.

Tuesday, April 30, 2019

Visual analysis paper of greek pottery Assignment

Visual synopsis paper of greek pottery - Assignment ExampleThe vessel had themes of encyclopedia of mythology. It exploits of Peleus and his son Achilles (the hero of bulls eyes Illiad). Dionysos and Two Satyrs The vessel came into being in the years 500 BCE. The vessel was amphora shaped. The material use to make the clay was Corinthian which in other words reffered to as the beige clay is commonly. The vessels decorativeness technique comprises of geometric and organic forms which are limited to the shoulder of the vessel. The spell of the vessel is that of the registered iodin and it comes in distinct forms like silhouetted, ones filled in with color. The details of the vessel are done by great accuracy and incision. The effect of the vessel is that of a decorative and appears in two-dimensional. Dionysus in a sauceboat This relic the vessel kylix came into being in the years 540 BCE and was made by an operative by the name Exekias. It measures 12 in diameter. The material used in making this vessel is known as Attic or in other words the orange clay. The technique employed is that of the blackness enter black glaze. The details of the vessel are very a good deal incisive. The decorativeness forms of the vessel are very oftentimes organic. The compositions of the vessel are those that are narrative and figures that do not necessarily conform to the shape of the vessel. Herakles kill Nemean Lion This Greek relic amphora came into being in the year 525 BCE. ... The composition of the vessel is very much registered. The narrative bit of the vessel is limited to the body of the vessel while decorative bit of it is expounded on the geometric patterns and limited to the border areas and arms. Death of Sarpedon This Greek relic the vessel krater was brought into being in the years 515 BCE by artists going by the names Euxitheos and Euphronios. The material that the artists have used is the Attic or wear out known as the orange clay. The technique used in this relic is that of the red figure, which is an inversion of the black figure and has the background around the figures painted in black. The details are no longer incised but painted in black. He decorativeness effect are the geometric patterns and limited to the border areas. The composition is registered and the narrative bit of it is limited to the body of the vessel. The figure depends less on the profile view and embraces foreshortened and co-occur limbs that interest in facial limbs. Lapith and Centaur This Greek relic kylix was made in the years 490 BCE. The artist who made it is known as the Foundry Painter. The material used is the Attic or in other words the orange clay. The technique used is the red figure. The decorativeness of the vessel bounds along the geometric patterns that are limited to the border areas. The composition is non-registered while the narrative conforms to the body of the vessel. The figures are shortened and cooccur limbs that interest in f acial expressions. Archaic Period - Rycroft Painter Column Krater (Mixing Bowl) par In comparison with the above described relics, this vessel embodies the epitome of finesse and precision. It dully conforms to the works of the Greek Archaic completion

Monday, April 29, 2019

Summarize an article from the Wall Street Journal Essay - 1

Summarize an article from the Wall Street Journal - Essay ExampleTorrens and other Proponents of Equity-based ring funding deem it as a blessing in times of deepening economic crises. Since businesses themselves be not in a position to increase employment, they can provide a bigger growth potential done and through investment opportunities. Supporter of the notion believe that such opportunities should only be provided through online outlets as it is extremely cost-effective. It would also make the investment market more open to millions of investors (Torrens & Slavinsky, 2012). This method besides enables businesses to secure and reach out to a greater client base, who are naturally motivated to protagonist the business succeed.On the other hand, opponents of this idea believe that legalization would only cause ill-informed clients to lose their capital on failing companies. It will pose a higher risk and will subsequently warp the purchasing power of people as individuals lose money due to their bad decisions. There are high chances that it will further lead to a downward spiral of recession. Moreover, there are greater chances of foul play and fraud companies may surface that may further cause the general nation to incur heavy losses. It will also significantly impact legitimate businesses, as investors are fooled into drop for fraudulent companies. Therefore, businesses should take the merits of alternate investment methods in to account. (Torrens & Slavinsky, 2012)It is quite ostensible that though, equity based concourse funding may have several pros, but they can only be enjoyed if the businesses give the gathering massive returns on their investments. Businesses can obtain huge number of clients, who had initially supported the company through their investments. However, from the peoples perspective, investing in equity differs from investing in stocks that can be liquid whenever the client wants. Equity is illiquid and as a result, there i s no clear way out of this

Sunday, April 28, 2019

Microbiology - Leprosy PowerPoint Presentation Example | Topics and Well Written Essays - 1000 words

Microbiology - Leprosy - PowerPoint Presentation ExampleThis bacterium has an important property which has labelled it as a slowly dividing bacterium that is it takes 14 days for the growth to become two fold. This excessively accounts for the need for prolonged treatment of this bacterium.This disease presents with a very interesting past and it is believed that this condition existed in 1550 B.C. because it has been mentioned by the Egyptians in their Papyrus Document. Works from the subcontinent dating to 600 B.C. also report of a pathology which very a good deal looks like Hansen disease.It has also been reported that this disease was considered to be inherited. People who acquired this condition were believed to have been penalized by their paragon for doing something wrong. Hence these people were disliked and everybody stayed away from them and the poor sufferers were considered to be such a disgrace that they were sibyllic to wear clothes that differentiated them from th e others and they were not allowed to intermingle with the other people.The disease state which is led to by mycobacterium leprae is known as leprosy and this is divided into two forms that ar known as tuberculous leprosy or lepromatous leprosy. Both of these clinical conditions present with different symptoms.Lepromatous leprosy is associated with many disruptions on skin which have are equal in size. These lesions lose their pigmentation are marked by erythema and also present with nodules. These types of skin disruptions join unitedly and present with an appearance that is referred to as leonine facies.Histopathological findings of this leprosy show the presence of a specific kind of cells that are known as lepra cells which are basically macrophages that present with the appearance of foam. These cells are mainly found in the dermis and are demarcated from the epidermal layer of the skin.The infection can be

Saturday, April 27, 2019

Tourism policy Essay Example | Topics and Well Written Essays - 3000 words

Tourism policy - Essay ExampleTourism is a valuable diligence for every nation. It not only creates new businesses but also weed create jobs, income and can compound quality of life. For years, tourism industry developed almost fluently and now it has become a main(prenominal) economic segment. For many countries in the developing world, tourism is a significant basis of income creation and therefore, a key element of economic advancement. A good positive state related to tourism can improve the relationship and it rewards nations. But the consequences of negative conditions such(prenominal) as terrorism are massive on a countries financial system. Tourism contributes about 10 percent of global GDP. Tourism industry call for to predict customer requirements, recreate its business strategy, and relocate on providing good services because in novel years customers have become more demanding and a good tourism system can improve the image of the nation. Therefore, the terrorist att acks can play a massively derogatory role in a provinces economy and thus, the tourism sector similar to other sectors can bear the brunt of such scenario (Wharton University of Pennsylvania, 2010). richness of Tourism Tourism has become a key economic activity in the 20th Century. The creative activity Travel & Tourism Council had generated income of US $ 655 billion from tourism industry in the year 1995 and had created 212 million jobs. globular participation growth was estimated at 21 percent in the year 2007. This increase was primarily referable to increase in capital investment and it contributed to 610,000 people globally being engaged to the tourism industry. The employment increase was from complimentary services such as entertainment and restaurants. The result of amplified travelling has led to fountain in government income and gross output it has multiplier consequence on global economies (Dunn, 1999). The following knock back shows the growth of tourism till 19 92 Figure 1 Growth of tourism till 1992 (Thompson, 2008). Effect on Tourism Industry due to Terrorist Attacks Terrorist attack has an adverse affect on the tourism industry. It can pass to joblessness, homelessness, deflation, crime and other economic crisis. Several factors associated with tourism such as airlines, hotels, restaurants and catering sectors that are use by any firm or industry and their employees are all affected to a great or lesser extent. Terrorism can unravel a countrys tourism industry. It affects today to the tourists decision making. The role of tourism in emerging countries is currently so enormous that some downswing in the tourism sector is a serious concern. In general, tourism is one of the best execute economic sectors in the developing countries and can have various dimensional effects (Essner, 2003). Several such instances of the affect of terrorist attacks on the tourism industry will be evaluated in the following sections. Terrorism in Maldives T ourism Industry Maldives is a developing nation and is depended on their tourism industry as a source of income. Maldives is a holiday destination for the tourists due to its famous heavenly as well as

Tort Law Essay Example | Topics and Well Written Essays - 3000 words - 1

Tort Law - Essay ExampleAre the current statutory and common righteousness mechanisms sufficient to protect concealment interests of case-by-cases? Main challenges individual face in bringing actions against invasions of their privacy in English courts. Shifting focus of reforms on civil natural police force from questions, standards of liability to issues of civil social occasion and dam climb ons. Challenges of procedure and damages in bringing actions to protect individuals privacy 3. Protecting privacy in the modern age Individual privacy in the modern age challenges of protecting privacy. Relationship between internet and media and individual privacy testimonial. What changes can be made on the law to protect individuals privacy. Is the blame for the English law to achieve its duty to protect individuals privacy blamed on media? 4. Privacy law reforms in the United Kingdom Press and individual privacy. Regulation of press for reforms in the UK for purposes of protecting pr ivacy interests rather than the role of civil law in protection of privacy interests ( Joint Select committee report Chapter five and the Leveson report 2002) 5. Right to Privacy and freedom of case Rights to privacy and freedom of expression the conflicts arising from rights to privacy and freedom of expression in relation to individuals privacy (Mosley v News group theme Ltd (2008) EMLR20). Media and the freedom of expression. ... m in order to protect the privacy of individuals. Discuss Introduction In the grey common law individuals are entit lead to full protection in person and in property. However, thither have been no promiscuous definitions as to the extent of this protection.1 Personal privacy has been invaded with the introduction of instant photographs and newspapers. jibe to Hughes people are now afraid that what they do or speak in secret whitethorn come out into the public domain, if new laws are not put in place to protection individual invasion to privacy.2 Th e law of tort provided individual with remedy from spirit and property interference. The right to life only gave individuals protection from battery of all forms. With the recognition of the spiritual, intellect and human feelings legal rights have reverse broad. Laws have been formulated to protect individuals from offensive noise, odour, dust, smoke and excessive vibrations.3 Statutes and laws English law did not do the right to privacy4. It relied heavily on law of trespass, nuisance, defamation and malicious falsehood to protect individual privacy5. teaching of statutes such as Protection from Harassment Act 1997, The Data Protection Act 1998 and the Regulation of fact-finding Powers Act 2000 saw increased advancement in the protection of privacy. With evolution of law it has become clear to individual that hurt, satisfaction and gains in life do not originate from the tangible things. This has therefore led to the legal appreciation of individuals opinions, sentiments and feelings. The growth in the common law has allowed judges to afford compulsory defence reaction without having to ask for directions from the parliament.6 Introduction of tort on privacy in the English law Privacy deals with individuals nurtures and

Friday, April 26, 2019

Service Management Assignment Example | Topics and Well Written Essays - 250 words

Service Management - Assignment ExampleSuch procedures ar directly related to employee satisfaction and lead to an summation in the aforementioned(prenominal).High levels of employee satisfaction lead to employee loyalty, and this raises the productivity of individual employees. This is directly reflected on the armed service that is given to the customers. Customers benefit from a higher external service value and this increases their level of satisfaction. When clients are happy with the quality of services they receive from a company, there is a consequent increase in their loyalty to that company and the services it offers. According to research by Heskett et al (167), an increase in the loyalty of customers by 5% can increase the profit of the company by between 25% and 85%.Maintain the service-profit chain is, therefore, important for any company that expects to have an increase in its profits. These links should be strengthened so that everything within the company opera tes smoothly and without any disruptions. wholly this should be reinforced by the management of the particular organization to ensure that all workers contribute towards the same goal. Based on this, successful CEOs are not those who locked themselves in their offices and came up with management strategies. Managers of successful companies are those who spend time with employees and customers and in the process listen to their employees and customers for suggestions on improvements in their organizations modus

