Tuesday, November 26, 2019

The Many Ways to Pronounce I in French

The Many Ways to Pronounce I in French When youre learning French, the letter I may be one of the most challenging of the alphabet. It has a common sound, a couple of accents, and is often combined  with other letters and all of these have slightly different sounds. Because the I is used so often in French and in so many ways, its important that you study it thoroughly. This lesson will help fine tune your pronunciation skills and maybe even add a few new words to your French vocabulary. How to Pronounce the French I The French letter I is pronounced more or less like the EE in fee, but without the Y sound at the end. An I with an accent circonflexe, à ® or trà ©ma, à ¯, is pronounced the same way. This is also true for the letter Y when its used as a vowel in French. However, the French I is pronounced like the English Y in the following instances: When I is followed by a vowel as in  chà ¢tier, addition, adieu, and  tiers.When IL is at the end of a word and preceded by a vowel as in orteil, orgueil, and  Ã…“il.In most words with ILLE  such as  mouiller, fille, bouteille, and  veuillez. French Words With I Practice your pronunciation of the French I with these simple words. Give it a try on your own, then click the word to hear the correct pronunciation. Repeat these until you have them down because they are very common words that youll need often. dix  (ten)ami  (friend)lit  (bed)addition  (addition, restaurant bill)adieu  (farewell)orgueil  (pride)Å“il  (eye)veuillez  (please)fille  (girl) Letter Combinations With I The letter I is as useful in French as it is in English. However, it also comes with a variety of pronunciations depending on the letters its used in conjunction with. As you continue your study of I, be sure that you understand how these letter combinations sound. AI and  AIS  - There are three ways to pronounce AI. The most common is  pronounced like the È or bed.AIL  - Pronounced [ahy].EI - Sounds like the É or È  as in the word à ©tà ©Ã‚  (summer).EIL  -  Pronounced [ehy], similar to the E in bed followed by a Y sound. As used in  un  appareil  (device) and  un  orteil  (toe).EUI, UEIL, and  Ã…’IL  - Sounds  like the OO in good followed by a Y sound.IN - Called a nasal I, this is pronounce [e(n)]. The E sounds like an  E with a circumflex -  Ãƒ ªÃ‚  - and the (n) is the nasal sound. For example,  cinq  (five) and  pain  (bread).The nasal I can be spelled any number of ways:  in, im, ain, aim, eim, ein, em,  or en.IO - Pronounced [yo] with a closed O sound. Used in the  addition  example above.NI - When followed by another vowel, it is pronounced [ny]. If its followed by a consonant, the I follows the rules above and the N follows its own rules. For example,  une  nià ¨ce   (niece) versus  un  niveau  (level, standard).OI  - Pronounced [wa].OUIL  - Pronounced [uj]. TI - When followed by a vowel, TI sounds like [sy] as in un  dictionnaire  (dictionary). If a consonant follows this combination, the T follows its rules and the I follows the rules above. A perfect example is  actif  (active).UI  - Sounds like the English we. For example,  huit  (eight) and  la  cuisine  (kitchen, cooking).UIL and UILLE - When UIL follows a consonant, the sound is [weel] (with the exception of  un building). For instance,  juillet (July).  With UILLE, the double L transforms it to [weey] as in  une  cuillà ¨re  (spoon).

Saturday, November 23, 2019

Learn Why Onions Make You Cry

Learn Why Onions Make You Cry Unless youve managed to avoid cooking entirely, youve probably experienced the burning and tearing from vapors that cutting up an onion produces. Cutting an onion bursts its cells, producing a chemical process which releases the contents of those cells into the immediate atmosphere, causing you to tear up as you slice and dice. Acid Effect Amino acid sulfoxides form sulfenic acids as you slice into an onion. These enzymes which were isolated are now free to mix with the sulfenic acids to produce ​propanethial S-oxide, a volatile sulfur compound gas which wafts upward and into your eyes. This gas reacts with the water in your tears to form sulfuric acid. The sulfuric acid burns, stimulating your eyes to release more tears to wash the irritant away. Stop Crying There are a few ways to curb the chemical process which causes you to cry when cutting an onion, including: Cook the onion. Cooking inactivates the enzyme, so while the smell of cooked onion may be strong, it doesnt burn your eyes.Wear  safety goggles or run a fan. This actually prevents the vapors from the compound  entering your  eyes or blows the compound vapors safely away.Refrigerate the onion before cutting. Cooling slows reactions and changes the chemistry inside the onion. The same effect can be accomplished by cutting the onion under water.Use stainless steel. The sulfur-containing compounds also leave a characteristic odor on your fingers. You may be able to remove or reduce some of the smell- and tears- by wiping your fingers on a stainless steel odor absorber. Other Methods A few more proven methods for avoiding the waterworks while cutting into or preparing an onion involve  cooking prep methods such as locating the root, removing the bulb and even slicing lengthwise before dicing. So, take heart: With a little preparation and an understanding of basic chemistry, you can slice, dice and cook an onion without ever shedding a tear.

Thursday, November 21, 2019

Business Law Essay Example | Topics and Well Written Essays - 1250 words - 3

Business Law - Essay Example FMLA is focused at addressing five major issues. First, the Act covers the birth of the employee’s child and the care of the child. Secondly, the Act caters for the placement of an employee’s child for foster care or adoption. Thirdly, family and medical leave Act of 1993 caters for the care of the employee’s parent as well as the child either a daughter or a son with serious health problems (Family and Medical Leave Act Regulations.1990). Fourthly, the FMLA caters for the serious health condition of the workers that makes them not to perform their duties as required by their employers. Fifthly, it caters for any qualifying exigencies that may arise due to the deployment of the employee’s family member. Upon returning from their leave, FMLA requires that the employers must provide the employees with protection and benefits that they may have received if they were working. Most notably, the act covers 4 aspects that the employers must provide to the eligibl e employees who return from their leave (Galinsky et al, 2008). First, employees must be provided with the health benefits that they would receive if they were working. Secondly, upon returning from the leave, the FMLA requires that the employees must be restored to the same position. ... alth condition or that of a family member must be allowed to have a leave to attend doctor’s appointments for such cases as chemotherapy and psychological counseling among others. Family and medical leave Act of 1993 requires that an employee must provide an employer with a 30 days notice of his or her intention to take a leave (Family and Medical Leave Act Regulations.1990). In cases the leave comes due to emergency, it is the responsibility of the employees to notify the employers as soon as possible. Similarly, the Act maintains that an employer may request for a medical certification in case the employer is taking a leave due to serious health problem related to him or her or a family member. In situation A, employee A was eligible for the 11 weeks leave since he had worked in company X for 12 years. On his part, the new manager reinstated the employee to his previous job at the previous rate of pay. This indicates that even if the manager was new, he acted within the requ irements of Family and medical leave Act of 1993. As indicated earlier, the FMLA indicates that the leave must be unpaid, implying that employee A was not eligible for the salary from his 11 week leave. This indicates that by denying the employee the salary, the manager did not violate the law and as such there was no violation that occurred in this situation A. Situation B Age Discrimination in Employment Act of 1967 (ADEA) gives protection to the employees who are 40 years and above from been discriminated by their employers (Age Discrimination in Employment Act of 1967). According to this Act, that covers both the job applicant and the existing employees, it is unlawful for any employer to discriminate a worker based on his or her old age in respect to the employment benefits that includes

Tuesday, November 19, 2019

Sollievo Essay Example | Topics and Well Written Essays - 250 words

Sollievo - Essay Example Hence for the six consecutive advertisements, this value will be $210,000. Advertisements that have more than one color cost more than black and white advertisements. The cost of an advertisement on trade shows is significantly lower than running advertisements on TV or magazines. Advertising made on the trade shows ‘website lower the business cost per sale significantly. If an advertisement from a DR magazine is $50,000, a trade show can be around $30,000 to $40,000. The major benefit of magazine advertisement to a business it the aptitude to display images of higher quality than the direct ones through newspaper or mail. Images full of color and gloss create clear pictures of the products. This gives the public a better idea of the company. Many magazines target a specific people. When an advertisement is posted, it means that someone will at one time pick and read it irrespective of the print date. Hence, increased returns to the business. When used properly and in a timely way, both DR magazine and trade shows have the capacity of increasing business returns to over 100 percent. The effect of an advisement is far much better than staying without

