Thursday, April 30, 2020

Guidelines For Managing Of Mobile Devices -Myassignmenthelp.Com

Question: Discuss About The Guidelines For Managing Of Mobile Devices? Answer: Introducation STP Limited is a company that is located in Wollongong and the head office of the company is also located in Wollongong. The primary product in which the organization deals in is cabinets. The business is now expanding to other regions. With the increase in the revenues and sales, the organization has bought new offices in different locations and a lot of new equipment as well. Currently, STP Limited has its offices located in four locations and each of these four locations is equipped with hardware and tools necessary for the execution of the operations. It has become required for the company to improve and maintain its networking architecture and the same has emerged as a primary area of concern as well. STP Limited is making sure that there are newer forms of tools and concepts that are used and implemented in the area of networking and associated technology. There are also networking equipment and gadgets that have been made available in the organization. Every organization is connected to the Internet using ADSL. There are also permissions granted to the members of the staff to carry their personal devices at work. An effective communication channel is required to be present in the organizations. It is because of the reason that with the aid of communication and networking, the stakeholders and employees are provided with updated information and there are no ambiguities involved. Sharing and transmission of the information also gets easier. The networking channel that is going to be developed will make it possible to achieve these benefits and the sharing, transmission and passage of information and files will become smoother and easier. The relationship and engagement with the customers will also improve as advanced networking will keep the customers updated with latest company offerings and details (Cisco, 2008). Scope Statement The project scope includes the mechanisms, operations and activities that may make it possible to develop and improve the security of the networks and the communication channels. An analysis of the requirements of STP Limited in terms of its needs to carry out improve its networking channel and the activities that shall be done in order to accomplish the same shall be identified. The set of these activities shall include the design and development of the network and communication mediums along with the integration and deployment of the networks. Project Objectives Integration of all the four locations of STP Limited as a single unit so that an integrated networking channel can be formed. Maintenance and implementation of the concepts of security in the newly designed networking mediums and equipment that are used (Pareek, 2011). Improvement of the customer relationship and customer engagement levels with the ability to provide the services in such a manner that the customer trust is also improved. Strategic Alignment Parameter/Attribute Details Description Strategies and Decision-making abilities The goals and business objectives of STP Limited are customer centric with an aim to improve the organizational integration and performance. These goals also apply to the project as well. There will be different phases and activities that will be carried out so that the desired communication and networking channel is developed and deployed. The project activities will also make sure that privacy and security of the information is maintained. Technical Aspect STP Limited has network connection and communication equipment that are in place along with the rest of the technical tools and components. The new system and channel will be compatible with the existing tools. The technical feasibility in terms of compatibility, integration and cohesiveness has positive results. Competitive Advantage The customers and market experts prefer the use of business services that have strong privacy and security. The use of secure services will make sure that the service quality is improved which will have a positive impact in terms of the ability to gain competitive advantage. Service Level The Project Manager along with the senior management that is involved with the project will carry out networking strategy and necessary methodology. There are resources that have been tagged for the accomplishment of the project activities. Network Security Management Network security has come up as an important matter of concern for the business organizations in the present times. This is because of the increased probability of the network related risks and attacks that may emerge. In case of STP Limited, it must be analyzed that the local IT department has the required number of resources with adequate skills to provide support services. Remote management is now an integral part of the maintenance of security so that the network monitoring and control may be done with much ease. There are various security protocols and concepts that are present and these protocols shall be implemented in case of STP Limited. Some of these concepts include HTTPS, SSL etc. The configuration of these protocols shall also be done securely. The requirements of the head office that is set up in Wollongong along with three other offices must be met in terms of security and privacy. These solutions shall also be within the defined budget and shall come with the ability to be used and deployed easily. There must also be additional services that must be carried out in terms of secure routing and the ability to set up WAN connections. In this manner, the need to install separate security solutions for networking equipment and channels will be avoided. The controls that are currently in practice for the detection and avoidance of the security attacks are still based upon traditional protocols and the signature based methods. These controls cannot handle the newer forms of security risks and the uncertainties that are involved. It is therefore required to develop and implement security controls in such a manner that the changing nature and landscape of the security threats is targeted and the countermeasures are accordingly developed and implemented (Canavan, 2001). There are reactive and proactive controls that are now being created with the use of latest technologies and advancements. These controls shall be used so that the avoidance and prevention of any form of the risk is avoided. Security Solutions Recommended for the Branch Office The branch office of STP Limited must be equipped with the following security controls and mechanisms. End-to-end connectivity shall be designed and implemented by making use of fast and safe Virtual Private Network (VPN). The centrally hosted and managed applications will be handled easily and remote management will also be carried out with much ease. The internet connection and network that is being used shall be modified to a secure connection as there may be risks and attacks that may come up through any of the regional location. There are many services and applications that are carried out internally in the head office and in other locations. These internal processes shall be made secure by using applicable security code and service (Alabady, 2009). The solution that is developed and deployed must have high usability and performance and it must also be reliable in nature. Data Security Virtual Private Networks: It would be essential to develop and deploy secure Virtual Private Network (VPN) channels so that the security of the overall organization is maintained. There may be simultaneous management of the tunnels that may be involved. The information sets shall be encrypted by making use of the latest encryption algorithms, such as, Tripe DES and Advanced encryption. There shall also be use of NAT traversal in the management of security (Joshi and Karkade, 2015). Firewall: There are various basic to advanced mechanisms that are used in the maintenance and setting up of the security. One such filtering mechanism is firewall and there have been much advancement that has been done in association with firewalls. Network firewalls and system firewalls with Business Intelligence techniques have been created that shall be used. Also, the implementation of firewall must be done at all the layers of the networking channel. Attack Protection: Firewalls are the basic mechanisms and step towards security and simply the implementation of firewalls is not enough to deal with the security risks and attacks. There shall be use of many other advanced security tools and applications that must be done so that different types and forms of the attacks do not occur (Strebe, 2004). Advanced Content Filtering: Network filtering is necessary so that the network based security attacks are automatically avoided. URL filtering shall be used for this purpose. There shall also be use of content filtering and anti-malware and anti-denial tools that must be done in order to ensure that only the authentic and valid entity passes through the filter that is applied (Soriano, 2011). Segmentation Security Domains: There are many business operations and activities that are carried out in the organization. These organizational activities shall be divided on the basis of the nature of operation and activity along with carious other categories. Security policies and controls shall be developed accordingly. Security of Mobile Devices There is almost every single user that is now using mobile device at the professional and personal level. The increase in the use of these devices has been witnessed because of the ease of access that is associated with these devices. Any of the services and applications can be carried out easily on the mobile devices and mobile