Saturday, October 5, 2019

Psychiatric Nursing Reflective journals Essay Example | Topics and Well Written Essays - 1500 words

Psychiatric Nursing Reflective journals - Essay Example To my queries, she had just stared at me as if she was scared but today she called me up. Seizing the opportunity, I moved up. Nervously pulling me to her side and looking around to ensure that nobody was within hearing distance, she whispered in my ear. Her neighbor was plotting to kill her and her husband, it seemed. She had heard noises from her backyard which sounded like gunshots when she had been in the kitchen at home. Her movements appeared jerky and speech was not incoherent but appeared monotonous. Realizing that her suspicious and guarded nature was characteristic of her condition, paranoid schizophrenia, I pretended to be a good listener to gain her confidence. She claimed that the neighbor of around her age was attracted to her and was eyeing her sexually. Several times he had approached her for sexual favors. She had told her husband about this but he did not believe her. At times the neighbor had thrown stones at her house when she was alone and had rung the doorbell s everal times. Each time she went to the door, there would be no one. Saying all of this at one go, she quickly pushed me aside when she noticed the nursing supervisor arriving. When the supervisor had left, Mrs. Jones again strode up to me and caught my attention. She told me that her husband was a good man but he did not believe her stories and told me to keep what she told a secret. Half an hour later, Mrs. Jones did not appear to want to talk with me. When I smiled at her, she seemed to have no recognition. I was a little taken back by the stony look on her face. Her husband had told me that she was a receptionist in a hotel and very much appreciated by the others and customers. Believing that she was then well, she had stopped her treatment. He had not noticed the medicines not being taken. This had triggered this episode. She had also not kept her appointments with the psychotherapist. Anyone would have

Friday, October 4, 2019

Developing Cybersecurity Law and Policy Assignment

Developing Cybersecurity Law and Policy - Assignment Example Other sections of the Register include the presidential document, reader aid and federal register xml files. These sections guide the users who are mainly federal agencies on new regulations and prerequisite information to participate in rulemaking (GPO, 2013). The Federal Register is used by the relevant agencies to call for public participation in policy creation (Mead, 2004), as the majority of civil users bring in ideas that may not be available within federal workforce. Citizens are also in a position to keep track of current updates on cyber security laws and regulations. Daily updates ensure continuous information gathering and dissemination since cyber technology is highly dynamic (Cate, 2009). Topic 2: US Cyber Command US Cyber Command is a sub-unit in the US strategic command that was created by the Office of the Secretary of Defense in 2010. It is charged with planning, integrating, coordinating, synchronizing and directing military cyber space operations and managing fede ral information networks. This was an essential step in reinforcing the Department of Defense’s capability to remain in control of its information network reducing vulnerability to cyber warfare (Kenneally, 2001). This is especially the case since intelligence information handled in the network should remain protected for national security (Kenneally, 2001). ... The president appoints a cyber security coordinator commonly referred to as the cyber czar who is a government employee. It is necessary that this position be held by the government to control biased service by private institutions that may manipulate the information systems, hence making it more vulnerable to hackers (Kenneally, 2001). Academia may have its practice based on theoretical information, thus less flexible to the dynamics involved in cyber operations. This handicaps its efficiency in service delivery. An individual who is open-minded is the most appropriate to hold this position since they have a realistic approach to cyber security management (Kenneally, 2001). Topic 3: Renewed Interest in Public-Private Partnerships Several frameworks have been put in place to improve cyber security in both the public and private sectors. Public-private partnership is essential for effective protection of U.S assets, infrastructure and economic interest from attack on cyber activities. This kind of partnership enhances information sharing, minimizing the risks of the use of cyber facilities especially in the era of increased global connectivity. Partnership enables pooling of resources required for effective workforce education and training and investment in cyber security (Guttmann et al., 2003). Both the public and private sectors should be actively involved in policy making and setting cyber law that remains ahead of possible risks and in pace with technological developments. It is of importance to create an enabling environment that respects the privacy and civil liberties of all partners involved while at the same time enhancing optimal collaboration in