Thursday, April 25, 2019

Critically analyse financial statemebt Essay Example | Topics and Well Written Essays - 250 words

Critically analyse financial statemebt - Essay Examplec. Cash Flow - immediate payment flows provides the business operating, investing, and financing cash flows over a specified period. It reconciles the changes on the cash on perish at end of a period with the beginning balance by including the income derive from non-cash revenue and expenses by adjusting net income for non-cash revenues and expenses (Tempte, 2005).d. Statement of Changes in Owners Equity the change in possessors equity happens when a business profits, its asset value changes and when its owners adds more capital or made withdrawals against the business (McGrann, 1998).Sole principal or single proprietorship is a business owned solely by an entrepreneur where owner assumes all responsibilities pertaining to the business and do not distinguish between the owner and the business. In effect, he or she also carries the whole burden of the businesss liability. In the event that passing occurs, the liability allow for affect and extend to the owners finances.With regard to its income arguing, a sole trader has to pay evaluate revenue on the business net profit and in the event that the net profit is over a certain threshold, the owner has to pay the Value Added Tax (VAT) of 17.5%. This VAT rate however has been decreased to 15% in consideration of the recent financial crisis.With regard to reporting for taxation purposes, a complete income statement and balance sheet should be submitted to HMRC. The owner is responsible for keeping all the expenses for a certain tax year.The financial statement of a sole trader is straightforward where accounts are simpler compared to limited companies where entries vary ascribable to the complexity of the business. It involves deduction of expenses from sales to arrive at the taxable net profit or loss (which of course not taxable anymore because it is a loss).Limited companies are also called as enounce stock companies or partnership where owners or

Wednesday, April 24, 2019

You can chose one Essay Example | Topics and Well Written Essays - 250 words

You can chose one - Essay ExampleThe customer lodged a title on us that the art we shipped arrived with sags in the canvas. This may not be our fault, neither is it the customers. You therefrom ought to have appreciated the customer feedback first and the fact that the customer contacted us with a claim. You can alike show the customer that we care about the products we send and that their satisfaction is our priority. Then accept the liability and state to re-stretch the art on behalf of the customer. Our customers are important for our business, and hence kindly make efforts to understand the customer blot and address the solution not the problem.We at Manhattan Galleries value your kind efforts to address customer needs and slip away constant contact with them. As we appreciate our employees so are our customers and every feedback matters to us. Your letter to the customer is rise written, and with the changes annotated, it will serve the customer perfectly well. Thanks for your efforts at Manhattan

Tuesday, April 23, 2019

Performance Management and HR Budgeting for H2O Essay

action Management and HR Budgeting for H2O - Essay ExampleThe purpose of proceeding counseling is to create signifi bottomlandt procedure indicators, so that employees can follow their own performance levels. This order can help them manage their activities, correct their weaknesses and provide a plan for the right processes to maximize their performance. Performance circumspection measurement is about accountability to the musical arrangement and then to ones self. We can tell that the organizations performance way placement is working well if we notice the following signs high esprit de corps for the members of the team effective teamwork even across different de sort outments promotion decisions ar well formulated goals are achieved people are remindd appraisals executed effectively and terminated employees are well informed of their performance. (Horwitz, 2005, p. 5) Performance management philosophies Performance management systems developed by organisations are base d on the philosophy which emphasizes employee performance. This system motivates employees to perform well and work for organizational objectives. Performance management philosophy refers to developing an organized method of evaluation that requires performance expectations, monitors the job of the employees, evaluates their performance, and uses the information from this evaluation for management decisions and likewise for providing resources. (Bhattacharyya, 2011, p. 11) A management philosophy may start with the hiring process. The initial step is to focus on an applicants goals, capabilities, career focus, and so on. As soon as the applicant passes the tests, he/she becomes a member of a high-performing team. The developed performance management system allows the employees to know the companys performance requirements and incentives, based on job results, and also to acquire new ways how to effectively perform up to the next performance cycle. According to Kandula (2006, p. 11 ), performance management is the result of utilitarian instrumentalism, which means it encourages hiring human resource at the lowest cost, retaining employees as capacious as they are useful, and termination of the contract if it is not anymore effective. Organizational culture plays a vituperative role in the development of performance management in an organization. Organizations with a supportive or collaborative culture have the chance of developing performance management processes that share information about improving employee performance. A reward system may create a desired performance rather than a punitive system which may result in unsatisfactory performance. (Micklitsch & Ryan-Mitlyng, 1996, p. 18) Performance management includes all assertable initiatives managers undertake to have high performance among employees. These initiatives focus on giving performance appraisal, rewards and recognition to motivate high performance (Heslin, Carson, & VandeWalle, p. 89). Perf ormance appraisal is almost similar to the principle of performance management. Many organizations of instantly are still applying the traditional method of performance management, i.e. the maintenance-oriented, regulatory and administrative human resource management (Kandula, 2006, p. 11). This is a barrier to the application of performance management practices. There is a resistance on the part of the employees, and it can slow down the

Monday, April 22, 2019

Manufacturing Technology Annotated Bibliography Example | Topics and Well Written Essays - 750 words

Manufacturing Technology - Annotated Bibliography ExampleThe most productive technology is logistics guidance for maximum productivity (Bielecki and Szymonik 2011). Manufacturing Technology has adverse effects on the Supply Chain Management, and with the betterment of this technology, companies arse better their productivity and ultimately profits.Logistics management is essential in bettering the management of the supply range of mountains. Logistics is a springy area in supply chain management, and through it, companies can better their production volumes. An example of a logistics approach to manufacturing is the 7R rule. It includes right product, quantity, condition, place, time, customer and at the right price (Choi, Dai, and Song 2004). This strategy betters the supply chain management, since the companys goods reach the market as intended, maximizing demand and customer loyalty.In any manufacturing industry, the level of aspiration is very high, demanding control measure s to maintain a companys market. The approach to cost rationalization aims at ensuring favorable of ambition of the products with other rivals. The company, therefore, has an improved system for managing the supply chain with the lower prices. With the reduced prices compared to rival companies, the organization obtains a well-developed supply chain, where their products are in demand.Provision of logistic security is very helpful in monetary value of bettering the management of the supply chain. It allows the organization to undertake its tasks with no worries of study leakage or loss. Logistics management improves the organizations information security, making it much easier due to the protection. Competitors cannot access the companys information on supply chain management, allowing it to gain combative advantages and thrive in the competition.Through logistics, companies can manage the flow of information

Sunday, April 21, 2019

Activist Technical Geek and Sensitive Nature-Lover Research Paper

Activist Technical Geek and Sensitive Nature-Lover - Research Paper modelingSecondly, no one had described the design of a search engine, in an schoolman way to begin with (Brin and Page), so, unlike other disciplines, the knowledge was not divided by a scholarly community. That makes it much ambitious to advance knowledge because there is limited opportunity for dialogue. To address the second problem, he wrote and published a very careful academic description, in great detail (Brin and Page), so that the knowledge could be shared and later advanced.Third, he needed to decide how to handle the additional information in hypertext and how to prioritize it, since anyone sack write anything and put it on the web (Brin and Page). There needed to be a way to word form out the opinions of the uninformed from the research of top scholars. Also, there should be a way to respond otherwise to people looking for articles and people looking for pictures. To address the third problem, Go ogle contained priority and category levels. Google Scholar, for example, brings up academic articles and citations, while Google Images brings up pictures and cartoons, and Wikipedia falls under a general web search category. Therefore, I carry out that this man is not just a technical geek but is a sensitive, fully meshed person. I think this is the key to understanding him. Yes, his brilliance and vision resulted in Google, but he was more than that. He set an example of how Google can create community and connect people in their eff of each other. He is a very committed person and this is reflected in his professional life and in his personal life.

Adult Day Services at the WBRP Nursing Home in Flushing, Queens, New Essay

Adult Day service at the WBRP c be for Home in Flushing, Queens, New York - Essay ExampleThe paper presents the results of the analyses and the formation of a preliminary make out of strategies to take advantage of the identified opportunities (National Adult Day Services Association, 2012 National Adult Day Services Association, 2010 The Economist Newspaper Limited, 2010 Gleckman, 2009 Inter issue Health Economics, 2011 Hicks et al., 2004 National Bureau of Economic Research, 2012 Center on eon and Community, 2010). II. Market Analysis A. Market Demographics, Size, Characteristics While the nursing property is in Flushing, Queens, New York, we take the entire potential market for nursing home go and related run, existing or the be introduced, to represent of target market customers living in the greater Queens, New York area. This is a conservative estimate, as with right(a) marketing and targeting the target market geographically speaking can be as broad as the whole of Ne w York City. Focusing on Queens, the statistics are that the total population has been static at nearly 2.3 million in 2010, roughly the corresponding level as in 2000. People over 65 years of age made up 12.8 percent of the population, or more than 230,000 residents above that age. Some estimates lay out the number of people over 65 at about 283,000, with roughly equal numbers of men and women, and about 44 percent of the overall population being of Caucasian descent, 20 percent African American, and 17.6 percent Asian. This is the rough estimate of the potential market size for nursing home and related services in the Queens area of New York (US Census Bureau, 2012 Onboard Informatics, 2011 Wolfram Alpha LLC, 2012 ePodunk, 2007 Roleke, 2012). Prospectively, however, hypothesizing that adult day services provision is viable, the target market is expanded to include all adults who may avail of such services, short and long term. This expands the market size to all but those who are under 18 years grey-headed and living in Queens, or all Queens residents except for about 21 percent of the population, who are minors (US Census Bureau, 2012 Onboard Informatics, 2011 Wolfram Alpha LLC, 2012 ePodunk, 2007 Roleke, 2012) The median income of a household is pegged at roughly the same amount as the city median income, at about 55,300 dollars, while the cost of living is frequently higher as judged by the cost of living index of about 159, much higher than the national average of 100. This is a relatively wealthy neighborhood, and therefore is ripe for services tied to nursing home services (US Census Bureau, 2012 Onboard Informatics, 2011 Wolfram Alpha LLC, 2012 ePodunk, 2007 Roleke, 2012 Hevesi and Bleiwas, 2006). B. Market Trends, Events of Impact The recent recession has brought about changes in the buying power and long-term financial viability of a large swath of the American population, including people in Queens, New York. This has had an impact on the a bility of people over 65 years to finance long-term assist on their own and with the help of family. This in turn has had an impact on the viability of providers of long-term care to the elderly, including nursing homes and providers of corollary services to homes (The Economist Newspaper Limited, 2010 Gleckman, 2009 International Health Economics, 2011 Hicks et al., 2004 National Bureau of Economic Research,

Saturday, April 20, 2019

An Assessment of the Need for Worker Representation in the 21st Essay

An Assessment of the Need for Worker delegacy in the 21st Century - Essay Exampleship Aggregate union density No union members Union density of 50% or more Recognised unions (% employees) (% workplaces) (% workplaces) (% workplaces) All workplaces 34 64 48 30 sphere of receiveership Private 22 77 8 16 humans 64 7 62 90 Management attitudes towards union membership In favour 60 8 58 84 Neutral 22 76 9 17 Not in favour 5 93 1 4 Table 2 Union Presence, by Sector of Ownership and Management Attitudes (Source Marchington and Wilkinson 2008 p.390) The importance of management attitudes is discussed later in this paper. Employee Relations The latest ideas to involve actors more in the workplace are employee engagement and employee involvement and participation (EIP). These follow changes from collective and multi-employer bargaining brought intimately by international competition and globalisation. Increasingly, although employees have various rights enshrined in law, employers are dic tating terms and, in some(a) cases, unilaterally attempting to change contracts of workout to the detriment of employees (Curtis 2010b). Heery (2009 p.334) discusses the representation gap, restating key themes of union revitalisation, non-union representation and the effectiveness of state-supported policy as needing further research. Szell (2010 p.184) describes the neo-liberal economic system as having declared war on the transaction unions and workers participation when considering the impact of the global financial crisis on the trade union movement and labour policies, specifically in the EU. This is even more important with the austerity drive being pursued by the up-to-the-minute UK coalition government as, following the announcements of substantial budget cuts for the public sector, unions have advised that they intend middleman to protect both their members jobs... An Assessment of the Need for Worker Representation in the 21st CenturyHutton believes that the employme nt relations culture in 2010 resembles that of the 1970s and this causes many another(prenominal) employees to take employers to employment tribunals to obtain justice. He highlights that close to a third of all people at work have experienced some pee of unfair treatment in the past year, the gender contribute gap and low pay as evidence that there is a need for a more effective collective worker voice in the workplace.Employment relations are as difficult an area as ever, with workers still requiring protection within the working context, whether through legislation or union representation. Employers seem dogged to exclude workers from decision making and regard them as simply resources, like fixtures and fittings, with no opinions, attitudes or voices of their own once they enter the workplace. Representation is still required, and will continue to be so until employers realise that employees total participation in organisational decision making improves the bottom line.One area that organisations might like to seek in this respect, is stakeholder theory. Although most organisations pay lip service to stakeholders other than shareholders, adopting such an approach would generate many positive benefits, including within the employee relations arena. The key issue to be addressed is the power differential surrounded by employer and employed. Until this is resolved, employees will still be treated poorly and still require representation, both as individuals and collectively.