platforms. Because of such increase in the usage, there are many risks and attacks that have been witnessed. There are controls that can also be applied in this regard. Fingerprinting: Complete information on the mobile device and the associated aspects and details are also provided. Any of the loopholes in security can be detected and highlighted with this technique (Souppaya, 2013). Network Access Controls: STP Limited needs to implement the access controls at the network level as well. This is due to the reason of the presence of a large number of network access points in association with the business organization. The network access controls shall be used and implemented in order to prevent the problems that are associated with the violation of network security. There are certain tools such as network monitoring, network scans, anti-malware etc. that must be done. Authentication: There are many standards and practices that are followed in the field of wireless connection. There must be use of two-fold authentication that must be done (Sujithra and Padmavathi, 2012). Plan Followed for Hardware Purchases Hardware would form an essential part of the networking system and project that will be designed and deployed. Computer Systems: Network design and deployment, network integration, testing of the networking and communication system etc. will be done by using computer systems and platforms. Servers: Database servers are essential for the management and storage of the data. There will also be web servers that will be used. Peripheral Equipment: Networking and communication is made possible only by using a number of peripheral devices. There are many such devices that are present, such as, switches, hubs, routers etc. Simulators and Emulators: These are the tools that are used to provide and represent virtual behavior of the system that may be used in this case. Diagnostic Equipment: There are a number of automated tools that have been developed for the purpose of diagnosis. Communication Devices: The ability to share information and maintain the necessary level of communication will also be essential which would be made possible by using tele-health communication tools. Business continuity The business continuity suffers badly in case of the security risks and attacks. However, with the presence of a disaster recovery plan and processes, the continuity of the business is always maintained. These plans shall also be updated in a timely manner. The information and process around backups and other recovery operations shall be carried out. There shall be advanced backup process that must be used by the management staff members along with the administrative and support staff. There shall be assurance that must be provided for the management of the servers. The process shall be followed by the administrators. Risk Handling Management There are many risks that are associated with every business unit and it holds true for STP Limited as well. The risks need to be handled and managed by making use of a defined process and approach. This process is termed as risk management process and there is a strategy that is followed in this process. Risk Management Strategy There will be a risk register that will be prepared in this approach which will provide information on the risks that may be possible with their nature and description. Responsibilities of the Risks The stakeholders must be assigned to every risk on the basis of its description and the nature of the risk. The stakeholder that would manage and resolve the risk shall be identified (Berg, 2010). Assessment of the Risks The risk must be assessed and carefully analyzed so that the risk attributed like likelihood, impact, level and rank are revealed. In this process, the priority that is associated with every risk is also identified and is reported in the risk assessment report that is designed. Response to the Risks It is necessary to make sure that the risks that are identified are properly managed. There shall be a response that must be analyzed and implemented in association with every risk. This response will determine the future of the risks in the organization in terms of occurrence and control (Crane, 2013). Mitigation of the Risks There is a handling process that is involved with every risk. One such process is risk mitigation in which the risk handling and the guidelines that are associated with the risk are pointed out (Dcu, 2015). Tracking and Reporting of the Risks The mitigation or any other response strategy that is identified shall be tracked in terms of its application and progress. There must be reporting activities that must be carried out to make sure that the risk level is communication to one and all (Debono, 2016). These reports shall be generated in a weekly manner and the risk completion report shall be published as a final result. Conclusions STP Limited is a Wollongong based business organization that manufactures and provides cabinets. Currently, STP Limited has its offices located in four locations and each of these four locations is equipped with hardware and tools necessary for the execution of the operations. An effective communication channel is required to be present in the organizations. It is because of the reason that with the aid of communication and networking, the stakeholders and employees are provided with updated information and there are no ambiguities involved. In case of STP Limited, it must be analyzed that the local IT department has the required number of resources with adequate skills to provide support services. The different forms of network security and information security risks and attacks shall be identified. The controls shall accordingly be applied and implemented. The same goes for mobile devices as well. Recommendations Evaluations Network Security There shall be use of enhanced testing services and practices so that the review and verification is done at a large scale. The previous and current network logs must be carefully analyzed. The data and information on the usage of the application must be highlighted. Infrastructure integration: All the components and entities shall be designed and implemented for strong integration. The use of the devices and operations that are based on the technologies that are no longer in use shall be identified for separation. The effort that is put in by the resources shall be tracked and managed. Companys Mobile Population The mediums that are used by the employees in the area of tele-communications and services. The count of the employees on field, in office locations, warehouses etc. Networking capabilities and capacities associated with all the systems WLAN Evaluation The overall count of the inventory types The count of the form factors with the various types of operating systems and technologies Survey of the location based services and application The WLAN capacity that will be used will be based upon the following in terms of the assessment. Evaluation and monitoring of the 802.11ac connections so that the performance of WLAN is not impacted. Evaluation and monitoring of VoIP services so that the performance of WLAN is not impacted. References Alabady, S. (2009). Design and Implementation of a Network Security Model for Cooperative Network. [online] Available at: https://www.iajet.org/iajet_files/vol.1/no.2/Design%20and%20Implementation%20of%20a%20Network%20Security%20Model%20for%20Cooperative%20Network.pdf [Accessed 10 Oct. 2017]. Berg, H. (2010). Risk Management: Procedures, Methods and Experiences. [online] Available at: https://ww.gnedenko-forum.org/Journal/2010/022010/RTA_2_2010-09.pdf [Accessed 10 Oct. 2017]. Canavan, J. (2001). Fundamentals of Network Security. [online] Available at: https://whc.es/Network/Fundamentals%20of%20Network%20Security.pdf.1.pdf [Accessed 10 Oct. 2017]. Cisco (2008). Wireless and Network Security Integration Solution Overview. [online] Available at: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/secwlandg20/sec_wireless_overview.pdf [Accessed 10 Oct. 2017]. Crane, L. (2013). Introduction to Risk Management. [online] Available at: https://extensionrme.org/pubs/IntroductionToRiskManagement.pdf [Accessed 10 Oct. 2017]. Dcu (2015). Introduction to Risk Management. [online] Available at: https://www.dcu.ie/sites/default/files/ocoo/pdfs/Risk%20Mgt%20Training%20Slides.pdf [Accessed 10 Oct. 2017]. Debono, R. (2016). Project Risk Management. [online] Available at: https://www.isaca.org/chapters11/Malta/Documents/Events/210416%20-%20Mark_Debono%20-%20Understanding_Risk_in_the_Field_of_Project_Management.pdf [Accessed 10 Oct. 2017]. Joshi, M. and Karkade, R. (2015). Network Security with Cryptography. [online] Available at: https://www.ijcsmc.com/docs/papers/January2015/V4I1201544.pdf [Accessed 10 Oct. 2017]. Pareek, R. (2011). Network Security: An Approach towards Secure Computing. [online] Available at: https://www.rroij.com/open-access/network-security-an-approach-towards-secure-computing-160-163.pdf [Accessed 10 Oct. 2017]. Soriano, M. (2011). Information and Network Security. [online] Available at: https://improvet.cvut.cz/project/download/C2EN/Information_and_network_security.pdf [Accessed 10 Oct. 2017]. Souppaya, M. (2013). Guidelines for Managing the Security of Mobile Devices in the Enterprise. [online] Available at: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf [Accessed 10 Oct. 2017]. Strebe, M. (2004). Network Security Foundations. [online] Available at: https://imcs.dvfu.ru/lib.int/docs/Networks/Security/Network%20Security%20Foundations.pdf [Accessed 10 Oct. 2017]. Sujithra, M. and Padmavathi, G. (2012). Mobile Device Security: A Survey on Mobile Device Threats, Vulnerabilities and their Defensive Mechanism. [online] Available at: https://dl.icdst.org/pdfs/files/35dc646a4630971fd27c6b2d32661555.pdf [Accessed 10 Oct. 2017].