Thursday, October 3, 2019

London by William Blake with Composed upon Westminster Bridge by William Wordsworth Essay Example for Free

London by William Blake with Composed upon Westminster Bridge by William Wordsworth Essay Compare and contrast London by William Blake with Composed upon Westminster Bridge by William Wordsworth and show how each used his poetry to express his views about his life and times. Blake and Wordsworth both display different views and attitudes about the city of London in their poems. They both lived in the same era, Blake lived during the 18th and then on into the 19th century (1757- 1827) and Wordsworth also lived during the 18th and then on into the 19th century (1770- 1850). As the poems were alive in the same era of life they were both alive during the industrial revolution. This was a time when children of a very age were sent up chimneys and were made to sweep them clean. They were used because of their very small size. This turned Wordsworth and indeed Blake against London. They also didnt like other major cities in the country like Manchester, Birmingham and Liverpool. The main reason why they hated major cities, with London being the largest one was because they hated pollution. They both preferred the countryside and nature to the hustle and the bustle of Englands city environment. Both poets didnt really like what they saw around them. They were also both romantic poets. In the poem Composed upon Westminster Bridge, by William Wordsworth, the poet is expressing views towards London that are positive. This is unusual for Wordsworth as he normally was against the industrialisation of London. In the poem, Wordsworth is describing the early morning sight of London and in particular Westminster Bridge. He makes out that London looks as beautiful as the countryside without anyone awake and the major; air-polluting factories are empty and quiet. The beauty of the morning; silent, bare, Ships, towers, domes, theatres, and temples lie. A main reason, which turned both of the poets against London, was because of the factories and tall buildings, which were caused by industrialisation. They felt that it ruined the natural beauty that the country has. There is also use of different parts of speech, in particular personification. This city now doth, like a garment Also in the poem, which is a sonnet, Wordsworth tries to get the point across to the readers that anyone who doesnt see the beauty of London at this time in the day would have to be a very insensitive and not appreciate anything that was naturally beautiful in the world. Earth has not anything to show more fair: Dull would he be of soul who could pass by, a sight so touching in its majesty. Wordsworth, who was poet laureate, along with William Blake both believed in Pantheism. This meant that they both saw god in nature. In the poem London, by William Blake, the poet is expressing his real thoughts about London as a whole. That it wasnt really a nice place to be. Like William Wordsworth he didnt like London due to the fact that it had become so polluted due to industrialisation. The poem itself, contain four verses, each containing four lines in each verse. The poem is also written in doggerel style, because it is written in a crude and inartistic style. In the poem, Blake is expressing the bad details of London. His thoughts are dark and moody. He compares London to that of a battle site. And the hapless soldiers sigh. Runs in blood down palace walls. This for me sums up the exact thought of the poet, William Blake about London in general. When Blake was writing this poem, it was mid-night in London. The time of night is important in the poem as it reflects the dark and sombre mood of Blake. Right from the offset in the poem there is criticism of London, as Blake describes how the river has nowhere to go. As I wander each chartered street, near where the chartered Thames does flow. It is like the river is mapped out and has to flow exactly where it is shown on the map. This is because London has lost its natural beauty and is now so unnatural. The people who live in London are always having something to moan about, according to the Poet. This is because they are all so trapped in the City, many want to get out of London because it has become so industrialised and they want it so everything is naturally beautiful. And mark in every face I meet, Marks of weakness, marks of woe. Blake also feels trapped in London with nowhere to turn but to more factories. In every cry of every man. In every infants cry of fear, in every voice, in every ban, the mind forged manacles I hear. Blake uses different parts of speech throughout the poem. And blights with plagues the marriage hearse. An oxymoron is used here because people dont usually associate marriage with a hearse. The poets William Blake and William Wordsworth both express their own views towards London in their poetry, Blake with the dull view of London and Wordsworth with his unusual praise for London. Many different parts of speech are exercised in each poem for different reasons. But the poets give us their personal view towards London, each in a descriptive way.

