Most Popular

Thursday, April 7, 2016

Why do people need language



Language
Alexander Anaya Ashe
American InterContinental University
2/22/2015
Abstract

An insight into why people need language and what types of languages we have developed to suite our needs as humans. As well as what conditions determine the kind of language that people use. Which in turn has effect on why some languages survive while others die out.
Keywords: Language, Culture, History




Why do people need language
Language is a basic need for humans to survive and have helped us thrive as well.
A language is an entire system of shared sym­bols used to explain a group’s culture to the next generation, which in turn helps to build community identity. As people desire to communicate with others about things that have happened in the past, or things that are happening somewhere out of sight, the complexities of thought are reflected in the complexities of language. (Editorial Board. 2015, p. #50)

Developing Language
The conditions determine the kind of language that people will use?
The words included in each language vary from group to group, depending on their needs. Everything from rituals and foods to worldviews and geographic land­marks must be worked into the group’s language. Because they live intimately close to the animal, Arctic Sami speakers have over 1,000 words to describe reindeer, for example. A language from a tropical region might not have a single word for such an unknown creature. Words to describe a religious ceremony might be sacred in one language and vulgar in another. The cultural meaning attached to a language cannot be separated from its native speakers. (Editorial Board. 2015, p. #50)

Birth and Death of language
So why do some languages survive while others die out? Language is born of necessity when a language is no longer needed it is eventually discarded. Such as pidgin, though thought of normally as a language used by native Hawaiians the actual definition is;
a systemized, yet generally very streamlined new language created out of necessity. For example, if the two groups only come into contact twice per year to trade silk and diamonds with each other, then the vocabulary that they create only needs to pertain to those limited topics. They will simply combine the important basics of both of their languages into one new mutually functional language. They don’t need extra adjectives or flowery grammar patterns. They only need the basics. The pidgin language that results is thereby highly functional, yet highly abbreviated. It might be made up of vocabulary from mostly one of the two original languages and grammatical rules from the other. Usually, the pidgin language is only used by the two groups when they are communicating with each other, and when the contact ceases, the pidgin dies. Pidgins are languages of need, so if the need disappears, the language disappears. (Editorial Board. 2015, p. #65).
Another example is the Romans use of Latin as a main language.
Latin, like other languages past and present, had more than one form and changed over time because it was both written and spoken, and the educational level or social status of the writer or speaker often determined the final form of the language. (American InterContinental University [AIU], 2015).
Conclusion
Our Language set us apart from other creatures of this world. We express ourselves, defend ourselves, and move forward because of language. people need language and have developed many different languages to suite our needs as humans.








References
·         Editorial Board. 2015). World Cultures. Words of Wisdom.
Retrieved from http://wow.coursesmart.com/9781934920787/?CSTenantKey=aiuniv#extendedisbn 2015
·         American InterContinental University. (2015). Unit 2. Historical Foundations: Language and Literacy [Multimedia presentation]. Retrieved from American InterContinental University Virtual Campus, Huma215-1501A-17
https://class.aiu-online.com/_layouts/MUSEViewer/Asset.aspx?MID=MU21154&aid=AT115070



Wednesday, April 6, 2016

The not so sweet truth about red tomatoes.






















The not so sweet truth about red tomatoes.

Alexander Anaya Ashe

American InterContinental University

2/19/2016




The not so sweet truth about red tomatoes.



  • Purpose
    • Are tomatoes sweetness affected by the green chloroplasts in the fruits?
  • Introduction
    • Plants are green because of the light being reflected by the chlorophyll pigments inside of chloroplasts. It is these chloroplasts that capture photons from the suns light energy and through the process of photosynthesis turn those photons into glucose. (Editorial Board [EB], 2016, p. 49). Tomatoes originally had green shoulders and where reported to be sweeter. Over the years farmers have cross bred tomatoes to be a uniform red color for aesthetic and harvesting reasons.

          “Studies from the University of California, Davis, found that tomatoes need the correct version of a particular gene (one called SlGLK2) to form chloroplasts properly in the fruit.” (Kawok, 2012, para. 5).

