Monday, May 25, 2020

The Geology and Archaeology of Sinkholes

A cenote (seh-NOH-tay) is the Maya term for a natural freshwater sinkhole, a geological feature found in the northern Yucatà ¡n Peninsula of Mexico, and other similar landscapes throughout the world. There are no rivers in the Yucatà ¡n; the regular high rainfall (1,300 mm or about 50 inches of rain falls every year) simply trickles through its calcareous landscape. Once below ground, the water forms a thin layer of water called a lens aquifer. Those aquifers flow horizontally, carving sinuous underground caves, and when the ceilings of those caves collapse, sinkhole openings to the surface are created. To be perfectly pedantic about it, the word cenote is a Spanish transliteration of the Maya word dzonoot or tsonot, which translates to water-filled cavity or natural well. Classifying Your Cenote Four general types of cenotes are defined in the geological literature: Open cenote or doline: a cylindrical shape with a large mouth and steep vertical walls (cenotes cilindricos in Spanish)Bottle-shaped or jug-shaped cenotes: a constricted mouth with a wider subsurface container (cenotes cà ¡ntaro)Aguada-like cenotes: shallow water basins, typically degraded from a bottle or open cenotes (cenotes aguadas)Cavern cenotes: subterranean galleries with at least one cavity, access to which is a narrow opening that resembles a toads mouth (grutas) Uses of Cenotes As the only natural source of freshwater, cenotes are and were essential resources to people living in the Yucatà ¡n. Prehistorically, some cenotes were exclusively domestic, reserved for drinking water; others were exclusively sacred with their locations kept secret. A few, like the Great Cenote at Chichà ©n Itzà ¡, were sacred sites that served a number of religious purposes, including but not exclusively ritual sacrifice. To the ancient Maya, cenotes were passageways to the underground world of Xibalba. They were often also associated with the rain god Chaac, and sometimes said to be his dwelling place. Settlements grew up around many cenotes, and they were often part of or directly connected to the most important monumental architecture of the Maya capitals. Today cenotes are often fitted with an electric well, to allow people to easily draw water to the surface, which is then used for cultivation, agriculture or livestock. Field houses are built near them to support farming activities; shrines and masonry chapels are often found nearby. Some have developed complex water control features, tanks, and troughs. Alexander (2012) reports that cenotes are intimately tied to specific family groups, and often are the subject of ownership disputes over such issues as conservation and preservation. Yucatà ¡n Peninsula Cenotes Cenote formation in the Yucatà ¡n dates back several millions of years  when the Yucatà ¡n Peninsula was still below sea level. A prominent ring of cenotes results from the Chicxulub asteroid impact of 65 million years ago. The Chicxulub asteroid impact is often credited at least partly with killing off the dinosaurs. The impact crater is 180 kilometers (111 miles) in diameter and 30 meters (88 feet) deep, and along its outer limits is a ring of limestone karst deposits into which are eroded jug-shaped and vertical-walled cenotes. The Holbox-Xel-Ha fracture system in the northeastern coast of the Yucatà ¡n captures water from the east of the peninsula and feeding underground rivers and creating cavern and Aguada cenotes. Cenotes are still being created today: the most recent was July 2010, when a cave roof collapse in Campeche state created a 13 m (43 ft) wide, 40 m (131 ft) deep hole subsequently named el Hoyo de Chencoh. Non-Maya Cenotes Sinkholes