Sunday, November 17, 2019

Chemical dependency Essay Example for Free

Chemical dependency Essay Group Structure: Type of group: This meeting was a â€Å"Narcotics Anonymous Open Sharing Meeting†. This component, where anyone attending had the opportunity to share. There was no direct feedback from the other participants during the â€Å"share†, thus only one person spoke at any given time during that portion of the meeting. Organizational affiliation: Narcotics Anonymous as a group has no affiliation outside of Narcotics Anonymous. As a group they have no opinion on outside issues,† including those of politics, science, or medicine, and do not endorse any outside organization or institution. The fellowship does not promote itself, but rather attracts new members through public information and outreach. Narcotics Anonymous groups and areas supply outside organizations with factual information regarding the Narcotics Anonymous program, and individual members may carry the Narcotics Anonymous message to hospitals and institutions, such as treatment centers and jails. Narcotics Anonymous as a group base their public relations policy on attraction rather than promotion. Physical environment: This meeting was held in the recreation room in the basement of a church. There was an oblong table at the head of the two rows of chairs placed in a 360 degree circle. Participants: There were roughly 40-50 participants ranging in age from mid teens to late 50’s. There were only 5 females in attendance. This group’s ethnicity was about 85% Caucasian, 10% African American and 5% Latino. Leadership structure: In different areas the work is divided differently, and the particular jobs are sometimes called different names. At this particular meeting the leadership structure was as follows, ranking from top to bottom in hierarchy. Chairperson, Co-Chairperson, Secretary, Treasurer and Group service representative (GSR). Process: What the group does for a person’s first visit? First time visitors and  newcomers to this meeting were asked to introduce themselves by first name only. These individuals were welcomed by all the participants at the meeting. These individuals were given a hand shake, a hug and a white key tag (by a presenter) that said welcome on one side and on the other side had the Narcotics Anonymous logo. How members’ contribute to the group’s leadership? Members who attend the same meeting on a regular basis to establish a recovery network and reliable routine understand this to be their â€Å"Home Group†. These group members are able to participate in the group’s business, and play an important role in deciding how the structure, leadership and the group’s meetings will be conducted. Each member has a vote in this process and the majority vote rules. Activities that occurred during the meeting. There were no physical activities during this meeting but certain individuals read inserts from the â€Å"Basic Text Book† of Narcotics Anonymous pertaining to that week’s format and agenda. Address the following questions: How did the group begin? The group began by the Chairperson knocking on the table to gain every ones attention, then announcing them self, followed by stating the name of this group (Dead Man Walking) then reciting the Serenity Prayer. How was the purpose of the meeting communicated? The purpose of the meeting was indicated by preamble which was read by the Chairperson also by the reading of the secretary’s report, which was read by the C-Chairperson, this stated the purpose of the meeting and the rules in which the participants were required to oblige by. How was the meeting’s agenda established? The agenda varies in whatever way seems to best suit the personality of the group and the needs of the addicts in the community. This meeting’s agenda and format was established by the governing members (from the Home Group) and varies from week to week but was mostly based on the 12 Steps and 12 Traditions of Narcotics Anonymous. Techniques used to encourage people to participate. It was announced to all those attending the meeting that participation was optional. What extent were these techniques effective. There was no pressure on anyone which made the atmosphere very comfortable. What are participants’ responsibilities for the meeting process? Anonymity of the group’s participants and process were the main responsibilities from all those attending and keeping the sharing time  between 3-5 minutes and not interrupting the person who was talking. How were these responsibilities explained? These responsibilities were explained to the group in detail during the reading of the secretary’s report. How did the group demonstrate interest, acceptance, etc. in those attending? The participants showed interest by paying close attention to the individual who was sharing and when those who shared finished, everyone in the group (at one time) thanked that person for sharing their story. What emotions were observed? There were a couple of times when an individual who was telling their story began to cry. Other times there was some laughter from the group when certain individuals identified their own story with the one the person was sharing. How did the participants respond to expressions of these emotions? The participants expressions showed true concern and empathy for those who were sharing their experience, strength and hope. Were there any decisions made for future events or meetings? It was stated in the secretary’s report that all meeting events and decisions are discussed and made during the group’s monthly business meeting. The business meeting for this group is held on the second Saturday of the month. Describe any observation of any therapeutic factors. The therapeutic value of one addict helping another gave each participant the feeling of acceptance and familiarity. There were a lot of similarities between the structure of an Alcoholics Anonymous and Narcotics Anonymous meeting. A major difference I witness at the Alcoholics Anonymous meeting from the Narcotics Anonymous meeting was, at the Narcotics Anonymous Meeting it was suggested that those who was sharing not to acknowledge or mention there drug use. At the Narcotics Anonymous meeting it was clearly stated that â€Å"Narcotics Anonymous does not distinguish a difference between substances, they are all inclusive, â€Å"Alcohol is a drug†. It was also stated at the Narcotics Anonymous meeting that anyone from the other fellowship (Alcoholics Anonymous) was accepted at this and all Narcotics Anonymous meetings.

Thursday, November 14, 2019

Golem At Large, What You Should Know About Technology. :: essays research papers

â€Å"The Golem at Large: What you should know about technology†   Ã‚  Ã‚  Ã‚  Ã‚  Technology can be regarded as a phenomenon with vast uncertainties. Technological change is rapid and we are struggling to keep up to date with the latest advances, while learning new ones and trying to prepare for the next changes proposed for the future. In order to do so, however, we need to be clear about what we mean, and what we consider to be a technology and evaluate some of the assumptions of our understanding of our technologically advanced society.   Ã‚  Ã‚  Ã‚  Ã‚  In ‘The Golem at Large, What we should know about technology’ The authors’ main purpose is to show their audience that we trust technology too much and don’t take into consideration that human error occurs. Much of the world of technology, as suggested by the authors, is built on trust: â€Å"Trust that the engineers have done their job responsibly, trust that they have the right expertise to do the job properly. â€Å" The idea that even the best intentions go wrong, and that even well designed technology can go wrong at times. They also emphasize that we tend to blame technical failure rather than the human consumption failing itself. By contrast, they chose to link technology to the golem. The golem was a creature from Jewish mythology and while not evil, is marked by a clumsy drive. Technology, at its cutting edge, will always rage with controversy, because there is no neutral place, nor a central point, in the search for responsib ility and accountability of a failed technology. The authors’ also try to accomplish certain biased viewpoints throughout this book. They prove this by showing us how the imperfections of technology are related to the uncertainties of science. They are basically trying to show the audience that we need not trust technology completely, because we are the ones who developed it to originally and that humans are really the ones not to be trusted. Many of these cases have a main point to be accomplished by the authors’. For example in the Patriot missile story, they try to bring a certain message across to their audience to prove their thesis. Sometimes, issues that the authors attempt to address are raised in the context of technology the are discussing. However, these instances are few and far between and the proposed solutions ,I feel ,can be criticised. It would seem that the audience that they are trying to capture in this book, I think, are the type of people that pay close attention to media that occur with these type of events.

Tuesday, November 12, 2019

How far did Alexander III bring political and social change to Russia? Essay

Alexander II was assassinated by terrorist in 1881, leaving Russia and its problems to his son Alexander III. Changes were to be made, socially and politically in every aspect if he were to avoid the unfortunate events that ended his father’s reign. To begin with a change that occurred during his reign was rusification. In 1885 Russian was made the official language of Russia and other languages were forbidden in documents in schools. This was successful in some ways as it made communications easier, however, it caused such a social change to Russia it sourced anger form other nationalities, leaving Muslim groups offended. This could have triggered uproar. Also pogroms (Russian pale) were introduced. The government actually encouraged organisation to go into Jewish settlements and attack them, as a consequence to this thousands of Jews left the country causing a big social and political change. As the Jews were very productive and made up many of the upper class, they were goo d for their money e.g. the government got lots of money through taxing their land. When the Jews left they also left a hole to fill in the Russian economy, however this reinforced nationalism and only affected the minority of the population. Foreign investments made huge changes socially and politically to Russia. As Russia had no middle class they were unable to build up an economy so other countries situate businesses and invested in Russia this was successful at creating additional jobs also causing more factors of wealth and economical growth, still, working condition were poor and other countries were benefiting to much, using Russia for political influences and their resources such as oil in order to make a large profit. A special court was set up which had no jury this sped up the whole process protecting the government and others against harm also stopping anyone from bribing the jury, this was a social change as it put criminals under pressure repressing opposition, for example in 1887 many from the Peoples Will were arrested and the leaders executed, without the court this process would not of been as efficient. Although attempts of his assignation were still made nether him or any of his political party were k illed during his reign this shows a huge change compared to the time of his father. These groups never dominated Russia due to Alexander’s repression and censorship. Censorship also prevented opposition parties from trying to claim more support but this meant people lost their freedom of speech and their opinions producing a tense relationship between the government and its people as they felt there was secrets that were being hidden and they should know what political state their country is. also the Okhara (secret police) were introduced which produced political safety imprisoning any opposition but evan this caused some unhappiness as the minority believed he cared more about his own wellbeing then the one of his people. One major success during the reign of Alexander III was the acceleration of industrial development that continued even after his reign. Witte most associated most with this policy he was the minister of finance, He also encouraged foreign investment because of this Russias coal, iron, steel, and oil production grow massively. Railway routes and tracks also, giving important access to other countries making them socially and politically beneficial allowing Russians to communicate and spread their trade effortlessly without facing difficult terrain. The urban labour force grew rapidly. For example the population of St Petersburg and Moscow increased by over double between 1863 and 1897.due to imployment of thousands in factors. Wages, hours of work and housing conditions were usually very poor. This was especially true in Moscow. Government attempts to improve conditions were poor causing political and social frustation.

