Tuesday, May 19, 2020

Calcite and Aragonite in Earths Carbon Cycle

You may think of carbon as an element that on Earth is found mainly in living things (that is, in organic matter) or in the atmosphere as carbon dioxide. Both of those geochemical reservoirs are important, of course, but the vast majority of carbon is locked up in carbonate minerals. These are led by calcium carbonate, which takes two mineral forms named calcite and aragonite. Calcium Carbonate Minerals in Rocks Aragonite and calcite have the same chemical formula, CaCO3, but their atoms are stacked in different configurations. That is, they are polymorphs. (Another example is the trio of kyanite, andalusite, and sillimanite.) Aragonite has an orthorhombic structure and calcite a trigonal structure. Our gallery of carbonate minerals covers the basics of both minerals from the rockhounds viewpoint: how to identify them, where theyre found, some of their peculiarities. Calcite is more stable in general than aragonite, although as temperatures and pressures change one of the two minerals may convert to the other. At surface conditions, aragonite spontaneously turns into calcite over geologic time, but at higher pressures aragonite, the denser of the two, is the preferred structure. High temperatures work in calcites favor. At surface pressure, aragonite cant endure temperatures above around 400Â °C for long. High-pressure, low-temperature rocks of the blueschist metamorphic facies often contain veins of aragonite instead of calcite. The process of turning back to calcite is slow enough that aragonite can persist in a metastable state, similar to diamond. Sometimes a crystal of one mineral converts to the other mineral while preserving its original shape as a pseudomorph: it may look like a typical calcite knob or aragonite needle, but the petrographic microscope shows its true nature. Many geologists, for most purposes, dont need to know the correct polymorph and just talk about carbonate. Most of the time, the carbonate in rocks is calcite. Calcium Carbonate Minerals in Water Calcium carbonate chemistry is more complicated when it comes to understanding which polymorph will crystallize out of solution. This process is common in nature, because neither mineral is highly soluble, and the presence of dissolved carbon dioxide (CO2) in water pushes them toward precipitating. In water, CO2 exists in balance with the bicarbonate ion, HCO3, and carbonic acid, H2CO3, all of which are highly soluble. Changing the level of CO2 affects the levels of these other compounds, but the CaCO3 in the middle of this chemical chain pretty much has no choice but to precipitate as a mineral that cant dissolve quickly and return to the water. This one-way process is a major driver of the geological carbon cycle. Which arrangement the calcium ions (Ca2) and carbonate ions (CO32–) will choose as they join into CaCO3 depends on conditions in the water. In clean fresh water (and in the laboratory), calcite predominates, especially in cool water. Cavestone formations are generally calcite. Mineral cements in many limestones and other sedimentary rocks are generally calcite. The ocean is the most important habitat in the geological record, and calcium carbonate mineralization is an important part of oceanic life and marine geochemistry. Calcium carbonate comes directly out of solution to form mineral layers on the tiny round particles called ooids and to form the cement of seafloor mud. Which mineral crystallizes, calcite or aragonite, depends on the water chemistry. Seawater is full of ions that compete with calcium and carbonate. Magnesium (Mg2) clings to the calcite structure, slowing down the growth of calcite and forcing itself into calcites molecular structure, but it doesnt interfere with aragonite. Sulfate ion (SO4–) also suppresses calcite growth. Warmer water and a larger supply of dissolved carbonate favor aragonite by encouraging it to grow faster than calcite can. Calcite and Aragonite Seas These things matter to the living things that build their shells and structures out of calcium carbonate. Shellfish, including bivalves and brachiopods, are familiar examples. Their shells are not pure mineral, but intricate mixtures of microscopic carbonate crystals bound together with proteins. The one-celled animals and plants classified as plankton make their shells, or tests, the same way. Another important factor appears to be that algae benefit from making carbonate by ensuring themselves a ready supply of CO2 to help with photosynthesis. All of these creatures use enzymes to construct the mineral they prefer. Aragonite makes needlelike crystals whereas calcite makes blocky ones, but many species can make use of either. Many mollusk shells use aragonite on the inside and calcite on the outside. Whatever they do uses energy, and when ocean conditions favor one carbonate or the other, the shell-building process takes extra energy to work against the dictates of pure chemistry. This means that changing the chemistry of a lake or the ocean penalizes some species and advantages others. Over geologic time the ocean has shifted between aragonite seas and calcite seas. Today were in an aragonite sea that is high in magnesium—it favors the precipitation of aragonite plus calcite thats high in magnesium. A calcite sea, lower in magnesium, favors low-magnesium calcite. The secret is fresh seafloor basalt, whose minerals react with magnesium in seawater and pull it out of circulation. When plate tectonic activity is vigorous, we get calcite seas. When its slower and spreading zones are shorter, we get aragonite seas. Theres more to it than that, of course. The important thing is that the two different regimes exist, and the boundary between them is roughly when magnesium is twice as abundant as calcium in seawater. The Earth has had an aragonite sea since roughly 40 million years ago (40 Ma). The most recent previous aragonite sea period was between late Mississippian and early Jurassic time (about 330 to 180 Ma), and next going back in time was the latest Precambrian, before 550 Ma. In between these periods, Earth had calcite seas. More aragonite and calcite periods are being mapped out farther back in time. Its thought that over geologic time, these large-scale patterns have made a difference in the mix of organisms that built reefs in the sea. The things we learn about carbonate mineralization and its response to ocean chemistry are also important to know as we try to figure out how the sea will respond to human-caused changes in the atmosphere and climate.

