Thursday, October 31, 2019

Weekly ass. #7 Essay Example | Topics and Well Written Essays - 250 words

Weekly ass. #7 - Essay Example After sending and deleting personal emails, employees think that they are safe and cannot be discovered. Employers have the right to access their employee’s emails, and put up backups, which can retrieve such emails even when deleted. According to Jennings, â€Å"Courts have ruled that email messages belong not to the employee but to the employer and are discoverable in litigation where upon they must be turned to the opposing party†, (Jennings, 2009,Pg. 180). This means that employees do not own the emails at their work place, and they can be sued for using them to pass personal messages. Blackberries are personal properties, which are owned by individuals. Such individuals have the right of usage of their property and they can therefore send personal emails to their friends. However, same kind of care is necessary since it is unethical to send messages via any platform using the employer’s time. Messages on Blackberries should only be sent during personal time. Additionally, Blackberries should not be used to set rogue access points on the company’s

Monday, October 28, 2019

Domestic Terrorism In The United States Essay Example for Free

Domestic Terrorism In The United States Essay To varying degrees, domestic terrorism has survived and affected the social and political structure of the United States. As defined by the country’s Department of Justice, these words connote â€Å"the unlawful use of force or violence, committed by a group(s) of two or more individuals, against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives† (U. S. Department of Justice, 1994, p. 26). Though such characterization is considerably clear in its meaning, oftentimes a case-by-case interpretation is necessary to ascertain where extremism ends and terrorism begins. Terrorism vs. Extremism A more concise demarcation between extremism and terrorism is evident in the recognition that extremism is not unusual in any political environment, and is more often than not directed by societal pressures, civil discourse, education and the law. On the other hand, in terrorism, the violence is far beyond control by civil, educational or societal elements and must be tracked down, penalized and castigated by law enforcement agencies. The Dictionary of Political Thought defines extremism as â€Å"a vague term, that can mean a) the taking of a political idea to its limits, regardless of unfortunate repercussions, impracticalities, arguments and feelings to the contrary and with the intention not only to confront but also to eliminate opposition; b) intolerance towards all views other than one’s own; and c) the adoption of means to political ends which show disregard for the life, liberty and human rights of others† (Scronton, 1982). The complexity of separating terrorism and extremism is that in various situations, domestic groups which are seemingly law-abiding at present, may be contemplating of violent actions in the future. As it is, many violent groups started as non-violent discussion or protest movements with very lofty ideals; however, as time elapsed they evolved into something else. Benjamin Netanyahu, Israeli Ambassador to the United Nations, provides a suitable and a more fitting characterization of terrorism when he described it as â€Å"the deliberate and systematic murder, maiming and menacing of the innocent to inspire fear for political ends. † USA Patriot Act Section 802 of the USA PATRIOT Act stretched the definition of terrorism to include domestic in contrast to international terrorism. An individual is said to be involved in domestic terrorism if he/she does an act that is dangerous to human life, that is a violation of the criminal laws of a state or the United States, and if the act appears to be intended to a) intimidate or coerce a civilian population; b) influence the policy of a government by intimidation or coercion; or c) to affect the conduct of a government by mass destruction, assassination or kidnapping. Further, the acts have to take place chiefly within the territorial jurisdiction of the United States and if they do not, then these acts can already be regarded as international terrorism. Clearly, Section 802 does not create a new crime of domestic terrorism. Nonetheless, it does extend the kinds or the nature of actions that the government can examine and probe into when it is investigating terrorism. The USA Patriot Act stretched out the powers of the government when they do their investigations and some of these powers are applicable to domestic terrorism. Such definition of domestic terrorism is expansive enough to cover the actions and activities of many known activist campaigns and organizations. Greenpeace, Operation Rescue, Vieques Island and WTO protesters and the Environmental Liberation Front have all recently engaged in activities that could make them subject to investigations as engaging in domestic terrorism. Contemporary Domestic Terrorism Though governments, private and public institutions have been beleaguered and weighed down by terrorism for hundreds of years in one form or another, the strategies and the application associated with it have changed and progressed as surely as the societies upon which it is imposed. Technological advances in the transportation, communication and in the area of weaponry have permitted the capacities of current domestic terrorist groups to get their message out and have enhanced their ability to take aggressive and sadistic action to achieve their objectives. President Clinton launched a counter-terrorism bill to the Senate and House of Representatives in February of 1995. One exceedingly contentious proposal in the bill is the assigning of the Department of Defense a dominant role in assisting the investigation of domestic terrorism incidents in which chemical and biological agents are utilized. Currently, the military can be used in cases of terrorist activities where there is an alleged employment of nuclear weapons or devices and much more if such allegation has been established (Hall, 1995, Sec A). Though the amplified role of the military would be limited, necessitating a further amendment to the Posse Comitatus Act of 1878, civil liberties experts cautioned that it would infringe the tenets of civil supremacy over the military and would only rekindle the hostilities and anti-government sentiments of the citizen-militias and conspiracy theorists (Landay, 1995). Furthermore, several Congressmen, law-enforcement officials and some military advisers concur that such employment of the military would be an exceedingly precarious approach in combating domestic terrorism. Senator Daniel Patrick Moynihan, a Democrat from New York, responded to questions as to whether the use of the military, in an expanded role, should be a part of the counterterrorism package, said, â€Å". . . the military defends the nation and does not involve itself in internal affairs† (Minzesheimer, 1995, Sec A). Incidents and Implications There has been an evident and persistent decline in the number of terrorist incidents in the United States during the past twenty years. To further delineate the trend of decline over time, a comparison of the average number of incidents per year during each of three, six-year periods would be useful. During the six year period from 1977 through 1982, there was an average of 59. 0 incidents/year; from 1983 through 1988 an average of 15. 7 incidents/year were recorded; this compared to an average of 5. 3 incidents/year investigated during the period from 1989 through 1994 (FBI, 1994). *** ACTIVE GROUPS OPERATING WITHIN THE UNITED STATES CLASSIFIED AS TERRORISTS African National Prison Organization (ANPO). An arm of the African Peoples Socialist Party. Animal Rights. Principally against use of animals for any purpose beyond their natural existence. Armed Resistance Group (ARG) aka Revolutionary Fighting Group, Red Guerrilla Faction. This group has been characterized in 1988 as tired and aging revolutionaries. Greenpeace Principally environmental-use extremists. Ku Klux Klan (KKK). Reorganized and relocated several arms of its group in 1989. Macheteros. Puerto Rican nationalists. Ohio Seven. People for the Ethical Treatment of Animals (PETA). Very public-relations oriented. Radical Feminist Organizing Committee (RFOC). Driven-out of the feminist movement in 1989, operating independently. RAMBOC (Restore a More Benevolent Order Coalition). Targets and actively pursues the US assets and people of foreign groups with terrorist links, such as the PLO, SWAPO, ANC, etc Rolling Thunder aka American Foundation for Accountability; primary focus is to draw attention to the POW/MIA issue from Vietnam War. Satanic Cult. Associated with attempted bombing of churches and kidnapping, and animal sacrifices, tombstone vandalism, and miscellaneous actions. Skinheads (SKA). Groups consist of both racist and anti-racist factions. SS Action Group. Principally anti-Semitic. Apparent Motivation There are principally four classifications into which groups that are regarded as domestic terrorists can be distinguished currently existing in the United States. These groups can be generically delineated as being either motivated by religious convictions, racial prejudice and supremacist goals, anarchistic/anti-government/politically motivated, or in pursuit of unique special interests. These classifications have been extracted from a collection of the categorization and delineation of extremist and terrorist groups by two respected subject-authorities, Stephen Segaller and FBI’s Department of Justice. Segaller, in his book Invisible Armies, classified domestic terrorism in the United States into four groups as well, but lists them as being: a) Cuban infighting (political), b) â€Å"backwoods terrorism† (a combination of religious, racist and anarchistic), c) violent Puerto Rican independence groups (political), and d) a handful of domestic revolutionary Marxist groups (anarchistic/anti-government and racist) (Segaller, 1987, pp. 221-225). Theoretically speaking, the stimulus for the creation and sustained existence of extremist and terrorist groups can unequivocally be associated in many circumstances to ethnic, cultural, religious, and racial feelings of superiority. An accurate depiction of the continuum formed by these supremacist attitudes, and how they promote further tension is succinctly articulated by Frank G. McGuire, when he said that as long as Christians feel superior to Jews (or vice-versa) and Catholics feel superior to Protestants and Ashkenazic Jews feel superior to Sephardic Jews, men feel superior to