Wednesday, November 27, 2019

How to Declare and Initialize Constant Arrays in Delphi

How to Declare and Initialize Constant Arrays in Delphi In Delphi, the versatile web-programming language,  arrays allow a developer to refer to a series of variables by the same name and to use a number- an index- to tell them apart. In most scenarios, you declare an array as a variable, which allows  for array elements to be changed at run-time. However, sometimes you need to declare a constant array- a read-only array. You cannot change the value of a constant or a read-only variable. Therefore, while declaring a constant array, you must also initialize it. Example Declaration of Three Constant Arrays This code example declares and initializes three constant arrays, named Days, CursorMode, and Items. Days is a string array of six elements. Days[1] returns the Mon string.CursorMode is an  array of two elements, whereby declaration CursorMode[false] crHourGlass and CursorMode crSQLWait. cr* constants can be used to change the current screen cursor.Items defines an array of three TShopItem  records. type   Ã‚   TShopItem record   Ã‚  Ã‚  Ã‚   Name : string;   Ã‚  Ã‚  Ã‚   Price : currency;   Ã‚   end; const   Ã‚   Days : array[0..6] of string   Ã‚   (   Ã‚  Ã‚  Ã‚  Ã‚  Sun, Mon, Tue, Wed,   Ã‚  Ã‚  Ã‚  Ã‚  Thu, Fri, Sat   Ã‚   ) ;   Ã‚   CursorMode : array[boolean] of TCursor   Ã‚   (   Ã‚  Ã‚  Ã‚   crHourGlass, crSQLWait   Ã‚   ) ;   Ã‚   Items : array[1..3] of TShopItem   Ã‚   (   Ã‚  Ã‚  Ã‚   (Name : Clock; Price : 20.99),   Ã‚  Ã‚  Ã‚   (Name : Pencil; Price : 15.75),   Ã‚  Ã‚  Ã‚   (Name : Board; Price : 42.96)   Ã‚   ) ; Trying to assign a value for an item in a constant array raises the Left side cannot be assigned to compile time error. For example, the following code does not successfully execute: Items[1].Name : Watch; //will not compile

Saturday, November 23, 2019

The Root Word Solve and Its Offshoots

The Root Word Solve and Its Offshoots The Root Word Solve and Its Offshoots The Root Word Solve and Its Offshoots By Mark Nichol A small family of words with the root word solve refer in some way to changing the physical or figurative state of something- naturally, since the Latin root of solve, solvere, means â€Å"dissolve, loosen, or solve.† Solve itself means â€Å"find an answer, explanation, or solution for.† One who solves is a solver (rarely used in isolation but part of the common phrase â€Å"problem solver†); something solved is a solution, and solution is also defined as a liquid in which something has been dissolved. To dissolve, in turn, is to cause something to pass into a solution (the liquid type), though it also means â€Å"destroy, disintegrate, or terminate† or â€Å"make legally void.† The noun for such an action is dissolution (not to be confused with disillusion, a synonym for disenchant as a verb and the noun disenchantment). Dissolve has also acquired a sense as a noun, used in cinematography to describe a transition achieved by gradual imposition of one image onto another, and it serves as a verb in that context as well. A solvent, meanwhile, is a liquid used to dissolve another substance, or anything that solves a problem or eliminates or diminishes an obstacle. Solvent can also be an adjective meaning â€Å"able to dissolve† or â€Å"able to pay debts.† The adjective soluble, by contrast, has the former sense but not the latter, though it also means â€Å"able to be explained or solved.† (The antonyms are insolvent and insoluble.) Absolve means â€Å"forgive† or â€Å"free from blame or responsibility†; an act taken to absolve someone is an absolution. (One is said to give or grant absolution.) Interestingly, the adjective absolute, meaning â€Å"complete† or â€Å"unlimited,† is related; it derives from the Latin term absolutus, meaning â€Å"absolve† or â€Å"set free.† Resolve, too, is related: To resolve is to find an answer or solution, or to make a serious decision or take a formal vote to do something. The noun form is resolution, though one can also use resolve as a noun, employing it as a synonym for determination, and the adjectival form is resolute. (The antonyms for the adjectives resolved and resolute are unresolved and irresolute, and a lack of resolution is irresolution.) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:30 Synonyms for â€Å"Meeting†15 Great Word GamesHow to Send Tactful Emails from a Technical Support Desk