Friday, April 19, 2019

Planning an IT Infrastructure Audit for Compliance Term Paper - 1

Planning an IT Infrastructure Audit for Compliance - Term Paper exemplarWith such an evaluation, the company will be able to streamline the inter-company communication effectiveness and departmental communications (Newsom & Haynes, J. 2014. P66). Planning, the IT scrutinise, entails gathering learning to formulate an canvas plan and to gain insight of the available internal keep in line structure of the IT.The Planning and IT infrastructure audit is a valuable practice to local and global organizations. The audit planning process directly affects the quality of the outcome. A proper plan ensures that resources are focused on the right areas and that potential problems are identified early. A successful audit first outlines whats conjectural to be achieved as well as what procedures will be followed and the required resources to carry out the procedures. The information to be collected is regulatory statutes, inherent risk assessment, recent financial information, and past audit results. in like manner the auditors will require to avail information such as verify procedures, equate total risks, control risk assessment, and control environment to gain an understanding of the present internal control structure. With all this prior(prenominal) audit information, auditors will be in a position to formulate a useful audit plan. The audit plan must details the time and cost required to execute IT infrastructure audit. It similarly needs to show the different areas and activities to be engaged during IT auditing process.The scope of planning and IT infrastructure audit Canada parry Services Agency (CBSA) is a Canadian IT organization that manages and controls the IT infrastructure of two government organizations. It also provides auditing and IT aegis services to various digital organizations in Canada. CBSA performs frequent IT infrastructure audit to appraise how effective and effective the organization execute it operations and activities.Goals and objec tives of

Thursday, April 18, 2019

Approaches on nursing leadership Essay Example | Topics and Well Written Essays - 1250 words

Approaches on nursing leadership - Essay ExampleNurse turnover is a stance where registered nurses leave the service prematurely. The reasons for turnover be varied. However, most nurses level the service due to ineffective counseling and high pee-peeloads. In situations of high workloads, nurses tend to seek better opportunities in other professions, and private entities. umteen attribute their turnover to poor management that ignore their plight or focus more on the institution rather than the person.Nurse shortage and turnover can be addressed by the jitney and nurse leaders. Managers and leaders are best placed to understand the problems and possible solutions to the problems. Managers and leaders can work together to find the causes and lasting solutions to maintain the soundness of healthcare in the next decade. However, there are functional and objectives differences between how manager and leaders hail such issues. The differences and similarities on how nurse leader m anagers approach the issues are discussed below.Nurse leaders and managers are obligated to show competence in how they handle health-related problems. The usage of nurse leaders and nurse managers is to ensure that healthcare runs smoothly by ensuring patients are attended to. In this regard, both are concerned about nurse shortages and turnover. As such, they may approach the issue by allocating resources to higher new nurses and offer a better working condition to retain the existing nurses. However, the groups charter different modalities on fulfilling these functions.Managers are more concerned with administrative functions of the health institutions. As such, they work with a budgeted finances and hence act within the confines of the resources that they have (Kelly, 2009). To address nurse shortage, managers are credibly to allocate more finances to hiring by cutting down spending on non-essential functions. However, the move is pro tempore and can be affected

Wednesday, April 17, 2019

Medicaid and the Uninsured Essay Example | Topics and Well Written Essays - 500 words

Medicaid and the Uninsured - Essay ExampleHowever, it seems that the Deficit Reduction Act (DRA) (2005) poses a threat to those families who might use Medicaid and SCHIP. Reasons include the imposition of live sharing, the complications involved in levels of income and percentage of cost demanded, and the need for individual families to keep records that determine what percentage to pay. This is difficult and complicated, as many such families incomes qualify a lot. Research also shows that imposing premiums makes people stop paying or applying for cover. Having such choky budgets already, this represents a further demand on limited resources. Knowing that treatment may be refused if maven cannot pay is yet an new(prenominal) deterrent. Restrictions on adults without children, enrolment processes, and the lack of knowledge of what is available are other factors preventing both adults and parents taking up insurance for themselves or their children.Christopher P. Tompkins, Stuart H.

Tuesday, April 16, 2019

Gordale beck Essay Example for Free

Gordale beck riseIn general, there is quite a variety in terms of detected add together awkwardness take aims for the different areas of Malham. Notably, from Table 1, it can be seen that the area with the highest total hardness is the Rwer air at Gargrare (with 280 ppm) followed by the Gordale spring (with 230 ppm). In relation to this, the lowest readings were from the Malham cove (180 ppm). Incidentally, upon inspection of the Malham area map in figure 2, these threesome areas were of the closest in proximity with each other. In terms of atomic number 20 hardness, the location that registered the highest reading was the Malham tarn outpouring (with 210 ppm) while the lowest was from the Gordale beck (with 110 ppm). The resulting total hardness levels indicate that the waters surrounding Malham range from or so hard (140 to 210 ppm) to moderately hard (210 to 320 ppm). It is evident that an area having high total hardness is not tolerable reason to assume that it also has high calcium hardness. This is collectable to the accompaniment that total hardness is contumacious by the presence of magnesium and calcium and not calcium al i.In fact, the greater the difference mingled with total hardness and calcium hardness, the greater is the resulting value of magnesium hardness. This is a rather simplistic modal value of determining the magnesium hardness, but it is efficient since methods for separately analyzing magnesium from calcium are not slowly done. Table 3 shows the computed magnesium hardness values, which also brings a possible point of error in getting the readings pertaining to the Malham Tarn outflow. There was definitely an error since it is quite impossible for the calcium hardness to surpass the total hardness.To better understand the main factor affecting hardness, a topographic analysis of a real location must be done, which in the process, determine what types of rocks are present. In various areas of Malham, there is a differe nce in amount and occurrence of limestone (Gorman n. d. 1). The presence of limestone dictates the resulting calcium hardness levels since these are mainly serene of calcite or calcium carbonate which disperses into the surrounding passing water.Take note that calcium carbonate is the one measured in tests for calcium hardness. Other points realized from the resulting data are also present. For one, there is no evident correlation betwixt pH and hardness readings. In relation to this, the pH levels still stand for a role in the resulting hardness since they partially dictate the degree of solubility, but due to the fact that there are other factors at work it does not greatly influence the resulting hardness level of water.Another point observed is in terms of colour endpoints in titration. All samples were violet for calcium hardness and grey for total hardness. The last point observed from the resulting data is in terms of the kindred between absorption and calcium hardness. Figure 2 shows that there is a direct relationship between calcium hardness and absorption reading. Hence, as the absorption reading increases, so does calcium hardness.This is probably due to the fact that absorption readings are enhanced when there are more suspended particles or substances in water. These particles block light better than water alone, hence the greater degree of absorption.List of ReferencesDartmouth College. (2008) Titration online lab manual delivered for Chemlab The interpersonal chemistry 3/5 6 Laboratories on 1 October 2008 at Dartmouth College available from http//www. dartmouth. edu/chemlab/techniques/titration. html 26 March 2009

Monday, April 15, 2019

Act of Union Essay Example for Free

cultivate of marrow EssayAssess the causes of the play of uniting of 1800, and consider the ship canal in which the Articles of Union themselves were intended to solve the apparent problems in Irelands constitutional, political and ghostly relationship with England. Your essay must make reference to the relevant document studied in seminar 5. There were several(prenominal) significant causes of the take on of Union between Great Britain and Ireland in 1800, most notably, the United Irishmen rebellion of 1798, along with the french arrive at Killala in North Mayo. The United Irishmen, a radical mixed religious group, had began a campaign against British rule in Ireland in 1798.This rebellion was centered around Wexford, Wicklow and a protestant linen worker rebellion in Antrim. The rebellion was poorly organized and coordinated, and m each split of the country were left undisturbed. Although it was yet some other rebellion by the Irish that was defeated, it fast forward ed the long stand up idea that a political, constitutional and military union was needed between the 2 countries to prevent fall on war, or even worse, for Ireland to become a stepping stone in a French invasion of The British Isles.The worry ab tabu a French invasion starting in Ireland was compounded by a sm all told(prenominal) French landing in north Mayo, that led to two battles, at Castlebar and Ballinamuck. The French landing was requested by Wolfe Tone, a protestant who was viewed as the leader of the United Irishmen. Wolfe Tone was influenced by the French and American Revolutions, and passed this influence onto the United Irishmen. The fact that the American Revolution had occurred so recently also had another(prenominal) major bearing on the Act of Union. the British parliament did not want to lose another colony, especially not one this close to home.This most likely would build being seen as a major weakness by the other European powers of the judgment of convic tion. The French revolution, which promised freedom to all worships and races, and equal rights to all men would also contribute being seen as a threat to George III, the current monarch, whos Coronation condemnation held him to uphold and secure the Protestant faith. Article Fifth of the Act of Union combined the church of Ireland and the Church of England into one central Protestant Episcopal Church. It also made the protestant faith the official religion of Ireland.The unity of the churches would also gestate bred the hope that more of the Catholic majority in Ireland would be converted. This would countersink one across being a vital cause for the union getting voted through the all protestant Irish parliament, as the protestants were outnumbered by Catholics in the general population at a ratio of 311. Should the Act of Union pass, they would be on the opposite side, it would be a 311 protestant majority. On a related topic, Robert Peel had earlier being responsible for the ending of several of the penal practice of laws, all since the threat of war began in France.In 1793 Catholics could vote and become lawyers for the first time. He also vie a part in the repeal of Poynings Law, which allowed the Irish parliament to enact its own laws without influence from capital of the United Kingdom for the first time since the Norman Invasion. However, vitally, he could not hold his nerve to repeal the Penal law that stopped Catholics from holding a get in in parliament and many Irish people would digest thought this was the most important, as they could only vote for the entirely protestant government.Pitt had concomitanted the Act Of Union in 1800, but had originally planned to follow it with more far reaching ideas, such as Catholic emancipation. However George III, after signing the Act of Union into law in August 1800, refused to support full Catholic emancipation on the basis that it would be contrary to his Coronation Oath. While the Act of Union was defeated the first time in the Irish parliament, it was passed on the second time of asking. indisputable peerages, pensions and certain honors were offered to Irish politicians and Irish critics in return for voting for the act in the second time of asking.The first attempt to pass the law was beaten 109 votes against to 104 votes for, but, on the second time of asking in 1800, the results showed 150 for, compared to 115 against. Also, since the repeal of Poynings law, the Irish had being in charge of their own finances, and had bankrupt the country. When some(prenominal) the same thing had happened to Scotland in the 17th century, a Union with Britain had helped the Scottish overcome their financial difficulties. The Act of Union was intended to solve many of Irelands problems in different ways.Article first stated that Ireland and Britain would be united into one Kingdom, by the Name of the United Kingdom of Great Britain and Ireland. This essentially made Ireland a sister kingdom to Britain, with the same laws, religion and parliament. However as time showed, these sister kingdoms were not hard-boiled equally, with very little worry being given to the Great Famine of 1845-49. Although it may initially have being seen to calm some insurgency in Ireland, it was not a suitable long- barrier array unless great measures were taken to assimilate the large Catholic majority.These measures were not taken, and Catholic Ireland still felt like it was being given the short straw without emancipation. Article Second simply stated that the continuation of the majestic Crown shall continue limited and settled in the same manner as the Succession to the purple Crown of the said Kingdoms of Great Britain and Ireland. This was to ensure that a protestant was always going to be in power as a monarch in Great Britain, and that the new Union with Ireland would not have an influence on the process of picking a new king or queen.The third member was perhaps the most important in terms of change, as it was the expression that fully combined the two parliaments into a single entity. This was the most influential article, as it caused many of the upper class representatives that Ireland would have to move out of Dublin and over to London, to be closer to political affairs. This caused a decline in the sizeableness of Dublin as a major European city, and shifted most of the influential Irish people out of the country.It may also have lead to the idea of Absentee landlords, another thing that was seen by the Irish as a cause of the Great Famine. Article Fourth was simply involved in the representation of Ireland in the new parliament. The election of 28 Electoral Lords for life would have guaranteed a continuation of protestant ascendancy in the British House of Lords. This would not have went well with the catholic majority of Ireland as they would have zero representation in the House of Lords, which had the ability to ban any laws passed by the House of Commons. each chance of a law hat passed a pro-Catholic law would have being immediately put down by the protestant powers in the House of Lords, so even if George III did not veto the hopes for Catholic emancipation then the House of Lords would surely have. The 8th article was a constitutional article that ensured the continuation of all laws from before the act, in both Britain and Ireland. It stated That all Laws in force at the time of the Union, and all the Courts of Civil and Ecclesiastical Jurisdiction within the respective Kingdoms, shall remain as without delay by Law established within the sameThis was a safety mechanism to prevent any problems with the transition between separate and united kingdoms. If this article had not being put in place then, theoretically the parliament in London would have had to enact new laws that could potentially damage the political and hostile situation in Ireland. As you can see, the Act of Union was hoped to be a eternal so lution to the problems in Ireland, and planned to consolidate the British Isles under one rulership.The Articles in the Act of Union attempted to promote the protestant faith, in particular the Anglican faith, in Ireland, and in the long term hoped to transform the rebellious Catholic majority into equal citizens of the United Kingdom of Great Britain and Ireland. Although it was unsuccessful in the long run, it was a historic event that worked in other parts of the empire, such as Scotland.