women and whites feel superior to blacks/browns/yellows/reds and so on, such phenomenon will be with us (McGuire, 1990, p. 10). These cultural, racial, gender, and a myriad of other differences that are present among people in society, particularly one as diverse as the United States of America, must be acknowledged and respected, but shouldn’t be seen or considered as a encumbrance to peace and harmony within society. Nor should these diversities be seen as wholly benign in their impact on the functioning of society as a whole. Tibor Machan, a social and political commentator, showed a well-timed dissertation on the myths and erroneous beliefs associated with viewing multiculturalism as simply a difference in dress, music, dance, and customs. Dr. Machan asserted that cultural differences, whether a result of race, gender, religion, or whatever, impacts both negatively and positively on other cultures within the society (Machan, 1996, pp. 134-135) and further opined that attitudes of cultural-superiority and intolerance are directly related and incorporated into many of the extremist views and motivations that are plaguing America today. The period from 1982 through 1994 showed that the targets of domestic terrorism were predominately commercial establishments. The majority of incidents directed against commercial establishments were conducted by animal-rights and/or anti-abortion extremists, either attacking stores that sold fur, or clinics that performed abortions or provided abortion advice, respectively (FBI, 1994; McGuire, 1990). Religious Racial Supremacy/Intolerance Religious intolerance founded upon fundamentalist standpoints has been the stimulus for acts of terrorism all throughout history and such as involved Orthodox Jews, Moslems, Catholics, and Protestants. Perhaps, there is no issue or idea among human beings that is as provocative and as seditious as that of religious beliefs. Auspiciously, at least as far as the United States is concerned, terror stimulated by religious intolerance has not been as significant a threat as in other parts of the world like in Africa, the Middle East or Bosnia. â€Å"America is a unique nation in that it guarantees the freedom of religion with the First Amendment and the right to [keep and] bear arms with the Second Amendment. This means that people can believe whatever they want, and they can buy the guns to protect that belief† (LeBaron, n. d). The statement was made in direct reference to Mormon fundamentalism and summarizes the very ideology upon which this country was founded which also provides an insight into the potential dangers that exist with religious extremist groups. Recently however, there has been rhetoric and open threats of aggression from different extremist groups that describe themselves as being inspired by religion, nonetheless, have undisputedly displayed racial supremacist and hate-mongering views. The leader of the Nation of Islam, Louis Farrakhan, advocates sundry rhetoric of black supremacist views and religious fervor. He professes to have the faith and devotion of some four million people (Fletcher, 1996). In addition, several white-supremacist clusters, including some of the many Christian militia splinter groups, advocate exceptionally caustic and hate-filled threats as well, apparently an endless, ages-old game of â€Å"I call you a name, you call me a name. † Oddly enough, two racial supremacist groups representing opposite extremes, the Nation of Islam and the Posse Comitatus, have concurred to an ultimate end-state segregation of the United States into regions of pure racial integrity. Another group operating within the United States that has historically merged a racist agenda with religious rhetoric, and was truly very sadistic in its actions and objectives, is the Ku Klux Klan. They have, however, considerably lessened in both their membership numbers and invisible power-base in recent years, and though there are still very strident individuals appearing from time to time, the danger posed by the Klan nowadays is essentially restricted to local regions, and their activities are in the form of parades and rallies. As the Klan has faded in its activities and numbers, it has been replaced by the tremendously vicious and rapidly growing racist movement known as the Aryan Nations, which is strongly associated with the Identity Church that proclaims Anglo-Saxons as Gods chosen people. The fundamentalist Mormons are another religiously-motivated cluster within the United States that are catching the attention and concern of law enforcement and other government officials. This group has been at odds, to a certain degree, with the government since its creation in the early 1800s. Many of these fundamentalist Mormons are well-armed conspiracy-minded survivalists, who have retreated to the mountains of central Utah to await Armageddon, which they believe will occur on April 6, 2000. Believing in their gifts of prophecy and revelation, and fired-up by heavenly visions and doctrines of blood atonement and oaths of vengeance, they have isolated themselves awaiting the end of the world and fearing that the government is about to take away their freedoms (LeBaron, n. d. ). A specifically insightful yet explosive issue to a huge section of the American people, despite individual beliefs, is the classification of particular abortion clinic-related hostility as domestic terrorism. The Freedom of Access to Clinic Entrances (FACE) Act of 1994 in concurrence with the Attorney General Guidelines (AGG) on General Crimes, Racketeering Enterprise and Domestic Security/Terrorism Investigations, instigated and directed the creation of the Department of Justice Task Force on Violence Against Abortion Providers to look into conspiratorial acts of violence against abortion clinics and personnel as domestic terrorism (FBI, 1994). Although personal opinions on the ethical aspects associated with abortion, whether for or against, are not wholly confined to religious beliefs, the most articulate, open and visible anti-abortion advocates are directly allied with religious organizations. As it is, abortion rights and issues persist to be one of the most contentious and conflict-ridden questions among Americans and motivate exceedingly passionate and rousing rhetoric and reactions from people from both sides of the matter. In the period between 1982 and the end of 1984, there were a total of 220 separate acts of violence, including 89 cases of bombing, arson and other serious incidents, conducted against clinics where abortions were performed or abortion-advice offered (Segaller, 1987, pp. 222-223). Ethnically and racially stimulated bias, extreme loathing and carnage are as much a part of human history as any other characteristics of mankind, and have at least to some extent have a bearing on the cultural and social identities of essentially all civilizations to date. From the subjugation of Hebrews by ancient Egyptians, to present-day current situation in the Balkans, racial and ethnic differences have triggered incalculable suffering and death. The history of racial and ethnic turmoil in the United States is no different, and is seemingly experiencing an increase in such activity recently. Racially-motivated extremist and terrorist groups in the United States, especially those of today, seem to employ religious rationalizations and teachings for their sadistic tendencies and aggressive actions, and all indications point to the fact that such trend will continue at an accelerating rate into the foreseeable future. Anarchistic/Anti-government /Political Terrorist clusters of today that are actually anarchist, anti-government or political in their motivations are mostly associated with the growing self-determination, radical citizen-militia movements, or have been around a relatively long time, such as the Puerto Rican freedom fighters. The former has drawn considerable attention, and extracted wary concern from law-enforcement and civil-rights groups due to the bombing in Oklahoma City, and their rapid and continuing growth in numbers and visibility. A few of the more extreme citizen-militia groups, often motivated by New World Order conspiracy theorists and anger over a belief that government has become too large and repressive in everyday life, are openly soliciting and calling for the overthrow of the United States government. These groups, when linked with the self-described â€Å"Constitutionalists,† are being considered as extremely dangerous by many law-enforcement and watchdog groups (Knickerbocker, 1995). The Puerto Rican terrorist groups have been almost exclusively limited in their actions to operating within Puerto Rico against local and federal targets of opportunity. Unique Special Interests Within this designation of domestic terrorist groups are those of relatively recent creation, or at least they have relatively recently gained high public visibility through their actions. Groups such as the extremist animal-rights groups, environmental extremist groups and homosexual-rights groups, including People for the Ethical Treatment of Animals (PETA), Earth Night Action Group, and Act Up, respectively, have emerged within the past two decades and have actively used violence, destruction and intimidation to gain recognition, and to further their respective political agendas. References *** McGuire, Frank. 1990. Security intelligence sourcebook: Whos Who in terrorism. Silver Spring, MD. : Interests, Ltd. U. S. Department of Justice. 1994. Terrorism in the United States, 1994. Washington, DC. : National Security Division, Federal Bureau of Investigation, Terrorist Research and Analytical Center Scronton, R. 1982. Dictionary of Political Thought. New York: Hill and Wang Hall, M. 1995. â€Å"Clintons Military Police Plan Under Fire. † USA Today, 11 May Sec. 5A. Landay, J. S. 1995. â€Å"Tempering Terrorism. † The Christian Science Monitor, 8 May Sec. US. Minzesheimer, B. 1995. â€Å"Terrorism Bill Warning: Go Slow. † USA Today, 1 May Sec. 5A. Federal Bureau of Investigation. 1994. Terrorism in the United States 1982 – 1992; Terrorism in the United States 1994. Segaller, S. 1987. Invisible armies, terrorism into the 1990s. New York: Harcourt Brace Jovanovich Machan, T. 1996. â€Å"Fallacies of Uncritical Multiculturalism. † The Freeman, vol. 46, no. 3, pp. 134-135. LeBaron, G. Jr. â€Å"Mormon Fundamentalism and Violence: A Historical Analysis available at http://www. tcd. net/~garn/ polygamy. html. Fletcher, M. A. 1996. â€Å"Farrakhan Vows to Take Libyas Aid. † Washington Post, 26 February, Sec. A1. Knickerbocker, B. 1995. â€Å"US Militias: The Dark Side of Frontier Independence. † The Christian Science Monitor, 24 April, Sec. NATIONAL.