Saturday, March 21, 2020

Mrs Mann and Mr Bumble Essays

Mrs Mann and Mr Bumble Essays Mrs Mann and Mr Bumble Paper Mrs Mann and Mr Bumble Paper In Oliver Twist Dickens presents a powerful critique of Victorian society and its treatment of the poor. Paying particular attention to chapter two of the novel, explore the methods Dickens employs to achieve this. Oliver Twist was the second novel of Charles Dickens and the first one with the main protagonist a child. It was initially published in monthly instalments in Bentleys Miscellan magazine that began in February of 1837 and ended in April of 1939. Dickens based Oliver Twist on his own childhood and wrote it as a way of expressing his views in how the rich treated the poor, Dickens wrote in instalments because it would have cost more to publish and buy the book, this means when the book was published every chapter ends in a cliff-hanger, the instalments were mainly read by the middle class to give them a perspective on the lifestyle of a working class person and show why not to treat them in a unsatisfactory manner. The poor laws played a key part in chapter two of the novel because Oliver was forced to work in a workhouse where the poor laws came into play. The poor laws allowed the poor to receive public assistance only if they lived and worked in established workhouses. Beggars risked imprisonment. Debtors were sent to prison, often with their entire families, this is what happened to Charles Dickens father as he went bankrupt and Dickens was sent to work. Workhouses were deliberately made to be as miserable as possible in order to deter the poor from relying on public assistance. In this essay I shall be writing about how Charles Dickens presents a powerful critique of Victorian society and the poor, paying attention to chapter two of Oliver Twist. Chapter two marks one of the turning points of the novel. Firstly Oliver is sent to a workhouse because there was no female then domiciled on the house who was in a situation to impart to Oliver Twist, the consolation and nourishment of which he stood in need. This enabled the poor laws to act on Oliver as he would live and work in an established workhouse which allowed him to receive assistance from the public if he needed it. Dickens made us sympathise for Oliver in chapter two because of how he is treated and because of his physical state, on Olivers ninth birthday he and two other young gentlemen participate with him in a sound thrashing. A birthday for a nine year old at the time would be a momentous occasion, but because Oliver is needy, he is treated as a second class citizen. Mrs Mann does not feel he should have an adequate party but instead to mark the special event Oliver and some other innocent children should be beaten. Dickens makes us sympathise more for Oliver because of his lack of education, this happens when Oliver meets the board of fat gentlemen, they ask him You know youre an orphan I suppose? to which Oliver replies dumfounded Whats that sir? . Oliver was frightened at the site of so many gentleman This tells us that Oliver is shy and he is not used to speaking to adults because he is scared they will beat him as the only adult he knows well is Mrs Mann who beats him on a regular basis, the experience changes Olivers view on adults as in his opinion they are mostly all bad, the reader feels mercy for Oliver at this point because they know Oliver doesnt know that the board will decide on his future and if he does anything incorrect in the presence of the board the consequences will be dire. Lack of empathy form the gentlemen is shown by the quotes and also Olivers lack of common education, everything bad the board notice about Oliver is what they have not taught him, their own faults are shown in him. Dickens shows inhumanity of others towards Oliver because he is sent to the workhouse, which is meant for Juvenile offenders. He is also treated inhumanly as Mr Bumble gave the little wicket a tremendous shake. Wicket is a metaphor for Oliver Twist, referring to him as a thin object; he is treated inhumanly as without warning he is shook. Olivers only crime is being poor. At the time there was a huge gap between the rich and the poor due to industrialisation. This meant that the poor were left to survive in unpleasant, overcrowded conditions, and were treated harshly by the rich. Generally the upper and middle classes thought very little of the working class citizens in Victorian times. The English middle-class society saw those who could not support themselves as immoral and evil, Oliver is not immoral and evil he is the opposite, the immoral and evil are quite clearly the board, Mrs Mann and Mr Bumble. Dickens displays this in chapter 2; the attitudes of the upper class are illustrated in the form of the board and the beadle. Oliver is treated like an animal by Mr Bumble. Mr. Bumble gave him a tap on the head, with his cane, to wake him up: and another on the back to make him lively: Mr Bumble wakes Oliver up like a person would try and wake up a dog, he believes Oliver is not a real person but a dirty animal that should not be spoken or touched by his master and obey his master, the narrator gives his view of what the board think of the orphanage, The board made periodical pilgrimages to the farm . The narrator is implying that the board and upper classes refer to the orphanage as a farm and the children are animals who dont deserve to live. The board are described as eight or ten fat gentleman who sit around a table, Dickens produces humour by making a particularly fat gentleman in a higher position than the rest, Dickens ranks the gentleman in how overweight they are, so the most obese would have the highest authority. Mrs Mann and Mr Bumble are the two people, who are supposed to take care of Oliver Twist, but instead Mrs Mann physically abuses Oliver and the other children in her care and Mr Bumble treats him like a worthless waste of life. Mrs Mann and Mr Bumble role play when they are around each other, Mrs Mann acts as a good Christian woman as she uses religious language like bless-em but she is not a good Christian and Mr Bumble exaggerates his authority by using the method of repetition, he uses complicated language in his sentence like here upon parochial business with the parochial orphans? Are you aweer, Mrs. Mann, that you are, as I may say, a parochial delegate, and a stipendiary?

