Monday, August 24, 2020

Dave essays

Dave papers Envision remaining on a phase, sitting above 70 layered lines in what is potentially the most delightful amphitheater on the planet. As Dave Matthews and his individual band mates stroll in front of an audience, the group cheers uncontrollably. You are at Red Rocks and the scene is set for the Dave Matthews Band. Red Rocks Amphitheater is situated in Morrison, Colorado, 15 miles west of Denver. It gives seating to 9600, and has probably the best acoustics discovered anyplace on Earth. Since 1941 it has been home to numerous shows and entertainers and is the ideal scenery for a live exhibition. Recorded on August 15, 1995, Live At Red Rocks 8.15.95 was made at the tallness of the groups melodic ability and at the base advance of their move to notoriety. It was shows like this that left fans entranced by the crazy, jazz-imbued riffs that the band played. It is this sort of enthusiastic and private unrecorded music that keeps the fans returning. The individuals from the Dave Matthews Ba nd (or DMB for short) are each extraordinary, particularly in the instruments that they play. This is the thing that makes the band and its music truly work. Dave Matthews gives lead vocals and acoustic guitar, Boyd Tinsley plays the violin, Stefan Lessard is on bass, Leroi Moore blows the woodwinds, and Carter Beauford plays the drums. Matthews is a skilled artist. He gives remarkable singing styles and a theoretical, unbalanced capacity to play the guitar. Tinsley plays the violin like no other. It is odd to discover a band with a violin, yet his ability constrains it to work. Lessard, who joined the band when he was just 16, gives out of control bass lines that fill in the unfilled spots. Leroi Moore plays woodwind, saxophone, and clarinet which blended in with present day instruments, make an odd mix of sounds, at long last Carter Beauford, known for his magnificent improvisational abilities and flawless fill-ins, illuminates the drums with an ability that couple of have. These five performers combined the evening of August 15,... <!

Saturday, August 22, 2020

Politics of Poverty and Social Welfare Policy Essay - 1

Governmental issues of Poverty and Social Welfare Policy - Essay Example Besides, class, state and race have offered shape to the manner in which political on-screen characters carried on inside and outside the administration prospects and cutoff points of state activity in the United States. In the early American history destitution exuded from the procedures of movement, triumph, and the implemented work that had went with the settlement of Europeans in North America accordingly the establishing of United States. O’Brien( 9) contends that worldwide advancement has been coordinating its endeavors in worldwide legislative issues of reducing neediness concentrating on poor people and looking for approaches that would lift them out of the subjugation of destitution, be ensured and later be redressed. This talk needs to clear route for the worldwide legislative issues of government assistance state modifying concentrating on the collusions that are required to be there between poor people and the non-poor. The worldwide neo-progressivism social arrang ement has been confronting difficulties in the ongoing occasions to the degree of being viewed as lingering wellbeing net methodology. The World Bank, IMF and other guide offices are being entrusted with disintegrating the defective supposition that issues identified with destitution could be fathomed without handling the issue of value, social consideration and the states’ job in empowering improvement ventures to benefit every social gathering. This is on the grounds that they used an increasingly administrative and order position in forcing market standards on the creating countries that are considered as poor. The â€Å"Washington Consensus† on global improvement during the 1990s was a part of the American government assistance change during the 1990s. In the ongoing occasions the countries that are as yet creating have been obliged to grasp the neoliberal-paternalistic approaches for managing their own networks that are devastated (E. O'Brien, p.20-22). A large po rtion of the government assistance states in Europe were worked for the laborers and not really the poor obliging the requirements of the white collar class by arrangement of administrations that they would be prepared to make good on charges. In Latin America and Africa, import replacement and state drove communist post provincial improvement separately brought about early stage incomplete government assistance states. These state lead techniques of improvement were tested and later crushed during the basic time of modifications. Subsequently, to reduce the issue of destitution we should guarantee the nation has advanced education, essential and city emergency clinics along with provincial centers, wage related annuities, social benefits just as move of money to poor people. In any case, somewhat an attention on the poor subverts the responsibility of the white collar class to settle charges (E. E. O'Brien, p.10-12). Guideline of regular workers in the public eye which Pierre Bourd ieu called, â€Å"the left hand† of the state is represented by general medicinal services, instruction, government disability, social lodging and social help is being outdated in the United States or enhanced in the Western Europe by a decision through its â€Å"right hand† where the courts, the police, and the jail framework re step by step getting dynamic and nosy in the social spaces’ lower locales. Most governments are attempting to undermine the new authenticity of aggressors and â€Å"active minorities† inside developing social developments that is procured through the every day battles so as to forestall further

Saturday, July 25, 2020

Is Global Warming A Threat To Security If So, Why If Not, Why Not Essay

Is Global Warming A Threat To Security If So, Why If Not, Why Not Essay Is Global Warming A Threat To Security If So, Why If Not, Why Not â€" Essay Example > 22/02/ 2011Global warmingIntroductionI agree that global warming is a treat to national security. This can be seen through three different aspects. These three major aspects give a clear demonstration of how global warming is a treat to national security. Among these aspects are variability of natural resources and increase in scarcity, intensification of natural disaster and sea level rise. Increase in scarcity of resources give more emphasis on globalization is becoming a treat to national security. The dynamics of scarcity of resources â€" in particular negative changes in per capita resource access â€" imposes more challenges on a static society (Terriff, et al 1999). Global worming after mat are unexpected or sudden climate induce events such as tropical storms, droughts and flash floods which constituted a larger threat to human security than gradual reductions in resource availability (Sheehan, 2007). Despite the mechanism that have been put in place in attempt to combat th ese calamities such as establishing costly shock-resilient buffers or robust infrastructure, financial pools the challenges of global warming is persistent (Terriff, et al 1999). Overall, the expect unpredicted events is more hazardous to the prospects of sustained peace than less rapid changes in resource availability, which in turn are likely to be more harmful than a stable but scarce resource base (Terriff, et al 1999). What has become more crucial over the recent past is the vulnerability and adaptive capacity of affected societies and determining whether armed conflict is a potential end result of worsening climatic conditions (Sheehan, 2007). A summarize on prevailing evidence on how climate change is expected to affect the national security can be broadly illustrated in the three environmental phenomena as below. Resource scarcityChanges in climate have adverse security implication on availability of resources necessary to sustained livelihood through its effects (Sheehan, 2007). In line with common practice, scarcity is defined as low per-capita access to a resource (Dannreuther, 2007). The scarcity of resources is referred to low availability of renewable resources per capita such as freshwater (Terriff, et al 1999). The dwindling resource is increasing the scarcity of resources and the consequence of either one (or both) of the two processes is the increased demand for the resource through increased population (Sheehan, 2007). What constitutes greatest challenge to human livelihood is the high level of unpredictability rather than increasing scarcity which is generally regarded as more harmful than scarcity per se (Terriff, et al 1999). According to AR4 report and other recent studies that bear the same similarities on the environment impacts on national security, climate changes vary enormously between regions (Sheehan, 2007). According to AR4 report some regions are likely to benefit from an increase in average temperature (Dannreuther, 2007). A good example is Northern Europe which expected increased crop yields when climate changes; global warming (Sheehan, 2007). This is in contrast to the rest of the world global warming. Northern Europe have experience an increased in forest growth, decreased energy demand for heating, and reduced mortality from cold exposure (Terriff, et al 1999). What is happening in the rest of the world is contrary, most parts of the world including the most densely populated regions, face a grimmer future (Houghton, 2004). As result of temperature increase precipitation patterns changes causing an overall reduction in annual rainfall (Terriff, et al 1999). More implications to subsistence resources are crucial since it become more and more scarce (Sheehan, 2007). The recent report given by AR4 predicts a rise in the regions mid-latitudes by 2050 and reduction of 10â€"30% in average water availability and river runoff in dry tropics and (Dannreuther, 2007). The consumption of ground water is li kely to exacerbate in many areas which may negatively impact on aquifers. The aquifers are likely to be contaminated or depleted which will result in further reduction freshwater supply (Sheehan, 2007). The implication of warmer climate in region like Himalayas, the Andes is the melting of glaciers and several other major sources of water in the dry season for large sections of the developing world (Terriff, et al 1999). The extreme precipitation increases top soil leading to infertility of the land hence reduction in food production (Maslin 2007). Evaporation is also perceived as major contributing factor to desertification (Terriff, et al 1999). The impact of climate changes on agricultural output varies according to form of agriculture (Sheehan, 2007). The warmer climate is likely to tape off the yield of rain fed harvest especially in dry land (Terriff, et al 1999). On the other hand the returns from irrigated crops might increase with moderate warming. The substantially more robust against further temperature rise with is likely consequences such as less reliable precipitation patterns (Sheehan, 2007). According to Dannreuther, (2007) a tropical climate is already a great impediment to agricultural productivity through the unsuitability of tropical soil to large-scale mechanized farming and the high disease burden (Sheehan, 2007).

