Friday, November 15, 2019

Real World Distributed Applications

Real World Distributed Applications Topic 1: Give two examples of real world distributed applications that were not discussed in the class slides (Hospital Management system, Airline reservation system, Banking system). You should not only specify what the application does, but also provide at least 3 features of the system (hardware technology, software technology, integration features, number of nodes, network characteristics, etc.) Answer: Example 1: Immigrant VISA information System (IVIS)   Ã‚   This is a computerized Management information system. It is used by the National VISA Center (NVC) to manage the processing of immigrant visa petitions received from the Department of Homeland Security (DHS), United States Citizenship and Immigration Services (USCIS) regional service centers and district offices. The information shared by IVIS is used for processing; auditing and tracking of individual immigration visa applications as well as tracking the number of immigrant visas assigned that are subject to numerical limitations based upon the visa classification and country of chargeability. Only internal organization that has access to IVIS data is the Bureau of Consular Affairs (CA). IVIS System is used by CA for issuing visas to foreign nationals and passports to U.S. citizens. IVIS results are used as a data source for this assessment at Posts abroad and domestic passport agencies. Specifically, data is shared among the following CA applications: DataShare/Interagency Data Exchange Application (IDEA) This provides application case data from the petition. This data arrives daily and is manually loaded into IVIS. This data is automatically populated in IVIS when creating a new case. Consular Consolidated Database (CCD) Conduit for data exchange between IVIS and DataShare / IDEA. Immigrant Visa Allocation Management System (IVAMS) The Case Number, FSC, Post Code, and Visa Class were loaded into IVAMS for the purpose of immigrant visa tracking and reporting. Diversity Visa Information System (DVIS) Alien Numbers generated in IVIS are transferred to DVIS and the DV post systems. Immigrant Visa Overseas (IVO) data on immigrant visas, petitions, and allocations is sent to a post location and loaded into their IVO systems. SharePoint data and images on immigrant visas, petitions, and appointment information is shared with a post through a secure site. Worldwide Refugee Admission Program System (WRAPS) data on immigrant visa petitions is sent to the Refugee Processing Centers WRAPS system. Features of the VISA Information System (VIS): Hardware: Mainframe systems. Government-operated computing platforms not shared by other business applications or technologies. Finger print recognition, biometrics technology and , intrusion detection systems. Software: DataShare is used to move the data from the Consular Consolidated Database (CCD). That allows text files to be converted into Interagency Data Exchange Application (IDEA) format and transferred to USCIS. Encryption technology is used during all communications shared with external agencies. Finger print reader / recognition. Firewalls. eDP (Electronic Data Processing) Web Data Replication technology Networking : This mainframe system has Networking z/OS network capability which includes a fully -featured communications server with integration of SNA (System Network Architecture) and TCP/IP protocols, making it a large server capable of serving a large number of worldwide clients simultaneously Example 2: Retail Management Information System at GS-Retail, South Korea. GS-Retail is a largest retailer in South Korea. They are using Retail management information system (RMIS) to support their distributed stores by linking them together using distributed applications. Below are the features of this GS-Retails RMIS: Information is exchanged instantly; store managers stays in contact to more effectively control profits for the whole company. This system supports product management and also enabled ability to do CRM (Customer Relationship Management) analysis. Allowed managers to set prices for variable time periods based on the store location and to meet the needs of sales and inventory managers. , Provided flexibility to make use of a mobile user interface. Its an integrated platform end-to-end solution (Appliance), which has below components Application Module, IBM Smart Analytic Solution (Admin nodes, and Data Nodes with Standby nodes). Hardware Stack: with IBM System x3650 M3 servers, Storage servers (DS3400) with SSDs (Solid State Drives), SAN Switches. This integrated platform (hardware, software with functional procedures) which provides an ability to replace superannuated servers and have a single Implementation of the integrated Enterprise Data Warehouse Environment Software Stack: DB2 Enterprise server edition, IBM Tivoli System Automation for multi-platforms (TSA) with RSCT (Reliable Scalable Cluster Technology), IBM Cognos 8 Business Intelligence, IBM Cognos 8 Business Intelligence, IBM Systems Director, DS Storage Manager, IBM Remote Support Manager (RSM) for Linux Integration features: Easily scalable and expandable solution where data nodes can be added to the existing cluster solution to expand the capacity of the system. Number of nodes: 2 Application Nodes, 1 Management node, 1 Administration node, 4 Data Nodes and 1 Standby node Network characteristics: Network is fault- tolerant and resilient. This system has two networks Public (for external client communication) and Private FCM Network which is used by the system for internal communication between the data nodes. For public network, two HBA adapters were provided which were bonded together. Network and switch failures are protected by H/W redundancy. For example: Single Network port failures using Bonded networks. Dual HBAs adapters to take care of HBA failures and Stacked switch configuration for FCM (Fiber Optic Communication Management network) Network to take care of FCM network switch failure. Topic 2: Describe two similarities between road/highway networks and packet switching networks Packet switching network is a network