Thursday, March 5, 2020

The Manufacturing and Cultural History of Nylon Stockings

The Manufacturing and Cultural History of Nylon Stockings In 1930, Wallace Carothers, Julian Hill, and other researchers for the DuPont Company studied chains of molecules called polymers, in an attempt to find a substitute for silk. Pulling a heated rod from a beaker containing carbon- and alcohol-based molecules, they found the mixture stretched and, at room temperature, had a silky texture. This work culminated in the production of nylon marking the beginning of a new era in synthetic fibers. Nylon Stockings - 1939 New York World's Fair Nylon was first used for fishing line, surgical sutures, and toothbrush bristles. DuPont touted its new fiber as being as strong as steel, as fine as a spiders web, and first announced and demonstrated nylon and nylon stockings to the American public at the 1939 New York Worlds Fair. According to The Nylon Drama authors David Hounshell and John Kenly Smith, Charles Stine, vice president DuPont unveiled the worlds first synthetic fiber not to a scientific society but to three thousand womens club members gathered at the site of the 1939 New York Worlds Fair for the New York Herald Tribunes Eighth Annual Forum on Current Problems. He spoke in a session entitled We Enter the World of Tomorrow which was keyed to the theme of the forthcoming fair, the World of Tomorrow. Full-Scale Production of Nylon Stockings First Nylon PlantDuPont built the first full-scale nylon plant in Seaford, Delaware, and began commercial production in late 1939. The company decided not to register nylon as a trademark, according to Dupont they, choose to allow the word to enter the American vocabulary as a synonym for stockings, and from the time it went on sale to the general public in May 1940, nylon hosiery was a huge success: women lined up at stores across the country to obtain the precious goods. The first year on the market, DuPont sold 64 million pairs of stockings. That same year, nylon appeared in the movie, The Wizard of Oz, where it was used to create the tornado that carried Dorothy to the Emerald City. Nylon Stocking the War Effort In 1942, nylon went to war in the form of parachutes and tents. Nylon stockings were the favorite gift of American soldiers to impress British women. Nylon stockings were scarce in America until the end of World War II, but then returned with a vengeance. Shoppers crowded stores, and one San Francisco store was forced to halt stocking sales when it was mobbed by 10,000 anxious shoppers. Today, nylon is still used in all types of apparel and is the second most used synthetic fiber in the United States.

Monday, February 17, 2020

The Old Folks Home Essay Example | Topics and Well Written Essays - 1250 words

The Old Folks Home - Essay Example The author of â€Å"The Old Folks Home† begins his narrative with the statement that approaching always brings up the same feelings in the author: duty, of course, and excitement because he hasn’t seen his grandma in so long†¦ but there is always a touch of apprehension, of dread. The fact is, there is not a whole lot that we have in common together, not a lot of common ground to talk about.   This means that we will check up on each other – because we do care, we truly do, but after that first inspection, the tales of the past week or two or four, a silence laps. The visit turns into watching jeopardy or a Cubs game, comfortable, yet not all that fulfilling.   The author tells that he cannot leave after the first checkup though – what would the point be for such a short visit?   Wouldn’t that be admitting defeat?   Wouldn’t that be telling each other that there is not actually that much for us to talk about anymore? He keeps on telling himself, and his grandma keeps on telling him, that she appreciates them, that the author is doing a good thing.   But he also worries that his discomfort is shared – that she knows no matter how much they love each other, that there is nothing that love can do to help bridge the 60-year gap that separates their birth.   He tells himself this is fine, that his presence is all that is required, that he is doing good.   He wishes he could believe himself.   He wishes he could do more.

