Thursday, October 31, 2019
Research paper analyzing the writiing style of Stephen King Essay
Research paper analyzing the writiing style of Stephen King - Essay Example On the one hand, critics question Kingââ¬â¢s writing style as ââ¬Å"The Comic Strip Effectâ⬠and ââ¬Å"The Disgusting Colloquialismâ⬠(Hoppenstand and Browne 2). On the other hand, King is also praised for his ââ¬Å"dazzlingâ⬠storytelling skills (Hoppenstand and Browne 2). Since 1987, most of his novels were chief selections of the Book-of-the-Month Club, which in 1989 made the Stephen King Library, and is dedicated to keeping Kingââ¬â¢s novels ââ¬Å"in print in hardcoverâ⬠and some were even produced as films, such as The Shining (Badley et al. 1). This paper analyzes Kingââ¬â¢s writing style. Kingââ¬â¢s writing style is described as seeking to terrorize, horrify, and lead his readers to gross-some reactions, which magnifies his use of ethos and pathos, while having logos residing ââ¬Å"between the lines.â⬠Stephen King is the King of macabre; he spins stories from ââ¬Å"American nightmaresâ⬠(Hoppenstand and Browne 2). As the king in this genre, he has ethos or authority in the ghastly dimension of human experiences: ââ¬Å"His work has changed the horror genre and blurred the lines between horror and literary fictionâ⬠(Dyson and Bloom 5). His ethos conceals the logos of his stories. He writes about stories of real human conditions that not all horror stories touch upon. Kingââ¬â¢s thoughts go beyond the archetypal. His ââ¬Å"popâ⬠awareness and his campy humor entice the collective unconscious (Badley et al. 4). In Danse Macabre, King stresses the ââ¬Å"cross-pollination of fiction and film,â⬠and he categorizes his subject into four ââ¬Å"monster archetypesâ⬠: the ghost, the ââ¬Å"thingâ⬠(or human-made monster), the vampire, and the werewolf (Badley et al. 4). He uses references from classic horror films of the 1930ââ¬â¢s and the 1950ââ¬â¢s pulp and film industries (Badley et al. 4). He combines the gothic novel, classical fables, Brothers Grimm folktales, and the oral tradition (Hohne 95). During this time, the characters doubt the myths but need them in their lives; horror is particularly comforting and ââ¬Å"catharticâ⬠and the narrator marries the roles of physician and priest into the witch doctor as ââ¬Å"sin eater,â⬠who takes over the culpability and fear of the culture (Badley et al. 4). As a result, Stephen re-creates old monsters by adding a new sense of mystique. In The Uses of Enchantment: The Meaning and Importance of Fairy Tales (1976), psychologist Bruno Bettelheim stresses that the enchantment and horrors of fairy tales present existential problems in forms children can understand. Kingââ¬â¢s paranormal horrors have comparable cathartic and informative roles for adults; ââ¬Å"they externalize the traumas of life, especially those of adolescenceâ⬠(Badley et al. 4). Danse Macabre represents the externalization of these traumas, as a way of coping and survival. People have to analyze and read between-the-lines, nevertheless, to understand the themes of survival and adaptation in some of Kingââ¬â¢s novels. King writes to terrorize readers. Kingââ¬â¢s critics say that his success relies on the ââ¬Å"sensational appeal of his genre,â⬠which King eagerly confesses, because he writes to ââ¬Å"scare peopleâ⬠(Badley et al. 4). His fiction is explicit, maudlin, and at times, known for conventional plots (Badley et al. 4). In Carrie, he writes about the opposite of Cinderella. It is the macabre version of dreams that can hardly come true for a society that denigrates women like Carrie. Furthermore, Kingââ¬â¢s humor is frequently unsophisticated and ââ¬Å"
Tuesday, October 29, 2019
Research Method Essay Example | Topics and Well Written Essays - 2000 words
Research Method - Essay Example However, the Internet, on the other hand, introduces a new world for unethical behaviour. Whereas e-commerce has undergone extensive growth in last 10 years, consumers concerns about ethical issues continue to increase, as well. Even many businesses and consumers are revelling in e-commerce; business issues linked to online purchasing and selling become the negative side of the matter. E-Commerce is the capability of an organisation to have a lively online presence that allows the organisation to carry out its business electronically, basically having an electronic/online shop. Goods/services can be advertised, vended and paid for all electronically devoid of the need for the buying to be processed by an actual human being (Shivani and Grewal 167). Because of the vastness of online advertising, a