Thursday, November 21, 2019

Blood Diamonds Research Paper Example | Topics and Well Written Essays - 2750 words

Blood Diamonds - Research Paper Example (Gavin, 14) Conflict diamonds are sold in order to raise money for armed conflict weapons and civil wars. Profits from this trade are worth billions of dollars. This profit is used by warlords to purchase firearms during the rebel wars. Countries affected include Angola, Democratic Republic of Congo and Sierra Leone. These wars have resulted to an estimated 3.7 million deaths. (Storm,26) Although the wars are now over and fighting rate has declined, the con of blood diamonds still persists. The diamonds mined in this rebel- held zones reach the international diamond market by, smuggling the diamonds into neighboring countries and exporting them into the international diamond market, as a legitimate diamond trade. The hullabaloo surrounding conflict diamonds was reported in the 1990s. During this period, there were civil wars in Sierra Leone, Angola, Liberia and the Republic of Congo. The world realized the harm of conflict diamonds during the extreme conflict in Sierra Leone in the late 1990s. In the 1990s, blood diamonds made about 4% of the international diamond market as reported by the World Diamond Council’s Website. Two memorable events to control the diamond market took place during the late 1990s. Firstly Robert Fowler the Canadian Ambassador to Angola published a debatable report. This report listed all the countries involved with blood diamond trade. The report alarmed international organizations and made them aware of the illegal diamond trade that was going on. This response triggered the second memorable event. Kimberly Process Certification Scheme is a system which aims to regulate the diamond trade. This ensures the diamonds going through the process must be labeled as conflict free. The source and ownership of the diamonds need to be validated.(Bieri, 45) Kimberly Process Certification Scheme is supported by the United Nations, governments and non- governmental organizations. This scheme aims to eliminate the trade of black

Wednesday, November 20, 2019

Hokkaido Term Paper Example | Topics and Well Written Essays - 1000 words

Hokkaido - Term Paper Example As a subject or academic discipline, geography is the study of earth as the home for humanity. However, man has created conditions that are favorable to his existence on the foundations of existing physical features. Study of such creation encompasses human geography, which analyzes the relationship between human activities and the natural environment. Cultural geography is a major branch of geography and it is concerned with language, religion, government, and economy of a geographical region. Japan is an island nation that has fascinating environment and climate. These features have greatly influenced how people make a living from available resources. Hokkaido is the northernmost island of Japan. Unlike other islands that form the country, Hokkaido has extremely cold climate that influence how people construct their houses. In addition, Hokkaido sits on a rugged terrain, which has a relatively high water table. These factors also influence the design and sizes of house that can be constructed. The region is also prone to earthquakes that also influence housing designs and structures. Hokkaido is known as the territory of constructions this is because the region ever has new buildings. In Hokkaido, public construction works exceeds work done in the private sector. Government policies and regulations meant to enhance safety in the construction industry greatly influence building of new houses in Hokkaido. The Japanese construction industry contributes about 20% of the total GDP of the country. This constitutes construction works performed in the country and outside the country. Construction of houses in Hokkaido is very different from other parts of the country. This is partly due ton the housing values of the native communities and the developing status of Hokkaido. Unlike other parts of Japan such as Tokyo, Hokkaido is still in its early development stage. However, Hokkaido is developing very fast and it may soon overtake Tokyo as the world largest metropolitan. This has made the region to be characterized by new construction and engineering works. It has often been said that public construction work in Hokkaido greatly exceeds work done in the private sector. Registered contractors who are regulated by the prefectural governor cry out construction works in Hokkaido. Hokkaido is considered as the land of construction. Currently the region holds 7% of the total number of construction companies in Japan. This is a significant figure considering the fact that construction in Hokkaido constitutes about 5% of the total construction works in Japan. Small construction companies are the most dominant in Japan and they handle nearly 78% of all construction contracts awarded annually in Hokkaido. In Hokkaido nearly 8% of the total population work in the construction industry, either as s killed semi-skilled or unskilled laborers. The most desirable characteristic of Hokkaido construction workforce it that, there is a striking balance between the skilled and unskilled labor force. However, the region is likely to