Shark evolution Essay Example for Free

Shark evolution EssaySharks, normally referred to as fish are in fact quite an dissimilar from the regular bony fish. Sharks pretend a cartilaginous skeleton, which is does non fogeyize well, nevertheless despite this cheats consume left a long fossil record. Shark evolution is in fact one of the closely successful cases of phylogenic development. The evidence of sharks dates backwards to over 400 one million million million geezerhood ago, almost 200 million eld before the runner dinosaurs, and before the evolution of any land vertebrates, in the Ordovician period, at the start of the Palezoic era. The only fossils of the oldest sharks are the scales and teething, the teeth being quite fixed and easily mineralized. The teeth in particular reveal that the oldest sharks were quite different from their modern descendants. And even through vertebrates like dinosaurs were eliminated centuries ago, sharks continue to exist today, with almost 1100 species. Among the mo st unenlightened sharks was the Cretaceous, spy in Texas. The Cretaceous is believed to be nigh 65 million years old. The earliest life on earth dates back to almost 4 billion years ago, to a group called the prokaryotes, which includes the firstly bacteria.The prokaryotes did not even dedicate a defined nucleus. The oldest eukaryotes, which were more advanced, and had specialized organelles evolved about 2 billion years ago. These included the famous amoeba. But the first multicelluar life form dates back to about 600 million years ago, to the Edicarian assemblage in Australia. Jawless fishes are believed to be the first vertebrates to have got evolved, and date back to about 500 million years ago. Sharks then appeared about 450 million years ago. But even though paleontologists have considerable evidence, shark evolution posed many problems because of the fossils.With period, most of the evidence was eliminated. The scales are for the most part very small in size, and hav e many impressions of soft tissues. But despite these drawbacks, studies reveal a rich history. The oldest shark scales go back to about 455 million years ago. But since they are quite different from those in modern sharks, most paleontologists agree that they are not from sharks. The first acknowledged fossil dates back to 420 million years ago in Siberia. These have been classified under the genus of Elegestolepis. Others, discovered from Mongolia have been classified in the genera Mongolepis and Polymerolepis.But apart for these almost classifications, little is actually known about these primitive sharks. But with the beginning of the Devonian period, shark record becomes quite varied. The first teeth of about 400 million years ago were discovered from Europe. These teeth belong to the ancient Leonodus. Leonodus had characteristic double cusped teeth. The oldest shark cranium was discovered in Australia, and dates back to about 380 million years ago, and is believed to be from a shark specie xenacanth. Earlier in fact the Leonodus and xenacanth were thought to be related because of their similar crown cause teeth.The first partially fossilized shark shark was discovered by a geologist Gavin Young in Antarctica. But this fossil displayed an odd mix of features. Possibility exists that this too may be a xenacanth, hardly Young named it Antarctilamna. The Antarctilamna was 16-inches long, and was a diplodont, resembling the xenacanth. Antarctilamnas fin though was directed dorsally. The xenacanth in contrast was exclusively a freshwater shark, and had a long fin directed rearward, just behind the cranium. But with the passage of time, sharks have endured tremendous changes of surround, and yet, have managed to survive.But like all other creatures, the species had to either adapt to the change, or end. all(prenominal) time a large scale shift occurred a number of species found the new environment incompatible and became extinct. Sharks though displayed imme nse diversity, and helping then expand into new habitats. Such explosive increases in variety are termed adaptive radiations1. Over such a huge span of geologic time, sharks have has two adaptive radiations, and have survived up to five mass extinctions. Many also agree that since most shark fossils have been found either from Australia, or Antarctica, sharks may have originated in the southern hemisphere.The first radiation was in the Carboniferous period, roughly 30 million years ago. This was characterized by the flourishing of the stethacanthids. The morsel major radiation occurred in the Jurassic Period, about 170 million years ago. During this time two land and air was dominated by reptiles. This was the time when the hybodonts developed. Many believe that the hybodonts were the ancestors of all modern sharks, but evidence is scanty. While the hybodonts shows many obvious similarities to the modern shark, it has characteristic features not found in sharks today. adept of th ese includes the horns behind the eyes. But now, the earliest known modern shark is believed to be the Mcmurdodus from the mid-Devonian time. The basis for this is the Mcmurdodus tooth. The tooth shows is of the same pillow slip found in modern sharks, but not in the ancient ones. But there is a 190-million-year gap in the fossil record between the last Mcmurdodus and the first unquestionable cowshark 1. Even though research continues to unveil the evolution of this epic animal, a complete evolutionary record is difficult to draw.The earliest known sharks in fact were quite different from the modern counterparts. But in some regard they were very close to the modern sharks of today, having the same cartilaginous skeletons, replaceable teeth and multiple gill slits. And with time sharks have endured great geologic change, adapting to different environments, evolving to change, and have thus survived as one the most durable animals on the planet.References1. Martin, R. Aidan. ReefQ uest Centre for Shark Research. Biology of Sharks and Rays. Retrieved from (http//www. elasmo-research. org/education/evolution/evol_s_predator. htm)

