Wednesday, September 2, 2020

Law case to Joan Essay Example | Topics and Well Written Essays - 1500 words

Law case to Joan - Essay Example Vicinity has advanced from the clear test that was applied in Donoghue v Stevenson6 and is by all accounts applied after the obligation of care has been resolved. In Spring v Guardian Assurance Plc7 the House of Lords appeared to underline the significance of the ‘fair, just and reasonable’ factor when settling on a choice on the inconvenience of obligation. For this situation the appointed authority held that that a business who gave a reference in regard of a representative to a forthcoming future boss owed an obligation of care to the worker in regard of the planning of the reference and was at risk in harms for financial misfortune endured because of the careless readiness of the reference. In Donoghue and Stevenson8 the complainant went to a cafã © with a companion who got her a tumbler with frozen yogurt. The retailer poured an amount of ginger brew from a jug over the dessert. The complainant drank from the tumbler and when her companion bested up the beverage fr om the container the remaining parts of a disintegrated snail drifted out of the jug. Because of this the complainant turned out to be sick. As there was no authoritative connection between the complainant and the retailer the House of Lords were approached to consider whether the maker if the ginger lager owed an obligation of care to a definitive client. This prompted the development of the neighbor test9 the general rule of which was that ‘you must not harm your neighbour’.

Saturday, August 22, 2020

10 Ways to Maximize Research at the Courthouse or Archives

10 Ways to Maximize Research at the Courthouse or Archives The way toward exploring your family tree will in the end lead you to a town hall, library, chronicles or other storehouse of unique reports and distributed sources. The everyday delights and hardships of your ancestors’ lives can frequently be discovered reported among the various unique records of the nearby court, while the library may contain an abundance of data on their locale, neighbors and companions. Marriage endorsements, family ancestries, land awards, military lists and an abundance of other genealogical pieces of information are concealed in organizers, boxes, and books simply holding on to be found. Under the steady gaze of heading for the town hall or library, be that as it may, it assists with planning. Attempt these 10 hints for arranging your visit and augmenting your outcomes. 1. Scout the Location The first, and generally significant, advance in on location parentage investigate is realizing which government doubtlessly had purview over the region in which your predecessors lived during the time they lived there. In numerous spots, particularly in the United States, this is the district or province proportional (for example area, shire). In different territories, the records might be found housed around lobbies, probate areas or other jurisdictional specialists. Youll likewise need to bone up on changing political and land limits to realize who really had locale over the territory where your predecessor lived for the timespan youre inquiring about, and who has current ownership of those records. In the event that your progenitors lived close to the province line, you may discover them archived among the records of the bordering area. While somewhat remarkable, I really have a precursor whose land rode the district lines of three regions, making it fundamental for me to routine ly check the records of every one of the three provinces (and their parent areas!) while looking into that specific family. 2. Who Has the Records? Huge numbers of the records youll need, from indispensable records to land exchanges, are probably going to be found at the neighborhood town hall. At times, be that as it may, the more seasoned records may have been moved to a state documents, nearby verifiable society, or other store. Check with individuals from the nearby genealogical society, at the neighborhood library, or online through assets, for example, the Family History Research Wiki or GenWeb to realize where the records for your area and timespan of intrigue may be found. Indeed, even inside the town hall, various workplaces normally hold various kinds of records, and may keep up various hours and even be situated in various structures. A few records may likewise be accessible in numerous areas, too, in microfilm or printed structure. For U.S. inquire about, The Handybook for Genealogists or Red Book: American State, County and Town Sources, both incorporate state-by-state and province by-region arrangements of which workplaces hold which records. You may likewise need to investigate WPA Historical Records Survey inventories, if accessible for your territory, to recognize other potential records. 3. Are the Records Available? You dont need to design an excursion most of the way the nation over just to find that the records you look for were decimated in a town hall fire in 1865. Or on the other hand that the workplace stores the marriage records in an offsite area, and they should be mentioned ahead of time of your visit. Or on the other hand that a portion of the area record books are being fixed, microfilmed, or are in any case incidentally inaccessible. Once youve decided the vault and records you intend to examine, it is certainly worth an opportunity to call to ensure the records are accessible for inquire about. On the off chance that the first record you look for is not, at this point surviving, check the Family History Library Catalog to check whether the record is accessible on microfilm. At the point when I was told by a North Carolina region deed office that Deed Book A had been absent for quite a while, I was as yet ready to get to a microfilmed duplicate of the book through my nearby Family H istory Center. 4. Make a Research Plan As you enter the entryways of a town hall or library, its enticing to need to hop into everything simultaneously. There for the most part arent enough hours in the day, be that as it may, to look into all records for the entirety of your progenitors in a single short excursion. Plan your examination before you go, and youll be less enticed by interruptions and less inclined to miss significant subtleties. Make an agenda with names, dates and subtleties for each record you intend to explore ahead of time of your visit, and afterward confirm them as you go. By concentrating your inquiry on only a couple of precursors or a couple of record types, youll be bound to accomplish your examination objectives. 5. Time Your Trip Before you visit, you ought to consistently contact the town hall, library or documents to check whether there are any entrance limitations or terminations which may influence your visit. Regardless of whether their site incorporates working hours and occasion terminations, it is still best to affirm this face to face. Inquire as to whether there are any cutoff points on the quantity of scientists, in the event that you need to join ahead of time for microfilm perusers, or if any town hall workplaces or uncommon library assortments keep up isolated hours. It likewise assists with inquiring as to whether there are sure occasions which are less occupied than others. Next 5 More Tips for Your Courthouse Visit Research Tips 1-5 6. Gain proficiency with the Lay of the Land Each genealogical store you visit will be somewhat extraordinary - regardless of whether its an alternate format or arrangement, various strategies and techniques, diverse hardware, or an alternate hierarchical framework. Check the facilitys site, or with different genealogists who use the office, and acclimate yourself with the examination procedure and techniques before you go. Check the card inventory on the web, on the off chance that it is accessible, and assemble a rundown of the records you need to inquire about, alongside their call numbers. Inquire as to whether there is a reference bookkeeper who has some expertise in your particular territory of premium, and realize what hours he/she will be working. On the off chance that records youll be inquiring about utilize a particular kind of file framework, for example, the Russell Index, at that point it assists with acquainting yourself with it before you go. 7. Get ready for Your Visit Town hall workplaces are regularly little and squeezed, so it is ideal to downplay your assets. Gather a solitary pack with a scratch pad, pencils, coins for the scanner and stopping, your exploration plan and agenda, a short outline of what you definitely think about the family, and a camera (whenever permitted). On the off chance that you intend to take a PC, sure that you have a charged battery, on the grounds that numerous vaults don't give electrical access (some don't permit workstations). Wear agreeable, level shoes, the same number of town halls don’t offer tables and seats, and you may invest a ton of energy in your feet. 8. Be Courteous Respectful Staff individuals at chronicles, town halls and libraries are commonly extremely accommodating, cordial individuals, yet they are likewise exceptionally bustling attempting to carry out their responsibility. Regard their time and abstain from bothering them with questions not explicitly identified with examine in the office or hold them prisoner with stories about your precursors. On the off chance that you have an ancestry how-to address or inconvenience perusing a specific word that simply cannot pause, it is normally better to ask another scientist (just dont bug them with numerous inquiries either). Chroniclers additionally extraordinarily acknowledge scientists who forgo mentioning records or duplicates not long before shutting time! 9. Take Good Notes Make Plenty of Copies While you may set aside the effort to arrive at a couple nearby decisions about the records you discover, it is normally best to take everything home with you where you have more opportunity to look at it altogether for each and every detail. Make copies of everything, if conceivable. In the event that duplicates arent an alternative, at that point set aside the effort to make a translation or dynamic, including incorrect spellings. On each copy, make note of the total hotspot for the archive. In the event that you have time, and cash for duplicates, it can likewise be useful to make duplicates of the total list for your surname(s) of enthusiasm for specific records, for example, relationships or deeds. One of them may later show up in your examination 10. Focus on the Unique Except if the office is one you can undoubtedly access all the time, it is regularly advantageous to start your exploration with the pieces of its assortment that arent effectively accessible somewhere else. Focus on unique records that havent been microfilmed, family papers, photo assortments, and other novel assets. At the Family History Library in Salt Lake City, for instance, numerous scientists start with the books as they are commonly not accessible on credit, while the microfilms can be obtained through your neighborhood Family History Center, or now and again saw on the web. Sources Eichholz, Alice (Editor). Red Book: American State, County Town Sources. third Revised release, Ancestry Publishing, June 1, 2004. Hansen, Holly (Editor). The Handybook for Genealogists: United States of America. eleventh Edition, Revised release, Everton Pub, February 28, 2006.