      The tomatoes without green shoulders are the ones that have been bred to have the wrong version of this SlGLK2 gene which results in smaller and fewer chloroplasts.
  • Hypothesis or Predicted Outcome
    • I hypothesize that the modified tomatoes are less sweet because of their inability to create a surplus of glucose as a result of having fewer and smaller chloroplasts than those of natural tomatoes and that a restoration of the S1GLK2 gene will in fact result in sweeter tasting tomatoes.
  • Methods

 2 variations of tomatoes plants are grown in a completely controlled environment;

(A) Genetically modified to have S1GLK2,

                  (B) Tomato plant without S1GLK2,

3 of each variation of tomato plant are grown simultaneously in individual controlled environments with no variables other than the tomato plants themselves. Glucose measurement takes place at 30, 45, and 60 days of growth for each plant. Glucose measurement takes place by choosing tomatoes from the same location on each plant which are then blended and the glucose levels measured.

  • Results or Outcome


Key:

(A)  Genetically modified to have S1GLK2

(B)   Tomato plant without S1GLK2



Trial 1
A/B
Glucose Level
Trial 2
A/B
Glucose Level
Trial 3
A/B
Glucose Level
Average
A/B
Glucose Level
Days of Growth




30days
20 / 18
21 / 18
20 / 18
20 / 18
45 days
28 / 25
30 / 26
29 / 26
29 / 26
60 days
46 / 30
47 / 30
47 / 30
47 /30

Tomato plants (A) on day 30 produced 20, 21, and 20 Glucose Levels [GL] resulting in an average production of 20 GL during the 3 trial study. Tomato plants (B) on day 30 produced 18 GL, 18 GL, and 18 GL resulting in an average production of 18 GL during the 3 trial study.

Tomato plants (A) on day 45 produced 28 GL, 30 GL, and 29 GL, resulting in an average production of 29 GL during the 3 trial study. Tomato plants (B) on day 45 produced 25 GL, 26 GL, and 26 GL resulting in an average production of 26 GL during the 3 trial study.

Tomato plants (A) on day 60 produced 46 GL, 47 GL, and 47 GL, resulting in an average production of 47 GL during the 3 trial study. Tomato plants (B) on day 60 produced 30 GL, 30 GL, and 30 GL resulting in an average production of 26 GL during the 3 trial study.







Discussion and Analysis

Data collected during the experiment lead me to conclude that my hypothesis was correct that the tomato plants with the correct S1GLK2 gene would produce fruits with a higher glucose level than that of the plants without the gene.
If I was to continue the experiment I would perform it again in a manner that I could determine how many chloroplasts each tomato has to give better understanding on the exact nature of the S1GLK2 gene.





References

Kwok, A. (2012). Tomatoes tasteless green gene. Student Science. Retrieved




Kupaferschmidt, K. (2012). How tomatoes lost their taste. Science. Retrieved




Editorial Board (2016). Biology. Words of Wisdom. Retrieved

 from https://bookshelf.vitalsource.com/#/books/9781934920602/cfi/60!/4/4@0.00:0.00




ReFS & How To Install New Hard Disks Win 8.1



   In this Essay I will be discussing Microsoft’s Windows 8.1 operating systems newest file system ReFS and why I chose to discuss it, as well as the necessary administrative steps to prepare a storage device for access.

Before discussing ReFS I would like to create an understanding of what a file systems is. To describe a file system in the simplest terms; it is the structured manner in which files are to be labeled and stored. This makes it critical components to an operating system because without File systems the Data would be much like a warehouse full of unmarked crates. The information would be there; yet there would be no way to know where it was put upon arrival, or which crate was which.

I chose to discuss the ReFS not only because it is the latest technology but also because of the fact that Microsoft has not released a new file system since 1993 making this new file system not only a much needed update but a milestone for Microsoft. Resilient File System (ReFS) was aptly named this because of Microsoft’s focus on improved reliability during normal occurring events such as hard disk deterioration as well as unexpected power loss.

To achieve this Microsoft built the REFS on the foundation of the old NTFS so that compatibility would not be an issue but then completely changed the system architecture as well as added new features to safeguard where and how metadata is stored. With ReFS Microsoft utilized the B+tree model to organize the files allowing for a more simple system which in turn results in less code and faster indexing.

As previously mentioned Microsoft coupled this new system architecture with new features involving metadata storage, an example of which is their Copy-On-Write (coW) feature that ensures no metadata is modified without being duplicated, this results in better chances for recovery by way of having multiple metadata for files stored in multiple areas.