website can be open to millions of individuals the world over for almost zero cost and with information being capable of changing almost instantly, the website can, at all times, be updated with all the newest products to match with clientsââ¬â¢ demands (Berthon et al 261). The major advantage of E-Commerce is its ability to offer safe shopping transactions through the internet and besides instant authentication, as well as validation of credit card transactions (Shivani and Grewal 167). Ethics, in contrast, is the branch of philosophy, which studies what is right and also what is wrong. Ethical rules are regulations to follow in people interactions with others and in their actions, which impact others. They apply to everyone and are meant to attain fine results for individuals and situations, in general; not only for ourselves, and not only for a single situation (Berthon et al 261). Business ethics is involved with the several ethical questions, which managers must tackle as part of their day to day business decision-making (Shivani and Grewal 167). Acting ethically is normally practical since most of
Sunday, October 27, 2019
Multi-Campus ICT Equipment Virtualization Architecture
Multi-Campus ICT Equipment Virtualization Architecture Multi-campus ICT equipment virtualization architectureà for cloud and NFV integrated service Abstract- We propose a virtualization architecture for multicampusà information and communication technology (ICT)à equipment with integrated cloud and NFV capabilities. Theà aim of this proposal is to migrate most of ICT equipment onà campus premises into cloud and NFV platforms. Adopting thisà architecture would make most of ICT services secure andà reliable and their disaster recovery (DR) economicallyà manageable. We also analyze a cost function and show cost advantages ofà this proposed architecture, describe implementation designà issues, and report a preliminary experimentation of NFV DRà transaction. This architecture would encourage academicà institutes to migrate their own ICT systems located on theirà premises into a cloud environments. Keywords; NFV, Data Center Migration, Disaster Recovery,à Multi-campus network I. INTRODUCTION There are many academic institutions that have multipleà campuses located in different cities. These institutions needà to provide information and communication technology (ICT)à services, such as E-learning services, equally for all studentsà on each campus. Usually, information technology (IT)à infrastructures, such as application servers, are deployed at aà main campus, and these servers are accessed by students onà each campus. For this purpose, each local area networkà (LAN) on each campus is connected to a main campus LANà via a virtual private network (VPN) over a wide areaà network (WAN). In addition, Internet access service isà provided to all students on the multi-campus environment. To access the Internet, security devices, such as firewalls andà intrusion detection systems (IDSs), are indispensable as theyà protect computing resources from malicious cyber activities. With the emergence of virtualization technologies suchà as the cloud computing[1] and network functionsà virtualization (NFV)[2], [3], we expected that ICTà infrastructures such as compute servers, storage devices, andà network equipment can be moved from campuses toà datacenters (DCs) economically. Some organizations haveà begun to move their ICT infrastructures from their ownà premises to outside DCs in order to improve security,à stability, and reliability. Also, there are a lot of contributionsà to archiving DR capabilities with cloud technologies [4], [5], [6]. Active-passive replication or active-active replication areà expected techniques that archive DR capabilities. In theseà replications, a redundant backup system is requiredà dedicatedly at a secondary site. With migration recovery [4],à these backup resources can be shared among many users.à These studies mainly focus on the application servers. While,à integrated DR capability for ICT infrastructures, bothà application and network infrastructures, are still immature.à We propose a multi-campus ICT equipment virtualizationà architecture for integrated cloud and NFV capabilities. Theà aim of this proposal is to migrate entire ICT infrastructuresà on campus premises into cloud and NFV platforms.à Adopting this architecture for multi-campus networks wouldà improve access link utilization, security device utilization,à network transmission delay, disaster tolerance, andà manageability at the same time.