Tuesday, December 24, 2019
Analysis Of The Book Into The Wild - 1227 Words
Julia Sharp AP English Language Summer Reading 8/24/15 Into the Wild by Jon Krakauer Journal #1: Bibliographic entry Krakauer, Jon. Into the Wild. New York: Anchor, 1997. Print. Journal #2: Visual Symbol A visual symbol that would be considered appropriate and important to the work would be the Magic Bus. This Magic Bus provided Christopher McCandless with a place of shelter in the American West. He came across this abandoned bus during his travels and gave it this name because of a song from ââ¬Å"The Whoâ⬠which was a British Rock band that Mccandless favored. The author included this visual symbol in the book most likely for the purpose of demonstrating McCandlessââ¬â¢ belief in luck and hope. McCandless believed that since he randomly came across a bus in the wild, it was considered a form of luck because it wasn t likely for someone to come across that during an expedition in the wild. He also later on eats the wrong berry that unfortunately poisons him, leading to his death that took place on the old mattress in the Magic Bus; which he viewed as a loss or ending of his luck that he has been granted with. ââ¬Å"ââ¬ËMagic Bus Dayââ¬â¢, he wrote in his journal. He decided to lay over for a while in the vehicle and take advantage of its crude comforts.â⬠page 163 ââ¬Å"Billie is first enter the bus. Walt returns from the stream to find her sitting on the mattress where Chris died, taking in the vehicleââ¬â¢s shabby interior.â⬠page 202 ââ¬Å"For a few minutes the rid of the bus remains visibleShow MoreRelatedAnalysis Of The Book Into The Wild By Jon Krakauer1106 Words à |à 5 PagesTaste of Adventure Changing your life should not be to run away from your problems; but to do what is best for you. In Into the Wild (1996), Jon Krakauer writes this biographical novel in order to inform readers about a young man named Chris McCandless, who changes his name to Alexander Supertramp, and his identity. Raised in a middle class family with both parents in the suburbs located in Washington, D.C. McCandless is an idealist, intellectual young man who graduated with honors from Emory UniversityRead MoreAnalysis Of The Book Into The Wild By Jon Krakauer1686 Words à |à 7 PagesRebellions can have both a negative and positive outcome not matter what the cause. In the book ââ¬Å"Into the Wildâ⬠, written by Jon Krakauer, the character Chris McCandless embarks on a journey of ultimate freedom and exemption. Washington and McCandless are similar because they did something most people would not. They both stepped out of the ordinary society and decided to do what they think is best. For ex ample, Washington led the Continental Army against the great British Empire, and Chris left hisRead MoreAnalysis Of The Book Into The Wild By Jon Krakauer1669 Words à |à 7 PagesElements of Transcendentalism In the book, ââ¬Å"Into the Wildâ⬠by Jon Krakauer, Chris McCandless is an in-the-closet transcendentalist; all of his ethics match up with those of a transcendentalist, yet he never admits he is one. McCandless agrees with all of the components of transcendentalism and follows them unremittingly as soon as he graduates from college, and he lives by those components to a fault, which ultimately led to his death. Deliberate living, nonconformity, and simplicity are three cardinalRead MoreAnalysis Of The Book Where The Wild Things Are 919 Words à |à 4 Pagesfor animal, which shows how they distinguish animal and human: a live thing which behaves in a wild, aggressive, or unpleasant way. In Maurice Sendakââ¬â¢s Where the Wild Things Are, the behavior of Max, the protagonist of the story, challenges the boundary line between the animal and human. The way human and animal live their life and convey their love severalizes human and animal. Admittedly, the wild and aggressive behavior creates an animal. As human beings, people are given high intelligence toRead MoreAnalysis Of The Book Travels With Charley And Into The Wild 1414 Words à |à 6 Pagesboring lives. Life in America is hard, there are highly expectations from people and the judgment is in every corner one turns to. The two novels, Travels with Charley and Into the Wild are two unique novels about separate individuals who choose to travel in order to seek what they are looking for. McCandless, from Into the Wild, is a young man who travels to Alaska to seek for the freedom he wanted and to escape from the reality he was living. John, from Travels with Charley, is a retired citizen whoRead MoreAnalysis Of The Book The Wild By Jon Krakauer1402 Words à |à 6 PagesMcCandless, an affluent 20-something from Virginia, who wound up dead following his two-year long self-righteous odyssey. Author Jon Krakauer wrote an article on McCandless for Outside magazine , which later disseminated into a novel titled Into the Wild. At a glance, McCandless and Ellsberg may seem like polar opposites, but after a parsing examination, one can see that they are incredibly similar. Both Ellsberg and McCandless advocated for