Next I will describe the necessary steps and tools to prepare a new storage device for normal application. To do this you will need to ensure you are logged in as an administrator.

1.            Use the Windows + X keys followed by the K key to open Disk Manger System Tool.

2.            Upon opening the Disk Manager Window you will be promoted to initialize the Disk. *Be sure that the appropriate disk is checked and that the partition style selected is MBR.

3.            Right Click the new disk and select New Simple Volume.

4.            Follow the prompt and designate the appropriate properties to the volume option.

5.            Assign the appropriate Drive Letter.

6.            Assign the appropriate format of file system (NTFS is the most widely used File System)

7.            Assign a Volume Label for the drive.



           












References

Jonathan A. (2012). Introducing Windows New File System: ReFS. InfoQ. Retrieved






Steven, S. (2012). Building the next generation file system for Windows: ReFS. Building Windows 8. Retrieved






Understanding File Systems. (n.d.). UFS Explorer. Retrieved



Information Technology, 20 Years of Innovation




            Over the past 20 years Information Technology, also known as IT, has become the core tool that governs most of the things that happen in our lives today. The biggest change would have to be computer networks and the internet. Computer networking and the internet have changed many things for both large and small organizations. These changes, good or bad vary from making life easier by allowing us to share information more efficiently, creating new problems such as the ethics of privacy, and how this new technology can be used to progress society.



The world would not be what it is today if it were not for computer networking and the internet.
Computer networking and the internet are the most significant and have been impacting change in IT over the past 20 years. Changing everything from how we communicate with each other, to how we share information, and even how we control our lives.  Every person uses computer networking and the internet for small business, large business, socially, even to turn on your living room lights from your smart phone. Computer networks control our traffic lights, security systems, printers, monitors, cell phones, email, and sharing of almost all office files in today’s world.



The implications of computer networks and the internet will last for the rest of mankind, we will never share or store information the same way again.

Information systems help organizations achieve their goals by providing essential information services, including recording and keeping track of transactions, assisting decision makers by providing them with needed facts and figures, and providing documentation needed by customers and suppliers. (Computers Are Your Future, 2012.)
There is almost no need to “write” a note, memo, or letter to a coworker anymore because now you can simply email, share, or message a fellow coworker any type of file needed.
There is almost no need to physically “re-write” information by hand from one paper to another as was once a normal practice in the business world because the files have all become digital and can easily be shared over computer networks. Additionally, accessing information from books or file cabinets that can take up a lot of physical space, has become an obsolete solution for the storage of information. This need to implement IT locally and globally have greatly impacted the way businesses as well as individuals function today and prepare for tomorrow.

Already schools have replaced penmanship curriculum for keyboarding, or woodshop for Computer Lab, and it will continue this way inevitably as we become even more dependent upon computer networks.



The internet and other new technology added by computer networking brings the topic of; organizational social responsibility. The practice of producing goods and services in a way that is not harmful to society or the environment. (English definition of “social responsibility” 2015.)

New social, professional, ethical, and legal responsibilities of organizations have needed to be defined and revised over the past 20 years to accommodate this idea of organizational social responsibility. A good example is the all too ignored “Terms of Service” agreement most users hurriedly click through on the internet or upon installation of new software.  
The Terms of service (also known as terms of use and terms and conditions, commonly abbreviated as ToS or TOS and TOU) are rules which one must agree to abide by in order to use a service. Terms of service can also be merely a disclaimer, especially regarding the use of websites. (“Terms of Service”. 2015.) is a practice employed by organizations to ensure the User agrees to use the website or software in an ethical and/or responsible manner.