What Is Float in C, C++ and C# Programming

Float is a shortened term for floating point. By definition, its  a fundamental data type  built into the compiler thats used to define numeric values with floating decimal points. C, C,  C# and many other programming languages recognize float as a data type. Other common data types include int and double. The float type can represent values ranging from approximately 1.5 x 10-45 to 3.4 x 1038, with a precision — the limit of digits — of seven. Float can contain up to seven digits in total, not just following the decimal point — so, for example, 321.1234567 cannot be stored in float  because it has 10 digits. If greater precision—more digits—is  necessary, the double type is used. Uses for Float Float is used mostly in graphic libraries because of their extremely high demand for processing power. Because the range is smaller than in the double type, float has been the better choice when dealing with thousands or millions of floating-point numbers because of its speed. The advantage of float over double is negligible, however, because calculation speed has increased dramatically with new processors. Float  is also used in situations that can tolerate rounding errors that occur due to the float precision of seven digits. Currencies are another common use for float. Programmers can define the number of decimal places with additional parameters. Float vs. Double and Int Float and double are similar types.  Float is a single-precision, 32-bit floating point data type; double is a double-precision, 64-bit floating point data type. The biggest differences are in precision and range. Double: The double accommodates 15 to 16 digits, compared with floats seven. The range of double is 5.0  Ãƒâ€"  10−345 to 1.7  Ãƒâ€"  10308.   Int: Int also deals with data, but it serves a different purpose. Numbers without fractional parts or any need for a decimal point can be used  as  int. The int type holds only whole numbers, but it takes up less space, the arithmetic is usually faster than with other types, and it uses caches and data transfer bandwidth more efficiently.

Wednesday, May 6, 2020

A History of Polio in Children - 2085 Words

Annotated Bibliography Brody, Jane E. Breakthroughs in Prenatal Screens. New York Times. 08 Oct. 2013: p. D.5. SIRS Issues Researcher. Web. 02 Feb. 2014. This article explains the unique development in prenatal screenings. Down syndrome, a chromosomal abnormality disease, occurs in about one in every 700 births in the U.S. At 10 weeks of pregnancy a mother’s blood contains about 10 to 12 percent of the DNA that belongs to the fetus. With the use of a new screening test the blood can be tested in order to see if the fetus will acquire Down syndrome. This test is far more accurate and less invasive than any other tests on the market. If the test comes back positive the woman will then decide is she would like to undergo an amniocentesis or a chronic villus sampling (C.V.S.). In pre-modern times royal families often tried to have intermarriage between relatives. This would allow for a pure blood line which was most often seen in Western Europe. As a result there were many deformities and birth defects with the infants born. Due to the lack of technology, these diseases could not be foreseen. Cha, Ariana Eunjung, and Sandhya Somashekhar. FDA Panel Debates Idea of Three-Parent Babies. Washington Post. 26 Feb. 2014: p. A.1. SIRS Issues Researcher. Web. 30 Mar. 2014. This article displays the argument of whether or not mothers should be allowed to have their infant’s genes modified if they have a DNA mutation. A new technique has been developed that combines DNA from threeShow MoreRelatedEmergence And Eradication Of Polio1623 Words   |  7 Pages Emergence and Eradication of Polio Viren Patel Valparaiso University I have neither given or received, nor have I tolerated others use of unauthorized aid. Viren Patel Introduction The poliomyelitis word is derived from the Greek. It is the effect of poliomyelitis virus on the spinal cord which leads to paralysis. This virus enters from the person mouth and multiplication occursRead MorePolio : An American Story1378 Words   |  6 PagesThe Legacy of Polio in the United States Throughout the 1900s, polio was every American family’s worst nightmare. The crippling disease frequently preyed on young children, often leaving them handicapped for life if not dead. Extensive media coverage of polio outbreaks led to nationwide hysteria, prompting the race for a cure. The nation rejoiced when Jonas Salk successfully developed the first effective polio vaccine in 1955. David M. Oshinky’s Polio: An American Story tells the thrilling taleRead MoreTaking a Look at Polio1546 Words   |  6 PagesINTRODUCTION Polio (poliomyelitis) is a viral disease also referred to as infantile paralysis. It is an infectious, potentially fatal disease for which there is no known existing cure. This paper discusses the causes, transmission, symptoms and prevention of polio. Further, it addresses the challenges involved in eradicating Polio and suggests efforts to wipe out this disease. The word â€Å"poliomyelitis† is derived from the Greek word, ‘polios’, meaning grey, and myelà ³s for â€Å"marrow†, which refersRead MoreA Brief Look at Poliomyelitis1377 Words   |  5 PagesINTRODUCTION Poliomyelitis is often called polio, this polio is an acute infectious disease caused by a virus which can spread from person to person via the fecal- oral route. The term poliomyelitis means inflammation of the spinal cord of the grey matter. In severe poliomyelitis infection it can expand to the brainstem. Polio is so contagious that anyone living with a person that is recently affected can spread the virus for weeks in their feces. It invades the nervous system and spread withinRead MoreViral Infectious DiseasesPolio or Poliomyelitis1368 Words   |  5 Pagesunknown before the 20th century. The disease has caused millions of deaths and paralysis for much of human history. NATURAL HISTORY OF POLIOMYELITIS The name poliomyelitis is derived from ancient Greek were polio means grey and myelos meaning marrow referring to grey matter of spinal cord. Ancient paintings recovered in Egypt depicits an Egyptian stele though to represent a polio victim from the 18th dynasty which was from 1403 to 1365 BC. The disease had different names in earlyRead MoreThe Polio Vaccine Through The Eyes Of Its Creator1218 Words   |  5 Pagesthe creation of the polio vaccine through the eyes of its creator. Salk also describes his childhood and the events that lead up to his medical breakthrough. Latour, Bruno , Steve Woolgar, and Jonas Salk. Introduction. Laboratory Life. 1986.Reprint. Princeton: Princeton University Press, 1986. 