Friday, August 21, 2020

Storm Drainage Design Project, Flood Hydrographs Essay

Tempest Drainage Design Project, Flood Hydrographs - Essay Example Likewise hydrograph additionally conveys data of base stream, which is the underlying stream state of the waterway existing in stream preceding any tempest. The base slack alludes to the time rest of the waterway as for a precipitation which connotes the seepage capability of the catchments. The time interim between the pinnacle precipitation the hour of event of pinnacle release is accounted for as the bowl slack. The waterways with short bowl slack are increasingly inclined to floods as the react rapidly to precipitation and henceforth the release in the stream increments enormously sooner the catchment gets a precipitation. The two significant part of the overflow from the catchment that adds to the volume of water in the waterway are the surface stream, which incorporates all the courses through the outside of the waterway and sub surface stream segment which consolidates all the ground water stream releases into the stream after the beginning of a tempest. The moderate ascent is the degree of waterway stream profundity implied most of volume arriving at the stream as ground water stream. The appropriately built hydrograph would have the option to extensive measure of data of the conduct of seepage bowl as for a precipitation. ... The flood hydrograph for stream Cynon is set up by plotting he release through the waterway along the Y-hub and the time along x-pivot. So as to plot the precipitation dissemination, the profundity of precipitation is plotted along an optional y hub with time along the x - pivot. The hydrograph thus plotted is appeared in figure 1 and gives the point by point data on the seepage attributes of the bowl. The reports accessible have said that the subsurface states of the waterway Cynon bowl is low penetrability soil that could bring about low penetration rates. Consequently these conditions would bring about high surface spillover rates to the stream and thus the profundity of stream quickly rises. In this manner the hydrograph got have steep rising appendage followed by early pinnacle release levels. Further, the subsiding appendage is less steep than the rising appendage legitimizes the conversations introduced before. Likewise, the slack time is evaluated from the hydrological percep tions as 20 hours. The flood volume of the stream is registered from the all out volume of the water in waterway during the time of overflow, by increasing the profundity of stream in the waterway with the mean stream width given as 15 m and the normal waterway speed given as 4 m/s. The release calculation from the hydrograph is as given underneath Points of interest of calculation Condition Computation Release registered for the rising appendage Speed Depth of stream in waterway (for the rising appendage) width of stream 4 m/s 0.48 m 15 m = 29.1 m3/sec Pinnacle release Speed Depth of stream in waterway (for top release) width of stream 4 m/s 0.658 m 15 m = 39.48 m3/sec Release registered for subsiding appendage Speed Depth of stream in waterway (for the rising appendage) width of stream 4 m/s 0.34 m 15 m = 20.4 m3/sec Absolute territory of the catchment for the stream Cynon From records

