Saturday, November 30, 2019

The True Story Of A Black Youths Essays - Mark Mathabane

The True Story of a Black Youth's Coming of Age in Apartheid South Africa Mark Mathabane I. Main Characters A. Johannes (Mark) Mathabane--Kaffir Boy revolves around Johannes for the simple reason that he is the author of this book. Growing up in Johannesburg, South Africa was especially hard for Johannes. Johannes is very smart and graduated at the top of his class during his 13 years of schooling in apartheid South Africa. Johannes has had a lot of courage and perseverance throughout his life. B. Jackson Mathabane--Johannes's father came from what is now the so-called independent homeland of the Vendas in the northwestern corner of the Transvaal. Johannes's father tried desperately to support his family, but in times of dire need, he backed away and depended on alcohol and abusive behaviors. Johannes's parents met and married in Alexandra on March 21, 1960. C. Mother--Johannes's mother came from Gazankulu, the tribal reserve for the Tsongas in the Northeastern Transvaal. She is a very loving and devoted woman. D. Johannes's siblings--Johannes has five sisters and one brother. His sisters names are Florah, Linah, Maria, Merriam, and Linah. George was his only brother. E. Ellen Mabaso--Ellen was the mother of Johannes's mother. She was a humble woman who bore four children: Uncle Piet, Aunt Bush, Uncle Cheeks, and Johannes's mother. she had a statuesque figure--tall, limber, and ebony colored complete with tribal attire and multiple anklets, beads, earrings and bracelets. She could easily been a chief's daughter. Her friendly, brown eyes had the radiance of pristine pearls. She was the most beautiful woman Johannes had ever seen. She worked six days a week, from seven to five, mowing lawns, raking leaves, clipping hedges, watering plants, sweeping driveways, cleaning yards and pruning trees for white people. F. Mr. Brown--Mr. Brown was one of the few people in the yard where the Mathabane's lived with the equivalent of a high-school education. He was a bus driver for PUTCO, but he also operated a moving service that transported people and goods between Alexandra and the tribal reserve of the Vendas. G. Mrs. Smith--Mrs. Smith was Granny's employer. She was a short, slender woman with silver hair and slightly drooping shoulders. Granny was the Smith's gardener. H. Clyde Smith--Clyde is the son of the woman who Granny works for. He is a young boy who is somewhat of a snob. As he grows, he learns to like Johannes and they become friends. I. Scaramouche--Scaramouche was a self-employed painter. He was also one of the best tennis players among people of color in Johannesburg. An excellent coach, he was well connected in white and black tennis circles. He agreed to be Johannes' coach. Scaramouche turned out to not only be a great coach but a confidant and a surrogate father. He was firm and demanding but not authoritative and stifling. Instead of teaching Johannes his style of play, he let Johannes acquire his own way. J. Tom--In June of 1972, Johannes met Tom. He is a lanky Zulu tennis player. He was very harmless-looking K. Wilfred Horn--Wilfred married to Norma. He respects black people and owns a tennis ranch in Halfway House called Barretts. He was a German immigrant. L. Arthur Ashe--Arthur Ashe was a Negro tennis player that Johannes admired very much. he condemned apartheid and did not pretend he was a white man erroneously painted black. Arthur always appeared calm, cool, and collected, even when he was surrounded in a sea of white faces. M. David--David was the number two singles player on the tennis team. He was soft-spoken, politically sensitive, and a brilliant Zulu student whose love for the English language exhaled Johannes's. Johannes and David frequently exchanged books, did English homework together, read prose and poetry together, trained together, and sat on the same seat during tennis trips. David was the first close friend Johannes ever had. The only difference between David and Johannes was that David was a womanizer. N. Helmut--Helmut was a short, brown-haired bespectacled white man with a barrel chest. He was always dressed in flashy clothing. He came from a small town in Germany and was working for a German company in South Africa only a few months before he met Johannes. He turned out to be a horrible tennis player, but good practice

Tuesday, November 26, 2019

Pre-Ap U.S. American History Paper (Revisionism) essays

Pre-Ap U.S. American History Paper (Revisionism) essays What is revisionism? I see it as the way the dominant society ruled. The way things are ruled depends on the morals of those in the dominant place. Though the native Americans were the first to live here, their overall peaceful traditional way of life has almost vanished completely. It has morphed into the European culture. This European culture now regulates 99% of American land. Therefore when Im talking about American revisionism it will be mostly through the European culture. The view of the earliest Europeans who came to America was full of apathy of anything the king and queen of their country didnt particularly care for. The rulers of the conquesting countries demanded gold or anything else of great value to be discovered by their feeble, poverty stricken minions (sailors and exploration soldiers). The minority group who were rich or well off( I.E Christopher Columbus) desired not to defy their leaders for the fear of losing his comfortable lifestyle or maybe even his life.. There have been claims that their faith was strong. Evidently due to the actions of the majority of the soldiers this isnt true. Thou shall not kill yet they very much killed any native that wasnt to their liking. Thou shall not commit adultery, yet many of them raped. And when they were tired of their sex toys these poor people were exterminated. The Christian God also says to love thy neighbor (love your fellow human beings) and that all men (and women) are created in the image of him (God). This was blatantly disregarded considering that the early explorers cared about how the natives felt as they cared about how the grass feeling when walked on. The natives across the lands had mixed thoughts that seemed to unfortunately tie together to ignorance. Not knowing such an overbearing conflicting culture, one that will plow up the ground, pull down the trees, kill everything...( Wintu Woman, 19 century) they ...