and upheld their principles at all costs, and were incrediblyRead MoreAnalysis of a Picture Book--Where the Wild Things Are Essay1307 Words à |à 6 PagesANALYSIS OF A PICTURE BOOK WHERE THE WILD THINGS ARE Written and Illustrated by Maurice Sendak Picture books can have a very important role in a classroom, from elementary school through middle and even high school. They offer a valuable literary experience by combining the visual and the text. Maurice Sendakââ¬â¢s Caldecott Award winning book, Where the Wild Things Are, is a wonderful blend of detailed illustrations and text in which a young boy, Max, lets his angry emotions create a fantasyRead MoreAnalysis Of The Book Wild Swans By Jung Chang Essay1423 Words à |à 6 Pagesthat also serves as a biography, Wild Swans, by Jung Chang, this is seen. The book, which outlines the biographies of the authorââ¬â¢s grandmother and mother, as well as her own autobiography, gives an interesting look into the lives of the Chinese throughout the 20th century. This book is beyond eye opening, and is truly a raw glimpse into the daily lives of women throughout China, struggling with situations that no human should ever be thrown into. I loved this book and was truly scared a bout theRead MoreAnalysis Of The Book The Wild New York Anchor 2300 Words à |à 10 PagesAndrey Nikitin AP ENG August 19th, 2014 Journal 1: Bibliographic Entry Krakauer, Jon. Into the Wild. New York: Anchor, 1997. Print. Journal 2: Visual Symbol-Money As Christopher McCandless lived through his adolescent life he was ââ¬Å"always an entrepreneurâ⬠(115), whether Chris was selling vegetables at an early age to his neighbors or opening his own copy business. However, as Chris grew older, he ââ¬Å"believed that wealth was shameful, corrupting, inherently evilâ⬠(115). This signifies hisRead MoreAnalysis Of The Book The Wild Travels With Charley And On The Road Essay2316 Words à |à 10 Pagesboring lives. Life in America is hard, there are high expectations from people and the judgment is in every corner one turns to. The three novels, Into the Wild, Travels with Charley, and On the Road are three unique novels about separate individuals who choose to travel in order to seek what they are looking for. McCandless, from Into the Wild, is a young man who travels to Alaska to seek for the freedom he wanted and to escape from the reality he was living. John, from Travels with Charley, is a
Monday, December 16, 2019
Bad Boys Free Essays
Nick Stephens 4/3/13 Albritton Sociology 3255 Bad Boys Ann Arnett Fergusonââ¬â¢s book ââ¬Å"Bad Boysâ⬠discusses the way educators and other people in the school systems, and society as a whole view black youth in todayââ¬â¢s world. There are many stereotypes that are discussed and stigmas that stick with black children through their entire lives in Fergusonââ¬â¢s book. In order to prevent further damage to this part of our society the reader should take a long hard look at the problems brought forth by ââ¬Å"Bad Boysâ⬠. We will write a custom essay sample on Bad Boys or any similar topic only for you Order Now One problem that Ferguson discusses in her book is adultification. According to her definition adultification is the idea that teachers and other adults see black children as willfully bad. Since they are seen in this light it creates an idea that black boys have adult motivations thus, making black boys seem like criminals instead of kids. Also, along the same lines, black girls are perceived as dangerously sexual. While this issue seems sort of ridiculous, these things actually happen in our public school system. While white children are seen as naturally naughty, essentially authority figures adopt the ââ¬Å"boys will be boysâ⬠mentality when white boys get in trouble or act out, instead of issuing punishment equally to white children who act out. Ferguson states, ââ¬Å"One the one hand children are assumed to be dissembling, devious, because they are more egocentric. On the other hand, there is an attribution of innocence to their wrongdoing. In both cases, this is understood to be a temporary condition, a stage prior to maturity. â⬠(80) Another problem that Ferguson observes in her book is the two controlling images of black males in schools. She says, ââ¬Å"Two cultural images stigmatize black males in the United States today: one represents him as a criminal, and the other depicts him as an endangered species. I found that both of these images were commonly invoked at Rosa Parks School for identifying, classifying, and making punishment decisions by the adults responsible for disciplining the kids. â⬠(20) The way that black boys are seen creates a social hierarchy based solely on class. Ferguson is able, through her first-hand experience, to record instances that show these problems in action and give the reader insight to the problems that are being addressed. The image of black children being criminals is inherent to their development. If they are treated from a young age as criminals, they will eventually come to accept that as part of their social