à We also analyze the cost function and show costà advantages of this proposed architecture.à To evaluate the feasibility of our proposed architecture,à we built a test bed on SINET5 (Science Informationà NETwork 5) [7], [8], [9]. We describe the test-bed design,à and preliminary experimentation on reducing the recoveryà time of VNF is reported. The rest of this paper is organized as follows. Section IIà shows background of this work. Section III shows proposedà multi-campus network virtualization architecture. Section IVà shows an evaluation of the proposed architecture in terms ofà cost advantages and implementation results. Section Và concludes the paper, and future work is discussedà II. BACKGROUND OF THIS WORK SINET5 is a Japanese academic backbone network forà about 850 research institutes and universities and provideà network services to about 30 million academic users.à SINET5 was wholly constructed and put into operation inà April 2016. SINET5 plays an important role in supporting aà wide range of research fields that need high-performanceà connectivity, such as high-energy physics, nuclear fusionà science, astronomy, geodesy, seismology, and computerà science. Figure 1 shows the SINET5 architecture. It providesà points of presence, called SINET-data centers (DCs), andà SINET DCs are deployed in each prefecture in Japan. Onà each SINET DC, an internet protocol (IP) router, MPLS-TPà system, and ROADM are deployed. The IP routerà accommodates access lines from research institutes andà universities. All Every pairs of internet protocol (IP) routersà are connected by a paier of MPLS-TP paths. These pathsà achieves low latency and high reliability. The IP routers andà MPLS-TP systems are connected by a 100-Gbps-basedà optical path. Therefore, data can be transmitted from aà SINET DC to another SINET DC in up to 100 Gbpsà throughput. In addition, users, who have 100 Gpbs accessà lines, can transmit data to other users in up to 100 Gbpsà throughput.à Currently, SINET5 provides a direct cloud connectionà service. In this service, commercial cloud providers connectà their data centers to the SINET5 with high-speed link such asà 10 Gbps link directly. Therefore, academic users can accessà cloud computing resources with very low latency and highà bandwidth via SINET5. Thus, academic users can receiveà high-performance computer communication betweenà campuses and cloud computing resources. Today, 17 cloudà service providers are directly connected to SINET5 and moreà than 70 universities have been using cloud resources directlyà via SINET5. To evaluate virtual technologies such as cloud computingà and NFV technologies, we constructed at test-bed platformà (shown as NFV platform in fig. 1) and will evaluate theà network delay effect for ICT service with this test bed. NFVà platform are constructed at four SINET-DCs on major citiesà in Japan: Sapporo, Tokyo, Osaka, and Fukuoka. At each site,à the facilities are composed of computing resources, such asà servers and storages, network resources, such as layer-2à switches, and controllers, such as NFV orchestrator, andà cloud controller. The layer-2 switch is connected to aà SINET5 router at the same site with high speed link,à 100Gbps. The cloud controller configures servers andà storages and NFV orchestrator configures the VNFs on NFVà platform. And user can setup and release VPNs betweenà universities, commercial clouds and NFV platformsà dynamically over SINET with on-demand controller. Thisà on-demand controller setup the router with NETCONFà interface. Also, this on-demand controller setup the VPN corelatedà with NFV platform with REST interface.à Today there are many universities which has multipleà campus deployed over wide area. In this multi-campusà university, many VPNs (VLANs), ex hundreds of VPNs, areà desired to be configured over SINET to extend inter-campusà LAN. In order to satisfy this demand, SINET starts newà VPN services, called virtual campus LAN service. With thisà service, layer 2 domains of multi-campus can be connectedà as like as layer 2 switch using preconfigured VLAN ragesà (ex. 1000-2000). III. PROPOSED MULTI-CAMPUS ICT EQUIPMENTà VIRTUALIZATION ARCHITECTURE In this section, the proposed architecture is described.à The architecture consists of two parts. First, we describe theà network architecture and clarify the issues with it. Next, aà NFV/cloud control architecture is described.à A. Proposed multi-campus network architectureà Multi-campus network architecture is shown in Figure 2.