Saturday, October 26, 2019

Fundamentals of Information Technology

Fundamentals of Information Technology Human Computer Interface (HCI) Kurosu (2011) defines usability as the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use. Usability is dependent on the context of use and that the level of usability achieved will depend on the specific circumstances in which a product is used. The context of use consists of the users, tasks, equipment, and the physical and organizational environments which may all influence the usability of a product Microsoft Visio and Word Interfaces look almost identical with its white shaded ribbons of tools. What are so vastly different between the two applications is their uses. Microsoft Word is a word processing application used for professional looking documentation while Visio is a diagramming and vector graphics application.ÂÂ   An enhancement in terms of usability with Microsoft Word would be its spelling and grammar tool found on the review ribbon. An integrated Speech to text within Word could add to its HCI.ÂÂ   This type of feature could make Swagger Distributions document creation seamlessly faster by adding speech dictation. Databases The Clothing Manufacturers Table houses the manufacturers name, street address, city, state and zip. The Clothing Products table holds the clothing item, color, manufacturers name, wholesale price and retail price The Retail Stares table stores the information for store name, street address, and city, state, zip and clothing item. The Clothing Products table bears currency fields while the Clothing Manufacturers and Rectal Store table has number fields, When opening the Clothing Products table, I could see both the wholesale and retail prices were incorrectly formatted. When changing the retail price from text to currency the prices became correctly formatted. Custom formatting only changed how the data is displayed and does not affect how the data is stored in a Microsoft Access database, or how users can enter or edit data (Microsoft Blog, n.d.). The query creates a list of clothing items in retail stores. It shows the retail store name and state and the clothing item, manufacturer name and retail price. The report is sorted alphabetically by retail store name. There is no secondary sort, because of this, the list of clothing items in each retail store will come out in a random, unpredictable and inconsistent order (Microsoft Blog, n.d.). The Retail Stores table links to the Clothing Products table based on the clothing item. The Clothing Products table links to the Clothing Manufacturers table based on the Manufacturer Name. Visio There are many kinds of Visio diagrams, including flow charts, networking diagrams, and home or office plans. However, you use the same three basic steps to create most of them: Opening a template. Dragging and connect shapes. Adding text to shapes. The Connector Tool in Visio 2013 found in the tools section of the Home Ribbon is used to Auto Connect shapes and stencils. On the insert ribbon of Visio you can insert objects such as pictures on to the canvas. You can begin this process by clicking insert on the Insert ribbon and clicking the option youd like in the illustrations section.. Within the Visio Design Ribbon a user can select their page layout between Portrait and Landscape, whichever works best for that users display. To select an orientation, click on the Orientation option in the Page Setup section of the Design Ribbon. Users can Save their stencils and diagrams by clicking the save option on the Title Bar. A user can consult the Help option on the Visio Title Bar to search the database for help using the application. Visio Help Database Networking Computer Rooms typically provided by libraries to the public, academic institutions to retain access to the Computers (Tomsho, Tittel, Johnson, 2015, p. 315). Swaggered Distributions consists of three segments towards network offices, computer room, and warehouse. The wide area network fits into the computer room private network with the means of the T1 demarcation router. The demarcation router switches over toward the public wide area network where swagger distributions private network resides. The system has a main router whose main is to apply Dynamic Host Control Protocol and routes IP addresses to all connected devices in the network segment. The DHCP server then allocates IP address to the firewall. The firewall based on the security policies allows certain packets of information in and out of the network. Within the computer room, there is a server which acts as a dedicated place for storing files applications where other network based computers which are permitted to log i nto and retrieve specific information. There is also an Ethernet switch whose main duty is to direct packets of information towards the correct connected device in the network and allocate the priority for each data packet sent and received throughout the network. The Ethernet switch acts as the type of hub that extends the network in the direction of the warehouse where it connects by using fiber optic cable to link the two network segments. The fiber optic cable transmits data. The computer room then has another panel that functions as a hub to the segment of the computer room along with the office PCs. The warehouse and the office consist of one remote Ethernet switch. The office, where the PC are connected via category 5 twisted-pair networking cabling runs through the wall into a face plate and directly to the PC allowing that PC to connect to the central servers. Diagram for WLAN Programming: import java.util.*; import java.lang.*; import java.io.*; /* Name of the class has to be Main only if the class is public. */ public class HelloWorld { public static void main (String[] args) throws java.lang.Exception { int day; int month; int year; GregorianCalendar date = new GregorianCalendar(); day = date.get(Calendar.DAY_OF_MONTH); month = date.get(Calendar.MONTH); year = date.get(Calendar.YEAR); System.out.println(Welcome to Swagger Distribution!); System.out.println(Welcome, Todays date is +(month+1)+/+day+/+year); } } Code Compiled Successfully The main changes to the original code have been bolded and can be summarized as follows.ÂÂ   SYSTEM.OUT.PRINTL is a built in class in the Java language in which Downing (1999), states the OUT aspect functions to print various data values specified While the PRINTLN() aspect prints data values within a a public method (p.144). The SEMICOLONis a Java compiler expression that communicates within the compiler a statement is complete. The Calendar Code is a built in Java class returns a general object of its type whose calendar fields have been initialized with the current date and time (Downing Downing, 1999, p. 217). Web Technologies According to W3CS standards a website built solely with HTML 5 may have cross compatibility issues across multiple web browsers. HTML5s is not always supported on all browsers, so it is one of the major drawbacks of HTML5. (Dahl, 2017) Core Web Functionalities: Navigation: The ease of access and functionality of a user navigational experience improves the initial website assessment of said user which if positive will cause the user to become a repeat customer. Search:ÂÂ   A search function could prove to be beneficial to a user in the case of Big Data.ÂÂ   The website has too large data set volumes for traditional data processing applications to handle. Readability:ÂÂ   All part of ease of access; readability is just as pivotal. A user should have a seamless time reading the content presented in all aspects. Site Map: A secondary to navigation provided to the user when said user has trouble finding specific information. Accessibility: Following the W3 standards it is important to have accessibility features so that the disabled users can also access and utilize a website successfully with features such as page magnifying, text to speech and on board keyboard. Plug-in: Plug-ins such as social media accounts and other traffic building tools add functionality to a webpage. Subscribe: Subscribing to the companys mailing list to receive the latest on the company happenings and offers to persuade user purchasing of participation. Validation: Ensuring that all vital information required for successful submission on a form is present Conditions and Privacy: It is imperative to cover the legal aspects of using a Companys services and how they may us your entered data. Speed: The speed in which a website loads relies on whether its content and media is optimized appropriately. Amazon, one of the largest online retail stores utilizing the Search Box function. Same retailer, Amazon utilizing structured navigation with the added user ability of headings and sub-headings. Information Security Vacca (2014) defines Information as data that we can organize and process and store distributive or centrally. Any company large or small, data is the most valuable asset and must be securely protected. In terms of the Customers, a data breach could result in the loss of financial information in the form of credit card information and other crucial details. Consumers may lose faith and credibility in the Company for data lose which in turn could cause the total demise of the Company. It is imperative Swagger Distributions has a well conceived plan ofÂÂ   attack and also a preventive plan as well. This past year, half of organizations suffered multiple levels of security incidents. It is recommended that a centralized security team be hired. This team will be responsible for coordinating and executing the security plans. In keeping with a Central Security Team concept there should be a dedicated Security Monitoring team keeping real time track of Applications that has access to Swagger Distributions Data. Statically, hackers attack through the least secure Applications (Vacca, 2014, p. 3); making it easier to corrupt and steal sensitive information. This Monitoring team will report directly to the head of the Central Security Team. One of the largest data break-ins in history (Consumers International, 2015, p. 417); Sony Play Station Network was hacked April 2011. Consumers International (2015) reported the attack is speculated to be an external intrusion that caused the reveal of reported 77 million user accounts information. This information included names, birthdays, email addresses, passwords, security questions, and credit card credentials, of all Play Station Network users. The hack was reportedly caused by an unknown weakness (Consumers International, 2015, p. 418). In Sonys Network causing Sony to temporarily shut down their Network to investigate. References Consumers International (2015). Consumers in the Information Society: Access, Fairness and Representation. Consumers International. Dahl, D. (2017). Multimodal Interaction with W3C Standards. Springer. Downing, D. A., Downing, D. (1999). Computer programming in java, the easy way. New York, NY, United States: Barrons Educational Series Inc.,U.S. Microsoft (2017a). Microsoft A Beginners Guide to Visio. . Retrieved from : https://support.office.com/en-us/article/A-beginner-s-guide-to-Visio-bc1605de-d9f3-4c3a-970c-19876386047c Microsoft. (2017b). Support. Retrieved from Microsoft Blog, https://support.office.com/en-us/article/Specify-how-data-displays-by-using-custom-formatting-a5e5bcde-85da-4c7a-8164-1fe286636668?ui=en-USrs=en-USad=US Tomsho, G., Tittel, E., Johnson, D. (2015). Guide to networking essentials (7th ed.). United States: Thomson/Course Technology. Vacca, J. R. (2014). Computer and information security handbook (2nd ed.). Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier.

Thursday, October 24, 2019

Columbus?s Arrival :: Christopher Columbus Essays

Columbus’s Arrival A lot of people would agree that Christopher Columbus was the founder of and first to discover America. On the other hand, people have come to the conclusion that Christopher Columbus was the worst thing that could have ever happened to America. This is the question were trying to find, would it have been better if he never even discovered this unexplored continent? Through all of my research and interviews I’ve come to this conclusion. There are to many good and bad arguments dealing with Columbus, too many to even make my own decision but here are a few things that other people in my generation have to say. Before Christopher Columbus came, life in this unexplored territory was vast and extremely empty except for the native Americans that inhabited a few separated acres of this continent. They were here before anybody they had discovered Cuba, the west coast and even the Pacific Coast of California. Life was plain and simple for the Natives, they had adequate amounts of food and water they had treatments for almost all diseases they were just fine and dandy except for the occasional tribal war over land. Soon that life was about to change and all credit is given by most to Christopher Columbus.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"First of all he never even reached America, he landed in Cuba. Second he, not personally, was the reason for thousands of Native Americans deaths†. Indigo Rodriguez. â€Å"He brought over so many diseases that there really was no chance for the natives to survive.† Cort Zimmerman. His arrival brought so many horrific things but the one that really caught my attention from what people said was that of the forcing of the Christian religion on the natives. The Spanish (Columbus), came over with a mentality of, our religion is the only one that will lead you to heaven so either you convert or we’ll kill you.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"I’m sorry to say this but if things didn’t happen the way they did, society and religion wouldn’t be as prosperous as it is today. We could still be learning how electricity works if it weren’t for him†¦ This county might not even of turned out Democratic, the Russians could of got here first and actually of prospered with a communist society.† Dimitri Boyd. I asked people of what they thought of science and evolution and the response from a majority was that of â€Å"I’m all for it, I wouldn’t have such a cool car if it wasn’t for science. Columbus?s Arrival :: Christopher Columbus Essays Columbus’s Arrival A lot of people would agree that Christopher Columbus was the founder of and first to discover America. On the other hand, people have come to the conclusion that Christopher Columbus was the worst thing that could have ever happened to America. This is the question were trying to find, would it have been better if he never even discovered this unexplored continent? Through all of my research and interviews I’ve come to this conclusion. There are to many good and bad arguments dealing with Columbus, too many to even make my own decision but here are a few things that other people in my generation have to say. Before Christopher Columbus came, life in this unexplored territory was vast and extremely empty except for the native Americans that inhabited a few separated acres of this continent. They were here before anybody they had discovered Cuba, the west coast and even the Pacific Coast of California. Life was plain and simple for the Natives, they had adequate amounts of food and water they had treatments for almost all diseases they were just fine and dandy except for the occasional tribal war over land. Soon that life was about to change and all credit is given by most to Christopher Columbus.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"First of all he never even reached America, he landed in Cuba. Second he, not personally, was the reason for thousands of Native Americans deaths†. Indigo Rodriguez. â€Å"He brought over so many diseases that there really was no chance for the natives to survive.† Cort Zimmerman. His arrival brought so many horrific things but the one that really caught my attention from what people said was that of the forcing of the Christian religion on the natives. The Spanish (Columbus), came over with a mentality of, our religion is the only one that will lead you to heaven so either you convert or we’ll kill you.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"I’m sorry to say this but if things didn’t happen the way they did, society and religion wouldn’t be as prosperous as it is today. We could still be learning how electricity works if it weren’t for him†¦ This county might not even of turned out Democratic, the Russians could of got here first and actually of prospered with a communist society.† Dimitri Boyd. I asked people of what they thought of science and evolution and the response from a majority was that of â€Å"I’m all for it, I wouldn’t have such a cool car if it wasn’t for science.