identity, leading them to actually commit crimes in the future. If they were treated equally then black children, especially males, may not be on a definite path into the heart of the criminal justice system by the time they are adults. Ferguson addresses another problem that has a severe effect on the psyche of young black boys in public schools. Teachers and administrators alike are guilty of assuming that these children are headed for a future of crime. They are labeled as unsalvageable and bound for jail. She uses the example, ââ¬Å"There is a jail cell with your name on itâ⬠coming from the teacher to one of their students. This is damaging to the childââ¬â¢s development because it seemingly predetermines their fate. The punishing room that Ferguson discusses is primarily made up of black boys. The punishing room makes these boys truly believe that they are bad, and that since even their teachers and other superiors cannot see through this it tends to give the children a sense of identity as someone who is bad, and does not really count. With the punishing room the idea is solidified in the minds of these children, which is a problem. Ideally these troubled children should be worked with individually in order to get to the root of the reason that they are acting out in school. Ferguson says about the punishing room, ââ¬Å"The child who gets in trouble is the norm. Identities and reputations are made and remade here. It is the space in the school in which everyone is like yourself-in trouble-and you are no longer different. â⬠This quote gives the reader a visible reference of why some of these children, deemed unsalvageable by their teachers, may get into trouble on purpose so they have to go to this place where at least they are not alone. This leads into the idea of the importance of group identity. Ferguson explains the importance of group identity in her book by basically saying that kids need to feel like they fit it, and they will use whatever tools necessary in order to do so. This is all brought together by the idea of cultural capital. Ferguson explains that in the school system there is a hierarchy of the children, ââ¬Å"The disciplinary techniques of the school actively produce social identities of ââ¬Å"goodâ⬠, ââ¬Å"badâ⬠, ââ¬Å"giftedâ⬠, ââ¬Å"having potentialâ⬠, ââ¬Å"troubledâ⬠, and ââ¬Å"troublesome,â⬠rather than ferret them out and reveal them as they naturally exist. The importance of group identity is essential in the development of all children. It helps them to develop a sense of self, who they are, and who they want to be. The problem lies in the fact that children are becoming fine with the idea that they are ââ¬Å"badâ⬠and come to accept that as reality, which allows them to form that identity, in turn making them into bad kids, because the only way that they are able to fit in to the social atmosphere is by acting out and getting in trouble. The boys in Fergusonââ¬â¢s study use the importance of group identity, coping mechanisms in public, and classroom performance in tandem to secure their own personal identities. Most of the kids are not really that ââ¬Å"badâ⬠they often have extenuating circumstances outside of school that make school not seem important to them. They often feel secluded, which draws from the problem with adultification by their teachers and other superiors. So by acting out in the classroom they get attention, even though it is negative attention, it is still attention. Through the eyes of the teachers it seems like they are just putting forth a poor classroom performance. They do not see the struggles that the children go through outside of school, which tends to directly have an impact on the way the handle themselves in social situations, craving the need to belong to some sort of group. So they turn to what is presented to them, being bad. In conclusion, there are many flaws with the education system in the United States. The processes in which black children are dealt with need to be reformed. The idea of adultification as defined by Ferguson is a serious issue that plagues schools, where even teachers who are conscious of this fall into the category of looking at black children as small adults, holding them to different standards than their white counterparts. They are still subject to the controlling images of black males as being criminals, and assuming that they are on the path to prison anyway, so what is the use. This is unacceptable. Different strategies in dealing with this problem should be implemented than the ones that the public school system has to offer at the present time. Through Fergusonââ¬â¢s first-hand accounts of what she observed during her time in Rosa Parks School the reader is painted a picture of the very real problems at hand. Most people outside of these schools do not even realize what is going on and that is a problem as well. By studying Fergusonââ¬â¢s work one can hope that in the near future there will be some sort of reconstruction of the schools in order to help prevent further damage and stigmatization to black children. How to cite Bad Boys, Papers