Friday, May 22, 2020

The Importance of Working Together in Groups and Teams Essay

The Importance of Working Together in Groups and Teams Realizing that a group can become a high performance team is important. Accomplishing this goal is invaluable, advantageous and profitable. Once able to operate from a group to the high performing team is a great step into preparation into the big business world. Leaders and members must also realize not only how to accomplish this but that some problems will and can arise from different demographic characteristics and cultural diversity. That is if one is in such a group, which the probability would be quite high. It is important that members of a group be knowledgeable and skillful in their positions, the degree to which those members can work harmoniously and cooperatively†¦show more content†¦Diversity in culture and demographic characteristics can be a negative impact or be one of the teams greatest strengths, depending on how the team as a whole functions and applies these different â€Å"routes to success†. A group can become a high performing team by understanding how cultural and demographic differences influence group behavior. The groups must realize that they can benefit from their diversity to their advantage and into a high performance team. â€Å"When differences are regarded as valued resources, as in a truly inclusive environment, individual and group differences no longer need to be suppressed†¦ An inclusive organization culture enables contributions from a broader range of styles, perspectives and skills, providing a greater range of available routes to success.† Miller, 1998 Once people can mesh well into a great high-performance team, they will fit right into the business world. As todays extremely competitive and ever changing, business world is not meant for the slow growing or for the unprepared. It is now the goal of every organization to create a high performance organization. The high performance business is the one that can create a balance between performance, quality, customer relations and profitability. High performance organizations need high performance team savvy employees. Why is this? It is because; highShow MoreRelatedThe Importance Of Collaboration And Team Working Among Different Professions1677 Words   |  7 PagesThe aim of this essay is to evaluate the importance of collaboration and team working among different professions in the health care. This demonstrates the main issues that reduce the effectiveness of the collaborative working. Moreover, the importance of maintaining partnership with the patient and their cares in the car e planning and care delivery, and how it improves quality of health care services are discussed. This essay also demonstrates the skills and knowledge needed to improve the collaborativeRead MoreHcs 325 Essay1056 Words   |  5 PagesWeek - 3 Importance of Teams Murugareddy Pattiputtur University of Phoenix HCS/325 Dawn Sienkiewicz November 10, 2012 Abstract Teams are formed when individuals with a common taste, preference, liking, and attitude come and work together for a common goal. Teams play a very important role in organizations as well as our personal lives. Teamwork is essential for competing in todays global arena, where individual perfection is not as desirable as a high level of collective performanceRead MoreReflection Paper On Team Building976 Words   |  4 Pageslearning about teams and team building. This class will provide you with the knowledge and skillsets to be able to complete tasks given by an organization as a team. First we will discuss what a team is, what they consist of and how they are broken down, the knowledge, skills, and attitudes (KSAs) that are needed, how to conduct team building activities, and barriers that can keep a team from completing their tasks. When you think of a team, what comes to mind? For some, it might be sports teams, the militaryRead MoreThe Importance of Team Communication Essay1310 Words   |  6 PagesThe Importance 1 Running head: THE IMPORTANCE OF TEAM COMMUNICATION The Importance of Team Communication The Importance 2 Abstract This paper will discuss the importance of effective communication among teams whether in a professional or educational setting. The intended information will create a broader understanding of how team members establish communication: assigning a leader, what each member is expected to do in order to achieve the desired goal or goals and attainRead MoreTeamwork Is Essential For Business Success1591 Words   |  7 PagesIntroduction: Teams: â€Å"A group whose individual efforts result in a performance that is greater than the sum of individual efforts (Loura ,lecture slides).The team has joint, specific ‘collective work-products’ such as experiments, reports, products, etc. An example can be your course work based on a team-based project† (David Knights, Hugh Willmott, 2007, p.120).The question arise is that is teams are important to the organisations; the answer is yes; because organisations are much more likely toRead MoreImportance of Teams833 Words   |  4 PagesImportance of Teams Christina DeBruyn HCS/325 June 9, 2013 Joan Ralph Webber Importance of Teams In my organization teams serve several purposes. The workload is not only divided between capable members, also allowing new ideas, and a steady stream of how things will be complete. In a health care office setting, inside may be three to four individuals, which these three to four people make a team. An office that has a team have a much better chance of finding errors or data entry mistakesRead MoreThe Relationship Between Nursing And Health Care1680 Words   |  7 Pagesof cohesion among groups, and the importance of cohesion in the functioning of nursing teams and interprofessional teams. Throughout the discussion, the main focus is placed on how cohesion affects job satisfaction in nursing, the quality of care provided by nurses, and turnover of registered nurses. The Term ‘Team’ in Relation to Nursing and Health Care The concept ‘team’ is generally described as two or more individuals, each with their own role and function, working together toward a common goalRead MoreThe Importance of Workplace Diversity in an Organization1092 Words   |  5 PagesHead: THE IMPORTANCE OF WORK PLACE DIVERSITY IN AN ORGANIZATION The Importance of Workplace Diversity in an Organization Gina Cazeau/MGT 307/Week4/May2009 University of Phoenix/Professor R. Cullivan Abstract This paper will define a team and a group, and the difference between the two. It will also examine the importance of workplaceRead MoreEssay about The Importance of Teamwork1128 Words   |  5 PagesThe Importance of Teamwork In this assignment I am going to look at teamwork and important it is, also linking it in with how vital teamwork is in the modern Public Services. To do this I will be looking into the main theorists and their guidelines for a team to work well and to be efficient. Teamwork is a group/ team of people working towards a common goal or target. Bill Gates describes teamwork as ‘A group with a common goal’. The advantages ofRead MoreThe Importance Of Interprofessional Working As Well As Discuss Barriers And Facilitators For Team Working1385 Words   |  6 PagesThe issue of interprofessional working is currently one of key importance in the field of health and social care (Moyneux, 2001). Using the 6 stages of Gibb’s Reflective cycle (1988) I am going to demonstrate my understanding and explore the importance of interprofessional working as well as discuss barriers and facilitators for team working. A healthcare system that supports effective teamwork can improve the quality of patient care, enhance patient safety and reduce workloads that cause burnout

Friday, May 8, 2020

Thesis Statement For Romeo And Juliet Essay - 776 Words

Romeo and Juliet , written by Shakespeare, is a novel about two teenagers, Romeo and Juliet, who came from feuding families and fell in love against their parents’ wishes. The adolescents belong to the Capulets and the Montagues which are the two rival families in Verona. In the novel during Act 3 scene 1, Mercutio, who is Romeo’s friend, got in a brawl with Tybalt, Juliet’s cousin. The result of the fight left Mercutio dead and Tybalt considered a murderer. Mercutio’s last words before his death were â€Å"A plague a’ both your houses!† (3.1.88.) Both families, the Capulets and the Montagues were at fault for the death of Mercutio. {{The last sentence of the introduction should address the prompt directly, this is your thesis statement.†¦show more content†¦Mercutio, who was a strong believer that no man should back down from a fight and shouldn’t tolerate insults, fought with Tybalt instead of Romeo, getting killed in the end. Another reason why the Capulets were at fault, is that Tybalt entered the scene of the argument full of pride, anger and arrogance. He approached the other men, saying to his followers, â€Å"Follow me close, for I will speak to them† (3.1.34.) This quote displays how he told his entourage to look up to him and listen closely as he speaks, as if he were the president, and they were the news reporters. Tybalt then proceeded to mock Romeo and made it seem that he is above and better than all of the Montagues. Tybalt tried to start a fight with a Romeo, but ended up fighting Mercutio and killing him instead. Even though Tybalt, who came from the Capulets, was the one who killed Mercutio, both families were responsible for the death. Mercutio’s last words portray that his death was Romeo’s fault, as much as Tybalt’s fault, for closing the gap between the two rival families. In Act 3 Scene 1, Tybalt called Romeo a villain, â€Å"No better term than this: thou art a villain† (3.1.57.) During that time, being called a villain was a terrible insult which could have started a fight. Romeo decided to ignore this comment, from Tybalt because of his relationship with Juliet. Mercutio on the other handShow MoreRelatedEnglish Segment 1 Study Guide1694 Words   |  7 Pages Definition Play in words b. Example Writing with a broken pencil is pointless Malapropism a. Definition misusing words ridiculously b. Example Listen to the blabbing brook Understatement a. Definition A figure of speech making a statement less or more important than it really is.   b. Example Its sprinkling outside when its actually poring rain. Oxymoron a. Definition Words that conflict each other b. Example Chewy like a solid but juicy like a liquid Verbal Irony a. Definition Read MoreHow To Write Literary Analysis4174 Words   |  17 PagesHow To Write Literary Analysis The Literary Essay: A Step-by-Step Guide When you read for pleasure, your only goal is enjoyment. You might find yourself reading to get caught up in an exciting story, to learn about an interesting time or place, or just to pass time. Maybe you’re looking for inspiration, guidance, or a reflection of your own life. There are as many different, valid ways of reading a book as there are books in the world. When you read a work of literature in an English classRead MoreMy First Memory Of A Writing972 Words   |  4 Pagesschool English is pretty simple compared to these classes. Over the two years I had to do multiple essays on themes of various books. One on Romeo and Juliet by William Shakespeare, one on Night by Elie Wiesel, and one on Catcher in the Rye by J. D. Salinger. All of these essays helped me by refining the basics of paragraph structure and other things like what exactly is thesis statement. The first essay that I had that wasn’t as simple as the previous ones was about a controversial topic, I chose toRead MoreTeaching Strategy in the Classroom2909 Words   |  12 Pagesclassroom in which I observed modeling successfully practiced was in Mr. Laurence Mechanic’s tenth grade English class. In teaching a lesson on essays, he kept attention by consistently calling on various students. He drew diagrams on the board to help explain the â€Å"sandwich† for m to an essay. He assigned homework which involved writing a thesis statement. These procedures promoted retention and reproduction. As for motivation, he told his students how rapidly they were improving, encouraging themRead MoreOF MICE AND MEN ESSAY Libre2222 Words   |  9 PagesOf Mice And Men Essay Of mice and men essay State of California. essay writers salt lake city research paper writing chattanooga buy college ruled paper. Of mice and men essay Metis-sur-Mer of mice and men essay Columbus, Leicestershire, Palmdale, Bakersfield of mice and men essay san antonio write essay for me, of mice and men essay Alexandria uploading essay to common app, Chester of mice and men essay Norfolk geometry and algebra 1 formula sheet Of mice and men essay State of Rhode Island andRead MoreStudy Guide Literary Terms7657 Words   |  31 Pages(refers) to the biblical figure John the Baptist in the line Though I have seen my head (grown slightly bald) brought in upon a platter, . . . In the New Testament, John the Baptists head was presented to King Herod on a platter 5. ambiguity-A statement which can contain two or more meanings. For example, when the oracle at Delphi told Croesus that if he waged war on Cyrus he would destroy a great empire, Croesus thought the oracle meant his enemys empire. In fact, the empire Croesus destroyedRead MoreAmerican Literature11652 Words   |  47 Pagesattitudes emergence of ethnic writers and women writers Style: ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · ï‚ · narratives: both fiction and nonfiction anti-heroes concern with connections between people emotion-provoking humorous irony storytelling emphasized autobiographical essays Effect: ï‚ · too soon to tell Historical Context: ï‚ · ï‚ · people beginning a new century and a new millennium media culture interprets values Analyzing Poetry: Poetry Tips Analyzing Poetry What is poetry? How is it analyzed? What areRead More William Faulkners Use of Shakespeare Essay5388 Words   |  22 Pagesmentioned as a constant and continuing influence was William Shakespeare. Though Faulkner’s claim as a fledgling writer in 1921 that â€Å"[he] could write a play like Hamlet if [he] wanted to† (FAB 330) may be dismissed as an act of youthful posturing, the statement serves to indicate that from the beginning Shakespeare was the standard by which Faulkner would judge his own creativity. In later years Faulkner frequently acknowledged Shakespeare as a major inspiration and influence, once noting, â€Å"I have a one-volume