which routes digital data in small pieces called packets, each of which proceeds through the network independently. This digital data is nothing but a bit stream with encoded information. Packet is not really a physical thing. Thus, packets switched networks transport packets. This network is in many ways similar to the transportation network of roads, highways and intersections which transports vehicles that carries people and goods. For Example when a factory needs to move a large amount of cargo to some destination warehouse located thousands of miles away. At factory, first the cargo is segmented and loaded into a fleet of trucks. Each of trucks then independently travels through the network of intersections, roads and highways and to the destination warehouse. At destination warehouse, the cargo is unloaded and grouped with the rest of cargo arriving from same shipment. Below are some similarities between packet switching network and road/highway transportation network: Packets are similar to trucks Communication links are similar to highways and roads Packet switches are similar to intersections End systems are similar to buildings Trucks take path through transportation network, packets takes path through computer network Retail management means running a store where merchandise is sold and Retail Management Information Systems include using hardware, software and procedures to manage activities like planning, inventory control, financial management, logistics and point of sale transactions. Distributed application Name: CLAIMS 3 i.e Computer Linked Application Information Management System and Associated Systems. CLAIMS 3 is the case management system used by USCIS that supports and maintains officer casework documentation and tracking for most benefit requests. USCIS oversees lawful immigration to the United States. It receives and adjudicates petitions, applications, and other requests for immigration benefits. ICMS is a web based front-end to CLAIMS 3. ICMS can be used to review, modify, and track the adjudication performed by USCIS personnel of benefit request forms. CLAIMS 3 functionalities include tracking the adjudication performed by USCIS personnel, archiving, card production, case history, case transfer, on-demand reports, electronic file tracking, image capture, production statistics, and status update and electronic ingestion of benefit request form data captured through the Lockbox. USCIS uses the Computer Linked Application Information Management System (CLAIMS 3) and associated systems to manage the adjudication process for most domestically filed, paper-based, immigration benefit filings with the exception of naturalization, intercountry adoption, and certain requests for asylum and refugee status. USCIS uses different data systems to capture and store information provided by benefit requestors, including the Computer Linked Application Information Management System (CLAIMS 3), the Interim Case Management System (ICMS), and Marriagee Fraud Amendment System (MFAS), collectively referred to as CLAIMS 3 and associated systems. 3 features of the system (hardware technology, software technology, integration features, number of nodes, network characteristics, etc.) :CLAIMS 3 and associated systems are old, legacy, mainframe systems that do not have the capability to interface in real-time with other systems or to generate reports, metrics, or aggregated statistics. CLAIMS 3, includes the Mainframe, Local Application Network (LAN), ICMS, and MFAS. But CLAIMS 3 still serves as the authoritative source case management system for certain benefit requests because so many other tools and systems point to it. Software technology : Data Replication technology is used to replicate data from CLAIMS 3 across many systems and tools within USCIS due to the technical limitations of CLAIMS 3 itself. Integration features : This system stores the information related to: Petitioner and Beneficiary data Processing of cases based on priority and the cut-off dates, Creation and recording of correspondence with the beneficiary, petitioner and/or agent and the transmittal of data to the Immigrant Visa Overseas (IVO) system at post for final processing. IVIS applications assists NVC in tracking and processing immigration visa petitions based on local necessities and requirements established by the State Department. The immigrant visa issuance process begins with the submission of a petition for immigration to the USCIS. USCIS reviews and adjudicates the petition and forwards approved petitions to the State Department for visa processing. The NVC performs several visa processing activities that track petitions requesting immigration services from initial NVC receipt from USCIS through transfer to the posts. NVC processing includes: Telecom Industry fraud management Reference : http://searchitoperations.techtarget.com/definition/distributed-applications-distributed-apps Distributed apps can communicate with multiple servers or devices on the same network from any geographical location. The distributed nature of the applications refers to data being spread out over more than one computer in a network. Distributed applications are broken up into two separate programs: the client software and the server software. The client software or computer accesses the data from the server or cloud environment, while the server or cloud processes the data. Cloud computing can be used instead of servers or hardware to process a distributed applications data or programs. If a distributed application component goes down, it can failover to another component to continue running. Distributed applications allow multiple users to access the apps at once. Many developers, IT professionals or enterprises choose to store distributed apps in the cloud because ofclouds elasticity and scalability, as well as its ability to handle large applications or workloads. Enterprises can choose to use container technology, such as Docker, to package and deploy distributed applications. The containers can build and run distributed applications, as well as separate distributed apps from other applications in a cloud or shared infrastructure.