Friday, November 22, 2019

12 Imaginary Places

12 Imaginary Places 12 Imaginary Places 12 Imaginary Places By Mark Nichol Religion, legends, and literature alike are replete with various conceptions of ethereal or terrestrial paradises or places with romantic flair. Here are a dozen examples of ideal locales, including their names, their origins, and their definitions. 1. Arcadia (the Greek region of Arcadia): an idealized, unattainable pastoral state, bereft of civilization 2. Atlantis (allegorical legend recounted by Plato): an island with a complex, advanced civilization that was submerged in a cataclysmic disaster in preclassical times) 3. Camelot (European legends and folklore): the seat of the court of King Arthur, renowned for its splendor 4. Cockaigne (European medieval legend): a place of idleness and luxury 5. El Dorado or Eldorado (Spanish legend): the name given to a Native American chieftain and, by extension, to the prosperous city and surrounding empire he supposedly ruled; later, a metaphor for happiness or personal fulfillment 6. Erewhon (Samuel Butler’s satirical novel Erewhon): a seemingly utopian society with the same flaws as actual civilization 7. Faerie (European fairy tales and folktales): the magical realm of fairies and other legendary beings 8. Neverland or the Neverlands or Never Never Land (J. M. Barrie’s stage play Peter Pan and his novelization Peter and Wendy): an idyllic land serving as a metaphor for escapism and perpetual childhood 9. Shambhala (Buddhist tradition): a mythical hidden kingdom in Central Asia adopted as an ideal state by believers in mysticism 10. Shangri-La (James Hilton’s romantic novel Lost Horizon): an idealized paradise in a hidden valley in Asia 11. Utopia (Sir Thomas More’s allegorical novel Utopia): an island with a harmonious sociopolitical system; in uncapitalized form, any idealized society 12. Xanadu (Chinese history): a city in what is now Inner Mongolia, the historical summer palace of Kublai Khan, but also, inspired by Samuel Taylor Coleridge’s poem Kubla Khan, an idealized place of luxurious splendor Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Fiction Writing category, check our popular posts, or choose a related post below:Writing Prompts 101Capitalization Rules for Names of Historical Periods and MovementsThrew and Through

Wednesday, November 20, 2019

Ch10 Case Study Example | Topics and Well Written Essays - 250 words

Ch10 - Case Study Example These facets will help managers and other employees to make better decisions keeping in mind the current scenario and the organizational culture of the organization. The norms accepted by the employees, their emotions regarding various aspects, so on and so forth will help in building high emotional intelligence in employees (Cote and Miners, 27). Yes the program being implemented in J&J would be successful in improving the emotional intelligence of employees. It is appropriate to consider abilities in job performance evaluations. Observational learning is a very important tool that help individual learn many characteristics and traits that should be possessed by them for success. By attending training programs, those employees that aspire for success would work upon bringing a change in themselves and work upon having high emotional intelligence. All those abilities should be evaluated for evaluation of job performances that are required for the job role as the multi skills present in employees allows many tasks to be conducted successfully for the firm. Manufacturing and quality control recalls can be avoided if managers control the resistance in employees due to any mishap occurring in the firm. All negative emotions from the employees need to be removed. The managers need to ensure that the goals of the employees are in alignment with the goals of the organization and accordingly deal with all the manufacturing and quality related concerns of the firm. Stronger relationships are built, stress at workplace is reduced which leads to better productivity. The other abilities in avoiding recalls in organizations are through employees having an optimistic view of work and life. Having abilities to work hard and work under pressure by following the guidelines exactly allows recalls to be avoided in manufacturing and quality control