Wednesday, October 23, 2019

The Re-Occupation of Rhineland

This source is suggesting that Hitler was only sending troops to his land which already belongs to Germany. He had right to do this as if you have a garden you are allowed to go there. We can agree with this source because the Rhineland was part of Germany but it had been demilitarised under the Treaty off Versailles. Many people felt the Treaty was unfair and harsh on Germany. Hitler’s actions were reasonable as he was not invading another country.Some people thought though it was breaking the Treaty but doesn’t mean it is going to lead to war. Some of the British also support and hostile to fascist Hitler because they were more concerned about communist Stalin’s Russia. People also thought to believe that Hitler was a peaceful man who wants peace and not a threat to the Britain. British people also trusted Hitler because they made a naval Agreement with him in 1935. They took far more notice of Hitler’s promises.It is reliable because the source is from a British politician so he would know the position of the government and why they have taken no action over the breaking of the Treaty of Versailles. He is trying to explain to the public why the government has taken no action against Hitler. He is trying to justify the government’s decision to do nothing. However the source is not valid because there were lots of other reasons why Britain didn’t oppose against Hitler.Economic trouble during the early 1930s meant Britain had reduced their spending on Arms and their military. Previous to the remilitarisation of the Rhineland, Britain had followed a policy of disarmament which left them vulnerable. Britain believed that even combined with France, they did not have enough power to overcome Germany, not only that but also that they had already met to discuss the possibility of future remilitarisation but had decided against taking any action should it occur.Britain's first priority was to protect their Empire therefore a W ar was not in their best interests as it would mean that the Navy would have to concentrate on other countries instead of the Empire. The policy of appeasement meant Britain wished to avoid War, and the fear that a possible European War could occur also prevented them from conflict as this would help to form an alliance between two powerful fascist leaders, Hitler and Mussolini which was a dangerous risk that Britain was not prepared to take.Britain was also concerned about with the actions of Japan and Mussolini’s invasion of Abyssinia. Overall nobody wanted another war because people could still remember the casualties of First World War. Finally I don’t agree with what this source is suggesting was the main reason that British did not oppose Hitler’s remilitarisation Rhineland in 1936. As we know this source is reliable because many people in Britain at the time thought Hitler was a man of peace and he is only sending troops to Rhineland which belongs to Germ any anyway.However the reason is not completely valid. So with the benefit of hindsight we also know so many things that many public didn’t know at that time. As I mentioned above Britain was behind on rearming. They were more concerned about Mussolini’s invasion of Abyssinia. Britain was also going through economic depression as the America’s Wall Street crashed in 1929. Finally there was a little Britain could do to Stop Germany because nobody wanted another war at any cost.

Tuesday, October 22, 2019

How to Write a Book About Your Life 10 Easy Steps to Tell Your Story

How to Write a Book About Your Life 10 Easy Steps to Tell Your Story How to Write a Book About Your Life: 10 Easy Steps to Tell Your Story Do you have an amazing life story you want to know how to write your life story, whether its just for you or so others can learn from you?Writing your life story is a bit of a different process from writing a novel or even writing about someone else.This is your story; rather than developing characters for a made-up story, it’s your personal life you are sharing with readers.It’s a very vulnerable- and worthwhile- form of writing.If you have an incredible true story to tell about your life but aren’t sure where to start on how to write your life story, we can help.Here are the steps for writing a book about your life:Start by journaling or free-writingOutline and organize your notesPick a nonfiction genre to write inResearch for accuracyIdentify characters and perspectiveAdd speculationDetermine the settingRemember the dialoguePrepare for negative pushbackCommit to finishingNOTE: If youre ready to start writing about your lifeand publish your influential story, c heck out our VIP Self-Publishing Program where weve helped thousands do the same, successfully. Learn more about it hereWhy Write a Story About Your LifeMany people think they need to do something massive or be famous in order to write about their livesThats not true at all.In fact, more people can relate to regular, non-famous people and their struggles than they can those who have been in the limelight.The reason writing about your life is important is because you have a story. You have something worth sharing that can actually change the lives of others through your trials and tribulations.Even if youre not ready to write a memoir, you still have something valuable to share- knowledge gained through the years or maybe you just experienced a short, influential event in your life that you believe can help other.No matter what that story is, you can and you should tell it. How to Write a Book About Your Life in 10 Simple StepsSo youve discovered you have something to share with the worldbut what you dont know is how the heck to make it happen.Here are our top tips for writing your life story.#1 Journaling and Free-writingTake a few minutes to free write or journal each day, focusing on one memory. A good writing prompt for this free-write session is to write about a significant 24 hours in your life. This is just to help you get started. The memories written down from this significant moment in your life will be use later to build upon to create your nonfiction narrative.Even if you don’t ultimately use this particular memory in your overall narrative, getting into the habit of writing down memories will benefit you as a writer and help keep those memories fresh.Still feeling stuck? Explore using a nonfiction writing prompt to help you get started.#2 Outline and organizeAfter you’ve written down a variety of memories- whether they’re a part of an overall narrative or a collection of essays- they now need to be organized into a coherent s tory in order to actually write it.Since you’re writing your life story, technically the plotline is already there; it just has to be written down and organized in a manner that will speak to your audience.However, if you are the more organized type and not a â€Å"pantster† like other writers, outlining what memories you want to include in your life story may help get the writing juices flowing.Not only can an outline help you get clear on the message and order youll write your book, it can also help you form writing goals that will set up a writing habit. These are two keys to actually finishing your book.Other writers struggle with writing unless they have an outline or book template, even if it’s a book outline of their own life. It all depends on you, the writer.We have a great video detailing how to outline a book you can check out right here to find a method that works best for you: #3 Pick your genreâ€Å"Creative nonï ¬ ction has become the most pop ular genre in the literary and publishing communities.† Lee Gutkind, What is Creative Nonfiction?There are several book genres that fall under the nonfiction genre: memoirs, essay collections, autobiographies, motivational books, and more.Since you are writing a book about your life, it might feel like you have to put it in the memoir genre, but thats not always the case.In fact, it might hurt your book sales to mislabel your book as a memoir when its actually more of a self-help in a specific category.An example of this is While We Slept by our own coach here at Self-Publishing School, Marcy Pusey.While this author does label this book as a memoir, it also fits in several other categories. These Amazon categories will help you 1) reach a wider audience and 2) help you tell the story in a way that will speak to those readers.If youre struggling to decide whether your book about your life is a memoir or autobiography, this can help:The main difference between memoirs and autob iographies are their focus. Memoirs focus primarily on one specific time, or â€Å"memory† of one’s life, like a battle with a disease, traveling to a foreign country, or adopting a special pet.Autobiographies, or â€Å"biographies of oneself,† focus primarily on your entire life from start to finish- from when you were born until you die, or at least until the current moment in your life with details about achievements or notable moments.Autobiographies also tend to be a bit more factual than creative, though there have been some very well written autobiographies published.What if neither of these makes sense for my book about my life?Maybe you don’t have a specific period in you want to focus on, but don’t necessarily want to tell your entire life story from start to finish. This is where a collection of personal and/or lyrical essays may be more of your style.Think Mindy Kaling’s Is Everyone Hanging Out Without Me? and Why Not Me? Kaling is still telling her life story, or at least memorable moments in her life story, without necessarily being one complete narrative. Collections of personal essays are like the nonfiction version of a collection of short stories.If you are still uncertain about which nonfiction subgenre to write your life story in, this is a major topic covered in the Self-Publishing School VIP course. They take you through choosing your categories that will help your book sell the most.#4 ResearchRegardless of how you begin writing your life story- with free-writing or outlining- research can help you build on memories to create a fuller story and establish you as a credible writer.Memories are fickle, and we don’t always remember things correctly, especially if you are writing about something that happened many years ago.Researching for a book can seem like a daunting task. In fact, out of all the research you’ll end up doing, only a very small percentage will end up in your story. I n order to find that small percentage, however, you need to do your research.Here are some tips for book research when writing a book about your life:List memories or facts youre not 100% certain aboutAsk family members or others close to you for detailsGet quotes from those people if necessaryWhen writing and you come across something you need to research, simply make a note to research and keep writing so you can write faster#5 Identify characters and perspectiveThe people you have met in your life influenced you in some way, and as such, they will influence how you write your life story as well.Here are some tips to organize these characters for your story:Make a list of people, also known as characters in this case, who you want to include in your storyWrite down their description: physical appearance, age, background,Write down their relationship to you (and if youre close or distant to them)Check out this character bio template from Selfpublishing.com to help flesh these deta ils outThis will assist you in describing them in your narrative through the rule of show dont tell, that way readers can visualize them and understand how they affected your life personally.The only thing you may have to alter is a character’s real name, or names. Changing names can protect a person’s true identity in their story. Unless you have permission to use someone’s true name, change it and include a disclaimer at the beginning of your story. Make a note in your character list of names you change, that way you can keep track of who’s who.Also, just because this is your life story- so technically, it’s told from your point-of-view- doesn’t mean you can’t explore the perspectives of the other characters in your story.Keeping other character’s point-of-view in mind will give your story more dimension, and will help you to avoid a one-sided, train-of-thought narrative.#6 Add speculationUse speculation to fill in gaps in y our life story. Not sure if one of your character’s motivations? Is your memory of the event a bit foggy? Using what you already know, combined with the research you’ve conducted, speculate to the best of your ability.Here is an example of writing speculation:I am not sure why my parents chose to end their marriage after 15 years together. They were always private people, and after their brief announcement to me about their separation, neither of them spoke a word to me about it ever again. Perhaps they were trying to spare me the heartache of the ordeal. I often wonder if my fathers time in the service made him distant from mother; that was the case with me. Maybe my mother, like me, became lonely as a result of that.Words and phrases like perhaps, maybe, and I wonder if show your reader that you, the narrator, are speculating.Try to find creative ways to speculate, as well. You are, in a sense, still telling a true story; youre using what you know to create a hypothe sis about something that is still a mystery to you.If you were to claim this hypothesis were true without facts to back it up, you could get end up in trouble.#7 Determine the settingReaders want to know where your life story took place, or the setting. Like fiction, you need to consider how the setting of this story affected you as a person.Here are some questions to help you discover the setting of your book:Where was this place?What did it look like?Did you enjoy living/visiting there?Do you remember any smells from the area?What was the culture like there?Were you a spectator of that culture or immersed in it?How did the setting contribute to your experience?What mood did that setting elicit?Details like these affected your life tremendously- maybe more than you realize- and therefore must be included in your narrative, just as they would be if this was a fictional story.Not only that, but this helps paint a much clearer picture for your readers and creates a more entertaining experience.#8 Remember the dialogueEven if youre writing a nonfiction book, the dialogue is still crucial.When you forget to write dialoguethe book can end up reading like a very boring textbook.Dialogue is what gives the writing- and the story itself- life.But that leaves the challenge of writing accurate dialogue. Unless you used a tape recorder or video to record a conversation, chances are you’re not going to recall previous conversations word-for-word.Just write down what you remember to the best of your ability, and paraphrase if you must. If you are still on good terms with the person you’re speaking within your memory, try contacting them to be sure that their memory of the conversation is similar to yours. You can even ask them to approve any written dialogue thats in quotes if its not 100% accurate to what was really said.Write dialogue the same way it would be used in a fiction book and remember to use correct dialogue formatting and tags.#9 Prepare for ne gative pushbackNot all of us have sweet stories with cute pets. Sometimes our memories and experiences are on the dark side- for example, The Kiss by Kathryn Harrison.This memoir focuses on the time in the author’s life where she has a sexual (and incestuous) relationship with her father. She received a huge amount of negative reactions to her story.If you are going to write and publish a personal and scandalous true story about your life, steel yourself for these kinds of negative reactions, particularly from those in your life unhappy with you telling the story to begin with.Something this is just a part of becoming an author.Nonfiction writing that isn’t dark in nature is still liable of receiving negative feedback from those who appear in the story, even if their names are changed.Some people may react simply because they were written in the story at all.#10 Commit to finishing your book!Your story can only get out into the world if you commit to not only finishin g your first draft, but publishing your book.If youre ready to commit right now, we have a FREE training to help you through the next (and often most difficult) steps.