Tuesday, November 12, 2019

Odysseuss Qualities in The Odyssey :: Homer

In the Odyssey by Homer, Odysseus must face many obstacles on his journey. He is only able to conquer them because of his wonderful qualities. He meets, a Cyclopes, Sirens, a six-headed monster, a regurgitating whirlpool, and a group of greedy, lovesick men. Some Odysseus's more important qualities are, determination, cunning, and protecting. One of Odysseus's many qualities is determination. He remains determined throughout the entire saga to get back to his family. During Odysseus's Odyssey he encounters many obstacles, beast, god, and nature. Odysseus must get through all of these hardships before he can make it back to his family and home. On his way back Odysseus is next to Charybdis and she swallows his boat. He must holds on to the branches of a fig tree to survive, "But I clung grimly, thinking my mast and keel would come back to the surface when she spouted. And ah! How long, with what desiree, I waited! Till, at the twilight hour...the long poles at last reared from the sea"(12.560-64). Odysseus shows his determination to get home, because it would be easy for him to just let go and drown, but no Odysseus hangs on so he can see his wife again. Once he is at home he finds suitors at his house. Odysseus kills one of them and the others beg for mercy, ??Not for the whole treasure of your fathers, all you enjoy, la nds, flocks, or any gold put up by others, would I hold my hand??(22.65-67). Odysseus is determined to get revenge on all of the suitors and he will not be satisfied until they are all dead. Without his strong will and determination Odysseus would not have made it through his trials. Although determination is a must for a journey such as Odysseus?s cunning is also just as essential. Odysseus?s cunning is cardinal to his survival and that of his men. He uses his cunning to get them out of several unpleasant situations. When they are captured by the Cyclops, he can not use the strength of his men to escape, so he must use his cunning to free them. He lies and tricks the Cyclops to get out, ??My name is Nohbdy: mother, father, and friends, everyone calls me Nohbdy?? (9.397-99). This clever deception stops the other Cyclops from helping Polyphemos helping them to escape. Odysseus also shows his cleverness when he returns to Ithaca.