are not exclusive to Mexico, of course, they are found throughout the world. Sinkholes are associated with legends on Malta (the legendary Maqluba collapse is thought to have occurred in the 14th century AD); and Lewis Carrolls Alice falling into Wonderland is thought to have been inspired by the sinkholes in Ripon, North Yorkshire. Sinkholes which are tourist attractions include North America:  Bottomless Lakes State Park and Bitter Lakes National Wildlife Refuge in New Mexico; Leon Sinks in Florida;  the submarine  Great Blue Hole  (Caribbean Sea);  Ik Kil  cenote in the Yucatan peninsula is a big draw to cliff divers.Europe: Lagunas de Canada del Hoyo (Spain), Modro Jezero (Red Lake) in Croatia;  and Il-Majjistral Nature and History Park in Malta.   Recent Cenote Research One is Rani Alexanders (2012) article about the changes in farming practices in the Yucatà ¡n during the historical period, including the changing roles of cenotes. Traci Ardrens paper on child sacrifice highlights the Maya mythology of the Great Cenote of Chichen Itza; Little Salt Spring (Clausen 1979) is a cenote in southwest Florida, where Paleoindian and Archaic use has been established. Charlotte de Hoogds MA on Chichen Itzas sacred well is worth a look. Some recent papers such as Munro and Zurita describe concerns about the worldwide protection and conservation efforts to counter increasing pressure from intensive tourist development, urban expansion and the non-indigenous use of the cenotes, particularly in the Yucatan, where pollution threatens to destroy the peninsulas only potable water source. Source: Alexander R. 2012. Prohibido Tocar Este Cenote: The Archaeological Basis for the Titles of Ebtun. International Journal of Historical Archaeology 16(1):1-24. doi: 10.1007/s10761-012-0167-0 Ardren T. 2011. Empowered Children in Classic Maya Sacrificial Rites. Childhood in the Past 4(1):133-145. doi: 10.1179/cip.2011.4.1.133 Chase AF, Lucero LJ, Scarborough VL, Chase DZ, Cobos R, Dunning NP, Fedick SL, Fialko V, Gunn JD, Hegmon M et al. 2014. 2 Tropical Landscapes and the Ancient Maya: Diversity in Time and Space. Archeological Papers of the American Anthropological Association 24(1):11-29. doi: 10.1111/apaa.12026 Clausen CJ, Cohen AD, Emiliani C, Holman JA, and Stipp JJ. 1979. Little Salt Spring, Florida: A unique underwater site. Science 203(4381):609-613. doi: 10.1126/science.203.4381.609 Cockrell B, Ruvalcaba Sil JL, and Ortiz Dà ­az E. 2014. For Whom the Bells Fall: Metals from the Cenote Sagrado, Chichà ©n Itzà ¡. Archaeometry:n/a-n/a. Coratza P, Galve J, Soldati M, and Tonelli C. 2012. Recognition and assessment of sinkholes as geosites: lessons from the Island of Gozo (Malta). Quaestiones Geographicae 31(1):25-35. de Hoogd C. 2013. Diving the Maya World: Reassessing old excavations with new techniques: a case study on the Sacred Cenote of Chichen Itza. Leiden: University of Leiden. Frontana-Uribe SC, and Solis-Weiss V. 2011. First records of polychaetous annelids from Cenote Aerolito (sinkhole and anchialine cave) in Cozumel Island, Mexico. Journal of Cave and Karst Studies 73(1):1-10. Lucero LJ, and Kinkella A. 2015. Pilgrimage to the Edge of the Watery Underworld: an Ancient Maya Water Temple at Cara Blanca, Belize. Cambridge Archaeological Journal 25(01):163-185. Munro PG, and Zurita MdLM. 2011. The Role of Cenotes in the Social History of Mexicos Yucatà ¡n Peninsula. Environment and History 17(4):583-612. doi: 10.3197/096734011x13150366551616 Wollwage L, Fedick S, Sedov S, and Solleiro-Rebolledo E. 2012. The Deposition and Chronology of Cenote T’isil: A Multiproxy Study of Human/Environment Interaction in the Northern Maya Lowlands of Southeast Mexico. Geoarchaeology 27(5):441-456.

