun. Also important are the upward and downward directions representing the male sky and the female earth, and the joining of the two to give life. The simple fact that these symbols are so widespread and evident in separate rituals suggests that the North American Indians had a strong religious foundation long before Europeans arrived and attempted to ‘teach' them religion. WORKS CITED LIST Brown, Joseph Van Epes. The Sacred Pipe: Black Elk's Account of the Seven Rites of the Oglala Sioux. Norman, Oklahoma: University of Oklahoma Press, 1953. Coorigan, Samuel W, ed. Readings in Aboriginal Studies Brandon, Manitoba: Bearpaw Publishing, 1995. Hultkrantz, Ake. Belief and Worship in Native North America. Ed. Christopher Vecsey. Syracuse, New York: Syracuse University Press, 1981. Robicsek, Francis. The Smoking Gods: Tobacco in Maya Art, History, and Religion. Norman, Oklahoma: University of Oklahoma Press, 1978. Steinmetz, Fr. Paul B., S.J. "The Sacred Pipe in American Indian Religions." American Indian Culture and Research Journal. 8(3): 27-80, 1984.