Tuesday, December 31, 2019

The Indian Removal Act Of 1830 - 1801 Words

My friends, circumstances render it impossible that you can flourish in the midst of a civilized community. You have but one remedy within your reach...that is to [move] to the west...The sooner you do this, the sooner you will commence your career of improvement and prosperity. These were the words spoken by Andrew Jackson to Congress on the Indian Removal Act of 1830. The Indian Removal Act (aka the Trail of Tears) was a brutal, unfair tragedy that should not have happened to the Native Americans. The way the Native Americans were forced out their homeland was the wrong way for Andrew Jackson to gain land. Before Europeans arrived in America there were about one to two million Indians. Then, by the 1800 s there were about two hundred and fifty thousand Native Americans left. Ten percent of the population died from torture, violence, slavery, and relocation. The first recorded contact with the Europeans that the Choctaw Tribe encountered was Hernando De Soto s Expedition in the 1540 s. Hernando was supposed to conquer Florida but failed terribly. As De Soto s brutalities became known, the Choctaw Tribe greeted him and his army with a great celebration and later attacked them. The Choctaw Tribe gave De Soto and his troops about six hundred and forty-four arrow wounds wherever armor didn’t protect them. The Chickasaws later trapped De Soto and his army in a fire so hot that the Spaniards had to build up a forge and fix the steel in their swords. Europeans had moreShow MoreRelatedThe Removal Of The Indian Removal Act Of 18301820 Words   |  8 Pagespolicy of the Government, steadily pursued for nearly thirty years, in relation to the removal of the Indians beyond the white settlements is approaching to a happy consummation. Two important tribes have accepted the provision made for their removal at the last session of Congress, and it is believed that their example will induce the remaining tribes also to seek the same obvious advantages.† (Jackson, 1830) This quote from President Andrew Jackson showed the happiness of the â€Å"white settlers† ofRead MoreIndian Removal Act Of 18301155 Words   |  5 Pages2015 Indian Removal Act of 1830 The Indian Removal Act of 1830 was an act that helped aid the expansion of the United States population into the southernmost states, occupied mainly by Native Americans. The act was a long time coming, especially with President Andrew Jackson, a long-time proponent of Native American removal, at the helm. This paper explores the history leading up to the law, the introduction and passage, as well as the sometimes-tragic implementation of the Indian Removal Act of 1830Read MoreIndian Removal Act Of 1830868 Words   |  4 PagesIndian Removal Act of 1830 The Indian Removal Act was signed into law on May 28th 1930 during the presidency of Andrew Jackson. Perhaps best known as the black eye of the administration and overshadowing his presidency’s accomplishments, the Indian Removal Act was passed into law to allow the president to negotiate with Indians to purchase land they occupied and offer them lands west of the Mississippi. The Indian Removal Act of 1830 could also amount to pure greed and racism, the beginning of theRead MoreThe Indian Removal Act Of 1830940 Words   |  4 PagesThe American’s desire for expansion of their nation and economic growth has always been their main interest and goal. The Indian Removal in the 1830’s was a great example of America’s efforts to expand through North America and their motivation to economically improve through profitable opportunities. When comparing the Indian Removal and the events that followed the Treaty of Paris, a similarity in the expansion of America i s discovered. Labor, politics, and economics of America during the two erasRead MoreThe Indian Removal Act Of 18301083 Words   |  5 Pages The Indian Removal Act of 1830 was a law passed by President Andrew Jackson that provided the funds for the removal of the Indian tribes found in South. These tribes were the Cherokee, Chickasaw, Choctaw, Creek, and Seminole. Slave states, following the lead of Missouri who in the 1820s forced its Indian population to leave, saw the opportunity to expand their industry in the fielding of cotton by â€Å"converting Indian soil into slave soil.