Saturday, November 9, 2019

Wireless Technology

Wireless Technology Paper Stephen Wenclewicz, Ronda Wilson, Matthew Tiemens, Sheleada Wells, Annabelle Franklin DeVry University Tech, Society and Culture LAS432 Professor Laurence Hornibrook Table of Contents Introduction to Wireless Technology4 Overview of Wireless Technology5 Science that Drove Wireless Development 6 Signal Types10 Wireless Network Infrastructure12 History of Wireless Technology15 Social Factors that Drove Wireless Technology19 Wireless Technology Timeline24 Political Effects on Development28 Legal Issues Related to Wireless Technology30Legal Concerns Related to the Development of Wireless Technology31 Economics in Relation to Wireless Technology33 Psychological considerations and sociological effects43 Personal Communication43 Emotional Disconnect45 Worldly Effects 50 Media Influence51 Impact on Education52 Impact on USA54 Environmental Implications55 Implications for Wireless Technology56 Wireless Waste56 Analysis59 Health Concerns59 Moral and Ethical Implicatio ns61 Conclusion64 Works Cited67 Introduction to Wireless Technology (Wenclewicz) You just awoke and looked out your window, and to your surprise, your car is covered with 5 inches of snow.You have to leave for work in 40 minutes but you still need to take a shower and get things ready for your day. You do not have the extra time to go outside and warm your car up before you leave, but you have remote start and with just a click of a button, you are able to start your car while you are getting ready. This is just one of the many things that we might take for granted that wireless technology has provided for us in the world today. Wireless technology is a technology that has changed the world and how it operates.Wireless technology is the ability to communicate between devices without wires. Wireless technology is found in many devices ranging from cell phones, computers, GPS units and house alarms. Through the advancements in our technology, it has become less common to function with out this technology. Wireless technology provides the ability to transfer information between points without an electrical conductor connecting them. Wireless technology has provided us the ability to have long range communications that would not normally happen if wires were needed.It is important to understand that wireless technology increases the chances for people to steal your information. So having a better understanding of the various types of wireless security will increase your ability to enjoy this technology with limited fear. The issue that there is no wire for people to access does provide a greater chance for security issues. When you are operating on a wireless network, your communication can be monitored by anyone who is in the area. Another issue is limiting access to your network by only allowing certain people viewing ability over the wireless connection.Being able to limit those who have access to your information over wireless is harder than limiting access to those who are physically attached to a switched point on the network. By the end of this paper, you will have a better understanding the overall history of wireless technology not only how it changed the world, as we know it today, but also further, how wireless technology has affected Germany. You will have a better understanding of how wireless technology has helped the German economy as well as how it has led to political power.Germany has made much advancement as a country in wireless technology and because of wireless technology; they have improved themselves as a nation. Overview of Wireless Technology (Wenclewicz) Wireless technology is nothing new to us, how we look at it is what is different. Looking back at the early times of man there have been many different forms of wireless communications that have taken place. Many tribes used drums as a form of communication, the message would be sent by beating on drums. This sound would only travel a short distance so its effective ness was very limited.A way that the tribes overcame this issue was by setting up different points and each drummer would acknowledge the sender’s message by a series of beats on the drum. After the message was confirmed received then the message would be sent to the next receiver. In the times of the American Indians, the tribes would use smoke signals as a form of wireless communication. The downside to this form of communication was the limited distance based on line of sight. Due to a limited alphabet and the issues, that the wind causes would increase the chances that the communication would be lost or misinterpreted.Soon followed was the introduction of the semaphore flag. The semaphore flag system is one used to convey information at a distance by using signals with flags, paddles or gloved hands. The downside to this form of wireless communication is that it is limited to line of sight as well, and that because this had to take place in the open the chances of your me ssage being stolen is increased. Science that Drove Wireless Development (Wenclewicz) â€Å"In the nineteenth century, light beams were used for short-haul communications, particularly in military contexts.Very detailed messages could be transmitted by a coded sequence (Morse code) of blinking lights from sender to receiver. Again, this was effective over limited distances and provided a quiet, yet visible means of communication. Drawbacks included limited distance, unauthorized reception of information due to visibility at various angles, and risk of interception. Security was always suspicious, so a form of alphabetic encryption was introduced as a safeguard. This required an ever-changing code set, along with special handling and extra time to manually decipher the transmitted message.Furthermore, the cipher code had to be kept current at all locations to achieve correctness. † (Denham, 2009) Wireless technology has been traced back as early as the 1800’s. Wireless technology came about because of many individuals who all had one common ability and that was the ability to think outside the box. A man by the name of James Clerk Maxwell helped discover the science of electromagnetism. Electromagnetism is the interaction of positive and negative charges that have come together and regulated by one force. There are four main effects resulting from these interactions, all of which have been clearly demonstrated by experiments: 1. Electric charges attract or repel one another with a force inversely proportional to the square of the distance between them: unlike charges attract, like ones repel. 2. Magnetic poles (or states of polarization at individual points) attract or repel one another in a similar way and always come in pairs: every North Pole is yoked to a South Pole. 3. An electric current in a wire creates a circular magnetic field around the wire, its direction (clockwise or counter-clockwise) depending on that of the current. . A current is induced in a loop of wire when it is moved towards or away from a magnetic field, or a magnet is moved towards or away from it, the direction of current depending on that of the movement. â€Å" (Article Alley, 2008) During this time, the Heinrich Hertz who was a German physicist who furthered clarified and expanded on the studies from James Clerk Maxwell. By doing more experiments, Heinrich Hertz helped advance the use of radio waves and antennas. The biggest discovery that Heinrich Hertz had took place over a 2-year span from 1886-1888.It was during this time he was able to prove that electrical energy could be transmitted at the speed of light in the form of electromagnetic waves. One of the biggest outcomes from this finding was his ability to learn that these waves could be polarized, refracted and reflected which is similar to light. Hertz used an end-loaded half-wave dipole as the transmitting antenna and a resonant half-wave receiving loop operating at a wavelength of 8 me ters to produce what is known as short radio waves. He focused the waves with a reflector and showed their presence by means of sparks in the wire loop gap that was a few meters away.It was Hertz’ experiments coupled with Guglielmo Marconi’s inventions, which lead to the birth of wireless technology. During this time, Marconi was able to transmit signals without wires for a distance of over 1 mile. It was soon after this accomplishment that Marconi was granted the first patent in 1896 for wireless telegraphy. It was in 1897 that the first wireless company Marconi’s Wireless Telegraph Company Limited was formed. During this time, Russian Professor Alexander Popov was trying to create a thunderstorm detector, and while doing this he stumble across a device that could receive radio waves.His invention allowed sailors to send out communication to station on land, which lead to the first use of radio communication to date. â€Å"Nathan Stubblefield, widely believed to be the inventor of the wireless telephone device more than a century ago, was an eccentric melon farmer who worked in isolation from his barn in the foothills of Kentucky. He described himself as a â€Å"practical farmer, fruit grower and electrician. † His friends described him as plain and unassuming in his manner, yet secretive. The only individual he trusted was his 14-year-old son and assistant, Bernard.Stubblefield’s device reportedly worked by audio frequency induction. It was composed of a system of wires suspended between metal rods, with the transmitter placed on a train carriage or boat. When a vehicle or vessel neared, a signal was sent through the air to the telephone using magnetic fields. It could be heard at the other end of the wire through another phone. † (Denham, 2009). Signal Types (Wenclewicz) It was in the 20th Century that the transmitting antenna was established. By using this device, it helped prove that a transmission of a message co uld be sent back and forth while bending and traveling the speed of light.It was during this time that Reginald Fessenden was able to transmit the human voice, up until this point the only confirmed transmission has been Morse code. It was from this point that wireless technology began to rapidly advance, in such was that in 1910 Magnus Ericsson used the first â€Å"car phone† which was made up of two long sticks. It was not until the 1920’s when wireless technology took its biggest improvements and developments. It was during this time that broadcasting and news stations were using radio transmissions, as well as Police departments began to use car radios and walkie-talkies.The advancements of wireless technology proved to be very significant during WWII. During this time, the armies we able to transmit battlefield information across enemy lines, where before this time that was an improbable feat. The Germans used Enigma machines for encoding their secret military inf ormation to be sent to outposts. With Enigma, messages could easily be translated into 5 (five) letter groups that were transmitted in Morse code and then decoded by a machine using the same settings. Unfortunately, these machines had over 150 000 000 000 000 settings which made the task of decoding for the British code breakers a Herculean one. (Dubendorf, 2003) During the early parts of the war, the development of the RADAR system was accomplished. A key step in the development of wireless technology was the development of satellite communications. In 1957, President Eisenhower approved a plan to place a satellite in space to orbit the Earth to gather data about the Russians and the Earth, but the Russians were first to launch Sputnik 1, which was released into space and was only the size of a basketball. Sputnik 1 fell from orbit 3 months after launch, but during the time, it was up in orbit it was able to prove the satellite communication was possible.The launch of Sputnik 1 ope ned a new dimension of wireless technology, which had great effect on political outcomes throughout the world. â€Å"The launch of the Telstar, another communications satellite, proved to be a major milestone in the development of satellite communication. On the 23rd. of July 1962, it was used to make the first live transatlantic television transmissions. Signals from the USA were seen live in many homes around Europe, making communication history. † (Dubendorf, 2003) With the development of wireless technology over the many centuries we are able to see the results all over the world.Today there are millions of people who rely on the use of wireless technology in one form or another ranging from cell phones to internet. The first network to carry cellular communication was Nordic Mobile Telephone which was based on an analogue standard. Analogue is any continuous signal in which the time varying feature of the signal is a representation of some other time varying quantity. Th ese systems faced the challenge of not being able to handle the rapidly growing capacity, it was because of this that the digital technology was introduced and offered several advantages than the analogue systems.Digital systems offer the ability to meet demands of the ever growing capacity and demands of the wireless world. Wireless Network Infrastructure (Wenclewicz) Network infrastructure for wireless technology is very vital to the all that use wireless communications in some way. Due to the ever changing world in which we live in, now more than ever we are feeling the need to â€Å"stay connected. † These changes have implemented the IT departments and their need to support remote and mobile users. Since the introduction of WLANs (Wireless Local Area Networks) the increase of wireless technology still leave some with unanswered questions.WLANs use electromagnetic waves for the transmission of data without wire connection between Access Points. As the distance between acc esses points from the users increase the speed decreases. WLANs transmit data via radio waves which help provide and advantage because this allows for some noise and interference while transmitting data. â€Å"There are many options depending on the geographic location where you live your wireless data options may be different in your community. 