Information Technology And Some Infrastructure Challenges Information Technology Essay

Information Technology And Some Infrastructure Challenges Information Technology Essay To successfully implement an information technology infrastructure into an organization, it is critical that all levels work and plan together, and that the planning performed be proactive and strategic. Some components of the infrastructure may require an upgraded or be deleted; however, some components may not. Certain information about information systems, interaction, and processes, once collected, organized, and comprehended, can form an essential component of infrastructure which will outlive many of the upgrades to equipment and software. The focus of this paper is to explain what managerial roles does information system support, how has the Internet improved supply chain problems, list and describe the components of IT infrastructure that firms need to manage, name and describe the management challenges posed by IT infrastructure, and finally define Open-Source software. Management Roles Managers continue to perform critical roles in todays organizations. They have a wide variety of responsibilities ranging from decision making, compiling data, making reports, to coordinating meetings. To understand managerial role better, we must look at both the classical and contemporary models of managerial behavior. Classical Model Henri Fayol was one of the most significant providers to modern concepts of management, having stated that the five primary functions of management were planning, organizing, coordinating, deciding, and controlling (Rushing, 2010). Fayol believed management theories could be developed and then taught. Henri Fayol proposed that it is important to have unity of command. This concept that suggests there should be only one supervisor for each person in an organization. Fayol also suggested that management is a common human activity that applies equally well to and organization as it does to a family. This type of management theory was basically unchallenged from the 1920s through 1990s. The terms associated with Fayols management theory were of a formal nature rather than describe what a manager actually does in the performance of his job (Laudon Laudon, 2006). Contemporary Models The contemporary behavioral scientists had discovered that managers do not typically behave as the classical models had first implied. Behavioral models state that actual behavior of managers appear to be less systematic, more informal, less reflective, more reactive, less well organized, and much more frivolous than students of information systems and decision making generally expected it to be (Laudon Laudon, 2006, p. 87). Analyzing managers daily behaviors, Henry Mintzberg discovered that these actions could be classified into 10 managerial roles. Managerial roles can be described expectations of duties that should be performed by a manager in an organization. Mintzberg discovered that these roles could be broken down into three categories: interpersonal, informational, and decisional. Interpersonal Roles In general, interpersonal roles will be established by the type of position you hold in an organization. For example, lower level managers will have dissimilar interpersonal roles than middle management. The Interpersonal roles of a manager can be broken down into three categories: figurehead, leader, or a liaison. Figureheads within an organization speak for their companies to the outside world and carry out symbolic duties such as passing out awards to employees (Rushing, 2010). Additionally, there are numerous administrative tasks and they are also in the public and professional limelight. As a leader you are responsible for ensuring a safe and productive environment for your employees. The development of your department and your employees lies on the figureheads shoulders and they must be able to promote growth while at the same time steering clear of conflict. As a liaison you must be prepared to correspond with others. Liaisons not only report to upper management but will have to work with peers from other factions within an organization such as vendors, and even clients. The liaison is responsible for knowing who to get in touch with to get to the bottom of any situation. Informational Roles A monitor, disseminator, and spokesperson are the three informational roles that a manager may assume (Hartman, n.d.). These informational roles are created as a result of enacting the set of interpersonal roles already described. A network of interpersonal contacts with both subordinates and individuals outside the work unit serves to establish the manager as an informational nerve center of the unit, responsible for gathering, receiving, and transmitting information that concerns members of a specific department. A manager takes on the monitor role by constantly scanning the environment for information or activities and events that may identify opportunities or threats to the organization. Much of the managers gathering of information is accomplished through the network of contacts established through the interpersonal roles. The information a manager gathers as a monitor must be evaluated and transmitted as appropriate to members of the organization. The transmittal of information by a manager activates the disseminator role. Privileged information may be disseminated to subordinates, peers, or superiors in the organization. Occasionally, a manager must take on the role of a spokesperson by speaking on behalf of the department to people inside or outside the organization. This might involve lobbying for critical resources or appealing to individuals who have influence on activities that affect the work unit (Wren, 2005). Decisional Roles Both interpersonal and informational roles are really preludes to what are often considered to be a managers most important set of roles: the decisional roles of entrepreneur, disturbance handler, resource allocator, and negotiator (Laudon Laudon, 2006). The entrepreneur role comes into action when the manager seeks to improve the work unit (Rushing, 2010). This can be accomplished by adapting new techniques to fit a particular situation or modifying old techniques to improve individual or group activity. Managers usually learn of new or innovative methods through information gathered in