Saturday, October 5, 2019

Successful Employee-Volunteer Programs and Its Benefits Assignment

Successful Employee-Volunteer Programs and Its Benefits - Assignment Example Therefore, for an EVP to be considered effective it must have the following features: First of all, it must have a plan. Effective EPVs have clear and attainable goals with specific strategies, focused efforts to achieve them. This can be achieved through an annual retreat of all EVP members to deliberate on an annual plan that will include goals, strategies and priority programs. Initial planning allows members to create backup plans in case the main strategies falter; this reduces time wasting that may occur when a program is hurriedly rushed into without prior planning and a problem occurs, where the members have to deliberate, look for funding, set up new strategies and designate duties to members. Secondly, the programs must have some level of measurement. This is to ascertain whether they have been accomplishing their plans in the past or not. The measurement should also include the effects of the programs on communities they are imposed on. Are they bringing joy to the people? Or their effects are not felt by the people. For instance, if it is proven that less volunteer hours is the main culprit behind poor results, then the company can create incentives to encourage employees to participate more on volunteer work, such as higher monetary rates for extra hours. An effective EVP must also embrace the design of the company. Since the volunteers are from the company, the way they are perceived by the public will mirror back to the company. It is therefore imperative that the workers portray the company well in terms of behavior and physical appearance. They should adorn new and improved gear with the company’s logo and positive and encouraging messages. Socially adept individuals should be the ones interacting with the people and working concurrently with them. Their quieter and less social peers should concentrate in areas with less social experiences. The volunteering should be a happy

Friday, October 4, 2019

AIRLINE BARGAINING PROCESS Essay Example | Topics and Well Written Essays - 2500 words

AIRLINE BARGAINING PROCESS - Essay Example The labor agreement includes various basic procedures which are truly essential to be followed by the unions. According to the report on Aviation sector it has been advised that the â€Å"unions must not agree to long-term concessions but rather to define measures on a short-term basis.† A tentative labor agreement calls for improved wages, job security and increased productivity and details a mutual commitment to labor partnerships and commitment towards employers. The election of the arbitrator should be done by both employer and union. The union and the employers have to go by the final decision taken by the arbitrator. The bargaining agent should be certified by the labor board as it represents all workers in the bargaining unit and negotiates a collective agreement with the employer. Once certified the union then has the legal right to represent all employees in the unit. The bargaining units determine the group of workers who are a part of the union, who are considered by the labor board as an appropriate group to bargain and those who are covered by the same collective agreement. The bargaining unit must pay union dues whether or not the members of the union. Collective bargaining is the negotiation between a union and the employer for a collective agreement. Breaching it leads to various unhealthy labor-management relations. But â€Å"currently there is no centralized bargaining forum in the Aviation industry†. The changed law of â€Å"privatization for workers has also led to various strikes† placing â€Å"excessive demands on the unions and fragmenting worker solidarity†. Such work rules are affecting labor-management relation to a lot.

Thursday, October 3, 2019

Texas Science Scholars program Essay Example for Free

Texas Science Scholars program Essay Mrs. Page, I would like you to know that I do not consider English as one of my strongest subjects; however, I still am excited to be in this class. From what I can tell, your particular style of instruction will definitely be helpful towards my education in literature. I feel you are someone who can help me to better myself in writing. My name is Michael Cortinas. I will be majoring in Computer Science and I am currently part of the Texas Science Scholars program. I enjoy reading, but struggle when it comes to writing on a designated prompt. In high school, I was part of both the varsity track, and cross-country team. Before college, I would run two or three miles every morning, but, because all my classes take place in the morning, I haven’t had time. I have been working part-time at H-E-B for nearly a year now, where I do anything from cashier to push carts. I currently live with my mother, step-father, and three younger siblings, meaning most of my homework will be done on campus. When it comes to college, I hope to obtain the skills necessary to become an impact in my community and in the lives of those close to me. I feel if I can get enough from college, I can be the type of person that people feel confident in putting their trust and coming to for advice. I guess this desire was inspired my great-grandfather, who passed away last year. He was someone that everyone felt comfortable confiding in and always seemed to know just what to say. Your class, being one that works with word choice, is a great start towards this goal. I feel that I am going to enjoy your class and all it has to offer.