Tuesday, November 19, 2019

Politicians Justify Spending on the London Olympic Games as Being Good Essay

Politicians Justify Spending on the London Olympic Games as Being Good for the Economy - Essay Example With the onset of the games, government officials are declaring that the games would be good for the economy and justify spending because of the benefits which the games can bring to the city and the country in general. This paper shall explain the various justifications being made for the spending on the London Olympic Games. Body In general, the Olympic Games is a major sports event which has a significant scale and can potentially bring about economic developments for the host city or for the host country as a whole. The games usually unfolds for a few weeks only however, the preparations for the games usually takes place months, even years before the event and would require considerable investments from the government and the private sector. Its impact on the economy soon after the games can also be significant and sustainable for years after the event (Pricewaterhouse Coopers, 2004). This potential can also be seen with the London Olympics. The exact economic impact of the Olymp ic Games to the host country or city is spread out over years and is seen in three stages – before, during, and after the games. ... During the games, economic activities within the city would also increase through the tourists and through the athletes attending the games. Finally, after the games, the Olympic legacy potentially would keep drawing in more tourists and investors because of the infrastructures and the other attraction which the city can now offer (Pricewaterhouse Coopers, 2004). Tourism is one of the major benefits of the Olympics, one which can be seen before, during, and after the games. The Olympics provide a special avenue which draws local and foreign tourists to the city. Visitors who are involved in the games, including the athletes, coaches, and other team officials, as well as the spectators, media, and sponsors are to be accommodated within the city (Booth, 2009). The promotion of the games would also draw in the tourists due to the media exposure and enhanced international reputation. The visitors would start to trickle in within a few months from the games and would swell to bigger numbe rs during the games. Therefore, the Olympics can sustain the city’s economy for several years after the Games (London Development Agency, 2008). Tourists can increase demands on the regional and local economy with visitors spending money on food, accommodations, transportation, and tickets for the Games. The revenues from the media broadcast and sponsors will also accrue to the city; and the IOC would generally profit from these revenues (Pricewaterhouse Coopers, 2004). Secondary effects would also be seen with money being spent within the host country. This is known as the multiplier effect where additional activities and employment opportunities related to the games are made