Over the next ten years organization’s social, professional, ethical, and legal responsibilities will continue to have to change or be adapted to fit the new technology that is created.
A great example of how organization’s responsibilities will continue to have to change is Apples Touch ID security on iPhone and iPad. To utilize the technology to open your phone, files, or pay for something using your fingerprint. The technology (and thusly the company) must of course be able to store your fingerprint, this is where organizational social responsibility comes into play. Apple’s solution for this is their “Secure Enclave”. Touch ID doesn't store any images of your fingerprint. It stores only a mathematical representation of your fingerprint. It isn't possible for someone to reverse engineer your actual fingerprint image from this mathematical representation. The chip in your device also includes an advanced security architecture called the Secure Enclave which was developed to protect passcode and fingerprint data. Fingerprint data is encrypted and protected with a key available only to the Secure Enclave. Fingerprint data is used only by the Secure Enclave to verify that your fingerprint matches the enrolled fingerprint data. The Secure Enclave is walled off from the rest of the chip and the rest of iOS. Therefore, iOS and other apps never access your fingerprint data, it's never stored on Apple servers, and it's never backed up to iCloud or anywhere else. Only Touch ID uses it, and it can't be used to match against other fingerprint databases. (About Touch ID security on iPhone and iPad. 2015) 



 The past twenty years of innovation in the IT field is a vast subject of which the most important achievement could be subject to debate.
Keep in mind how many of those technologies, and our very way of life today, would not have been possible without the invention of the computer network, the invention that has brought the entire world closer and more accessible than ever before in human history.






Refrences

·         Cambridge University Press. (2015). English definition of “social responsibility”. Cambridge Business English Dictionary. http://dictionary.cambridge.org/us/dictionary/business-english/social-responsibility

·         Catherine LaBerta. (2012). Computers Are Your Future, 12th Edition. Prentice Hall. http://wow.coursesmart.com/9781256694007/?CSTenantKey=aiuniv

·         Dictionary.com (2015). Define “Terms Of Service” Dictionary.com http://dictionary.reference.com/browse/terms+of+service

·         Apple Support. (2015). About Touch ID security on iPhone and iPad. Apple Inc. http://support.apple.com/en-us/HT5949

Tuesday, April 5, 2016

The OSI Model For Students



The OSI model is divided into 7 layers. So when information comes from the network it moves UP the OSI model; Beginning at layer 1and proceeding to where the user actually interacts with the information at layer 7.

Each of these layers has its own purpose but also cooperates with their neighboring layers for the function of moving information from the network to the user and vice versa. “(2015, A. Anaya Ashe.)

I like to remember the layer as; Programmers Do Not Throw Sausage Pizza Away = Physical, Data Link, Network, Transport, Session, Presentation, Application.

The physical layer is anything that lets you see feel hear touch etc. the physical layer also includes but is not limited to things such as hubs, repeaters, and USB cables, because they simply take the electrical impulse and transmits and/or amplifies the signal.

The Data Link layer includes things such as network switches, it does more than transmit the information. A switch interacts with the information by reading the information into memory reconstructing it then transmitting it out. This layer also handles some errors and flow control.

The Network layer separates the information into packets and forwards these packets appropriately.

The Transport layer ensures the information moves and arrives reliably and also handles error checking and flow control.

The Session Layer is responsible for the “setting up and taking down of the association between two communicating end points” (n.d.)

Presentation Layer (or Pizza) is the translator. It presents the information to the application layer in a way the application understands and vice versa.

The Application layer is the layer that a person interacts with, such as GUIs or the Apps on your smartphone.





References        

Alexander. A. (2015) AIUOnline.edu U3 IP ITCO103 AIU

Session Layer. N.D. Techtarget.com retrieved from searchnetworking.techtarget.com/definition/Session-layer