Analysis of Docker Technology

Analysis of Docker Technology What is the technology? Docker is a software containerization platform. What does it do and how does it improve upon previous technologies? Docker allows users to run multiple different software packages, including multiple instances of the same piece of software within an isolated virtual container. The behaviour and features are similar to that of running a virtualized operating system, such as allowing isolation from the host machines operating system, the ability to run multiple instances of the same software package simultaneously and the storage of applications in a format that can be transferred between physical machines. Traditional virtualization hypervisors such Hyper-V, ESXi and Xen all rely on each virtualized instance to have their own complete operating system, drivers, libraries and software packages to be installed and running. Docker moves away from this method and instead provides an abstraction layer between the host operating systems kernel and the containerization application. The containerized applications are configured to share the same operating system and libraries. This removes the overhead of running multiple instances of these items reducing system resource utilization. In addition to the performance benefits, Docker maintains the security features provided by virtualization hypervisors. Docker containers are configured to use virtualized network interfaces allowing segregation, VLAN tagging and inter-container networking amongst other features. The Docker container files are self-contained allowing them to be transferred freely between different physical hardware without the need for reconfiguration. This has also led to multiple repositories of Docker containers to be created, allowing the public to upload and share pre-configured open-source software packages. How might it transform computers and devices using it? Tell us some scenarios. By converting from using a traditional virtualized operating based configuration, end users can increase the utilization by running more software on less physical hardware. This in turn will reduce hardware, energy and other related costs and improve efficiency when deploying new software instances. Web hosting services could increase the amount of services existing hardware could provide and increase efficiency when deploying new services. For example, each WordPress installation could be configured in individual containers while accessing a shared SQL database, rather than each installation requiring a full virtualized operating system to be deployed per instance. Software developers can also take advantage of Docker to assist with their development and deployment cycles. Software can be configured and optimized on developers local machines or development servers and be easily transferred to quality assurance teams and finally to production environments. Why is it interesting and important? Docker is an important step forward from traditional virtualization technology. The software has been developed under the open-source Apache License 2.0 allowing anyone to take part in development and to also freely use and modify any components for their own project both personal and commercial providing they follow the licensing requirements in their scenario. By consolidating existing infrastructure energy emissions will be reduced, reducing the carbon footprint of users. Other consumables used in certain operations can also be reduced, such as water in server farm cooling configurations and physical space used allowing more compact configurations. Management and maintenance of software packages can also be improved. If issues are found with particular software version updates, providing the previous container is kept the singular application can be rolled back rather than the entire operating system. What is the device? Ring an IoT connected doorbell What does it do? How would you use it? Tell us some scenarios. Ring is a doorbell with an integrated camera, microphone, speaker, motion sensor and is internet connected via WiFi. By connecting the doorbell to the internet it is able to alert the user via a smartphone app when the doorbell is rung or the motion sensor is triggered. The user can then check the video feed from the door, to determine who is at the door. In response, the user can then choose to activate the speaker function to speak with the person at the door using the smart device, similar to that of a traditional intercom system. The device also saves its video recordings to a cloud service allowing the footage to be viewed anywhere using a compatible smart device. The device can be used in a number of ways. If the user is expecting a parcel and is not at the address at the time of the delivery, they will be alerted on their smart device when the doorbell is rung. Once the user is alerted via their smart device, they can then activate the video feed to confirm who is at the door and then use the speaker to advise the courier to leave the parcel in a safe location. Home security can also be improved by using the device. The video recording functionality will be triggered with any motion near the front door, even if the doorbell is not rung. This footage will then be stored off-site via a cloud storage service. In the unfortunate event of a break in, the intruder will be unable to destroy the footage, which can then be used to assist authorities in subsequent investigations. In addition, some insurance providers may offer reduced insurance premiums when such devices are installed. Briefly outline the devices interesting software/hardware/networking. In what way does computer technology transform or realise the device? Ring is provided with a mobile application that allows the doorbell to be paired with the users iOS or Android based mobile device. The doorbell has an integrated WiFi adapter which is used to connected to the users home WiFi network to provide internet access to the device. This allows the doorbell to provide notifications to the smart device application regardless of if the user is at home on the same network or are located elsewhere, provided they have access to an internet connection. The doorbells integrated motion sensor and camera add further functionality previously not possible. The camera used has been selected for its low-light performance, in combination with infra-red LEDs to provide illumination to the recorded footage without any light being visible to the human eye. This enhances its ability to be an inconspicuous security device. Recorded footage is saved off-site using a cloud storage service. This is used by the mobile application to provide the user with the ability to watch footage while away from their local network and to provide an archive solution without requiring a large amount of local storage. Why is the device an interesting or important example of embodiment? As defined by Professor Tony Hey in his book The Computing Universe: A Journey through a Revolution Butler Lampsons third age of computing is about using computers for embodiment that is, using computers to interact with people in new and intelligent ways This is shown through the Ring doorbell, in the way it allows the user to connect with the outside world in a new way. It provides the user the ability The ring doorbell provides a new way for users to connect with the outside world. It removes the need for a person to be home to accept parcels, it tracks motion which can provide the user with a greater sense of security at home all through the adoption of technology. Week 2 What are the devices? Device 1: Smartwatch Device 2: PC Characterise the computing requirements of the two devices? Device 1: CPU A smartwatch requires a CPU(Central Processing Unit) to process all machine instructions provided by applications and the operating system. Most smartwatches use an ARM architecture CPU. Bluetooth Bluetooth is a networking protocol used for the smartwatch to communicate with the host device (usually a smartphone). NFC NFC (Near Field Communication) is a networking protocol used for communicating with external devices. This is commonly used in contactless payment systems GPS GPS (Global Positioning System) is geolocation system used to provide location data to the device. This is commonly used for maps and navigation systems Battery A custom made lithium-ion battery. Used to provide power to all the components in the device. To recharge the battery either a port is provided to connect the watch to a power source or wireless charging is implemented to provide from a wireless power source Display A display is used to provide visual interface for providing information to the user. Touch interface A touch interface (Also known as a digitizer) is used to allow the user to interact with the smartwatch by touching on the display. Touch screens are commonly used due to the limited space on a smartwatch for other methods of interfacing with the device, such as buttons. RAM RAM (Random Access Memory) is required for the CPU to store data while is processing instructions. RAM is volatile memory and is not used for persistent data storage. Persistent Storage Persistent storage is required to store the operating system, applications and user data. This is commonly