† That along with the finding of gold and simply the desireRead MoreThe Indian Removal Act Of 1830892 Words   |  4 Pagesstudents are analyzing is; what are the major effects of the Indian Removal Act of 1830? The students will be given several data sets of events that occurred after the act was initiated and draw conclusions and revise their thesis statement as they go. The big idea of this lesson to have students understand the importance of the Indian Removal Act and it is essentially only the beginning of the journey that Indian tribes had to face after the act was initiated. It led to many heartbreaking events thatRead MoreIndian Removal Act Of 1830923 Words   |  4 PagesIt gives me pleasure to announce to Congress . . . the removal of the Indians beyond the white settlements is approaching to a happy consummation† (Jackson, 1830, para.1). With promises of new lands, protection, and monies, President Andrew Jackson portrays the Indian Removal Act of 1830 as beneficial to Indians, wherein governmental financial gain is incidental. However, when considering land transactions and gold discoveries, the true beneficiaries are revealed. While strengthening the States’Read MoreThe Indian Removal Act of 18301123 Words   |  5 PagesTHE INDIAN REMOVAL ACT OF 1830 Migdalia Tuero HIST101: American History to 1877 Professor Kathleen Davis February 13, 2014 There are several historical events and issues that have impacted the contemporary political development among American history. In the history of America one of these groups are the Native Americans. The white man throughout the South called for a removal of the Indian peoples. They wanted the Native Indians to be resettled to the west because their presence createdRead MoreThe Indian Removal Act Of 18301299 Words   |  6 Pageswere many diverse, and complex views when approaching this subject matter; however, in 1830 President Andrew Jackson passed the Indian Removal Act, which forced Indians to relocate from their homelands in south east to land west of the Mississippi river. This granted the U.S. a large portion of new rich land, unfortunately it was at the expense of the Native Americans. When passing the Indian Removal Act of 1830, President Jackson relied on teleological utilitarianism ethnic views, in that he focusedRead MoreIndian Removal Act Of 1830923 Words   |  4 Pagesbut the Cherokee removal was the cruelest work I ever knew†, remarked a Georgia soldier who had participated in the removal of Indian Natives during the mid-1800’s. As a result of the Indian Removal Act, Indian natives have been perceived as mistreated and cheated throughout history. The Indian Removal Act was passed during the presidency of Andrew Jackson on May 28, 1830. This act granted authorization to the president to exchange unsettled lands west of Mississippi for Indian lands residing in

Monday, December 23, 2019

Artificial Intelligence and the Modern Military - 3400 Words

Artificial Intelligence and the Modern Military Wayne K Sullivan Saint Leo University MGT 327, CA01, Management Information Systems Professor Lawrence Mister November 26, 2011 Purpose: In today s military, leaders are continuously seeking ways to incorporate new technology to take the place of human soldiers. It has long been an important goal to be able to remove the human element from the modern battlefield, thus enabling high risk or sensitive political operations to be conducted without the fear of capture or exploitation of US military personnel. One such incident occurred during the Cold War, on May 1, 1960, during the presidency of Dwight D. Eisenhower and during the leadership of Soviet Premier Nikita†¦show more content†¦Currently the key areas the Army is looking to artificial intelligence are chemical biological detection, counter explosive hazards, security, interdiction attack, and long-range strike capabilities (US Army, 2010). Deployed soldiers have dozens of pounds of batteries, ammo, communications equipment and other Items such as food and water they have to carry on their backs, on top of heavy body armor, encumbering solders wi th up to 100lbs of additional weight. While this large amount of technology, is useful in combat, it can greatly fatigue solders prior to engagements and can render soldiers severely limited or even ineffective during sustained engagements with the enemy (Knapik, 1989). It is this reason that the U.S. Army is experimenting with a variety of remotely controlled and even wearable machines to lighten this load. Some are deeply quirky, designed to resemble a headless dog. The spooky Big Dog quadruped robot, which is being developed by robotics company Boston Dynamics, has some of the most advanced artificial intelligence and navigation systems in the planet. In fact, US Army officials are stunned by its programmed behaviors, which make Big Dog extremely helpful in the battlefield. Big Dog can run along soldiers, walk slowly, or lay down to be loaded or unloaded with up to 400 lbs of gear, equivalent to one full squads (6 men) backpacks, allShow MoreRelatedU.s. Senate Armed Services Comm ittee1399 Words   |  6 Pagesin artificial soldiers and machinery. Rather than increasing the physical protection of soldiers in battle conditions, they are frugally wasting money on the possibility of a success in the development of a wartime fighter of artificial intelligence. Meanwhile, troops overseas are being put at risk due to inadequate armor. By fitting our troops with new tactical gear rather than investing in soldiers with artificial intelligence, one can avoid the risk of faulty armor. Sending out artificial soldiersRead MoreEssay on The Turing Test1426 Words   |  6 Pages One of the hottest topics that modern science has been focusing on for a long time is the field of artificial intelligence, the study of intelligence in machines or, according to Minsky, â€Å"the science of making machines do things that would require intelligence if done by men†.