Friday, June 5, 2020

Planning College Visits (Part 3 - On Campus Checklist)

Fingers crossed for good weather. [Image source: Columbia University, where Andrew spends most of his time] This post is part of a 3 part series. Check outPart 1 on Getting Started, andPart 2 on Traveling Efficently. Once you’re finally on campus for the visit and information session, you may feel like the battle has already been won. I see kids like that at Columbia every day – herds of sullen, blank-faced high school students shuffling from one academic hall to another. Admittedly, it can be an overwhelming experience to start visiting these grand, bustling institutions. But you need to remember that this is both your first glimpse at the school and its first look at you. Try incorporating a few of the suggestions listed below to your next campus visit and see if it makes you feel – or at least seem – like the engaged, passionate, admissions candidate you want to be. Ask thoughtful questions The silent and miserable students are the ones who are clearly there because their parents have forced them to be there. Before arriving, think about what you want to know about the school that you couldn’t learn from the website or brochure. Make a list. Almost anyone you meet on campus will be equipped to answer these questions for you. These questions will help you present yourself as serious and thoughtful. Ask about bad things too These kinds of questions should be geared more toward students than admissions officials, so if you find yourself in a candid moment with your student tour guide or overnight host, try to find out what’s bugged them about the college or perhaps something they wish were different about the campus, or even something they wish they had known before applying. The pitches you’ll hear during information sessions are sometimes so saccharine and positive that they start to blend together. But asking a (slightly!) negative question or two can often be revealing. And if you don’t feel comfortable asking about what students like least or wish they could change, you can try some trickier ways of getting at thorny topics. For instance, one way to get at issues of work/life balance is to ask if the campus library is open twenty-four hours per day – lots of schools try to tamp down on academic exhaustion by closing study spaces at a certain time of night. Sit in on a class Many colleges offer this option to students on campus or overnight visits, and it’s a great idea to take them up on it. Ostensibly, the classroom is what you’ll be paying for here. Choose a topic that interests you, but don’t be afraid of attending a lecture on something you know nothing about. Once you’re there, take a look around you. Can you imagine these people as your peers? Take a look at how engaged they are. Are they taking notes? Are they on Facebook? Are they actively participating in discussion? Is the professor engaging? Essentially – could you see yourself learning here? Go to a club meeting or sports practice Here you’ll have to do a little research, and a friend in place at the college or a helpful admissions officer will be your best bet. But also, try the internet – google the college of your choice and an activity you’re interested in. Most clubs and activities have their own sites now and it shouldn’t be too difficult to find the Dartmouth Young Democrats Club or George Washington intramural soccer. Few prospective students take advantage of extracurricular opportunities when they do their visits, but really it can be the best way to get a feel for the school’s culture. Of course, if there’s something you’ve been passionate about in high school, try that. But also don’t be afraid to use this as an opportunity to get a sense of the breadth of offerings on campus. As always, these are just some guidelines to get you thinking in the right mode before heading out on your college campus tours. For more college visits-related tips from me, check out Part 1 on Getting Started, andPart 2 on Traveling Efficently.We’re always here to help, so if you’re still feeling a bit confused about how to make the most of your time visiting college campuses, don’t hesitate to be in touch with one of our consultants! ;