11. Print. It showed the way that Jonas Salk studied polio and how he came to the conclusion that the vaccine was correct. He also taught that it is a life taking job and that polio vaccine was a difficultRead MoreThe Polio Years : A Long Period Of Captivity Essay1118 Words   |  5 PagesHeather Green Wooten’s The Polio Years in Texas: Battling a Terrifying Unknown chronicles the history of polio in Texas in a very extensive timeline. The book goes all the way back to the beginning of the polio epidemic and essentially progresses to the present. The time in this book certainly exceeds that of, The Captured and Isaac’s Storm. The Captured chronicled a long period of captivity, but did not appear to exceed a decade. Isaac’s Storm traced the initial development of Weather Bureau andRead MoreA Brief Look at Polio1444 Words   |  6 PagesINTRODUCTION Polio or poliomyelitis was derived from the Greek words â€Å"polio† meaning grey and â€Å"myelos† meaning marrow which refers to the grey matter of the spinal cord and ‘itis’ meaning inflammation; therefore poliomyelitis is inflammation of grey matter of the spinal cord (www.wikipedia.com). It is a viral disease caused by the polio virus which belongs to the enterovirus genus; enterovirus because it infects and replicates in the intestinal epithelial and lymphoid (tonsils, Peyer’s patches) cellsRead MoreIs Poliomyelitis A Non Curable Viral Disease?1565 Words   |  7 PagesPoliomyelitis is a non-curable viral disease that mainly affects children who under five years old. It is a highly infectious disease, which is transmitted mainly through the fecal oral route and less frequently through contaminated water or food.[1][2] Virus transmission is correlated with areas where water quality, sanitation and hygiene are poor.[3] The virus enters through t he human gastrointestinal tract and proliferates in the intestines. Some of the initial symptoms of infection include: feverRead MoreVaccinations Should Be Mandatory For Children862 Words   |  4 PagesVaccinations should be mandatory for children because the benefits outweigh the side effects, they decrease the likely hood of a disease outbreak, and saves children s lives. However, it is possible that this type of law could set a president for the government to start making other medical decisions for its citizens. Like all medications vaccines also come with the risk of side effects. Most of them are rather mild some examples would be rashes, headaches, fevers, and things of that nature. However

This American (Working) Life - 1053 Words

What is your average workweek? According to the Organisation for Economic Co-operation and Development over sixty six percent of women and eighty-eight percent of men in America work over 40 hours each week (4). Yet not everyone receives overtime pay. Executives, teachers, managers and others are not required by law to receive overtime pay (U.S. Cong. Federal Labor). These and other professions are labeled exempt from the Fair Labor Standards Act. An exempt profession, when put on a salary, is not protected by the FLSA and can work as many hours as required with no extra compensation. According to a new bill, S. 1747 The Computer Professionals Update Act , legislators would extend these exemptions to other IT professions (27-31). In a†¦show more content†¦There really is no reason that any law should not be clear. And it should help the poor. However, one of the main problems with increasing exceptions to the FLSA is that if an employee is being paid the minimum salary for an exempted worker, they are within a whisper of the poverty line. The original language pertaining to anyone working with computers was first introduced in 1990. An be labeled exempt one would have to be paid an hourly rate and paid no less than six and a half times the minimum wage. In 1996 the rate was adjusted to a fixed rate of $27.63 an hour(U.S. Cong. Small Business). It was only small decrease from the previous rate at the time. But then in 2004 the language was further changed. While it was a small change the impact was huge. Instead of only being exempt if you were paid an hourly rate, you could also now be exempt if you were paid a salary (National Archives and Records 69:79). The minimum salary rate has not changed since then and remains at 455 a week (United States. Dept. of Labor). To now be exempt as a system developer or systems analyst you can either be paid $27.63 per hour or a salary of $455 per week. The difference is in those wages is astounding though. At the fore mentioned hourly rate for a 40 hour work week, you would ea rn $57,470.04 a year. Though if a company decided to pay the minimum salary rate,, they would only make $23,660 a year and would receive no extraShow MoreRelatedThe Chinese American Identity By Fae Myenne Ng1639 Words   |  7 PagesThe Chinese-American Identity Fae Myenne Ng is a contemporary Chinese-American author who is known for her first written novel, Bone. Her debut novel was published in 1993 and the story is told through the eyes of the main character, Leila Leong. Leila tells the story of her family’s history and the events that unfold following the suicide of her sister. As Leila’s story progresses, themes of identity and family life are revealed. Leila and her two sisters border the line between American and ChineseRead MoreAnalysis Of The American Dream1063 Words   |  5 PagesWhat is the American Dream? Is it home ownership, gaining fame or wealth, having a great family or is it gaining a peace of mind? Many people have different versions of what the American Dream is, some people believe the dream is lost, and some people are right in the middle and still believe the American Dream is still alive. â€Å"The American Dream† by Brandon King debates about what the true state is left in the American Dream n ow. Throughout the essay, King asks if the American Dream is dead, aliveRead MoreDavid K. Shipler s Work1696 Words   |  7 Pagesjourney trying to reveal the truth about Americas working poor. It was a little difficult trying to find different ways of getting enough information about the life of the poor, and getting them to feel comfortable explaining the stressful life that they lived in America the great. There were many different aspects and situations about people that were struggling to make it in America. David K. Shipler used many different research methods on this project, and went through a lot of steps getting theRead MoreHow Americans Are Not Getting What They Came For America?1015 Words   |  5 PagesSince its discovery North America has been a home for the dreamers, the desirous, and the world changers. This can be attributed to many things, but the idea is always consistent. America holds a promise; holds a certain kind of hope. Some call it