Monday, February 3, 2020

Profanity and Women Essay Example | Topics and Well Written Essays - 1500 words

Profanity and Women - Essay Example Profanity as utility is as much part of language and communication as the norm that defines it as a deviation (Jay, 2009, p.155). According to Jay through the use of taboo/swear words "one can achieve myriads of personal and social goals" (Jay, 2009, p.155). Thus combining the socio-physical context and overarching emotiveness of foul language. For it is at a personal level that the dogmatic inappropriateness of taboo words is initially perceived through inflicted punishment and restrictions. Its inadvertent use, however, conveys a necessity to go beyond the formally recognized means of expression. A psychological sociolinguistic reading of taboo language would probably best describe it as an articulated emotional trespassing. Being extreme in essence it is often associated with extreme emotions and states of mind such as anger, frustration, violence, etc. in the expression of which the two genders perform differently depending on their age and social ranking (Eckert & McConnell-Gine t,2003; James, 1998; Jay, 2009 ). Course language and profanity have always existed in the discourse irrespective of language and culture. Profanity is a form of expression intended to convey a variety of feeling and emotions, as well as to intensify and emphasize a point in such a way that can not be paralleled by using correct and what are deemed appropriate words and expressions. Taboo words are used to express anger; they could be a form of rebellion against social norms as well as a means of belonging to a social group. Their frequent insertion between words in a sentence could be an involuntary way of phrasing, intending no harm and lacking significance, or it could simply be a way to fill the void of a limited vocabulary. Taboo words fall into a number of categories: Taboos in English are placed primarily on sexual references (blow job, cunt) and on those that are considered profane or blasphemous (goddamn, Jesus Christ). Taboos extend to scatological referents and disgusting objects (shit, crap, douche bag); some animal names (bitch, pig, ass); ethnic-racial-gender slurs (nigger, fag, dago); insulting references to perceived psychological, physical, or social deviations (retard, wimp, lard ass); ancestral allusions (son of a bitch, bastard); substandard vulgar terms (fart face, on the rag); and offensive slang (cluster fuck, tit run). (Jay, 2009, p. 154) In Language and Gender Eckert and McConnell-Ginet draw upon Robin Lakoff's 1970s theory about "women's language" (Eckert et al., 2003, p.158). They describe the choice of language utilized by women as historically, socially and culturally determined and sustained through existing power structures related to male dominance. Furthermore, a female is a priori perceived as powerless simply through positioning herself as a woman. Hence the language she uses is a "powerless language" and it prevents her from interactional effectiveness (Eckert et al., 2003, p.159). A type of language, which has been also attributed to other marginalized and discriminated against categories such as homosexuals and people of various racial and ethnic backgrounds. From an early age, people and especially women, are conditioned to perceive certain words as profane,