Wednesday, May 6, 2020

Prohibition Of The United States - 777 Words

Tigran Badalyants Nancy Papin History 102-1004 05 October 2014 Article Response Prohibition in the United States occurred as a result of the Eighteenth Amendment, which was passed on January 17th, 1920. Prohibitions lasted approximately 13 years and ended with the ratifications of the Twenty-First Amendment which repealed the Eighteenth Amendment on December 5th, 1933. Prohibitions did not yield any benefits for the average American, in fact I believe it hindered both men and women in economic, political and social ways. The main proponents of Prohibition were women and religious leaders. Women were the main cause behind the temperance movement. They sought to ban alcohol to bring back family structure and reduce domestic abuse. Many link women’s suffrage with the temperance movement. However, if women had not supported the Prohibitions I believe they would have received their right to vote earlier and with a much easier process than what had actually occurred. Liquor companies had a lot to lose if the Prohibitions came into effect. In th e eyes of the manufacturers and distributers of alcohol women’s suffrage was linked directly to the temperance movement. These companies had the most to lose if women obtained their right to vote. It was widely acknowledged that if women received their right to vote alcohol would be banned within a short period of time. Therefore, organized liquor and brewing interests plus retail saloon operators were fully opposed to the women’sShow MoreRelatedProhibition in the United States909 Words   |  4 Pagesday at work, you like to relax with a glass of wine, or maybe even bourbon. Without the ratification of the 21st Amendment, the people of the United States wouldn’t be able to enjoy any alcoholic beverages. The 18th Amendment to the U.S. Constitution was passed in 1919, outlawing the sale of alcoholic beverages and brining in the period known as Prohibition. At the time, the top Prohibitionist in Congress stated: â€Å"There is as much chance as repealing the Eighteenth Amendment as there is for a hummingbirdRead MoreProhibition Of The United States1912 Words   |  8 PagesKlintworth Prohibition in the United States â€Å"Prohibition goes beyond the bounds of reason in that it attempts to control a man s appetite by legislation and makes crimes out of things that are not crimes.† Even though Abraham Lincoln lived about a half-century before Prohibition took effect in the 1920s, he described it quite well. The legislation essentially took alcohol, which had been a part of people’s lives since history of cultures were reported and made it illegal overnight. While Prohibition didRead MoreProhibition in the United States764 Words   |  3 PagesProhibition in the United States was a built up reaction to alcohol and illicit drugs from the Temperance and other religious organizations beginning in the 1840s and intensifying during the Reconstruction Period. By using increasing pressure on legislators, lobbying through Churches and, of course, embarrassing public officials into a stance, these organizations forced the ratification of the 18th Amendment to the U.S. Constitution in January 1919. This law prohibited the manufacture, sale, orRead MoreEssay on Prohibition in the United States1500 Words   |  6 PagesProhibition created more crime because it was leading to corruption and the â€Å"cure† was worse than the original problem (Sifakis 725). The number of crimes increased during the Prohibition which caused organized crime to be very â€Å"popular†. Many criminal groups had a regular income of money through illegal actions such as drinking and selling alcohol (Organized Crime and Prohibition 1). Alcohol increased the organized crimes during Prohibition through loopholes in the 18th Amendment, speakeasiesRead MoreProhibition And Its Effects On The United States1661 Words   |  7 PagesWhen personal choice is withdrawn from individuals and prohibition is implemented to control natural human behavior, the hypocrisy that many preach the United States as being a free society and a nation of tolerance seems to deteriorate when politicians see a ny opportunity to capitalize on the masses without regard. Yet even after alcohol prohibition and fighting an endless war on drugs, history still repeats itself over and over again while the taxpayer is left with the bill. Responsible and recreationalRead MoreEffects Of Prohibition On The United States1272 Words   |  6 PagesThe United States has been actively engaged in a ‘war’ for nearly 25 years. At the heart of this struggle is the fundamental question: Is this a battle the United States can win? Many sources, such as whitehouse.gov, make the claim that drug laws are working Instead, it has created a military police force, reinforced a violent black market, discouraged safe drug usage, and done little to actually reduce drug use. In order to reduce these problems as much as possible, the United States hasRead MoreThe Prohibition Of Marijuana And The United States1559 Words   |  7 Pagesacross the U.S. during the 1900’s and has remained illegal e ver since, until recent years when states began legalizing it (huffpost.com). Although many people believe that the reason behind the prohibition of cannabis was based on genuine concern for the possible consequences it may have on the well-being of people if it remained accessible to all, the truth is that the drive behind the U.S.’s prohibition of cannabis was founded on racism. During the early 1900’s cannabis was considered an â€Å"ethnicRead MoreThe Drug Prohibition Of The United States Of America1629 Words   |  7 PagesThe cohorts of drug prohibition argue that the benefits of the prohibition are self-evident and undeniable. The basis of this assumption argument is that without prohibition the consumption of drug would skyrocket, and therefore, lead to disastrous outcomes. However, there is no evidence on the commonly held belief. The empirical evidence that exists does not support the notion of souring drug consumption. For instance, in the Netherland and S witzerland, where marijuana is legalized, the consumptionRead MoreWhy The Prohibition Is The Era Of The United States852 Words   |  4 PagesOn January 17, 1920, the 18th Amendment to the constitution of the United States of America took effect. The 18th Amendment had been ratified a year earlier, banning â€Å"the manufacture, sale, or transportation of intoxicating liquors†(Okrent, 1) within the United States and its territories. This new decade is called the Prohibition. The prohibition is the era of bizarre and engaging images of speakeasies, intoxicated flappers dancing the Charleston, bootleggers, and mobsters protecting illegal tradesRead MoreEssay about Prohibition in the United States1865 Words   |  8 PagesProhibition in the United States There was once a time when an individual could not sit down and have a beer or mixed alcoholic drink legally after a long days work. At this time our American Government felt we needed to reduce drinking by eliminating the businesses that manufactured, distributed, imported, exported and sold intoxicating liquor. This was called Prohibition. By the 1820s people in the United States were drinking an average of 27 liters (7 gallons) of

