240 research outputs found
With Liberty and Justice for Some
Yes, I said it. Cue the USSR anthem and call up the retired McCarthyites to put me away for good. I think there’s a maximum amount of money you should be legally allowed to make. Try your best to swallow my words. Remain skeptical; don’t trust me yet. But, I beg you to keep an open mind. Remember, I am no politician; I’m not trying to trick you with some underhanded rhetoric. I have a bona fide, genuine concern for the majority of Americans who are fighting an uphill battle in their “pursuit of happiness,” and I will use the principles of Macroeconomics to fortify my argument and fight for you—the little guy.
Emanuel Grant: Greetings, fellow Americans. Like most of you (I’m assuming), I am an American college student—a 3rd year Italian major at the University of Virginia. “The University of Virginia?” you might ask, “this is a James Madison University journal.” I have had the great pleasure of attending both universities, although I wrote With Liberty and Justice for Some while a student in one of my favorite classes at JMU—good ole’ GWRTC 103.
In my essay, I write for social justice when it comes to wages in America. If you like what I have to say, feel free to contact me and discuss it more! If not, please feel free to contact me and tell me how much you hate it! Either way, it has been an honor and a pleasure to work through GWRTC and to produce something I am truly proud of—and to get recognized in e-Vision is the icing on the cake.
With Liberty and Justice for Some explores my inner, socioeconomic beliefs. I’ve been raised Red, yet for the last eight years of my life, I’ve been socially Blue. Unfortunately for my psyche, these two separate ideologies dictate completely different societal structures. By today’s standards, the more Republican your worldview, the more you embrace the free-market; the more Democratic your worldview, the more you embrace government intervention in order to help the common man.
I try to (only) see the positives on both sides of the spectrum. But, when it comes to wages, I think there is a time when the government needs to step in. Though by some social standards—civil rights, women’s suffrage... you name it—we (society as a whole) have progressed over time, when you take a look at our income gap, we haven’t come too far. It’s medieval.
I propose a way to use elementary economic principles to try to convince you, my fellow Americans, that there might be some societal benefit behind a maximum wage—or at least, as you will find, something like it. In the end, it’s all hypothetical. But, I have spent countless hours in and out of class, in books and with professors, researching the topic. And, I think my idea holds water; maybe you will think the same
Towards Domain-Specific Modeling Methodology for Avionic Safety-Critical Systems
The use of domain-specific modeling languages and associated methodologies, provide support in application domain where the safe and reliable operations of the systems are of paramount importance to the users and organizations, and wherein the domains are well understood and documented. One such area of domain-specific modeling application is in the field of avionic systems. For software systems to be used onboard aircrafts they must be certified, and as such certification protocols have been established for developing these safety-critical systems. These established protocols are usually represented as textual documents and inherently are difficult to apply directly in software development environments. The work presented herein proposes a graphical modeling representation for an avionic software system certification specification and an accompanying model-driven methodology for implementing the certification specification. This work is based on the RTCA Software Consideration in Airborne Systems and Equipment specification and the Unified Modeling Language. The presented model-driven methodology, incorporates the use of formal specification techniques to satisfy many of the verification requirements of the RTCA specification. The benefit of this work is in the transformation of textual description to graphical models in support of precise software system development, and a rigorous model-driven software development methodology for avionic soft-ware system development
Towards Verification of UML Class Models using Formal Specification Methods: A Review
Abstract In today s world many elements of our lives are being affected by software and for that we are in greater need of high-quality software The Unified Modeling Language UML is considered the de facto standard for object-oriented software model development UML class diagram plays an important role in the design and specification of software systems A class diagram provides a static description of system component
Influential Article Review - Learning from Takeovers: How Businesses Benefit
This paper examines business acquisition. We present insights from a highly influential paper. Here are the highlights from this paper: Acquisition experience is commonly viewed as an important determinant of subsequent acquisition success. Yet, empirical evidence suggests that acquisition experience may not be positively associated with acquisition performance and could even hurt performance. In this article, we highlight specific practices that facilitate and impede learning from acquisitions and draw implications for managers. In particular, we suggest that managers (1) expand time between acquisitions, (2) implement strong governance mechanisms and top management team diversity, (3) use similar-context experience, (4) avoid herding behavior in acquisitions, and (5) minimize blind reliance on financial advisors to effectively transfer prior acquisition experience into acquisition success. For our overseas readers, we then present the insights from this paper in Spanish, French, Portuguese, and German
Software System Model Correctness using Graph Theory: A Review