Wednesday, May 6, 2020

Materials engineering Free Essays

Mercury is a common element that is found naturally in a free state or mixed in ores. Because mercury is very dense, expands and contracts evenly with temperature changes, and has high electrical conductivity, it has been used in thousands of industrial, agricultural, medical, and household applications. Major uses of mercury include dental amalgams, tilt switches, thermometers, lamps, pigments, batteries, reagents, barometers, manometers, and hydrometers. We will write a custom essay sample on Materials engineering or any similar topic only for you Order Now It also may be present in rocks or released during volcanic activity. (Ross Associates, 1994) Mercury can enter the environment from a number of paths. For example, if a mercury-containing item is thrown into the garbage, the mercury may be released into the atmosphere from landfill vapors or, or the mercury may vaporize if the trash is incinerated. If mercury is flushed through a wastewater system, the mercury will likely adhere to the wastewater sludge, where it has the potential to volatilize and be deposited elsewhere. Mercury can enter the atmosphere through these various means because it evaporates easily. It can travel through the atmosphere in a vaporized state. (Ross Associates, 1994) Once mercury is deposited into lakes and streams, bacteria convert some of the mercury into an organic form called methylmercury. This is the form of mercury that humans and other animals ingest when they eat some types fish. Methylmercury is particularly dangerous because it bioaccumulates in the environment. Bioaccumulation occurs when the methylmercury in fish tissue concentrates as larger fish eat smaller fish. (U.S. EPA, 1994) Methylmercury interferes with the nervous system of human body and can result in a decreased ability to walk, talk, see, and hear. In extreme examples, high levels of methylmercury consumption have resulted in coma or death. Many animals that eat fish also accumulate methylmercury. Mercury can interfere with an animal’s ability to reproduce, and lead to weight loss, or early death. (Ross Associates, 1994) Instruments containing mercury on campus Thermometers Description: Thermometers include fever thermometers for home and medical use, laboratory thermometers, and industrial thermometers. How to Identify: The bulbs of thermometers containing mercury are usually silver in color. Types of mercury thermometers on campus include: Laboratory and weather thermometers. Amount of Mercury: typical fever thermometers contain about 0.5 grams of mercury each, while laboratory thermometers contain up to 3 grams of mercury. Pollution Prevention Options: Mercury-free alternatives are digital, aneroid, and alcohol thermometers, and for most applications they are as accurate as mercury thermometers. Digital thermometers tend to last longer, however, because they are less likely to break. Safe Handling: Mercury thermometers are easily broken when not handled carefully. If the break occurs, use two pieces of paper or two razor blades to scoop it up from a smooth surface. An eyedropper or a mercury vacuum can also be used. Mercury spill kits are available from safety equipment supply companies for large mercury spills. (U.S. EPA, 1994) Safe Disposal: Save old or broken thermometers in an air-tight container. Homeowners can use local household hazardous waste collection programs for disposal. Businesses should deliver their thermometers to a consolidation site or arrange for a transporter to take them. Contact your county or state environmental office or solid waste office for services available in your area. Also, save the invoices that track your waste that include the following information: date of shipment, amount of waste, location from where waste is shipped, and destination of shipment. Thermostats Description: Mercury-containing thermostats use mercury tilt switches. How to Identify: Most thermostats, other than electric thermostats, contain mercury. To determine if a thermostat contains mercury, remove the front plate. Mercury-containing thermostats contain one or more small mercury switches. Thermostats are generally mounted on walls and easily found. (U.S. EPA, 1994) Amount of Mercury: About 3 grams of mercury are in each mercury tilt switch. Most thermostats have one switch; some have two, and up to six switches are possible. Pollution Prevention Options: Programmable electronic thermostats are mercury free, and they are more energy-efficient than the mercury model. Look for programmable electronic thermostats that have the Energy Star label. Safe Removal: Remove the entire thermostat using a screwdriver and a pair of wire-cutters and store safely. Don’t remove the switches from the thermostat, or dismantle the thermostat. Safe Disposal: Store the entire thermostat in a marked container until it can be sent for proper disposal. In many states, the Thermostat Recycling Corporation operates a recycling program utilizing heating, ventilation and air conditioning (HVAC) wholesalers; eventually this program will be in operation nation-wide. The wholesalers consolidate thermostats from contractors and send them to recyclers; only whole thermostats are accepted. (U.S. EPA, 1995) Switches Description: Mercury is contained in temperature-sensitive switches and mechanical tilt switches. Mercury tilt switches are small tubes with electrical contacts at one end of the tube. As the tube tilts, the mercury collects at the lower end, providing a conductive path to compete the circuit. When the switch is tilted back, the circuit is broken. How to Identify: A mercury tilt switch is usually present when no switch is visible. They are used in thermostats, silent light switches, and clothes washer lids. Amount of Mercury: About 3.5 grams of mercury are contained in a small electrical switch. Industrial switches may contain up to 8 pounds of mercury. Pollution Prevention Option: Alternatives to mercury switches include hard-contact switches and solid-state switches. Safe Removal: Remove switches from appliances very carefully so as not to release any mercury into the environment. Safe Disposal: Store mercury switches in a suitable leak proof, closeable containers. A five gallon plastic bucket with a lid may work. Each container must be labeled â€Å"Mercury Switches for Recycling.† Be careful to keep the switches from breaking and releasing mercury into the environment. If breakage occurs, you must immediately take steps to contain and clean up the spill. Take switches to a consolidation site or arrange with a transporter to take them. Contact your county or state environmental office/ solid waste office for services in your area. Keep records of the mercury switches you have recycled, including copies of invoices containing information on the date of shipment, number of switches, and location.   (U.S. EPA, 1994) Manometers, Barometers, and Hydrometers Description: Manometers and barometers are used for measuring air pressure. Hydrometers are used to measure density of liquid. How to Identify: All these devices will have a gauge for reading air pressure. Pollution Prevention Options: The Replacements of mercury containing Manometers     are battery operated digital units and vacuum gauges. Battery operated digital units are extremely sensitive. Safe Removal: To safely remove the manometer or barometer, remove the entire device from the machine it is attached to. Safe Disposal: Put the entire unit into an airtight, labeled container and ship it to a mercury recycling plant. Sphygmomanometers Description: Sphygmomanometers are used to measure blood pressure. How to Identify: Usually, they are installed on walls and placed on tables in hospitals. Pollution Prevention Options:   The replacement for mercury sphygmomanometers includes electric vacuum gauges, aneroid monitors, and automated devices. Recycling/Disposal: Develop a protocol for the preparation of mercury sphygmomanometers for recycling or disposal that that is consistent with U.S. Environmental Protection Agency, state and local regulations, and pertinent standards. Contact your hazardous waste management coordinator for details about packaging, labeling and transporting that are specific to your facility. A suggested protocol might include the following instructions: Place the sphygmomanometer in a clear plastic bag and seal the bag. Do not use a red bag biohazard bag. Mark the bag: â€Å"Contains Mercury.† Place the bag in a plastic basin to contain any spills during transport to the designated hazardous waste collection point. Batteries Description: Mercury zinc, carbon zinc, silver oxide, and zinc air contain mercury. Mercury is used to protect cathode from oxidation. Pollution Prevention Options: Most consumers dry-cell batteries contain no added mercury. The best way to reduce mercury is recycling. (U.S. EPA, 1994) References Ross Associates Environmental Consulting, Ltd. (1994), Mercury Sources and Regulations: Background Information for the Virtual Elimination Pilot Project. Ross Associates Environmental Consulting, Ltd. (1994), Polychlorinated Biphenyls Sources and Regulations: Background Information for the Virtual Elimination Pilot Project. U.S. EPA. (1994), Virtual Elimination Pilot Project: Briefing Packet for Meeting Participants, U.S. EPA. (1995), Mercury Study Report to Congress (External Review Draft) (External Review Draft) U.S. EPA. (1995), Mercury Study Report to Congress       How to cite Materials engineering, Essay examples