Saturday, November 16, 2019

Ethernet system Essay Example for Free

Ethernet system Essay Robert Metcalfe with his colleagues at the Xerox Palo Alto research Center (PARC) developed the experimental Ethernet system. According to O’Reilly and associates (2000) the main purpose of developing the Ethernet system is to interconnect a personal workstation with graphical user interface called Xerox Alto. The experimental system was used in order to connect Altos and also printers and servers. The systems interface‘s signal clock was patterned in the Alto’s system clock. This resulted to 2. 94 Mbps. data transmission rate on the experimental Ethernet. Ethernet was originally known as Alto Aloha Network. Alto Aloha Network was changed its name to Ethernet by Metcalfe to indicate that the system not only support Alto’s but also other computers. And Metcalfe also point out that the Ethernet has progressed way beyond the Aloha system. He chose the name ether as to describe the essential feature of the system which is the physical medium carries bits to all stations the same way as the aluminiferous ether was once believe to proliferate There are two ways which can be used to allocate the capacity of transmission media: baseband and broadband transmissions. Baseband transmission allocates the entire capacity of the medium to one communication channel. It uses distinct values by measuring the voltage in wire which only carried one signal at a time. In broadband transmission, the system allows two or more communication channels to share the bandwidth of the communication medium. The system uses the technique of dividing the bandwidth into frequency bands which is called frequency division multiplexing (FDM) which works only with analog signals. There is also another technique called time-division multiplexing (TDM) that supports digital signals. Figure 1, show the difference between baseband and broadband transmission mode of operation: Figure 1. Difference in the mode of operation between baseband and broadband Broadband transmission is used in the web hosting companies. This is because of the higher speeds of the broadband. With the use of broadband, people can enjoy the full range of internet services like downloading videos, music, watching movies and plying online games. Transceivers have different speeds which are measured in MHz and also specified in wavelengths. The larger the value of the fiber core of the transceivers, measured in microns, there will be more bandwidth possible but also the distance will be shorter. The 1000 Base-LX is the long wavelength with a signaling speed of 1. 25 ±100 ppm GBd. This transceiver can use both 62. 5 and 50 micron multimode fiber and it also uses single-mode fiber optic cables with distances of 440m, 550m and 5 km. Another transreceiver is the 100 Base-TX which uses 4B5B binary encoding to encode 100 Mbps data stream in a signal of 125 MHz. One pair is used for transmitting data while the other pair is used for receiving the data. Given this, one user can setup a system for full duplex communication given that there are only interfaces in the same collision domain. It is either the two computers are directly connected to each other by crossover cable or a computer directly connected to a switch. Full duplex communication result to doubling the potential throughput but not often reached more than the modest improvement. Based on Sheldon and Big Sur Multimedia (2001), link aggregation is the process of connecting together two or more data channels in order to become a single channel which appears as a single, higher-bandwidth logical link. Also this aggregated links can provide redundancy and fault tolerance if the links follow different physical path. By linking the digital lines, the link aggregation improves the access to public networks. The aggregation is also use in enterprise network to build multigigabit backbone links. It also allows the network’s backbone speed to grow increasingly when the demands on the network increases without replacing everything and buy new and expensive hardware. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol was intended for local area network (LAN) environments where in all the nodes are positioned few hundred feet from each other. The importance of the protocol is to listen up each node to the channels in a short period of time before it transmits. The main assumption of the protocol is that each node should be able to hear the transmission from every other station. But this assumption is violated in access network and this resulted to several problems. One of the serious problems encountered is the hidden transmitter problem. This occurs when the CSMA/CA cannot function properly due to a wireless node cannot hear one or more of the other nodes. And when this happen, multiple nodes attempt to transmit their data simultaneously over the shared data thus resulting to interference with each other. To address the hidden transmitter problem, the 802. 11 standard uses the protocol request to send/clear to send (RTS/CTS). Before transmitting each packet, each node transmit an RTS packet to other nodes to warn them that it is about to transmit data and after each transmission, it broadcasts CTS packet. This process is time and bandwidth consuming process and it is required for each and every transmission by each and every wireless node. But this process sill does not address the hidden transmitter problem fully because RTS/CTS packets are subjected to repeated collisions. In most applications, the wireless standard 802. 11b operating at 2. 4 ghz is ample enough. This wireless standard is the mostly widely accepted standard among the three wireless standards and also the price of the equipment is the cheapest because of the rising demand for the 802. 11g. Its distance will rely mostly on the communicating devices whether it have line of site or not. And with fewer obstacles among the transmitting and receiving devices, there will be better wireless connection and therefore much better web surfing. The 802. 11b wireless standard is good enough if using wireless route or access point only for internet usage because the connection to internet via broadband modem operates about 2mbps which is very fast. The 802. 11b transfer data at the rate of 11mbps which is sufficient for internet usage. This device saves money on equipment and gives great web surfing services. Another wireless standard being used is the 802. 11g standard. It is replacing the widely accepted standard which is the 802. 11b because both operate on the same frequency and the price drastically goes down on products. This standard is much very similar to 802. 11b because it also usually needs a line of site to achieve optical performance. Both standards, 802. 11b and 802. 11g operate at the same frequency range of 2. 4ghz and are inter-operable with each other. All the devices of 802. 11g can communicate with 802. 11 devices and the main advantage of the 802. 11g devices is that when transferring files betweens computers or networks, it is usually at a greater speed. It is recommended to use 802. 11g when using wireless connection to transfer files (data files, voice, music, and videos) around the home and office. 802. 11g standard also allows manufacturers to developed devices which work at speed of up to 108mbps because it recommended when transferring large data or audio files within LAN. Wi-Fi Protected Access (WPA) is a security technology that is used in wireless network. This was created by an industry trade group called the Wi-Fi Alliance which owns the trademark for the name Wi-Fi and certifies products that bear the name. WPA was created in order to response on the serious weaknesses of the previous system, the Wired Equivalent Privacy (WEP) and also to improve the authentication and encryption features of the WEP. It implements majority of the IEEE 802. 11i and intended to take place the place of WEP. It was designed in order to work with all wireless network interface cards but not with first generation wireless access point. Temporal Key Integrity Protocol (TKIP) is one of the key technologies behind WPA which deals with the encryption weaknesses of the WEP. Also the WAP have built-in authentication which is a key component. The WAP uses the RC4 stream cipher which has a 128-bit key and a 49-bit initialization vector (IV). With the combination of the TKIP and the RC4 stream cipher; this solves the problem of key recovery attacks which was found in WEP. In addition, the WPA provides much improved payload integrity. WPA uses a more secured message authentication code (MAC) but also termed as MIC which stand for message integrity code which is an algorithm â€Å"Michael†. MIC includes a frame counter preventing replay attacks. With the features of the WPA like having increased size of the keys and IV’s, reduced number of packets sent with related keys and adding up of a secured message verification system, it is far more difficult to break in within the system. There is one variation in WPA which is called the WPA pre shared key (WPA-PSK), which is also known as personal mode. This was designed for home and small office usage and networks which can’t afford the cost and complexity of the 802. 