Wednesday, November 27, 2019

Team Summary free essay sample

In week four material we learned about IT projects and how crucial and essential these projects are to a business. We learned the importance of these projects and project management. A key point discussed in week four material is project planning and the triple constraints of project management. The triple constraints of project managements include the time, scope, and cost of a project. Every project also should be assessed using five steps or stages: * Project Initiation Project Planning * Project Execution * Project Monitoring and Control * Project Completion We also learned about business programs and gained an understanding of the technical side and the many different steps required to build a successful program. Deciding on a type of program depends on a few important steps. There are different models an organization can utilize to assist in project management and execution. The Systems Development Life Cycle (SDLC) is an example of one way that companies use different steps to decide which program to use. We will write a custom essay sample on Team Summary or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The lifecycle involves six stages the systems investigation, systems analysis, systems design, programming and testing, implementation, and operation and maintenance. Systems Investigations are when developers research the existing problems with the current system. Then the developers examine the problem and determine the user requirements, which is Systems Analysis. System Design is the step when developers decide how to resolve the problem. Next the developers change the solution to the problem into computer code, which is Programming and Testing. Implementation happens when the old system is converted into the new system. To ensure the success of the new program, the developers schedule audits to assess the systems capabilities, which is Operation and Maintenance. The systems development life cycle is important because it forces staff to systematically go through every step in a structured process, enforces quality by maintaining standards, and lowers the probability of missing important issues in collecting user requirements. Many different presentation tools exist for businesses. These presentations can include features that enhance the presentation visually and assist a speaker in delivering a great presentation. Microsoft PowerPoint may be one of the most popular but many other designers are emerging. The choice to invest in a good presentation tool depends on the type of business and how often the business will use the presentation tool. The different presentation tools available can provide people and companies with a different edge on presenting their material. Although some of the different presentation tools may charge a fee, some monthly, some yearly, and some have a one-time fee, it may be in the best interest of a company to invest in a different type of presentation tools.

Saturday, November 23, 2019

Doing Interviews with Anonymous Sources

Doing Interviews with Anonymous Sources Whenever possible you want your sources to speak â€Å"on the record.† That means their full name and job title (when relevant) can be used in the news story. But sometimes sources have important reasons – beyond simple shyness - for not wanting to speak on the record. They will agree to be interviewed, but only if they aren’t named in your story. This is called an anonymous source, and the information they provide is typically known as â€Å"off the record.† When Are Anonymous Sources Used? Anonymous sources aren’t necessary – and in fact, are inappropriate - for the vast majority of stories reporters do. Let’s say you’re doing a simple person-on-the-street interview story about how local residents feel about high gas prices. If someone you approach doesn’t want to give their name, you should either convince them to speak on the record or simply interview someone else. There’s absolutely no compelling reason to use anonymous sources in these types of stories. Investigations But when reporters do investigative reports about malfeasance, corruption or even criminal activity, the stakes can be much higher. Sources may risk being ostracized in their community or even fired from their job if they say something controversial or accusatory. These types of stories often require the use of anonymous sources. Example Let’s say you’re investigating allegations that the local mayor has been stealing money from the town treasury. You interview one of the mayor’s top aides, who says the allegations are true. But he’s afraid that if you quote him by name, he’ll be fired. He says he’ll spill the beans about the crooked mayor, but only if you keep his name out of it. What Should You Do? Evaluate the information your source has. Does he have solid evidence the mayor is stealing, or merely a hunch? If he’s got good evidence, then you probably need him as a source.Talk to your source. Ask him how likely it is that he’d be fired if he spoke publicly. Point out that he’d be doing the town a public service by helping to expose a corrupt politician. You may still be able to convince him to go on the record.Find other sources to confirm the story, preferably sources who will speak on the record. This is especially important if your source’s evidence is flimsy. Generally, the more independent sources you have to verify a story, the more solid it is.Talk to your editor or to a more experienced reporter. They can probably shed some light on whether you should use an anonymous source in the story you’re working on. After following these steps, you may decide you still need to use an anonymous source. But remember, anonymous sources don’t have the same credibility as named sources. For this reason, many newspapers have banned the use of anonymous sources entirely. And even papers and news outlets that don’t have such a ban will seldom if ever, publish a story based entirely on anonymous sources. So even if you have to use an anonymous source, always try to find other sources who will speak on the record. The Most Famous Anonymous Source Undoubtedly the most famous anonymous source in the history of American journalism was Deep Throat. That was the nickname given to a source who leaked information to Washington Post reporters Bob Woodward and Carl Bernstein as they investigated the Watergate scandal of the Nixon White House. In dramatic, late-night meetings in a Washington, D.C., parking garage, Deep Throat provided Woodward with information on the criminal conspiracy in the government. In exchange, Woodward promised Deep Throat anonymity, and his identity remained a mystery for more than 30 years. Finally, in 2005, Vanity Fair revealed Deep Throat’s identity: Mark Felt, a top FBI official during the Nixon years. But Woodward and Bernstein have pointed out that Deep Throat mostly gave them tips on how to pursue their investigation, or simply confirmed information they had received from other sources. Ben Bradlee, The Washington Posts editor-in-chief during this period, often made a point of forcing Woodward and Bernstein to get multiple sources to confirm their Watergate stories, and, whenever possible, to get those sources to speak on the record. In other words, even the most famous anonymous source in history was no substitute for good, thorough reporting and plenty of on-the-record information.

Thursday, November 21, 2019

Simultaneous determination of eight illegal dyes in chili products by Coursework

Simultaneous determination of eight illegal dyes in chili products by liquid chromatography-tandem mass spectrometry - Coursework Example Cross- contamination or adulteration is one of the main foods contaminating process in the due use of Sudan dyes (Juan Lia et al. 2013). This experiment ought to have taken pre-cautions to inform its readers on the harmful effects of these eight illegal dyes in chili products. Spectrophotometric method could have been discussed somewhere in this paper as a way that can be used to detect the presence of Sudan dyes and other illegal dyes in chili powders or any other food stuff in ppm levels (Juan Lia et al. 2013). This method has been found reliable in identifying and estimating the level of sudan I-IV in Chili samples. Ethyl acetate is yet another useful solvent used to extract dyes from chili samples as well as the preparation of samples. The eight illegal dyes discussed in this paper cause carcinogenicity which is a high producing capacity among many other ailments. Otherwise, the paper developed the HPLC-MS/MS chronologically from the first to the last step demonstrating the extraction procedure used to determine eight illegal synthetic dyes in chili products simultaneously. The selection of MS/MS technique combined with chromatographic separation was an accurate method of determining compounds in complex matrices with less ambiguity (Juan Lia et al. 2013). The method was effective that it did not require the laborious clean up procedures. The method was highly accurate with a good repeatability. The detection of any limits like quantification limits was minimal (Juan Lia et al. 2013). The HPLC-MS/MS process employed in the paper proved to be effective for fraud detections in both exported and imported chili products. The analysis of data was done effectively through the use of graphs and tables to illustrate the results. The chemical structures of the eight illegal dyes analysed were also illustrated in both