Saturday, April 13, 2019

Is Microsoft a monopoly Essay Example for Free

Is Microsoft a monopoly EssayIn order to understand if Microsoft is a monopoly angiotensin converting enzyme must archetypal know the definition of a monopoly. A monopoly is a firm that is the sole mete appearer of a return that has precise or no substitutes. This mechanic onlyy should arouse many thoughts in the minds of us as consumers. For all these years have we been monopolized by a mystifyr of a product just because there were limited sources in the same fields? Yes and no should be the floating answer. Microsoft for years has been the producer of some every necessary component associated with our electrical devices.Microsoft is the developer of doubled in operation(p) systems or OS that first entered the commercialize in 1981 scarce did not officially out until 1984. In 1984, the Applesoft Basic for Apple Computers was introduced by vizor Gates. Due to the fact that the Apple system was first in this technologically advanced field it was fixed in the direc tion of being a monopoly. This is the diaphanous sign that lack of other operating(a) systems would set both Bill Gates and Microsoft in a monopo attendic state. So if this monopolistic sign was so evident past why wasnt it stop by the government?This is a direct form of a government- puddled monopoly. Government-created monopolies exist because of patents and copyrights. The government has leave aloneed Microsoft to exist because it was seen to be within the best interest of the public. The government does not actually predict whether a producer or firm impart be a monopolist, it only allows a firm or producer to sustain the rights to the specific fields that they want to create. The communications field often has their experience set of economical rules which is usually set at the understanding that every must benefit from the product.Microsoft has often perfected this with their operating systems by staying consistently up to date with the consumers look of life. So what exactly allowed Microsoft to become a monopoly? Microsoft (Bill Gates, Steve Ballmer, and Tim Patterson) would create and enforce universal data interaction standards for computer systems. The timing for this was perfect because businesses were in a technological era that the computer was in necessary and high demand. Microsoft became one of the largest monopolies because of their ability to be in almost every trade that had use of a computer system.This was a great involvement for Microsoft and for users but it was to a fault a bad thing for users as well. Since the market was so unregulated it would allow Microsoft to not produce a quality product. This was allowed because of their monopoly. This monopoly would be out of the control of the government because breaking up the Microsoft Company into little companies would only cause damage to the consumer. In this I remember you the consumer would have to purchase multiple operating systems in order to maintain computer interacti ng standards. This would not be the best interest of either the government or the consumer.So unfortunately this monopoly would be allowed to carry on its position in the computer operating fields. Just think by chance that the government did break this monopolistic company up? This would allow so many small companies to produce the same product under the same outdated set of rules. So question, if the same set of bendable rules applied what would stop those small broken up companies from befitting a monopoly as well? Exactly nothing. So the government sees it make better for consumers to have to deal with one monopoly comp atomic crook 18d to multiple.A company kindred Microsoft falls into a classification of a large monopoly. There are many smaller monopolies that go un pick upd. Some of these companies are Nike, Reebok, revolutionary Balance, etc. You may hear close to some of these companies monopolistic traits, but choose not to pay much attention because they are not as large as a company as Microsoft. Lets face it we melt d knowledge to have a thought that they are just brands. Just a thought, when you walk into your local sell store are you looking for a pair of shoes or a certain room of shoe by name (i. e.Nike Jordans, Converse All-Stars or commonly known as chuck taylors, Reebok Zigtechs, New Balance 855s)?These are the monopolies we do not pay much attention too because they are in the main companies that are in deep competition with one another. In order to compete in their individual fields the company must make a shoe or an article of clothing that is rum whether it carries a label or not. So what exactly makes Microsoft a monopoly instead of a emulous market? Since Microsoft is the only producer in the operating system market it has the ability to set and stay with its own equipment casualty.Microsoft in recent years have gained a few other competitors that are making their counseling up the ladder with free trial periods or jus t general free use with things like email, face engines, and veritable(a) software purchases through computer brands, printers, etc. A common name that we all use on practically a daily basis is Google. Google Inc. has won a growing number of customers for its Google Apps software, a collection of word processing, email, spreadsheet and other tools that are hosted and accessed online.The company is also reportedly preparing an expansion of its solutions marketplace, to sell software to businesses that can augment Apps. When confronted with questions of their products, an all too modest Google made no response. Unlike Microsoft, Google tends to not make broad promises of software updates until they have perfected the process. This is what commonly makes Google a most used search engine. Google also offers Gmail which carries its own form of complete virus software which sets it in a field of its own unlike Yahoo mail that only offers a low version of spyware with a premium story p urchase.Other competitive companies that are climbing on the Microsoft ladder are Oracle Corp. and LotusLive iNotes. When Microsoft was confronted if any of these companies were the indicate behind the downed sales agreements of their Microsoft Office version they replied with it is unclear if they had a hand in the matter. This is another giant headed response because Microsoft does not want to even think at this time that they could possibly have competition. When a monopolistic company is confronted with competition you will usually see a drop in product charges that may or may not go unnoticed.It is my opinion that this competitive edge brought to Microsoft will not go unnoticed. With the growing state of these other companies, I cannot wait until Microsoft has to become a competitive market instead of a monopoly. Another way to tell whether a company is a monopoly or not, is to check its revenue. Since a company like Microsoft does not have their books out their like publi c records, we have to keep up media theories and articles. When you see an increase in the company revenue this means that their output has went up. This means that they are producing much and making more because the demand has gotten higher.When revenue has dropped then the company has lost money and no semipermanent producing because the demand has dropped. All too commonly you may see a drop in price because the company is wanting to sell their items rather than taking a complete loss on them. The will also set their prices above marginal cost. This will tend to be a seasonal thing because annually they try to place newer products on the market. Now noticing that other companies like Windows, Macintosh, and Linux are in competition with Microsoft is a vast deal to us as the consumer. To Microsoft this is no real better-looking threat because of the huge market share that they own.This allows a monopolistic company to carry on their threat of being the big man on the block. In this I mean that they are allowed to place what seems to be ridiculous price because they do not see the competition as a true competitor. Consumers frequently take notice to this when they are in the market for the produced good of computer systems. Consumers commonly watch for the better deals charm taking name brand and off brand into high consideration. Even though Sony may be the better brand, it is possible that Acer could sell more because of the consumers desire to pay less and receive more.This is just the way that things go in a time of economic struggle. The only time that things like this change is if the consumer has a specific desire for a certain brand over the lesser price. So as a monopoly could Microsoft force these other competitive companies out of their market? Yes they could and it has been accused that they have in the past. To include the list of companies that Microsoft has bought out in order to maintain at the top would be completely ridiculous but to name a few would be ok.Microsoft has purchased companies like Skype, Nokia, and of course we all heard of the Microsoft-Apple buy out in order to stop them from sinking. There is a lot of talk near what should be through to the Microsoft Company with the Department of Justice, Attorney Generals, and Microsoft. Many think that breaking the company up would be a mistake while a majority agree that it would also make them list a fairer price and focus on a better product. This in my opinion is not to the judgment of anyone. Is Microsoft vilify for being the best in their business?In my opinion, absolutely not. It is at the decision of the other competitive companies whether to stay in or back out. Many people think that the treatment they receive while purchasing items from the producer is unfair. I would like to disagree because if you need the item bad enough then whatever dollar amount the producer places is the dollar amount the consumer will pay. Take ball up for instance, when gas was hitting its record highs two years ago. All I heard were complaints of how ridiculous it was, we should petition, protest, or even not purchase for days.Where were their complaints when they were driving to McDonalds to get a burger instead of cooking at home? battalion only complain about the abuse that they cannot control. This is the same with items like the personal computer. Everyone wants to complain about the price they paid for their computer but not the eBay items they are purchasing while they use that same computer. This reminds me of a conversation between the course instructor and myself. He asked one time if there was a sale on hamburger at the store but you really wanted steak which would you choose?I replied with I am going to choose steak because it is what I want. I chose this answer because regardless of the price of hamburger if I want steak, then ultimately steak is what I will get. This is my choice. I choose to not complain about the items that I can not control because at the end of the day I still need it. So in conclusion, if you ask me if Microsoft is a monopoly or not, my answer will still remain yes and no. Yes, because they are the capital holders of operating systems and they are getting filthy rich. No, because they have made themselves the best.If the other companies want to be on top then they need to fight to be on top. But also in the mean time they shouldnt complain about the actions that Microsoft takes in order to remain the best.References Mankiw, N. G. (2012, 2009). Principles of Microeconomics (Sixth ed. ). Mason, OH South-Western Cengage Learning. Mankiw (2012, 2009) Fisher, G. A. (2000, May 30). Why is Microsoft a Monopoly? Retrieved May 21, 2012, from http//www. zaimoni. com/George/MicrosoftMonopoly. htmFisher (2000) South-Western College Publishing (2003). Is Microsoft a Monopoly? Retrieved May 21, 2012, from http//www.swcollege. com/bef/policy_debates/microsoft. htmlSouth-Western College Publishing (2003 ) ThisNation. com (2008). Is Microsoft a monopoly?If so, why does it matter? Retrieved May 21, 2012, from http//www. thisnation. com/questions/027. htmlThisNation. com (2008) Albro, E. N. (2007). eighter Years Later, Is Microsoft Still a Monopoly? Retrieved May 21, 2012, from http//www. pcworld. com/printable/article/id,139458/printable. htmlAlbro (2007) Jackson, E. Forbes (2012, March 1). Steve Jobs Used Patents to Get Bill Gates to Make 1997 Investment in Apple. Retrieved May 21, 2012, from.

Friday, April 12, 2019

Serious dramatic deficiency Essay Example for Free

Serious dramatic deficiency EssayIt is not only in period pieces, however, that the rejection of our countrys history and tradition robs actors performances of authenticity. In postwar lacquers cultural climate, it is exceedingly gruelling for actors in any type of role to convincingly express complex, deep or intense sensation in fact, any dramatic perception at all. To appear real, this sort of emotional expression demands just the right modulation and combination of subtle elements, including not only choice of words and facial expression, scarce also posture, gesture, tone of voice, direction of gaze, and distance from other actors. And the right modulation and combination differs from culture to culture. all(prenominal) culture has its own frame recreate of expressive conventions from which actors moldiness draw in order to express emotion that will strike their audience as authentic. As long as Japanese actors refuse to work at bottom the fabric of emotional express ion stipulated by Japanese culture, they cannot express dramatic emotion in a convincing manner.The famed Meiji-era novelist Natsume Soseki once taught his students that the true Japanese translation for I love you is Tsuki ga tottemo aoi na (The moonlight is so blue tonight) what he meant was that to express within the Japanese cultural framework the same emotion expressed in English by I love you, one must choose words like The moon is so blue tonight. Since every culture evolves naturally everyplace time, the cultural framework for emotional expression is by no means immutable. But in post-war Japan the solve of change has been unnatural and rushed.Regarding their traditional modes of expression as archaic and feudalistic, and eager to Westernize, the Japanese put one over attempted to adopt the Western (more specifically, the American) expressive framework wholesale. Yet given that they continue to use the Japanese language as their vehicle for verbal expression, any attemp t to affect a de-Japanized manner at this level is half-baked. Today, one might say, a Japanese person is unable to convincingly express exasperation for another either by the English I love you or by the Japanese The moon is so blue tonight. This may be why, since the 1980s, young people in Japan have more and more disdained the expression of serious or dramatic emotion as kusai, or corny, and prized the appearance of emotional withdrawal as kakko-ii, or cool. In terms of dramatic expression, then, the Japanese film labors under a atrocious burden. If it portrays emotion within the traditional Japanese framework, it may achieve authenticity, but the effect is antiquated. If it portrays emotion within the Western framework, it comes across as meretricious and unconvincing.Films that try to blend the two modes often end up antiquated and unconvincing. Yet in animation, which lacks visual realism and features de-Japanized characters to begin with, the expression of emotion paradox ically takes on a more convincing sense of reality. This may explain why most of the serious and would-be(prenominal) film efforts have used the vehicle of anime. Given the serious dramatic deficiency, Japanese live-action films can no longer tackle any serious or profound subject matter.In the context of contemporaneous Japanese film, then, anime often conveys a greater sense of reality than live-action films. The thin, insubstantial reality of awake(p) film, that is to say, is more alive literally, more animated than the flesh-and-blood reality. And if anime is perceived as more real (i. e. , hand-to-hand to physical reality) than live-action, this means that, increasingly, anime embodies the Japanese consciousness of reality. The Japanese conception of reality is undergoing a process of animation.The rise of anime as well as manga is a cultural by-product of modern Japans style to promote modernization and Westernization while rejecting its history and traditions. A medium that fuses elements of East and West, and lacks a clear home(a) identity, could be considered international in a certain sense, and this is doubtless a major reason why anime has so many fans overseas. But the current state of affairs, in which anime represents the mainstream of Japanese cinema, is by no means desirable, inasmuch as it signifies an ever-widening gap between physical reality and peoples conception of it.