1X authentication server. To access the network, the user must enter a pass phrase, with 8 to 63 printable ASCII characters or 64 hexadecimal digits. This can be stored in the user’s computer with discretion under most operating system in order to avoid re-entry and must remain in the Wi-Fi access point. Protected Extensible Authentication Protocol (PEAP) securely transmits authentication information which includes password, over wired and wireless network. It is also an 802. 1x authentication type for wireless LAN’s. The PEAP is created by the Cisco Systems, Microsoft and RSA Security which is base on the Internet Draft submitted to the IETF. (Cisco Systems, 2007) The system uses only server side public key certificates which authenticate clients by creating encrypted SSL/TLS tunnel in between client and authentic server. This protects from casual inspection the resulting exchange of authentication. According to the Cisco Systems Inc. , the following are important benefits of the PEAP web security system: †¢ It relies on the Transport Layer Security (TLS) which allow non-encrypted authentication types (EAP-Generic Token Card and One Time Password (OTP)) support †¢ It uses the server-side Public-Key Infrastructure (PKI) based digital certification authentication †¢ It allows for the authentication to an extended suite of directories which include Lightweight Directory Access Protocol (LDAP), Novell NDS and OTPA databases †¢ It uses the TLS in order to encrypt all the user-sensitive authentication information †¢ It supports the password change at expiration †¢ It does not display the logon username in the EAP identity response †¢ The system is not susceptible to dictionary attacks †¢ It offer dynamic privacy protection while using in combination with Temporal Key Integrity Protocol (TKIP) or the Advanced Encryption Standard (AES) Also the PEAP have enterprise benefit. Based on the Cisco System Inc. , PEAP is based upon the server-side EAP-TLS. This means that organization can avoid the issue associated in the installing of digital certificates on every client machine which is required by the EAP-TLS. This provides the enterprise to choose what method of client authentication depending on their needs. PEAP authentication work in two phases: ? In phase 1, performing the server-side TLS authentication will result to creation of an encrypted tunnel and will achieve server-side authentication. One the process is done the data are encrypted with all the user-sensitive information ? For phase 2 according to the Cisco System Inc. , the client is authenticated by using methods like the EAP-GTC and the Microsoft Challenge Authentication Protocol (MS-CHAP) Public switched telephone network (PSTN) is referred as the public communication providing local, extended and long distance call telephone service. It is composed of telephone exchanges arranged in order to have nationwide telephone communication system. The system is open for those who can afford the service. Packets, pieces of the caller’s conversation are switched and then sent simultaneously to many connections to reach a receiver in the other end. All the phones in PSTN are connected in a way that any phone can call to any other phone due to all the local phone systems are connected to each other. Mitchell (2007) cited that PSTN provides the traditional Plain Old Telephone Service (POTS) to establishments and residences and also some parts of the PSTN are being utilized for DSL, VoIP and other internet-based network. In much relation to internet, this provides much of the internet’s long-distance infrastructure. Internet service providers (ISP) pay the long distance provider for the access to their infrastructure and they share the circuits among users in the process called packet switching. PSTN network link supports 64 kbps and in residences the PSTN phone lines carrying the bandwidth is made up of copper cable. Dial-up modems utilize 56kbps of the bandwidth when they are connected to a phone line. Also the PSTN utilizes the SS7 signaling protocol. SS7 signaling protocol support the exchange of special-purpose messages on public telephone networks. SS7 messages pass over separate channel different from the channel used for voice communication and it is referred as out of band signaling. Wireless local loop is sometimes called radio in the loop (RITL) or fixed –radio access (FRA). It is a system that connects users and subscribers to the public switched telephone network (PSTN) by the use of radio signals as substitute for copper for all part of the connection between subscriber and the switch. This includes cordless access systems; propriety fixed radio access and fixed cellular systems. One of the advantages of the wireless local loop is that it can be deployed in just weeks or months in comparison with copper wire systems which took months and years for the deployments. The instillation of the wireless local loop considerately has much lower construction cost than laying copper lines. The maintenance and operations of the wireless local loop are that easy and the average maintenance time per subscriber is shorter by 3 to 4 times. Signaling is the exchange between information which concerns about the establishment and in the control of a connection and the management of the network. There are many types of signaling: †¢ In-band signaling pertains to the exchange of signaling information within the same channel of the telephone call †¢ Out-of-band signaling is telecommunication signaling meaning exchange of information to control telephone call. It is done over a channel and it separates from channels which is use for telephone call. This signaling is used by Signaling system #7, the signaling standard controlling the world’s phone calls †¢ Line signaling is much concerned in transmitting information on the state of line or channel †¢ Register signaling is focused on the transmittance of information in the calling/ called telephone number †¢ Channels-associated signaling utilizes signaling channels dedicating to a specific bearer channel †¢ Common-channels signaling, utilizes signaling channels which transmit signaling information to multiple bearer channels. †¢ Compelled signaling pertains to the need of the receive signal to be fully acknowledged before the next signal is sent. †¢ Subscriber signaling pertains to the telephone and the telephone exchanges †¢ Trunk signaling pertains to the exchange. References Buis, Paul. (1996, September). Common 100 Mbps Hardware Variations. Ethernet Technology:Underlying Technologies. (Chapter 4). Retrieved September 16,2007 from http://www. cs. bsu. edu/homepages/peb/cs637/ethernet/100mbps. htm Computer Hope. (2007). Ethernet. Retrieved September 16,2007 from http://www. computerhope. com/jargon/e/ethernet. htm ETSTechNEWS. What is the difference between 802. 11g and 802. 11b? Retrieved September 17, 2007 from http://web. monroecc. edu/ETSTechNEWS/80211g Fleishman, Glenn. (2003, November 4). Weakness in Passphrase Choice in WPA Interface. Retrieved September 17,2007 from http://wifinetnews. com/archives/002452. html GNS Wireless LLC. 802. 11a vs. 802. 11b vs. 802. 11g. 2007. Retrieved September 16, 2007 from the http://www. gnswireless. com/AvsBvsG. htm Laverty, Denis. WPA vs. WEP: How your Choice Affects your Wireless Network Security. Retrieved September 16,2007 from http://www. openxtra. co. uk/articles/wpa-vs-wep. php McLauren, Bruce. (1998). Cabling Options. How Gigabit Ethernet works. Retrieved September 15,2007 from http://misnt. indstate. edu/coutinho/ge/WORKS. HTM Mitchell, Bradley. Wireless/networking: â€Å"WPA: Wi-Fi Protected Access. Retrieved September 16,2007 from http://searchnetworking. techtarget. com/sDefinition/0,,sid7_gci214316,00. html Ou, George. (2005,June 2). Understanding the updated WPA and WPA2 standards. Message posted to http://blogs. zdnet. com/Ou/index. php? p=67 Pidgeon,Nick. Introduction to how Ethernet Works. The Ethernet. Retrieved September 16,2007 from http://computer. howstuffworks. com/ethernet. Sheldon, Tom. Link Aggregation. â€Å"The Encyclopedia of Networking and Telecommunications. Retrieve September 16,2007 from http://www. linktionary. com/l/link_aggregation. html Spurgeon, Charles E.. (2000). Why is it called Ethernet?. Ethernet: The Definitive Guide. Retrieved September 16,2007 from http://www. ethermanage. com/ethernet/ethername. html ICT Global. What is Ethernet?. Ethernet FAQ. Retrieved September 16,2007from http://www. ictglobal. com/ICT010/faq1. html Networking Essentials. Band Usage (Baseband or Broadband). Retrieved September 17,2007 from http://www. measureup. com/testobjects/MS_NetEss/5a67289. htm