a form of NAND flash memory due, as it offers compact storage with no moving parts which could be damaged in a device that is moved during operation. Speaker Speakers are used to provide aural feedback to the user. Microphone A Microphone is used to receive aural data from the users, for example a phone call will require the Sensors There are numerous sensors located on a smartwatch that each monitor a different function.Most smartwatches have an Accelerometer to monitor acceleration, a Barometer to measure atmospheric pressure, a Gyroscope to measure the angle of the device, a Heart Rate monitor to measure pulse and an ambient light sensor to determine the backlight of the screen. GPU The GPU (Graphics Processing Unit) is used to accelerate the creation of visual elements. This is commonly integrated as part of the CPU in smartwatches due to size constraints. WiFi WiF is a networking protocol used to transmit data in a local network. This is used in a smartwatch to provide network connectivity when the host device (e.g. smartphone) is not available. Device 2: CPU A PC requires a CPU(Central Processing Unit) to process all machine instructions provided by applications and the operating system. Most PCs use an x86 architecture CPU. RAM RAM (Random Access Memory) is required for the CPU to store data while is processing instructions. RAM is volatile memory and is not used for persistent data storage. Persistent Storage Persistent storage is required to store the operating system, applications and user data. This can be a mechanical hard disk drive, utilizing magnetic platters to store data or a solid state disk which uses NAND flash memory to store data. Network Adapter A network adapter is required to connect the PC to a local network. This can be achieved through a range of interfaces including a wired ethernet connection or a wireless WiFi connection. Some systems will have both options available. GPU The GPU (Graphics Processing Unit) is used to accelerate the creation of visual elements. This can either be integrated into the CPU or can be provided through a discrete graphics adapter, for enhanced performance. USB Ports Power supply A power supply is required to convert mains AC power into DC power required to power the individual PC components. Some PCs (such as laptop computers) may utilize a battery to provide an additional power source Video Ports Audio Ports C. Device 1 Device 2 CPU Physically bigger, more Powerful Can run hotter, active cooling x86 based Physically smaller, slower Must run cooler, no active Cooling Arm based STORAGE Space for multiple drives Mix of mechanical and solid state drives Raid capabilities Solid state storage Physical constraints Less storage NETWORK ADAPTORS Can use wireless or wired connections Must be wireless Wifi Nfc 2. Moores Law Why might Moores Law come to an end soon? Explain based on current technologies. Moores Law was originally conceived in 1965 when Intel co-founder Gordon Moore posted an article about microprocessors. In the article Moore observed that the number of transistors in integrated circuits doubles roughly every 12 months. After 10 years once more data had become available Moore updated his theory from 12 months to 24 months. Intels latest processors are built using a 14 nanometer manufacturing process, however production of Intels next generations of processors with 10 nanometer transistors has already been pushed back by a year. Intel have stated that this was not a one-off occurrence and that they are not able to continue to keep up with the rate they used to. This shows that Moores law is now coming to an end too. One main reason that Moores law slowing down and potentially coming to an end is that its not possible to continue to keep shrinking transistors, while maintaining a functional device at the rate that is required to continue improving at the rate theorized. As MOSFET transistors follows the principles of quantum mechanics, as the transistors shrinks it makes it harder to determine if it is in the 0 or 1 state. The electrons inside the transistor can travel through devices with little resistance, therefore as the transistors get smaller, the resistance also gets lower which eventually lead to quantum mechanical phenomenon described as tunnelling rendering MOSFET based transistors non-functional. https://www.technologyreview.com/s/601102/intel-puts-the-brakes-on-moores-law/ http://spectrum.ieee.org/semiconductors/devices/the-tunneling-transistor Discuss a new or future technology which might overcome these technological limitations. Instead of trying to find ways to prevent quantum tunneling in transistors, researchers are investigating a new transistor design called TFET or Tunneling Field Effect Transistors. This style of transistor is designed to manipulate when quantum tunneling occurs in a controlled manner. This allows for transistors to be produced at an even smaller scale than MOSFETS can be without quantum tunnelling becoming a negative side-effect. Another advantage of this technology is that has the potential to be implemented in place of MOSFETs without the need for technology that implements them to be completely redesigned due to the similarities between TFET and MOSFET transistors. http://berc.berkeley.edu/tunneling-field-effect-transistors-beyond-moores-law/ https://engineering.nd.edu/news-publications/pressreleases/more-energy-efficient-transistors-through-quantum-tunneling What might be the ramifications if Moores Law comes to an end or slows down? If Moores Law comes to an end or slows down, the rate at which processor performance improves will decrease. This would reduce the rate at which new technologies are developed and would slow innovation in field relying on technology. 3. Non Von Neumann Processors Investigate a non von Neuman processor such as a graphics processor, FPGA or signal processor. How and why is it different from a general purpose CPU such as you might find a phone or PC? An FPGA or Field-programmable gate array is a type of integrated circuit that can be digitally re-programmed after it has been manufactured, unlike for example, the logic within a microcontroller which is hardwired during manufacturing. This It allows the user to program custom digital circuits using hardware description language to suit their requirements. FGPAs are sold without any pre-programmed instructions and are instead sold based on the physical features of the FGPA such as how many logic gates or how much memory it has, making it a very flexible device. As FPGAs can be reprogrammed without any need to change the physical hardware, this lends them to being used heavily in development and prototyping environments. Developers can create and update the logic throughout the development process without the need to purchase new hardware each time a change needs to be made. This is different to hardware such as a x86 CPU which cannot be reprogrammed and only supports the provided instruction sets. http://download.springer.com.ezp01.library.qut.edu.au/static/pdf/116/bok%253A978-1-4302-6248-0.pdf?originUrl=http%3A%2F%2Flink.springer.com%2Fbook%2F10.1007%2F978-1-4302-6248-0token2=exp=1490752308~acl=%2Fstatic%2Fpdf%2F116%2Fbok%25253A978-1-4302-6248-0.pdf%3ForiginUrl%3Dhttp%253A%252F%252Flink.springer.com%252Fbook%252F10.1007%252F978-1-4302-6248-0*~hmac=b61cb59b461de816fe408c9ab730e0d9cd6ab12d55885171f66b3c880d9aafaa 3-5 Week 3 OS 1 IBMs z/OS IBM z/OS is a operating system designed to be run solely on IBM mainframe computers. Mainframe computers are large, high-end computers designed specifically for processing large amounts of data, often used by large organizations. IBM describe the key features of the z/OS operating system as its stability, security and high availability (IBM, 2014, para. 1). OS 2 Embedded Linux Embedded Linux is a term used to cover the Linux operating system being used on embedded computer systems. These embedded systems are generally very low-end computers, designed to run a very specific and minimal set of software that are then embedded inside another product, for example they can be found in some models of washing machine to offer further functionality. Linux is described as being flexible and open (Siever et al., 2003, p.1-3) which offers developers to ability to customize it to their exact needs and requirements. Comparison and contrasting Both of these operation systems are designed to run very specific types of workloads. The z/OS mainframe operating system is designed to process and analyse large data sets to provide in-depth insight on the data (IBM, 2015). The operating system is designed to handle very high performance workloads and to run as quick and efficiently as possible. Embedded Linux operating systems are designed to run a very specific workload such a smart TVs interface with as minimal overheads as possible due to the hardware restrictions of the low-power systems that are used in most Embedded Linux implementations (Simmonds, 2015, p.1-12). Both systems are designed to run specific processes, however the z/OS operating system is designed to run processes on high-end hardware on a large scale, whereas the Embedded Linux operating system is most commonly used on low performance hardware on a small scale. Open Source Software Security/Flexibility Open