Friday, May 15, 2020

Essay on ethical and racial identity

Racial and Ethical Development and Identity Abstract Ethical and racial identity is a very important part of a total framework of collective and individual identity. Looking at the minority group in countries like the United States, ethical and racial identities are demonstrated in extremely cognizant ways. This demonstration is mostly generated with two contradictory cultural and social influences. To begin with, deep conscious immersion into cultural values and traditions through educational, neighborhood, familial, and religious communities instills a positive logic of confidence and ethnic identity. Secondly, individuals repeatedly must sieve ethnic identity via media messages and negative handling from others for their ethnicity and race. The information above affirms that the individuals with the status of minorities are largely disadvantaged in the society. Other groups, for example, white Americans, patent racial and ethnic identity in ways that are mostly unconscious through their assumptions, beliefs and behaviors. This is so because for those societal standards are build priorities, values, cultural, ethical, and racial frameworks then they refer to this combination as culture of Standard America and not an identity of ethnicity. This is evident every day in ways of life of the Americans, and their attitudes and behaviors. In most of the minority norms and cultures, they rarely install particular identities in line with ethnicity. However, this paper signifies that ethnic identity and multicultural framework are very essential for learners in the learning surroundings. Thus, this essay reviews appropriate ethnic and racial identity literature to enhanced comprehension in what way it appraises adult learning. Definition of Ethnic and Racial Identity The paradigms of ethnicity and race in America are difficult and complex to frame and define. This is a topic that is widely discussed in philosophy, theology, literature and Psychology among other field hence different expects have come up with different definitions making the demarcation of terms even harder (Harris 2). Racial identity in itself has been understood as others get the meaning from its social dimension while others get the meaning from its biological dimension where the quality of personality, gene pools and physical characteristics of an individual defines an individual (Spickard 14). Employing these characteristic distinguishing features, Europeans majorly group persons hierarchically by moral qualities and physical abilities, with the leading being Caucasians then Asians, Native Americans and lastly Africans at the bottom of the ethnic ladder. Nevertheless, if we look past these features, racial groups have more resemblances than variances (Littlefield, Lieberman, and Reynolds 35). However, today, definitions of social dimension are the most dominant (Helms 3). This is where most people distinguish themselves as different from others basing on their skin color. In most cases, the color of the skin plays a very big role of how certain individuals are handled. Therefore, ethnic distinctiveness is also a social difference or contrast. Actually, skin color identifies a person with a portion of a society hence functioning as an identity card. This group defined by color share cultures, norms and sometimes origin where they can be taught about themselves and sometimes other persons which makes these segments important in a way (Yinger 200). Whether unconsciously or consciously individuals will identify themselves with a group or people with whom they feel they share a common connection out of similar beliefs, values, behaviors and traditions. This segments that connect people allow them proudly know who they are and find the world around them meaningful. Conversely, there are situations where an individual feels shameful and disconnection when they are identifies with a certain group especially in situations where negative ethnicity is observable giving negative public messages room to dominate. Thus, ethnic distinctiveness development entails an individual moving in the direction of a greatly conscious relation with their traditions, beliefs, behaviors, and cultural values. Racial and ethnic identity models offer a theoretical assembly for individuals to understand and appreciate their mediation and that of other cultures as well. Models of Racial and Ethnic Identity Development Theories and models of ethnic and racial identity progress have speedily increased in the last two decades as most people are coming to terms with the fact that the United States is more racially and ethnically diverse. Additionally, there are many other psychological and social theories that try extensively to define the ‘self’ and they too agree this is a term that is difficult to define (Evans, Forney, and Guido-DiBrito 84; Helms 57). Thus, both cognitive and psychological structural models are phase models that allow growth in a stepwise development, while up-to-date models define ethnic and racial identity to be a lifelong process. Development of Racial Identity The original intent for development of these models was ensuring that the experience of the blacks in the United States is understood. One of these models is that of Cross (1971) where he shows a fit black progressing starting as a non-Afrocentric then progresses to Afrocentric and lastly multicultural distinctiveness. This transformation involves persons moving from whole ignorance of race via accepting the black culture totally heading to commitment to numerous cultures in addition to addressing all oppressed groups concerns. Cross’s model is a very imperative part of delineation ethnic identity as a vibrant progression as inclined with persons in a specific ethnic group and others and it recognizes multiculturalism and ethnocentric frames. However, the major weakness of this model by Cross is that he starts that blacks are unaware of the race of others and even their own race before they experience or know identity Another model is that by Parma (1989). For him, racial or ethnic identity development cycle is a lifelong activity that goes on continuously for blacks. His theory suggests that persons go through feelings of anger towards whites that leads to development of a positive black reference frame. As a result, bicultural realization and objective racial identity is achieved. Parham relays white people directly to black identity in a manner that moves the blacks from the unconscious to conscious. It goes on to emphasize that when blacks disagree with the Western culture and/or the negative treatment received from other because of the differences in color, they develop self-consciousness and feelings of being different from others which leads to consciousness or awareness of racial