Wednesday, April 10, 2019

Equal Pay and the Glass Ceiling - Key Issues for Women Essay Example for Free

Equal Pay and the Glass Ceiling Key Issues for Wo men EssayGlass detonating device erect be described as an economic term that refers to a scenario where the promotion of a able-bodied individual to a higher rank within an musical arrangement is overlooked so he or she is stuck at demean ranks mainly beca aim of factors driven by discrimination, peculiarly gender and racism (Arnwine, 2010). However, other factors considered as barriers to advancement at tap place may include disabilities and aging.A good example argon barriers women face when aspiring or attempting to attain higher position which is senior as well as to acquit higher profit levels in modelplaces much(prenominal) as government offices, education, nonprofit faces and wrinkle organizations. Indeed, blur in detonator is a term that was first apply to refer to factors that barred women from promotion in the flow place in the US yet they possessed the necessary qualifications (Hakim, 2004). Women ar vital for contribution of turn force around the globe and thus they should be regarded as equally probable like men.patronage their potential, women have been marginalized in various fields and especially in their work place since they argon non much considered for advancement in their chew over groups even if they have the same qualification for promotion as their men counterpart employees. This is critical get out that should be address by the homo resource commission to project that theorize opportunities and promotions argon granted on merit but non by either discrimination of whichever form.There is need for human resource management to combat drinking ice ceiling, expand speckers roles of women and alike advancement of women in their work places in both domestic and global fronts ( worldwide labor Office, 2004). gentleman resource managers and professionals bottom have a great invasion in an organization because their role in recruitment and promotion of e mployees (Crampton, Hodge, Mishra, 1997). In other words, they ensure the well-being of all employees, especially with effect to job satisfaction to so that employees carry out their roles effectively.In that effect they should be concerned and have familiarity on how the phenomenon of glass ceiling may be impacting the organization reputation either indirectly or directly. They should also have to on a lower floorstand how this phenomenon is impacting the customer loyalty, growth potential, skill set diversity, and even the organizations bottom line. Often, the chief executive officer or the organizations president should invite the professionals of human resource in a meeting and discuss on the possible organizations changes that could be made in order to reduce glass ceiling which has been in existence.This would maximize the organizations reputation and performance. The human resource managers should also have knowledge of the organizations employment justices, sends and p rograms. This is because the law can protect certain groups such as the women viewed as minority in labor markets. These professionals should also have the knowledge on the potential impacts that barriers caused by glass ceiling may have on the performance of the concerned employee.In some countries such as the United States, work place discrimination, especially sexual discrimination is illegal as stipulated in the Civil Rights Act of 1964, even though it exists in various forms. For instance, women may be discriminated in forms such as low salary increments and generally lower pay as comp bed to their phallic counterparts (International labor Office, 2004). This discrimination may also be manifested in the practices of hiring, promotional opportunities, development and training activities atomic number 18 disproportionate in favor of the men.Human resource professionals have the potential of impacting barriers of glass-ceiling either negatively or positively collectible to the changes in workplace which they implement or ease such as employee recruitment, development and trainings, transfers, succession planning, promotions and terminations. In some organizations, affirmative action plans (AAF) should be conducted to practice analysis that comp ares number of minorities and women who are available in labor markets with the ones employed in their organization (Hakim, 2004). other requirement of compliance is the review of corporate management, which is sometimes known as glass-ceiling examines and is usually conducted when the organization is conducting the audit of affirmative action plan and contract primarily on the process of decision making of chief operating officer and senior executives. For non-compliance of affirmative action plans for a company, it can be fined severely and also companies who do not comply with employment laws may also have unfavorable publicity.The glass ceiling evidence can be described as invisible, overt or covert (Arnwi ne, 2010). Glass ceiling has spread its root to the gender based barriers which run gamut from the stereotypes of gender to leadership styles that are preferred up to the ranks of high management. The glass ceiling effect sign is the gender-biased compensation where by anecdotal reports and studies have shown big discrepancies on salary favoring men even for similar job levels in the same organizations. Discrepancies favoring men exists in many organizations which are of different sizes.In these organizations women who do not have opportunities of gaining other competences are not likely to induct any chance of adding their skills unlike their counterpart men working at the same organization (Crampton, Hodge, Mishra, 1997). Women for the intimately part do not get chances of training in various management fields in most organization and this is a vice that need to be sort out since the world is changing and women are breaking the glass ceiling and are now in senior position in m any large organizations including high ranking government offices.Another indicator which shows glass ceiling in an organization is when advancement of women is hampered by corporate cultures that are well-ingrained. Corporate practices and policies for example may maintain status quo in a manner that men are kept in the corporate power positions (International labor Office, 2004). for the most part the board directors in many organizations comprise men as the majority and they may also perpetuate the men status quo by choosing chief executive officers who are like them so as to go under the vice of glass ceiling in the organization.Other barriers that can be said to be gender based are communication and behavioral styles that vastly differ from norms of company and the lack of women opportunity of gaining line experience and also the general management. Human resource professionals should iron out the norms and policies, which can be a barrier to advancement of any group of indiv iduals in the organization and ensure that employees are all do without discrimination.Human resource professionals should understand that challenges of work and personal life balance can have impact on women advancement and failure of dealing with them can result to the phenomenon of glass ceiling. They should have the assumption that women are care givers of the family and especially for the elderly and children and thus they may not meet all their work responsibilities due to family responsibilities. Furthermore, there are organizations which cannot give some programs that will involve outside commitment to women especially for the positions which are at senior levels.Therefore a lot of women are disadvantaged to take aspiration stairs of advancing in the organization. In addition, promotion opportunities are often given in favor of men mainly due to their developmental prospects which include networks and mentoring (Hakim, 2004). Women are peculiar(a) to access of the informal networks that men use in developing relationship networks in the organization or company. These networks tend to eliminate women because of nature of their work or sometimes the promotion or advancement may be perceived as male activities and thus this contribute to work place gender barriers.The human resource professionals should ensure that all organization activities are conducted in the organization but should not be discussed outside especially on the function of promotion or job advancement in the organization. They should also see the need of balancing the force-out who are in the management and leadership line to include women so long as they are competent for such posts. Human resource personnel should avoid glass ceiling by avoiding erudition of seeing women as being incompetent in various fields like management and persevere stereotyping them.They should do a musical mode with the barriers that prevent women from advancing in the organization such as societal barrie rs and political barriers. In recruiting new employees in the organization they should not consider the potential candidates with any discrimination under whatever thou. The recruitment personnel should not stereotype battalion and consider other people such as men being more suitable thus leaving women out and may be they could be more competent than the men selected.The government officials who are responsible for recruiting new employees should not be biased on a certain group of people since this is one thing that contributes to glass ceiling placing women on the losing end. Another point of view is that the human resource personnel should wipe out handicraft and structural barriers such as recruitment and out reach practices which can make the minorities and women not to be considered in recruitments.They should also be conscious about the corporate climate which isolate and alienate women from receiving promotions and job advancement in the organization they are working in so as to break the glass ceiling. Another area of adjustment is the training where many organization personnel responsible for training employees have pipeline barriers making women in the organization to receive poor training, which make them unable to have mailman growth in their organization (Crampton, Hodge, Mishra, 1997).They should also eliminate inadequate mentoring in the organization to make women able to be considered for such promotional posts in the organization rather than mentoring men only. Rating and testing systems should not be biased in the organization but should be fair and job advancement should be granted on the merit of performance and competence so as to avoid imbalance of the people in leadership positions in the organization.Internal communication networks in the organization should not be limited to some people but the networks should be among all the employees working together because this is one barrier which makes women to tuck in behind at the tim es of job advancements and promotions. To reduce or eliminate glass ceiling in the organization, women employees should not be limited when it comes to job rotation and assignments because limitation of such nature may lead to executive suite.The institutions should not be too much rigid to deny women employees the balance between work and family. With no access of training, developmental assignment, mentoring and other activities of job enhancement, too many women who are qualified are cut short before they reach their aspirations. Corporate leaders should realize that there is need of input signal and talent of minorities and women at the senior levels in their organization to meet the need of the changing environment in the market (International labor Office, 2004).The demographic and competition internationally is changing and requires all types of gender so as to improve the todays global world economy. Breaking glass ceiling should be addressed as economic imperative and is t he bottom line critical issue in every business internationally and also a pocketbook issue to the working women together with their families. The chief executive officers should focus on job diversity so as to influence the organization culture and create ambiance which utilizes fully capabilities and talents of the diverse workforce.Setting timetables and goals for diversity of the work force is a business extension practice that can enable it to weigh their growth and progress. Line manager should be held responsible to break the glass ceiling and thus they should have systems of rewarding and compensating in accordance to the diversity objectives accomplishment. Organizations should have affirmative actions to ensure that all employees have access to opportunities equally and they should be based on merit and ability.Opportunities of advancement should be promoted to people who can effectively contribute to the performance of the organization. This means that the rich talent sh ould be used so as to improve the economic stability and also to break the glass ceiling. Another way of breaking glass ceiling is for the organizations to make expansion of their traditional recruitment networks to use a order that seek candidates with experience and backgrounds of non-customary.All in all, the human resource professionals should be concerned on how they can break glass ceiling in their organizations because the world has changed and also glass ceiling is one of the issue that is much of concern in the today life. There is need of selecting and promoting employees in an organization on the grounds of merit so as to improve performance of the organization and have competent employees who know how to draw rein changes as they come. References Arnwine, B. (2010). Breaking the Glass Ceiling.Retrieved July 19, 2010, from http//www. newdeal20. org/2010/03/29/breaking-the-glass-ceiling-9240/ Crampton, S. , Hodge, J. , Mishra, J. (1997). The Equal Pay Act The first 30 Y ears. macrocosm Personnel Management, 26, 12-21. Hakim, C. (2004). Key Issues in Womens Work Female Diversity and the Polarization of Womens. Oregon Routledge Cavendish. International labor Office. (2004). Breaking Through the Glass Ceiling Women in Management. Retrieved July 19, 2010, from http//www. ilo. org/dyn/gender/docs/RES/292/f267981337

Monday, April 8, 2019

Accredited & Deluxe Hotels for Tourism Essay Example for Free

Accredited Deluxe Hotels for Tourism Essay1. Century honey oil Hotel 599 Pablo Ocampo Str. manilla 10042. Crowne Plaza manila paper Galleria Ortigas Avenue, Corner Asian Dev., Bank Avenue, Quezon urban center 3. Diamond Hotel Phillippines Roxas avenue cor. Dr. J. Quintos St., Manila, Philippines 1000 4. Dusit Hotel Nikko Ayala Center Makati urban center Metro Manila, Makati, 1223, Philippines 5. EDSA Shangri- La Hotel 1 tend Way Ortigas Center, Mandaluyong city, Manila 1650 6. spend Inn galleria Manila 1 Asia Development Bank Avenue, Ortigas Center, Pasig City, 7. Hotel Intercontinental Manila 1 Ayala Avenue, Makati, Luzon 1226, Philippines 8. Hyatt Hotel and casino Manila 1588 Pedro Gil Corner MH Del Pilar, Malate, Manila 1004 9. Makati Shangri- La Manila Ayala Avenue time out Makati Avenue, Makati City 1200 10. Mandarin oriental person Manila Makati Ave, Makati City 122611. Pan Pacific Hotel Gen M Malvar, Manila 100412. Renaissance Makati City hotel Esperan za Street corner Makati Avenue, Ayala Center, Makati City 1228, Philippines, Manila 13. Sofitel Phillipine Plaza Manila Ccp Complex Roxas Boulevard, Pasay Manila 1099 14. The Bellevue Manila North Bridgeway, Filinvest Corporate City, Alabang, Muntinlupa City, Philippines 1781 15. The Manila Hotel One Rizal Park 0913 Manila Po Box 307 Philippines 16. Heritage Hotel Manila Roxas Boulevard corner Edsa Pasay City 1300 17. The Peninsula Manila Ayala Museum, Makati Ave, 1226See moreFirst Poem for You Essay18. Vivere Suites 5102 Bridgeway Avenue corner ASEAN Drive, Filinvest Corporate City, Muntinlupa City 1781Accredited First Class Hotels in the Philippines1. CSB International Conference Center Arellano cor Estrada Sts Malate, Manila, Luzon 1004, Philippines2. Discovery Suites Ortigas Center, Pasig City 1600 Philippines3. colossal Eastern Hotel 7842 Makati Avenue, 1200 Manila4. Manila Pavilion hotel United Nations Avenue, Corner Ma. Orosa Str Manila 1000 , Philippines5. The Linden Suites Hotel 37 San Miguel Avenue, Ortigas Centre Pasig City 16006. The Pearl Manila Hotel General Luna Str., Corner Taft United Nations Avenue, Ermita, Manila, Luzon 1000, 7. The richmonde Hotel 21 San Miguel Avenue Pasig City 8. Traders hotel Manila 3001 Roxas Boulevard, Pasay, Manila, 1305 PhilippinesAccredited Standard Hotels in the Phillipines1. Aloha Hotel 2150 Roxas Boulevard, Cor. Quirino Ave.,Malate Manila, 1004 Philippines. 2. Bayview Park Hotel 1118 Roxas Boulevard Cor., United Nations Avenue, 1000 Manila 3. Best Western hotel La Corona 1166 M. H. Del Pilar St. cor. Arquiza St. Ermita, Manila, Philippines 4. Camelot Hotel 5. CEO Suites6. Cherry Blossoms Hotel 7. City Garden Suites 8. Citystate Towe Hotel 9. Garden Plaza Hotel 10. Hotel Las Palmas

Sunday, April 7, 2019

Balance Sheet and Income Statement Essay Example for Free

Balance Sheet and Income line of reasoning EssayBalance Sheet and Income Statement Jennifer Grayson BSA/500 June 4, 2011 Brian Keltch Balance Sheet and Income Statement The following four companies are related to the companies that have been in review over the last four weeks. These four following companies show how well the come with has been doing over the last two years or non so well. The attach to has pulled their balance sheets and income statement to trip up if all the companys financial require are being met. If the companys needs are not being met, the company will show where the company needs to cut rearwards and where the company needs to improve. National Plastic CoConclusion National Plastic Co. s not doing well after a year. The company has less net fixed assets after a year. The company has borrowed less liability but the company has less revenue so with the changes it did not work in the favor for the company. AMERCO Inc. is salvage doing about the same after a year. The big thing is that the company is still able to bring in money with the economy at its worst. The company is able to run comfortable. Kout forage Group is doing about the same as the year before. No growth has happen and no disordered has happen. Resaas Services Inc. has made the most growth in a year. In 2010 the total liabilities and equity was 0. 8% and in 2011 5. 67%. The company gained more than 5. 39%. Resaas is doing well. To look at all the different companys income statements and balance sheets show that no two companies are the same. Some companies may do give than others may and some may not do well at all. It is important for all companies to progress to sure to have a financial statement. Reference BLOOMBERG L. P. (2012).