Tuesday, May 5, 2020

ICT Services and Project Management Components

Question: Describe about the ICT Services and Project Management Components. Answer: Introduction The report covers an analysis and study on various components of ICT services and project management components and brings forward the exploration that is done on 10 different areas. Every area or the task that is completed comprises of two different resources along with a summary and reference attached with each of the resource. The summary explains the points that describe the reason behind the selection of a particular resource, details of the resource and the viewpoints that are covered in the resource. The topics that are covered in the report vary from one another such as there are topics present that include details on embedded operating systems, ransomware attacks, database vendors and seven more. Week 1 Resource 1 The Implications for Publishing of Electronic Document Storage and Delivery Line, M. (2013). The Implications for Publishing of Electronic Document Storage and Delivery. [online] purdue.edu. Available at: https://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1220context=iatul [Accessed 27 Sep. 2016]. Summary: This page has information on different mass storage technologies used earlier by companies worldwide. They have also discussed various aspects of all of these storage technologies in this paper. Mass storage technologies covered in this paper include Optical Drives, Hark Disk, Digital Paper, CD-ROM etc. Apart from old mass storage technologies they have also explored a few modern mass storage technologies like online storage over cloud, reference storage, backup storage etc. With the development in cloud technologies online storage has evolved to become most commonly most used storage media in recent times. The paper can be used to under the evolution of technology in storage media over the time. Certain trends, that were introduced in 90s but have evolved to become popular since, are also discussed in this paper. Some of these are Virtual Disks, RAID, multi-function drives, Direct Access Storage devices, removable media, bubble memory, virtual disks, High-Capacity Drives, Magnetic T ape Cartridge and digital Audio Tape etc. (Arnold, 1991). Resource 2 B ri n g i n g C l a ri t y t o H a r d Disk Drive Choices for Enterprise Storage Systems Rydning, J. (2016). Bringing Clarity to Hard Disk Drive Choices for Enterprise Storage Systems. 1st ed. [ebook] USA. Available at: https://h18000.www1.hp.com/products/servers/proliantstorage/drives-enclosures/docs/216652_IDC_Paper_2009FEB20.pdf [Accessed 27 Sep. 2016]. Summary: This is a white paper published by Hewllet Packard. This paper has explored requirements and concepts of HDD (Hard disk drives). HDD was introduced to the market in early 50s. Hard disk drives have since gone through great evolutions. New age hard disk drives are very sleek and light which was not the case with early models. Its early models didnt use to have high storage capacity and were of huge size. For example the first hard disk drive had a storage capacity of 3.75 MB and as for its size; it had fifty 24 inch platters. In sharp contrast, modern day hard disk drives are of size of a few inches and many tera-bytes of data can be stored in them. Technology behind hard disk drives is the base used in the storage requirements for the modern interfaces used by organisations and individuals alike. This resource was selected for its in-depth explanation of the concepts and technology behind hard disk drives. Week 2 Resource 1 TinyOS An Operating System for Tiny Embedded Networked Sensors Raman, S. (2002). TinyOS An Operating System for Tiny Embedded Networked Sensors. 1st ed. [ebook] USA. Available at: https://crystal.uta.edu/~kumar/cse6306/papers/TinyOS_paper.pdf [Accessed 27 Sep. 2016]. Summary: This is a published paper that traces the emergence of networked sensors used in used in TinyOS. It also explores their characteristics in this regards. TinyOS is basically an open source development environment that operates with the help of embedded networked sensors. TinyOS operates on the model that is - Active message communication. Advantage of this is that it gives high networking capabilities with the help of Multihop ad hoc routing. There are a few issues like limitations in connection capabilities, high processing time, limitations in size etc. with networked sensors. Their working is based on primitive interfaces which lacks the advanced capabilities that normal OS possesses. These sensors are designed for specific applications and not for general uses. As earlier embedded operations systems were not able to the meet the requirements of such sensors, TinyOS was designed and developed. This paper explains different components of TinyOS. It also describes in details how they operate together. It also explains communication challenges like low power listening, crossing layers etc. (Raman, 2002) A Look Back On Symbian On The Eve Of ItsDemise Lomas, N. (2016).A Look Back On Symbian On The Eve Of ItsDemise. [online] TechCrunch. Available at: https://techcrunch.com/2013/06/13/rip-symbian [Accessed 27 Sep. 2016]. Summary: This online resource is an article Which explains in details Symbian Operating System. It tracks its development over the years and also chronicles its downfall and the issues contributing to the same. I selected Symbian for this study as it was the primary and at time the only portable OS. It had an effective life and fair share of contribution in the business sector. That is till Android came around and assumed control. Symbian operating system is an embedded and portable OS. It has its foundations the PDA world. This OS was mostly used by the Nokia brand for all its hand held devises. This was a framework working on shut source versatile. It was mostly intended to be used for the cell phones. There was a rebooted rendition of this OS which was again developed keeping in mind its same end goal i.e. for mobile phones but with the changing landscape of mobile phones with the touch screens slowly making the physical keyboards obsolete. Most of the software to be used on phones were al so being developed to suite the touch screen mobiles. I choose this online paper as it clearly explains and tracks the improvement in Symbian OS and its life cycle. Week 3 Resource 1 Wireless Sensor Networks: Yinbiao, S,Internet of Things: Wireless Sensor Networks. in , IEC, 2014, https://www.iec.ch/whitepaper/pdf/iecWP-internetofthings-LR-en.pdf [accessed 24 September 2016]. Summary: IOT connects technologies