identity. Nevertheless, Parham’s model promotes a sense of development or progression. Additionally, it shows that there is growth from unconsciousness to consciousness in relation to racial identity. The w eakness of this model is its statement that the principle cause of racial identity development is exposure to racial differences that cannot be avoided. Relatively, we consider the chief trigger for separable racial identity is engagement in one’s own racial devolution and group of a racial self via that entanglement. Next is Helms (1993-1995) that is credited for developing another model of white racial identity. The model she came up assumes that the presence of institutional, cultural, and individual racism accepts white superiority. In fact, she shows that stages are a limiting factor since one individual is capable of being in more than one specific stage at a particular time. Her initial three standings outline clearly how a white individual evolutions and distances themselves from a frame of racism before they find out a non-racist identity as whites. The strong part of this model is its emphasis that racial identity development strongly relies on interracial exposure. However, its weakness is that does not distinguish between racial identity development and a non-racist frame development leading to confusion. Helms gives evidence that whites ration identity revolves around their behaviors, feelings and perceptions towards black persons instead of consciousness and development of an authent ic white racial identity. The Helms, Parham and Cross models of racial identities all discuss and debate self-racial perception and a connection between racial awareness of others. Therefore, it is evident that every individual’s self-consideration of ethnic and racial identity is imperative. Additionally, how we look and perceive others plays a very big role in consciousness and development. Ethnic Identity Development This is another model that mainly focuses on what community and family teaches persons about their culture. Thus, there can be no ethnicity without shared geography, religion, language and culture. Moreover, people of one ethnicity are connected by kinship, proximity and strong loyalty (Torres 85). Elements that comprise learned culture include behavior, symbols, and rituals that patent themselves from fundamental assumptions, beliefs and values (Ott 127). Thus, commonalities that are expected within a specific group are specified by models of identity development. Three of these concepts are what we have discussed as this concept’s representative. Walking Stickk Garrett and Garrett (1994) gives a descriptive or expressive model of Native Americans worldview and identity. They propose a number of elements of Native American perspectives and ethnic values comprising the meaning of humor, balance, harmony, spirituality and tribe. For examples, elders are a very important part of Native Americans life as they are used for reference and they are highly honored by their members who take culture seriously and identify with it. Therefore, individuals in Native America become more useful to the community as they grow older since they are considered to have gathered much wisdom that they ought to share with others in the tribe. Walking Stick Garrett and Garrett’s model is therefore useful in making available some logic of communal patterns and structures of Native American’s worldview, identity, and values. Moreover, they compare each native element with major culture, discuss how cultural immersion contributes to Native i dentity development nature, and suggest how one can successfully work with clients from Native America. However, it is imperative to note that each ethnic population can have its own differences which sometimes are very huge hence all the models mentioned are only guides to some of the ways in which ethnic identity manifests itself. Katz (1989) identifies 15 distinct perspectives and values of identifying white American culture in her evocative and descriptive model of worldview and ethnic identity. This is spread from a notion of time that is guarded and linear as a product or service, to a win-loss alignment that is connected to the competition value. White American individuals also seem to reward and value autonomy and independence. More so, Katz goes ahead to state that individuals in this class or with these believes mentioned cannot comprehend shared culture or even connect well to others. I find this model to be more objective as it does not hold the idea that all whites were born racists. However, it does not clearly state the steps that the whites go through to form an identity in ethnic line. Furthermore, this model does not address absent or activators of ethnic identity consciously. Phinney (1990) comes up with another model that she considers better than the rest as she argues that it can apply to all groups. Phinney states that every ethnic group has conflict thatcome about because of their being members of a group that is not dominant and these must be resolved. To begin with, groups that are less dominant must resolution the prejudicial and stereotypical of the white population that is dominant towards individuals of non-dominant group which leads to creating of a dangerto their self-concept. Secondly, the resolved value system clash between dominant and non-dominant groups is imperative since it gives the minority group a chance to discuss bicultural value organizations or systems. This model is advantageous in that it recognizes actual consciousness triggers and outlines facing ethnic self-concept. Nonetheless, it lacks a discussion of the positive and critical elements of absorption into an individual’s culture. Additionally, the resolution of the issues outlined largely depends on the cultures strength. Our experience demonstrates this. Alicia, who is Native American and Hispano, was raised in northern New Mexico which is her ancestral home. This village of Taos is really isolated allowing its members opportunities to hold majority of positions both in the government and educational sector. Additionally, there are versed business opportunities. Moreover, relationship, time and other aspects in daily routine of culture are basically a combination of both Hispano and Native American culture. Thus, Alicia could constantly refer to her culture even when away from home as it molded her. This was a big challenge for her when she went to the United States to study as she could not get why some things were happening in a certain manner. She also realized that her culture is viewed differently which awakened a consciousness to the ethnicity of others and hers as well (Chavez 107). On the other hand, Florence made efforts to resolve her ethnicity issues by understanding the Italian culture well and also took her time to understand other cultures