Sunday, November 17, 2019

There will come soft rains Essay Example for Free

There will come soft rains Essay Furthermore, it is Ironic that such a sophisticated example of technology, the computerized house, can be destroyed by nature, represented by the tree limb which crashes through the window and starts the fire. The use of metaphors and the irony makes the reader think about the way they are living their own life, which then leads to the reader thinking more about the story, thus their entire mind-set is focused on the plot and that builds tension, chaos and confusion. Another way in which Bradbury creates a sense of chaos and confusion is his effective use of punctuation. Throughout the description he uses simple, short sentences to make the audience read faster through the story, thus building and building on the sense of chaos. Examples of these short sentences are: In the nursery the jungle burned. Blue lions roared, purple giraffes bounded off, Ten more voices died, The crash and Smoke and silence. A great quantity of smoke. Not only does Bradbury build tension through the use of short sentences, he also uses long, detailed sentences to enhance the process of imagery. Examples of these sentences are: The house shuddered, oak bone on bone, its bared skeleton cringing from the heat, its wire, its nerves revealed as if a surgeon had torn the skin off to let the red veins and capillaries quiver in the scalded air, The panthers ran in circles, changing color, and ten million animals, running before the fire, vanished off toward a distant steaming river, and In the kitchen, an instant before the rain of fire an timber, the stove could be seen making breakfasts at a psychopathic rate, ten dozen eggs, six loaves of toast, twenty dozen bacon strips, which, eaten by fire, started the stove working again, hysterically hissing! . Due to these detailed sentences, the audience can create an accurate picture of what is happening in the story, thus they empathize more with the characters and pay closer attention to the occurrences of the plot. This will help the audience understand what is going on, and make them more willing to find out what will happen as an outcome. This means that a sense of chaos and confusion is effectively created. Word count: 989 Miles Murdoch 24/09/09 Miles Murdoch 24/09/09 There Will Come Soft Rains There Will Come Soft Rains Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Miscellaneous section.

Friday, November 15, 2019

Magical Realism and Fantastic Sublime in Laura Esquivels Like Water fo

Magical Realism and Fantastic Sublime in Laura Esquivel's Like Water for Chocolate The different elements of the story Like Water for Chocolate are amazing. The feelings that go through a person upon listening, watching, and tasting events that happen during this story of the Spanish family's lives. The customs of this family were so unorthodox. This story is fantastic sublime and magical realism combined. Laura Esquivel wrote this novel in 1992. The nationality of the people in the novel was Mexican. A person can tell by the way expressions were made and the things that were done in the story. The novel has many fantastic sublime elements as well as magical realism. The elements of the story that stick out in a person's mind are the birth of Tita, the feelings of the love that Tita has in her heart for her sister's husband, Tita's cooking, the shower catching on fire, and Tita's sister riding off on a horse. Upon the birth of Tita, her mother flooded the kitchen table and floor when her water broke. The fluid had turned to salt and had to be swept up off the floor. This type of thing happening in the real world is not going to happen. The fluid turning into the salt was definitely a magical realism element. The fluid from the birth drying up like salt is similar to the sublime. The mysteries of cooking are treated in Like Water for Chocolate. The sublime seems to have a definition of being inhuman, an image that cannot be named. The magical realism has the definition of being magical and unreal. Tita's love she had for her sister's husband upon their marriage and through out the time of their marriage and lives. Tita's love never changed. It was the magical way Tita felt in her heart about the man she loved and the ... ...is really hard to distinguish the difference between the two. The hidden mysteries in the story of Like Water for Chocolate seem to never show the real meanings. The novel is interesting and keeps a person on his or her toes. The main point in the story is the boiling point that a person has inside will eventually boil over, given enough time. Emotions run high through out the story as well as the way each and everyone deal with the way the emotions come out. Works Cited Arensberg, Mary. The American Sublime. Albany: State University of New York Press, Albany 1986. Esquivel, Laura. Like Water for Chocolate. N.Y. Doubleday, 1992. Faris, Wendy. "Scheherazade's Children: Magical Realism and Postmodern Fiction" Magical Realism Theory, History, Community. Ed. Lois Parkinson Zamora and Wendy B. Faris. Durkham, N.C.: Durham: Duke up, 1995: 163-190.