Monday, April 27, 2020

Nikon Marketing Plan free essay sample

Nikon Inc. is involved in a broad spectrum of businesses centered around specializations in imaging products, precision equipment, and instruments. Nikon’s efforts to provide the kind of products and technologies that will exceed its customers’ expectations are already achieving impressive results. Nikon is perhaps most well known for its reputation as a world leader in imaging products, and its technologies continue to play a significant role in defining the photographic industry. Beyond photography, Nikon Inc. is also the leading innovator of precision optical lens and imaging devices. Our array of ophthalmic instruments, Nikon industrial inspection and measuring systems, Nikon microscopes and imaging systems for the biosciences and Nikon surveying instruments are improving the way companies advance their business and professionals care for their clients. Nikon’s precision equipment business is also driving remarkable innovation and growth. Immersion lithography technology in IC scanners and LCD scanners that feature Nikon’s multi-lens scanning system are now the finest in the industry, attracting keen attention. We will write a custom essay sample on Nikon Marketing Plan or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Nikon is also making active efforts in new fields, such as photomask substrates for liquid crystal displays (LCDs). Over the last 90 years, Nikon has consistently moved the photography, imaging and optics industry forward, discovery by discovery and product by product. As we continue our research and development mission to uncover advanced technologies that will enhance the lives of our customers, we also reaffirm our commitment to delivering the highest quality products and support. Mission Statement The Nikon philosophies are Trustworthiness and creativity, Our aspirations: Meeting needs. Exceeding expectations and the slogan is â€Å"At the heart of the image† SWOT Analysis Strength: 1. Strong market position built on broad product portfolio 2. Diversified geographic presence with focus on developing markets provides diversified revenue stream with reduced business risk 3. Strong research and development capabilities facilitate new product development in line with changing consumer preference 4. Effective integration of digital platforms like social networking sites in its marketing efforts has helped attract larger target audience 5. Excellent advertising and branding exercises through TVCs and print ads 6. Has a strong workforce of over 25,000 7. Good branding through sponsorships of events and sports teams Weakness: 1. Dependence on particular products and businesses. Precision equipment businesses and imaging products business account for 90% of total net sales 2. Instances of alleged violation of competition laws incurred penalties and hurt the brand image a few times Opportunity: 1. Online sales opportunities by leveraging e-commerce market and effectively using online marketing options 2. Expanding presence in the global market 3. More innovative product offerings for the customers Threats: 1. Rapid technological changes 2. Increasing appeal of high end camera phones and their social networking integration facilitating easy sharing of photos 3. Competition with black market, parallel import and smuggled goods 4. Ever-increasing smart phones camera quality Maslow Pyramid of Needs Nikon’s Imaging Products are addresses around Esteem Stage and Self-actualization. So not necessary for survival, but photography, for those who have chosen to undertake it, is a part of all the things that lead to self-transcendence. Demographics Nikon users have traditionally been professional photographers with cameras from the Nikon D4 to the Nikon D3000, ranging in price from $500 to $6500. These cameras have typically been targeted towards more mature adults with income over $40,000 per year. Nikon decided to change their image and release a line of cameras more price friendly and stylish for the younger, tech savvy generation. The primary audience of the Nikon Coolpix collection of cameras is young women, mainly between the ages of 18-25. College students and young professionals don’t have as much income as Nikon’s traditional audience, so they kept that in mind by creating a camera for young adults with incomes right around $20,000 per year. Nikon has priced their Coolpix cameras at a cheaper price than their other professional cameras, ranging from $150 to $250. Cameras with the entire back being a touch screen are in the higher price range around $300. Age: 16 – 65 Gender: female and male Race: All Religion: All Education: high school and above Occupation: students and professionals Psychographics D series Nikon cameras’ target audience is mostly professional and semi-professional photographers. The target audience for the Nikon Coolpix values her family and friends. Their opinions are important and help aid her in the decision making process. She values high quality products and new technology. She is in the generation of the Millennials, which means she is very tech savvy and does thorough information search online before making a decision. This person has strong opinions toward different brand names. Quality of the products is directly correlated to the brand name. This woman lives either on her own or with roommates in a well-populated area. She is adventurous and likes to travel. The write, draw, and paint feature on the Coolpix allows her to personalize all of her memories. 4Ps Product Nikon is contributing to technology in numerous fields, from manufacturing ICs with nanometer-rule circuit patterns and advancing bioscience, to furthering the possibilities of imaging and capturing views of stars that are billions of light years away. What makes this possible? Nikon’s opto-electronics and precision technologies have nurtured throughout its history and used to create an extensive range of products, services and even more new technologies. Imaging Products Thanks to advances in digital technology, the camera has evolved into an everyday device anybody can use to easily take high-quality pictures. For professional photographers, digital camera technologies have yielded remarkably advanced functions and performance that can significantly intensify creativity and expression. Nikon camera production acumen and technologies, both supported by our long history, will continue to expand imaging possibilities. There are four main segments of Nikon imaging products; D series, New Nikon1 series, Coolpix series and Nikkor lenses. D Series Nikon’s DSLR ‘D’ camera is the culmination of leading technology that brings innovation to both photo imaging culture and the evolution of cameras. ‘D’ continues to aggressively inspire the creativity of photographers. Despite changing times, Nikon has constantly pushed to perfect and redefine the SLR category. ‘D’ is a product of Nikon’s tradition of technology and craftsmanship, and is well equipped with performance that puts it at top position within each camera class. Nikon 1 Series Nikon 1 is designed for the modern picture taker. Ready when you are, Nikon’s Advanced Camera with Interchangeable Lens (A-CIL), is the one camera you’ll want to take everywhere, to connect you to the world. Sharing your life in photos and videos is easy with the dynamic Nikon 1 digital camera. Beautifully crafted, its every control is intuitive; giving you everything you need to capture a complete view of your world. COOLPIX Series Behind every Nikon COOLPIX compact digital camera is the fundamental idea that photography should bring you joy. Every shot you take is a precious moment captured. With Nikon COOLPIX cameras, you can capture that moment and its joy forever. Its portability allows you to casually carry high-end equipment with you everywhere you go. Responsiveness allows you to react to any situation, at any time. Nikkor Lenses Nikon is the only company in the world that manufactures their imaging products all the way from glass manufacturing to finished product. The spirit and technology to freely maneuver light are deeply embedded in Nikon’s product. Nikkor is a lens brand for cameras that symbolizes the spirit of Nikon. It is â€Å"instrument of light† brand where advanced engineering technology and traditional lent craftsmanship are combined at the highest level. †¢Digital cameras †¢Film cameras †¢Interchangeable lenses †¢Speed lights †¢Photographic accessories †¢Software †¢Sport optics Precision Equipment Modern society reaps great benefits from the electronics fabricated in industrial sectors, including areas such as home appliances, personal computers and automobiles. Nikon is continuously advancing the production of steppers and scanners that are used to manufacture ICs — the very core of electronics — as well as liquid crystal panels and organic electroluminescence panels that are indispensable to LCD TVs, computers, and smartphones. In these and many other ways, Nikon is fostering and innovating our electronics-based society. †¢IC steppers and scanners †¢LCD steppers and scanners Instruments Microscopes and measuring instruments from our Instruments Business are contributing to fields ranging from medical and bioscience research to industrial sectors such as components for electronics, automobiles and aircraft. We also offer sophisticated, highcaliber surveying instruments used in architectural design and urban planning. Nikon supports the development of society with precision technologies and eyes firmly focused on the micro level. †¢Biological microscopes †¢Industrial microscopes †¢Stereoscopic microscopes †¢Measuring instruments †¢Semiconductor inspection equipment †¢Surveying instruments Price Nikon’s Imaging Company grosses 2/3’s of its companies net sales, therefore I will focus on the Imaging Company’s products and prices. Nikon offers a wide verity of imaging instruments from amateur to professional for almost every budget. Coolpix series, for amateur everyday purpose, price list: Digital SLR series, for mid-range and professional purpose, price list: Product Name Effective Pixels Image Sensor Format Maximum ISO Sensitivity Price D3100 14. 2 million DX 3200 $549. 95 D5100 16. 2 million DX 6400 $599. 95 D3200 24. 2 million DX 6400 $699. 95 D5200 24. 1 million DX 6400 $799. 95 D90 12. 3 million DX 3200 $899. 95 D7000 16. 2 million DX 6400 $999. 95 D7100 24. 1 million DX 6400 $1,199. 95 D300S 12. 3 million DX 3200 $1,699. 95 D600 24. 3 million FX 6400 $2,099. 95 D800 36. 3 million FX 6400 $2,999. 95 D4 16. 2 million FX 12800 $5,999. 95 D3X 24. 5 million FX 1600 $7,999. 95 Place Consumers do not need to go far to pick up Nikon products. There are many authorized actual and online Nikon dealers. Nikon cameras and accessories are available at electronic stores camera video stores and online stores such as Best Buy, Micro Center, BH, Amazon, Ebay and also on Nikon’s own website. Promotion Media Mix There are different approaches to marketing. Sex sells, as do celebrity. However, the appeal and effectiveness of advertising can vary greatly as witnessed by Nikons marketing efforts. In the first campaign, Nikon acknowledged the largest demographic of buyers of consumer electronics are adult males under the age of 45. Therefore, their advertising campaign, they selected the controversial Kate Moss, swapped her clothes for a Nikon, and ran a series of ads along the lines of Im a supermodel. Im naked. Im here. Heres a Nikon. When this campaign came to an end, Nikon searched high and low for a different celebrity who could represent the values of their brand to their key demographic. They settled on Ashton Kutcher. He is charming, handsome, smart, fun so Nikon. Nikon listens to customers and the voices of societies all over the world. Nikon’s product manufacturing process begins with us listening to people all over the world — people from different walks of life, people involved in different industries — so we can understand precisely what they want from us. We gather customers’ opinions in many different ways: sales, service and support activities, trade shows, promotional and other events, and via the Internet. To us, this information is invaluable. We are endeavoring to create new products and services that exceed customer expectations by aggregating and analyzing these opinions. Nikon Professional Service (NPS) is an organization that provides assistance and services to its full-time professional photographer members, with top-quality service depots at international events. NPS responds to the exacting demands of professional photographers while applying their valuable feedback for product development. We participate in many different kinds of trade shows around the world, using them as precious opportunities to explain our products to customers. The photo at right shows Nikon Metrology NV’s booth at Control Germany. Among the products we displayed were 3D coordinate measuring machines, 3D laser scanners, and X-ray CT inspection systems. Nikon Direct plans and sells products such as camera bags, accessories and photography clothing by analyzing customer feedback gathered via phone, e-mail and original marketing surveys. By creating unique products in response to customers’ tastes, Nikon Direct increases customer satisfaction. Competitive Profile There are three main competitors for Nikon in the imaging market; Canon, Sony, Olympus. Canon as Nikon’s biggest competitor has a quiet big reputation for low light situation and high quality video capturing but their image quality difference is practically non-existent, leaving the choice to the buyer’s preference. Sony and Olympus are second best options among professional cameras and equipments due to their limited variety in camera accessories and lenses and third party equipments for those brands. In professional DSLR market Nikon is known for its durability and its complementing Nikkor lenses. For snap-shot pocket cameras, Nikon stands out for its cheaper price and sleek, modern designs.