the monitor role. Whereas the entrepreneur role establishes the manager as the initiator of change, the disturbance handler role establishes the manager as a responder to change. Organizations, unfortunately, do not run so smoothly that managers are never called upon to respond to unwelcome pressures. In these cases, the manager is required to act quickly to bring stability back to the organization. When a manager is placed in the position of having to decide to whom and in what quantity resources will be dispensed, the resource allocator role is assumed. Resources may include money, time, power, equipment, or people. During periods of resource abund ance, this role can be easily performed by a manager. In most cases, however, organizations operate under conditions of resource scarcity; thus, decisions on the allocation of resources can be critical for the success of the work unit, division, or organization. As a decision maker, the manager must strive not only to appropriately match resources with subordinates but also to ensure that the distribution of resources is coordinated to effectively complete the task to be performed (Rushing, 2010). In addition to decisions concerning organizational changes, disturbances, and resources, the manager must enact a negotiator role. The process of negotiation is possible only when an individual has the authority to commit organizational resources. Hence, as managers move up the managerial hierarchy and obtain control over more resources, they become more involved in the negotiator role. Supply Chain Management Supply chain management (SCM) combines the art and science that goes into improving the way an organization discovers the components it needs to make a product or service and deliver it to its customers (Laudon Laudon, 2006). The idea of Supply Chain Management is built around two principal ideas. The first is that just about every product that reaches a customer represents the collective effort of multiple organizations. Together these organizations are referred as the supply chain. The second idea is that although supply chains have been around for a long time, many organizations have only paid attention to what was happening within their own organization. Few businesses understood and managed the entire chain of procedures that eventually delivered products to the final customer. The result was disorganized and often ineffective supply chains Internet and Supply Chains Supply chains in almost every business are at the start of a startling reinvention produced by the growth of the Internet. The change extends beyond performance advancements and efficiencies acquired from computerization and communication to incorporate brand new possibilities to create value. This new value results from coordinated supply chains that can extend to larger markets and shape goods and services to meet the customers needs and new products and services that adjust to the highly competitive and increasing environmental needs. The Internet alters the way in which supply chains are managed, designed and controlled. The information, choices and practices that form Supply Chain Management are shifting to the Internet, breaking old ideas and widening company boundaries. This common ground will be where entire supply chains truly can be synchronized. New unknown specialist providers of both virtual and physical activities will create their own exclusive roles in the new infrast ructure. In this ever changing environment, supply chain capabilities will be essential. But gaining those crucial competitive resources will not take place through the typical supply chain ideas of today (Challenges facing supply chain management, 2008). Internet Technology for Integrating Business Processes Information technology (IT) has always been utilized to handle exchanges of goods, services, and information between organizations. With the arrival of Internet-based business-to-business (B2B) electronic markets, on the other hand, real opportunities for online transactions have begun to open up (Samson, 2010). The emerging internet was definitely an unpredictable development. All the same, important operating criteria such as reliability, local structures and robustness always came to the fore. As a result, users had the opportunity to get access to a highly available international data network that stays operative even in case of a breakdown of some single nodes. One important aspect of globalization is concentration. As a logical consequence, international companies have to merge or to collaborate with each other to meet the requirements for a global distribution of their goods and services. In a networked economy, these enterprises are bound to unseal some parts of their IT infr astructure to allow the engaged parties an exchange of product and accounting data as well as current status information in order to sustain the supply chain. Furthermore, employees need improved business applications with enhanced functionalities to manage their all-day work. These applications replenish existing legacy systems by degrees. Long-ranging, these enhancements result in a heterogeneous network of computers and applications, as all those components require each other and have to be consolidated. In the context of integrating distributed business application systems, the vision of redundancy and robustness was not resumed consequently: A changing business environment results in new technical developments and increasing demand of IT supported execution of business processes (Needle, 2009). IT Infrastructure Information technology infrastructure can be defined as the tangible hardware used to link computers and users (Laudon Laudon, 2006). Infrastructure may include transmission media and other instruments that direct transmission paths. Infrastructure can also consist of the software that is used to send, receive, and manage transmitted signals. Additionally, infrastructure can refer to interconnecting hardware and software and not to computers and other devices that are interconnected. On the other hand, to some IT users, infrastructure is regarded as everything that maintains the continual flow and management of information. IT infrastructure today is comprised of seven major components: computer hardware platforms, operating system platforms, enterprise software applications, data management and