802. 11b is the most current and common denominator in terms of wireless LANs in Germany. This system operates on a 2. 4 GHz system. 02. 11b can be used for networking from peer to peer to entire businesses to establish links for interconnection of networks. 802. 11a is an approved standard that operates in a different radio range 5GHz than 802. 11b and offers higher theoretical and actual data speeds than 802. 11b (54Mbps theoretical, roughly 25Mbps actual). It operates under 3 bands of spectrum and can provide up to 12 non-interfering channels. It is widely viewed as one successor to the very pervasive 802. 11b. 802. 11g is an approved st andard that uses the same radio spectrum as the 802. 11b, but operates at speeds imilar to 802. 11a. One of the pros is that because it uses the same radio spectrum, it is possible that devices using 11g will be able to â€Å"fall-back† to using 11b in the presence of an 11b only wireless LAN. A con is that 11g is still restricted to the same 3 to 4 channels for design, and it may be difficult to design a high bandwidth 11g network without a significant amount of overlapping channels. A further complication is that in the current implementation of the specification, 11g clients slow down to 11b client speeds (11Mbps or less) if an 11g network supports both 11b and 11g clients.Bluetooth is more geared as a PAN (personal Area Network) than as a LAN. It is a â€Å"standard† in the sense of a large number of technology companies have come together to develop the specification for devices that will use Bluetooth to inter-communicate with each other. Bluetooth uses the same unlicensed radio spectrum as 802. 11 (and g) and as such there is a potential that the presence of Bluetooth and 11b devices in the same area will interfere with each other. There is an IEEE standard (802. 5) that is based on the Bluetooth specification and there are efforts within the IEEE 802 working groups to have 11b(g) and 15 devices now flooding the market will not necessarily provide a comfortable level of cohabitation of the radio spectrum. Cellular and â€Å"3G† services-these are wireless data services being offered or talked about by primarily the various cellular providers (Verizon, Sprint, AT&T). For the most part, the notion is to carry data over the same radio spectrum as a cellular call, but to use different schemes to increase the data throughput.For example, Verizon is offering Express network with a max throughput of 144Kbps and an average speed of 40-60Kbps. While this speed is perhaps double or triple previous schemes and rival tpical dial-up modem speeds , it is slow compared to wireless LAN speeds. There are even higher bandwidth services being planned by many of these same cellular providers. Infrared, laser and microwave are wireless options ranging from low-speed (infrared) to very high speed (155Mbps and beyond) lasers that also fall under the wireless data umbrella. These products are more typically use for establishing point to point links.There are some emerging products that can provide point to multipoint service at 10Mbps (and beyond) speed of relatively long distances. There ais a new wireless wide area standard being developed (IEEE802. 16) that will allow high speed point to point or point to multipoint connections. This technology is being viewed as a wireless replacemnt or enhancement for MANs (Metropolitan Area Networks) like DSL or Cable modem. † (DiLorenzo, 2003) History of Wireless Technology (Wilson) Wireless technology all began with a man by the name of Heinrich Hertz.In 1887 and 1888, he had piloted a c hain of experiments in Germany. These experiments confirmed that electromagnetic waves really did exist. James Clerk Maxwell had predicted their existence back in 1864 but nobody took the predictions seriously. At the same time, another man by the name of Oliver Lodge was also piloting some experiments in Britain. His experiments also confirmed the existence of electromagnetic waves. While both of these man had all of the elements they needed for wireless telegraphy, neither of them discovered this technology.It was not until 1895 when a physics student at the University of Bologna had seen Augusto Righi’s experiments with â€Å"Hertzian waves† (Friedewald, 1999) the year before. After conducting a few experiments of his own, the student, 21-year-old Guglielmo Marconi had finally discovered wireless telegraphy. This discovery later led to his first patents. During around the same time that Marconi was making his discoveries, another man by the name of Alexander Popov w as making a few advancements on wireless technology of his own.While trying to develop a contraption that would signal when a thunderstorm was on its way, Popov inadvertently developed a radio wave receiver. With this receiver, Popov sent and received a wireless signal (Nkiruka, n. d. ) that spanned over a 600-yard area. It was due to this mishap that Popov too, gets credit for inventing the radio. In July of 1897, the Transactions of the American Institute of Electrical Engineers reviewed an exhibition of Marconi’s device (Wicks & Kemerling, 2003) and Marconi became known as the â€Å"Wizard of Wireless. Marconi went down in history as being the first person to successfully transmit and receive long-range radio signals (2003). From there Marconi went on to start up his own company, The Wireless Telegraph & Signal Company. This was the first ever radio factory (LaBarre, 2010). With his company registered, Marconi was now in the position to exploit his invention in the busine ss world. The electrical communication technologies remained under control by Great Britain’s government as Friedewald, 2000) they had been since 1870 so Marconi’s company operated as a private enterprise, making it possible for The Wireless Telegraph & Signal Company to establish a new branch in America in November of 1899 (2000). Using the technology of the telegraph as a foundation, the spark radio was next to come. The spark radio made it possible to send out Morse code. Knowing there was not a way for ships to communicate with people on the shore, Marconi cashed in on this market by establishing the Marconi International Marine Communication Company in 1900. Marconi capitalized on this market until 1908 (2000).In 1901, Marconi sent out the first transatlantic voice communication followed by communication from ship to shore in the year 1902 (Wicks & Kemerling, 2003). In 1904, after a few agencies decided to set up radio transmitters of their own without any coordin ation from the other agencies, President Roosevelt choose a couple of select agents from each group and formed â€Å"Roosevelt Board. † Their purpose was to make recommendations for the government’s own development on radio services. With the Navy receiving the majority of the oversight, proposals were then made to place major restrictions against commercial stations (Dubendorf, 2003).Telefunken, founded in 1903, was one of two research groups that worked in the wireless telegraphy field. Telefunken was the company that supplied the new radio station, Norddeich Radio, with their first two transmitters. Between the years of 1905 to 1908, Telefunken advanced wireless in the direction of military technology, from which the quenched spark system materialized. This actually pulverized Telefunken forward in the way of innovation. By implementing this new technology, Telefunken’s commercial success grew and so did the number of available seaside stations. The German Na vy had 90 warships all equipped with wireless radios.To advance the technology even further, the Navy decided to use the privately owned wireless company (Evans, 2010). The German government looked at Telefunken, as a trustworthy partner for achieving political goals because of the numerous close knitted ties Telefunken retained with other government officials, putting Telefunken in a position to be the main driving force in Germany’s wireless technology development. Once World War I ended, the use of radio communications grew exponentially. Seeing how useful it was during the war, people soon came to understand all of its potential, which encompassed more than just ommunication; it also included weaponry – Radio detecting and ranging or RADAR (Gugliotta, 2007). In 1935, a Scottish Engineer Robert Watson-Watt discovered he could use directional antenna to pick up lightning in the sky. He quickly learned that by transmitting radio pulses and listening to them, he was ab le to bounce the signal off a target like an aircraft. Measuring the amount of time it took the echoes to return to the antenna would tell him the bearing and the range of the target. In 1935, Watson-Watt presented this idea to the British Air Ministry and when World War II came into action, there were 19 radar stations in full operation.Thoughts are that this technology may have very well been what won The Battle of Britain (2007). Post World War II, the use of the radio had quickly spread throughout the militaries and to consumers as well. The widespread usage quickly led to the research and development of other forms of wireless communications. Around 1940, wireless technology started focusing on wireless phones but it would not be until 1980, 1990 before it became known about. During the time when developers started paying attention to these phones was also right around the time of the Cold War. Money was not readily available to be dumped into such research at that time.As such , the mobile phone was not very successful at first. After the Cold War, it was believed that the areas that required research and funding were artificial intelligence, nuclear weapons and computer graphics (Javadi, 2005). Mobile technology was just not on the list, especially since test results proved to be unsubstantiated, the FCC regulations were out of control and the risks were just too high. It would not be long before all that changed though (2005). In a matter of twenty years, cell phone usage climbed from a mere 50 thousand in the 1940’s to over 1. 