luck, but others woul d call it the American dream. The idea that one can take nothing and turn it into something beautiful and new is at the root of our civilization. Though in the past half a century, America and its economy has drastically changed, asRead MoreWealth And Income : The American Society1735 Words   |  7 PagesWealth and income come in diversity and variability in the American society. Each individual has its own value of wealth and income in life. Certain individual goes through struggles and problems multiplies times in life. There is the lucky individual who does not, go through any struggles and problems. The American s dream life is not as simple as a society think it is. The chance for the poor and working class society to be on the same level as the upper class society is less than one percentRead MoreComing of Age in Mississippi and Segregation Essay1304 Words   |  6 PagesMovement as a poor African American woman in rural Mississippi. Her story comprises of her trials and tr ibulations from life in the South during the rise of the Civil Rights movement. Life during this time embraced segregation, which made life for African Americans rough. As an African American woman growing up during the Civil Rights movement, Moody has a unique story on themes like work and racial consciousness present during this time. Moody’s position as an African American woman provides a uniqueRead MoreThe Myth of the American Dream Exposed in Death of a Salesman1218 Words   |  5 Pagesinvolving totalitarianism and the American Dream. Throughout the piece, Miller uses his voice of conscience and passion for the purpose of exposing the truth about the concepts. Using the perspective of Willy, a fictional, working class citizen, Miller picks apart the myth of the American Dream, exploring topics such as abandonment, betrayal, family dynamics, and using interesting symbolism along the way. With reckless abandon, Willy believes in the idea of the American Dream. In fact, thats a bitRead MoreBenefits Of Working Days During The United States1691 Words   |  7 Pagesgo away. That’s why longer working days are so devastating on workaholics. In the United States, working varies from person to person, usually on location, culture, lifestyle, and the profitability of the individual’s livelihood. A lot of Americans work a lot of hours and are more productive. Americans work more productive that Americans on the average are overwhelmed and the long hours are really affecting their health and family life. â€Å"For many professionals, working on the weekends has becomeRead MoreThe American Dream By Kimberly Amadeo1637 Words   |  7 PagesNowadays, a large number of people migrate to the United States to work and achieve the American Dream. According to the Article â€Å"What is the American Dream?† by Kimberly Amadeo, â€Å"The American Dream was first publicly defined in 1931 by James Truslow Adams in Epic of America. Adam’s often-repeated quote is, ‘The American Dream is that dream of land in which life should be better and richer and fuller for everyone, with opportunity for each according to ability or achievement.’† There are many peopleRead MoreThe Legacy Of The South854 Words   |  4 Pages followed by African Americans leaving the South in record numbers in the 1880s, heading toward the industrial cities of the northeast (â€Å"Industrialism† Lecture). A large influx of immigrant workers coupled with new management techniques and technologies, including assembly line production, created an America in transition, especially for women. Black, white, native-born or immigrant, American women found themselves moving West, helping rebuild their communities, or working in factories (Compilation

Internet of Things Communication Interface

Question: Discuss about the Internet of Things for Communication Interface. Answer: Introduction Internet of things is an important idea surrounding the idea of connecting every object using sensors and communication interface through the internet. In this case, they can communicate vital information in their current state, and relevant responses offered towards possible adjustment. The technology behind the idea applies in several sectors of the economy such as manufacturing industry, logistics, energy efficiency, and the area of health (Xia,Yang, Wang, Vinel, 2012). The concept has received full recognition and adopted by governments and the international community in most of their operations. The technology allows for the purchase of items already connected to the internet such as light bulbs, refrigerators, cars, and medical machines, which can remain monitored and operated remotely increasing service efficiency. Following the trend, everything will soon appear on the internet making the world more of a robotic operation. Application of Internet of Things Building and Home Automation Internet of Things applies vastly in the building and home automation systems ranging from security enhancement, energy consumption reduction to cost maintenance. Various sensory devices are used to monitor movements within buildings and relay information to the relevant quotas for a possible action. Doors connected to the internet have the ability to sense registered persons and grant access allowing a monitoring team to detect their authenticity. In a similar manner, the sensors can regulate room temperature by adjusting appropriately whenever the weather changes to offer important condition. In the case of excessive cold, a sensor relays information, and a substantial amount of adjustment occurs to allow for heat in the room. The operations can occur from a person connected to the internet from a different location. At the same time, sensors interlinked in the bulbs can detect the presence and absence of individuals in a room and turn off the lights to save energy (Miorandi, Sicari, De Pellegrini, Chlamtac, 2012). On the other hand, the sensors allow the lights to turn on whenever movement in a room occurs. The operation allows for security lights to turn themselves off whenever daylight comes in and vice-versa in the evening. Smart City Operations Smart cities can use the technology in reducing costs and maximizing efficiency in their daily activities. The technology allows for surveillance activities, system control, and lighting. Here, the sensors installed on the products allow for detection in the pipeline connected to a city calling for a prompt response from a relevant group of technicians (Suny Cortland,2016). At the same time, the technology can relay e-meter readings increasing efficiency and timely relay of bills to clients. Similarly, the system remains installed on the streetlights command center where the lights turn themselves on and off at relevant times