Tuesday, November 12, 2019

A Royal Salute to the Commonwealth

A royal salute to the Commonwealth The article â€Å"A royal salute to the Commonwealth† is written by Peter Osbourne, a British journalist and a political commentator. It reflects on the role of Commonwealth as being a better applicable organisation for England than NATO and the European Union in this modern and developing world, which promotes internationality and independence rather than superiority of one dominating country. Peter Osbournes views Commonwealth as an organisation, which has been underestimated for its possibilities over the years.This is reflected from following quote: â€Å"For many years it has been automatic in progressive circles to sneer at the Commonwealth as a meaningless relic of our imperial past. † line 20 page 6. He holds the opinion that New Labours visions have been blurred by their fascination of the United States and the European Union. His disapproval of Gordon Brown and Tony Blairs opinion is clearly presented in following quote: â₠¬Å"(†¦)it is Tony Blair and Gordon Brown’s poodle-like relationship with the United States, and the former slavish worship of the European Union, that now looks out of date(†¦ )â€Å" line 28-30 page 7.From the quote above he presents the leader figures of the Labour party as being very unprofessional. Also he emphasizes that Commonwealth has a better practical stand than organisations such as NATO and the European Union by contrasting the advantages of Commonwealth with the flaws of NATO and EU. On a practical base Commonwealth is cheaper to run, whereas the cost of membership in EU is incomparably high. Another positive factor about Commonwealth is that about two billion people, more than half of these being under the age of 25, live in Commonwealth countries.This also allows a great diversity to be represented, now that the Commonwealth countries are to be found in every continent of the world. Although Peter Osbourne does recognize that Commonwealths administra tion is not as powerful as the European Union, he is able to argue why this also could be an advantageous factor in the present world. Subjectively, he highlights the down going tendency of the world being organized and ruled by one or two dominating superpowers. Here he refers to the United States and the European Union.He believes that a modern stand of world organisation implies more equality and independence divided internationally, and thinks that having an alfa-country to be in charge is an out-dated structure to work after. Peter Osbourne also writes about which ways the Commonwealth acts in contrast to the neo-Conservatives. They both work to enlarge the significance of values such as democracy and humanity in the society, but Osbourne believes that they tackle the promotion of the values differently. It is interesting to look at the words, he uses in the following quote.It tells a lot about how he feels that Commonwealth stands out in a positive way: â€Å"But unlike the n eo-Conservatives, it (Commonwealth, edited) does not try to promote these values through invasion. It uses quiet diplomacy and gentle pressure. † line 46-47 page 7. There is no doubt that throughout the entire article Peter Osbourne presents Commonwealth subjectively for its advantage. The quote above in particular shows, how he uses emotional words such as gentle and quiet to convince the reader of the numerous benefits of Commonwealth.To describe the political leaders of Britain over the past decades he uses the words hostile and blind (see line 76 page 8). He criticizes them for leading Britain in the wrong direction by accepting the membership of the European Union. He feels that this has been a loss for England, because it opposes the acknowledgement of the great values of what Commonwealth implies. Another way he is able to promote Commonwealth is to put down other organisations similar to it. This makes Commonwealth stand out as a superior alternative to the other organ izations.To begin with Peter Osbourne wants to touch the reader by presenting the scene when the Duke and Duchess of Cambridge visit Canada in order to participate in Canada’s National War Memorial. This extract also shows his subjective use of words to advertise for the benefit of Commonwealth: â€Å"a visit to Canada’s National War Memorial was a poignant reminder that Canadian troops had served alongside the British in the two great world wars of the last century. † line 4-6 page 6.It can be interpreted as if Peter Osbourne wants the reader to feel that the Royal family, the representing faces of Commonwealth, wants to show their appreciation and acknowledgement for Canada’s help in the wars. This gives the reader an impression of the Royal family for being respectful, down to earth and humane. The only concern Peter Osbourne has about Commonwealth is what its future would hold when the Queens is no more. He hopes that the Duke and Duchess will walk in the Queens footsteps, as she traditionally is the face outwardly.She symbolizes Commonwealths unity between the former countries, which used to be under the British Empire. At this point Peter Osbourne reflects on developing the Commonwealth organisation, so the headquarter no longer is bound to being based in London. Apart from practical reasons, Peter Osbourne also writes about how this will eliminate the possibility of accusations of Britain trying to relive their imperious role, they had earlier. Osbourne suggests India as the new base because of its endless opportunities and great potential.Peter Osbourne sees The United States as England’s enemy, which can be interpreted from following quote: â€Å"They are guaranteed a warm reception, but for the wrong reasons. They will be feted as celebrities, not welcomed as members of a family of nations with which we have common values)† line 96-98 page 8. There is no doubt, that from Peter Osbournes perspective a bright f uture for England would be based on a radical promotion of Commonwealth, a progress of its power and last but not least an out phasing of the influence of the United States and the European Union.