Sunday, December 8, 2019
Assessment of a Cloud Computing Service Vendor
Questions: 1. Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjans operational checklists for DSIs OSDS. This section should be no more than two to three pages in length. 2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS. This section should be no more than two to three pages in length. 3. Use Erls SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length. 4. Provide a covering one to two page executive summary of these two assessments to DSI Executive Management and summarise the major opportunities and risks that have been identified in your assessments. Answers: Executive summary This assessment was carried out to determine the technical requirements and service level agreement (SLA) for different cloud computing vendors. The aim of the assessment was to help in providing necessary information to the Department of Spatial Information (DSI) management on the existing opportunities and risks associated with cloud computing services. The information obtained will then be used to evaluate the necessary requirements before considering moving the Online Spatial Delivery System (OSDS) to a cloud platform. Thus, the report has assessed various components associated with cloud computing services including; resource management, backup and disaster recovery plan, and service level agreement for the chosen vendor. In addition to the technical management requirements and SLA management, the assessment identified the following cloud computing opportunities and risk; Opportunities The migration to the cloud computing platform will provide the following opportunities; Cloud services will lower the operational costs; cloud computing vendors allow organizations to rent their server spaces for a given period of time and as such organizations do not have to worry about the maintenance and upgrading costs. Fast delivery of services; cloud vendors provide optimized IT infrastructure and as a result an organization using a cloud computing platform will have quick access to computing services and the same will be extended to its clients. Risks The organization will risk exposing its confidential data to unauthorized personnel in cases where the security of the cloud vendor is breached. The operations of the business may come to halt where there is lose of connectivity to the cloud. In general, DSI should consider the necessary technical requirements before migrating OSDS to the cloud computing platform. Also, the existing opportunities and risks should be evaluated. The various technical management and SLA provisions are discussed in this assessment. Assessment of a Cloud Computing Service Vendor Before applications or IT, services can be available on the cloud computing platform, there should be a strategy that on how to set up, configure, maintain, and monitor the services. This requires the use of various systems. These systems include; remote administration system, resource management system, and SLA management systems among others. Below is a discussion of these systems (Buyya, Yeo, Venugopal, 2008, p.98). Remote Administration This describes the process of managing and controlling a computer system from a distant location. For instance, controlling a system located in building A from building B. Thus, in remote administration the system is controlled without the physical presence of a user. Remote administration involves the use of certain software that has been developed to facilitate the process. This software is known as the remote administration tool (RAT). For a cloud based service, an organization will need to have a remote administration system. Remote administration system This is a mechanism that provides the necessary tools and interfaces to enable other administrators other than the administrator from the cloud to configure and manage the IT resources, available on the cloud. In this case, the system will establish connectivity to the organizations portal on the cloud providing the required administration and management features such as the resource management, and billing system. Thus, if DSI will launch the OSDS application on a cloud computing platform, they will still be able to monitor their IT resources from their systems through the help of the remote administration system. The figure above outlines how DSI administrators will be connected to the cloud computing vendor through the available application programming interfaces (APIs) and as such the administrators will be able to control their organizations IT resources on the cloud. The APIs will be provided by the cloud vendor to enable the users to have a variety of administrative controls. Cloud users can generally create two different types of portals on the remote administration system: the usage and administration portal, and the self-service portal. With the help of a remote administration system, cloud users can perform the following task; Users will be able to configure and set up their