Thursday, November 14, 2019

The Role of Trees in Terry Kays To Dance With The White Dog :: Dance With The White Dog Essays

The Role of Trees in Terry Kay's To Dance With The White Dog In the novel To Dance With The White Dog there are many similarities between Sam Peek and Kay’s father. The Dedication and Authors Note, located before and after the[b1] novel, give the reader insight into the true meaning of the book. In the Authors Note Kay speaks of his father and the fruit trees that he cared for; from this a correlation arises with Sam Peek and his beloved pecan trees. Terry Kay’s father cultivates fruit trees. Fruit trees generally live for approximately ten years then die off. It takes fruit trees three to five years before they will bear fruit. Overall fruit trees require a short term commitment. Although Kay’s father became famous for his well grown trees, it did not require the dedication and time that Sam Peek had to exert for his pecan trees.[b2] In the novel Sam Peek has dedicated his life to the growth and production of his pecan trees. Pecan trees take at least five years to yield fruit and can live up to seventy-five years. They take much more time and effort to yield profit. Cultivating pecan trees is a life long project. In the novel Sam Peek dedicates his life to the care of his pecan trees. In his old age, when he is retired from the tree business, he still has the commitment to go to the pecan orchard and pull weeds. This shows Sam Peeks strong bonds to his life and family[b3]. He is very much tied do wn to the land around his family home. His dedication to his trees is because he wishes to provide a good life for his family. He pours a lot of effort into this wish. While reading this novel the reader interprets the meaning of the author based on the knowledge that the book is fictional; however, when the reader finds out that there is some truth to the story at the end of the book they must reevaluate their interpretations.[b4][b4] Kay reveals in the Authors Note at the end of the book that the character of Sam Peek is based on his father.

Monday, November 11, 2019

Tugas English

Writing an Essay Give your opinion through an essay on the following statement. Computer games are very bad for people and they cause a lot of problems. Write your essay in 120-180 words in an appropriate style. Content: An essay should fully address the points made in the statement, discussing both whether or not computer games are bad for people and the answer of problems that they cause. Range of grammar and vocabulary: The present simple tense is likely to be required to talk about habits and general facts.Vocabulary connected with habits, leisure time and causes and results is required. Register: The essay could be fairly formal, informal or neutral, depending on how the candidate wishes to approach the topic. Organization and cohesion: The essay should be appropriately divided into paragraphs, separating points that agree with the statement in the questions and points that disagree. Appropriate linking between different points should be used (e. g. : On the other hand). The rea der:The essay should understand fully the writer’s opinions on the topic and the reasons why the writer has these opinions. Model answer: It is true that computer games can be bad for some people. Many of the games are very violent and some people may be influenced by this and then do the violent things themselves. I also believe that computer games can be additive and this can be bad for people. Some young people, for example, spend too much time playing these games instead of 1 activities that are much healthier for them, such as playing sports.This means that they can become unfit and also that they spend less time talking to their friends and having good relationships with other people. Playing computer games for long periods of time can also have a bad effect on people psychologically. They can put people into a bad mood and affect their relationships with their friends and family. On the other hand, computer games are not all bad. People can learn skills from playing th em and of course they can be great fun. They provide a very good source of entertainment.There is nothing wrong with them as long as people don’t spend too much time playing them. Now, write down your essay. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 2