Sunday, November 10, 2019

History of bootlegging Essay

1. Background on Bootlegging It has been said that â€Å"at its real level music belongs to everyone†. To claim ownership over music has been the subject of much analysis since music, after all, is available to each individual through our sense of hearing. Maintaining control or possession of â€Å"our† music is not as clear cut as meting out our rights to our land or property. To listen to a song someone else has written, for instance, does not necessarily constitute stealing or trespassing on someone else’s property. The best way to ensure our right and title over our musical creations is to get a copyright over the original piece. Yet it is not uncommon for a listener or a music lover or fan to record a favorite song or a particularly memorable concert attended. People record songs, concerts, and videos and keep such recordings for personal use, or make copies thereof to give to their friends. Songs and videos are also easily downloaded from the Internet. Fans also record different songs and performances, from different albums or concerts, into one CD or online play list to make their own personal collection. The problem is when such recordings are distributed and sold for profit without the artist and the record company’s consent. Generally, copyright violations involving musical creations may be distinguished into three different types : 1) professional counterfeit recordings (unauthorized duplication of sound and art work) 2) professional pirate recordings (unauthorized duplication of the sound, but with original art work, usually sold as â€Å"greatest hits† compilations 3) bootleg recordings (unauthorized recording of live performances) Bootlegging, as it was traditionally defined, involves â€Å"the illegal distribution or production of liquor and other highly taxed goods† In the 1920s, the United States had a Prohibition against alcohol, thus people resorted to bootlegging, or buying and selling an illegal product, from bootleggers. Organized crime consisting of gangs and mobsters in Chicago and New York, such as Al Capone, were deeply involved in bootlegging. In the music industry, music bootlegging involves the taking and trading of unauthorized live recordings of live musical performers — either from concert or studio outtakes. Bootleg music albums are recordings transferred from tape to vinyl or CD. They become a bootleg product when a bootlegger undertakes to create an artifact or when a non-commercial recording is transformed into a commercial product in the form of an LP or a CD. Bootleg recordings are usually done without the artist’s consent ; however, making a recording of a concert is not illegal per se. Although an individual cannot legally record an officially release CD or cassette tape on to a blank tape, he or she may make an unauthorized recording of a concert and keep it for personal use. However, the sale of such a recording is deemed illegal.  The problems with bootlegging is that it prevents the artist and the record company from maintaining quality control over their product , and it prevents them from collecting their royalties to their right to their music. 2. Changes in Copyright Laws Copyright is defined as â€Å"a form of protection provided by the laws of the United States (title 17, U. S. Code) to the authors of ‘original works of authorship’† . The U. S. has passed significant copyright laws to protect an artist’s right to his or her original creations. These creations include not only musical works, but literary, dramatic, artistic and certain intellectual creations. The U. S. Constitution itself provides that â€Å"the Congress shall have power†¦ to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries. † The State thus allows Congress to pass copyright laws to protect an artist’s rights to his or her musical creations. The U. S. Copyright Act was amended in 1976 so that it now covers new technological advancements and extended the term of protection to cover the life of the author plus 70 more years. Copyright laws allow the author, artist, or whoever holds the copyright to a creation to sue those who infringe on their copyrights for damages. The complainant has to prove infringement of copyright by a) proving ownership of the copyright and b) copying by the infringer-defendant. In compliance with its Constitutional mandate of protecting original works of authorship, the Congress has passed several laws concerning music copyright infringement, piracy and bootlegging. Some of the relevant laws will be discussed in this section. The Audio Home Recording Act allows music retailers to sell all analog and digital recording formats. It also gives a consumer the right to use such recordings provided such use is for non-commercial purposes, and in such cases, no copyright infringement lawsuit may be brought against a consumer. The consumer and retailer is also exempt from making royalty payments on digital audio recording devices and media; the burden falls on U. S. manufacturers and importers only who must pay for digital audio devices designed or marketed primarily for making digital audio recordings for private use, whether or not these are incorporated in some other device. These royalty payments are administered and monitored by the U. S. Register of Copyrights and the Librarian of Congress, with the proceeds split between the featured artists and the record company, or between the songwriters and music publishers, depending on the circumstances. Musical artists or musicians thus receive royalties which are based on record sales and airplay during a prescribed period. The U. S. is also a signatory of both the World Intellectual Property Organization Copyright Treaty and the Performances and Phonograms Treaty. In accordance with these international agreements, the U. S.  