(qtd in Copeland 1). Artificial Intelligence has a lot of applications and is used in many areas. â€Å"We often don’t notice it but AI is all around us. It is present in computer games, in the cruise control in our cars and theRead MoreHow The Society Values Computer Technology1716 Words   |  7 PagesNS160014. Computer and the Society How the Society values Computer Technology Question: Google SDK/Artificial-Intelligence: Is it Good or bad? Table of Content 1.0 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦1 1.1 My theory†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦2 1.2 Respondents opinions†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 2.0 Summary and Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..10 Figures Fig 1.2.0 Do you interact with artificial intelligent systems? ........................................5 Fig 1.2.1 is it possible for human thinkingRead More Artificial Intelligence Essay1951 Words   |  8 PagesArtificial Intelligence Artificial intelligence or AI is the study of computer science that tries to enlighten and to imitate, through machine-driven or computational procedures, facets of human intelligence. Incorporated amid these aspects of intelligence are abilities to intermingle with the natural world across sensory methods and decision making abilities in unpredictable situations without human interference. Standard areas of exploration in AI consist of computer vision, game playingRead MoreThe Ethics Of Artificial Intelligence1409 Words   |  6 PagesOn the topic of artificial intelligence (AI), one may suppose that an ethical foundation has already been lain in place. One may presume so based on how integral it has grown to our lives, developing a co-existence with our communications devices, such as in the case of Siri or Google Now in the iOS and Android ecosystems, respectively. Such is not the case, however, as the topic of ethics when developing and maintaining artificial intelligence systems is a hotly debated one. As it turns out, peopleRead MoreEssay on Robotics1246 Words   |  5 Pagesscientific research, in military programs, and as educational tools, and they are being developed to aid people who have lost the use of their limbs. These devices, however, are for the most part quite different from the androids, or humanlike robots, and other robots of fiction. They rarely take human form, they perform only a limited number of set tasks, and they do not have minds of their own. In fact, it is often hard to distinguish between devices called robots and other modern automated systems.Read MoreShould Artificial Intelligence Be Regulated?1069 Words   |  5 Pagesthe atmosphere created by these outcries overshadows the great milestones accomplished with AI. Aman and Oren Etzioni, professors of law and computer science respectively, are very quick to name such accomplishments in their article ‘Should Artificial Intelligence Be Regulated?’ In this writing they go on to highlight some of the areas that are benefitted by AI today. They describe how AI is used in bank systems to detect fraud, security systems that detect items that human guards sometimes miss, inRead MoreThe Long Term Effects Of Technological Advancement1645 Words   |  7 Pagesmedia, contributing to an exceptional amount of awareness and causing many people to be proactive in trying to fight it. Swiftly engineering a vaccine requires biological chemistry research and technology. Without recent technological development in modern practices, a vaccine would take upwards of ten years, but according to Fox News, a vaccine for Ebola is currently ready for human testing. Societies that have the ability to create this vaccine can then share their discoveries with the entire worldRead MoreThe Idea Of Artificial Intelligence1613 Words   |  7 PagesThe idea of Artificial Intelligence is a widely discussed topic, mostly filled with propaganda, in an Information Technology ruled society like ours today. As said by Christof Koch, president and chief scientific officer of the Allen institute for Brain Science in Seattle: â€Å"Within a decade these instances of ‘weak’ or ‘narrow’ AI—able to replicate specific human tasks—will permeate society. Siri is only the beginning. Driverless cars and trucks will become the norm, and our interactions in supermarketsRead MoreHuman Ethics, Morals, And Identity1800 Words   |  8 Pagesthat have been implemented through technology, artificial intelligence has been invented to a ssist humans in those processes (Stuart Norvig). However, there is a question in regards to artificial intelligence. That question consists of: Will artificial intelligence pose a threat to the ethics and morals of humans? As this question becomes an advocate for an argument. Here is an elaboration in which depicts the reasoning’s of how artificial intelligence will become the abolition of human identity.