storage, networking/telecommunications platforms, internet platforms, and consulting and system integration services (Samson, 2010). Computer Hardware Platforms The physical part of the computer is referred to as the computer hardware. This includes the digital circuitry, which is different than the computer software that executes within the hardware (Laudon Laudon, 2006). The hardware of a computer is rarely changed as compared to the computer software and data, which are soft in the sense that they are quickly created, tailored or deleted from the computer. The microprocessor is the core of any computing device. The two major companies that manufacture most microprocessing chips are Intel and Advanced Micro Devices (AMD). Standard tests of the AMD chip alongside the Intel Celeron chip have shown that the AMD chip was better in performance. Operating System Platforms An operating system is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or application programs. The application programs make use of the operating system by making requests for services through a defined application program interface (API). In addition, users can interact directly with the operating system through a user interface such as a command language or a graphical user interface (GUI) (Greer, 2009). Enterprise Software Applications The goal of enterprise software applications is to integrate applications into seamless processes throughout an organization. The two most popular applications in this group are customer relationship management and supply chain management systems. Business processes that have traditionally been optimized for internal efficiency can now add the element of superior customer service, tailored to each customer, inspiring the skills of trained agents in the call center. Back office processes are greatly improved with better information from the customer. Additionally, agents can slowly decrease the flow of paper, in favor of more efficient communication avenues such as e-mail and the web (von der Weth Starker, 2010). Data Management and Storage Organizations are collecting increasingly more data on its customers, employees, and even the organization itself. Being able to manage and storing the data so that it is readily accessible and supply meaningful information to the organization is developing into a discipline in and of itself (Laudon Laudon, 2006). Storage area networks (SANs) provide an organized, cost-effective way to combine data from across any system within the organization. Online users want direct access to data and SANs help organizations with a way to provide it. Networking/Telecommunications Platforms As we continue towards a completely digital world, networking and telecommunications platforms will begin to merge together. Instead than having a platform for networking computers and devices and a separate platform for telecommunications, we will begin to see businesses providing a combination of computers and peripheral devices, handheld PDAs telephone services, cell phone services, and wireless services all packaged together into one. A myriad of telecommunications companies have already merged with Internet service providers to provide complete digital service packages (Eren, Subasi, Coskun, 2008). Internet Platforms The Internet and subsequent technology continue to develop the services businesses are able to offer their employees, customers, suppliers, and other business partners (Laudon Laudon, 2006). Intranets and extranets constructed on Internet technologies provide businesses an easy and economical way of providing services that were extremely expensive just a few years ago. Many small and medium-sized businesses are using Web hosting services instead of purchasing new hardware necessary to support Web sites, intranets, and extranets. Its more cost effective and easier to have these service-providers manage hardware, software, and security issues, leaving the organization to concentrate on its primary processes. Consulting and System Integration Services Systems used in many large organizations are so complicated that its almost impossible to manage them by alone. Integration services offered by the companies like IBM and Hewlett-Packard are essential in keeping up with all the changes. In various ways it makes more sense for a company like Nike to focus on its core processes of making sports apparel and let a company like IBM take care of the technology issues. These services become more vital as many organizations combine their old legacy systems with newer technologies such as wireless networking. The old legacy systems merely cant be thrown away but must work flawlessly with todays newest technologies. Some organizations prefer not to completely replace legacy systems because its not cost effective, requires large amounts of training, and causes too much change in the organization. Its simpler to use middleware and other technologies to combine new and old systems (Schmidt, Otto, Osterle, 2010). Management Challenges Developing and managing a sound IT infrastructure raises multiple challenges: making wise infrastructure investments, coordinating infrastructure components, dealing with scalability and technology changes, and management and governance. Infrastructure Investments Just like investments in home remodeling often fail to provide a significant return on investment (ROI), it is frequently the case with investments in superior IT infrastructure components. IT Managers are constantly under the gun to decrease costs in order to fund new projects or to meet cost-reduction goals. Managers should make decisions to prevent overspending on component parts of the organizations computer systems. For example, high reliability storage, will offer little value if matched with servers or network connections of lower reliability. A string of high reliability components may surpass the necessities of the service they support. Any time the performance of any component notably goes above the requirements the incremental savings is pointless (Laudon Laudon, 2006). Coordinating Infrastructure Components Todays organizations develop IT infrastructures by choosing a variety of wholesalers, people, and technology services and fit them together so that they work as a whole (Samson, 2010). Because each part of the whole IT infrastructure has its own priorities, managing them collectively can