in climbing the social ladder and understood the culture that was dominant. Her daily life involved a mixture of Catholicism rituals, symbols and tangled customs. Habitually these cultural inspirations were interspersed by unambiguousdissimilarities. For example, attending mass early every Sunday as it is with Italian Catholics, roll meatballs with Grandpa Guido for lasagna and plodded grapes together with Guido that would be used for red table wine. On the other hand, mama exhilarated her daughter to join the Cotillion, junior league and stop dating her Mexican lover as a result of German’s influence to South Texan beliefs. Thus, this two cultures awakened in Flo the power to move in the two worlds and cultures present in her world and also developed consciousness of ethnic identity. Implications for Adult Learning It is challenging to understand how environments of education are affected by our ethnically and racially demarcated sense of self, of education and of learning. Complications come about for many international and minority adult learners when they try to transfer learning settings that have been built in an ethnic base of beliefs, behaviors, and values and different from their own ways of doing things. Unfortunately, these ethnic and racial indicators are usually unintentionally applied by peers and educators in the process of learning making them problematic to modify, examine and identify. Those, educators should make an effort to make what is termed as invisible to be visible in their roles as educators and in the learning environment. In addition, educators get a room of developing practices that fit in multiculturalism. Also, multiculturalism manner of doing depending on styles, perspectives and knowledge must be included in a multicultural learning environment. Secondly, a stro ng learning community should be characterized with ability to challenge, support and honor every learner despite their uniqueness and different contributions. Ethnic and racial identities thus have very strong influence to the relationship between learning environment and individual learners. In most cases, white children receive education that cements their culture and ways of life. Thus, these students do not get a chance to learn about other cultures which makes it a struggle for them to adopt to educational environments characterized with multiculturalism. Additionally, there is a great possibility that they might find it tough to communicate with other student from deferent cultures as their communication skills do not develop very well. However, some whites and learners from other groups get the opportunity to experience learning out of their culture, norms and beliefs which makes it possible for them to cope with different learning environments. Therefore, for education to be greatly valuable, it is important to create learning environments that accommodated and respects diverse cultures. These can be achieved by designing individual and collaborative tasks, encouraging discussion and reflective activities, and employing relational, written, visual, and many other styles of learning (Gardner 286). Activities and Curricula must be visibly and consciously multicultural to involve a diversity of knowledge bases and worldviews. Beside, educators should always consider the relationship between how an effective learning environment is defined and the present cultural activities and practices in different communities. They should also consider what a successful learner is characterized with to know the effectiveness of the method employed. In many occasions, educators would feel comfortable when they have established the setting considering their own norms and ignoring multiculturalism. We can also not ignore that the different experiences that learners present to the learning environment largely depends on their ethnic and cultural identities. Thus, this is a major factor in what affects learning environments. Most international and minority members bring about experiences of having to survive or negotiate educational treatment of negative and invisibility stereotyping, lowed expect ations, abuses and sometimes hostility (Ott 72). These individuals therefore get the ability to compare different cultures and give an objective observation. Lastly, educators can build positive communities of multicultural learning by teaching in dependable, self-sharing and rational ways, by offering and encouraging lenient handling of multiple points of view and by enabling a feeling of respectful and humble community for learning in the learning environment. Additionally, educators should help learners grasp the essence of developing multicultural skills and understanding as it largely fuels and enhances the learning experiences. Works Cited Chà ¡vez. A. Weaving My Way: The Cultural Construction of Writing in Higher Education. Journal of Poverty. 1998. Chà ¡vez, A. F., Guido-DiBrito, F., and Mallory, S. Learning to Value the ‘Other’: A Model of Diversity Development. Paper presented at the National Association of Personnel Administrators Conference, Atlanta. 1996. Cross, W. Toward a Psychology of Black Liberation: The Negro-to-Black Con- vengeance Experience. Black World,1971. Cross, W. E., Jr. The Psychology of Nigrescence: Revising the Cross Model. In J. G. Ponterott, J. M. Casas, L. A. Suzuki, and C. M. Alexander (eds.), Handbook of Multi-cultural Counseling. Evans, N. J., Forney, D. S., and Guido-DiBrito, F. Student Development in College: Theory, Research and Application. San Francisco: Jossey-Bass. 1998. Garrett, J. T., and Walking Stick Garrett, M. The Path of Good Medicine: Understanding and Counseling Native American Indians. Journal of Multicultural Counseling and Development. 1994. Gardner, H. Extraordinary Minds: Portraits of Exceptional Individuals and Examination of Our Extraordinariness. New York: Basic Books. 1997. Harris, H. W. Introduction: A Conceptual Overview of Race, Ethnicity and Identity. New York: Routledge. 1995. Helms, J. Introduction: Review of Racial Identity Terminology. In J. E. Helms (ed.). Westport, Conn.:Praeger, 1993. In J. G. Ponterott, J. M. Casas, L. A. Suzuki, and C. M. Alexander (ed.). Handbook of Multicultural Counseling. Thousand Oaks, Calif.: Sage, 1995. Katz, J. H. The Challenge of Diversity. In C. Woolbright (ed.), College Unions at Work, Monograph No. 11, 1–17. Bloomington, Ind.: Association of College Unions- International. 1989. Littlefield, A., Lieberman, L., and Reynolds, L. T. Redefining Race: The Potential Demise of a Concept in Anthropology. Current Anthropology. 1982. O’Hearn, C. C. Half and Half: Writers Growing Up Biracial and Bicultural. New York: Pan- theon Books, 1998. Ott, S. The Organizational Culture Perspective. Chicago: The Dorsey Press, 1989. Parham, T. Cycles of Psychological Nigrescence. The Counseling Psychologist. 1989.