Sunday, January 26, 2020

Self-healing Materials and Shape Memory Polymers

Self-healing Materials and Shape Memory Polymers Topic Area: self-healing materials, shape memory polymers and flame retardant polymers Emerging Polymer materials       Md Hossion Shovon Introduction: The ability of a nation to harness nature as well as its ability to cope up with the challenges posed by it is determined by its complete knowledge of materials and its ability to develop and produce them for various applications. Advanced Materials are at the heart of many technological developments that touch our lives. Electronic materials for communication and information technology, optical fibers, laser fibers sensors for the intelligent environment, energy materials for renewable energy and environment, light alloys for better transportation, materials for strategic applications and more. Advanced materials have a wider role to play in the upcoming future years because of its multiple uses and can be of a greater help for whole humanity. Emerging technologies are those technical innovations which represent progressive developments within a field for competitive advantage. List of currently emerging technologies, which contains some of the most prominent ongoing developments, a dvances, and Materials Science and Nanotechnology Innovations are Graphene, Fullerene, Conductive Polymers, Metamaterials, Nanomaterials: carbon nanotubes, Superalloy, Lithium-ion batteries, etc. Over the last decade, smart polymeric materials have been used in biochemical sciences in many ways. Since the term, smart polymeric materials encompasses a wide spectrum of different compounds with unique potential for biological applications, Self-healing Polymers: Self-healing polymers are a new class of smart materials that have the capability to repair themselves when they are damaged without the need for detection or repair by manual intervention of any kind. Increasing demand for petroleum feedstocks used to produce polymer and the need for polymeric materials with improved performance in challenging applications continue to drive the need for materials with extended lifetimes. One way to extend the lifetime of a material is to mitigate the mechanism leading to failure. In brittle polymers, failure occurs through crack formation and propagation (1,2) and the ability to repair these cracks when they are still very small will prevent further propagation thus extending the lifetime of the material. Emerging self-healing technologies designed to give polymeric materials the capability to arrest crack propagation at an early stage thereby preventing catastrophic failures will go a long way in helping to increase the scope of applications of the se materials. With the need for autonomic repair of materials without external intervention thus evident, more recent research has focused on developing fully self-healing systems. One approach to the design of such systems employs the compartmentalization of a reactive healing agent, which is then incorporated into a composite material. Thus, when a crack propagates through the material, it causes the release of the healing agent from the compartment in which it is stored into the crack plane where it solidifies and repairs the material. The first basic application of this approach consisted of an epoxy matrix with suspended glass capillaries filled with either cyanoacrylate or a two-part epoxy resin. When a crack propagated through the cured epoxy matrix, the glass capillaries were fractured and the cyanoacrylate monomer or the two-part epoxy generally referred to as healing agents, were released into the crack plane where they reacted and polymerized. A significant recovery of the mechanical properties of the samples after they were allowed to heal suggests that the cracked material was effectively repaired by the polymerized healing agent. Since the healing requires only crack propagation as the trigger for the healing mechanism, it represents a truly autonomic or self-healing material. While a successful demonstration of self-healing, the labor-intensive process of manually filling capillaries and distributing them evenly throughout the matrix make this approach unsuitable for scale-up. Shape-memory Polymers: Shape-memory polymers are an emerging class of active polymers that have the dual-shape capability. They can change their shape in a predefined way from shape A to shape B when exposed to an appropriate stimulus. While shape B is given by the initial processing step, shape A is determined by applying a process called programming. The shape-memory research was initially founded on the thermally induced dual-shape effect. This concept has been extended to other stimuli by either indirect thermal actuation or direct actuation by addressing stimuli-sensitive groups on the molecular level. Finally, polymers are introduced that can be multifunctional. Besides their dual-shape capability, these active materials are biofunctional or biodegradable. Potential applications for such materials as active medical devices are highlighted. Shape-memory polymers are dual-shape materials belonging to the group of actively moving polymers. They can actively change from a shape A to a shape B. Shape A is a temporary shape that is obtained by mechanical deformation and subsequent fixation of that deformation. This process also determines the change of shape shift, resulting in shape B, which is the permanent shape. In shape-memory polymers reported so far, heat or light has been used as the stimulus. Using irradiation with infrared light, application of electric fields, alternating magnetic fields, or immersion in water, indirect actuation of the shape memory effect has also been realized. The shape-memory effect only relies on the molecular architecture and does not require a specific chemical structure in the repeating units. Therefore, intrinsic material properties, e.g. mechanical properties, can be adjusted to the need of specific applications by variation of molecular parameters, such as the type of monomer or the comonomer ratio. An example of a cross-linked polymer network synthesized by polyaddition of monofunctional monomers with low molecular weight or oligomeric cross-linkers has been realized in polyurethanes by the addition of trimethyl owl to the reaction mixture. The reaction of tetra-functional silanes, working as net points, with oligomeric silanes, which work as spacers and to which two distinct benzoate-based mesogenic groups have been attached, results in a formation of a main-chain smectic-C elastomer38. In contrast to other liquid-crystalline elastomers, which display a shape-changing behavior and have been compared to shape-memory polymers recently, these elastomers have shape-memory properties. The cross-linking process during synthesis defines the permanent shape. The shape-memory effect is triggered by the thermal transition of the liquid-crystalline domains. In the programming process, the polymer network is heated to the isotropic state of the liquid crystalline domains, stretched or twisted, and then cooled below the clearing transition temperature of the smectic-C mesogens. Upon reheating over this clearing transition, the permanent shape can be recovered. In contrast to shape-changing liquid crystalline elastomer systems, thes e polymers display shape-memory behavior because the liquid crystalline moieties work as a switch. In shape-changing liquid-crystalline elastomers, the molecular movement of the single liquid crystals is converted into a macroscopic movement Another class of thermoplastic shape memory polymers with Trans = Tg are polyesters. In copolyesters based on poly(Ɇº-caprolactone) and poly (butylene terephthalate), the poly (butylene terephthalate) segments act as physical cross-linkers25. The shape-memory capability can also be added to a polymer using a polymer-analogous reaction. A polymer-analogous reaction is the application of a standard organic reaction (like the reduction of a ketone to an alcohol) to a polymer having several of these reactive groups. An example is the polymer-analogous reduction of a polyketone with NaBH4/THF, which results in a poly(ketone-co-alcohol). The polyketones are synthesized by late transition metal catalyzed polymerization of propene, hex-1-ene, or a mixture of propane and hex-1-ene with CO. The Tg of this polymer is directly related to the degree of reduction, which can be adjusted by the amount of NaBH4/THF. The most promising shape-memory material is a partly reduced poly (ethylene -co-propane-co-carbon oxide), which displayed a phase-separated morphology with hard microcrystalline ethylene/CO-rich segments within a softer amorphous polyketone ethylene-propene/CO-rich matrix. The crystalline domains of this material work as physical cross-linkers. This results in an elastic behavior above Tg because the glass transition temperature (Trans = Tg) is related to the switching phase. Partial reduction of the material allows control of Tg, which can be adjusted from below room temperature to 75 °C. Flame-retardant Polymers: Fire-safe polymers are polymers that are resistant to degradation at high temperatures. There is need for fire-resistant polymers in the construction of small, enclosed spaces such as skyscrapers, boats, and airplane cabins. In these tight spaces, ability to escape in the event of a fire is compromised, increasing fire risk. In fact, some studies report that about 20% of victims of airplane crashes are killed not by the crash itself but by ensuing fires. Fire-safe polymers also find application as adhesives in aerospace materials, insulation for electronics and in military materials such as canvas tenting. Some fire-safe polymers naturally exhibit an intrinsic resistance to decomposition, while others are synthesized by incorporating fire-resistant additives and fillers. Current research in developing