and a monitor team can detect a faulty light and respond to the same (Want, Schilit, Jenson, 2015). The technology comes in handy in traffic control where operations go on swiftly according to the load without necessarily including the human resource in the command centers. The sensors installed relay traffic situation that enables those at the control center determine the next course of action feedbacked for effective action. In the process, the technology reduces operation time, increases efficiency and saves costs for manual operations. Smart Manufacturing Industry Internet of things has vast application in the manufacturing industry as the sensors provide real-time information report on various processes. First, it is essential in inventory reporting where a manager sitting in a remote location can ascertain the inventory record and plan for either an increase or decrease according to the market demand. Therefore, it is vital for record keeping. At the same time, goods on transit can be tracked using the sensors installed where the owners and product consumers can track the progress and get the assurance of their product flow. At the same time, the technology allows for predictive maintenance where the sensors relay information on equipment service duration and operation efficiency allowing the support team to act swiftly limiting low production due to break up (Bi, Da Xu, Wang, 2014). The sensors allow for an automatic firmware update whenever a new useful update is out thereby allowing for a natural diffusion of technology in operations. The technology enables a track of employee presence at different workstations guaranteeing their safety through a timely response that turns on the security apparatus in case of an emergency. Wearables In the wearable market, the technology provides benefits through the smart watches that relay information on weather conditions and other environmental factors. At the same time, the sensors provide location information essential in tracking down children and other persons for security purposes. Health Sector The health sector benefits greatly from the technology in patient care. Patients on treatment can be monitored and necessary action taken by medical personality without their physical presence. In case a sensor indicates a change in body temperature or inadequate response to treatment, the information relayed to a doctor enables one to prescribe and change medication and observe the same According to Jog, Sharma, Mhatre, Abhishek, (2015). Hospitals can track their asset and report when a malfunction occurs allowing for a timely maintenance thus enhancing service efficiency. At the same time, it increases patient safety by allowing authorized personnel in restricted areas promoting accountability to the industry. Automotive Industry In the automotive sector, many changes have been incorporated using the technology allowing for information relay on various motor vehicle engine and parts. It allows for predictive maintenance by transmitting information on engine service due dates, wire malfunction, and non-compatible parts installed. Vehicle tracking during shipping and normal operations occur by using information relay from the sensor to relevant car owners. The technology has revolutionized vehicle tracking and maintenance that can be done remotely. Internet of Things Applications for Development As a firm active in the connectivity web technology, the business can develop applications that aim to expand businesses on a global platform. With the current environmental issues, it is essential for the enterprise to develop Internet of Things application that reduces environmental wastes. Some government is grappling with environmental problems, and the applications would be readily adopted as part of the environmental concern (Rubens, 2014). Green Street Lighting Control The firm proposes a sensor that can be used in the effective street lighting that sets the light on a few minutes to dusk and a few minutes to dawn. The application is interconnected and allows the control system to check the malfunctioning lighting programs. In this case, efficiency is achieved through proper use of non-renewable sources. In most countries, it is evident to observe security lights running through the day continuously depleting the non-renewable resources (Burntz, 2016). Therefore, the application using automated sensors would enable energy consumption reduction and bring responsibility to the city management. At the same time, it would save costs since fewer power bills would be made in areas where the sensors exist. The sensors lighting system shall encompass the sensors thus driving benefits to the company and growing its brand name. Fang, Xu, Zhu, Ahati, Pei, Yan, Liu, (2014) suggest that it would ease maintenance activities by sending a quick notifier to the electrical department for a prompt response on the non-functioning streetlight. Smart Parking Technology At the same time, firm proposes developing parking lots applications that are installed in parking lots and informs the vehicle owners on empty parking slots. The application would substantially reduce the amount of carbon emitted to the environment spent while searching for parking lots (Parth, 2014). As vehicle owners approach a car park, the sensor would indicate empty spaces controlled by the system that detects whenever a car leaves, raising a red button at the entrance. Developed and developing countries are embracing concepts that reduce gas emission to the environment, and the idea would be widely accepted in the international cities Yang, Geng, Du, Liu, Han, (2011). Fuel emission has been a persistent issue towards global warming, and by reducing the emission levels, the world would be safer and better for the current and future generation (Fang, Xu, Zhu, Ahati, Pei, Yan, Liu, 2014). Detection of Excessive Pollution Levels In a bid to remain committed to the environment, the firm shall develop an application that detects the extreme level of emission in factories and other related sectors and sends the message to the monitoring department for proper adjustment. The sensors, connected to the main company shall monitor the levels according to the international standards and therefore become an environmentally friendly application. Data Security Strategies All the three applications are environment-friendly thereby standing high chances of performing in the market already aware of the global warming effects. In securing the data transfer from the sensor to the control center, the firm shall ensure data encryption occurs on its network and recommend the use of strong passwords and access control to ensure the information remains free from interruption. At the same time, it