4 million in 1960’s.Now corporations were starting to take notice. This was something they wanted to be a part of and the interest in the market shifted from defense to phone calls. By 1997, there was an estimated 50 million users with new users signing on daily. The research into mobile phones also brought about the exploration and development of wireless internet. This could be seen as a wonderful benefit as far a s the freedom it presented the users with but the inferences and imperfections that went along with the continual use of these devices had to be taken into consideration as well (2005).Social Factors that Drove Wireless Technology (Wilson) The number one location for research throughout all of Europe is Germany. They have a keen sense for research and development, with recognition spreading worldwide for turning out sophisticated technological products. Andrea Noske of the Federal Ministry of Education and Research says, â€Å"Research-intensive products and services contribute 45% to value creation in Germany, more than any other industrialized country† (Noske, n. d. ).It is important to note that Germany had 396 internationally relevant patents per million inhabitants, far (n. d. ) exceeding the European average of 158 in 2007 (n. d. ). Another fact I would like to point out is that the German Empire, for some 47 years, were industrial, technological and scientific geniuses , receiving more Nobel Prize awards in science than Britain, France, Russia and the United States put together (n. d. ). Early 20th century Germany was molded by its society. Through social approaches, practices and high principles, the society molded its technology.It is said that many scholars will analyze a certain group or certain technologies to show the ways in which a society determines what technologies make it to the crafting table. This is based on broader social views and attitudes. They also show the ways in which technologies are created socially but on a smaller scale (Toscano, 2012). .Their point here is that a socially constructed, dialectical relationship exists between societies and technologies. In order for a social group to notice a technology, the society must somehow interact with the technology.These social forces and real-world objectives always determine the current state and direction of technological research (2012). The society responsible for driving th e construction of wireless technologies was the groups that desired advanced technology in order to be able to communicate from sea as well as places that were inaccessible for wired systems. Marconi and other supporters of wireless technology examined the images of electromagnetic science and (2012) from there decided to build this technology in a way that would meld with the larger social values for the various audiences (2012). The ideas that Marconi and others affixed to wireless exist within the context of socially maintained ideology† (Toscano, 2012). Akesson (2005) argues that to realize a technology held a lot more meaning than simply producing a working model because technological realization â€Å"goes beyond the product and depends on relations, feelings, emotions and culturally constructed beliefs about whether something is worth investing in or not† (2012). His main argument was marketing. All technologies need great marketing for recognition.Because techno logies must fit within a cultures values and attitudes, the â€Å"marketing† involved will either have to adhere or be made to seem to adhere to prevailing cultural beliefs (2012). Since a society will either accept or reject a technology the ways in which the technology fits or made to fit into (2012) their social life greatly depends on the way the audience (2012) perceives the technology. Radar makes for a larger story in science and technology. Some say that radar contributed very little to the theory that had been known all the way back to Maxwell and Hertz.Therefore, radar cannot be attributed to the advancement of science. It can only be said that radar was simply a matter of technology and engineering. Others argue the enormous concrete significances of the development of radar stating that the technology contributed to the Allied victory in World War II, surpassing the Atomic Bomb by far. According to author Robert Buderi, it was the pioneer of many modern technologi es. In his book, The Invention that Changed the World: How a small group of Radar Pioneers won the Second World War and launched a technological revolution, he discusses some of these technologies in more depth (2012).Some specific abilities mentioned are the ability of astronomers to map the delineations of faraway planets, the ability of doctors to view internal organs, and being able to measure rainfall in distant places. He also goes on to talk about the fact that traveling by air is 100 times safer than traveling by roads, telephone calls being cheaper than sending letters through the mail, and last but not least, the ability to cook ones dinner in between TV shows with, â€Å"what used to be called the a radar range, aka microwave oven,† (2012).Technology may not change the way people see the world or bring in new social conditions, but it does change a person’s practices. For example, the mobile phone introduced a new way of making phone calls. People can now pl ace a phone call from almost anywhere to almost anywhere. It seems the social groups found this technology along with suburban life styles. As such, this technology was accepted within the culture. When a particular technological product proves useful, people will attempt to work the product into their social activities.What is it that makes a technological product a technology? For the most part, anything that is computer based and â€Å"hi-tech† is considered technology by society. Technology spans a much wider context though. In all correctness, a technology is any scientific based knowledge that focuses on procedures and engineering. It is this knowledge that groups socially build into values and practices. When the group accepts the technology based on their observation of importance and application, it becomes a steadied technology created in part on the significance they identify in the actual device (2012).Whether a device is an actual hand tool such as a hammer or ke yboard, or a mental device such as a (2012) scientific method, it usually is defined as the obtainable understanding of a society diligently committed to industry and market. This of technologically advanced world’s economy depends heavily on the creation of new advancements for growth and prosperity (2012). Technological advancements include anything from engineering ideas that increase production to products produced by vastly streamlined, efficient systems.People perceive and will continue to perceive technology as some type of tool related to work or profit, and the term â€Å"modernization† will continue to suggest that a nation develops technologies that will theoretically improve its economic position (2012). Wireless Technology Timeline (Wilson) The next three pages give a basic layout of some of the most important events that occurred during the development of wireless technology. This timeline is a basic synopsis and is not to be taken as complete. These are just some of the basic highlights starting in 1897 and ending in 2010. Political Effects on Development Wilson) In the beginning of the 20th century, developments in the area of wireless technology made a huge impact on everyday life. Today these technologies are essential for modern day living. The early wireless technology that was developed in the late 19th century is the core of our televisions and radio broadcasting. Our radar and satellite communications systems also originated from this technology. Wireless laid out the roadmap for our person-to-person mobile communications and allowed for the creation of the technology of mass intake today – the cellular technology (Mingtao, 2007).Most of the wireless manufacturers in Germany and across Europe at this time were selling their equipment to the national navies and they could only install their equipment on huge military and trading ships reason being, aerials had to sit up high in order to detect the wireless signals wit h reasonable sensitivity. The only ships that were able to accommodate such equipment were shockingly huge (2007). One of the oldest tricks in the book is to send out secret messages hidden by a method called â€Å"steganography†, a Greek word meaning â€Å"concealed writing†.With such a long history, Steganography led to the invention of invisible ink and â€Å"microdots. † Steganography alone is not very secure. The messages were easily deciphered. It was soon discovered that by manipulating the letters in the message, the message could remain hidden even if the message was found. This resulted in cryptography, a Greek word meaning â€Å"hidden writing† (Goebel, 2012). According to Goebel, â€Å"cryptography takes two forms; â€Å"codes† and â€Å"ciphers. † A â€Å"code† is a secret language intended to conceal a message (2012). A â€Å"cipher† conceals a plain text message by replacing or scrambling the letters (2012). Enc ryption† covers both encoding and enciphering, while â€Å"decryption† covers both decoding and deciphering. Together, the two fields make up the science of ‘cryptology’ † (2012). To this day, coding and ciphering are heavily used. During World War I and II, codermakers and codebreakers flourished, especially since each side kept designing even more complex ciphers than their adversaries kept. These were deemed so important through the course of the war, that by the end, cryptologic organizations turned into huge establishments that were increasingly involved in military practice and operations (2012).This cryptography had serious effects on German politics during the war, as it was almost unavoidable to intercept messages meant for the other side. When messages were broadcasted over the airwaves, whoever was listening could easily pick them up (2012). This left the German military susceptible to sabotage. World War II would lead to an explosion of ev en more, new technologies that would have weighty effects in the postwar period (2012). Legal Issues Related to Wireless Technology (Wilson) Almost from the very beginning of wireless technology, there has been a need for regulation.Since broadcasting signals are transmitted through the air with no repute for political boundaries, regulation usually occurs at the federal level. The first regulatory actions took place in 1910 with the U. S. Wireless Act in which all American ships were to be equipped with broadcasting transmitters and qualified operators any time they were at sea. Other countries quickly followed this practice. To be considered are three different types of regulations: Spectrum Regulation, Industrial and security regulation, and Radio frequency safety regulation.The Spectrum Regulation issues – In order to competently share the determinate (Egea-Lopez, 2004) available frequency spectrum (2004) while avoiding interference between them (2004), it is necessary to regulate the transmissions coming from the equipment. There are organizations in place that perform the regulations. They are FCC (Federal Communications Commission) in the United States, the ITU (International Telecommunications Union), the Japan Association of Radio Industries and Business, and the ETSI (European Telecommunications Standards Institute). These specific recommendations and rules apply where ) the range of a particular technology is limited by the amount of power b) electromagnetic fields (EMF) and noise emissions are at their peak c) frequency bands. Licensed and unlicensed bands exist in existence are distinguished by regulatory bodies such as ISM (Industrial Scientific and Medical) which is used the same in most countries. Because no technology is in control of these bands a variety of devices are able to share the same range of frequencies (2004). IEEE 802. 