Saturday, November 9, 2019

Kaoru Ishikawa

Kaoru Ishikawa was born in Tokyo Japan in 1939. He earned his Engineering degree in applied chemistry from the University of Tokyo. After Graduating from college he was a navel technical officer until 1941. He worked at the Nissian Liquid Fuel Company until 1947 and then began his educational vocation at the University of Tokyo. In 1978 he became Musashi Institute of Technology President (Kaoru Ishikawa, 2008). Ishikawa came to be known as the â€Å"father of the Quality revolution† to the people of Japan. When he was a professor at Tokyo University he realized the importance of the quality control methods that were introduced to his country by W. E Deming and J. R Juarn. He applied those methods to work with his country’s industries. Ishikawa developed the â€Å"quality circles†, the cause and effect diagram, and the importance of the seven quality tools. In addition, he wrote several books that explained statistics to the nonspecialist which one was the Guide to Quality Control. Another book he wrote was how to Operate QC Circle Activities which is based on quality circles. Quality circles are a method used to improve quality. Quality circles were developed in Japan in 1962 by Kaoru Ishikawa. A quality circle is a volunteer group of employees from the same work area who meet together to discuss work place improvement (Quality Circles, 2008). Quality circles were first used at the Nippon Telegraph and Cable Company in 1962 (â€Å"Death of Professor,† 1989). Ishikawa had only intended his methods of quality circles to be used for Japan but it has now spread to more than 50 countries. With the development of Ishikawa’s cause and effect diagram management leaders made large advancements in quality improvement ( Kaoru Ishikawa: One Step, 2011). With this new diagram users can see all of the possible causes of a result and find the process of imperfections ( Kaoru Ishikawa: One Step, 2011). The cause and effect diagram can easily be used by non- specialist to analyze and solve problems. Dr. E. W Deming used this diagram to teach Total Quality Control in Japan. Another name for Ishikawa’s cause and effect diagram is the Ishikawa or fishbone diagram. Ishikawa showed the importance of the seven Quality tools which are control chart, run chart, histogram scatter diagram, Pareto chart and flow chart. Ishikawa also expanded on Deming’s four steps into six steps which are determine goals and targets, determine methods of reaching goals, engage in education and training, implement work, check the effects of implementation, and take appropriate action ( Kaoru Ishikawa: One Step, 2011). Ishikawa also wrote and was the editor of many books. He wrote Guide to Quality control in 1968, as well as What Is Total Quality Control in 1981. He was the editor of QC circle Koryo in 1970, and How to operate QC Circle activates in 1971. Ishikawa has been credited with Japan’s quality achievements and has received many awards such as the Deming prize, and the blue ribbon medal which was given to him by the Japanese government. His work has changed how people perceive quality management and many of his methods and books are still used to this day by large and small businesses. Bibliography http://www.skymark.com/resources/leaders/ishikawa.asp http://www.vectorstudy.com/management_theories/quality_circles.htm

Thursday, November 7, 2019

Analyze How Chinese Women Immigrants History was Linked to American Womens History essays

Analyze How Chinese Women Immigrants' History was Linked to American Womens History essays The purpose of this paper is to introduce, discuss, and analyze the topic of American history. Specifically it will link Chinese women immigrants' history to American women's history. Chinese women have a particularly difficult history in America, because many of the first Chinese women to immigrate to America were prostitutes imported to serve the many single Chinese men working in the country. Chinese women were effectually banned from immigrating to the country for many years, and most Chinese men left their wives and children behind in China because it was much cheaper for them to live there. The men simply sent money back home to support their families. 1 Chinese women's history parallels American women's history in many ways, but Chinese women have a much shorter history in this country, and most faced many hardships due to their race. Chinese women immigrated to American in exceedingly small numbers until the 20th century. In the mid-1800s, there were 63,000 Chinese in the United States, and nearly all of them were men. They came to this country as laborers, and left their families behind. Most of them fully intended to return to China and reunite with their families, and perhaps half of them did, but many remained in the U.S., mostly on the West Coast, where Chinatowns sprang up in most large west coast cities. 2 In 1882, the U.S. passed an exclusion law, banning almost all Chinese from immigrating to this country, and it made it illegal for Chinese already here to become citizens, too. This kept even more Chinese women in China, and this law lasted until the 1943, and kept the ratio of Chinese men to Chinese women extremely high. One author notes, "By 1890, there were about twenty-seven Chinese men for every Chinese woman. As late as 1930, the ratio was still four to one." 3 During the time of immigration exclusion, thousands of Chinese were smuggled into the country, and many of them were women. Most of ...