Sunday, November 10, 2019

Bewitched Discussion

One of the strongest and perhaps oldest emotions of mankind is fear, and the most intriguing fear is the fear of the unknown. The idea of fear inspires classic and contemporary writers to explore the things that cannot be seen or fully comprehended by human understanding, from the element of fear of the unknown to the exploration of something metaphysical that motivates detachment from life. One of the common themes in relation to fear that is explored in â€Å"Bewitched† is the subject of supernatural.Classified under the supernatural genre, the Bewitched story by Ueda Akinari can be compared to the story of the â€Å"Beauty or the Beast† in contemporary literature where animals are used symbolically to imply something significant about the literature. However, the woman who turned out to be a snake in â€Å"Bewitched† is deeper and harder to explain than the man who became a beast in â€Å"Beauty and the Beast. † This is because the stories of the Japane se writer Akinari were made during 18th century where religion was highly discussed and debated.Human awareness regarding religion or divinity was very limited. In fact, the author’s religious conviction and orientation about paganism is reflected in his works. In a way, the story of â€Å"bewitched† is also like the story of the falling angel â€Å"Lucifer. † Bewitched is aesthetically unique and creative because Akinari initially and creatively delved into how to twist something wonderful into something unappealing yet stimulating.However, aside from this, there are presently limited stories that are similar to Akinari’s Bewitched story. Even in the early 20th century in the West, contemporary literature explored the topic of politics and societal concerns as a means of social movement for public awakening. Most of the contemporary literary pieces nowadays under the horror genre do not touch on the topic of supernatural kind; rather, most of them deal w ith the horrifying side of human nature.

Friday, November 8, 2019

Tenses and Forms of the Verb to Buy for ESL

Tenses and Forms of the Verb to Buy for ESL This page provides example sentences of the verb Buy in all tenses including active and passive forms, as well as conditional and modal forms.   Present Simple Use the present simple for routines and habits such as how often you  buy something at the store. Jack usually buys his groceries on Saturdays.Where do you buy your furniture?She doesnt buy any food at that store. Present Simple Passive The supplies are usually bought on Friday afternoons.When are new textbooks bought for the school?Wine isnt bought in great quantities. Present Continuous Use the  present continuous  to speak about what is happening at the present moment such as what you are buying in the store. They are buying a new house this month.Are they buying a new car soon?She isnt buying his story about his hard luck. Present Continuous Passive Not commonly used with buy Present Perfect Use the  present perfect  to discuss actions that have happened repeatedly such as how many times you have bought a specific product. We have bought a number of antique chairs.How long have you bought his story for?They havent bought any new furniture for a while. Present Perfect Passive Those antique chairs have been bought by customers in San Diego.Where has that been bought and sold before?It hasnt been bought by anyone.   Past Simple Use the  past simple  to speak about something you bought at a point in time in the past. He bought that painting last week.Where did you buy that sofa?She didnt buy any food for dinner, so theyre going out. Past Simple Passive That painting was bought last week.What was bought at the garage sale yesterday?That painting wasnt bought at the auction. Past Continuous Use the past continuous to describe what someone was buying when something else occurred. She was buying a new car when he telephoned.What were you buying when you got the call?She wasnt buying his story despite his insistence.   Past Continuous Passive Not commonly used with buy Past Perfect Use the  past perfect  to what  you had bought before something else happened.   Larry had bought the books before she arrived.What had they bought before they were offered the house?She hadnt bought enough food for the party, so she went out again. Past Perfect Passive The books had been bought before she arrived.Which ingredients had been bought for the meal?Not enough wine had been bought for the occasion.   Future (Will) Use  future tenses  to speak about something that you will / are going to buy  in the future. I think he will buy a present for Mary.Will you buy his proposal at the meeting?She wont buy what hes saying. Future (Will) Passive A new book will be bought for that child.Will that painting be bought at the auction?Food wont be bought by Peter.   Future (Going To) The teacher is going to buy the books for the children.What are you going to buy for dinner tonight?She isnt going to buy that house. Future (Going To) Passive The books are going to be bought for the children.What is going to be bought for drinks?They arent going to be bought by anyone for that price. Future Continuous Use the future continuous to express what you will be buying  at ​a  specific point in time in the future.   He will be buying groceries this time next week.Will you be buying anything this time tomorrow?She wont be buying a house anytime soon.   Future Perfect They will have bought five new computers by the end of the sale.What will you have bought by the end of the day?Youll see, she wont have bought anything. Future Possibility Use  modals  in the future to discuss future possibilities.   I might buy a new computer.Might Peter buy the house?She may not buy his story.   Real Conditional Use the  real conditional  to speak about possible events. If he buys that painting, he will be sorry.What will he buy if he inherits the money?She wont buy the house if its put up for auction. Unreal Conditional Use the unreal conditional to speak about imagined events in the present or future.   I would be sorry if I bought that painting.What would you need if you bought a new house?She wouldnt buy the house if you bought it. Past Unreal Conditional Use the past unreal conditional to speak about imagined events in the past.   If you hadnt bought that painting, you wouldnt have lost so much money on the investment.What would you have done if he had bought you a diamond ring?She wouldnt have bought that house if she hadnt had enough money. Present Modal I should buy some new clothes.Where can I buy an ice-cream cone?They mustnt buy anything today. Theres no money in the bank. Past Modal They must have bought some new clothes.What should you have bought last year?They couldnt have bought his story.   Quiz: Conjugate With Buy Use the verb to buy to conjugate the following sentences. Quiz answers are below.   He ______ that painting last week.Larry _____ the books before she arrived.Jack usually ______ his groceries on Saturdays.I think he ______ a present for Mary.They _____ five new computers by the end of the sale.I would be sorry if I _____ that painting.The supplies are usually _____ on Friday afternoons.We _____ a number of antique chairs.That painting _____ last week.They _____ a new house this month. Quiz Answers boughthad boughtbuyswill buywill have boughtboughtboughthave boughtwas boughtare buying