Monday, October 21, 2019

Kevorkian essays

Kevorkian essays People dont like the prospect of sitting in their apartments alone, brewing a lethal cup of tea, possibly vomiting everything up and never being found until they are totally deteriorated. If people had a choice of having a nice, kind doctor give them an injection and sit by their bedside until they die, wouldnt that be better? crudely stated Psychologist Faye Girsch in the book titled Doctor Death by Michael Betzold. Faye Grisch supports the extremely controversial acts of assisted suicide by the famous Dr. Jack Kevorkian (37). Dr. Kevorkian, the man known as Dr. Death, has helped many patients who wanted to end their terrible suffering by assisting them in suicide with the use of lethal gases and injections. With high tech medicine routinely prolonging the agony of unstoppable diseases, such as cancer, Aids, and many other terminal diseases does the sufferer not have the right to say enough with the pain and peacefully leave this world in a humane way? Dr. Kevorkian believes this and launched a major debate in the 1990s. On one side of the issue, the media and the public looked down on the services of the now famous doctor, claiming that he is not a doctor of medicine, but a murderer of the weak and ill. On the other side is the family and friends of the dying person who wish to spend the last days with this ill individual wanting to share love and memories while the sick leaves this world in peace with out pain and suffering. Dr. Kevorkians followers believe they have a small window of opportunity while the sick individuals is still coherent to make their own decisions and their choice of euthanasia (46). Many people are raised to believe that you would burn in the heated realm of Satan for all the eternity if you were to commit such an act as suicide. Many have studied Dr. Kevorkian and believe against their own religion that he is helping these people greatly. For in ...