be quite difficult. Some components of infrastructure will need to be upgraded or are subject to upgrade or replaced, as is with most components of computing systems. However, some components are not. Specific information about information systems and associated processes can form an essential component of infrastructure which will outlive many upgrades of equipment or software. Dealing with Scalability and Technology Changes In general terms, scalability refers to the ability of a system to maintain, if not improve, its average performance as the number of clients grows (Laudon Laudon, 2006). As an organization continues to grow, it can quickly out grow its infrastructure. On the other hand, if an organization downsizes, they may be stuck with an infrastructure that is too big and expensive to keep running. Every component of the infrastructure has some kind of management or operational overhead associated. Therefore, it is imperative that the organization recognizes these changes and takes appropriate actions to keep the organization moving forward. Management and Governance One of the most vital tasks for successful information management is developing the business governance over its program and related projects (Wren, 2005). Governance will apply a priority to the often-conflicting organizational pressures. It will take organizational plans and goals and help to form them into bounded endeavors. However, many organizations battle to get their governance programs up and running. They cant acquire interest, and they are in need of ideas to discuss after the initial objective is created. Information Systems and Ethical Issues Information systems introduce new and often complex ethical issues (Carroll Buchholtz, 2006). This is very true today because of the challenges created by the Internet and e-commerce to the safeguard of privacy and intellectual property. New ethical issues caused by vast use of information systems include creating accountability for the consequences of information systems, establishing standards to safeguard system quality that look after the safety of individuals and society, and upholding values and establishments considered vital to the quality of life in an information world. Whether you manage your own company or work in a large business, youll be facing these issues, and youll need to know how to handle them. Open-Source Software Open-source software (OSS) is computer software that is created by a cooperation of several thousand programmers worldwide (Chan Husted, 2010). Some open source software is accessible within the public domain. The term open-source software was derived as part of a marketing campaign for free software. Open-source software is based on the premise that it is superior to commercially produced proprietary software because thousands of programmers around the world working for no pay can read, perfect, distribute, and modify the source code much faster , and with more reliable results , than small teams of programmers working for a single software company (Laudon Laudon, 2006, p. 209). Advantages Open-source software experts have identified several advantages and disadvantages. The key advantage for an organization is that open-source software is an excellent way for companies to attain better market penetration. Organizations that present open-source software are able to create an industry standard and, therefore, gain an advantage over its competition. Additionally, it has helped create loyalty to the developers. In turn, the developers feel a sense of empowerment and ownership of the end product. Furthermore, less marketing and logistical services costs are required for OSS. Also, it helps organizations to keep up on of all technology developments. Another advantage is that it is an excellent tool to market an organizations image, incorporating its commercial products. The open-source software development method has produce reliable, high quality software rapidly and at a much lower cost. Likewise, it offers the promise for a more adaptable technology and quicker improveme nt. The mix of different perspectives, business objectives, and personal goals helps speed up innovation. Additionally free software can be developed in concurrence with entirely technical requirements. Open-source software does not entail considering about commercial demands that tends to degrade the software quality (Chan Husted, 2010). Disadvantages On the other hand, it can be argued that the open-source development process may not be as clear and that some system testing and documentation may be overlooked. Nonetheless this is usually only true for smaller jobs. Bigger, successful jobs tend to define and impose, as a minimum, some rules because they are needed to ensure good teamwork. In the most complex projects these rules may be as strict as reviewing even minor change by two independent developers. Even though many companies like IBM and Sun Microsystems support open source software there are no great financial interest involved.   A majority of the developers and advocates of free source software tend to believe in an unrealistic society that does not involve intellectual property rights   Therefore most of the applications are not dependable and you cannot run essential business operations on them. Another disadvantage is that once you choose to use open-source software you are on your own.   Although there is a lot of help available on the Web, there is no real skilled support available.   Basically, you have to learn how to install and use applications on your own, without damaging your data and hardware. There are no documents and manuals made available to help you since the software is being constantly being changed (Chan Husted, 2010). An additional drawback is that most of the open-source applications are not compatible with some of todays devices (Chan Husted, 2010). For example, there is no such thing as plug and play hardware when you are using open-source operating systems.   Occasionally it is hard to get modems to work with open source operating systems. Finally, technical support is more expensive compared to commercial software (Chan Husted, 2010). People who offer support for open-source software count on earning lots of money to provide support and in fact this is the only income model alleged in support of the open source software movement.