à There are two legacy network architectures and a proposedà network architecture. In legacy network architecture 1 (LA1),à Internet traffic for multiple campuses is delivered to a mainà campus (shown as a green line) and checked by securityà devices. After that, the internet traffic is distributed to eachà campus (shown as a blue line). ICT Applications, such as Elearningà services, are deployed in a main campus and accessà traffic to ICT application is carried by VPN over SINETà (shown as a blue line). In legacy network architecture 2à (LA2), the Internet access is different from LA1. Theà Internet access is directly delivered to each campus andà checked by security devices deployed at each campus. In theà proposed architecture (PA), the main ICT application isà moved from a main campus to an external NFV/cloud DC.à Thus, students on both main and sub-campuses can accessà ICT applications via VPN over SINET. Also, internet trafficà traverses via virtual network functions (VNFs), such asà virtual routers and virtual security devices, located atà NFV/cloud DCs. Internet traffic is checked in virtual securityà devices and delivered to each main/sub-campus via VPNà over SINET. There are pros and cons between these architectures.à Here, they are compared across five points: access linkà utilization, security device utilization, network transmissionà delay, disaster tolerance, and manageability.à (1) Access link utilization The cost of an access link from sub-campus to WAN isà same in LA1, LA2 and PA. While, the cost of an access linkà from a main campus to WAN of LA1 is larger than LA2 and PA because redundant traffic traverses through the link.à While, in PA, an additional access link from a NFV/cloudà DC to WAN is required. Thus, evaluating the total access linkà cost is important. In this evaluation, it is assumed thatà additional access links from NFV/cloud DCs to WAN areà shared among multiple academic institutions who use theà NFV/cloud platform and that the cost will be evaluatedà taking this sharing into account. (2) Security device utilization LA1 and PA is more efficient than LA2 because Internet traffic is concentrated in LA1 and PA and a statistically multiplexed traffic effect is expected.à In addition to it, in PA, the amount of physicalà computing resources can be suppressed because virtualà security devices share physical computing resources amongà multiple users. Therefore, the cost of virtual security devicesà for each user will be reduced. (3) Network transmission delay Network delay due to Internet traffic with LA1 is longerà than that with LA2 and PA because Internet traffic to subcampusesà is detoured and transits at the main campus in LA1,à however, in LA2, network delay of Internet to sub-campusesà is directly delivered from an Internet exchange point on aà WAN to the sub-campus, so delay is suppressed. In PA,à network delay can be suppressed because the NFV and cloudà data center can be selected and located near an Internetà access gateway on WAN. While, the network delay for ICT application servicesà will be longer in PA than it in LA1 and LA2. Therefore, theà effect of a longer network delay on the quality of ITà application services has to be evaluated.à (4) Disaster toleranceà Regarding Internet service, LA1 is less disaster tolerantà than LA2. In LA1, when a disaster occurs around the mainà campus and the network functions of the campus go down,à students on the other sub-campuses cannot access theà internet at this time. Regarding IT application service, IT services cannot beà accessed by students when a disaster occurs around the mainà campus or data center. While, in PA, NFV/cloud DC isà located in an environment robust against earthquakes andà flooding. Thus, robustness is improved compared with LA1à and LA2. Today, systems capable of disaster recovery (DR) areà mandatory for academic institutions. Therefore, serviceà disaster recovery functionality is required. In PA, back upà ICT infrastructures located at a secondary data center can beà shared with another user. Thus, no dedicated redundantà resources are required in steady state operation, so theà resource cost can be reduced. However, if VM migrationà cannot be fast enough to continue services, active-passive orà active-passive replication have to be adopted. Therefore,à reducing recovery time is required to adapt migrationà recovery to archive DR manageability more economicallyà (5) Manageability LA1 and PA is easier to manage than LA2. Becauseà security devices are concentrated at a site (a main campus orà NFV/cloud data center), the number of devices can beà reduced and improving manageability.à There are three issues to consider when adopting the PA.