cloud-based services such as OSDS for the case of DSI They will be able to provide and release IT resources when need arises Users are also able to monitor the status, use, and performance of the cloud service The cloud users can also monitor the quality of service (QOS) and SLA fulfillment Users will also be able to manage the leasing costs and usage fees of their cloud service In addition, the users will be able to manage users accounts and related security issues Resource management This is defined as the efficient and effective use of resources in an organization, the resources could be human skills, IT infrastructure etc. It is important to have an effective resource management strategy so that the organization realizes its objectives. To ensure effective management of resources an organization will require a resource management system. Resource management system This is a mechanism that is used to coordinate the use of cloud-based IT resources as per the actions of the cloud providers and cloud consumers. The resource management system incorporates a virtual infrastructure manager (VIM) which is the most important part of the system. The VIM coordinates the organizations server hardware and creates virtual server instances. It is basically used to manage different virtual IT resources over multiple physical servers (Patel, P., Ranabahu, Sheth, 2009, p.123). The resource management system will help in automating and implementing the following tasks; It will help in the management of virtual IT resource templates The system will also help in the allocation and release of various virtual IT resources such as pausing, resume, and termination Resource management system helps in the coordination of the different IT resources that may involve mechanisms such as resource replication, load balancer, and failover system. The system is also important in enforcing the usage and security policies The system will also help in monitoring different operational conditions of the IT resources on the cloud computing platform. It is, therefore, necessary for DSI to consider implementing an effective resource management system before launching the OSDS application on the cloud computing platform. Service Level Agreement (SLA) Management SLA is used to define the terms of the contract between the cloud provider and the cloud user (client). For cloud providers and users, there is a provision of the SLA management system which covers cloud management products with the following features; administration, collection, storage, reporting, and runtime notification of the SLA data. An SLA management system includes a repository used to store and retrieve data depending on the performance measures. It is necessary to develop an SLA to be able to evaluate the performance and quality of services provided by a vendor. The performance of a cloud computing vendor may be measured in terms of; how available is the system, and the response time of the system. Therefore, DSI should clearly evaluate the SLA provisions of its chosen vendor before considering the launching of their IT services on their cloud platform (Buyya, Yeo, Venugopal, 2008, p.145). Backup and Disaster Recovery Actually, backup and disaster recovery are concerned with methods of preventing loss of data which may occur accidentally either by deletion or even by the corruption of files. These are necessary requirements by a cloud computing service vendor to prevent loss of very important data or information. Application Resilience Generally, application resilience refers to the ability of a given application from a given cloud vendor to react to problems that haves occurred due to one of its components and still manage to provide the best services. The resiliency of an application is, therefore, necessary to test. This testing is usually important in assessing the following; By carrying out this test, one is able to know if the application conforms to the application resiliency standards. One is able to establish the scalability of such applications. Scalability refers to the ability of the application to respond or fluctuate with the technological changes. This test also enables one to establish the risk that failure of such an application would cause to the business (Younis, Kifayat, 2013, p.114). Carrying out such test may also provide the security and private issues that are associated with such applications. There are cases where testing for resiliency is automated. Automated Resiliency Testing offers methods that have been depended on in assessment of software. Therefore, DSI should consider checking whether the Online Service Delivery system is resilient enough before deploying it on the cloud platform. To achieve high availability (HA), the DSI application resilience strategy should include; the use of various availability zones within a given location, implementation of instance redundancy, and monitoring and recovery among other considerations. OSDS should be able to identify existing points of system failure. Backup Plan Backup in