Thursday, March 19, 2020

Antigone Tragic Hero essays

Antigone Tragic Hero essays In the novel Antigone Sophocles, the author, depicts the tragic hero Creon to the fullest extent. Sophocles portrays Creon as a tragic hero by the characteristics shown throughout the story. Creon is a character that is easy to relate to in a number of ways. First, he contains many flaws which in result causes many problems. This is seen in the decision he made of becoming hubris. Hubris is a Greek term for insolence and is referred to the emotions in Greek tragic heroes and ignores the gods and thus invite catastrophe. Catastrophe is all Creon got as the novel progressed into the climax. His choices and decisions end up deciding the fates of his son, wife, and Antigone. After having an encounter however with Teiresias, Creon comes around to realize what he has done is sinful to the gods. He has put his own pride over the fact of appreciating the gods. The character Creon may not be seen as a tragic hero because of his tasteless acts, but he contains the traits eligible to be the tra gic hero in Antigone. As seen in the novel, Creon exhibits habits seen in todays life, even though Sophocles wrote this novel a long time ago. It is obvious that Creon displays an immense amount of stubbornness throughout the story. An example is seen when Antigone wishes to give her brother, Polynieces a proper burial so he can go and be with the Gods. Creon as king wishes to have him rot in the fields of war because he disowned the state in the war that preceded the events. Antigone fights for her beliefs of the divine law that one should always receive a proper burial after death, but Creon refuses and throws Antigone in jail. His stubbornness is seen here in this quote, Go join them, then: if you must have your love, find it in hell!(pg286). As seen in the quote, even after Antigone clearly makes sense in what she was doing, and the prophet also agrees with her, Creon turns to the ...

Tuesday, March 3, 2020

Hysteron Proteron - Definition and Examples of the Figure of Speech

Hysteron Proteron s of the Figure of Speech A figure of speech in which the natural or conventional order of words, actions, or ideas is reversed. Hysteron proteron is generally regarded as a type of hyperbaton. The figure of hysteron proteron has also been called inverted order or putting the cart before the horse.  Eighteenth-century lexicographer Nathan Bailey defined the figure as a preposterous way of speaking, putting that first which should be last.  Hysteron proteron most often involves inverted syntax  and is used primarily for emphasis. However, the term has also been applied to inversions of narrative  events in nonlinear plots: that is, what happens earlier in time is presented later in the text.   Etymology From the Greek hysteros  and  proteros , latter first Examples and Observations He began to walk barefoot across the meadow, but the sharp dry grass hurt his feet. He sat down to put on his shoes and socks.(Iris Murdoch, Nuns and Soldiers, 1980)That time of year thou mayst in me beholdWhen yellow leaves, or none, or few do hang ...(William Shakespeare, Sonnet 73)Muammar Gaddafi Killed, Captured In Sirte(Headline in Huffington Post, Oct. 20, 2011)Im going to kill that magician. Ill dismember him and then Ill sue him.(Woody Allen, Oedipus Wrecks in New York Stories, 1989) Yoda-Speak One of the most common and effective forms of hyperbaton is  hysteron proteron  (roughly, last things first). Let’s take two examples from a master of the technique: Powerful you have become. The Dark Side I sense in you and Patience you must have, my young padawan. For Yoda in  Star Wars, hysteron proteron is a linguistic trademark. The key concepts in those three sentences are power, the Dark Side and patience. Their placement underlines them.   (Sam Leith, Much to Learn From Yoda, Public Speakers Still Have. Financial Times [UK], June 10, 2015) Hysteron Proteron in Don DeLillos Cosmopolis (2003) So attuned is [Eric] Packer to the future that he repeatedly literalizes the rhetorical trope known as hysteron proteron; that is, as he scans the several digital monitors mounted in his limousine, he experiences an effect before its cause. Among Packers premonitions is observing himself onscreen recoiling in shock from the Nasdaq bombing before the actual blast occurs.   (Joseph M. Conte, Writing Amid the Ruins: 9/11 and Cosmopolis. The Cambridge Companion to Don DeLillo, ed. by John N. Duvall. Cambridge University Press, 2008) Puttenham on Hysteron Proteron (16th century) Ye have another manner of disordered speech, when ye misplace your words or clauses, and set that before which should be behind. We call it in English proverb, the cart before the horse, the Greeks call it Histeron proteron, we name it the Preposterous, and if be not too much used is tolerable enough, and many times scarce perceivable, unless the sense be thereby made very absurd.   (George Puttenham, The Arte of English Poesie, 1589) Hysteron Proteron in Rhetoric and in Logic Hysteron proteron was thus a term from the discourse of rhetoric for a reversion that reversed the order of things themselves, including in both temporal and logical sequence. In this sense, it appeared across a broad range of early-modern writing, as both a blemish and an exploited license of order and style...In the field of formal logic, hysteron proteron simultaneously denoted a preposterous inversion, in this case the logical fallacy of assuming as true and using as a premise a proposition that is yet to be proved, or the proving of a proposition by reference to another one that presupposes it.(Patricia Parker, Hysteron Proteron: Or the Presposterous, in Renaissance Figures of Speech, ed. by Sylvia Adamson, et al., Cambridge University Press, 2007) Pronunciation: HIST-eh-ron PROT-eh-ron

Sunday, February 16, 2020

1) Unit of work for listening and speaking skills for ESL primary Essay

1) Unit of work for listening and speaking skills for ESL primary Enlish classroom. 2) An stating the rationale, theoretical principles, reflection for th - Essay Example Not all aspects of the text chat and face-to-face environments are similar. In text chat, it is possible for several participants to participate simultaneously. This unit is designed for the pupils of primary level around the age of 10 years. This unit contains some dialogues, narratives and some interesting and absorbing exercises for enhancing listening and speaking capabilities of pupils. The topic of unit is quite interesting. The unit revolves round the unlucky Friday 13th. It focuses on the superstitious aspect of western culture. The topic of unit not teaches language skills but it also introduces non-native pupils to the culture of the western society. The unit theme is quite absorbing and motivating. Pupils would automatically try to speak about the unfortunate incidents took place in the life Emily on that unlucky Friday. A lesson plan is a comprehensive and predetermined schedule of every activity of teacher in classroom for achieving optimal results. A lesson plan can be of many forms and types. It usually depends on time span, style of educator and type of subject to be taught. But the basic and main objective of any type of lesson plan is to provide teacher a pre-planned line of action for presenting materials and interacting with learners. The lesson plan should not be merely a action plan but it should provide a useful link between objectives of curriculum and material to be taught. Motivate students by telling them about the poor Emily who faced lot of hardships on unlucky Friday. Tell the students background of Friday 13th that is considered unlucky. Tell them how much hardships she faced on that particular day but how boldly she faced them. Encourage students to be bold if such situation may arise in their daily routine. It will create intimacy with the character. Tell the students the how important is listening for correct speaking. Tell them

Sunday, February 2, 2020

A Farewell to Modernism Essay Example | Topics and Well Written Essays - 500 words

A Farewell to Modernism - Essay Example The researcher of this essay "Modernism of Art" aims to explore the work of Jack Ryan in the context of modernism. Castelli is more remembered as one of the core founders of modern art and contributed a lot in nurturing young talents that enhanced modernism of art. Jack Ryan has for years perfected his art in creating unique modern. In looking at Jack Ryan’s work, one could appreciate the effect modernism of art has on the observers. For instance, the picture is one could clearly marvel at his work and appreciate how modernism has taken toll of the market. In today’s world, many artists have started relying on the use of media like the internet to market their art works. Jack Ryan is an excellent example of an artist practicing modernism in art through inclusion of objects or art work associated with the modern age. For instance, the picture provides an iconic feeling of sophistication. He uses random numbers on the upper part of his art work making one to think of what he intended to convey. Furthermore, it results to confusion when he the picture conveys a number of cubic drawings which drawings that resemble speakers. The object provides a feeling of an amorphous creation which no one is able to understand, which is, out of the blue drawing. It is an original work since no one has ever seen such a creation in the normal. Such a drawing creates a deep sense of anxiety and wondering what the artists could have thought or implied to convey while making such an iconic art piece.