The Unified Modeling Language UML is the de facto standard for object-oriented software model development The UML class diagram plays an essential role in design and specification of software systems The purpose of a class diagram is to display classes with their attributes and methods hierarchy generalization class relationships and associations general aggregation and composition between classes in one mode
Enhancing Teaching & Learning of Software Engineering in an International Environment
A fundamental artifact of any academic research isthe data used as the basis of that research effort. A group ofresearchers, from institutions in multiple territories, hasembarked on an ambitious research project that is initially aimedat enhancing the teaching of software engineering for four-yearundergraduate programs. The research project details a set ofworkshops, for which the objective is the capture of data that willbe the basis of the research effort. The first of these workshopswas held in August of 2011, and is reported on in this paper. Theworkshop comprised software engineering educators andrepresentatives from the information technology industry. Thedata collection task sought to identify a set of topics that areconsidered suitable for teaching software engineering, along withidentification of the years and depth at which these topics shouldbe taught. The use of technology in the curriculum design processis seen as an important step forward and this issue is alsodiscussed
Cloud Computing Security for Organizations using Live Signature – TPALM Printing Client Service
Cloud is taking over the computing environment in both public as well as private sector. This has increased the use of service-oriented architecture (SOA) for the development of services later deployed in the Cloud. This paper presents a Cloud Security algorithm using SOA 3.0 for secured transactions on the data, which usually governments of countries like USA International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) requires to be utilized and distributed only within United States by security cleared personal only. In this paper, we describe a novel algorithm and corresponding cloud service as Cloud Monitoring Gateway (CMG). The current service prototype simulates the behavior of actual Cloud Security Gateway Application (CSGA) using the algorithm called as TPALM (The Privacy Authentication Latency Management). This simulation is coarse-grained, but is capable of measuring the privacy authentication on the given variables of a legit user. We also present an evaluation of this service utilization on actual data
Big data architecture evolution : 2014 and beyond
This paper aims at developing the Big Data Architecture, and its relation with Analytics, Cloud Services as well as Business Intelligence. The chief aim from all mentioned is to enable the Enterprise Architecture and the Vision of an Organizational target to utilize all the data they are ingesting and regressing data for their short-term or long-terms analytical needs, while making sure that they are addressing during the design phase of such data architecture for both directly and indirectly related stakeholder. Since all stakeholders have their relative interests to utilize the transformed data-sets. This paper also identifies most of the Big Data Architecture, threat analysis within a Big Data System and Big Data Analytic Roadmaps, in terms of smaller components by conducting a gap-analysis that has significant importance as Baseline Big Data Architecture, targeting the end resultant Architectures, once the distillation process of main Big Data Architecture is completed by the Data architects
Towards a Formal Approach to Validating and Verifying Functional Design for Complex Safety Critical Systems
The quality and reliability of safety criticalsoftware systems are highly dependent on proper systemvalidation and verification. In model-driven softwaredevelopment, semi-formal notations are often used inrequirements capture. Though semi-formal notations possessadvantages, their major disadvantage is their imprecision. Atechnique to eliminate imprecision is to transform semi-formalmodels into an analyzable representation using formalspecification techniques (FSTs). With this approach to systemvalidation and verification, safety critical systems can bedeveloped more reliably. This work documents early experienceof applying FSTs on UML class diagrams as attributeconstraints, and pre- post-conditions on procedures. Thevalidation and verification of the requirements of a system tomonitor unmanned aerial vehicles in unrestricted airspace is theorigin of this work. The challenge is the development of a systemwith incomplete specifications; multiple conflicting stakeholders’interests; existence of a prototype system; the need forstandardized compliance, where validation and verification areparamount, which necessitates forward and reverse engineeringactivities
Preferential trade agreements and global sourcing
We study how a preferential trade agreement (PTA) affects international sourcing decisions, aggregate productivity and welfare under incomplete contracting and endogenous matching. Contract incompleteness implies underinvestment. That inefficiency is mitigated by a PTA, because the agreement allows the parties in a vertical chain to internalize a larger return from the investment. This raises aggregate productivity. On the other hand, the agreement yields sourcing diversion. More efficient suppliers tilt the tradeoff toward the (potentially) beneficial relationship-strengthening effect; a high external tariff tips it toward harmful sourcing diversion. A PTA also affects the structure of vertical chains in the economy. As tariff preferences attract too many matches to the bloc, the average productivity of the industry tends to fall. When the agreement incorporates "deep integration" provisions, it boosts trade flows, but not necessarily welfare. Rather, "deep integration" improves upon "shallow integration" if and only if the original investment inefficiencies are serious enough. On the whole, we offer a new framework to study the benefits and costs from preferential liberalization in the context of global sourcing
- …