Monday, November 4, 2019

Case Study of Gillette Company-Free-Samples-

This paper aims to discuss the Gillette Company which launched the first blade system in 1998. The Company embraced technology and it introduced the five-blade system to outdo its competitors (Nye, 2016). However, the three-blade system was the significant element of the Gillette Company. Also, the three-blade system was introduced to minimize the irritation which was caused by the three-blade system when shaving. Therefore, the Gillette has its pros and cons in the marketing strategies as discussed in this paper. To begin with the pros, The Gillette embraced a new technology to improve the designs in the market. Through the strategy of embracing new technology Gillette would maintain its customers. The Gillette employed the strategy for success by launching the five-blade system to reduce the irritation caused to the customers when using the product (Dhebar, 2016). The marketing plan for the Gillette became more aggressive when they launched the new products. Therefore, the Gillette made a high profit and tried to outdo its key competitors in the market. On the other hand, the Gillette has cons in the marketing strategies as outlined in this paper. Due to the new technology, the Company was obliged to retrain the staff for them to understand the technology (Barrow& Stowers, 2013). At the same time the Gillette minimized the loyalty for the customers hence the market share declined.   Also, the aggressive marketing rollout strategy caused the Gillette to incur costs in advertising the products. Also, the Gillette received criticism due to the campaigns held when marketing the products (Stowell, Stowell,Grogan & Grogan, 2017). The launching of the Fusion Razor was a significant failure for the Gillette. In conclusion, the Gillette has employed good marketing strategies to help in attracting and maintaining the customers hence increase their satisfaction. Despite the marketing strategies, the Gillette has experienced challenges. However, there are many clients who are satisfied with it Barrow, C., & Stowers, D. (2013).  U.S. Patent No. D674,547. Washington, DC: U.S. Patent and Trademark Office. Dhebar, A. (2016). Razor-and-Blades pricing revisited.  Business Horizons,  59(3), 303-310. Nye, J. V. (2016). What do we really know about durable goods monopolies? The Coase conjecture in economics and its relevance for the safety razor industry. In  The Elgar Companion to Ronald H. Coase  (pp. 222-234). Edward Elgar Publishing. Stowell, D. P., Stowell, D. P., Grogan, C. D., & Grogan, C. D. (2017). The Best Deal GiIlette Could Get? Procter & Gamble's Acquisition of Gillette.  Kellogg School of Management Cases, 1-18.

Saturday, November 2, 2019

How has human civilization advanced because of our knowledge of fluid Essay

How has human civilization advanced because of our knowledge of fluid mechanics - Essay Example Professor Mohamed Gad-El-Hak of the University of Notre Dame, Indiana writes that the art of fluid mechanics possibly has its roots in prehistoric times when streamlined spears, sickle-shaped boomerangs and fin-stabilized arrows evolved by trial and error by our Stone Age ancestors. Over 8,000 years ago, as agriculture became the way of life, complex irrigation canals were built along river valleys to control water flow, freeing crop growth from the vagaries of the weather (Gad-El-Hak). The Greek mathematician Archimedes (287-212 BC) discovered the laws of buoyancy forces on submerged objects and laid the foundation stone for the science of Hydrostatics. The cartoon image of Archimedes having discovered the laws of buoyancy in his bath tub and running naked through the streets of Greece shouting â€Å"Eureka† is familiar to all of us. Leonardo da Vinci (1452-1519) observed and sketched the nature of turbulent flow in a water jet issuing from a square hole into a pool and wrote that â€Å"the water jet had two motions, one due to the principal current and the other to random and reverse motion† (Gad-El-Hak, 1998). Many other scientists and thinkers, including , Isaac Newton, Daniel Bernoulli and Osborne Reynolds have made important contributions to this science. One feature of the advancement of human civilization is the interconnection of the world. Oil from the middle-east is carried by ships to North America and Europe, grain from North America is transported Asia and Africa, iron ore and other minerals get shipped for processing to manufacturing plants all over the world. Containerized manufactured products ranging from cars to electronics and clothing are shipped all across the world. At the end of 2010, the global maritime industry had some 55,000 cargo vessels carrying over 1,350 million DWT of cargo representing around 90% of global trade (IMO, p. 6-12). The science of fluid mechanics plays an