Congress passed the Digital Millennium Copyright Act which makes it a crime to a crime to circumvent anti-piracy measures built into many of today’s commercial software and even most music CDs. The Act also limits the copyright infringement liability of ISPs for transmitting information over the Internet, but requires that ISPs remove copyright infringement materials found in users’ web sites. Despite legislative acts and proposed bills by well meaning members of the U. S. Congress, and jurisprudence laid down by the U. S. Supreme Court, infringers still find a way of getting around copyright laws by invoking the â€Å"fair use† doctrine. The U.  S. Code provides that the public is entitled to the â€Å"fair use† of copyrighted material. â€Å"Fair use† is â€Å"a privilege to use copyrighted material in a reasonable manner without consent, notwithstanding the copyright monopoly granted to the owner. † A copyrighted original creation may be reproduced for purposes of criticism, news reporting, comment, teaching, scholarship and research. The Code further provides that there are four factors in determining whether there is â€Å"fair use† of a copyrighted material or not : 1) the purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes ) the nature of the copyrighted work itself 3) the proportion and substantiality of the copyrighted work actually used without authority 4) the potential economic detriment on the value of the work caused by such unauthorized use thereof. What makes it especially difficult to enforce the copyright is that information is so readily available through the Internet. As music is downloaded courtesy of digital technology, consumers are turning to the Internet to get their music rather than going out to music stores to buy the CDs. Bootlegged albums are also easily transmitted and shared through the Internet. Digital technology allows consumer to reproduce identical copies of digital music files, most commonly in compression formats such as MP3s. Such digital advancements not only pave the way for more widespread bootlegging, but for music piracy as well. 3. Advancements in Piracy Technology: File Sharing Piracy, as earlier discussed, is differentiated from bootlegging in that the former involve the unauthorized duplication of the sound, but with original art work. Piracy involves the reproduction and distribution of copies of original recordings. Advancements in digital technology have allowed music piracy to develop at an alarming rate. MP3s enable consumers to compress digitized music into smaller files, while ripping software allows them to copy music from CDs, store these on their hard drives, and then convert these files into compressed formats. Digital file reproduction devices, like CD players, in turn allow consumers to write these files into a CD and in effect create their own albums and compilations of copyrighted creations. Peer-to-peer (P2P) networks have also allowed increased music dissemination, as well as file sharing, as introduced by the infamous Napster software company. P2P networks basically offer users to access the hard drives of other users anywhere in the world by the installation of a piece of software. These networks allow users to search, copy and transfer music files typically through MP3 files. After Napster, subsequent P2P networks version, like KaZaA and Grokstar, which are collectively known as the FastTrack providers, allow users to access multiple individual computers instead of accessing just one single, centralized database of music files. The digital audio workstation (DAW) on the other hand, allows users to indulge in â€Å"sampling† – original music recordings, converted from analog to digital format, which users can import, cut, copy, layer and manipulate to create new musical work. Since samples may be in a band’s entire song, or merely passages from an instrument, in effect it allows not just users but even musicians and DJs to create, layer, expand and redefine music. Recording companies have resorted to copy-protection technology to protect themselves from piracy committed through file sharing and P2P networks. Copy-protected CDs is one answer, but public backlash and concerns about the technology’s effectiveness, have forced recording companies to limit use of such CDs in the U. S. and instead opted to release such CDs abroad in Europe and countries such as Japan. Five major recording companies in the U. S. use copy-protected CDs: BMG Entertainment, Universal Music Group, Warner Music Group, EMI, and Sony. BMG in particular has made us of copy-protection advancements such the MediaMax CD-3 technology from SunnComm Technologies, Inc. located in Phoenix, Arizona. Through MediaMax CD-3, each song is written onto a CD twice. One format is readable by standard CD players while the other format is readable as a Windows media file playable on a computer. The technology allows consumers of BMG records to burn each track only three times per computer. The songs in BMG albums embedded with the MediaMax CD-3 technology may also be emailed to a limited number of people. However, each person in that limited list may only listen to ten times to each song in the album. In other words, songs in such CDs are locked and won’t be played even if they are downloaded from file-sharing networks if it exceeds the allowable number of times a person may listen to the track. Other developments are even more rigid. The CDS-300 developed by Macrovision, located in Santa Clara, California, allows CDs to be burnt and listened to online, but blocks other attempts to make copies or share music online. Recording companies thus are faced with a difficult balancing act. On the one hand, there is the need to respect a consumer’s desire to share, copy and hear songs in different ways. But on the other hand, there is the copyright to take note of and the bottom line – earning revenues through royalties by limiting the number of copies consumers make of copyrighted musical creations.