Wednesday, May 6, 2020

A Report On Net Metering - 1575 Words

Net Metering Any power produced by on-site generators can be used by the customer or cogeneration facility. If there is more electricity generated than is used on-site or in the home that power can travel back through the meter and onto the distribution grid, providing power in those moments for other local customers. Customers feeding electricity back to the grid can present unique challenges for grid operators trying to manage supply and demand efficiently. For example, in cases such as Hawaii’s, unwanted solar energy that utilities are forced to take may add too much energy to an already-taxed system, increasing the risk of voltage spikes. Aside from the challenges for grid operators in balancing the flow of electricity, utilities also†¦show more content†¦Net Metering Policies Currently, 43 states and the District of Columbia have adopted formal net metering policies. While there is some variation, customers are generally reimbursed for the electricity they supply back to the grid at the full retail rate, when utilities could purchase power from local power plants at wholesale prices. But most customers do not supply power to the grid, and this cost shift from net metering customers to others (generally from solar users to non-solar users) has driven discussions on reforming net metering policies nationwide. Finding a fair way to address these issues going forward is essential for promoting long-term equity and reliability in the power grid. Demand-Side Management (DSM) Electricity may be the one industry in which suppliers actively encourage customers to use less of their product, and that is partly due to demand-side management (DSM) policies. DSM policies such as energy efficiency laws encourage or force utilities to sell less electricity, particularly during peak hours when electricity use and electricity prices are highest. Critics of DSM point out two fundamental problems: 1) DSM policies start with a false premise—they assume everyone uses too much electricity to begin with, which is impossible to know for each individualShow MoreRelatedThe Electric Bill And The Critical Peaks- Unequal Prices Of Electricity During The Day Essay1441 Words   |  6 Pagesbreakdown of total charge, the rate, and learn about the critical peak. The electric bill includes many different parts. Based on the information from Eversource, they are: †¢ Customer Charge: This represents the costs of providing services such as metering, billing and account maintenance. These are fixed costs and are not affected by the actual amount of electricity used. †¢ Distribution Charge: This represents the cost of delivering electricity over wires to your home. †¢ Transition Charge: This representsRead MoreThe Role Of Marketing And Management Of Csr Projects Essay708 Words   |  3 PagesRelevant Work Experience Business Support Assistant 2009 - Present Interconnector (UK) Ltd †¢ EA responsibilities: Arranging travel, accommodation and itineraries; producing documents, briefing papers, reports and presentations; organising and maintaining diaries, board papers; scheduling meetings and booking conferences. †¢ Marketing and social media: Supporting the marketing strategy for the business through researching channels to market, competitors, growth areas, and social mediaRead MoreCan Sustainable Energy and Fossil Fuel Co-Exist1389 Words   |  6 Pagesinvestment. When the business owners start seeing profits rise, it trickles down onto the consumers. On a large scale, investors have seen large returns from their investments as reports from 2004 shows â€Å"Sustainable energy worldwide continues to attract strong capital investment at all stages of the financing lifecycle. This report shows that investment in sustainable energy worldwide has more than doubled in the last two years, from $27.5 billion in 2004 to $49.6 billion in 2005 and $70.9 billion in 2006Read MoreThe Environmental Impact Of Renewable Energy Sources1555 Words   |  7 Pagesour primary source to make electricity, which is the cause of global warming, so should we be using renewable energy sources instead to reduc e pollution? 2. Which renewable energy source would be the most practical for people to adapt? For this report I researched by using the internet to look for information pertaining to carbon emissions and possible ways of mitigating the global warming issue. There are many factors to consider when dealing with human-generated emissions. The topics I will coverRead MoreHomeowners Adding Grid Soila Photvoltaic Systems2762 Words   |  11 Pagesor shortage of energy used. During times of excess energy the meter will feed it back into the grid where it can be used. When there is a shortage of energy, electricity will be consumed from the electric companies. The entire process is called net metering, when a PV system is connected to a utility system; by feeding or using energy into the grid. (Solar Direct, 2013) There are various types of photovoltaic systems a homeowner can invest in; a grid-tied, off-grid system, or grid tied with batteriesRead MoreClean Energy Service On A National