Saturday, January 25, 2020

Conspiracy Theories Explained

Conspiracy Theories Explained Introduction â€Å"Conspiracy theory† is a subject that awakens our sense of interest and curiosity. Knowing that what we are told may not be true, makes us want to know more about that subject and, sometimes, any other theory that comfort us, seems more legit. These theories are like a darker side of some huge events, that the government and/or other secret facilities want to hide from the society, and the society tends to be suspicious, leading to an uncertainty about the official statements. This subject is very exciting for our group because it’s something that makes us curious and it has to do with our possible future job as part of the media. We also chose this theme because we think it’s a very good way to develop the interest of our school mates, to be more curious and develop their sense of investigation. A person who’s curious about something like theories of conspiracy is a person that is curious about everything and that’s very important in social communication students like us. Furthermore, curiosity has always been one of the most important characteristic of human beings, because if we weren’t curious, we wouldn’t have discovered how to make fire yet. Ana Rita Rebelo What are Conspiracy Theories and why do people tend to believe them? The word â€Å"conspiracy† comes from Latin, con (with) and spirare (breathe). By joining â€Å"breathing† and â€Å"with†, we get whispering, which presuppose a secret. So, conspiracy is a group of people who act in secret. Conspiracy theories are non-proven alternative explanations for facts or events, usually created by someone or a group who has an opinion that goes against the official version of the same episode. The creators and fans of those theories that are supported and confirmed by respectable institutions or highly credible people, are usually sceptics about the explanations that is given to the society, so they come up with theories that reveal an â€Å"alleged secret plan, led by a secret alliance of powerful organizations and individuals† (Freedman 2000)[1]. The majority of people, who believe on these kinds of theories, have lost their faith in politics, or on the hierarchical power that rules the country. Those leaders in charge are considered to be double-crossers and ruthless people, so any official explanations that come from them are immediately declined or causes a lot of uncertainty within society. This leads to an increased reliability in any other unofficial explanation. Other common feature in believers of conspiracy theories is fear. If, for example, it had occurred a terrorist attack or a natural disaster, we would feel powerless and panicking, so we would more easily believe in any theory that can comfort us, even if it goes against the official explanation and if it can’t be proved. Ana Rita Rebelo How do people create theories of conspiracy? 1- Define your Conspiracy subject matter Choosesomething people find puzzling,conspiracy theories develop where people are mystified, confused and curious. People have the in need to feel that there is sense in what happens in the world, thats why when we dont understand them we’ll make a story/theory for why events happen. 2 Make sure what you choose to explain is significant to enough readers. If your subject isnt significant to other people they wont even give you the time to explain your theory cause theyre not into it, so if you want your theory to spread, be known and have followers/supporters youll have to choose an interesting subject, not just for you bur for others, something with a big impact in society and the world. 3 Identify the agents responsible for the Conspiracy You always have to find someone to put the blame on, normally people dont easily accept the fact that things happened because it was supposed to, like when a natural disaster occurs some people accept that it wasnt our fault, others have to find someone to put the blame on and accuse as the culprit. 4 Connect the Dots Make the links between the subject you chose and the actors (those responsible for the conspiracy), revealing what has been industriously hidden by the conspirators until now. Some examples of the conspiracy theories are the Escape of Adolf Hitler and the planning of 11th September. Ana Rita Loureiro Examples of Conspiracy Theories There are documents that â€Å"prove† that Hitler didn’t committed suicide in 1945, after knowing that Nazis didn’t won the war. Moreover, it’s believed that he escaped in a submarine to Argentina. Two journalists, Simon Dunstan and Gerrard Williams, wrote Grey Wolf: The Escape Of Adolf Hitler that talks about the journey till his arrival, and the life he had in Argentina. Some people even believed that the famous skull that have the bullet hole of Hitler’s suicide is not his head, but â€Å"RochusMisch, Hitler’s former radio operator and the last survivor of the Berlin bunker, says he saw the bodies of ‘the boss’ and Eva Braun with his_own_eyes.†[2] About 11th September, many people refuse the official story. Many of them believe that the attack was generated by the US government, to provide political benefits to the country. Supposedly, the plan was explained to terrorists so that they could prepare the attack because, f or the society, is almost impossible to believe that 19 terrorists managed to cause all that chaos and destruction for themselves. In the Internet, there is a theory that says that if we write in the Word â€Å"Q33 NY† in the font â€Å"wingdings†, we obtainà ¯Ã¢â€š ¬Ã‚  Ãƒ ¯Ã‚ Ã¢â‚¬ËœÃƒ ¯Ã¢â€š ¬Ã‚ ³Ãƒ ¯Ã¢â€š ¬Ã‚ ³Ãƒ ¯Ã¢â€š ¬Ã‚  Ãƒ ¯Ã‚ Ã… ½Ãƒ ¯Ã‚ Ã¢â€ž ¢, which reminds us of the attack that caused the crash of the twin towers and the death of a lot of US citizens. People who are fan of the theories of conspiracy begin to make some associations. Catarina Pereira How the Government mutes the Social Media? Sometimes, a few journalists tend to investigate by their own something that they think it has to be investigated, even when their superiors stop that investigation. When they try to find out the truth about something that the government doesn’t want them to find, what does the Government do? Conspiracy theories begin when journalists try to find the truth and try to tell the people what they’ve discovered, but when the government doesn’t want that truth to come out, it’s quite easy to just mute the journalists that tried to speak to the society. A journalist is powerless compared to the government, so the government just speaks to the people and say â€Å"that’s not true†, even when the journalists have a lot of evidences. The government has a lot more influence on the society because we all know the power they have. Even if we consider believing that the conspiracy is true, the government can easily change our minds with the influence they have over the society, even over the social media. Some people can’t even consider to believe in what the media say because of the influence that the government as over them. In the other hand, people that believe in the conspiracy theories don’t listen to the government. Those people feel powerless about something and don’t trust the political power and, sometimes, people that have evidence on their own, who saw or had experienced something, made them believe that conspiracy theories are actually true. Ana Margarida Dinis Conclusion In one hand, we all know that Conspiracy theories are not easy to believe because it lacks of evidence and sustainable proves. But in the other hand, it’s a fact the people always tend to believe in theories and convictions that can comfort us, and sometimes, all the mystery involving some events, makes us a little bit more curious, wary and open minded to this speculations. As Dan Brown says in Da Vinci Code, â€Å"Everyone loves a conspiracy.† Television, but mostly Internet, are the greatest boosters to make people believe in conspiracy theories. We found an article about this subject in a famous Portuguese magazine, that says that â€Å"World Wide Web gives voice to a lot of crazy and scary conspiracy theories about everything people can imagine. To more depressing to the funnier, going through the absurd (†¦)†[3]. There are some sceptical people who despite this theories, and also people who consider them ridiculous. But we, as a bio, psico, socio and cultural beings, believe that even if we aren’t sure about something, we have to keep an open mind and we can’t reject it without knowing at least a little bit about the subject. Ana Rita Rebelo Webgraphy BRAIN, Marshall (n.d.). How Conspiracy Theories Work. How stuff Works?.  Available inhttp://people.howstuffworks.com/conspiracy-theory.htm [Consulted  in 19th May, 2014] DEWSBURY, Rick; HALL, Allan HARDING, Eleanor (18th October, 2011).  Did Hitler and Eva Braun flee Berlin and die (divorced) of old age in   Argentina?. Daily Mail. Available in http://www.dailymail.co.uk/news/article-2050137/Did-Hitler-Eva-Braun-flee-Berlin-die-old-age-Argentina.html  [Consulted in 19th May, 2014] ScienceDaily (28th November, 2012); Porque as pessoas acreditam em teorias  da conspiraà §Ãƒ £o?. Hypescience. Available in http://hypescience.com/porque-as-pessoas-acreditam-em-teorias-da-conspiracao/ [Consulted in 19th May,  2014] SILVA, Sandra (2010). Teorias da Conspiraà §Ãƒ £o: Seduà §Ãƒ £o e Resistà ªncia a partir   da Literacia Medià ¡tica. Tese de Mestrado, Faculdade de Letras da  Universidade do Porto. Available in http://repositorio-aberto.up.pt/bitstream /10216/55681/2/TESEMESSANDRASILVA000126278.pdf [Consulted in 19th  May, 2014] Teorias da conspiraà §Ãƒ £o que correm na Internet (29th April, 2014). Visà £o.  Available in http://visao.sapo.pt/teorias-da-conspiracao-que-correm-na-internet=f778634 [Consulted in 21th May, 2014] [1]Available in SILVA, Sandra (2010). Teorias da Conspiraà §Ãƒ £o: Seduà §Ãƒ £o e Resistà ªncia a partir da Literacia Medià ¡tica. Tese de Mestrado, Faculdade de Letras da Universidade do Porto. Available in http://repositorio- aberto.up.pt/bitstream /10216/55681/2/TESEMESSANDRASILVA000126278.pdf [Consulted in 19th May, 2014] [2]Available in DEWSBURY, Rick; HALL, Allan HARDING, Eleanor (18th October, 2011). Did Hitler and Eva Braun flee Berlin and die (divorced) of old age in Argentina?.Daily Mail. Available in http://www.dailymail.co.uk/news/article- 2050137/Did-Hitler-Eva-Braun-flee-Berlin-die-old-age-Argentina.html[Consulted in 19th May, 2014] [3]AddaptedfromTeorias da conspiraà §Ãƒ £o que correm na Internet (29th April, 2014). Visà £o. Available in http://visao.sapo.pt/teorias-da-conspiracao-que-correm-na-internet=f778634 [Consulted in 21th May, 2014]