Friday, November 8, 2019

The Soprano’s Glorification Throughout time social issues

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The Soprano’s Glorification Throughout time social issues The Soprano's Glorification Throughout time social issues have plagued every society. In our Modern times many social problems can be seen personified through our television sets. The most recent of these television programs to showcase these problems is through the life of Tony Soprano, in HBO's The Soprano's. David Simon brings an interesting perspective when exploring the criminal side of the American Dream, in his book Tony Soprano's America. In addition, argues The Soprano's is a metaphor for the ills of our contemporary American Life showing how we are all disillusioned, alienated, and alone. In the book, Simon explains how The Soprano's is the microcosm of America where we glorify Tony as a liar, a cheater and a bigot, but nonetheless love him.Family dysfunction is the first of the social problems personified in the book. How is it that in today's society the average couple that is married between the ages of eighteen and twenty-four has a seventy-five percent divorce rate.Soc ial Problems

Tuesday, November 5, 2019

Google Services Privacy and Security Concerns

Google Services Privacy and Security Concerns Insecure Digital World In today’s digital world, the debate surrounding privacy and security cannot be stressed further. Internet users are at a constant risk of privacy and security violations by technology companies. Google Inc. is among the biggest tech companies today with billions of people around the world using its services. Nonetheless, these services have developed numerous concerns surrounding privacy and security. Google services such as Street View does not just take pictures but collects email and WIFI information from unsuspecting users nearby. These warring revelations illustrate an increased concern for privacy and security of users. Numerous Google services continue to violate privacy and security rights of users by not informing them that their information is being collected without their consent. Google Collects Info from People Who May Even not Be Using Their Services Google services violate privacy and security rights by accessing and collecting data from people who may even not be using their services. Rosenfeld states that Google admitted to collecting data and personal information from computers inside homes and buildings using their Google Street View cars that were thought to only take pictures for the service. The type of information collected included private information, emails, and passwords all from unsuspicious users. This tends to be a form of security concern since Google does not seek the consent of users before accessing their information. Moreover, it violates privacy rights as well as acts in an unethical manner by illegally accessing and collecting information from users who are even not using their services. Moreover, Google’s Gmail service was also found to be violating federal wiretap regulations. This is because the email service evaluates the content of all emails on its network using the information to sell it as of fshoots to advertisers. For instance, it is possible if one sends frequent emails about cars they are likely to get advertisements related to cars. Google did not make a point of informing Gmail users that it would collect and create individual profiles and target them with adverts. Again, even people who were sending messages to Gmail addresses did not agree for Google to analyze and use their messages for target advertising. Analyzing each and every message is a clear violation of privacy rights since each person is entitled to his/her privacy. Furthermore, by analyzing all kinds of emails, it is not clear how secure the services are since other people be it Google employees may access sensitive information. The Internet Has Been Overly Commercialized Google is also notorious for illegal tracking of its users who access the Internet. In 2012, Google was exposed for using an illegal code to by-pass anti-tracking abilities of Apple’s Safari browser. The secret and illegal code exposed millions of Safari browser to tracking without their knowledge even if they had turned on the anti-tracking abilities. Eventually, Google was found to have committed a privacy violation and fined $22.5 million by the Federal Trade Commission. The idea of well-respected multinational using secret codes just to track users clearly raises concerns in terms of security and privacy. Google clearly acted unethically in using secret codes without users being aware of tracking their online activities. This means that the company can go to any lengths to pursue its business objectives at the expense of user privacy rights and security. Illegal Collection of WIFI Passwords An additional issue is the illegal collection of WIFI passwords from millions of Android phone users. The company was exposed for collecting WIFI passwords for Android users who backed up their phones and allowed the Google service to restore their new phones. This means that Google knows nearly all WIFI passwords in the world. This is a clear violation of privacy since passwords and other vital information is deemed private and may indeed result in privacy and security concerns when accessed by companies such as Google. In its defense, Google has cited that the company was exploited by top U.S spymasters who illegally collected information without user consent. However, these are mere allegations that have no evidence, but the evidence of privacy and security violations can be proven beyond reasonable doubt. In conclusion, Google services continue to violate privacy and security rights of users by not informing them that their information is being collected without their consent. Some Google services can spy, pry, and secretly track information and user activities online. This tends to create increased concern for privacy and security of users. These issues may be far from resolving as even more advanced Google services are being launched. All stakeholders and mostly users have the obligation to determine where the red line lies to address privacy and security concerns.