shall support for a tiered data protection using perimeter defense rings in countering threats. Further, it shall recommend for a firewall protection with antispyware and virus detection sets on the servers (Cheswick, Bellovin, Rubin, 2003). Once the data enters the central server, the firm shall provide a cloud storage platform completely secured and peculiar to a host organization access. According to Sanyal Iyer, (2013) cloud storage is one of the secure methods used by the current organizations in safety promotion. Issues Surrounding Internet of Things Advantages of IoT Communication Internet of things allows for real-time communication between devices helping them stay interconnected Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M. (2014). For instance, one can read information from a remote center through a smartphone or computer interconnected. Therefore, it promotes transparency-allowing producers to monitor inventory records and plan for possible supply schemes. Security The technology, through the automatic control systems, allows only restricted persons and controls movements enhancing safety and bringing individuals to account (Perera, Zaslavsky, Christen, Georgakopoulos, 2014). Through this, its possible guarantee secures operations and lighting in diverse areas. Monitoring Benefits In the past, a lot has been done to monitor including physical presence of individuals. However, internet of things allows for sensor installation on security cameras that monitors operations and determines when a change in action can be done, more so from a remote location (Buzzle, 2016). Time The technology reduces service time where a real-time solution to problems is offered as information transfers from two locations as opposed to the traditional models of monitoring (Hajdarbegovic 2016). Costs Internet of things allows for faster operations that limit human efforts that involve physical movement to carry out tasks in different locations. In the health sector, change of medication can be done without physical presence and can be administered to various patients thus saving enormous costs. Efficiency Internet of things, in the energy sector, reduces environmental issues of waste as the technology allows options to turn off energy not in use even from a remote location Botta, De Donato, Persico, Pescap, (2014). In monitoring pipeline flow, the technology reduces leakages due to faster response and stoppage of the same. Disadvantages Privacy/security As data transmits from one source to another, vital data might be hacked or used by other unintended persons. Therefore, it poses a risk, especially to information confidentiality. Data encryption issues affect the technology reducing its usage among those unable to find protective devices Sheng, Yang, Yu, Vasilakos, McCann, Leung, (2013). If a notorious hacker changes a drug perception, it may lead to a patient's death thus a safety risk. Compatibility Issues Lack of a common standard between interconnected devices sets back on the technology penetration among industries. Job Loss Individuals replaced by the machine operation, especially in the monitoring and tracking risk job loss, thereby affecting income levels (Taggart, 2016). As services get automated, a large number of individuals are rendered jobless. Overreliance on Technology As technology takes place in all operations, people tend to be lazy as everything is controlled. In the process, errors might occur, for instance, if an alarm goes on, and once one switches it off, it allows for a coffee maker to go on and an automatic shower. In the process, much energy shall be lost when an individual has not woken up for the services (Borne, 2014). Ethical, Privacy and Legal Issues Due to system integration and linkage through sensors, a new set of moral and legal challenges emerge surrounding legality of data transfer, data ownership, and security. Ethical issues on data handling and sharing, and inappropriate use shall occur limiting the proper use of the same. At the same time, lack of universal laws surrounding the technology poses a challenge to the existence and good use of the technology. According to Pittenger, (2003) information privacy would be an issue with the current hacking menace that changes tactics often. Personal privacy in institutions would cause significant safety challenges as criminals might use the same information to execute illegal activities. As much as the technology increases connection, lack of proper use results into a technological crisis. According to (Suo, Wan, Zou, Liu, (2012, March) the flow of irrelevant information in the form of advertisements flowing to various interconnected sectors would jeopardize the success of the technology. Conclusion The Internet of Things has brought a revolution in the way things occur in the current world. The technology comes with energy saving, cost cutting, and securing, and staying in control of our belongings. Enabling items of daily use with applications that enable us to watch their movements and changes derive benefits to the current users. As a firm concerned in the Internet of Things, the opportunity for development remains open and can be used to bring the eco-friendly products to the market. At the same time, Internet of Things has several benefits ranging from time saving, efficiency in factories, environmental concerns, faster processing techniques, and saves time. However, there are serious challenges such as unemployment where machines replace human labour, privacy infringement issues, overreliance on technology, and raising a lazy generation dependent on automatic operations. Despite the challenges, several benefits derive from the technology overshadowing the negativities. Therefore, the firm should take the opportunity of the present technological wave to invent applications that influence the current and next generation. In so doing, the firm has to put into consideration ethical procedures to avoid a negative effect on the firms future operations. Privacy is a key concern coupled with product quality that is achievable through incorporating qualified personnel in the product development stage. At the same time, the firm has to seek legal solutions to product copyright issues to ensure themselves as the sole producers apart from operating according to the legislative laws surrounding electronics production. Since people are increasingly becoming more aware of their environment, developing products that tackle related issues sounds viable in the business world. The world is embracing technology in every operations that has to be utilized by everyone to the utmost. Therefore, Internet of Things is a blessing to the modern generation that brings much ef ficiency in operations