Wednesday, October 2, 2019

Data WareHouse :: Technology, Database

Being a market leader today requires competitive advantage over rival organizations. By investing in data warehouses, organizations can better predict the trends in market and offer services best suited to the needs of their customers. A Data Warehouse (DW) can be defined as a subject-oriented, non-volatile database having records over years [1,2]. DWs support the strategic decision-making process and help to answer questions such as "Who was our best customer for this item last year?"[3]. Different DW systems consists of different components, however, some core components are shared by most DW systems. The first component is the data sources. DW receives input from different data sources (such as Point-Of-Sales (POS) systems, Automated Teller Machines (ATM) in banks, checkout terminals etc). The second component is the data staging area. The data comes from data sources and it is placed in the staging area, where the data is treated with different transformations and cleansed of any anomalies. After this transformation, the data is placed in the third component which is known as storage area, which is usually a Relational Database Management System (RDBMS). This process of data extraction from data sources, transformation and finally loading in storage area is regarded as Extract, Transform and Load (ETL). The saved data from the storage can be viewed by reporting units. Different On-line Analytical Processing (OLAP) tools assist in generating reports based on the da ta saved in the storage area [4,5,6,7,8]. We believe that testing should be ingrained in DW development. Thus, each of the DW components should be tested. One of the main challenges in testing the DW systems is the fact that DW systems are different among organizations, each organization has its own DW system that conforms with its own requirements and needs, which leads to having differences between DW systems in several aspects (such as database technology, tools used, size, number of users, number of data sources, how the components are connected, etc.)[9]. Another big challenge that is faced by the DW testers is regarding the test data preparation. Making use of real data for testing purpose is a violation of citizen’s privacy laws in some countries (for example, using real data of bank accounts and other information is illegal in many countries). For a proper testing of a DW, presence of a huge amount of test data is necessary. In real-time environment, the system may behave differently in the presence of terabyt es of data [10].