Ethernet V.S. Wi-Fi

  Abstract
A brief essay describing multiple subjects and my personal thoughts, observations, and concerns in regards to Ethernet and wireless technologies. A description of how WI-FI and Ethernet are alike as well as how they contrast. As well as the challenges a user may experience when using wireless technologies. I will present my views on the topic of wireless developments over the last 5 years and how these developments have impacted networking for society. I will provide a quick summary of the steps necessary to set up a wireless network. Then share my personal experiences when using wireless technologies in everyday life settings. Concluding with ideas about health concerns associated with using wireless networks as a society.
Ethernet V.S. Wi-Fi
            The incorporation of wireless technology in everyday life has increased dramatically over the past 5 years. Before networks were mainly for business and schools but now nearly every home has a basic wireless network. Streaming media from your smart phone to your Smart TV or having a personal media server for all your movies is a norm and accessing your home network from all your devices is a must. Even items such Smart lightbulbs and heating/AC controls are being incorporated into our home networks.
In the business world wireless networking was at one time a luxury offered as an extra but now that a majority of computing has gone from console to handheld or laptop, Wi-Fi has become a necessity in the office. So if almost all computing technology is Wi-Fi enabled now, why do we still use Ethernet cables? It comes down to three reasons, reliability, security, and speed.
 The number one downfall of Wi-Fi technologies is Reliability. Because Wi-Fi uses radio waves it is susceptible to many environmental factors. Although the IEEE does its best to reserves the 2.4 and 5 GHZ band to 802.11, some technologies still use the band such as wireless phones. Generally anything that gives off radio waves such as other wireless devices, microwaves, etc. has the possibility to cause interference, and in the workplace this can easily become a large factor. Also there is the factor of physical environmental issues such as walls and floors and what they are composed of that can cause inconsistencies in the signal strength.
These reliability issues cause many challenges when using wireless. If you have had to use public Wi-Fi you will know from experience the problems of adjacent and co-channel interference. Co-channel interference happens mostly when there are too many devices on a network and they compete for time to communicate with the access points or routers.
Adjacent channel interference happens when too many access points or routers are on the same channel. This can normally be remedied by choosing a channel that has less traffic or not being used but in city based networks this can be a large issue. If you have ever lived in an apartment complex you may have experienced this issue where all the channels have many personal networks associated with them. Using a router or access point with a 5ghz range can remedy this but as this 5ghz technology becomes more popular with 802.11ac this remedy becomes futile.
Security can be quite an issue due to the fact that the information is being sent via radio waves makes the information being transferred highly susceptible to eavesdropping, and in addition it adds the threat of unwanted users accessing the network. In the past a person had to physically access the networks lines to attach to the network, but because with Wi-Fi all information transfer is happing in plain air, in essence an attack can occur from any person in close enough range (including the innocent looking granny at the bistro across the street).
Suppose you decide your network does not need to be secure. The next big difference is Speed. Wi-Fi still cannot reach anywhere close to top Ethernet cable speeds.  Even with the latest 802.11ac protocol hitting a theoretical top speed of 7Gbps the speeds fall very short of other Ethernet technologies such as QSFFP cabling running at 40Gbps or ISP multi-fiber backbones running at 100Gbps.
When setting up a new wireless connection the first step is to ensure you have all the right equipment before starting. If accessing the internet, you will need to ensure your modem is properly setup and configured. Next position the wireless access points and router(s) in appropriate centralized locations away from other technologies that can cause interference as discussed earlier. Configure the access points and router(s) names and security settings as needed, an additional firewall is highly recommended for most situations.
You are now ready to add computers to the network.
With the growing popularity of wireless networks there have been other types of concerns growing, such as health risks due to constant exposure to the non-thermal radio waves. Though cancer from these radio waves has been generally debunked some suggest that these waves do have an effect on human sleep patterns and can contribute to insomnia. Until further study shows this to be fact or fiction, for many this fear has been put to rest due to the World Health Organization’s many in depth studies stating that “current evidence does not confirm the existence of any health consequences from exposure to low-level electromagnetic fields.”(Scholfield. n.d.) 
My concerns stem from the fact that if you pull out your device on any city block of a major city you will see hundreds of Wi-Fi networks. This means that while living in a major city you literally have thousands of non-thermal radio waves traveling through you constantly. Though they are micro-doses if you are being exposed to these non-thermal radio waves on a constant basis multiplied by thousands of devices the cumulating of these waves must be hazardous.
            Though new technologies such as LI-FI are on the horizon attempting to provide faster data transfer speeds than 802.11. For now, Wi-Fi technology is here to stay, and will continue to be an integrated part of our normal lives.





References
40 Gigabit Ethernet (n.d.). Networking and communication glossary. Retrieved from http://whatis.techtarget.com/definition/40-Gigabit-Ethernet-40GbE
Lendino, J. (2015). What is 802.11ac WiFi, and how much faster than 802.11n is it?. ExtremeTech. Retrieved from http://www.extremetech.com/computing/160837-what-is-802-11ac-and-how-much-faster-than-802-11n-is-it
Mitchell, B. (n.d.) Wireless Standards 802.11a, 802.11b/g/n, and 802.11ac,
Setting Up a wireless network (n.d.) retrieved from
Why Channels 1,6, and 11? (n.d.) metageek. Retrieved from
http://www.metageek.com/training/resources/why-channels-1-6-11.html