à Evaluating the access link cost of an NFV/cloudà data center. Evaluating the network delay effect for ICT services.à Evaluating the migration period for migrationà recovery replication. B. NFV and cloud control architectureà For the following two reasons, there is strong demand toà use legacy ICT systems continuously. Thus, legacy ICTà systems have to be moved to NFV/cloud DCs as virtualà application servers and virtual network functions. One reasonà is that institutions have developed their own legacy ICTà systems on their own premises with vender specific features.à The second reason is that an institutions work flows are notà easily changed, and the same usability for end users isà required. Therefore, their legacy ICT infrastructuresà deployed on a campus premises should be continuously usedà in the NFV/cloud environment. In the proposed multicampusà architecture, these application servers and networkà functions are controlled by using per-user orchestrators.à Figure 3 shows the proposed control architecture. Eachà institution deploys their ICT system on IaaS services. VMsà are created and deleted through the application interfaceà (API), which is provided by IaaS providers. Each institutionà sets up an NFV orchestrator, application orchestrator, andà management orchestrator on VMs. Both active and standbyà orchestrators are run in primary and secondary data centers,à respectively, and both active and standby orchestrators checkà the aliveness of each other. The NFV orchestrator creates theà VMs and installs the virtual network functions, such asà routers and virtual firewalls, and configures them. Theà application orchestrator installs the applications on VMs andà sets them up. The management orchestrator registers theseà applications and virtual network functions to monitoringà tools and saves the logs outputted from the IT serviceà applications and network functions. When an active data center suffers from disaster and theà active orchestrators go down, the standby orchestratorsà detect that the active orchestrators are down. They startà establishing the virtual network functions and applicationà and management functions. After that, the VPN is connectedà to the secondary data center being co-operated with the VPNà controller of WAN. In this architecture, each institution can select NFVà orchestrators that support a users legacy systems.à IV. EVALUATION OF PROPOSED NETWORK ARCHITECTURE This section details an evaluation of the access link costà of proposed network architecture. Also, the test-bedà configuration is introduced, and an evaluation of theà migration period for migration recovery is shown.à A. Access link cost of NFV/cloud data centerà In this sub-section, an evaluation of the access link costà of PA compared with LA1 is described.à First, the network cost is defined as follows.à There is an institution, u, that has a main campus and nuà sub-campuses. The traffic amount of institution u is defined as followsà different sites can be connected between a user site and cloudà sites by a SINET VPLS (Fig. 7). This VPLS can be dynamically established by a portal that uses the RESTà interface for the on-demand controller. For upper-layerà services such as Web-based services, virtual networkà appliances, such as virtual routers, virtual firewalls, andà virtual load balancers, are created in servers through theà NFV orchestrater. DR capabilities for NFV orchestrator isà under deployment. C. Migiration period for disaster recoveryà We evaluated the VNF recovering process for disasterà recovery. In this process, there are four steps.à Step 1: Host OS installation Step 2: VNF image copy Step 3: VNF configuration copy Step 4: VNF process activation This process is started from the host OS installation becauseà there are VNFs that are tightly coupled with the host OS andà hypervisor. There are several kinds and versions of host OS,à so the host OS can be changed to suite to the VNF. Afterà host OS installation, VNF images are copied into the createdà VMs. Then, the VNF configuration parameters are adjustedà to the attributions of the secondary data center environmentà (for example, VLAN-ID and IP address), and theà configuration parameters are installed into VNF. After that,à VNF is activated. In our test environment, a virtual router can be recoveredà from the primary data center to the secondary data center,à and the total duration of recovery is about 6 min. Eachà duration of Steps 1-4 is 3 min 13 sec, 3 min 19 sec, 11 sec,à and 17 sec, respectively. To shorten the recovery time, currently, the standby VNFà is able to be pre-setup and activated. If the sameà configuration can be applied in the secondary data centerà network environment, snapshot recovering is also available.