Sunday, October 20, 2019

Data Warehouse

Data Warehouse Abstract Data warehousing, as a means of organizing enterprise information in order for businesses to manage knowledge and benefit from the knowledge acquired from possible analysis, is a common business venture in most firms today. Gone are the days when one large and expensive supercomputer would be used to manage an entire organization’s data.Advertising We will write a custom research paper sample on Data Warehouse specifically for you for only $16.05 $11/page Learn More Today, various Central Processing Units (CPUs) are available and at the disposal of the IT team. The beauty of this scenario is that the CPUs can be used simultaneously to perform completely different, but related tasks that are part of the major task and thus completing the major task in record time. One of the many advantages of data warehousing is the fact that these systems become a central data source after consolidation, which is accessible to end users and information deriv ation becomes simpler if not straightforward. Consequently, this element increases the efficiency of business transactions, which eventually draws the line between the firms with business acumen and those without. However, one inherent disadvantage follows data warehousing and it involves data mining. Ideally, data mining is the final stage of data warehousing because at this point, it is possible to gather all possible types of relational information from the system and determine links and relationships that were not decipherable before. As a result, the accuracy of queries increases and business output increases. However, this case does not apply in practice due to a few hitches that attach to this process of data mining. First, after completing the process of data mining, only a few users in the entire enterprise can actually get to use the procedure due to the high level of specialization required in its application. In fact, the number presently oscillates at a maximum of five. Given this scenario, unsurprisingly most organizations do not see the point of paying very expensively for a process that would only be used by five people in the firm. Therefore, they pay peanuts. On the other hand, data-warehouse builders know that they require a lot of upfront capital and heavy investment in time resources upfront before coming up with a data-mining algorithm, which is infamous for its complexity. This aspect coupled with the fact that it is virtually impossible to predict the resourcefulness of a data mining infrastructure from the onset and thus decapitating the technician from having a sales pitch, makes a very bad case for data mining, and yet its importance cannot be overemphasized.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More This paper looks into several such poignant features of data warehousing and close with a few recommendations as well as forecasts into the future of data warehousing. Introduction Data warehousing is a rather new term for an old concept. In fact, it emerged in the 1990s where it was initially referred to as Decision Support System or Executive Information system. The father of data warehousing is one William Inmon and a co-innovator usually lined up beside him in reviews is Ralph Kimball. Several definitions exist to befit what has come to be accepted as data warehousing in the 21st century and these include â€Å"A Data warehouse is as organized system of enterprise data derived from multiple data sources designed primarily for decision making in the organization† (Bertman, 2005, p. 12). This definition brings out the idea of a myriad of sources of data, which is especially relevant because today, most organizations have a multiple of data sources. Moreover, it is essential in the customization of data warehousing to ensure that the data-warehousing infrastructure being set up including ETL tools (Extracti on, Transformation, Transportation and Loading solutions) are compatible with all the data sources. Additionally, the definition touches on the issue of decision making as a primary focus when establishing a data-warehousing project. A second definition is slightly brief, viz. â€Å"†¦a data warehouse is a structured repository of historic data† (Kimball, Ross, Thornthwaite, Mundy, Becker, 2008, p. 32) The author of this definition adds that it is â€Å"†¦developed in an evolutionary process by integrating data from non-integrated legacy systems† (Kimball, Ross, Thornthwaite, Mundy, Becker, 2008, p. 32).Advertising We will write a custom research paper sample on Data Warehouse specifically for you for only $16.05 $11/page Learn More This definition is attractive for its introduction of the term â€Å"integrated†, because the main idea behind data warehousing is that the information that was previously archived in a jumble is reorganized to make sense in the form of tables and even graphs depending on the presentation format preferred by the end user. At this point, it is appropriate to introduce Inmon’s definition. As the father of data ware housing, his definition has attached a legendary thrill to data warehouse builders and other experts in the field and thus it has even been used in a devolved capacity to divide data warehousing into branches. He states, â€Å"A data warehouse is a subject-oriented, integrated, time variant, and anon volatile collection of data used in strategic decision making† (Inmon, 2003, p. 34). It is important to note the usage of several definitive words that have since achieved the status of â€Å"mandatory† features of a data warehouse including subject oriented, non-volatile, time variant, and integrated. Another definition reads, â€Å"A data warehouse is an electronic storage of an organization’s historical data for the purpose of analysis a nd interpreting† (Prine, 1998, p. 54). The interesting concept introduced by this final definition is the term â€Å"historical data†, which is a very important feature of data warehouses as shall be seen in the ensuing discourse. Additionally, the tasks of analysis and interpretation mentioned by this definition are very crucial features in the business of data ware housing. The next section provides a run through the definitions of other important terms outlined within this paper. Definitions OLAP: Online Analytical Processing refers to the procedure through which multidimensional analysis occurs.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More OLTP: this term refers to a transaction system that collects business data and it is optimized for INSERT and UPDATE operations. It is highly normalized because the emphasis is on updating the system since transactions take precedence here and so the currency of the information is crucial for the relevance of the data. Data Mart: this term underscores a data structure designed for access. It is designed with the aim of enhancing end user access to information files stored in subject-order. For instance, in an organization there are numerous departments including IT, HR, Management, Finance, and Research among others. However, an organization may set up data marts on top of the hardware platform for each department, so that after data warehousing, there exists the traditional centralized data storage envisioned by the creators, but in addition to this, a next section in the architecture provides for data marts (Hackney, 2007, p. 45). These elements would in effect separate the info rmation into the relevant sub-sections based on the subject matter. ER Model: this model refers to an entry relationship model. In other words, a data modeling methodology whose aim is to normalize data by reducing redundancy. Dimensional Model: this model qualifies the data. The main goal is to improve data retrieval mechanism. It is ideal for data ware housing that is operated based on queries. A typical example would be keying in 1kg as a search term and how convoluted the results that one is likely to get would be. On the contrary, if one keys in: â€Å"1kg of soya (product) bought by Becker (customer) on 23rd November 2012 (date),† in effect, one has just introduced three dimensions- product, customer, and date. These are mutually independent and non-overlapping classifications of data (Imhoff, Galemmo, Geige, 2003, p.101). A fact underlines something that can be measured or quantified conventionally, but not always, in numerical values that can be aggregated. Star sc hema: this term refers to a technique used in data warehousing models in which one centralized fact table is used as the reference for all the dimension tables so that the keys (primary keys) from the entirety of dimension tables can flow directly into the fact table (as foreign keys of course) in which the measures are stored. The entity relationship represented diagrammatically resembles a star, hence the name. Different Types of Data Warehousing Architectures There are three main types of data warehousing architectures and these include: Data Warehouse Architecture (basic) Data Warehouse Architecture (with a Staging Area) Data Warehouse Architecture (with a staging area and a data mart) Data ware house architecture basic This structure comprises metadata, raw data, and summary data. Meta data and raw data are a classical feature of all operational systems, but the summary data makes the architecture to be a unique data warehouse material. Summaries pre-compile long operations in advance, for instance, they can grant an answer to a query on August sales (Imhoff White, 2011, p. 25). In oracle, a summary is also known as a materialized view and in term of granul-ity, it may be atomic, which is transaction oriented, lightly summarized, or highly summarized. Data Warehouse Architecture (with a Staging Area) This architectural type is relevant when there is a need to clean and process operational data before it is stored in the warehouse. This task can be done either programmatically, that is, with a program or using a staging area. A staging area simply refers to that â€Å"region of the architecture that simplifies building summaries and general warehouse management† (Jarke, Lenzerini, Vassiliou, Vassiliadis, 2003, p. 67). Data Warehouse Architecture (with a staging area and a data mart) This architecture type is ideal for the customization of a data warehouse for different groups within an organization. It adds â€Å"data marts to the staging area , where data marts are systems that are designed for a particular line of business† (Hackney, 2007, p.18). A good example is a case where a firm needs to separate inventories from sales and or purchases. At this point, it is important to introduce the concept of Business Intelligence for a better understanding of the working of database warehouses. Business intelligence covers information that is available for strategic decision making by businesses. In this setting, the data warehouse is simply the backbone or the infrastructural component (Prine, 1998, p. 39). Business intelligence includes the insight that is obtained upon the execution of a data mining analysis and other unstructured data, and this aspect explains the significance of content management systems because in an unstructured context, they organize the information logically for better analysis. When choosing a business intelligence tool, one needs to address the following considerations that advice the choice, v iz. increasing the costs, increasing the function ability, increasing the complexity of business intelligence, and decreasing the number of end users (Eliott, 2012). Interestingly, the most popular business intelligence tool is Microsoft Excel. This assertion holds due to several reasons including the fact that Ms Excel is cheap to acquire, and it is conveniently simple to use. In addition, the user does not have to worry whether the other user can decipher the information or figure out how the reports are to be interpreted (because the presentation is simple to interpret), and finally, Excel has all the functionalities that are necessary for the display of data (Barwick, 2012). Other tools include a reporting tool, which can be either custom built or commercial and it is used for the running, creation, and scheduling of operations or reports (Kimball, Ross, Thornthwaite, Mundy, Becker, 2008, p. 67). Another tool is the OLAP tool, which is a favorite amongst advanced users because it features a multidimensional perspective of findings, and finally there is the Data mining tool that is for specialized users, hence the limitation to less than five users in an entire enterprise. Overall structure The primary features of a data warehouse are better relayed in a graphical format, but this section hopes to provide a comprehensive textual explanation of the same. At the beginning end, there exists data sources, which are archived in different formats, but they are largely unorganized and very general. The idea is to get them to the other end where in an idyllic scenario they are available to end users in data marts and the users are capable of deriving this information in the form of CDs, DVDs or flash drives. In a bid to get to that end, the data has to pass through data acquisition, which refers to retrieval of information from the data sources; that is, â€Å"a set of processes and programs that extract data for the data warehouse and operational data store from the operational systems† (Imhoff, Galemmo, Geige, 2003, p. 17). At this stage, features touching on cleansing, integrating, and transformation of data stand out. Next, the data, through data delivery, is moved to the open marts and ready for harvesting. Advantages of data warehousing This process makes the data more accessible in terms of accuracy so that end users do not fumble through scores of unsorted data in order to get a response to the queries that they are seeking to answer. Consequently, it makes the process of accessing that information cheaper and more efficient. It reduces the costs of acquiring this data because the accessibility means that users do not need to spend additional resources on fruitless tasks; in addition, these resources can be expended elsewhere. Another advantage is that it increases the competitive advantage of the enterprise that integrates it into its infrastructure. The data in a data warehouse can be used in multiple scenarios including in the production of reports