source software gives users the option to modify and adapt software to their needs. As the entire source code is publicly available and the software can be adapted, used within another software package or re-released as a different product, depending on the license type the original developer released the software under (Open Source Initiative, 2016). This also provides security to users, as they can audit the code themselves for security issues and if required patch the source code directly, rather than relying on a third party to find and resolve any potential issues. Cost Licenses for closed source commercial operating systems can range from a few hundred dollars up to thousands of dollars per installation (Microsoft, 2016). This can become very expensive for businesses that rely on a large amount of physical and virtualized operating systems. Open source software has no licensing costs associated with it, which can significantly reduce licensing costs, depending on the use case. This is also applicable to embedded platforms, which are generally designed to have a low cost per unit. Open source software can remove software and operating system licensing costs, helping to maintain a low cost per unit. Operating System Arch Linux a lightweight and flexible LinuxÂÂ ® distribution (Arch Linux, 2017) How are new features developed? New features developed in two main ways. The first of which is by the individual package developers, for example new features to the Netcat package will be developed by the Netcat developer community. Arch Linux package maintainers are then responsible for packaging new releases for the Arch Linux operating system and adding them to the Arch Linux package repository. The second way features are developed are by the Arch Linux developer team (Arch Linux, 2017). The features they develop range from developing and implementing software developed specifically for the operating system, to configuration and modification of third party packages and managing what packages are included and how they are used in the base operating system installation. How do new features make their way into a release? Arch Linux doesnt follow a traditional fixed release cycle, rather it employs a rolling release model (Arch Wiki, 2017) which allows individual components to be updated as soon as they are deemed ready. Packages are updated as soon as the maintainer has deemed the package stable and ready for release, after which it is upload and added to the repository. This model aims to remove the stagnation between fixed releases and instead aims to keep all at their latest releases. References: Arch Linux. (2017). A simple, lightweight distribution. Retrieved March 23, 2017, from https://www.archlinux.org/ Arch Linux. (2017). Arch Linux Developers. Retrieved March 23, 2017, from https://www.archlinux.org/people/developers/ Arch Wiki. (2017). Frequently asked questions. Retrieved March 23, 2017, from https://wiki.archlinux.org/index.php/Frequently_asked_questions IBM. (2014). Mainframe operating system: z/OS. Retrieved March 23, 2017, from https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_opsyszosintro.htm IBM. (2015). IBM z/OS Fueling the digital enterprise. Retrieved March 23, 2017, from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=cainfotype=ansupplier=897letternum=ENUS215-267 Microsoft. (2016). Pricing and licensing for Windows Server 2016. Retrieved March 23, 2017, from https://www.microsoft.com/en-au/cloud-platform/windows-server-pricing Open Source Initiative. (2016). Licenses and Standards. Retrieved March 23, 2017, from https://opensource.org/licenses Siever, E., Weber, A., Figgins, S. (2003). Linux in a nutshell (4th ed.) Sebastopol, CA: OReilly. Simmonds, C. (2015). Mastering embedded linux programming (1st ed.). GB: Packt Publishing. Week 4 Network 1 WiFi WiFi (also known as Wireless LAN or WLAN) is a network technology designed as a replacement to LAN cabling and is developed around the IEEE 802.11 specification. The IEEE 802.11 specification is the standard dictating the use of the 802.11 radio frequency that WiFi uses to transmit data wirelessly (Tjensvold, 2007). Within the 802.11 specification there are a range of protocols that have been developed, with the current standard being the 802.11ac revision. This specification has support for speeds over 1Gb/s, depending on the antenna configuration in use. The range of a WiFi signal is generally quite short at approximately 20-25 metres depending on obstructions. This makes it good for use in home and business environments where access points can be installed where WiFi signal is required, but makes it a poor choice for larger area networks, such as mobile phone data. WiFi power usage is split between the access point and the client receiving the data. The access point uses significa ntly more power to broadcast the signal than the client device needs to receive it (Zeng, 2014). The latency provided by modern WiFi specifications, such as the 802.11ac revision offers low latency communication between clients and access points. The exact latency the client will note, will be dependant on the band being used (either 2.4GHz or 5Ghz in the case of 802.11ac), obstructions and the amount of antenna in use on the access point. Security of WiFi networks is dependant on how they are configured. A basic home configuration using outdated security technologies such as WEP or WPA1 to authenticate users is at risk of unauthorized users gaining access to the network. WPA2 authentication offers a stronger level of security by implementing the AES-CCMP algorithm. WiFi networks can also be vulnerable to MITM (Man in the middle) attacks, where a potential attacker can attempt to spoof the WiFi network, which clients may unsuspectingly connect to which will then allow the attacker to see any traffic of the connected clients. The effectiveness of this type of attack can be counte racted by ensuring traffic is being transmitted over secure protocols such as HTTPS and SSH, which will render the intercepted data unreadable (Joshi, 2009). Network 2 Bluetooth 4 and Bluetooth Low Energy (BLE) Bluetooth 4 is a short range network technology developed by the Bluetooth Special Interest Group. Bluetooth 4 covers a range of specifications including Bluetooth low energy, Bluetooth High speed and Classic bluetooth. Bluetooth is used for short range personal area (PAN) and ad-hoc networks, primarily in portable devices such as smart phones. Bluetooth devices are classified into 3 classes, depending on the transmission power of the device and the intended usable range. Class 1 devices have 100 mW transmission power and are designed to be used at ranges of up to 100 meters, class 2 devices have 2.5 mW transmission power and are designed for use at up to 10 meters and class 3 devices have 1 mW of transmit power and are only usable at ranges of under 10 meters. Class 1 and 2 are the most commonly used types, with class 1 devices generally being used in desktops, laptops and other devices with a large battery or mains connected power supply. Class 2 devices are generally used in porta ble devices such as smart phones, IoT connected devices and wireless headsets. Class 2 still allows for a usable range while keeping power usage to a minimum (Wright, 2007). The Bluetooth specification has 4 different security modes in which devices can operate. The security mode in which the device will operate will be selected based on the Bluetooth standard in use on both devices. Bluetooth 2.1 and later devices have a mandatory requirement to use security mode 4, proving both devices support it. Service mode 4 forces encryption for all services, providing security for all communications except for service discovery (Padgette, 2012). Compare and contrast fibre optic and wireless technologies within the context of a National Broadband Network (NBN) for Australia. Fibre Optic (FTTP) The National Broadband Network (NBN) provides a range of connection types with fibre optic technology being utilised in multiple service types including fibre to the premises (FTTP), fibre to the node (FTTN) and fibre to the distribution point (FTTdp) (NBN, 2017). Fibre optic connections use a optical fibre cable that uses light to transmit data. This type of cable transmits data faster, further and with a lower latency than the traditional copper cable which transmits data by electrical impulses. As this technology relies on a physical connection to the premises it is not practical to utilize this technology for remote locations, however for areas with higher population densities supplying broadband via FTTP is more practical as the cost per premises is decreased and reduces load on wireless services. Fibre optic cable is not affected by signal degradation as significantly as copper cabling and is therefore able transmit data across long distances more effectively . As the cable transmits data by light pulses the cable is resistant to any noise and ground vibrations interrupting or degrading the signal. Fibre optic cable is also able to supply much higher bandwidth connections (Malaney, 2010), with NBN already offering 1Gbps products to service providers, although this product is not currently being on-sold to consumers due to factors including demand and pricing accordin