à In this case, Step 1 is eliminated, and Steps 2 and 3 areà replaced by copying a snap shot of an active VNF image,à which takes about 30 sec. In this case, the recovering time isà about 30 sec. V. CONCLUSION Our method using cloud and NFV functions can achieveà DR with less cost. We proposed a multi-campus equipmentà virtualization architecture for cloud and NFV integratedà service. The aim of this proposal is to migrate entire ICTà infrastructures on campus premises into cloud and NFVà platforms. This architecture would encourage academicà institutions to migrate their own developed ICT systems located on their premises into a cloud environment. Adoptingà this architecture would make entire ICT systems secure andà reliable, and the DR of ICT services could be economicallyà manageable. In addition, we also analyzed the cost function, andà showed a cost advantages of this proposed architectureà described implementation design issues, and reported aà preliminary experimentation of the NFV DR transaction/
Friday, October 25, 2019
Allen Ginsberg and American Protest Literature Essay -- American Protes
BUNEA VALENTIN LEONARD GROUP 3A, ENGLISH-AMERICAN STUDIES ALLEN GINSBERG, à ¡Ã §HOWLà ¡Ã ¨ AND THE LITERATURE OF PROTEST à à à à à Allen Ginsberg (1926-1997) was an important figure in the Beat Generation Movement that took place right before the revolutionary American 60à ¡Ã ¦s. Other major beat writers (also called à ¡Ã §beatnicksà ¡Ã ¨) were: Gregory Corso, Jack Kerouac and William Burroughs. The beat poetry was meant to be oral and very effective in readings. It developed out of poetry readings in underground clubs.(a beautiful image of these secret clubs can be found in the movie called à ¡Ã §Dead Poetà ¡Ã ¦s Societyà ¡Ã ¨ with Robin Williams playing the main character). Some argued that it was the grandparent of rap music. The term à ¡Ã §Beat Generationà ¡Ã ¨ was coined by Kerouac in the fall of the 1948 in New York City. The word à ¡Ã §beatà ¡Ã ¨ referred loosely to their shared sense of spiritual exhaustion and diffuse feelings of rebellion against what they experienced as the general conformity, hypocrisy and materialism of a larger society around them caught up i n he unprecedented prosperity of postwar America. à à à à à à à à à à The beat poetry was the most anticanon form of literature in the United States. The poetry is a cry of pain and rage, a howl at what the poets see as the loss of Americaà ¡Ã ¦s innocence and as a tragic waste. à à à à à à à à à à Allen Ginsberg was born in Newark, New Jersey. His parents were second generation Russian- Jewish immigrants, left-wing radicals interested in Marxism, nudism, feminism, generally in the modern revolutionary ideas of his times. This background certainly did influence his evolution as a revolutionary poet. His father, Louis Ginsberg, was a teacher and a poet, whose work was published in New York Times. During Ginsbergà ¡Ã ¦s childhood, his mother, Naomi Ginsberg, started to suffer from paranoia. She was institutionalized and eventually lobotomized. She died in an asylum in 1956. her life is the subject one Allenà ¡Ã ¦s poem entitled à ¡Ã §Kaddishà ¡Ã ¨ and which was written as a compensation of her funeral service. à à à à à à à à à à After he graduated a public high school, Ginsberg won a scholarship from Columbia University where he became a famous student, making friends with Williams Burroughs and Jack Kerouac. An... ...p;à à Ginsbergà ¡Ã ¦s style is not disciplined, but based on a spontaneous utterance of ideas, violating all the current artistic canons, provoking a literary and social scandal. The powerfulà à à à à representations of the urban realities, of the language and matter of the urban streets were meant to induce powerful reactions of the reader. He brought the culture down to the level of streets and neighborhoods. Thatà ¡Ã ¦s why the language and the images are obscene, including symbolism and direct references to oral and anal sex, homosexuality and drug use. We can even say that the form of the poem seems to be a self exploration, shaped after his own life. à à à à à What Ginsberg manages to do is to freely express his attitudes the way they overwhelm him: defiance, longing, terror, hysteria, prayer, anger, joy, exhaustion, culminating with madness and suicide. BIBLIOGRAPHY: ââ¬Å¾Ã «Ã à à à à www.sparknotes.com ââ¬Å¾Ã «Ã à à à à www.questia.com ââ¬Å¾Ã «Ã à à à à UNITED STATES DEPARTMENT OF STATE- à ¡Ã §OUTLINE OF AMERICAN LITERATUREà ¡Ã ¨ ââ¬Å¾Ã «Ã à à à à NORTON ANTHOLOGY