for log term analyses, in producing reports meant to aggregate enterprise data, and finally for producing reports that are multidimensional; for instance, a query can be lodged on the profits accrued by month, product, and branch. The information stored in a warehouse provides a basis for strategic decision-making, it is available for access, and it is consistent. Additionally, it assists in introducing an organization to the continuous changes in information within the enterprise. Finally, it helps protect the data from abusers. Disadvantages of data warehousing Data warehousing is a very costly investment, which is bound to dig into the capital pool of the enterprise that is using it. Additionally, it takes a lot of time to get the project underway and finally see it to completion and this aspect could be anywhere between two to six months. The time becomes relevant because the data-warehousing infrastructure being installed may just end up obsolete by t he time it is getting into production. The very volatile nature of business is vulnerable to this new risk because in contemporary times, even the formerly static fields like finance are susceptible to multiple changes within such a period in order to increase sales. In such a scenario, at the onset of installation, the data warehousing technique may be relevant, but at the end of the project, it may have become obsolete. It is also very worrying that colleges and other institutions are churning out new experts in data warehousing every other day and the effect that this has on the industry is horrifying because these new brains are eager to apply what they have learnt ins school, yet have not practiced and they apparently lack quality experience. Ultimately, they install data warehouses that are slow or ineffective because of sticking to ideals that may not be practical in real life scenarios. Moreover, another disadvantage is the fact that due to the efficiency of the results of d ata warehousing, organizational users may be tempted to use the data warehouse inappropriately. This scenario occurs when the data warehouse is used to replace the operational systems or reports that are normally churned out by operational systems, or in analyzing the current operational results. It is noteworthy that these two systems are not supposed to be used interchangeably; on the contrary, they should be used complimentarily. OLTP and Data Warehousing Environments Before getting to the contrasts, it is important to create a background that is relevant to this discourse. With that in mind, a data warehouse â€Å"is a relational database, which is designed for queries and analyses rather than for transaction processing† (Imhoff, Galemmo, Geige, 2003, p.111). Consequently, it is comprised of historical data as well as data from other sources or in other word, which in most cases it falls in the category of unstructured data. The surrounding environment features the follo wing components: ETL solution This component comprises the extraction, transportation loading, and transformation stages that are required for unstructured data to be cleaned and transformed into an integrated block of information. Online Analytical Processing Engine (OLAP) This component underscores the reporting and analyzing system that processes business data. It is deliberately de-normalized in order to ensure fast data retrieval. As a result, instead of the update and insert features that are commonplace for OLTP, this system features SELECT operations that are ideal for queries (Jarke, Lenzerini, Vassiliou, Vassiliadis, 2003, p. 54). A good example would be in a department store scenario where at the Point-of-Sale, which is at the cashier’s stand where he or she looks at the price list that he or she has and deducts money from customers’ credit cards; therefore, this aspect amounts to a transaction and so OLAP is not in play (Hackney, 2007, p. 39). However, if the store manager were to require a list of out-of-stock products, he would turn to the OLAP operation to retrieve that data. Client analysis tools Other tools that are used in the management of the gathering of data and the consequent delivery to business users After landscaped the environs of a data warehouse to this end, it is important to look into the founding father’s perspective, as it shall form the basis of the contrast between OLTP and Data Warehousing Environments. As per William Inmon’s definition of warehouses mentioned above, four distinguishing features come to mind: Subject oriented During operation, where operation refers to data analysis, it is possible for the data warehouse to be programmed to act based on a particular subject, for example, sale of Ferraris. In this line of thought, it is thus possible to arrive at the best customer for Ferraris in June 2012. This aspect is known as subject orientation. Integrated This feature is in reference to an organization and so it is safe to say that it is an organizational feature. At this point, it is apparent that in an organizational context, there exist various sources of data. The cumulative effect of this aspect is that the bulk of the data will be disparate and inconsistent and thus the job of ensuring that this data goes through consolidation and alignment into a sensible platform belongs to the data warehouse (Bertman, 2005, p. 41). In the course of executing this task, various challenges are expected to emerge. These challenges should meet resolution and if the data warehouse is capable of getting to such a state where they are resolved, it qualifies as an integrated data warehouse. Time variant The idea behind data warehousing is to carry out an analysis that spans a given period and the width of its scope may be infinite. This aspect explains why data warehouses contain historical data ranging back years or decades. This element is very different from Online Transaction Pro cessing (OLTP) systems, which store historical data in archives to give room for current data. On the contrary, data warehousing analysts need a large data bundles in order to glean change over time, which underscore the concept of time variance. Non volatile This feature is in reference to the stability or performance of data once it has been loaded into the data warehouse. The data warehouse should have the ability to maintain the information in the state that it was entered initially. There should not be any deletions or other alteration or else the whole information would be jumbled and inaccurate to use in the analysis of business intelligence. Contrast between OLTP and Data Warehousing Environments Workload Data warehouses accommodate ad hoc queries, which is to say that the queries they deal with are random and unexpected. The ideal system should have the capacity to perform well in a wide array of possible questions in various categories. On the other hand, OLTP systems rely on the pre definition of key concepts. It follows that applications should be specifically tuned or designed for preset applications. Data modifications Data warehouses feature a regular update of the system through the ETL process (offering extraction, transportation, transformation, and loading solutions). The same is set to run nightly or weekly depending on organizational preferences. In a bid to accomplish this goal, the enterprise employs bulk-data-modification-techniques. However, the end users do not individually update the data warehouse. On the contrary, in OLTP systems, â€Å"the end users are responsible for system updates and they do this by way of routinely issuing individual modification statements to the database warehouse; consequently, the database is always up to date† (Reddy, Rao, Srinivasu, Rikkula, 2010, p.2869). Schema design Data warehouses â€Å"use fully or partially de-normalized schemas such as the star schema for optimal query performance† (Reddy, Rao, Srinivasu, Rikkula, 2010, p.2870). On the other hand, OLTP systems use normalized schemas for optimum updates with insert and delete functionalities and data consistency because they are transactional and the accuracy of current information is very critical. Typical operations For data warehouses, the typical operation is querying. They need the capacity to scan thousands or even millions of rows simultaneously to come up with the required search result load. A good example of such a demanding query is one that is in search: for instance, finding the total sales for all the cashiers for the last month. On the other hand, OLTP systems have a lighter burden to contend with in terms of the requirements of bulk. A transactional operation scans only a handful of records at a go. For instance, retrieve the current price for this customer’s order. Historical data Due to the nature and the intended use of data warehouses, it is relevant for them to store up to decades of information in a region that is easily accessible when queries are executed. Such a structure is ideal for historical analyses. On contrary, OLTP systems are just the opposite. They store up data for at most a few weeks or months and only retain historical data as is relevant for the current transaction. Moreover, this additional historical data is stored up in archives and a special retrieval process is necessary when it becomes relevant or necessary. Hardware and I/O Considerations in Data Warehouses Scalability It is important to ensure that the data warehouse grows as the data storage grows. In a bid to warrant this element, it would be wise to choose the RDBMS and hardware platforms that are adequately structured to handle large volumes of data with the most efficacies (Kimball, Reeves, Ross, Thornthwaite, 1998, p. 90). However, this move may be a difficult task to embark on in advance when it is still not apparent what amount of data shall be stored in the data warehouse in its maturity. This realization explains why it is also advisable to approximate the amount and use it as a basis in setting up the data warehouse. Parallel Processing Support It is necessary to refrain from using one CPU as the main processor and instead use multiple CPUs each performing a related part of the task separately but simultaneously (South, 2012, p. 67). RDBMS – Hardware combination This move becomes relevant because of the physical location of the RDBMs as it is strategically placed on top of the hardware platform and this aspect may bring issues with bugs and bugs fixing (Kimball Ross, 2002, p. 26). Ebay database warehouse (structure) Oliver Ratzesberger and his team in eBay are responsible for two of the world’s larges t data warehouses. The Greenplum data warehouse that is fully equipped with a data mart is comprised of 6.5 petabytes of user data, which translates to more than 17 trillion records, and â€Å"each day, an additional 150 billion new re cords are added and this amounts to 100 days of event data (Dignan, 2010, Para.12). The ultimate goal is to reach 90-180 days of event data. The working speed of these metrics is an impressive 200 MB/node/sec of I/O. This rate further improves due to a minimized number of concurrent end users. The second data warehouse is â€Å"a teradata warehouse with two (2) petabytes of user data, which is fed by tens of thousands of production databases† (Miller, Monash, 2009, Para.6). Its speed is 140 GB/sec of I/O, or 2 GB/node/sec. By aiming at resource partitions, eBay metrics rely on the workload management software to deliver on numerous Service –Level Agreements (SLA) simultaneously. Conclusion This paper has addressed the topic of data warehousing exhaustively. It has touched on the system’s definitions, characteristics, advantages and disadvantages, contrasts with OLTP and even hardware considerations. Finally, it has concluded by looking into eBay’s data w arehousing, which is the idyllic system that most organizations throughout the globe envy and would be wise to learn from. References Barwick, H. (2012). Security, Business Iintelligence critical for Australian CIOs in 2013:  Telstyle. Retrieved from http://computerworld.co.nz/news.nsf/security/security-bi-critical-for-australian-cios-in-2013-telsyte Bertman, J. (2005). Dispelling Myths and Creating Legends: Database Intelligence  Ã‚  Groups. Retrieved from scribd.com/doc/35922990/Dispelling-Myths Dignan, L. (2010). eBays Teradata implementation headed to 20 petabytes. Retrieved from zdnet.com/blog/btl/ebays-teradata-implementation-headed-to-20-petabytes/40082 Eliott, T. (2012). Rethinking Business Intelligence: 3 Big New Old Ideas. Retrieved from http://smartdatacollective.com/timoelliott/86496/rethinking-bi-3-big-new-old-ideas Hackney, D. (2007). Picking a Data Mart Tool. Retrieved from egltd.com/dmrarchive/1997-10.pdf Imhoff, C., Galemmo, N., Geiger, J. (2003). Mastering Dat a Warehouse Design :  Relational and Dimensional Technique. Indianapolis, IN: Oxford University Press. Imhoff, C., White, C. (2011). Self-Service Business Intelligence Empowering Users to  Generate Insights. Retrieved from sas.com/resources/asset/TDWI_BestPractices.pdf Inmon, W. (2005). Building the Data Warehouse. Indianapolis, IN: Wiley. Jarke, M., Lenzerini, M., Vassiliou, Y., Vassiliadis, P. (2003). Fundamentals of Data  Warehousing (2nd edn.). New York, NY: Springer. Kimball, R., Reeves, L., Ross, M., Thornthwaite, W. (1998). Data Warehouse  Lifecycle Toolkit: Expert methods for Designing, Developing, and Deploying Data  Warehouses. Indianapolis, IN: Wiley. Kimball, R., Ross, M. (2002). The Data Warehouse Toolkit: The Complete Guide to  Dimensional Modeling (2nd edn.). Indianapolis, IN: Wiley. Kimball, R., Ross, M., Thornthwaite, W., Mundy, J., Becker, B. (2008). Data  Warehouse Toolkit: Practical Techniques for Building Data warehouse and Business Intelligen ce Systems (2nd edn.). Indianapolis, IN: Wiley. Miller, R., Monash, C. (2009). eBay’s two enormous data warehouses. Retrieved from dbms2.com/2009/04/30/ebays-two-enormous-data-warehouses/. Prine, G. (1998). Coherent Data Warehouse Initiative. London, UK: Unisys Presentations. Reddy, S., Rao, M., Srinivasu, R., Rikkula, S. (2010). Data Warehousing, Data Mining, OLAP and OLTP Technologies are Essential Elements to Support Decision-Making Process in Industries. International Journal of Computer Science and Engineering, 2(9), 2865-73. South, G. (2012). Small business: Savings lead to a Stellar business. New Zealand  Herald , 67.