11 and the Bluetooth device both operate at this band mainly because it is free.By law, the maximum power emission is limited (2004). Industrial and security regulation issues – Industrial areas almost always have certain restrictions placed on them and wireless is not an exception to this rule. Depending on the possible accidental risk that could occur, explosive atmospheres along with environmentally dangerous areas may be classified as hazardous areas. In this case, only fundamentally safe equipment are permitted (2004). Europe has a directive called the Atmosphere Explosive directive (ATEX) that states all wireless devices have to be certified by the CEN/CENELEC (2004).Radio frequency safety regulation issues – This regulation pertains to the health and safety of humans, therefore the electromagnetic emissions have to limited and specific technologies are expected to obey these regulations (2004). Legal Concerns Related to the Development of Wireless Technology (Wilson) After Marconi made his discoveries, he moved to Britain to obtain financial funding for his project. With Britain’s need for quick and effective deployment of naval ships and commercial fleets, this was a perfect choice for Marconi.He developed his invention and marketed it for military and industrial (OECD, n. d. ) needs. After only five years, a wireless signal was transmitted across the Atlantic Ocean from England to Newfoundland (n. d. ). This event won Marconi the Nobel Prize (n. d. ) in 1909 for physics. It also started a new revolution of laws and regulations. Germany sponsored a â€Å"preliminary conference concerning wireless telegraphy† (White, 2003) at Berlin in 1903 to discuss some outstanding issues in regards to the development of the wireless technology.Though the conference proved to be a success a few areas, the topic of intercommunication procedures between different stations and their stations, remained unresolved. A document titled â€Å"Final Protocol, First International Radio Telegraphic Conference, Berlin, 1903† (2003) laid out detailed information for other countries to review until the conference convened. When the conference convened in Berlin in 1906, it was agreed coastal and ship stations were to interchange messages with each other regardless of whether the equipment was Marconi’s or a competitive supplier.Because some countries already entered into a contract agreement with Marconi, signing the new policy would be a violation (2003). In April of 1912, a ship equipped with Marconi equipment and staffed by Marconi operators, crashed into an iceberg off the coast of Newfoundland. Distress calls were made from the ship however as the call came in, amateur broadcasters heard about it and filled the airwaves up and down the coast, creating so much static and interference that the distress call went unheard. 1. 02 people lost their lives that night. In 1912, London held an International Convention as well. Both the Berlin and the London Conventions covered international communication but for the mostly the y added to the international protocols of wire-telegraphy connections. Regulations regarding radio and news stations were not addressed at this time but would be covered in depth after the tragic Titanic incident. With the prohibition of privately owned stations, many radio pioneers found themselves without jobs.In 1920, commercial and government radiotelegraphic stations were everywhere as the world experienced a major outbreak. Radiotelegraphy became the new thing for all commercial and passenger ships. In 1930, the wireless telegraphy using radio signals was developed. This quickly became the ultimate device in communications for distant countries and lasted many years due to its reliability (2003). Economics in Relation to Wireless Technology (Tiemens) There is a lot of debate about how much governments should be involved when it comes to the economy.Should a government raise taxes in an attempt to increase income and build a strong infrastructure or should the government limit its role and depend more on a free market and competition. Many economists could debate this question indefinitely and no matter the outcome, a government’s involvement may be necessary when the country has a resource so finite that only a handful of companies can have access to it and so valuable that it can change the entire GDP of a country, such a resource exists in waveforms.There are only certain amounts of usable waveforms that can be used, so it needs to be divided up so not to overlap each other. We would not want radio signals being broadcast on the same frequencies as aircraft use, since this could be catastrophic interference. For this reason, governments allot specific bands of frequencies to certain industries and with the increasing value of wireless technology; this has become a great resource to a country. Many countries have turned to a form of auction to sell rights to this valuable resource.These auctions provide companies the ability to offer a product to their customers, as well as bring in additional funds to the government. In an effort to broaden their wireless networks and look to the future with 4G, Germany recently went through such an auction. In 2008, Germany finished its analog to digital transition, which frees up a substantial amount of bandwidth. Having enough bandwidth to allocate, the German government put 358. 8 MHz of spectrum space up for auction, which concluded in May 2010. The 358. MHz that Germany auctioned off consisted of four bands: 800 MHz, 1800 MHz, 2100 MHz and 2. 5 GHz (Tolaga Research. 2010). Having four separate bandwidths for sale boosted competition since there were multiple bidders, which should then set up Germany to enhance their technology, as well as build a strong and growing economic future. One of the main functions of government is to build and maintain a strong infrastructure, which is usually thought of as freeways and bridges, but in the modern techno world, a strong broadband and wireles s infrastructure is just as important.To improve their current infrastructure, Germany set a few conditions within the spectrum auction. The winning bidders are required to focus on improving coverage in â€Å"rural markets before they are permitted to service urban areas† (Tolaga Research. 2010). Companies are forced to provide service to outlying areas with the smallest population first, then eventually getting to the cities where the companies can start providing 4G networks. These auctions not only will provide a vast wireless infrastructure for Germany, but also provided proceeds of 4. 85 billion euro ($5. 882 billion USD) (Tolaga Research. 2010). One of the top bidders in this German auction was Deutsche Telekom, which is the parent company to T-Mobile. This German company is known worldwide which says a lot about the importance of wireless in Germany. Deutsche Telekom has 130 million mobile customers, 17 million broadband customers and around 4. 6 million internet tele vision customers in 50 countries around the world. Because of their success, this company employs over 233,000 people, has revenue of 58. 7 billion euros ($78. billion USD) and is ranked in the top 100 companies worldwide. Just in Germany, Deutsche Telekom has 35 million mobile customers and revenue of 24 billion euro ($32. 1 billion USD) and is building a strong business class offering an expanding Cloud service and network security. Deutsche Telekom is one of the biggest wireless providers in the world and with a free cash flow of 6. 4 billion euros ($8. 56 billion USD) they were one of the top bidders during the auction and will now be paving the way for a strong wireless system in Germany (Deutsche Telekom. . d. ). Building a strong wireless network can really help boost a nation’s economy, both immediately and in the future. There is evidence to support that wireless technology provides immediate jobs, boosts production as well as saving money on government expenses, suc h as healthcare. Germany has the 5th economy in the world and the largest in Europe but since they don’t have many natural resources they need to find other means of prosperity and with a strong wireless network this economy can flourish.Decreasing demand for German exports, a financial crisis in Europe and high unemployment has placed a financial burden on the country (Central Intelligence Agency. 2012). The German government has taken steps to try to boost the economy and strengthening the wireless network is one-step closer. The tagline from the movie Field of Dreams: â€Å"if you build it,† they â€Å"will come† could also be the tagline for the German marketplace (Frankish, B. & Robinson, P. 1989). Building a network that will allow businesses to be creative and invest will attract companies to an already business friendly location.According to Ernst & Young’s European Attractiveness Survey 2012: Germany is one of the most attractive business locatio ns in the world, while an American Chamber of Commerce study found that 73% of American companies named Germany their first choice to do business with and invest in (Germany Trade and Invest. 2012). So many companies prefer to do business in Germany due to the countries welcoming attitude toward foreign investments. The German government makes no distinctions between domestic and foreign companies and with very little regulations, it is ideal for business start-up.To entice companies and individuals from around the world to invest within Germany, the government provides incentives, such as grants for start-up capital as well as grants to help with wages as companies start hiring employees. There are over 55,000 foreign companies in Germany, employing around 3,000,000 people. The majority of investments in Germany are in ICT (information and communications technology) and software making up 18% of the GDP, so to improve the wireless sector will provide even more opportunity and growt h (Germany Trade and Invest. 2012).With such a great business environment, one field that can really succeed with a good wireless system is software development. The creation of mobile apps has become one of the most lucrative businesses and the more people that have access to wireless the more this business will grow. To date there has been 18 billion Apple apps downloaded followed by 10 billion downloads for Android. The downloads for Apple and Android apps produce $1 billion a month worldwide so there is a lot of potential for software companies, especially in a country that makes it easy for companies to do business in.There is no direct data for Germany, but in 2011, the United States had over 5000 job posting for app developers so with Germany pushing the wireless market there is a lot of potential for jobs to be created (Executive Office of the President Council of Economic Advisors. 2012). Mobile apps are in such high demand that just two months after HBO released its mobile app, 3 million consumers downloaded it, which makes up more than 10% of HBO’s subscriber base (Executive Office of the President Council of Economic Advisors. 2012).More companies are also turning to streaming, especially since the number of people that view video content with their mobile devices has doubled in two years and this will increase even more when more people have access to 4G or LTE. According to Dr. Thomas Schierl of Fraunhofer Institute for Telecommunications in Berlin, Germany: â€Å"Today’s mobile internet is faster than the typical DSL connection people have in their homes, which means a lot of users will choose to go online vie LTE even when at home† (Federal Ministry of Education and Research. 2013). Dr.Schierl is in charge of combining the video compression standard currently used with the LTE standard (similar to 4G) which will allow for the best possible streaming of content. Germany is actively trying to make wireless technology better a nd with a better streaming format, there will more opportunities for companies to add streaming content. Many U. S. companies have been extremely successful with streaming formats such as Funny or Die blip. tv, along with many sports venues offering pay per view on mobile devices. A fast network is not only attractive to consumers but allows more opportunities for company start-ups.There is obviously a lot of potential for jobs to be created for software developers that make entertainment apps however there are other apps developed that boosts production. With the use of mobile devices, employees are able to have video conferencing from any location, which can save time and money. There are also numerous apps that are more focused on certain industries, such as transportation logistics, inventory and sales data just to name a few. These applications allow employees to perform work functions from anywhere, which can make someone much more productive.It is estimated that by the year 2 016 there will be 830 million users of business-employee and business-consumer apps so this is definitely a growing trend that creates jobs for people developing the apps as well as increasing production for employees in other fields (Executive Office of the President Council of Economic Advisors. 