Thursday, October 24, 2019
Apple brand Essay
Apple Inc. uses the Apple brand to compete across several highly competitive markets, including the personal computer industry with its Macintosh line of computers and related software, the consumer electronics industry with products such as the iPod, digital music distribution through its iTunes Music Store, the smart phone market with the Apple iPhone, magazine, book, games and applications publishing via the AppsStore for iPhone and the iPad tablet computing device, and movie and TV content distribution with Apple TV. For marketers, the company is also establishing a very strong presence to rival Google in the advertising market, via its Apps business and iAd network. Steve Jobs, Appleââ¬â¢s co-Founder, described Apple as a ââ¬Å"mobile devices companyâ⬠ââ¬â the largest one in the world (Appleââ¬â¢s revenues are bigger than Nokia, Samsung, or Sonyââ¬â¢s mobility business). For several years Appleââ¬â¢s product strategy involved creating innovative products and services aligned with a ââ¬Å"digital hubâ⬠strategy, whereby Apple Macintosh computer products function as the digital hub for digital devices, including the Apple iPod, personal digital assistants, cellular phones, digital video and still cameras, and other electronic devices. More recently, the full impact of a very well throught out brand strategy has come into focus ââ¬â and one in which customer experience is central: the Mac is no longer the hub of all things Apple. Now, Apple offers a harmonised, synchronised, and integrated user experience across all of its main devices (iPad, iPhone, and Mac), using iCloud as the hub. It is in the process of extending this experience outside Apple-controled environments by introducing deep integration with Facebook and Twitter on iPad, iPhone and Mac. Appleââ¬â¢s core competence is delivering exceptional experience through superb user interfaces. The companyââ¬â¢s product strategy is based around this, with iTunes, the iPhone (with itââ¬â¢s touch screen ââ¬Å"gesturesâ⬠that are re-used on the iPad), and the Apple Apps store all playing key roles.
Wednesday, October 23, 2019
Alka-Seltzer tablets react with water Essay
Things tend to go wrong at higher temperatures because at higher temperatures (60iC+) the dissolved calcium hydrogen carbonate starts to decompose. This removes the temporary hardness and therefore removes the dissolved Ca2+ and Mg2+ ions, therefore making the test unfair because at lower temperatures there was hardness in the water. From the results obtained it has been seen that the rate of reaction increases as the temperature increases, supporting my hypothesis in which I stated that â⬠As the temperature increases, so will the rate of reaction, but at higher temperatures the pattern (link) will break down (giving us unreliable results and the trend in the graph will show this). Therefore the Alka-Seltzer tablets dropped into the hottest water will dissolve the fastest. â⬠As you can see from the graph, at 80i C the link breaks down, giving us a result that does not fit in with the general trend of results. This is not an anomalous result and there is a reason behind this. Things tend to go wrong at higher temperatures because at higher temperatures (60i C+) the dissolved calcium hydrogen carbonate starts to decompose. This removes the temporary hardness and therefore removes the dissolved Ca2+ and Mg2+ ions, therefore making the test unfair because at lower temperatures there was hardness in the water. The graph showing the time in seconds (rate of reaction), against the temperature shows the rate of reaction increasing with the temperature, and there is a curve that at first goes down steeply, but then becomes straighter. At 80i C the link breaks down, giving us an odd result, which can be explained by the fact that the Ca2+ and Mg2+ ions are removed due to the decomposing of the calcium hydrogen carbonate. As you can see from the graph and my table of results, the result obtained at 30i C is an anomalous result (i. e. it doesnââ¬â¢t follow the general trend). This again supports my hypothesis in which I stated this by saying that the link would break down giving us unreliable results. The link did not break down at 60i C as I had stated that it would because that is only the temperature at which the Ca2+ and Mg2+ ions started to decompose and once they had fully decomposed the results showed this. For the 1/time(s) against the temperature (i C) graph I got a straight line, which was the line of best fit. Again it shows how unreliable the results are at higher temperatures, as the results for 70i C and 80i C do not fit in.showing how the link breaks down due to dissolved substances in the water. This shows that the temperature is inversely proportional to the time. Also I predicted that as the temperature increased by 10i C the rate of reaction would approximately double. The results do not clearly show this happening, but I believe that it shows some signs of this happening. At 20i C the average time is 97. 