Sunday, November 3, 2019

A short story based on the Missing In Action film trilogy Essay

A short story based on the Missing In Action film trilogy - Essay Example Every crumbling building reminded him of America’s shameful capitulation. The freeway was patched and torn, and distinctive Vietnamese army trucks rattled towards the Gook headquarters in Pioneer Square. Raucous cries from the sleeping quarters disturbed his thoughts and he turned to see what was causing the fuss. One of the ragged band was throwing punches at the Colonel and the rest were laughing and jeering, Braddock stood there, impassive, while the little guy danced around him spitting and shouting all the while. It was just the usual pointless play fighting. You would think they had had enough of that in ‘Nam. He looked pitiful in his torn combat fatigues. Nester sighed and turned his back on the prisoners. He was all there was between them and a Vietnamese execution squad but they still didn’t get it. At this rate the Gooks would kill them all. Braddock was watching quietly in that spooky way of his. Nester couldn’t understand why he didn’t act like a leader. Most of the time the men did whatever they liked, and he just let them do it. Nester carried on his way past the untidy collection of small white crosses. They reminded him of the cemetery back home where his father lay. He could hardly be further away from his Mississippi childhood than he was now. Winter was approaching fast and he was not looking forward to the cold winds from the sea and the Northern snows. All ideas of glory and victory seemed like a hopeless fantasy. His job was to survive and use his wits to keep the others alive, even if they hated him for it. In the distance the thud, thud of a chopper could be heard. Someone shouted out â€Å"Sounds like an American!† and everyone looked at Braddock. He inclined his head to the right and everyone scrambled towards the makeshift parade ground. The guards started shouting in that high-pitched squawk that passed for a language and gestured to Nester. They expected him to

Friday, November 1, 2019

Stability analysis using GUI in MATLAB (Electronic Engineering) Essay

Stability analysis using GUI in MATLAB (Electronic Engineering) Project Proposal - Essay Example Initially it is essential to examine the theoretical basis for the concept of stability in order to identify the various conditions which characterize a stable system. After determining the stability conditions, the Graphical User Interface Development Environment (GUIDE) module of MATLAB will be studied to examine the process of developing a Graphical User Interface for a MATLAB application which determines the stability of a given system. The BIBO (Bounded Input Bounded Output) concept of stability states that if a bounded input to the system produces a bounded output, then the system is stable (Ogata. K. 1997). It is important to determine the physical significance of stability both in the time domain and in the frequency domain. In the time domain, for continuous functions to be BIBO stable, an integral of their impulse response should exist. Similarly for discrete functions in the time domain, we should be able to sum up the impulse responses of the discrete function (Ogata. K. 1995). To determine stability in the frequency domain, we consider the Laplace transform (used for converting continous functions from time domain to frequency domain and vice versa) for the continous signals and Z transform (used for converting discrete functions from time domain to frequency domain and vice versa) for the discrete signals. If the region of convergence of the Laplace transform includes the imaginary axis, then the system i s stable (Ogata. K. 1995). The physical significance of this statement is that all poles of the system should on the left of the origin (as we are dealing only with causal systems). If the region of convergence Z transform includes the unit circle then the system is stable. A system is stable if and only if all its poles are lying within the unit circle. The transfer function is an illustration of the relationship between the input to a system and the output of the system (Ogata. K. 1997). It accurately represents a system which is time invariant