Analysis and Design of Software Architecture Essay Example for Free

abbreviation and bod of softw atomic number 18 product Architecture EssayOutline1 2 3 4 5 6 7 8 organic evolution Process Requirements Quality Attributes Run conviction QA Non-run era QA Requirements synopsis example architectural abstract concept architectural ViewsDenis Helic (KMI, TU Graz)SA depth psychology and imageOct 19, 20112 / 78Development ProcessMethodologyDierent softw atomic number 18 package development processes have softw atomic number 18 architecture as a get down of the process Rational unied process Spiral development method acting Agile development method Evolutionary rapid developmentDenis Helic (KMI, TU Graz)SA synopsis and curriculummeOct 19, 20113 / 78Development Process describe of SA in SDP visualize Source Software Architecture Primer by Reekie, McAdam Denis Helic (KMI, TU Graz) SA compend and protrude Oct 19, 2011 4 / 78Development ProcessMethodologyAfter the initial requirements analytic thinking but before software design The rst archite cture is also a communication basis with the customer Inputs for the development of the architecture 1 2Requirements shirktext (technical, organizational, business, )Denis Helic (KMI, TU Graz)SA depth psychology and headingOct 19, 20115 / 78Requirements abbreviationAt the beginning in that location is unceasingly a customer who wants a specic software carcass Customer wishes are always in act uponal Interviews, some documents, some Excel tables, We read to analyze such(prenominal) informal records and structure it Requirements technology is a huge eld but we just illust dictate here unrivaled possibilityDenis Helic (KMI, TU Graz)SA compendium and traffic patternOct 19, 20116 / 78Requirements analytic thinkingThe results of the requirements analysis1 2Functional requirements Non-functional requirements(a) Run clipping qualities (b) Non-runtime qualities3contextual requirementsDenis Helic (KMI, TU Graz)SA compend and introductionOct 19, 20117 / 78RequirementsFunctional requirementsA technical expression of what a trunk leave do Arise from stakeholder commands Structured language software requirements specication Use cases structured translation of procedurer interactions with the administration Formal lays e. g. state-chartsDenis Helic (KMI, TU Graz)SA psychoanalysis and foundationOct 19, 20118 / 78RequirementsNon-functional requirementsOther ineluctably than nowadays functional or business-related Gener all in ally expressed in the form of quality-attributes Runtime quality attributes Non-runtime quality attributesDenis Helic (KMI, TU Graz)SA abridgment and architectural planOct 19, 20119 / 78RequirementsContextual requirementsWhat technology is purchasable? Expertise of the development team Previous have a go at it of substance ab users/customers Technical, business, market, legal, ethical, Denis Helic (KMI, TU Graz)SA psychoanalysis and nameOct 19, 201110 / 78Quality AttributesNeed to address QAsWithout whatsoever need for operation, scalability, any implementation of functionality is delightful However, we always need to take into account the broader context E.g. hardware, technological, organizational, business, The functionality essential be there but without proper addressing of QA it is worth nothingDenis Helic (KMI, TU Graz)SA summary and DesignOct 19, 201111 / 78Quality AttributesInuence on QAsTypically, a single parcel endure not address a QA completely e really QA is inuenced by multiple helpings and their interactions E.g. a UI component has a high degree of usability however, usability of the form is compromised if a data management component has poor causeance in accessing the data users need to detainment yearn poor usability Components and their interactions software architecture QAs are directly inuenced by software architectureDenis Helic (KMI, TU Graz)SA psychoanalysis and DesignOct 19, 201112 / 78Runtime QAPURSPURS (performance, usability, dependability, security) motion time performance, memory, disk, or ne 2rk utilization Usability human factors, wholesome-situated to learn, comfy to use, Reliability approachability, safety, guarantor authentication, data protection, Denis Helic (KMI, TU Graz)SA summary and DesignOct 19, 201113 / 78Runtime QA movement date performance is most obvious Measured in the number of operations per second Also, latent period the time from receiving an input and producing an output Other measures memory, disk, interlocking utilization or throughputDenis Helic (KMI, TU Graz)SA synopsis and DesignOct 19, 201114 / 78Runtime QAPerformanceDierent measures are typically traded o against each different E.g. increasing throughput whitethorn increase latency Time performance power be increased with more memory True performance of the remains is not only dened by performance of single components But also by their interactions and the overall processes in the frameDenis Helic (KMI, TU Graz)SA abbreviation and D esignOct 19, 201115 / 78Runtime QAPerformance factorsChoice of algorithms Database design Communication imagery managementDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201116 / 78Runtime QAChoice of algorithmsPerformance of algorithms is measured by their complexness (big O) E.g. linear complexity O(n) Running time increases in direct proportion to the size of the data E.g. polynomial complexity O(n2 ) It does not scale double size of the data running time increased by factor of 4 Goal O(nlog (n))Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201117 / 78Runtime QADatabase designPerformance of database queries keister dominate the overall performance The design of the tables has enormous impact on the overall performance Techniques to modify it lazy evaluation, replication, caching Some additional cost to manage replication and/or caching In-memory databases (real-time systems) Developing a parvenueborn database (search engines)Denis Helic (KMI, TU Graz)SA A nalysis and DesignOct 19, 201118 / 78Runtime QACommunicationNetwork hit Package data gibe to a protocol, sending data over network individually layer means additional overhead Think how to use network packaging binary data as XML? Use more condense data formattings, e.g. JSON vs XMLDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201119 / 78Runtime QAResources managementOverloaded components need to be avoided A range of mountains is only as strong as its weakest link E.g. a single-threaded shared resource is in use all other threads are jam Very dicult to track downDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201120 / 78Runtime QAUsabilityUsability is a very rich eld If usability is big you will need a usability expert Combination of many factors responsiveness, pictorial design, user expectations, condence Measuring with time taken to complete task, error rate, time to response, Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201121 / 78Runtime Q AResponsiveness and data availabilityAn example of dealings amidst QAs Usability requires that the system responds to user actions within a certain period of time If it is a complex system this need translates into performance along the cartroad of the user actionDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201122 / 78Runtime QAResponsiveness and data availabilityFigure Usability vs. Performance Source Software Architecture Primer by Reekie, McAdamDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201123 / 78Runtime QADiscussion on traffic between QAsThis draw shows that we need to pay attention to tuning communicationbetween B and Y Performance of the communication channel is a con taking over of a usability requirement Do we need to give birth security of the communication channel?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201124 / 78Runtime QADiscussion on relations between QAsThis diagram shows that we need to pay attention to tuning communicat ion between B and Y Performance of the communication channel is a consequence of a usability requirement Do we need to fill-in security of the communication channel? We assert QAs always only as a response to user necessarily Never because it is needed anywayDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201124 / 78Runtime QADiscussion on relations between QAsIf we post security even if it is not needed Very often QAs elaborateopposing forces on the system Security requires a lot of checking performance will suer usability will suer A minimalistic approach develop only what is requiredDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201125 / 78Runtime QAReliabilityIn traditional engineering disciplines reliability measures the failure rate of the system Failure rate specied by mean time to failure MTTF A related measure mean time between failures MTBF MTTR is mean time to repair A is availabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201126 / 7 8Runtime QAReliabilityMTBF = MTTF + MTTR A= A=MTTF MTBF MTTF MTTF +MTTRE.g. expected availability of Web systemsDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201127 / 78Runtime QAReliabilityMTBF = MTTF + MTTR A= A=MTTF MTBF MTTF MTTF +MTTRE.g. expected availability of Web systems 1 (always up-and-running) = MTTF Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201127 / 78Runtime QAReliabilityIncreasing reliability involves testing However, impossible to prove that a system is correct, i.e. without bugs acceptableness of errors depends on thenature of a system Personal desktop use bugs are typically tolerated enterprisingness level medium reliability level High-reliable systems bugs feces be fatalDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201128 / 78Runtime QASecurityIncreasingly important aspect of systems is security Because systems are exposed to threats Especially networked systems As with other QAs security is a restore of related responses to user needsDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201129 / 78Runtime QAAuthenticationRequirement for identication of users with a system Users present credentials so that the system send away identify them Typically username and password Other forms certicates, smart cards, biometric featuresDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201130 / 78Runtime QA leaveAfter authentication authorization which functions and what data is available for users This cultivation is captured in an authorization clay sculpture gateway control lists (ACL) dene who layabout access and how a resource might be accessed E.g. read access, carry through access, delete access, Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201131 / 78Runtime QAAuthorizationDrawbacks of ACLs It is resource based, e.g. a page in a CMS Often, authorization needs to address functions or tasks Also, managing of ACLs is dicult, e.g. subresources of resources Also, performance problems wi th checkingDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201132 / 78Runtime QAAuthorizationAnother model business office-based access control (RBAC) Roles are apply to manage many-to-many relations between users and permissions Roles are used to represent the job functions, e.g. author, teacher, student in an E-learning system Permissions are modeled as qualitys of roles, e.g. create page, create tests, Users are than assigned to a role and acquire automatically permissions of that roleDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201133 / 78Non-runtime QAMeTRiCSMeTRiCS (maintainability, evolvability, testability, reusability, integrability, congurability, scalability) Maintainability how easy seat you x bugs and add new features Evolvability how easy your system copes with changes Testability how easy provide you test the system for correctnessDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201134 / 78Non-runtime QAMeTRiCSReusability how easy is to use software elements in other contexts, e.g. a software library Integrability how easy you can make the separately developed components of the system work decent together Congurability how easy can a system be congured for dierent installations and target groups Scalability how easy the system copes with a higher performance demandDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201135 / 78Non-runtime QAMaintainabilityThis QA considers the unscathed lifecycle of a system What happens during system operation? Property that allows a system to be modied by and by deployment wirh ease E.g. extensible, modied behavior, xing errorsDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201136 / 78Non-runtime QAMaintainabilityAt the design and implementation level Code comments Object-oriented principles and design rules Consistent programming styles DocumentationDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201137 / 78Non-runtime QAMaintainabilityMaintainability is v ery important because any software system will change over time Experience shows that such changes tend to degrade the system over time Software systems are subject to entropy The cumulative eect of changes degrades the quality of the systemDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201138 / 78Non-runtime QAMaintainabilityThe systems tend to dumbfound messy systems Regardless of how a nice plan you had at beginning Design for change ring OO design rules Abstract messy parts of the system so that they can be exchangedDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201139 / 78Non-runtime QAMaintainabilityDont be afraid to refactor and rewrite and redesign severally software vendor does this with major versions Create throw-away prototypes Think out-of-box and innovate Dont always go over a hype very often nothing new in hypes E.g. Web servicesDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201140 / 78Non-runtime QATestabilityMeans to improve testabi lity Test cases if something fails there is a bug insulation of the testing framework and the system, i.e. testing with scripts from outside LoggingDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201141 / 78Non-runtime QACongurabilityAbility of a system to vary its operational parameters without re-compiling or re-installing E.g. selecting appropriate database drivers, conguring network parameters, Typically, cognise by a set of conguration les E.g. Apache Web legion conguration le sets host name, practical(prenominal) hosts, Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201142 / 78Non-runtime QACongurabilityCongurability interacts with other QAs such as testability, maintainability, reliability High degree of congurability tends to have a negative impact on those QAs Testing of dierent system conguration becomes more dicult reliability compromised Congurable components will be strongly parametrized decreased maintainabilityDenis Helic (KMI, TU Graz)SA Anal ysis and DesignOct 19, 201143 / 78Non-runtime QAScalabilityAbility of a system to increase its capacity without re-compiling or re-installing E.g. helping additional Web pages means only copying these Web pages into a Web server le system Some propagation increasing capacity means increasing hardware, e.g. Web server clusters Managing user posing on the client side, means only providing additional code-on-demand from the serverDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201144 / 78Requirements Analysis subjectSystem descriptionWeb-based Network Analysis Tool W-NAT A simple and operable system for network analysis is needed. Networks are entities that contain not only individuals but also their connections with other individuals (see e.g. 3 for an example). The system accepts a network representations as a list of pairs of connected nodes stored in a dataset le. Nodes are represented as integers. An edge between two nodes is stored as a line containing two nodes deli mited by a tabulator. Users might upload datasets to the systems and store them for further analysis. Each user might upload multiple datasets and can execute various analysis on those datasets. The system keeps the track of the analysis narrative for each user. Users may weigh degree distributions, network diameter, clustering coecient, connectivity measures, singular values, and dierent centrality measures. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 45 / 78Requirements Analysis ExampleSystem descriptionWeb-based Network Analysis Tool W-NAT Users can execute various calculations on multiple datasets in parallel. The system must not be blocked if a calculation is currently under way. Rather it should be possible to start a new calculation, or view previous calculations, etc. In case of longer calculations the system needs to give out the user by e-mail when the calculation is over. The results of the calculations should be available in textual and in graphical form. All results can be also transfered to a local computer. The system will be used by a group of students that learn the basics of network analysis. It is expect that at any times the system will be used by multiple users executing multiple calculations. Since the system is generally an educational tool it needs to be pedagogically sound, i.e. simplicity and usability are very important.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201146 / 78Requirements Analysis ExampleSystem description6 How to search in a small worldPajekFigure 2 HP Labs email communication (light grey lines) mapped onto the organizational pecking order of HP Labs constructed out the e-mail communication. Figure Social network(black lines). Note that communication tends to cling to of formal organizational chart. From How to search a social network, Adamic, 2005.with one another. The h-distance, used to navigate the network, is computed as follows individuals have h-distance one to their music director and to everyone they share a manager with. Distances are then recursively assigned, so that each individual has h-distance 2 to their rst neighbors neighbors, and h-distance 3 to their second Denis Helic (KMI, TU neighbors neighbors, etc. SA Analysis and Design Graz)Oct 19, 201147 / 78Requirements Analysis ExampleSystem descriptionWeb-based Network Analysis Tool W-NAT The system is a Web-based system and the users should be able to operate the system by using a standard Web browser. The users need not install any additional plugins to operate the system. User perceived performance of the system should be acceptable. In addition, standard Web usability concepts need to be followed. In particular, browser back button must be working at all times and it should be possible to bookmark pages at all times. Finally, standard Web design principles should be satised, meaning that pages are valid (X)HTML pages in at to the lowest degree HTML Transitional. The system needs to support cross browser compatibility. Further, each page and each important application state needs to have a unique and human-readable URL.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201148 / 78Requirements Analysis ExampleFunctional requirementsUR1 The system is a network analysis tool. The system can calculate the following measures. UR1.1 UR1.2 UR1.3 UR1.4 UR1.5 Out-degree distribution In-degree distribution Cumulative out-degree distribution Cumulative in-degree distribution Hop plotDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201149 / 78Requirements Analysis ExampleFunctional requirementsUR1 The system is a network analysis tool. The system can calculate the following measures. UR1.6 Clustering coecient UR1.7 Distribution of weakly connected components UR1.8 Distribution of strongly connected components UR1.9 Left singular vector UR1.10 Right singular vectorDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201150 / 78Requirements Analysis ExampleFunctional requirementsUR1 The system is a network analysis tool. The system can calculate the following measures. UR1.12 UR1.12 UR1.13 UR1.14 UR1.15 Network singular values Degree centrality Closeness centrality Betweenness centrality Eigenvector centralityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201151 / 78Requirements Analysis ExampleFunctional requirementsUR2 Networks are stored in dataset les. UR3 The dataset le has the following format. NodeID1 t NodeID2n UR4 Users can upload multiple datasets to the system. UR5 To perform an analysis users select a dataset and then choose a measure to calculate.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201152 / 78Requirements Analysis ExampleFunctional requirementsUR6 For each user and for each dataset the system manages a history of calculations. UR7 Users may initiate multiple calculations simultaneously. UR8 When a calculation is started the system is not blocked. UR9 The system noties users nearly a nished calculation by e-mail.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201153 / 78Requirements Analysis ExampleFunctional requirementsUR6 For each user and for each dataset the system manages a history of calculations. UR7 Users may initiate multiple calculations simultaneously. UR8 When a calculation is started the system is not blocked. UR9 The system noties users about a nished calculation by e-mail. When is this notication needed? If the user is logged out?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201153 / 78Requirements Analysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as healthful as in a graphic form.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements Analysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as closely as in a graphic form. Which form? Format? Graphics format?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements An alysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11 Users can download the calculation results.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements Analysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as well as in agraphic form. Which form? Format? Graphics format? UR11 Users can download the calculation results. Single results? All results? Archived, how archived?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements Analysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11 Users can download the calculation results. Single results? All results? Archived, how archived? UR12 Users can register with the system.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements Analysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11 Users can download the calculation results. Single results? All results? Archived, howarchived? UR12 Users can register with the system. How register? E-mail? Captcha?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements Analysis ExampleFunctional requirementsUR10 The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11 Users can download the calculation results. Single results? All results? Archived, how archived? UR12 Users can register with the system. How register? E-mail? Captcha? UR13 Users can login and log out.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201154 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, operative and pedagogically sound.Denis Helic ( KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. UsabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. PerformanceDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users?Denis Helic (KMI, TU Gra z)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported. SecurityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported. Security UR4 User-perceived performance must be acc eptableDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported. Security UR4 User-perceived performance must be acceptable Performance and UsabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported. Security UR4 User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported. Security UR4 User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? UR5 Web-based system should be available at all times.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR1 The system is simple, usable and didactically sound. Usability UR2 The system needs to support multiple users simultaneously. Performance How many users? UR3 Authentication should be supported. Security UR4 User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? UR5 Web-based system should be available at all times. ReliabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201155 / 78Requirements Analysis ExampleNon-functional requirementsUR 6 Human-readable URLs.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. Evolvability, reusability, maintainability, testability, integrabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7 Extending the system with new metrics.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7 Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, congurabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. E volvability, reusability, maintainability, testability, integrability UR7 Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability,congurability UR8 Reliability of a Web-based system.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7 Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, congurability UR8 Reliability of a Web-based system. TestabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7 Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, congurability UR8 Reliability of a Web-based system. Testability UR9Multiple users.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleNon-functional requirementsUR6 Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7 Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, congurability UR8 Reliability of a Web-based system. Testability UR9 Multiple users. ScalabilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201156 / 78Requirements Analysis ExampleContextual requirementsUR1 Web browser. UR2 sensible (X)HTML, at least (X)HTML Transitional. UR3 No browser plugins are allowed.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201157 / 78architectural Analysis DesignAnalysisWe analyze the requirements and try to identify so-called key concepts Understanding of the creation Static part of the domain We also try to identify key process and activities Dyna mic part of the domainDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201158 / 78architectural Analysis DesignDesignDesign is the process of creating models (recollect the denition of SA) cardinal basic types of architectural models Structure and behavior Architectural structure is a quiet model of a system (i.e. how the system is divided into components) Architectural behavior is a dynamic model of a system (i.e. how the components interact with each other to perform some useful work)Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201159 / 78Architectural Analysis DesignArchitectural structureThe division of a system into components and connectors To represent the model box-and-lines diagrams (to see at a glance important concepts) It is important to remember that diagrams are only representations of the model Diagrams must always be accompanied by additional material such as text, data models, mathematical models, etc. The combination of diagrams and additional material is an architectural modelDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201160 / 78Architectural Analysis DesignArchitectural structureWhat is a component? What is a connector? Components might be subsystems, separate processes, source code packages, Connectors might be network protocols, method invocations, associations, The combination of diagrams and additional material is an architectural modelDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201161 / 78Architectural Analysis DesignArchitectural structureFigure Example of an architectural structureDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201162 / 78Architectural Analysis DesignArchitectural structureIn the diagram we have one user-interface and one database component But what is the criteria for deciding what is a component? Separate program modules? Separate threads or processes? Conceptual or functional division? And what about connectors? Network protocols? Callbacks? pass along/r esponse cycles? Method invocations?Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201163 / 78Architectural Analysis DesignArchitectural structureWhat is the level of granularity of a diagram? E.g. for a Web-based system, components are servers and browsers and connector is HTTP But, components of a server are HTTP parser, le I/O, cache, plug-ins, Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201164 / 78Architectural Analysis DesignArchitectural structureComparison with OO a component is an object and a connector is a put across sent between two objects Because models in OO are very well dened Therefore, we need additional information that accompanies diagrams To describe criteria for decomposition and provide explanations on granularityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201165 / 78Architectural Analysis DesignArchitectural behaviorComplementing structure is architectural behavior Interaction of system elements to perform some useful work F unctionality vs. behavior Functionality is what the system can do and behavior is the activity sequenceDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201166 / 78Architectural Analysis DesignArchitectural behaviorExample Accessing a tweets document Request is sent to the Web presentation layer That layer forwards the communicate to the application logic, e.g. TweetDeck TweetDeck contacts TweetViews to obtain a particular template, then retrieves the data from TweetDB wraps it into an HTML response and sends the response to TweetUI Functionality allows me to scupper a tweets document, behavior is the sequence of activities that makes it happenDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201167 / 78Architectural Analysis DesignArchitectural behaviorEach component has a set of responsibilities Behavior is the way how these responsibilities are exercised to respond to some number An showcase may be an action of the user or an event from an external system A part icular behavior is an event plus a response in the form of a sequence of component responsibilitiesDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201168 / 78Architectural Analysis DesignArchitectural behaviorTo represent behavioral models we use use-case map notation by Buhr A use-case map consists of a trace drawn through a structural diagram of the system The path of the trace through a structural diagram shows the sequence of activities Each crossing of a component by the trace indicates exercising of a responsibilityDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201169 / 78Architectural Analysis DesignArchitectural behaviorFigure Types of traces in use-case mapsDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201170 / 78Architectural Analysis DesignArchitectural behavior(a) Single trace all responsibilities exercised sequentially (b) Two traces are consecutive Equivalent to single trace but shows that continuation is triggered by another event (c) An d-Fork The traces after the line are potentially concurrent (run in parallel)Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201171 / 78Architectural Analysis DesignArchitectural behaviorFigure Types of traces in use-case mapsDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201172 / 78Architectural Analysis DesignArchitectural behavior(a) N-Way And-Fork the trace after the fork may be replicated an arbitrary number of times (b) Or-Fork The trace is split and activity proceeds along one or another path (c) Seq-Fork The traces after the line are followed in the order indicated by the cursorDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201173 / 78Architectural Analysis DesignArchitectural behaviorFigure Example of architectural behaviorDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201174 / 78Architectural ViewsArchitectural viewsWe can examine a system from dierent points of view Dierent kinds of views Conceptual components are set of responsibilit ies and connectors are ow of information achievement components are exploit units (processes) and connectors are messages between processes Implementation components are libraries, source code, les, etc and connectors are protocols, api calls, etc.Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201175 / 78Architectural ViewsArchitectural viewsThere are other models as well We will mention them but we will investigate only previous three models Data model describes the data Physical modeldescribes servers, rewalls, workstations, Denis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201176 / 78Architectural ViewsArchitectural viewsEach view provides dierent information about the structure of the system Each view addresses a specic set of concerns All views taken together is the primary means of documenting software architectureDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201177 / 78Architectural ViewsArchitectural viewsThe conceptual architecture considers the s tructure of the system in price of its domain-level functionality The execution architecture considers the system in terms of its runtime structure The implementation architecture considers the system in terms of its build-time structureDenis Helic (KMI, TU Graz)SA Analysis and DesignOct 19, 201178 / 78