5 seconds. When the temperature was increased to 30i C it approximately doubled (x 2. 17 to 3 significant figures) to 45 seconds. However this is an anomalous result and should be higher. Even so, this still supports my prediction. The next result obtained is for 40i C, which is 37 seconds. There is no sign of the rate doubling (x 1. 22 to 3 significant figures), but if we take into account that the previous result should have been higher, then it would appear to approximately double. From here onwards it does not double for every 10i C. This is due to my theory (scientific background knowledge) that things go wrong at higher temperatures due to the decomposing of calcium hydrogen carbonate at temperatures of 60i C and above. Evaluation: I have obtained a reliable set of results, with repeats of the evidence obtained. An accurate procedure was used, with this being shown by the results obtained which all agree with each other. By using a burette, it allowed me to work up to a very accurate degree of accuracy, rather than simply using a beaker or a measuring cylinder. However, I did use a measuring cylinder for repeat results and this did not seem to affect my results. I obtained one set of anomalous results. These were obtained for a temperature of 30i C and did not fit in with the general trend. According to the best-fit line on my graph, the rate of reaction should have been longer and it should have taken about 58 seconds for the Alka-Seltzer tablets to dissolve in water with a temperature of 30i C. A reason for me obtaining this anomalous result could have been due to the fact that whilst the reaction was taking place the 100ml beaker was still in the water bath. This would have caused the temperature to rise slowly and slowly increase the rate while the tablets were dissolving, therefore causing more collisions and increasing the rate. This did not happen however at higher temperatures, because the temperature of the water bath was about the same, and so it did not really have much effect, and it just kept the temperature constant (i. e. stopped it rising or falling). Although I tried my best to make the experiment perfect there were some unavoidable inaccuracies with the experiment. Firstly, when testing lower temperatures, the temperature of the water bath, which was much higher than the actual temperature being tested, caused a rapid increase in the temperature, or if it were lower it would cause it to decrease rapidly, especially when taken off the Bunsen. These gave us results for inaccurate temperatures to which were we testing. To overcome this problem, a thermostatic water bath would need to have been used, since it can be set to a certain temperature, and it will stop when it reaches there. Also it would mean that the solution inside it would reach the exact temperature or close to it. , and not increase or decrease once the water inside it has reached equilibration. Secondly, it was impossible to say when exactly the Alka-Seltzer tablets had completely dissolved and consistently decide this for every result obtained. This was a huge flaw in the experiment and affected the results in a big way. To overcome this problem a special piece of apparatus would be needed to decide exactly when they had dissolved each time and give us the same measure of consistency each time. To improve the quality of the results, the same piece of apparatus would have needed to be used throughout the whole experiment, and not changed for repeat results. To extend my inquiry and provide additional evidence for this experiment, I think that I could have investigated up to higher temperatures and see how the link would break down, and how the results would fit in with the trend of results. Also, it would have helped me to see how the decomposing of the dissolved substances affected the results. To improve the experiment and make it fair, distilled water should have been used instead of tap water because it is purer than tap water and does not contain impurities.
Subscribe to:
Posts (Atom)