fire-safe polymers is focused on modifying various properties of the polymers such as ease of ignition, rate of heat release, and the evolution of smoke and toxic gases. Standard methods for testing polymer flammability vary among countries; in the United States common fire tests include the UL 94 small-flame test, the ASTM E 84 Steiner Tunnel, and the ASTM E 622 National Institute of Standards and Technology (NIST) smoke chamber. Research on developing fire-safe polymers with more desirable properties is concentrated at the University of Massachusetts Amherst and at the Federal Aviation Administration where a long-term research program on developing fire-safe polymers was begun in 1995. The Center for UMass/Industry Research on Polymers (CUMIRP) was established in 1980 in Amherst, MA as a concentrated cluster of scientists from both academia and industry for the purpose of polymer science and engineering research. Controlling the flammability of different materials has been a subject of interest since 450 B.C. when Egyptians attempted to reduce the flammability of wood by soaking it in potassium aluminum sulfate (alum). Research on fire-retardant polymers was bolstered by the need for new types of synthetic polymers in World War II. The combination of a halogenated paraffin and antimony oxide was found to be successful as a fire retardant for canvas tenting. Synthesis of polymers, such as polyesters, with fire retardant monomers were also developed around this time.. Additives are divided into two basic types depending on the interaction of the additive and polymer. Reactive flame retardants are compounds that are chemically built into the polymer. They usually contain heteroatoms. Additive flame retardants, on the other hand, are compounds that are not covalently bound to the polymer; the flame retardant and the polymer are just physically mixed together. Only a few elements are being widely used in this field: aluminum, phosphorus, nitrogen, antimony, chlorine, bromine, and in specific applications magnesium, zinc and carbon. One prominent advantage of the flame retardants (FRs) derived from these elements is that they are relatively easy to manufacture. The most important flame retardants systems used act either in the gas phase where they remove the high energy radicals H and OH from the flame or in the solid phase, where they shield the polymer by forming a charred layer and thus protect the polymer from being attacked by oxygen and heat. Fl ame retardants based on bromine or chlorine, as well as a number of phosphorus compounds act chemically in the gas phase and are very efficient. Others only act in the condensed phase such as metal hydroxides (aluminum trihydrate, or ATH, magnesium hydroxide, or MDH, and boehmite), metal oxides and salts (zinc borate and zinc oxide, zinc hydroxystannate), as well as expandable graphite and some nanocomposites (see below). Phosphorus and nitrogen compounds are also effective in the condensed phase, and as they also may act in the gas phase, they are quite efficient flame retardants. Overviews of the main flame retardants families, their mode of action and applications are given in. Besides providing satisfactory mechanical properties and renewability, natural fibers are easier to obtain and much cheaper than man-made materials. Moreover, they are more environmentally friendly. Recent research focuses on application of different types of fire retardants during the manufacturing proces s as well as applications of fire retardants (especially intumescent coatings) at the finishing stage. A good example for a very efficient phosphorus-based flame retardant system acting in the gas and condensed phases is aluminum diethyl phosphonate in conjunction with synergists such as melamine polyphosphate (MPP) and others. These phosphonates are mainly used to flame retard polyamides (PA) and polybutylene terephthalate (PBT) for flame retarded applications in electrical engineering/electronics (EE). These are well illustrated by the investigations on glass fiber reinforced polyamide 66 flames retarded with red phosphorus (PA 66-GF/Pr), which demonstrate these charming characteristics Figure 1 shows the thermal and thermo-oxidative decomposition of PA 66-GF/Pr in comparison to PA 66-GF, as well as the performance in cone calorimeter experiments. For both materials, decomposition is characterized by at least three different processes, which strongly overlap for PA 66-GF and are clearly separated for PA 66-GF/Pr. Some decomposition processes are shifted to lower temperatures so that the decomposition region is broadened. There is only a small increase in thermal stability for the final decomposition step. Thermal decomposition changes from a one-step decomposition to a two-step decomposition characteristic. In fire tests, PA 66-GF/Pr is an effective charging material, achieving a clear reduction in THE and HRR in the cone calorimeter, as well as the highest self-extinction classifi cation V-0 in the UL 94, whereas in the case of PA 66-GF all of the polymeric material is consumed so that only the glass fibers remain. Thermo-oxidative decomposition of PA 66 was concluded to occur in cone calorimeter experiments before ignition when a black skin is built up, and during afterglow after flame-out, when a further decrease in mass occurs accompanied by CO production. During the forced-flaming between ignition and flame-out, a stable flame rules out a major influence of oxygen on the decomposition during pyrolysis. The mass loss after flaming combustion and the burning time are used to estimate an average effective pyrolysis temperature. This temperature was estimated by the necessary equivalent isothermal thermos gravimetry with the same mass loss in the burning time. This is a very rough estimation, of course, since the sample in the cone calorimeter, which is characterized by a temperature profile developing over time, is described by a constant temperature independent of place and time. However, since the specimens investigated were rather thin (2.8 mm) and contained inert filler, and because the fire residue was rather homogenous, the values summarized in Table 3 reasonably estimate the effect. The pyrolysis temperature for PA 66-GF is controlled by the decomposition temperature of the polymer and remains more or less constant for all irradiations used. The calculated temperature is higher than-but still close to-the temperature characteristic for the maximum mass loss rate in thermos grav imetry, and the temperature increases slightly with increasing irradiation. The PA 66 is consumed nearly completely by the pyrolysis zone running through the sample. The approximated pyrolysis temperature of PA 66-GF/Pr is characterized by the decomposition temperature of the first decomposition step and thus crucially lower than the temperatures concluded for PA 66-GF. Summary: The development and characterization of self-healing synthetic polymeric materials have been inspired by biological systems in which damage triggers an autonomic healing response. This is an emerging and fascinating area of research that could significantly extend the working life and safety of the polymeric components for a broad range of applications The past decade has witnessed remarkable advances in stimuli-responsive shape memory polymers (SMPs) with potential applications in biomedical devices, aerospace, textiles, civil engineering, bionics engineering, energy, electronic engineering, and household products. Shape memory polymer composites (SMPCs) have further enhanced and broadened the applications of shape memory polymers. In addition to reinforcement, SMPCs can enable or enhance thermal stimuli-active effects, novel shape memory effect, and new functions. Many thermal stimuli-responsive effects have been achieved such as electroactive effect, magnetic-active effect, water- active effect, and photoactive effect. The typical examples of novel shape memory effects are multiple shape memory effect, spatially controlled shape memory effect, and two-way shape memory effects. In addition, new functions of SMPCs have been observed and systemically studied such as stimuli-memory effect and self-healing. Flame retardancy of polymeric materials is conducted to provide fire protection to flammable consumer goods, as well as to mitigate fire growth in a wide range of fires. Incorporating flame-resistant additives into polymers became a common and relatively cheap way to reduce the flammability of polymers, while synthesizing intrinsically fire-resistant polymers has remained a more expensive alternative, although the properties of these polymers are usually more efficient at deterring combustion References: Fame, Fire and Materials http://onlinelibrary.wiley.com A review of stimuli-responsive shape memory polymer composites http://www.sciencedirect.com Emerging Areas of Materials Science and Nanotechnology http://materialsscience.conferenceseries.com Schartel, Bernhard Phosphorus-based Flame Retardancy Mechanisms-Old Hat or a Starting Point for Future Development Braun, U.; Balabanovich, A.I.; Schartel, B.; Knoll, U.; Artner, J.; Ciesielski, M.; Dà ¶ring, M.; Perez, R.; Sandler, J.K.W.; et al. Influence of the Oxidation State of Phosphorus on the Decomposition and Fire Behaviour of Flame-Retarded Epoxy Resin Composites. Polymer 2006, 47, 8495-8508 Perez, R.; Sandler, J.K.W.; et al. Influence of the Oxidation State of Phosphorus on the Decomposition and Fire Behaviour of Flame-Retarded Epoxy Resin Composites. Polymer 2006, 47, 8495-8508 Zhang, H. Fire-Safe Polymers and Polymer Composites, Federal Aviation Administration technical report; U.S. Department of Transportation: Washington, D.C., 2004. Kumar, D.; Gupta, A. D.; Khullar, M. Heat-resistant thermosetting polymers based on a novel tetrakisaminophenoxycyclotriphosphazene. J. Polym. Sci. Part A: Polym. Chem. 1993, 31 (11), 2739-2745.