IT, simply refers to the process of copying and archiving data so as to enable usage of such data in restoring the original data after an event of data loss. Its primary objective is to reduce chances of losing data or information that is considered material. A backup plan can be defined as strategies that have been in place to monitor data by continuously archiving them so as to restore such data in an event of data loss. Information that is held by cloud computing service vendors is equally important. This facilitates the need to set up a backup plan that will monitor all important data and ensure that such data is archived so that it can be helpful in the event of data loss (Casalicchio, Silvestri, 2013, p.254). Cloud backup, also known as online backup, is strategized to copy data to a server/ host or central data point so that this data will be archived in case of failure or any other phenomenon. Off-site servers may be hosted in either by a public cloud service provider or a private cloud service provider. Public cloud service providers will charge their customers for storing and maintaining the backup. Online backup or cloud backup usually operates on schedules determinable by the level of service purchased by the customer. For instance, if a customer subscribes for the backup daily, the application will gather, compress and encrypt and send data to the servers or hosts of the service providers after every 24hrs. It is, therefore, a recommendation for the corporations to rely on cloud computing backup service irrespective of their sizes. Such information is important for their continuity of business, projects or transactions. Disaster Recovery Plan Disaster Recovery (DR) in a cloud computing service involves procedural policies and strategies that ensure continuity or recovery of vital information and systems that may occur due to human-induced or natural disaster. Disaster Recovery (DR) owes its development to the late 1970s when computer center managers realized the dependence the organization had on the computer system. A critical path in disaster in Disaster Recovery is networking. For a cloud computing service to offer the best methods of disaster recovery, replication of the network is required. Disaster Recovery (DR) in cloud computing service is often associated with various benefits. Some of the benefits associated with DR in cloud computing may include; Fast Recovery The difference in RPO and RTO distinguishes cloud-based disaster recovery from the traditional recovery. When operating on a cloud-based DR, your site is capable of recovering from a warm site immediately, thus, reducing RPO and RTO times from days or weeks down to hours. Traditional disaster recovery involves booting from a cold site. Security Myths have been there in contrary to the security systems of a disaster recovery plan that are opposing their success. Despite such myths, disaster recovery plan that is cloud-based is usually secure with the right provider. Chances are therefore not to be taken when it comes to business disaster recovery. Cloud-based disaster recovery plan is considered more secure compared to the traditional recovery systems. Scalability A disaster recovery plan operating on a cloud computing platform is usually flexible. The users will easily be able to increase or decrease storage capacity as the business demands. This makes it easier than a traditional backup. SLA Assessment using Erls Guidelines Service Level Agreements are usually considered as contracts between service providers and their clients regarding the levels of service that they would. When these agreements are being constituted, standards of SLA that have been set have to be fulfilled. Evaluation of Business Policies This involves the identification of the business that is covered by the relationship. This is usually expressed in terms of projects, activities processes or functions. This provides the SLA should clearly outline the activities processes that the cloud service vendor intends to offer to its esteemed clients. Guarantees A guarantee should be stipulated by the SLA of the company in case they default the agreement. This means the SLA should assure the customers of the company high-performance level. They will need to identify outputs and outcomes that the two parties expect to achieve from such an arrangement. SLA should clearly guarantee the clients a good service level and performance as per their agreement. Services This means that day-to-day activities of the cloud service providers should be aimed at delivery of the service level that is listed in the SLA. An SLO (Service Level Objective), will act as a checklist to ensure the services are provided to the levels agreed. Governance and Versioning This is to deal with the questions of Why?, Who does what?, Who does what? and Who answers for results?. When all these questions are answered in an SLA, governance would not be an issue and thus, the service level promised to the clients would be achieved. Support SLA should, actually, provide designated support hours and support contacts from which the customers can communicate with the cloud service vendors. This enables easy communication between the service providers and the end-users. References Amazon, E. C. (2015). Amazon web services. Buyya, R., Yeo, C. S., Venugopal, S. (2008, September). Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In High Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on (pp. 5-13). Ieee. Casalicchio, E., Silvestri, L. (2013). Mechanisms for SLA provisioning in cloud-based service providers. Computer Networks, 57(3), 795-810. Liu, Y., Ngu, A. H., Zeng, L. Z. (2004, May). QoS computation and policing in dynamic web service selection. In Proceedings of the 13th international World Wide Web conference on Alternate track papers posters (pp. 66-73). ACM. Ercolani, G. (2013). Cloud Computing Services Potential Analysis. An integrated model for evaluating Software as a Service. Cloud Computing, 77-80. Patel, P., Ranabahu, A. H., Sheth, A. P. (2009). Service level agreement in cloud computing. Raimondi, F., Skene, J., Emmerich, W. (2008, November). Efficient online monitoring of web-service SLAs. In Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering (pp. 170-180). ACM. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11. Terry, D. B., Prabhakaran, V., Kotla, R., Balakrishnan, M., Aguilera, M. K., Abu-Libdeh, H. (2013, November). Consistency-based service level agreements for cloud storage. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (pp. 309-324). ACM. Younis, M. Y. A., Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep. Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18. Zheng, Z., Lyu, M. R. (2012). Optimal fault tolerance strategy selection for web services. Web Service Composition and New Frameworks in Designing Semantics: Innovations: Innovations, 218.
Sunday, December 1, 2019
Network Recommendation for Fictional Company an Example of the Topic Business Essays by
Network Recommendation for Fictional Company by Expert Jayjay1 | 15 Dec 2016 Introduction. The Bead Bar is an arts and design oriented company that enables its customers to design and make their own clothing and accessories with appliqus, beads, strings, and fabrics. There currently exist three pisions in the company spread throughout the United States: seven studios, six franchises, and the Bead Bar on Board which is a portable Bead Bar designed for cruise ships. The Bead Bar has outgrown its paper-based system and is in need of an upgrade in todays technology; the poor efficiency of the Bead Bars present system limits potential growth opportunities in todays global business market. (Malaga, 2005). Need essay sample on "Network Recommendation for Fictional Company" topic? We will write a custom essay sample specifically for you Proceed Systems in information technology all for globalization and solve most of the problems prevalent with paper-based systems including lost orders, invoicing errors, and order fulfillment delays. The Bead Bar's information technology needs include the initialization of business website, information sharing between locations, and data confidentiality and security; this means the Bead Bar is in need of a strong networking system which is vital for internal and external communications. : I'm not in the mood to write my paper online. I don't have the time Professional writers advise: Get Your Essay Before The Deadline Background. Computers are essential to the daily operations of a growing company such as the Bead Bar with the continuous processing of orders and the various benefits offered to the accounting professionals. While the Bead Bar seems capable of meeting its current expectations, the paper-based system has posed problems for the company; as management now believes that the Bead Bar brand no longer generates customer assurance. Problems are most evident are; the loss of orders, vague inventory status, shipment delays, and inaccurate customer information. Along with the problem of running the company with a paper-based system, employee concerns support further reasons for a new system. The limited amount of computers caused the added expense of outsourcing work. There is currently no direct communication link from Bead Bars headquarters to its branch locations, or its employees at-sea. These problems are clear reasons why the employees of the Bead Bar require up-to-date client information, and accuracy in shipping schedules for their stores and customers. Recommendations were made by consultants to purchase computer hardware, software, and database management systems. Currently, there are 2 notebook computers, 14 printers and 14 personal computers. The personal computers are equipped with standard keyboards. 