Wednesday, October 2, 2019

Oedipus :: Greek Gods

Oedipus, the ruler of Thebes, approaches a group of unhappy citizens, represented by a priest, and asks them what is wrong. They answer that the city is dying and that they are sick and poor. Oedipus sympathizes and tells them that, as their ruler, he is also troubled by the sickness of the city, and has already taken steps to see that something be done about it. The first step he has taken was to send Creon to Apollo's shrine to see what the god recommends they do. As Creon appears, he tells them that the god, Apollo, said that there is bad blood in Thebes, and that until this blood is expelled Thebes will be a sick city. This bad blood is the blood of the person who killed Laios. When Oedipus asks why the case was not investigated, as he had not come to Thebes at that point, the people answer that they were too busy trying to solve the Sphinx's riddle. Oedipus says that no matter what the cost is, he will get to the bottom of it, both because it harms Thebes, and because Laios was noble and loyal. The elders say that they do not have any knowledge of the murder, and suggest that Oedipus call Tiresias, a blind prophet, to help and advise him. Oedipus says that he has already done this, and Tiresias arrives promptly. Although reluctant to speak, Oedipus forces Tiresias to reveal what he knows. Tiresias says that Oedipus is Thebes' pollution and that he killed his father and sleeps with his mother, and that this is the truth. Oedipus accuses Tiresias of lying on Creon's behalf so that Creon can kill Oedipus and take over the position of ruler of Thebes. Creon enters and says that Oedipus is not making any sense-of course he did not collaborate with Tiresias, because he also owns a third of Thebes but chooses not to rule it, leaving Thebes to Oedipus, which shows that he is not interested in ruling at all. Iokaste enters and stops the two men from arguing. When Creon leaves, she asks Oedipus what happened and he explains the whole story to her. She tells him not to believe the words of the oracle, as an oracle once predicted that her son would kill his father and share her bed, and this has never happened. She bore a son with Laios, but Laios had the feet of the child bound and had the child tossed in the wilderness.