and remaining concerned to the changing environmental landscape. Recommendations Strategy in business is a key tool towards organizational success. In this case, the Internet of Things presents wide opportunities for the firm to grow and build its brand name. In this respect, I recommend for the analysis and execution of the three projects concurrently. I am certain on the projects viability in the market basing on not only the increased use of internet of things concept, but also the growing concern to protect the environment. I, therefore, recommend the firm to take up the three projects; parking lot sensor, emission reduction, and smart street lighting technologies t thrive in the environmentally sensitive world. Government policies currently encourage such technology ventures, providing an assurance of the business success both locally and in the international scene. Since the product is new in the market, I recommend the firm to outsource system developers to aid in the manufacture process and in the process build experience on the existing staff who can then continue with the manufacture system. Competition is real in the industry, and developing strong products would increase the chances of developing a greater market share. Each staff should take an oath of allegiance to the company and promise not to divulge the business and manufacturing tactics to any other firm for malicious reasons. The step is in good faith to guarantee product safety and as an ethical consideration on privacy. However, particular concern has to be made regarding privacy of information, ethics, and safety when handling the project. Restriction to information should be maintained and done with adequate permission and request to end users. Sicari, Rizzardi, Grieco, Coen-Porisini, (2015) suggest for the considerations of the privacy of information through encryption recommendations to the purchasing team remain a key selling point to the technology application. Ethical concerns are essential as product manufacturer and distributor, and in this case, privacy remains a central concern that might affect the business. Therefore, I recommend for the management team to come up with policies and measures that shall ensure product privacy. In this case, the company shall transfer the same to the buyers through manuals. Furthermore, the company shall offer after sales services, where the firm offer assistance on any issues of contention regarding privacy. The systems shall undergo testing to ascertain their quality essential in building a trusted name on the market and as an ethical act to the general consumers. Adding on, a two-year warranty should be placed on the products with a timely response to enable a quick sale promotion for the products. Internet of things is a transformation that if well handled yields positive results to the global village concept and is bound to drive profits for the company. References Bi, Z., Da Xu, L., Wang, C. (2014). Internet of things for enterprise systems of modern manufacturing. IEEE Transactions on Industrial Informatics, 10(2), 1537-1546. Borne, K. (2014). 14 benefits and forces that are driving the internet of things. Retrieved from https://www.mapr.com/blog/14-benefits-and-forces-are-driving-internet-things Botta, A., De Donato, W., Persico, V., Pescap, A. (2014, August). On the integration of cloud computing and internet of things. In Future Internet of Things and Cloud (FiCloud), 2014 International Conference on (pp. 23-30). IEEE. Burntz, B. (2016). Why the IoT is coming to street lights. Retrieved from https://www.ioti.com/smart-cities/why-iot-coming-street-lights Buzzle. (2016). Pros and cons of internet of things (IoT)-What you need to know. Retrieved from https://www.buzzle.com/articles/pros-and-cons-of-internet-of-things-iot.html Cheswick, W. R., Bellovin, S. M., Rubin, A. D. (2003). Firewalls and Internet security: repelling the wily hacker. Addison-Wesley Longman Publishing Co., Inc.. Fang, S., Da Xu, L., Zhu, Y., Ahati, J., Pei, H., Yan, J., Liu, Z. (2014). An integrated system for regional environmental monitoring and management based on internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1596-1605. Hajdarbegovic, N. (2016). Are we creating an insecure internet of things. Security challenges and concerns. Retrieved from https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things Jog, Y., Sharma, A., Mhatre, K., Abhishek, A. (2015). Internet of Things as a Solution enabler in health sector. International Journal of Bio-Science Bio-Technology, 7(2), 9-24. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7), 1497-1516. Parth, S. (2014). Internet of things has a large role to play in smart cities. Retrieved from https://www.governancenow.com/views/interview/ternet-things-has-a-large-role-play-smart-cities Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D. (2014). Sensing as a service model for smart cities supported by internet of things. Transactions on Emerging Telecommunications Technologies, 25(1), 81-93. Pittenger, D. J. (2003). Internet research: An opportunity to revisit classic ethical problems in behavioral research. Ethics Behavior, 13(1), 45-60. Rubens, P. (2014). How to develop applicants for the internet of things. https://www.cio.com/article/2843814/developer/how-to-develop-applications-for-the-internet-of-things.html Sanyal, S., Iyer, P. P. (2013). Inter-Cloud Data Security Strategies. arXiv preprint arXiv:1303.1417. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A. V., McCann, J. A., Leung, K. K. (2013). A survey on the ietf protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE Wireless Communications, 20(6), 91-98. Sicari, S., Rizzardi, A., Grieco, L. A., Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. Suny Cortland. (2016). The internet of things. Retrieved from https://sites.google.com/a/cortland.edu/the-internet-of-things/disadvantages Suo, H., Wan, J., Zou, C., Liu, J. (2012, March). Security in the internet of things: a review. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 3, pp. 648-651). IEEE. Taggart, M. (2016). 3 threats and 3 benefits of the internet of things. Retrieved on 9th September 2016 from https://www.atlanticbt.com/blog/3-threats-and-3-benefits-of-the-internet-of-things/ Want, R., Schilit, B. N., Jenson, S. (2015). Enabling the Internet of Things. IEEE Computer, 48(1), 28-35. Xia, F., Yang, L. T., Wang, L., Vinel, A. (2012). Internet of things. International Journal of Communication Systems, 25(9), 1101. Yang, G., Geng, G., Du, J., Liu, Z., Han, H. (2011). Security threats and measures for the Internet of Things. Journal of Tsinghua University Science and Technology, 51(10), 1335-1340. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things Journal, 1(1), 22-32.