Saturday, October 19, 2019

Nature in contemporary art Essay Example | Topics and Well Written Essays - 1500 words

Nature in contemporary art - Essay Example The essay "Nature in contemporary art" discusses the concepts and representations of nature in contemporary art. In situations where the form of the earth as life's foundation is laid onto nature, it personalizes truth and validity endangered by technology. As a result, many philosophers have incorporated this firm earthly groundwork as a signal of the roots with which the individual continuously seems to demand. When a polemical analysis was made by Heidegger (already a classic) of the shoes painted by Van Gogh, he was focused to the path below the shoes worn. This is because he thought, the path was taken by a peasant woman in relation to the actual shoes. This translated to the fact that it was a trail of compressed earth, of steadiness with solidity, a path which was not misleading or artificial. A representation of nature exists from where once changes it to a situation where one â€Å"shapes† it. As a result, nature exists as the "raw material" for the land art. This is as illustrated in the works of Richard Long, Walter De Maria, and Robert Smithson. In Smithson's work titled â€Å"Spiral Jetty," nature, the world, the lake and the gravels coupled with the sky are the fashioned material. This can be explained by the fact that it is as if man wanted to channel himself against nature. This circumstances resulted to a change thus realize a beautifulness that appears to be renounced to him in daily life. When Walter De Maria made his â€Å"Lightning Field† statue in the desert, he appeared to be convincing nature. to act in a given way.8 He fails to take an inactive attitude in the company of the elements, resulting to failure to signify. This is because he slightly seeks to feel what is ordinary and lively in them and to make an artistic experience of it. It is important to note that the â€Å"land art† of the 1960s and 1970s seemed to make a new attempt to come to an understanding with nature in a way similar to or at least associated with the approach of prehistoric artists.9 Artistic obligation does not always go the way of the outstanding. Smithson's quay, Long's lines and circles pegged with De Maria's lightning are considerable to the individual expecting them. Turrell's spaces appear to be homes for anybody encircled in them.10 Furthermore, they appear as vantage areas from which one might effectively take ownership of the sky. On the contrary, the wax and coal dust utilized by Eva Lootz, or Adolfo Schlosser's rod branches and skins, are natural and forms the "raw material" for their creative activity.11 As a result, they give a convinced and minimal measure of nature. For example, the breeze that sets in motion a Calder mobile, the paraffin, coal dust or wax lightly gathering on the object or on a flat surface, and the tautness of the frail determined branch constructed into one of Schlosser's pieces.12 It was noted that, in the work of all these artists in the example stated above, apart from underlining itself by its glory and seriousness, nature announces its self-effacing delicateness. With the lapse of time, the relationship between art and nature has determined creative art. This is because the beginning of nature entertained by the numerous human communities strengthened or altered this relationship. Primitive man utilized the natural elements, whereas the romantics fanatically desired to capture a nature that escaped their grasp. Friedrich's traveler staring from patronizing

Friday, October 18, 2019

SPORT Essay Example | Topics and Well Written Essays - 750 words

SPORT - Essay Example Scoring high grades is the widely known measure of a student’s success, while there are several activities in school that scholars engage in (Ripley, 2014). Institutions of higher learning forever compete to produce excellent students that are marketable in the job industry. Sport is among the extra curriculum activities that scholar take part while in school besides academics, even other children are enrolled in gaming clubs away from school. Research documents that sport is essential as a form of relaxation to a scholar, a way from books or as a physical exercise. Sports on the other hand, offer a platform for continuous learning and overall growth. Sports do not interfere with a student academic performance and thus parents should be enforcers in their children choice of extra curriculum activities? The main mission of an education center is to train scholars on various subjects such as Math, English among others. Moreover, most institutions of higher learning are equipped with facilities to promote the process of knowledge acquisition. Amanda Ripley suggests that, the world smartest countries support 100% learning activities only yet some students still perform poorly. Inclusion of a sport program has never caused harm to any student and their academic performance instead; games are best in breaking the monotony of the class-teaching set-up. The realization of the importance of extra curriculum activities by the school managers is necessary for scholars stand to reap benefits as well as the institution. Trophies and prizes won during sports competitions aren’t individualized by scholars instead displayed at the school’s reception bring pride, prestige and fame to the institution. Sponsoring sports in line with the school’s mission offers an ample environme nt for both academic and extra curriculum performance. Scholars are able to grow all round with valuable principles such teamwork, discipline and

The Life and Times of Michael K Essay Example | Topics and Well Written Essays - 1000 words

The Life and Times of Michael K - Essay Example Decolonization has transpired but the very attributes of colonialism is manifold in the tension of Black and White within the society. The Blacks in Africa and labor classes in the capitalist world have been tremendously crushed by the Whites and the capitalist classes of the society. Now among excellent writings exhibited by an array of scholars, one of the most crucial things that are to be noted is the way of obtaining freedom or to find an escape route from this state of struggle. The protagonist Michael K has been born with physical deformities and he is Black. He faces tremendous constraint in almost every aspects of living in the society with a dead mother. But facing challenges which are really not wanted in a civilized society, he never lost hope and kept ignited the fire of freedom within himself reflecting a post modern view of self liberation. Starvation has been one of the aspects through which Michael has went through and infused him with the realization of harsh realit y in the then society. It can be also regarded as a way of liberation against a life that is amalgamated with furious torment and outright negligence (Coetzee). Two anti colonial scholars Frantz Fanon and the Chinua Achebe are famous for their revolutionary writings on African context associated with colonial exploitation and freedom of the common masses from blood sucking colonial dominance and racial suppression. Their ideas will be discussed in this paper for highlighting the themes of starvation and speeches from the book, Life and times of Michael K. Frantz Fanon was a third world intellectual whose work is dedicated against colonialism with particular impact in Africa and his writings in the period of 1950s and 1960s especially Les Damnes de la terre explores the passion on the historical conditions of the anti colonial struggle. He grew up among the African slaves working in the sugar plantations and participated in the guerilla struggle against the pro Nazi French Vichy gove rnment. Fanon’s political vision is guided by the notion of European tradition of Marxist thought reflecting anti colonial dimensions. Fanon thought in lines of Marx that violent anti colonial struggle is necessary as a solution but he differed from Marx in the sense that he focused on the execution of revolution by the peasants and the social outcasts. Marx saw less potential among them. Fanon visualizes that these classes of the society are intensely subjugated by the capitalist class without receiving a minimal distribution of goods for sustaining life (Fanon, 1576). There is a continuous escalation in demand from the colonial power and in this process the common people are dragged into virulent poverty and they die of hope. In this aspect a link can be established where Coetzee metaphorically used the phrase, â€Å"It will close up as he grows older† (Coetzee, 3). This is in respect to Michael K’s physical deficiency of the mouth. Midwife stated this to the mother of Michael K giving a hope that it will heal up and deformity in Michael K’s mouth will diminish. But the deformity never diminished and it became a subject of mockery and discrimination in the society. Michael K from his very childhood has been deprived of access to essential goods and services that are necessary for maintaining a sustainable standard of living and has been subjected to mockery from time to time. Hope is not a solution. Revolution is

ECE420 Journal Report Essay Example | Topics and Well Written Essays - 250 words

ECE420 Journal Report - Essay Example It is important to use simple functions and basic algebra to achieve this goal. The curriculum also reveals that it is important to intertwine mathematical concept with real life situations. This will act as an eye opener for the children into the actual applicability of mathematics in the tangible real world (Aiken, 2009). A good example is creating a real life simulation, for example, a pharmacy. The unit also taught me that an effective teacher is one who appeals to each student individually. In essence, an effective teacher has to relate to each student on a personal level and in the process empower the child. This interaction will enable the teacher to pinpoint weaknesses relative to each child and formulate a mechanism to deal with these weaknesses at an early stage. The teacher should also engage the students in setting up class activities. These activities are primarily aimed at teaching students while at the same time keeping them entertained and excited, in the process streamlining early childhood development with the child’s development process (Aiken,

Thursday, October 17, 2019

Economics for Business Research Paper Example | Topics and Well Written Essays - 1500 words

Economics for Business - Research Paper Example With this in mind, the company has been in the forefront of creating subnotebook computer named ultra Personal Computer (UPC) which the Guiness World Records describes as "the smallest full-powered, full featured personal computer" (Oqo 2007). Unlike most of the products in the global business arena, the UPC which is offered by Oqo has not been driven by the demand of customers in the market. In fact, the creation of the product is through the company's effort of determining the evolving computing needs of the high-end clientle (Oqo 2007). Thus, the UPC is a product where the supply is generated first before demand. The demand curve for the UPC can be drawn as a downward sloping demand curve. Though the UPC is generally targeted to individuals who posses higher purchasing power through their level of disposable income, the product also appeals to the mid-level consumers who also wants mobile computing (About Us 2007). However, it should be noted that the high pricing strategy employed by Oqo is generally done to enhance the attractiveness of UPC. Thus, at a much lower price level, demand can be offset. It is also worth mentioning that UPC is a normal good because demand for it generally rises with increases in disposable income. Currently, Oqo is dealing with the rapid increase in demand for its products. The company's press release states that the company braces for demand as corporate clients has been more than eager to test the UPC (Press Releases 2007). Supply Being the pioneer in this technological innovation, Oqo has become the major supplier of UPC in the market. Thus, Oqo can be said to have a monopoly of the entire UPC market. The implication for this is the ability of the company to choose its own level of price and quantity supplied. However, it should also be noted that Oqo cannot fully exploit its power as a monopolist because of the presence of various substitutable goods like personal computers, laptops, and palm tops which are also used for the same function. Price As mentioned above, the innovativeness, quality, and image of Oqo's product commands a very high price in the market. As with any business organization in the market which invests huge capital for research and development, Oqo prices its products to compensate for these costs. The company's pricing strategy is generally putting a large premium over and above production costs. Oqo does not charge a single price for UPCs and practice price discrimination. It should be noted that the company charges different prices to each customer according to how much they are willing to pay. For example, the base price of the company's Model 2.0 has a base price of $1,499 but this can vary according to the product features and specification that the client wants to integrate in the product that he/she is going to purchase (Press Releases 2007). Production The production of UPCs are solely undertaken by Oqo which includes the assembly of components from its various suppliers. The company has a manufacturing plant where production takes place. Being a small company which is only comprised of 105 employees, it maximizes production capacity in order to cope with the burgeoning demand in the