Tuesday, October 1, 2019

Le Mont Saint Michel :: Architecture Descriptive History French Essays

Le Mont Saint Michel Le Mont Saint Michel is a rocky cone shaped island or islet located just off the North West coast of France in the gulf of Saint Malo. It is home to one of France’s greatest tourist attractions named Le Mereille, this brilliant eleventh century gothic style church is often simply called Mont St Michel. What transforms this fairly typical gothic church into one of the most striking buildings of the world, and the destination of so many visitors over the course of the past twelve centuries, is its magnificent, almost arrogant location. The Church of Mont Saint Michel was constructed in the eleventh century as a gothic masterpiece. It was constructed using Granite stone; however some of the cloisters are made of lime stone. The island upon which it sits is separated by approximately one kilometer of waves from the mainland at high tide. At low tide, however, it is separated from the mainland by approximately one kilometer of sand. Before a causeway was built in 1879, the only approach to the Mont was by foot over this causeway. However this crossing was no easy task and a poorly timed crossing could easily end in drowning by the sudden changing tides. The island is about one kilometer in diameter and about 80 meters high, jutting defiantly above the ocean. The steep cliffs that ascended from the crashing surf and the treacherous tides that whipped around the island, combined with the legend that it was the island where the souls of the dead congregated; make the site an unlikely place to build. Neither legends nor danger were a match for the overwhelming curiosity of a forbidden place. In the early eighth century a bishop from the near by town of Avranges named Aubert made the crossing. After finding it safe enough he started frequenting the island which seemed to be an escape from civilization for him, and a place where he could meditate un-intruded. During meditation one day on the island the archangel Michel visited Aubert and convinced him to build a church on the island. In 708 the modest chapel began construction on the island, many buildings have come to rise and fall on the island since then. The first major construction on the island started in the year 1020 and was completed in 1135. In time structural problems arose with the building, therefore in 1170 Abbot Robert de Toringy started building a new facade on the side of the church.

Hazara History Essay

1. I’ve always been against the persecution of minorities 2. It has badly affected the image of the country throughout the world 3. More than 800 Hazaras have been killed only in Pakistan during the last decade Don’t confuse HAZARA with HAZARAWAAL HAZARA: the separate Persian speaking ethnic group mostly living in Afghanistan HAZARAWAL: The people living In HAZARA District, in KHYBER PAKHTUNKHWA province of Pakistan. HINDKU is their mother tongue. Theories about their origin: The first theory suggests that they are the descendants of Mongolians and Turks; this theory is supported by some of the historians as their facial features and many parts of their language and cultures resemble to those of the Mongols and central Asian Turks. The second theory suggests that they are the descendants of KUSHANS, the ancient residents of Afghanistan, who entered the northeast Afghanistan in the 2nd century. Another one tells that HAZARA are the heirs of Genghis Khan, who in the twelfth century invaded Afghanistan and destroyed almost the whole country. Some of his army was left which mixed with the locals of Afghanistan. Their population across the world * About 4 million HAZARAS living in Afghanistan, especially in the central mountainous region known as HAZARAJAT * Another 7 to 8 Lac population living in Pakistan, mostly in Quetta, Baluchistan province of Pakistan * Around 3 Lac HAZARAs travelled to Iran in the late 19th century. The History of their Persecution: According to the CIA world fact book, HAZARAS once were the largest ethnic group of Afghanistan, constituting 67% of the total population of the country. They lived in HAZATAJAT quite independently. When Amir Abdul Rehman took over of the country, he, in his mission of expanding the circles of his rule, subjugated the local HAZARAS, killing more than 60% of their population. Others were either enslaved or forced to flee Afghanistan. Here begins the history of their migration to Pakistan. 1. In Afghanistan * Reign of Amir Abdul Rahman (1880-1901) * Rise of Taliban (1993) 2. In Pakistan * Why are they persecuted? * Theories on the reasons why they spent a long time being persecuted * The role of secret and law enforcement agencies * My comments http://www.everyculture.com/wc/Afghanistan-to-Bosnia-Herzegovina/Hazaras.html#b http://dawn.com/2012/06/29/hope-fades-away-for-hazaras-of-pakistan/ http://tribune.com.pk/story/463711/quetta-violence-three-hazaras-gunned-down-in-separate-incidents/