and information with physical infrastructures with the help of sensors. Selected research work is a published paper that explores the WAS (wireless sensor network) technology. It is a network of a vast number of sensors which can detect and recognise physical events like heat, light, pressure etc. This paper deliberates their evolution. It also reviews and explores some WSN applications such as smart homes smart grids, smart water networks, Smart girds, intelligent transportation etc. It optimizes and integrates renewable energy sources to electric vehicles and generators into the network which then delivers optimized power with more efficiency and reliability. Modern smart water systems are equipped with monitoring systems for waters base line quality and also helps trace the sources of contaminants. WSN can also be used for smart transportation on the vehicles. This can be used as a part of traffic infrastructure. Floating sensor network can also be utiliz ed for sensing applications to the mobile vehicles. Apart from these very effective smart homes can also be built with the help of the strategies to maximize the buildings performance by optimizing services, energy consumption and by saving energy for better tomorrow and for reduced energy costs. (Yinbiao, 2014). Resource 2 5 Great Internet of Things Startup Ideas Mehta, Y. (2016). 5 Great Internet of Things Startup Ideas - DZone IoT. [online] dzone.com. Available at: https://dzone.com/articles/internet-of-things-iot-startup-ideas [Accessed 2 Sep. 2016]. Summary: The online resource page is an article which highlights the key IoT trends and ideas. Framework for smart parking is an application which to a great extent utilizes the advantage of IoT. This is one of the several real issue confronted by a lot of individuals all over the globe with the help of IoT. The application works by incorporating the parking area. And, as for its working system lists down the particular spots of vacant parking openings at any a particular facility. It allows the client to enter the area is there is a parking space available and they it provides them with all available and accessible parking spots in the close by and accurate area. The already implemented arrangement will allow for the application to be used as a part parking exercise in Melbourne as well in different parts and states in the world. This is because it will exclusively be chipped away at a GPS based area where client enters for parking. Week 4 NETWORK PROTOCOLS HANDBOOK : Network protocols handbook. in , Saratoga, Calif., Javvin Technologies, Inc., 2007. Summary: As this task requires an exploration of various text based application layer protocols, this book is being selected as it explain one such protocol which is very popularly used by most email connections and it is called Real Time Streaming Protocol (RTSP). It was designed for managing streaming data used or entertainment and communications. The protocol establishes as well as controls the sessions that occur between two end points such as management of play and pause functions. The protocol has its own methods just like HTTP and these include OPTIONS, SETUP, PLAY, DESCRIBE, TEARDOWN and PAUSE. RSTP is also usd for Android devices and its implementation that runs on the mobile OS is called libstreaming. This book describes the protocol in one chapter that includes the discussions on structure, description and explains how the protocol majorly differs from called HTTP such as in terms of methods, states, requests, compatibility and so on. Test Suite for Session Initiation Protocol (TSIP): Wipro Technologies,Test Suite for Session Initiation Protocol (TSIP). in , Wipro, 2005, https://www.wipro.com/documents/resource-center/library/TSIP.pdf [accessed 28 September 2016]. Summary: As this task requires an exploration of various application layer protocols, this resource is chosen as it describes one popular application layer protocol called Test Suit for Session Initiation Protocol (TSIP) which consists of the text cases that are scripted using XML call flows. The paper discusses how the test suit protocol works and highlights its features, benefits, standards and components that it is used for testing. The paper suggests that major use of TSIP is testing of technologies on their abilities to fulfil needs of network equipments and service providers. The paper revealed that TSIP provides a graphical user interface for editing, selecting and executing test cases. The results achieved can be pass, fail or non-conclusive. If the results are not conclusive then messages and timestamps from logs are used for validation and decision making. The cases are not always mandatory but can be optional or just recommended to be tested. Week 5 Task An increasing computer security threat is the rise of ransomware attacks. Collect and summarise two online resources that discuss specific examples of ransomware attacks. The resources must not be about the same incident/attack. Resource 1 Understanding Locker Ransomware Attacks Wyke, J. and Ajjan, A. (2016). The Current State of Ransomware. [online] Available at: https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/sophos-current-state-of-ransomware.pdf [Accessed 28 Sep. 2016]. Summary: Ransomware assaults have ended up well known in the digital world in the late years and the asset is a white paper that displays the points of interest that are connected with this type of the security assault. The creator trusts that the real classification of the ransomware assaults is the locker assaults in which the machine or the utilization of the casualty is bolted and it gets to be outlandish for the casualty to get to the same. The client capacities are broken up in such cases and just the message requesting the instalment is shown alongside the ability to finish the instalment procedure. The asset was chosen as it aided in picking up the information that is connected with this kind of the ransomware assaults. Resource 2 Understanding Crypto Ransomware Attacks Kotov, V. and Rajpal, M. (2016). Understanding Crypto-Ransomware. [online] Available at: https://www.bromium.com/sites/default/files/rpt-bromium-crypto-ransomware-us-en.pdf [Accessed 28 Sep. 2016]. Summary: The second sort of the ransomware assaults are the Cryto ransomware assaults and the asset chosen for comprehension of the assault is report that is composed on this assault. The creator trusts that the strategy by which this assault works is through the encryption of the information on the machine or the application on which it is dispatched. The encryption