Sunday, December 15, 2019

Describe an Experience That Influenced Your Career Choice Free Essays

Having grown up in a country where the prevalence of the shadow economy is on par with the continual political problems due to the mismanagement by autocrats. Public administration has surrounded me for as long as I can remember. On graduating ,i went to possess insight into many issues such as the way people and businesses react to the development and management of government programs by public administrators. We will write a custom essay sample on Describe an Experience That Influenced Your Career Choice or any similar topic only for you Order Now I had some practical experience working at a hospital in Nigeria with sometime spent in the accounting department, this enabled me gain a practical experience of how the laws/duties/decisions made by public administrators affects people/individuals in real life situations such as explaining why people in less developed countries are prepared to pay for healthcare with private hospitals rather than using the national institutions which usually have worse service and deplorable equipments mainly due to mismanagement, wrong fiscal policies and corruption. The issues of customer satisfaction and equity were studied first hand and when comparing with the UK system, one would only praise the NHS(National Health Service) for its equitable approach unlike many other countries were only those than can afford treatment get it. During my university years, I was a part of the committee through whom student members voiced their opinion in reviving the Osun State Student Association at Bowen university ,which had lost his finesse. I was appointed the Financial Secretary and was indeed a challenge, as we had to work hard as a team creating and implementing programs and reforms, managing and allocating our own time and finances to ensure success, I was also part of the team that assisted the students to get there bursary from the State Government, and trust me it wasn’t easy in the sense that we had to keep writing letters and going out of our way to ensure the students get paid because its part of their civil right. During my National Youth Service Corps(NYSC) as a member of the Sports Community Development Group. Having acquired the silver award after the torment of hiking over double figure mileage distances to raise funds for the homeless children in Enugu State of Nigeria, it has enabled me to be more organized and helped me develop my ability to make quick, accurate and appropriate decisions in peril. Currently I am an accountant and a Guardian counselor in a primary and nursery school in Nigeria which goes by the name Macro Nursery and Primary school, I assist the younger generations in making right,responsibe,reputable and reasonable decisions in life. Leadership is also an important quality at succeeding in most areas, hence my appointment as one of the prefects in my secondary school has definitely helped me develop as a young adult. These duties are very rewarding and will be vital skills in preparing for life after public administration, studying this course in your university will enable me further my interest in economic issues as well as fulfilling my life time ambition. How to cite Describe an Experience That Influenced Your Career Choice, Papers

Friday, December 6, 2019

ICT Service Management for Quantum Computing - MyAssignmenthelp

Question: Discuss about theICT Service Management for Quantum Computing. Answer: What Quantum Computing Can Do for You Warner, B. (2013). What Quantum Computing Can Do for You. Bloomberg. [Online], Available at: https://www.bloomberg.com/news/articles/2013-05-30/what-quantum-computing-can-do-for-you [Accessed on: 17 May 2017]. Quantum computing is the application of quantum mechanics in the computer systems and associated operations. The quantum computing has enormous potential and capability to revolutionize the current computing system. The quantum computers can be used to analyze and make deductions from large set of numbers which would otherwise have taken a huge amount of time. It has several applications such as it can be used for future rug cures or examining a huge avalanche of public data. The quantum computing uses the quantum nature of matter, atoms and computing devices. The quantum computer is different from the traditional computer as it can take both the binary digits as input initially. The quantum computer is programed to represent all the possible combination or set of input and they can be tested in the computer simultaneously. In the regular computing devices, all the possible combinations are tested in a serial cycle; therefore, the amount of time required for calculation is much highe r. It can be used to examine the chemical structure of complex molecules. It can also be used for the software verification and validation. Validating the performance of software is important for examining its effectiveness; however, it is time consuming and expensive. Features Canonical. (2017). Features. [Online]. Available at: https://www.ubuntu.com/desktop/features [Accessed on: 17 May 2017]. The