Tuesday, October 1, 2019

The Era of New Technology Essay -- Business, Sony Products

::: INTRODUCTION ::: Many people cannot visualise the period of time when technology begin to develop incredibly fast day by day. By innovating products which never have place before people started to purchase the novelty as well as enjoy the revolution. The era of new technology also increase the market research as more people wanted to expand and invent different ideas to become competition. In addition the modernisation started to bring huge amount of profits so people begin to formulate more and more companies to come up with better inspiration as well as to beat the competition. In 1946, Masaru Ibuka and Akio Morita establish company called Sony. The company created and launched the first magnetic tape recorder called the G-TYPE recorder in Japan. From that day he expands and invents new ideologies to his company as this was the first profitable product to the company. Next stage of Sony was receiving licensing rights to transition in 1953 from Western Electric. Furthermore, the release of the world’s first pocket transistor radio in 1955 which ascertain a market leadership position for the company. Sony was one of the first companies which arise on global market. As Christophe Catesson states â€Å"Since Sony does arise, it has been noted for manufacturing some of the best in-house standards for new storage and recording technologies as a substitute of adopting those products manufactured by other companies.† (2008) The establishment of Sony Corporations in United States occur in 1960. The creation of the company name â€Å"Sony† was inspired by merging two words. The first one is â€Å"sonus† in Latin, which means â€Å"sound† and the other is â€Å"sonny† which means little son. â€Å"The words were used to show that Sony is a very small group of... ...many profits as until now. As Sony has in plans to invent the multi device which be combined of phone, console and notebook. Another creation which has to bring on the market is Bright Era projectors. New invention like that will keep the Sony brand on the top of the list as well as getting the bigger profits. In 1955, Morita prediction to the Sony Company states â€Å"that Sony would be famous around the world within 50 years† For instance it develop more rapidly as he thought. The impact of Sony on the marketplace worldwide is very strong as well as has many followers in their innovations. Finally summarise the all undertakings that Sony have made by these days is â€Å"company culture and widely acclaimed by customers of all ages and in all parts of the world.† (2011) Sony creators should be proud of themselves and feel the satisfaction of the benefits to the future.