procedure continues gradually in the first place so that the client may not become more acquainted about the action and rapidly spreads to the whole information sets. Therefore, the client gets unable to utilize or unscramble the information without paying for the same. The choice of this asset was done since it gave the required data about this type of the ransomware assault. Week 6 Task SLAs and network design with redundancy are two ways to reduce the risk of a loss of network connectivity. However, reports of major network outages and their impacts on organisations regularly make news headlines. Collect and summarise two online resources that provide examples of these outages and their impacts on the business and/or its customers. The resources must not be about the same outage/business. Resource 1 Integrity Attacks Alteration of the Message and Media OFlynn, C. (2016). Message Denial and Alteration on IEEE 802.15.4 Low-Power Radio Networks. [online] Available at: https://www.newae.com/6lowpan/MessageDenial802154.pdf [Accessed 28 Sep. 2016]. Summary: System blackouts are a genuine worry in the present period and the asset is a white paper that is composed on this point covering the real types of system blackouts and the measures to counteract and control them. The creator trusts that the message and media adjustments are the assaults that influence the honesty of the framework and thus result in the system blackouts. The aggressors alter the first message or media that is under the way toward being exchanged from one area to the next. There are situations when this data is re-coordinated to the location not quite the same as the first goal address which disturbs the whole procedure. The purpose behind selecting this asset was to comprehend these assaults and the countermeasures that can be received for the same. Resource 2 Disruption of Availability Quality of Service Attacks Fowler, S., Zeadally, S. and Chilamkurti, N. (2016). Impact of Denial of Service Solutions onNetwork Quality of Service. [online] Available at: https://liu.diva-portal.org/smash/get/diva2:416487/FULLTEXT02.pdf [Accessed 28 Sep. 2016]. Summary: The second assault in connection with the system blackout is the Quality of Service (QoS) assault and the asset that is chosen for the clarification and comprehension of the same is a white paper that expounds the assault and its parts. The creator trusts that these assaults influence the accessibility of the specific service or application furthermore disregard the significant desire of the client from the same. The attacker downsizes the quality of the system to a degree that the client abandons utilizing the same and is left without the entrance to the system. The essential purpose for the choice of the asset was the point by point clarification of the assault that was secured in it alongside the effect that the assault has on the casualty that gets influenced by it. Week 7 Task Organisations are increasingly using social networking to engage with their customer base. Collect and summarise two online resources that provide examples of organisations using social networking successfully to expand or improve their business. The resources must not be about the same organisation. Resource 1 Ford Brown, E. (2010). How implementing social media strategies (the right way) attracts customer loyalty. [online] Available at: https://www.american.edu/soc/communication/upload/Ellie-Brown.pdf [Accessed 28 Sep. 2016]. Summary: The selected asset is an article that illuminates the once-over of the pervasive firms that have made their position more grounded through the aide of social groups on web. Ford Motor Company is an instance of one such affiliation that is to an incredible degree standard on web organizing and has utilized the phase to an extraordinary degree well through its person to person communication advancing system. The creator incorporates the means that Ford has utilized as a part of connection with the known and floating web organizing stages for the headway of their things and put forth the best of their photographs and segments to attract more customers. I picked this one as it gives a brief illumination of the strategy that has been utilized by the relationship to propel their name and things on the internet organizing stage. Resource 2 Netflix Zoey, (2015). Netflix Gets Social. [online] Social Media Marketing. Available at: https://www.postcontrolmarketing.com/453/2015/06/03/netflix-gets-social/ [Accessed 28 Sep. 2016]. Summary: The resource is an article that introduces an once-over of affiliations that have adroitly utilized the internet organizing stage for propelling their things and augmentation their customer base. Netflix is an affiliation that scores to an awesome degree well in such way. The creator trusts that Netflix has developed a strong hold tight the web organizing by accepting an imaginative and intriguing method. Netflix continues trying to keep the customer engagement dynamic by exhibiting distinctive systems and techniques on their records. I picked this advantage as it packs the information associated with ten one of a kind affiliations and their procedure for web organizing advancing in a to a great degree brief way which is definitely not hard to scrutinize besides simple to understand as well. Week 8 Task There are a multitude of paid and open source DBMS solutions available on the market. Collect and summarise two online resources that discuss examples of the more commercially popular DBMS vendors and that describe who use their products. The resources must not be about the same vendor. Resource 1 Database Vendor - Oracle Oracle, (2015). Oracle Database 12c. [online] Available at: https://www.oracle.com/technetwork/database/oracle-database-editions-wp-12c-1896124.pdf [Accessed 28 Sep. 2016]. Summary: Oracle is the most well known database merchant that offers various database administrations and answers for the client and the asset that is chosen to clarify the same is a white paper that rundowns the majority of the items that have been created by Oracle. 