Linux distribution refers to the operating system which is made up of Linux kernel and a package management system. Typically, the Linux distribution system comprises of Linux kernel, GNU tools, libraries and desktop environment. In Linux distribution, most of the software used are free of cost and open-source. Ubuntu is the most common Linux distribution software. It is fundamentally based on Debaian; however, it has several unique software repositories. The software in these repositories is synced to the Debian software, so that they could run on any platform. The focus of Ubuntu project is to provide the users with a solid desktop and server experience to the users. In this regard, the technology is customized for the operating system. The Ubuntu Touch edition is also commonly used in network servers. It can run on either the physical or the virtual servers. The security is a major concern for the Ubuntu software developers. In the default operations of the system, the utility programs run on the low privileges and cannot corrupt the operating system of the organization. Moreover, in order to increase the security other tools are used to provide temporary privileges and keep the root account locked so that the users cannot breach the security of the system (Canonical, 2017). Week 3 VMware Workstation - No Experience Necessary Vugt, S. (2013). VMware Workstation - No Experience Necessary. Packt Publishing Ltd. Virtualization is one of the latest applications of technology which assist in developing virtual machines with the technology. It includes the development of hardware platforms, storage devices and computer network resources as the virtual version of the actual devices. In the virtualization process, the developers create virtual software which can create and operate virtual machines. The virtual machines can be categorized into type-1 and type-2 machines. The type-2 virtualization machine can run on the basic operating system just like the actual physical device. The VMware Workstation is the standard platform which can be used for running multiple operating systems as virtual machines on a single device. The VMware Workstation can be used to enhance productivity, performance, reliability and increase the workplace security. It can be used with different operating systems such as Linux or Windows. The users can replicate the server and the desktop environment on the virtual machine . With this method, several applications can run simultaneously on the physical machine. It also provide safe and isolated environment for running the operating system. It also assists the system administrator in evaluating the hypervisors and other operating systems as well as using other technologies such as cloud computing without any interference with the IT operations of the system. Network Congestion Control: Managing Internet Traffic Welzl, M. (2005). Network Congestion Control: Managing Internet Traffic. John Wiley Sons. The transportation layer protocols provide assistance to the host-to-host communication services for the applications. The primary role of the transportation layer protocol is to support the connection-oriented data stream, increase reliability, flow control and multiplexing. The DCCP (Datagram Congestion Control Protocol) is a highly popular protocol for providing assistance to the dataflow in the transportation layer. DCCP protocol is a message-oriented protocol which is used in the implementation of reliable set-up and congestion control in the transportation layer. With DCCP, congestion control mechanism is immediately applicable without using them in the application layer. It is an advanced version of TCP and UDP protocols. It is employed so that the transportation layer can effectively control the congestion in the network. It also offers several other functionalities such as it can be used for identifying the sequence number of packets, maintaining data integrity and identific ation of port numbers so that the communication devices with the same IP address can communicate with each other. It increase the overall efficiency of the commination system such as it reduces the connection teardown, efficient acknowledgement, increases congestion control and increase the security of the system. WannaCry Ransomware: Everything you need to know Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet. [Online]. Available at: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. Recently, more than 140 countries are affected by the WannaCry ransom ware locks people out of their computers and data until they pay the ransom. The National Security Agency first discovered vulnerability and the cyber attackers have used to create the most prolific cyber-attacks all across the globe. The ransom ware has affected the computer systems from the USA to Russia and more than 200,000 commuters have been affected all across the globe. The victims include prominent banks, telecommunication companies and hospitals. It is a hacking attack which keeps the computing system hostage until a ransom has been paid. When the ransom ware infects a computer, it encrypts all the data then a