2012). Besides the mobile apps boosting productions from employees, the wireless devices can also increase production by allowing employee’s work locations to be more flexible which they can then access information and resources while being on the go.The Intel Corporation performed a study on mobile productions and found that with better mobile devices, employees were able to finish their tasks 37. 3% faster. According to this study, there was a 5% weekly timesaving, which equals 100 hours saved per employee during the course of a year. The employees in the study also commented that they had a better outlook on production; therefore, it made them even more productive while increasin g their morale (Intel Information Technology. 2003).This study involved just the mobility aspects since the employees were using laptops, but given other mobile devices such as smartphones or tablets, then the use of applications could even increase production more. Mobile apps have become an asset to many businesses and as mobile devices and wireless areas continue to grow, new business related apps would also grow boosting production at the same time. When it comes to mobile devices, applications are not the only benefit to businesses because in addition to increasing production they can also save companies money.A growing trend for small businesses is the utilization of cloud-based storage offered by Apple and a few other companies. On-line storage is used publicly to save pictures and music, but businesses have found this to be very beneficial since this type of storage does not require any additional fees. Information can be backed-up from anywhere and the company does not have to buy expensive on-site back-up systems (Executive Office of the President Council of Economic Advisors. 2012). In addition to on-line storage, the mobile devices themselves save a company money, since they are a low cost way of accessing web-based services.When widespread wireless is available, mobile devices can perform many of the functions of a more expensive computer so they have become a cheaper alternative. According to an AT&T survey of small business: 1/3 use a cloud based storage while ? use business based apps (AT&T. 2011). When there is a good wireless infrastructure, mobile devices can improve a countries economy because they can create jobs, boost employee production and save companies money but it can also help with one of the country’s biggest cost: healthcare.As with most countries, healthcare is one of the biggest expenses for Germany. According to the OECD (Organization for Economic Co-operation and Development), Germany’s healthcare expenses make up 11. 6% of the entire GDP which makes it one of the biggest single expenses. Germany has the fourth health expenditure in the world (United States has the highest) so any savings within the healthcare industry can help the economy of the entire country (OECD. 2012).Wireless technology has the ability to drastically reduce cost for healthcare by making it more efficient. With Germany working on providing wireless capabilities in rural areas, doctors will be able to interact with elderly patients in the outlying areas, which can help with preventive care while also freeing up, more time for doctors so they can see more patients. The whole system also has the ability of becoming more efficient by allowing doctors to instantly retrieve health records, diagnostic information, lab results and even medical images.With the right apps, these records can be retrieved from any location at a moment’s notice, which saves time and money. One such company that has software that can help t he medical field is Airstrip’s Technologies. Airstrip’s Technologies offers mobile apps that send real-time waveform data directly from the hospital monitoring equipment to mobile devices. Using this app allows physicians that are waiting to perform childbirth to monitor fetal heartbeats, maternal contractions as well as other vital signs so they can monitor the situation from any location.Another very useful app is Mobile MIM, which allows doctors to have access to diagnostic images, such as MRIs, X-rays and ultrasounds that will allow fast and accurate diagnosis from any location as well as consult with peers for difficult cases. There are other apps available that can monitor blood pressure, glucose levels, bone density and even an app to record the time and place an inhaler was used which can be used to help prevent asthma attacks (Executive Office of the President Council of Economic Advisors. 2012).Just the remote monitoring of routine patients can save a lot of money, but one of the biggest overall costs with healthcare is patients with chronic conditions. One way to battle, the cost of chronic disorders is to identify the problems as early as possible therefore keeping the patients out of hospital beds. Corventis Inc. is a company that can help with these high costs. They have developed an app that monitors a patient’s heart rate, respiratory rate and other vital signs and also detects and transmits directly to the physician any irregularities.This will help catch any problems as early as possible (Executive Office of the President Council of Economic Advisors. 2012). Healthcare is a huge expense to a country and it is continually rising, but with the help of wireless technology these costs can be reduced which can actually help the entire economy of a country. The United States does spend more on healthcare than Germany, but according to the White House the U. S. is expected to reduce healthcare cost by $2-$6 billion, by the year 2014 with the help of wireless technologies available (Executive Office of the President Council of Economic Advisors. 012). Psychological considerations and sociological effects Personal Communication (Wells) When it comes time to speak to someone, the first device reached for is the cell phone. It is not to necessarily call, but text someone what they need or feel. Communication has changed the world in how we speak to one another. A family can now speak continents apart from each other via email, instant messaging, Skype, Facebook or Twitter. However, misunderstandings tend to occur due to lack of interpretation of body language, tone and facial expressions.Over 66% of marriages in the US end in divorce due to Facebook (Mills, 2011). Apologies are now text instead of heard. Have we become blinded by the method in which we communicate to the point of feeling this is normal? In today’s age of wireless technology, communication has affected us in a unique methodology renderin g us vulnerable emotionally numb, socially inept and psychologically indifferent without our awareness of this gradual change (Silverman & Blackwell, n. d. ). Texting has invaded the world by storm.A software engineer by Neil Papworth, to Vodafone director Richard Jarvis, who received the message on his Orbitel 901 cell phone, sent the first text message from a computer to a mobile phone in 1992 (Turrettini, 2012). Since then, there have been an explosion of text messages from 14 billion in 2000 to 188 billion in 2010, according to a Pew Institute survey (Kluger, 2012). That number has not decreased. CNN’s article series of â€Å"We Never Talk Anymore† has revealed how much we truly do not talk to one another. Today six billion short messages service (SMS) are sent every day in the United States and over 2. trillion are sent a year, according to Forrester Research (Haraldsson, 2012). Globally, 8. 6 trillion text messages are sent each year, according to Portio Research (Kluger, 2012). The in-person communication has been lost in the midst of our new technological age (2012). The greatest fear is for the adolescent generation that sees this as a norm. As interpersonal skills are still in development, we find that texting does not aid in this development. Using text messaging halts some of the key important areas of interpersonal skills.Sherry Turkle, a Developmental Psychologist, believes that conversations with another person teach kids to, in effect, have a conversation with themselves (2012). This enhances the skills to think reason and self-reflect. In the United States, 75% of teenagers text, sending an average of 60 texts a day (2012). According to Pew Internet research, texting is teens' most common form of (Kelly, 2012) communication, beating out phone conversations, social networks and face-to-face conversations (Silverman ; Blackwell, n. d. ). It would even appear that texting has its own new language.Language has changed from verbally l aughing to â€Å"LOL† for â€Å"laughing out loud,† â€Å"OMG† for â€Å"oh my God/goodness/gosh,† depending on the language choice, and â€Å"TTYL† for â€Å"talk to you later. † TV shows are encouraging this method of language by vocalizing them. For example, â€Å"OMG† or â€Å"I-am-so-bored dot com. † As depicted from The Braxton’s Reality Show. This new-age form of communicating has lost the effect of apologies. Apology text now replaces the visual sincerity and eye gazing messages of â€Å"What I did was wrong and I am sorry. † A visual cue is missing when an apology is texted rather than said in person.These factors are creating a state of new adults that are interpersonal illiterate will not aid their relationship building skills (n. d. ). Emotional Disconnect (Wells) Facebook is a great way of staying connected, but it can also feel like an emotional battleground. Facebook has changed communication on a g lobal scale. From one side of the world to another there are phone applications that translate different languages and people can communicate across the globe. Emotional disconnections have allowed for cyber bullying and divorces due to a disregard for others feelings.It is easy to do when looking at a computer screen or cell phone rather than a human being. An overwhelming 95% of social media-using teens who have witnessed cruel behavior on social networking sites say they have seen others ignoring the mean behavior (Lenhart, 2007). At least 33% teens have been cyber bullied according to Pew Internet and American Life Survey, 2011. This new form of humiliation has created new advertisements to stop cyber bullying. This type of bullying has caused many parents to send their children to online schools to avoid the bullying mentality (Allweiss, 2013). Has internet roman take over as our new form of dating?More people are going to online match dating sites looking for a mate. An estima ted 40 million Americans have tried online dating and dating sites will collectively gross $2 billion in 2012 (Barber ; Bigham, 2012). Would this form of dating be similar to shopping online? There is a larger pool of choices; it offers an alternative to relying on family and friends as matchmakers. People are able to seek relationships with older age people and the increase in broadband access to the Internet has expanded the potential market. You can almost place 100 eligible bachelors or bachelorettes in your shopping cart and hope for the best.It is estimated that 1 in 5 marriages are a result of online dating. However, there is a difference between meeting many people and finding a compatible partner. Romance is difficult to come by if the interpersonal skills were not well developed during adolescence and even worse as they grow into adults. Online dating has its positives and negatives, but many have found that getting to know the person mentally has been a better experience for them. It is not limited to any particular type of group or fad; many singles have taken to utilizing the online dating as a better method of communication (Hoggard ; Hephzibah, 2012).This is also an attractive offer for predators as well. It was estimated in 2005 that 25% of rapists use online dating sites to find their victims (Barber ; Bingham, 2012). The popularity of online dating services has only grown since then. With the prevalence of rapes and sexual assault going unreported and the low conviction rate for those accused (1. 2%) (2012). Wireless technology forces us to fake our personalities because of the perception of how we are perceived. This transition of putting thoughts on the web has begun to affect the perceptions of who we are.Employers now review potential new employees Facebook page to get a