Company law ans

Bristol is a substantial shareholder in Chester-Perry Industries Ltd. A business competitor, Gun and Fames Pity Ltd, is selling in great volume a cookbook similar to one in respect of which Chester-Perry Industries holds the copyright. Bristol believes his company has incurred a substantial loss and his own shares have been reduced In value by $150,000. HIS solicitors believe an Infringement of copyright has occurred. Cycles and Pollock are the directors of Chester-Perry Industries Ltd. They state that they have decided not to litigate because they believe hat to take legal action for infringement of copyright is too expensive and risky.Bristol is unsure whether the directors of Chester-Perry Industries have any interest in Gun and Fames Pity Ltd. On the general principles laid down Salmon's case, can Bristol sue Gun & Fames? Issue: Can Bristol sue Gun & Fames on behalf of Chester-Perry as a shareholder in Chester-Perry? Relevant law: Salomon. Application: The House of Lords in Salom on held that upon incorporation, a company beneficially becomes a separate legal entity even though its issued shares are owned by the same person Like In Salomon.Similarly In this question, Chester-Perry Is a company that has been incorporated and therefore, is a separate legal entity from all its shareholders. In this case, according to Salomon, Bristol who is a shareholder of Chester- Perry cannot sue Gun & Fames on behalf of Chester-Perry as a company is separate from its shareholders. Conclusion: Bristol cannot sue Gun & Fames on behalf of Chester Perry due to the principle laid down in Salomon where upon incorporation Chester Perry is considered as a separate legal entity from all its shareholders, including Tutorial 2 Bristol.Q(a). The Constitution of Big Hopes Pity. Ltd. Includes the following provisions: Rule XSL: On any Increase In capital the new shares must be offered to members In proportion to their excellent shares. John (an existing shareholder) is distressed when an allotment of a new issue is Issue: of What action can John take against Big Hopes for failing to allot new issue shares to him according to Rule xi of the Constitution? Relevant law: CA 2001. Application: s. 140(1)(a) states that a constitution of a company is a contract between the company and its company and its shareholders.In this essence, both the shareholders are bind by the constitution. Must Big In this instance, Rule xi of Big Hopes' constitution states that new shares be offered to existing shareholders as per their existing shares. However, Hopes failed to allot new shares to John as according to his existing shares and have therefore breached its contractual obligation in the constitution under Conclusion: John can take an action against Big Hope under s. 140(1)(a) for breaching its to contractual obligation in its constitution for failing to allot the new shares John as per his existing shares.Tutorial 3 Q. John, Ring, George and Paul incorporate Big Hopes Pity Ltd for their property development business. Big Hopes Pity Ltd was empowered under a provision in its constitution to appoint a managing director. However, the company did not appoint managing director, executed a contract with Vincent for the purchase of a certain property. The market price for the property subsequently collapsed. The board of Big Hopes Pity Ltd, learning of the contract, expressed their disapproval to Paul and claimed that the company was not bound by the contract.Vincent seeks your advice as to his legal position. Issue: Is the company bound by the contract with Vincent? Relevant law: Constructive notice, Turned, and s. 129(2)(a) and (b), s. 29(5) (6) CA 2001 , Actual authority and Apparent authority. Application: Under the old principle of constructive notice, the constitution of public companies are made available for public inspection and therefore, the public are deemed well aware of the limitations on the authority of the companies' principle will not apply here a s Big Hopes is a private officers. This old company.Furthermore, under the common law Turnaround's case, any outsiders with companies can assume that the persons with whom they are with have the authority to contract on behalf of the companies and all proceedings have been complied with. Dealing internal In this case, the constitution of Big Hopes states that a MD should be appointed but did not state that Paul has been properly appointed as the MD. Vincent can argue that he assume that Paul has been appointed as the as per the Turnaround's case and therefore, has the authority to contract on behalf of the company.He also has no actual knowledge or suspicion that Vincent has not been properly appointed (Note: In test/exam, if there are any circumstances that arouse suspicion, argue using the case of Nonresident Developments). The principle of constructive notice has also been abolished by s. 130(1) of CA 2001. In dealing with companies, outsiders are entitled to make certain assumpt ions contained in s. 129 of ACACIA as per s. 128(1) of ACACIA. In this instance, Vincent can argue that he has been empowered by s. 128(1) to make certain s. 129 assumptions when contracting with Paul from Big Hopes. Reticular, he can assume under and (b) that Paul has been properly appointed as the MD of Big Hopes and can therefore exercise all the customary duties of a MD which include entering into contracts on behalf of Hopes. In this essence, Vincent can assume that Paul has actual implied authority to enter into contracts on behalf of Big Hopes. Note: In test/exam, if question requires arguing on apparent/ostensible authority, use the case of Freeman Locker to support your argument). Vincent can also argue either s. 129(5) or (6) depending on whether Big Hopes execute contracts by way of seal or without seal.Either way, Vincent can argue that Paul has complied with all the internal proceedings when executing the contract with/without seal (e. G. Proper meeting, quorum, fixatio n of seal, witnessing of fixation et cetera) under either of these two sections. The exceptions under s. 128(4) CA 2001 will not apply to Vincent as he has ever known or suspected that Paul has not been properly appointed and the contract has not been properly executed. Conclusion:Big Hopes is bound by the contract with Vincent under both common law (as per Turnaround's case whereby entitled to make certain s. 29 assumptions again, there is no evidence suggesting any when dealing with Big Hopes and exceptions under s. 128(4) that will rebut the s. 129 assumptions made by Vincent. Tutorial 4 Q. Maria is keen to purchase shares in Action Ltd. , but is unable to raise sufficient funds to do so. It is suggested that the company lend Maria the sum of $50,000 to enable her to complete the purchase. The directors of Action Ltd. Seek your advice as to this proposal. Issue: Can Action Ltd lend Maria the sum of $50,000? Is this considered as financial assistance?Relevant law: s. AAA(1) CA 200 1, ASIA v Adler. Application: Under s. AAA(1), a company may only financially assist a person if it (a) does not materially prejudice the interests of its shareholders and affect its ability to pay its creditors, (b) must be approved by all shareholders, and (c) exempted by s. CHIC. Therefore, before Action Ltd lends the $50,000 to Maria, it must ensure that it has comply with all the requirements in s. AAA(1). Otherwise, Action Ltd will be breaching s. AAA(1) as per the case of ASIA v Adler. In ASIA v Adler, Mr..Adler the director in HI has utilized the money of HI to financially assist his personal company PEE to purchase the shares in HI when HI was already in financial difficulty and without the approval of the shareholders. The court deemed this to be a contravention of s. AAA(1). Requirements in s. AAA(1). Conclusion:Action Ltd can only financially assist Maria to purchase the shares of Action Ltd if it satisfied all the requirements in