Scale1731 Words   |  7 Pagesand efficiency services from a single source, without requiring the services of multiple third-parties. Our project management and performance monitoring systems scale to support millions of users, and provide our customers a real-time view of their net energy consumption and carbon footprint. OPPORTUNITIES THAT WE PROVIDE SO THAT YOU CAN TAKE CONTROL OF YOUR ENERGY COSTS. We offer you the ability to predict and manage your energy use and spend. Our customers buy renewable energy from us for lessRead More The Federal Governments Effect on Renewable Energy in the United States4121 Words   |  17 PagesOctober 24, 2006, the global conservation group, formerly known as the WWF, stated that â€Å"humans are stripping nature at an unprecedented rate and will need two planets worth of natural resources every year by 2050 on current trends† (Blanchard). The report indicates that, if every other country were to use the same amount of energy as America does, five planets worth of resources would be needed to support the world. America, as one of the largest consumer countries of energy, has been making attemptsRead MoreClimate Change The Harvard University1461 Words   |  6 Pagesmitigate climate change the Harvard University is fostering its schools, employees and students to reduce greenhouse gases (GHG) emissions. â€Å"As an initial step in pu rsuit of its long term goal, Harvard committed to an immediate goal of reducing its net GHG emissions resulting from existing operations and future growth by 30% relative to its 2006 baseline by 2016† (â€Å"Greenhouse Gas Reduction Goal,† 2013). The Green Harvard Initiative, together with the Harvard’s Office of Sustainability and the EnvironmentalRead MoreMarketing Analysis : Marketing Strategy Essay1445 Words   |  6 Pagessolar Industry a great part of the promotion effort lies in the downstream, and this is where SolarCity put a greater effort: on the 2,510 employees (2012), 661 work in sales and marketing and 248 work in customer care (SolarCity, â€Å"SolarCity annual report 2013†, SolarCity, 2013). SolarCity promotion relies mainly on a well-trained direct sales force used for what the founder calls in-house sales. The direct-sale force is backed up by a call center and a cross-promotion channel partner such as HomeRead MoreEssay On Energy Power System1358 Words   |  6 PagesIntroduction (why) Historically, loads were variable but predictable, generation was dispatchable and there was no significant amount of bulk energy storage in the power system. However, nowadays, numerous recent reports and studies [1, 2] have discussed significant changes going on in the electric power system. These changes include the growth in the use of renewable energy resources in the bulk power system, proliferation of distributed energy resources (DER), an increasing number of installations

Tuesday, May 5, 2020

Communications Surveys and Tutorials †Free Samples to Samples

Question: Discuss about the Communications Surveys and Tutorials. Answer: Introduction The Information Technology have been growing rapidly in the modern market by providing benefits to the business organization. The use of different technologies in the business operation have provided growth in the revenue of the business organization. This report deals with the risks and threats in the business organization after using the different technologies over the internet. This report outlines the different factors that are causing problems in the cyber world. There are some initiatives taken to minimize the identified problems. The security of the data and information over the internet s termed as the cyber security. It has become a serious issue for the business organization all over the world. There is an increase in the number of cyber-attacks all over the world (Von Solms and Van Niekerk, 2013). The installation of the anonymous software has been a big problem for the business organization. The installation of the unwanted software has been stopped that has reduced the hardware crash and other problems (Wang and Lu, 2013). The above figure depicts about the comparison between the data breach and cyber-attack all over the world. It can be analyzed that the ratio of cyber-attacks has been more than the data breach in the companies. The major problem for the cyber security is the threat of viruses and malwares. These viruses and malwares re responsible for the cyber-attacks in the server over the internet (Hahn et al., 2013). The hackers used to hack the websites and online databases of the company by sending phishing mails, viruses and malwares. These types of hackings are used by the hackers to cause data loss of the data and asks for ransom against the data and information (Amin et al., 2013). The multi-disciplinary affairs of the business organization have led to the threats of cybercrime and cyber-attacks in the business organization (Gordon et al., 2015). The cyber security has been continuously evolving in the internet technology sector. The use of the old version of software does not helps in detecting the virus and malwares in the database server of the company (Ayres et al., 2016). This causes the cyber-attacks in the database server and cases huge loss to the data and information of the company. 