Saturday, January 18, 2020

Koreanovelas: Now a Better Media than Local Teleseryes?

Eventually, some would start to watch every episode of these shows, seeing it as â€Å"something new'. In contrary, Korean dramas, locally known as Cornflakes, have been aired in our country for more than a decade now. In fact, a lot of people grew up watching them. These shows are really nothing new to us, but why do we patronize them? Why do a lot of people prefer them over our own shows? It's mainly because we're seeing something different, better and fresh in Cornflakes.Cornflakes are undeniably one of the latest trends in our country, making us one of the places greatly hit by the throng current of the so-called Halley wave or Korean wave, that refers to the rapid spread of Korean entertainment in Asia. The Halley wave consists of mainly Cornflakes, Korean pop (Kop) music, fashion, cosmetics and home appliances, though it is believed that Cornflakes are the ones that started it all. Cornflakes have reached our country in the year 2003, Bright Girl being the first show of this t ype to be shown.Cornflakes aren't an instant hit here in the Philippines. It only reached the first peak of its popularity through the show entitled Endless Love. The said drama is greatly known through the say recognition of the names Johnny and Jenny, the Pipelined names of the characters of the story. This was greatly followed by the success of Lovers in Paris, Full House, Jewel in the Palace, Stairway to Heaven, and many more. Since then, Filipinos have been keeping an eye out for the next Cornflakes to be shown in the country.Though we are greatly aware of the popularity of Cornflakes in our country, there has been no concrete idea or concept on why these have gained a great number of Filipinos patronizing them. (For You In Full Blossom, 201 1) There are two possible reasons behind the fast entry ND widespread patronizing of Cornflakes in the Philippines: (1 ) Cultural globalization of Korea and (2) Cultural neo-colonialism of Korea in the Philippines.According to weeklies , cu ltural globalization is the rapid movement of different ideas, attitudes, and values across national borders that results to the standardization of cultural expressions in different countries. The Halley wave is one example of cultural globalization. Now that it is considered as a big part of Koreans export materials, their culture and ideas involved in the wave are rapidly spread all throughout the globe, specially in its neighboring Asian countries. Neo-colonialism, on the other hand, refers to an extension or maintenance of influence of a country over another (Merriam-Webster, 2014).In a study conducted by Aimer Associable and Johnson Eosin of the Mindanao State University entitled â€Å"Koreans Philippine Invasion†, it stated that the Philippines is now under the neo- colonization of South Korea. It is described as a form of colonialism that uses diverse art and culture to influence another country or area. Such colonialism is described as enjoyable and exciting and not b loody r catastrophic and that is the reason why Filipinos are not fighting against it, but instead are patronizing it. (Associable, Eosin, 2013) As part of our culture, Filipinos are very accommodating, not only towards new people but also towards new ideas.This is one of the reasons why we welcome the perspectives of other countries easily and without hesitation and thus forming the idea that â€Å"anything foreign is good†. Even before Cornflakes reached the Philippines, there has been a number of foreign TV shows that have been aired here in the country, such as Marimba (1996) from Latin America, and Meteor Garden (2003) from Taiwan. For You In Blossom, 2012). Popularity in our country mainly refers to the number of viewers of the show, and the shows mentioned were considered successful due to the high number of followers that watched them.In the same way as people in the Philippines welcomed Marimba and Meteor Garden, we accepted Cornflakes with open arms, even though the ideas from their shows are very different from ours and new to us. For example, Philippines was never an imperial country and the idea of a kingdom or an empire was not ordinary to us. But Cornflakes have offered to us stories of Koreans different misdoings and dynasties. Since this concept was not ordinary, it lead to people becoming more curious of it, budding questions like, â€Å"What does it look like? ‘ and â€Å"How does it work? ‘ and they watch the new shows to gain answers.In terms of new people, Cornflakes have offered to us new actors and actresses to idealize. Idealization refers to the excessive admiration of or devotion to a person (Merriam-Webster, 2014) and it has been a part of the behavior of Filipinos who love watching television to idealize. Idealization, in simple terms, means imitating their idols' way of dressing and speaking and itching their every move and this is very evident nowadays, especially to the teenage generation. We can see people now on the streets wearing clothing and (sometimes) hair with cheerful colors, imitating their Korean idols.Not only are those, but people also are now very fond Of eating Korean food and some also learn the Korean language, also known as Handful, which are commonly seen and heard in Cornflakes. In this whole process of cultural globalization and neo-colonization, Koreans striver to improve a lot of aspects in their dramas. Now, its not only because Cornflakes are a part of the Halley wave. It is now about having the high quality sets, artists and plots that piques the interest of the eyes of the Filipinos.Though both of the dramas from Cornflakes and our local telemeters are good sources of entertainment and cultural knowledge, Korean dramas are better than Filipino dramas in terms of the different elements involved in the production of these television series such as the story line and pace, staging and blocking of scenes, and the actors and actresses that portray the drama's char acters. Despite the growing popularity of Cornflakes, their ratings on our local Hansel have remained low, relative to our local telemeters.