Thursday, November 7, 2019

Building A Computer Essays - Classes Of Computers, Free Essays

Building A Computer Essays - Classes Of Computers, Free Essays Building A Computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate system of microscopic switches called transistors found inside of computer chips. Binary system is defined as counting system that uses two digits one and zero (Gookin 49). A transistor is a basic building block of microchips; transistors are combined in formations called logic gates (White 39). Transistor can only create binary information: one if current passes through or zero if current does not, to work with transistors(White 39). Computer software uses Boolean logic, which is based on selecting true or false values used in computer programming (White 39). All personal computers have BIOS, which is an acronym for Basic Input Output System. The BIOS runs every time the computer is started, and it basically tells the computer how to act (White 19). The BIOS is a part of the boot up process, or a complex set of operations checking hardware that components are working properly. Besides BIOS and several other operations there is poweron self-test - POST being ran. POST test runs at the start up, and if it finds an error, it sends a warning message (White 5). Central processing unit CPU is the most important part of the personal computer, all other components work as a bridge to CPU (White 59). The speed of the processor is usually defined by using units called megahertz (MHz, also million frequency waves per second). CPUs are generally divided into two categories- CISC and RISC. CISC complex instruction set computing, uses many small instructions to carry out a single operations. CISC is a standard in todays processors. RISC reduced instruction set computing, uses less complicated instructions with simpler design. RISC microprocessors are cheaper, they produce less heat, and they are generally smaller in size compared to CISC. With less heat and smaller size RISC processors have great advantage in reaching higher frequencies with less danger of overheating. The major disadvantage and also reason why RISC microprocessors are not widely used, is less compatibility with available software. The earlier programs were written for CISC chips. I n order to reach maximal speed, and compatibility the major manufacturers of microprocessors such as Intel, use some advantages of RISC technology, to improve the performance of their CISC compatible microprocessors (White 55). Computer microprocessor is the most important part of the PC, but it can not work by it self. One of the few primary components is BUS, also called a highway of the computer. BUS transports data among the processor, random access memory, and hard disk. Speed of the BUS depends on the type of motherboard where it is installed (White 119). Random access memory- RAM is also attached to the motherboard- base of all the components, but unlike BUS, RAM can be easily removed and changed. Random access memory works as a staging area for the central processing unit (White 43). Capacity of random access memory is very important for the performance of a computer. In case there is not enough RAM the software can create space on the hard drive to be used as temporary operating memory (White 31). Random means that any part of the memory can be accessed at any time, it is not necessary to read all of the memory to find one location. RAM is usually fast, temporary memory where data is saved until removed or power is turned off on the computer (White 43). A hard drive is the workaholic of a PC system.(White 87)) It is based on using magnetic plates; spinning at extreme speeds up to 7,200 rotations a minute, which are 120 spins every second. Even with extreme speed and microscopic accuracy modern hard drives are unlikely to fail. The hard disk is a combination of electronic and mechanical portions, which makes it the one of the slowest parts of the computer (White 87). A graphic

Tuesday, November 5, 2019

Battle of Ezra Church in the Civil War

Battle of Ezra Church in the Civil War Battle of Ezra Church - Conflict Date: The Battle of Ezra Church was fought July 28, 1864, during the American Civil War (1861-1865). Armies Commanders Union Major General William T. ShermanMajor General Oliver O. Howard13,266 men Confederate Lieutenant General John Bell Hood18,450 men Battle of Ezra Church - Background: Late July 1864 found Major General William T. Shermans forces advancing on Atlanta in pursuit of General Joseph E. Johnstons Army of Tennessee. Reviewing the situation, Sherman decided to push Major General George H. Thomas Army of the Cumberland over the Chattahoochee River with the goal of pinning Johnston in place. This would permit Major General James B. McPhersons Army of the Tennessee and Major General John Schofields Army of the Ohio to shift east to Decatur where they could cut the Georgia Railroad. This done, the combined force would advance on Atlanta. Having fallen back through much of northern Georgia, Johnston had earned the ire of Confederate President Jefferson Davis. Worried about his generals willingness to fight, he sent his military advisor, General Braxton Bragg, to Georgia to assess the situation. Reaching Atlanta on July 13, Bragg commenced sending a number of discouraging reports north to Richmond. Three days later, Davis directed Johnston to send him details regarding his plans for defending the city. Displeased with the generals noncommittal response, Davis decided to relieve him and replace him with the offensively-minded Lieutenant General John Bell Hood. As orders for Johnstons relief were sent south, Shermans troops began crossing the Chattahoochee. Anticipating that Union forces would attempt to cross Peachtree Creek north of the city, Johnston drew up plans for a counterattack. Learning of the command change on the night of July 17, Hood and Johnston telegraphed Davis and asked that it be delayed until after the coming battle. This request was refused and Hood assumed command. Battle of Ezra Church - Fighting for Atlanta: Attacking on July 20, Hoods forces were turned back by Thomas Army of the Cumberland at the Battle of Peachtree Creek. Unwilling to surrender the initiative, he directed Lieutenant General Alexander P. Stewarts corps to hold the lines north of Atlanta while Lieutenant General William Hardees corps and Major General Joseph Wheelers cavalry moved south and east with the goal of turning McPhersons left flank. Striking on July 22, Hood was defeated at the Battle of Atlanta though McPherson fell in the fighting. Left with a command vacancy, Sherman promoted Major General Oliver O. Howard, then leading IV Corps, to head the Army of the Tennessee. This move infuriated the commander of XX Corps, Major General Joseph Hooker, who blamed Howard for his defeat the previous year at Chancellorsville when the two were with the Army of the Potomac. As a result, Hooker asked to be relieved and returned north. Battle of Ezra Church - Shermans Plan: In an effort to compel the Confederates to abandon Atlanta, Sherman devised a plan that called for Howards Army of the Tennessee to shift west from their position east of the city to cut the railroad from Macon. A critical supply line for Hood, its loss would force him to abandon the city. Moving out on July 27, the Army of the Tennessee began their march west. Though Sherman made efforts to conceal Howards intentions, Hood was able to discern the Union objective. As a result, he directed Lieutenant General Stephen D. Lee to take two divisions out the Lick Skillet road to block Howards advance. To support Lee, Stewarts corps was to swing west to strike Howard from the rear. Moving down the west side of Atlanta, Howard took a cautious approach despite assurances from Sherman that the enemy would not oppose the march (Map). Battle of Ezra Church - A Bloody Repulse: A classmate of Hoods at West Point, Howard expected the aggressive Hood to attack. As such, he halted on July 28 and his men quickly erected makeshift breastworks using logs, fence rails, and other available material. Pushing out from the city, the impulsive Lee decided not to assume a defensive position along the Lick Skillet road and instead elected to assault the new Union position near Ezra Church. Shaped like a reverse L, the main Union line extended north with a short line running west. This area, along with the angle and part of the line running north, was held by Major General John Logans veteran XV Corps. Deploying his men, Lee directed Major General John C. Browns division to attack north against the east-west portion of the Union line. Advancing, Browns men came under intense fire from the divisions of Brigadier Generals Morgan Smith and William Harrow. Taking immense losses, the remnants of Browns division fell back. Undeterred, Lee sent Major General Henry D. Claytons division forward just north of the angle in the Union line. Encountering heavy resistance from Brigadier General Charles Woods division, they were forced to fall back. Having wrecked his two divisions against the enemys defenses, Lee soon was reinforced by Stewart. Borrowing Major General Edward Walthalls division from Stewart, Lee sent it forward against the angle with similar results. In the fighting, Stewart was wounded. Recognizing that success was unobtainable, Lee fell back and ended the battle. Battle of Ezra Church - Aftermath: In the fighting at Ezra Church, Howard lost 562 killed and wounded while Lee suffered around 3,000. Though a tactical defeat for the Confederates, the battle prevented Howard from reaching the railroad. In the wake of this strategic setback, Sherman commenced a series of raids in an effort cut the Confederate supply lines. Finally, in late August, he began a massive movement around the west side of Atlanta that culminated with a key victory at the Battle of Jonesboro on August 31-September 1. In the fighting, Sherman severed the railroad from Macon and forced Hood to depart Atlanta. Union troops entered the city on September 2.

Sunday, November 3, 2019

Sport Sponsorship Essay Example | Topics and Well Written Essays - 250 words

Sport Sponsorship - Essay Example Sports sponsorship emerged and has developed based on the fact that most sports teams and events lack the financial muscle to sustain themselves and sponsors come in to assist. Businesses identify a promotion opportunity created by huge audiences sport events bring together. It would then see business associate with sport clubs and events that act as agents of business promotion for the sponsors. This is a mutually beneficial move as both the sponsored and sponsors gain advantages (Fortunato, 2013:88). There are, however, several issues that come along with sponsorship. Cultural factors may prevent successful sponsorship as the players culture may not synchronise with the sponsor’s promotions (Stotlar, 2009: 112). Additionally, negative associations in which many sponsors that promote two contrasting products may sponsor the same event or club. Also, sponsorship fits in which large companies are to be involved poses a problem. The mutual benefit that both the sponsors and the sponsored teams gain cannot be overlooked. It has proved to be a considerable force behind the development of sports across the world and it deserves to be recognised as much as possible. Sponsorship benefits both parties involved and, therefore, quite