17 CRT monitors, printers 2.8 MHz processor, 512.8 MB of RAM, CD-RW drives, and 80 GB hard drives. Each of the computers uses the Microsoft Windows XP Professional operating system. The Microsoft Office Productivity Suite was acquired for employees to do word processing, organize presentations, and spreadsheets. Some employees insist upon one having access to Adobe PageMaker, QuickBooks, Interact Commerce Corporations Act! The Bead Bar operates on Oracle 9i database, which is a project database management system, intended to deal with the growing needs of the Bead Bar. As time moves forward, they are looking to arrange their records accurately through a network so their database can operate to its full capability. Recommendation overview. In order to operate a well-organized business, it is essential for the Bead Bar to have a mesh topology. The mesh topology would work well for the Bead Bar since this type of networking system is extremely consistent, and communicates information quick and efficiently. This particular layout would focus on the trepidations of the executives, and since the Bead Bar is spread throughout the United States, its going to be cost-effective. Network Topology. The mesh topology would be the best fit for the Bead Bar. The Bead Bar has several offices throughout the United States and the mesh topology would afford a way for the franchise locations to communicate back and forth. The mesh network is perfect for a business that will have several system links. This network is highly dependable because there is no hub needed. The Bead Bar articulated clear apprehension about how fast data would travel between locations, so a mesh network would without doubt attend to this interest. This network runs well because each node connects directly to the other. Architecture. The Bar must have a client-server architecture set up to facilitate their network. The client-server allocates computers, grant services, process requests, and act as a client. The server is an extremely powerful computer that is set up to handle multiple demands at the same time. The server is an indispensable source of memory, because it can function as a main foundation of all information storage that is pertinent to the operation of the Bead Bar. The server should be set up to share consumer data, and act as an effective storage unit. The client-server network architecture would prove to be more beneficial to the executives of the Bead Bar, thus proving useful for the Bead Bar. Some executives would want to transmit communication to the various branches of the company. There are some materials that the executives would like to keep them secret and maintain full control of the main source of data. All computers do not have to act as clients and servers based on the fact that there is no need for every employee to have access to company data. The significance of the company data would be sealed with the client-server network. Network Advantages and drawbacks. In order to meet the needs of Bead Bar and its various locations, a strong and consistent networking system is needed. The mesh topology is perfect for businesses with various locations because of the speed and competence of the network. The company would always want to see that all computers associates with each other and the mesh network do fit that criterion. The server that is set up in this topology does not act as a hub, which in turn helps with the speed and success of transmissions. The mesh topology is the most cost-efficient topology that would meet the needs of the Bead Bar. The mesh topology is a good fit for the Bead Bar. Nevertheless, the topology has its own drawbacks in that, it is requires more cables than any other LAN topologies, and it also has complications when it comes to implementation. The client-server design can be clarified as a pisive networking decision because it would regulate ease of access to company data. This proposal is based on compelling points made by the companys stakeholders in respect to some possible security concerns that could affect the confidentiality of the company data. Some employees feel they should have access to all company data but that is not necessary. If a Bead Bar studio or franchise requires documents they do not have access to, they can send a request through the proper channels. The client-server database is suggested to protect the company overall. Conclusion. Based on all networking recommendations that have been made, the Bead Bar will be able to run their business more proficiently. With suitable networking, now the database can function accurately. This will help the business to grow as a direct result of an increased exchange of ideas because of the networking topology and architecture. References Bead Bar Network Paper. Anti Essays. Retrieved September 30, 2008, from the World Wide Web: http://www.antiessays.com/free-essays/14861.html Bead Bar Systems Development. Freeonlineresearchpapers. Retrieved from World Wide Web: http://www.freeonlineresearchpapers.com/bead-bar-technology-requirements Chocolate Grey. Journal of a chocolate, a grey haired student. Retrieved from August 24, 2008, from World Wide Web: http://deanguelo.blogs.com/chocolateblog/2008/08/bead-bar-networ.html Rose A. Malaga. Information systems technology. New Jersey: Pearson Education.
Subscribe to:
Comments (Atom)