program is run on the operating system which demands money from the user to get access to the computer. Furthermore, the price increases overtime until the end of the ransom period and at the end of time, the files get destroyed. The business organizations and the individuals are equally affected by this ransom ware. In order to protect the system from this virus, it is important to keep all the software updated. In addition to it, it is important that the user does not open suspicions mails, emails and links. Delta Finally Admits there was a 'Small Fire' at Data Center in Atlanta Monday as Airline Headaches Move into Day Four Graham, R. (2016). Delta finally admits there was a 'small fire' at data center in Atlanta Monday as airline headaches move into day four. [Online]. Available at: https://www.dailymail.co.uk/news/article-3734898/Delta-computer-outage-included-small-fire-data-center.html#ixzz4hbdZppcP https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. In 2016, data center fire occurred in the computer network of the US Airline Delta. The airline cancelled a large number of flights and delayed many others after the incidence. Out of the myriads of threats posed to the operation of the data center, the most damaging incidence is fire. The fire blaze can spread quickly and halt the operations of the system in a short duration of time. The risk of data center fire can be reduced by the installation of data center temperature monitoring software. In this way, whenever the temperature of the server room reaches more than normal level, the higher authority should be immediately notified. In the case of US airline Delta, the data center fire lead to the disruption on the normal routine of flights and caused delays. The issue occurred when the switchgear used to control the data center temperature malfunctioned. It occurred during the examination of backup supplies of the organization wherein the switchgear malfunctioned and the system was locked out of its reserve generators. The major data center of the company was shut down which controlled the bookings, flight operations and other critical system of the organization. How This $200 Million Beauty Company Turned Product Development on Its Head Goldman, J. (2017). How This $200 Million Beauty Company Turned Product Development on Its Head. Inc.com. [Online] available at: https://www.inc.com/jeremy-goldman/the-200m-beauty-company-that-embraced-a-crowdsourcing-mentality.html [Accessed on: 17 May 2017]. Crowdsourcing is the sourcing model in which the business organizations use the contribution from the internet users to obtain the necessary services or ideas. In this model, the work is divided among the participants so that cumulative results can be achieved for the organization. It is different from outsourcing as the work is performed from the undefined or the general public. Crowdsourcing uses a mixture of bottom-up and top-down approaches for the selection of volunteers and getting work from them. It increases the speed, quality and diversity of the operations. It is also popular for its cost-effectiveness. Sundial Brands have famously employed crowdsourcing for increasing the productivity of the organization. It used the customer feedback to develop the consumer goods. The company manufactures the beauty products especially for women. The organization is heavily directed by the customer feedback. It manufactured a product with rosemary oil in it; however, later, some customers suggested that rosemary oil is not good for the pregnant customers. As a result, the organization changed Rose Mary oil and replaced it with the pepper mint. The use of the customer feedback is essential for the growth of the organization. The company emphasize on the feedback of the customers rather than focusing on its competitors. It has assisted the organization in obtaining customer loyalty. Hackers Finally Post Stolen Ashley Madison Data Zetter, K. (2015). Hackers Finally Post Stolen Ashley Madison Data. Wired. [Online] available at: https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [Accessed on: 17 May 2017]. At present, most of the companies are clod-based solution or internet for storing information and data of the organization. The information stored on the internet mediums is sensitive in nature; therefore, any breach in the security of the organization can negatively impact on the overall operations of the organization. The data security and sensitivity is critical in the organizations which are focused on customer-services as they save the sensitive and private information of the customers. In 2015, the hackers attacked the security system of Ashley Madison which provides dating services to the customers who are in serious relationships or are married. The hackers stole the address, names and locations of its users from the user database and the credit card details. There was serious impact on the customers due to the data theft and online publishing of the data. Several people left their jobs after the publishing of data. It also resulted in termination of employees from their jobs and increased the divorce rate of the