Wednesday, November 6, 2019

Nightmare on Elm Street movie review essays

Nightmare on Elm Street movie review essays The movie A Nightmare on Elm Street is a crazy horror movie. Its about the teenaged children of Elm Street and how they all start to die, one-by-one, apparently being killed off by something when they sleep. Something in their dreams was murdering the children. A girl named Nancy Thompson is determined to find out what was happening to the children and how they were being murdered in their sleep. She has to do all of this before its too late and she too becomes a victim of the murders. She later discovers that the children killer is a long dead serial-killer Freddy Krueger, but he had been burnt to death by vengeful parents many years before. This movie was a fantastic because it is completely insane and was just made to scare people. Nothing can actually attack us and kill us in our dreams. There are no such creatures that have blades for hands and raw meat for a face that go about killing us in our sleep. This movie was quite interesting. I thought it was very wild and creative. I really liked the consistent twists and turns of the story. The action never stopped, but at times it really slowed down and became pointless. The movie had many catchy lines that made the movie funny along with being scary. One thing in the movie that I really thought was good was the ending, just how it was cut off preparing itself for a sequel. ...

Sunday, November 3, 2019

Select two pieces of property in different areas of the city, identify Essay

Select two pieces of property in different areas of the city, identify their owner and assessed value, and discover from the records at least one interesting additional fact about each - Essay Example Therefore, the total market value for the property is 15,400 dollars. The interesting bit about this property is that assuming it is sold; the owner has 6 months to purchase the property back from the buyer for a price equal to the amount paid as an auction. 2110 E Susquehanna Ave in Philadelphia is a property that was sourced from the assessment roll on 29th June 2011. The owner of the property is Smith Nancy Theobald and Edward Theobald. Their contact is 2108 E Susquehanna Ave. The land acreage for the property is 0.018 with a property class of 911and a zoning of R10A. The property tax is 68.79 dollars, 2200 dollars as its land market value and no improvement market value. Therefore, the total market value for the property is 2,200 dollars. The most fascinating fact of the property is that it is a deeds ownership type of

Friday, November 1, 2019

Economics - Financial Institustions and Markets Research Paper

Economics - Financial Institustions and Markets - Research Paper Example This paper looks at the collapse of the repo market and the effect of ‘safe harbor’ facilities provided to the lending institutions in the derivatives market. Arguments have been made that the use of collaterals have made more harm than benefit to the economy and hence alternatives have been discussed to eliminate these facilities from the market. Thesis statement The aim of this paper is to investigate the causes of failure of the financial institutions in the United States. The research is specifically directed towards the study of the structure of the US financial system and the role of safe harbor in the failure of major financial institutions in the country. Introduction The global financial collapse has been one of the most significant incidents in the history of the world and it has raised significant research and debates on the factors that led to a financial breakdown of such a measure. There is considerable debate on the causes of this phenomenon and researcher s have not been able to come to clear consensus about the actual causes of the incident. However, a stream of events has been identified, which are considered to be the possible factors that led to the downfall of the financial institutions