12c discharge is the most recent adaptation of the product that is created and is made economically accessible by the merchant and it accompanies numerous propelled highlights as far as the capacity handle the Big information and the operations that are connected with Big information, for example, examination, warehousing and business insight. The asset was chosen as it secured every one of the items that have been discharged by the merchant alongside a brief portrayal of every item too. Resource 2 Database vendor - Microsoft Cdlib, (2016). Technical Requirements for Licensed Resources. [online] Available at: https://www.cdlib.org/gateways/vendors/docs/cdl_technical_requirements_document_2015.pdf [Accessed 28 Sep. 2016]. Summary: Microsoft has dependably been a pro runner in the field of IT and has secured the field of database items too and the asset is a white paper that presents the database items that have been created and offered by Microsoft. The creator trusts that the SQL Server is the most famous database item that is given by the merchant till date out of the considerable number of items that it has created. In the mid 2016 Microsoft discharged the most recent form of SQL Server that incorporates the most recent elements regarding fundamental database operations and the propelled highlights. The purpose for the determination of this asset was the nitty gritty posting of items that was done in this paper alongside the arrangement of components and their utility that has been secured. Week 9 Task Outsourcing all or part of an organisations IT function has had mixed outcomes but for some organisations it has been a wise decision. Collect and summarise two online resources that relate to two specific outsourcing success stories (i.e. two organisations where outsourcing has worked out well). The resources and your summary should explain why the outsourcing was a success. The resources must not be about the same organisation. Resource 1 Unilever Mit, (2016). Strategic Outsourcing Alliances in the Supply Chain. [online] Available at: https://web.mit.edu/supplychain/repository/MIT_Unilever_Affiliates_Day_Sept_02.pdf [Accessed 28 Sep. 2016]. Summary: Unilever is one of the greatest cases of the associations that could succeed with outsourcing their advantages and improvement of ERP based framework to an outsider and the asset is a report that covers the same. The organization chose to outsource the outline and advancement of the majority of its ERP Systems to other merchant that turned out to be gainful for Unilever as it carried expanded benefits and better incomes with it. The procedure was done after appropriate arranging and various gatherings inside and remotely too. The asset was chosen because of the reason of the report being clear and compact as far as the data that it secured. Resource 2 Acer Delattre, A., Hess, T. and Chieh, K. (2016). Strategic Outsourcing: Electronics Manufacturing Transformation in Changing Business Climates. [online] Available at: https://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan015115.pdf [Accessed 28 Sep. 2016]. Summary: The second association that took the choice of outsourcing is Acer which is a major name in the equipment universe of PC frameworks and the asset is a paper that covers the system and the reasons that were available in the choice. The creator trusts that because of the diminishing pieces of the overall industry and the execution in the business sector, Acer chose to outsource each and every operation and administration that it was performing. The choice was difficult as it put everything in question with the choice of outsourcing and it ended up being one great choice for the organization as it brought about expanded pieces of the overall industry and benefits. The determination of this specific asset was done as it clarified the technique and the methodology that Acer took after amid the outsourcing procedure. Week 10 Task The text discusses the need to manage scope, time, cost, quality and risk in IS implementations. Of these, cost is arguably the most difficult to manage and the cause of many IS implementation project failures. Collect and summarise two online resources that describe examples of where IS implementation project costs have vastly exceeded the original budget. The resources must not be about the same organisation/project. Resource 1 Channel Tunnel Hfw, (2014). The Channel Tunnel: Have we learnt our lessons. [online] Available at: https://www.hfw.com/downloads/HFW-CN-Channel-Tunnel-Article-July-2014.pdf [Accessed 28 Sep. 2016]. Summary: The resource is an article that summaries the endeavours that failed in view of an extensive variety of reasons with the spending overpower as an imperative cause behind the same. Channel Tunnel was an endeavour that was arranged at an immense cost of $7 billion and it entered organization in 1994 with twofold the cost as $13 billion. The endeavour was further messed with a cost of $9.3 billion. The gathering that was associated with the errand continued genuinely gravely as a result of the overhaul in the cost. The benefit was picked as it gave specifics about the hidden and last cost that was associated with the endeavour besides secured other relevant inconspicuous components too. Resource 2 IBM Stretch Project Widman, J. (2016). IT's biggest project failures -- and what we can learn from them. [online] Computerworld. Available at: https://www.computerworld.com/article/2533563/it-project-management/it-s-biggest-project-failures----and-what-we-can-learn-from-them.html [Accessed 28 Sep. 2016]. Summary: The second case is connected with IBM and the asset is a paper that covers the events of the undertaking and the reason for the disappointment. IBM's stretch undertaking is a basic case in the errands that turned out seriously to the extent cost and timetable. IBM expected to drop the cost of the thing to $7.8 million from the organized $13.5 million in light of genuine expense and timetable overpower. The creator trusts that the occurrence not simply influenced the endeavour bunch adversely anyway all caused huge damage on the reputation of the relationship close by an impact of the accomplices that were associated with the endeavour. The determination of this asset was done as it was composed as a contextual investigation and thus secured every one of the specifics that were connected with the undertaking and its disappointment alongside the effect too. Conclusion The report helped in understanding of the various aspects of the ICT world by providing the ability to research and develops an understanding on 10 different topics. The topics that have been covered in the report are computer storage memory, embedded operating systems, IoT applications, text based application layer protocols, ransomware attacks, network outage attacks, social media marketing strategy, database vendors in the market, and strategic outsourcing and IT project failures due to budget overrun. All of these topics aided in acquiring more details and information about each one of them along with the detailed analysis as well.