people. Other than that, several victims have to face social shaming after the leak. The victims were avoided in social settings which resulted in clinical depression and suicides. Yahoos Demise Is a Death Knell for Digital News Orgs Lafranse, A. (2017). Yahoos Demise Is a Death Knell for Digital News Orgs. The Atlantic. [Online] available at: https://www.theatlantic.com/technology/archive/2017/04/yahoos-demise-is-a-death-knell-for-digital-news-orgs/523692/ [Accessed on: 17 May 2017]. In the present ever-changing business environment, it is important for the organization to adapt to the technological changes. The business organizations should be prompt to adapt to the latest technological advancements; otherwise they will fail and lag behind their competitors. One of the common examples of the companies which failed in to adapt to technology is Yahoo which was once one of the leading business organizations. In 2005, the company had approximately 21% of the market share; however, now it lags behind other major companies such as Google, Facebook and Microsoft. The biggest mistake of the organization was that it focused on creating a great online portal rather than focusing on the importance of the search engine. It outsourced tits search player to Microsoft Bing and neglected its importance. Over the years, the company also failed in several mergers such as Facebook and Google. The main reason was that it was unwilling to shell out money for the mergers. In successf ul operations of the organization, it is important that the organization conducts mergers and acquisition to foster its growth. Moreover, it is also important for the organization to examine the current trends in technology and adapt to it. Lessons Learned: IT's Biggest Project Failures Widman, J. (2008). Lessons Learned: IT's Biggest Project Failures. PC World. [Online] available at: https://www.pcworld.com/article/152103/it_project_failures.html [Accessed on: 17 May 2017]. Information technology is an innovative field and its growth is marked with constant ups and downs. Whereas, there have been some remarkable and revolution innovation, there are also some significant failure. One of the biggest failures in the Information Technology history is the stretch project by IBM. IBM (International Business Machine) is one of the prominent technology organizations in the world and pioneer in developing computing machines. In 1956, the company declared to manufacture the fastest super computer in the history of mankind. It was intended that the computer will be able to operate at very high speed and will be able to conduct complex calculations in millions of second. After over five year of hard work of the scientists, the company launched the computer in the market. Although the seed of the super computer was ridiculously high, it was still deemed as a failure. The major reason for this is that speed of the computer was only thirty to fifty percent than the in tended speed of the intended speed. Moreover, because of this reason, the organization also had to lower the price from 13.5 million US dollars to 7.5 million US dollars and had to sell the computers at a loss. However, the stretch project of the organization was a stepping stone in the development of supercomputers. Reference List Widman, J. (2008). Lessons Learned: IT's Biggest Project Failures. PC World. [Online] available at: https://www.pcworld.com/article/152103/it_project_failures.html [Accessed on: 17 May 2017]. Lafranse, A. (2017). Yahoos Demise Is a Death Knell for Digital News Orgs. The Atlantic. [Online] available at: https://www.theatlantic.com/technology/archive/2017/04/yahoos-demise-is-a-death-knell-for-digital-news-orgs/523692/ [Accessed on: 17 May 2017]. Zetter, K. (2015). Hackers Finally Post Stolen Ashley Madison Data. Wired. [Online] available at: https://www.wired.com/2015/08/happened-hackers-posted-stolen-ashley-madison-data/ [Accessed on: 17 May 2017]. Goldman, J. (2017). How This $200 Million Beauty Company Turned Product Development on Its Head. Inc.com. [Online] available at: https://www.inc.com/jeremy-goldman/the-200m-beauty-company-that-embraced-a-crowdsourcing-mentality.html [Accessed on: 17 May 2017]. Graham, R. (2016). Delta finally admits there was a 'small fire' at data center in Atlanta Monday as airline headaches move into day four. https://www.dailymail.co.uk/news/article-3734898/Delta-computer-outage-included-small-fire-data-center.html#ixzz4hbdZppcP Sherr, I. (2017). WannaCry ransomware: Everything you need to know. Cnet. [Online]. Available at: https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/ [Accessed on: 17 May 2017]. Welzl, M. (2005). Network Congestion Control: Managing Internet Traffic. John Wiley Sons. Vugt, S. (2013). VMware Workstation - No Experience Necessary. Packt Publishing Ltd. Canonical. (2017). Features. . [Online]. Available at: https://www.ubuntu.com/desktop/features [Accessed on: 17 May 2017]. Warner, B. (2013). What Quantum Computing Can Do for You. Bloomberg. [Online], Available at: https://www.bloomberg.com/news/articles/2013-05-30/what-quantum-computing-can-do-for-you [Accessed on: 17 May 2017].