4 levels of Thinking The four levels of thinking model helps in analyzing the problems and different issues in different fields of operations. The four levels of thinking deals with identifying the factors of the problems. In this case, cyber security has been a prioritized theme for the business organization. The level 1 discusses about the positive feeling regarding the sector. The cyber security has been an important sector for the business organization and has provided many benefits to the organization. The level 2 of thinking deals with the negative feeling for related topics. The cyber-attacks has been causing a huge loss in the data and information of the companies in the market (Herrera, Ron and Rabado, 2017). The level 3 deals with the positive thinking but not well for the business organization. The use of old firewalls and anti-viruses is causing threat for the company related to the cybercrime. The level 4 of thinking deals with the thinking that does not feel good and not good for others. The use of the unsecure gateway has been a cause for the cyber-attacks in the business origination. Initiatives for mitigating problems There are various strategies and initiatives are made to mitigate the cyber security problems in the organization. The security methods of the company have to be enhanced to restrict the viruses and malwares in the server of the company. The critical resources of the company have to be maintained by the security strategies of the company in the market. The security protocols of the companies have to be upgraded. The strategies of the company in order to provide security to the data and information includes the encryption technique the data transfer in the company is done with the help of data encryption method that helps in securing the data packets from hacking (Buczak and Guven, 2016). The encryption o data is done with the help of a pattern and a key that is only known by the receiver and sender. The data and information of the company have to be secured or the success of the company in the market. The Data Protection Act 1998 has been properly implemented in the companies. This act helps in securing the personal information of the employees and other staffs of the organization (Inan et al., 2016). No personal data and information is shared with anyone without the permission. Therefore, this has helped in maintaining the security of the data and information. The installation of the anonymous software has been a big problem for the business organization. The installation of the unwanted software has been stopped that has reduced the hardware crash and other problems (Von Solms and Van Niekerk, 2013). Only the licensed software is installed in the server of the companies. Recommendations The IT solutions to the cyber-attacks in the world have become ab important agenda for the business organization in the market. The companies needs to use updated firewalls and anti-virus software that helps in restricting the dangerous viruses and malwares from entering into the database server of the company. The unauthorized users are not allowed to use the portal of the company. There is prior need of monitoring the security needs of the company. A regular checkup of the security solutions are done for analyzing the security levels of the company in the market. Conclusion It can be concluded that the cyber security has been an important part or the business organization in the market. The cyber-attacks has been the main problems to the cyber security. Various viruses and malwares are used for the attacks in the server of the company for causing data breach of the company. The use of the updated firewalls and anti-viruses software help in maintaining the security of the server from the cyber-attacks over the internet. References Amin, S., Litrico, X., Sastry, S. and Bayen, A.M., 2013. Cyber security of water SCADA systemsPart I: Analysis and experimentation of stealthy deception attacks.IEEE Transactions on Control Systems Technology,21(5), pp.1963-1970. Ayres, N., Maglaras, L., Janicke, H., Smith, R. and He, Y., 2016. The mimetic virus: A vector for cyber security. Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection.IEEE Communications Surveys Tutorials,18(2), pp.1153-1176. Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2015. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(1), p.24. Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid.IEEE Transactions on Smart Grid,4(2), pp.847-855. Herrera, A.V., Ron, M. and Rabado, C., 2017, June. National cyber-security policies oriented to BYOD (bring your own device): Systematic review. InInformation Systems and Technologies (CISTI), 2017 12th Iberian Conference on(pp. 1-4). IEEE. Inan, F.A., Namin, A.S., Pogrund, R.L. and Jones, K.S., 2016. Internet use and cybersecurity concerns of individuals with visual impairments.Journal of Educational Technology Society,19(1), p.28. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges.Computer Networks,57(5), pp.1344-1371.