Friday, January 17, 2020

Analysis and Design of Software Architecture Essay

Outline 1 2 3 4 5 6 7 8 Development Process Requirements Quality Attributes Runtime QA Non-runtime QA Requirements Analysis: Example Architectural Analysis & Design Architectural Views Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 2 / 78 Development Process Methodology Diï ¬â‚¬erent software development processes have software architecture as a part of the process Rational uniï ¬ ed process Spiral development method Agile development method Evolutionary rapid development Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 3 / 78 Development Process Place of SA in SDP Figure: Source: Software Architecture Primer by Reekie, McAdam Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 4 / 78 Development Process Methodology After the initial requirements analysis but before software design The ï ¬ rst architecture is also a communication basis with the customer Inputs for the development of the architecture: 1 2 Requirements Context (technical, organizational, business, †¦) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 5 / 78 Requirements Analysis At the beginning there is always a customer who wants a speciï ¬ c software system Customer â€Å"wishes† are always informal Interviews, some documents, some Excel tables, †¦ We need to analyze such informal records and structure it Requirements engineering is a huge ï ¬ eld but we just illustrate here one possibility Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 6 / 78 Requirements Analysis The results of the requirements analysis: 1 2 Functional requirements Non-functional requirements (a) Runtime qualities (b) Non-runtime qualities 3 Contextual requirements Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 7 / 78 Requirements Functional requirements A technical expression of what a system will do Arise from stakeholder needs Structured language: software requirements speciï ¬ cation Use cases: structured description of user interactions with the system Formal models: e.g. state-charts Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 8 / 78 Requirements Non-functional requirements Other needs than directly functional or business-related Generally expressed in the form of quality-attributes Runtime quality attributes Non-runtime quality attributes Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 9 / 78 Requirements Contextual requirements What technology is available? Expertise of the development team Previous experience of users/customers Technical, business, market, legal, ethical, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 10 / 78 Quality Attributes Need to address QAs Without any need for performance, scalability, †¦ any implementation of functionality is acceptable However, we always need to take into account the broader context E.g. hardware, technological, organizational, business, †¦ The functionality must be there but without proper addressing of QA it is worth nothing Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 11 / 78 Quality Attributes Inï ¬â€šuence on QAs Typically, a single component can not address a QA completely Any QA is inï ¬â€šuenced by multiple components and their interactions E.g. a UI component has a high degree of usability: however, usability of the system is compromised if a data management component has poor performance in accessing the data → users need to wait long → poor usability Components and their interactions → software architecture QAs are directly inï ¬â€šuenced by software architecture Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 12 / 78 Runtime QA PURS PURS (performance, usability, reliability, security) Performance: time performance, memory, disk, or network utilization Usability: human factors, easy to learn, easy to use, †¦ Reliability: availability, safety, †¦ Security: authentication, data protection, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 13 / 78 Runtime QA Performance Time performance is most obvious Measured in the number of operations per second Also, latency: the time from receiving an input and producing an output Other measures: memory, disk, network utilization or throughput Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 14 / 78 Runtime QA Performance Diï ¬â‚¬erent measures are typically traded oï ¬â‚¬ against each other E.g. increasing throughput may increase latency Time performance might be increased with more memory True performance of the system is not only deï ¬ ned by performance of single components But also by their interactions and the overall processes in the system Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 15 / 78 Runtime QA Performance factors Choice of algorithms Database design Communication Resource management Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 16 / 78 Runtime QA Choice of algorithms Performance of algorithms is measured by their complexity (big O) E.g. linear complexity: O(n) Running time increases in direct proportion to the size of the data E.g. polynomial complexity: O(n2 ) It does not scale: double size of the data – running time increased by factor of 4 Goal: O(nlog (n)) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 17 / 78 Runtime QA Database design Performance of database queries can dominate the overall performance The design of the tables has enormous impact on the overall performance Techniques to improve it: lazy evaluation, replication, caching Some additional cost to manage replication and/or caching In-memory databases (real-time systems) Developing a new database (search engines) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 18 / 78 Runtime QA Communication Network overhead Package data according to a protocol, sending data over network Each layer means additional overhead Think how to use network: packaging binary data as XML!? Use more compact formats, e.g. JSON vs XML Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 19 / 78 Runtime QA Resources management Overloaded components need to be avoided A chain is only as strong as its weakest link! E.g. a single-threaded shared resource is in use: all other threads are blocked Very diï ¬Æ'cult to track down Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 20 / 78 Runtime QA Usability Usability is a very rich ï ¬ eld If usability is important you will need a usability expert Combination of many factors: responsiveness, graphical design, user expectations, conï ¬ dence Measuring with time taken to complete task, error rate, time to response, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 21 / 78 Runtime QA Responsiveness and data availability An example of relations between QAs Usability requires that the system responds to user actions within a certain period of time If it is a complex system this need translates into performance along the path of the user action Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 22 / 78 Runtime QA Responsiveness and data availability Figure: Usability vs. Performance Source: Software Architecture Primer by Reekie, McAdam Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 23 / 78 Runtime QA Discussion on relations between QAs This diagram shows that we need to pay attention to tuning communication between B and Y Performance of the communication channel is a consequence of a usability requirement Do we need to support security of the communication channel? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 24 / 78 Runtime QA Discussion on relations between QAs This diagram shows that we need to pay attention to tuning communication between B and Y Performance of the communication channel is a consequence of a usability requirement Do we need to support security of the communication channel? We support QAs always only as a response to user needs Never because it is needed anyway! Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 24 / 78 Runtime QA Discussion on relations between QAs If we support security even if it is not needed Very often QAs exercise opposing forces on the system Security requires a lot of checking: performance will suï ¬â‚¬er → usability will suï ¬â‚¬er A minimalistic approach: develop only what is required! Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 25 / 78 Runtime QA Reliability In traditional engineering disciplines reliability measures the failure rate of the system Failure rate speciï ¬ ed by mean time to failure MTTF A related measure: mean time between failures MTBF MTTR is mean time to repair A is availability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 26 / 78 Runtime QA Reliability MTBF = MTTF + MTTR A= A= MTTF MTBF MTTF MTTF +MTTR E.g. expected availability of Web systems: Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 27 / 78 Runtime QA Reliability MTBF = MTTF + MTTR A= A= MTTF MTBF MTTF MTTF +MTTR E.g. expected availability of Web systems: 1 (always up-and-running) =⇒ MTTF → ∞ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 27 / 78 Runtime QA Reliability Increasing reliability involves testing However, impossible to prove that a system is correct, i.e. without bugs Acceptability of errors depends on the  nature of a system Personal desktop use: bugs are typically tolerated Enterprise level: medium reliability level High-reliable systems: bugs can be fatal Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 28 / 78 Runtime QA Security Increasingly important aspect of systems is security Because systems are exposed to threats Especially networked systems As with other QAs security is a set of related responses to user needs Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 29 / 78 Runtime QA Authentication Requirement for identiï ¬ cation of users with a system Users present credentials so that the system can identify them Typically username and password Other forms: certiï ¬ cates, smart cards, biometric features Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 30 / 78 Runtime QA Authorization After authentication authorization which functions and what data is available for users This information is captured in an authorization model Access control lists (ACL) deï ¬ ne who can access and how a resource might be accessed E.g. read access, write access, delete access, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 31 / 78 Runtime QA Authorization Drawbacks of ACLs It is resource based, e.g. a page in a CMS Often, authorization needs to address functions or tasks Also, managing of ACLs is diï ¬Æ'cult, e.g. subresources of resources Also, performance problems with checking Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 32 / 78 Runtime QA Authorization Another model: role-based access control (RBAC) Roles are used to manage many-to-many relations between users and permissions Roles are used to represent the job functions, e.g. author, teacher, student in an E-learning system Permissions are modeled as parts of roles, e.g. create page, create tests, †¦ Users are than assigned to a role and acquire automatically permissions of that role Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 33 / 78 Non-runtime QA MeTRiCS MeTRiCS (maintainability, evolvability, testability, reusability, integrability, conï ¬ gurability, scalability) Maintainability: how easy can you ï ¬ x bugs and add new features Evolvability: how easy your system copes with changes Testability: how easy can you test the system for correctness Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 34 / 78 Non-runtime QA MeTRiCS Reusability: how easy is to use software elements in other contexts, e.g. a software library Integrability: how easy you can make the separately developed components of the system work correctly together Conï ¬ gurability: how easy can a system be conï ¬ gured for diï ¬â‚¬erent installations and target groups Scalability: how easy the system copes with a higher performance demand Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 35 / 78 Non-runtime QA Maintainability This QA considers the whole lifecycle of a system What happens during system operation? Property that allows a system to be modiï ¬ ed after deployment wirh ease E.g. extensible, modiï ¬ ed behavior, ï ¬ xing errors Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 36 / 78 Non-runtime QA Maintainability At the design and implementation level Code comments Object-oriented principles and design rules Consistent programming styles Documentation Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 37 / 78 Non-runtime QA Maintainability Maintainability is very important because any software system will change over time Experience shows that such changes tend to degrade the system over time Software systems are subject to entropy The cumulative eï ¬â‚¬ect of changes degrades the quality of the system Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 38 / 78 Non-runtime QA Maintainability The systems tend to become messy systems Regardless of how a nice plan you had at beginning Design for change – recollect OO design rules Abstract messy parts of the system so that they can be exchanged Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 39 / 78 Non-runtime QA Maintainability Don’t be afraid to refactor and rewrite and redesign Each software vendor does this with major versions Create throw-away prototypes Think out-of-box and innovate Don’t always follow a hype – very often nothing new in hypes E.g. Web services Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 40 / 78 Non-runtime QA Testability Means to improve testability Test cases: if something fails there is a bug Separation of the testing framework and the system, i.e. testing with scripts from outside Logging Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 41 / 78 Non-runtime QA Conï ¬ gurability Ability of a system to vary its operational parameters without re-compiling or re-installing E.g. selecting appropriate database drivers, conï ¬ guring network parameters, †¦ Typically, realized by a set of conï ¬ guration ï ¬ les E.g. Apache Web server conï ¬ guration ï ¬ le sets host name, virtual hosts, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 42 / 78 Non-runtime QA Conï ¬ gurability Conï ¬ gurability interacts with other QAs such as testability, maintainability, reliability High degree of conï ¬ gurability tends to have a negative impact on those QAs Testing of diï ¬â‚¬erent system conï ¬ guration becomes more diï ¬Æ'cult → reliability compromised Conï ¬ gurable components will be strongly parametrized → decreased maintainability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 43 / 78 Non-runtime QA Scalability Ability of a system to increase its capacity without re-compiling or re-installing E.g. serving additional Web pages means only copying these Web pages into a Web server ï ¬ le system Sometimes increasing capacity means increasing hardware, e.g. Web server clusters Managing user session on the client side, means only providing additional code-on-demand from the server Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 44 / 78 Requirements Analysis: Example System description Web-based Network Analysis Tool: W-NAT A simple and usable system for network analysis is needed. Networks are entities that contain not only individuals but also their connections with other individuals (see e.g. 3 for an example). The system accepts a network representations as a list of pairs of connected nodes stored in a dataset ï ¬ le. Nodes are represented as integers. An edge between two nodes is stored as a line containing two nodes delimited by a tabulator. Users might upload datasets to the systems and store them for further analysis. Each user might upload multiple datasets and can execute various analysis on those datasets. The system keeps the track of the analysis history for each user. Users may calculate degree distributions, network diameter, clustering coeï ¬Æ'cient, connectivity measures, singular values, and diï ¬â‚¬erent centrality measures. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 45 / 78 Requirements Analysis: Example System description Web-based Network Analysis Tool: W-NAT Users can execute various calculations on multiple datasets in parallel. The system must not be blocked if a calculation is currently under way. Rather it should be possible to start a new calculation, or view previous calculations, etc. In case of longer calculations the system needs to notify the user by e-mail when the calculation is over. The results of the calculations should be available in textual and in graphical form. All results can be also downloaded to a local computer. The system will be used by a group of students that learn the basics of network analysis. It is expect that at any times the system will be used by multiple users executing multiple calculations. Since the system is primarily an educational tool it needs to be didactically sound, i.e. simplicity and usability are very important. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 46 / 78 Requirements Analysis: Example System description 6 How to search in a small world Pajek Figure 2: HP Labs’ email communication (light grey lines) mapped onto the organizational hierarchy of HP Labs constructed out the e-mail communication. Figure: Social network(black lines). Note that communication tends to â€Å"cling† to of formal organizational chart. From: How to search a social network, Adamic, 2005. with one another. The h-distance, used to navigate the network, is computed as follows: individuals have h-distance one to their manager and to everyone they share a manager with. Distances are then recursively assigned, so that each individual has h-distance 2 to their ï ¬ rst neighbor’s neighbors, and h-distance 3 to their second Denis Helic (KMI, TU neighbor’s neighbors, etc. SA Analysis and Design Graz) Oct 19, 2011 47 / 78 Requirements Analysis: Example System description Web-based Network Analysis Tool: W-NAT The system is a Web-based system and the users should be able to operate the system by using a standard Web browser. The users need not install any additional plugins to operate the system. User perceived performance of the system should be acceptable. In addition, standard Web usability concepts need to be followed. In particular, browser back button must be working at all times and it should be possible to bookmark pages at all times. Finally, standard Web design principles should be satisï ¬ ed, meaning that pages are valid (X)HTML pages in at least HTML Transitional. The system needs to support cross browser compatibility. Further, each page and each important application state needs to have a unique and human-readable URL. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 48 / 78 Requirements Analysis: Example Functional requirements UR1: The system is a network analysis tool. The system can calculate the following measures. UR1.1: UR1.2: UR1.3: UR1.4: UR1.5: Out-degree distribution In-degree distribution Cumulative out-degree distribution Cumulative in-degree distribution Hop plot Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 49 / 78 Requirements Analysis: Example Functional requirements UR1: The system is a network analysis tool. The system can calculate the following measures. UR1.6: Clustering coeï ¬Æ'cient UR1.7: Distribution of weakly connected components UR1.8: Distribution of strongly connected components UR1.9: Left singular vector UR1.10: Right singular vector Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 50 / 78 Requirements Analysis: Example Functional requirements UR1: The system is a network analysis tool. The system can calculate the following measures. UR1.12: UR1.12: UR1.13: UR1.14: UR1.15: Network singular values Degree centrality Closeness centrality Betweenness centrality Eigenvector centrality Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 51 / 78 Requirements Analysis: Example Functional requirements UR2: Networks are stored in dataset ï ¬ les. UR3: The dataset ï ¬ le has the following format. NodeID1 NodeID2 UR4: Users can upload multiple datasets to the system. UR5: To perform an analysis users select a dataset and then choose a measure to calculate. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 52 / 78 Requirements Analysis: Example Functional requirements UR6: For each user and for each dataset the system manages a history of calculations. UR7: Users may initiate multiple calculations simultaneously. UR8: When a calculation is started the system is not blocked. UR9: The system notiï ¬ es users about a ï ¬ nished calculation by e-mail. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 53 / 78 Requirements Analysis: Example Functional requirements UR6: For each user and for each dataset the system manages a history of calculations. UR7: Users may initiate multiple calculations simultaneously. UR8: When a calculation is started the system is not blocked. UR9: The system notiï ¬ es users about a ï ¬ nished calculation by e-mail. When is this notiï ¬ cation needed? If the user is logged out? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 53 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? UR12: Users can register with the system. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? UR12: Users can register with the system. How register? E-mail? Captcha? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? UR12: Users can register with the system. How register? E-mail? Captcha? UR13: Users can login and log out. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? UR5: Web-based system should be available at all times. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? UR5: Web-based system should be available at all times. Reliability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Testability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Testability UR9: Multiple users. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Testability UR9: Multiple users. Scalability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Contextual requirements UR1: Web browser. UR2: Valid (X)HTML, at least (X)HTML Transitional. UR3: No browser plugins are allowed. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 57 / 78 Architectural Analysis & Design Analysis We analyze the requirements and try to identify so-called key concepts Understanding of the domain Static part of the domain We also try to identify key process and activities Dynamic part of the domain Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 58 / 78 Architectural Analysis & Design Design Design is the process of creating models (recollect the deï ¬ nition of SA) Two basic types of architectural models Structure and behavior Architectural structure is a static model of a system (i.e. how the system is divided into components) Architectural behavior is a dynamic model of a system (i.e. how the components interact with each other to perform some useful work) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 59 / 78 Architectural Analysis & Design Architectural structure The division of a system into components and connectors To represent the model: box-and-lines diagrams (to see at a glance important concepts) It is important to remember that diagrams are only representations of the model Diagrams must always be accompanied by additional material such as text, data models, mathematical models, etc. The combination of diagrams and additional material is an architectural model Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 60 / 78 Architectural Analysis & Design Architectural structure What is a component? What is a connector? Components might be subsystems, separate processes, source code packages, †¦ Connectors might be network protocols, method invocations, associations, †¦ The combination of diagrams and additional material is an architectural model Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 61 / 78 Architectural Analysis & Design Architectural structure Figure: Example of an architectural structure Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 62 / 78 Architectural Analysis & Design Architectural structure In the diagram we have one user-interface and one database component But what is the criteria for deciding what is a component? Separate program modules? Separate threads or processes? Conceptual or functional division? And what about connectors? Network protocols? Callbacks? Request/response cycles? Method invocations? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 63 / 78 Architectural Analysis & Design Architectural structure What is the level of granularity of a diagram? E.g. for a Web-based system, components are servers and browsers and connector is HTTP But, components of a server are HTTP parser, ï ¬ le I/O, cache, plug-ins, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 64 / 78 Architectural Analysis & Design Architectural structure Comparison with OO: a component is an object and a connector is a message sent between two objects Because models in OO are very well deï ¬ ned Therefore, we need additional information that accompanies diagrams To describe criteria for decomposition and provide explanations on granularity Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 65 / 78 Architectural Analysis & Design Architectural behavior Complementing structure is architectural behavior Interaction of system elements to perform some useful work Functionality vs. behavior Functionality is what the system can do and behavior is the activity sequence Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 66 / 78 Architectural Analysis & Design Architectural behavior Example: Accessing a tweets document Request is sent to the Web presentation layer That layer forwards the request to the application logic, e.g. TweetDeck TweetDeck contacts TweetViews to obtain a particular template, then retrieves the data from TweetDB wraps it into an HTML response and sends the response to TweetUI Functionality allows me to display a tweets document, behavior is the sequence of activities that makes it happen Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 67 / 78 Architectural Analysis & Design Architectural behavior Each component has a set of responsibilities Behavior is the way how these responsibilities are exercised to respond to some event An event may be an action of the user or an event from an external system A particular behavior is an event plus a response in the form of a sequence of component responsibilities Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 68 / 78 Architectural Analysis & Design Architectural behavior To represent behavioral models we use use-case map notation by Buhr A use-case map consists of a trace drawn through a structural diagram of the system The path of the trace through a structural diagram shows the sequence of activities Each crossing of a component by the trace indicates exercising of a responsibility Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 69 / 78 Architectural Analysis & Design Architectural behavior Figure: Types of traces in use-case maps Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 70 / 78 Architectural Analysis & Design Architectural behavior (a) Single trace – all responsibilities exercised sequentially (b) Two traces are consecutive: Equivalent to single trace but shows that continuation is triggered by another event (c) And-Fork: The traces after the line are potentially concurrent (run in parallel) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 71 / 78 Architectural Analysis & Design Architectural behavior Figure: Types of traces in use-case maps Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 72 / 78 Architectural Analysis & Design Architectural behavior (a) N-Way And-Fork: the trace after the fork may be replicated an arbitrary number of times (b) Or-Fork: The trace is split and activity proceeds along one or another path (c) Seq-Fork: The traces after the line are followed in the order indicated by the arrow Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 73 / 78 Architectural Analysis & Design Architectural behavior Figure: Example of architectural behavior Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 74 / 78 Architectural Views Architectural views We can examine a system from diï ¬â‚¬erent points of view Diï ¬â‚¬erent kinds of views Conceptual: components are set of responsibilities and connectors are ï ¬â€šow of information Execution: components are execution units (processes) and connectors are messages between processes Implementation: components are libraries, source code, ï ¬ les, etc and connectors are protocols, api calls, etc. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 75 / 78 Architectural Views Architectural views There are other models as well We will mention them but we will investigate only previous three models Data model describes the data Physical model describes servers, ï ¬ rewalls, workstations, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 76 / 78 Architectural Views Architectural views Each view provides diï ¬â‚¬erent information about the structure of the system Each view addresses a speciï ¬ c set of concerns All views taken together is the primary means of documenting software architecture Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 77 / 78 Architectural Views Architectural views The conceptual architecture considers the structure of the system in terms of its domain-level functionality The execution architecture considers the system in terms of its runtime structure The implementation architecture considers the system in terms of its build-time structure Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 78 / 78