s. AAA(1). Otherwise, Action Ltd will be deemed to have contravened s. AAA(1) as per the case of ASIA v Adler.Tutorial 5 Q. An opportunity has arisen to purchase land for development at Christmas Hills. The shareholders of Central Developments Ltd. Passed a resolution that the company purchases the land. However, the directors have ignored the resolution and refuse to act on it. Are the directors bound to implement the shareholders' resolution? Issue: Are the directors of Central Developments bound by the shareholders' resolution to purchase the land at Christmas Hills? Relevant law: Separation of ownership and management powers, Automatic Self- Cleansing, John Shaw.Application: Under the principle of separation of ownership and management powers, the management of the company is vested fully in the board of directors despite the shareholders owning the company. Therefore, the shareholders cannot pass resolutions instructing the directors on how to manage the company. According to the cases of Automatic Self-cleansing and John Shaw, the directors as long as acting within the management powers bequeathed on them by the company's constitution have absolute power in managing the company and the shareholders have no rights to interfere in this as per the company's constitution.In this event, the directors of Central Developments can ignore the resolution of the shareholders to purchase the land at Christmas Hills because purchasing of land can be considered as a type of management power and only the Conclusion: The directors of Central Developments can ignore the resolution of the shareholders to purchase the land at Christmas Hills because the directors have absolute power to manage the company including whether to purchase the land as per the principle of separation of ownership and management powers and the cases of Automatic Self-cleansing and John Shaw.Tutorial 6 IQ. Seven Dwarves Ltd operates nursing homes. Its directors are Sleepy, Grumpy and Dopey. They hold 30% of the shares in the company. The directors allocate 1 million new shares to certain business associates. This has upset certain shareholders who claim that the placement was made with a view to preventing a future takeover offer being made. The directors claim that the allotment was made to raise cash required for the company's future needs. Advise the shareholders.Issue: Advise the shareholders whether the directors have breached any of their director's duties by allocating 1 million new shares to certain business associates? Relevant law: s. 181 CA 2001 â€Å"proper purpose† (but for test), Whitehorse v Carlton, Howard Smith. Application: Under s. 181 CA 2001, directors must act in good faith, in the best interest of the shareholders and for a proper purpose. The shareholders in claimed that the directors have issued 1 million new shares to Seven Dwarves certain business associates to defeat a takeover and therefore, the issuing of these new shares is for an improper purpose.To determine whether the issui ng of new shares is for an improper purpose (I. E. To defeat a takeover), the but for test will be applied. But for to defeat a future takeover, will the directors issue the 1 million new shares? † (Note: Students must reason and argue on this question to reach an answer, either Yes/No). If the but for test reveals that no, if not to defeat a takeover, the directors will not issue the new shares, then obviously the reason for issuing shares is to defeat a takeover. He to prevent the wife from having majority control over the business and in the case of Howard Smith, whereby new shares were issued to prevent future takeover, the court ruled that the issuing of new shares in these cases was for improper purpose. Therefore, the directors have breached s. 181 because their purpose in issuing the 1 million new shares to certain business associates is to defeat a future takeover which is considered as improper as per the two cases discussed above. Conclusion: The directors of Seven Dwarves have breached s. 81 because they have issued cases new shares for an improper purpose (I. E. To defeat a takeover) as per the of Whitehorse v Carlton and Howard Smith. Tutorial 7 (This question is not taken out from the tutorial questions but you can still use it as a reference for answering questions from this tutorial) Sam and Pete are the erectors in BBC Pity Ltd. They have decided to use the 1 million dollars in the company's bank account to invest in the shares of DEAF Ltd after doing all the necessary research and making all the necessary inquiries by themselves from the Internet and financial Journals and magazines.Six months after the investment, the World Financial Crisis occurs and DEAF Ltd goes into liquidation causing BBC Pity Ltd to lose its 1 million dollars investment. Do the shareholders of BBC Pity Ltd have a course of action against Sam and Pete? Issue: Do the shareholders of BBC have a course of action against Sam and Pete for asking an investment that cau sed the company to lose 1 million dollars? Relevant law: Old subjective common law standard, Re Cardiff Bank, Re City Equitable Fire Insurance, Daniels v Anderson (objective standard), s. 80(1) and s. 180(2) CA 2001. Application: Under the old common law, a subjective standard is applied to directors when exercising their duty of care towards their companies. In both the case of Re Cardiff Bank and Re City Equitable Fire Insurance, the subjective standard is applied whereby directors were only required to exercise duty of care as per their personal level f skill and experience. However, this approach has been overruled by the modern objective standard landmarks in the case of Daniels v Anderson.In this case, all directors are expected to exercise a duty of care that any other reasonable directors will apply in the same position and circumstance and not according to their personal level of skill and experience. This standard is further illustrated in 180(1) CA 2001 which states that directors must exercise their power with degree of care that any reasonable directors would exercise in the same circumstances, position and responsibilities. In this event, if the shareholders of BBC are able to establish that any other Sam and Pete would be breaching their duty of care towards BBC under 180(1).However, Sam and Pete will be able to raise the Business Judgment Rule Defense (BBC) in s. 180(2) CA 2001. In order for them to raise the BBC, they must satisfy four elements; (1) They have made the business Judgment in good faith and for a proper purpose – there is no evidence that Sam and Pete have ill intentions when making the investment, (2) They have no material personal interest in the business Judgment – again, there is no evidence that Sam andPete have gained any benefits financial or non-financial wise from the investment, (3) They have informed themselves of the subject matter of the business Judgment – there is evidence that Sam and Pete have done all the necessary research including online and from Journals and magazines, and (4) Any other reasonable person in the same position and circumstances would have made the same investment as they did after doing all the research – Sam and Pete must be able to prove so. If Sam and Pete are able to establish all the elements in s. 180(2), then they will be able to use the BBC to defend themselves from breaching s. 0(1). Conclusion: The shareholders of BBC will have a course of action against Sam and Pete if they can prove that no reasonable director will invest the 1 million dollars in DEAF and therefore, in doing so, Sam and Pete have breached their duty of care to the company under s. 180(1). However, if Sam and Pete can establish all the elements under s. 180(2), then they will be able to use the BBC to defend themselves from breaching s. 180(1). Tutorial 8 (These questions are not taken out from the tutorial questions but you can a shareholder in EX. Pity Ltd.