Social Media Marketing Part of organizations

Question: Discuss about the Social Media Marketing Part of organizations. Answer: Introduction Over years, social media marketing has emerged to be an integral part of organizations of all nature and sizes around the world. There have been plenty of studies conducted to ascertain the influence of social media activities on the purchasing decisions. As marketers have jumped into the growing digital marketing space, consumers are bombarded with information to make better decisions. As traditional marketing is taking a back seat, businesses are left with little options to learn using social media in an effective manner which is in sync with their business aspirations (Mangold Faulds 2099). In the past decade, the internet services have grown at incredible speed in the industry with online communities developing across social media being an ideal example (Lu et al., 2010). Social media helps organizations in many ways including brand promotion (de Vries, Gensler Leeflang, 2012), improving sales (Agnihotri et al., 2012), mutual exchange of information ( Lu Hsiao, 2010), and supp orting marketing through word-of-mouth (Chen et al. 2011b). As consumers have increased access to vital information resources including the online communities, marketers are increasingly targeting the social media space to influence and gain consumers confidence and trust. Do-Hyung et al (2007) argued that customer participation through social media interaction is a key factor in marketing field. Aims and objectives Social media marketing has crucial role to play in changing the perception of people about products and services. The research intends to explore the role of social media marketing activities in influencing consumers purchasing decision. The objectives formulated are mentioned below: 1. To investigate the popularity of social media marketing to influence consumers into purchasing products. 2. To investigate the relation between social media marketing and sales revenue from products and services. 3. To study the positive impact of social media marketing in moulding the brand image of products and services. 4. To determine the influence of social media marketing activities in building customer relationship. Research Methodology: For the research, qualitative and quantitative methods would be used to achieve the objectives set: 1. Secondary Analysis: An in-depth analysis is relevant to gather the hard core facts through studies conducted on social media marketing so far. Though there is large volume of material available, credible research studies would be selected in order to gather the valid information. 2. Consumer Survey: A consumer survey allows collection of objective opinion of respondents about the subject matter. Its a quantitative research tool to gather relevant data and information from a selected number of individuals to achieve objectives. The survey will be sent to a predetermined number of consumers to gather their opinion about social media marketing and its impact on their purchasing decisions. A sample set of respondents will be identified from a large pool of consumers and formulated survey form will be distributed to them. The collected responses will be analysed to provide legit conclusions about the research objectives. Its the combined application of secondary analysis and consumer survey that research objectives would be dealt with. References Mangold, Glynn W. David J. Faulds. (2009). Social Media: The New Hybrid Element of the Promotion Mix. Business Horizons. 52, 357-365. Lu, H.-P Hsiao, K.-L. (2010) The influence of extro/introversion on the intention to pay for social networking sites. Information Management, 47(3), 150-157 Gruzd, A., Wellman, B. Takhteyev, Y. (2011). Imagining Twitter as an imagined community. American Behavioral Scientist, 55(10),1294-1318 Do-Hyung, E, Jumin, L. Ingoo, H. (2007) The effect of on-line consumer reviews on consumer purchasing intention: the moderating role of involvement. International Journal o f Electronic Commerce, 11 (4), 125-148 de Vries, L., Gensler, S. Leeflang, E.S.H. (2012) Popularity of brand posts on brand fan pages: an investigation of the effects of social media marketing. Journal o f Interactive Marketing, 26(2), 83-91 Agnihotri, R., Kothandaraman, P., Kashyap, R. Singh, R. (2012). Bringing social into sales: the impact of salespeoples social media use on service behaviors and value creation. Journal o f Personal Selling Sales Management, 32(3), 333-348. Lu, Y, Zhao, L. Wang, B. (2010). From virtual community members to c2c e-commerce buyers: trust in virtual communities and its effect on consumers purchase intention. Electronic Commerce Research Applications, 9(4), 346-360 Chen, Y., Fay, S. Wang, Q. (2011b). The role of marketing in social media: how online consumer reviews evolve. Journal of Interactive Marketing, 25 (2), 85-94.