Search engine crawlers, commonly identified as robots, spiders, or bots, are programs or scripts that methodically and spontaneously browse webpages. Crawling relates to the discovery procedure whereby search engines dispatch a group of robots spiders or crawlers to locate updated and new content (Amudha & Phil, 2017). Bots, for instance, Googlebot, typically begins by exploring several webpages to download compatible robots.txt files containing regulations on the specific pages to crawl within the Web.
The file typically consists of particulars regarding sitemaps, a component that bears a URL listing that needs to be explored by the search engine. They later follow the webpages links to discover new URLs. By trailing along these link paths, the crawler can uncover new content and add it to its index, typically referred to as Caffeine a colossal database of identified URLs to be retrieved later is searching data that matches the URL content. Furthermore, they utilize various directives and algorithms to regulate the rate at which a page can be re-crawled and the site pages that require indexing.
The Impact of Utilizing of Mobile Technologies on Search Engine Optimization Practices
Search engines relate to technological applications utilized in detecting webpages or pertinent content on PC networks utilizing bots. Spiders are compact computer programs specifically devised to automatically and repetitively execute tasks on the internet. Search engine optimization (SEO) can be described as the process whereby one improves his/her website to increase its visibility for applicable searches (Davies, 2017). SEO is one of the main ways people discover content online, and therefore, higher ranking in search engines can translate to increased website traffic. Mobile technologies, precisely mobile applications, have changed the market dynamics significantly. They have been instrumental in redesigning the search engine scenery. For instance, ones website should be mobile optimized to be accorded a high rank by Google, which acknowledges the high traffic volumes from users daily. It wont allow owners to operate a website that functions on desktops, especially when high-ranking is critical to them.
Local listings are standard among phone users; they typically have their addresses registered in the Google GPS. Everything they search or type is filtered automatically to ascertain whether any information associated with their search is within their locality. This element is significant when one needs to optimize their SEO for specific regions. If Google identifies ones business as crucial, the data will show up first, irrespective of the areas size. Consequently, this can generate trigger increased traffic on ones local SEO. Furthermore, people typically alter or modify search results due to the dissimilarities in how they search for things on mobile phones versus desktop. On mobile, people search for answers directly, and on desktop, they will search comprehensively for details. The mobile users will strive to create ways to minimize their search queries to use minimal time typing feeds manually.
How Mashups Create New Benefits and Functionality from Existing Data
A mashup is an application on the web generated by transforming, combining, and integrating capacities or data from existing sources of information to convey dashboard-like aggregations or meaningful functionality. In other words, it is a web application that incorporates information from two or more sources (Turban et al., 2018). This approach facilitates the merging of unstructured data located on the Web with structured information generated by secure or safe custom connectors from legacy databases and applications. According to Turban et al. (2018), mashups facilitate rapid prototyping, assembly, and application, with continually increasing access control, policy security, and scalability, thereby minimizing development time and associated costs. This technique enhances non-technical users capacity to independently gather and remix information mashups from external and internal sources independently; this consequently fosters the focus of IT on strategic business applications. Furthermore, according to Davis (2017), personal, departmental, and company data can be translated into new, pertinent mashup services and feeds for recently developed markets and consumers, thereby enhancing a better return on investment (ROI).
References
Turban, E., Pollard, C., & Wood, G. (2018). Information technology for management: On-demand strategies for performance, growth and sustainability (11th ed.). John Wiley & Sons.
Davies, E. R. (2017). Computer vision: Principles, algorithms, applications, learning. Academic Press.
Amudha, S., & Phil, M. (2017). Web crawler for mining web data. International Research Journal of Engineering and Technology, 4(2), 128136.
Efficient communication has been identified as a potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Meanwhile, organisation depends on the real time communication to enhance organisational decision-making.
Thus, this proposal discusses modelling of a network deployment and implementation of Voice over IP technology (VoIP) as means of voice communication. The proposal provides the work plan, which describes the schedule of the research. The outcome of this paper will provide the greater understanding to the IT specialists, business organisations, and overall academic communities.
Introduction
Efficient communication has been identified as the potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Despite the effectiveness of the real time communication for the organisation agility, many communication systems have been identified with troubleshooting which include common problems of jitter and low end users satisfactions. These problems have led many organisations to turn to Voice over IP technology (VoIP) as the means of voice communication. Despite the advantages of IP VoIP, many organisations have not yet understood the significant benefits of the deployment and implementation of IP VoIP. The little understanding in the deployment and implementation of IP VoIP generates the research problem, which this proposal intends to address.
Statement of problem
Many organisations have realised that voice is a necessity in order to reach customers agreement. Typically, IP VoIP has played a greater role in the network solution and the development of VoIP established technology has become migration to the business needs. (Shacklett, 2005).
However, some technicality involves the deployment and implementation of IP VoIP for the business needs. Fore example, there are situation where there can be impairment of connection that can lead the users to abandon the call during communication if there is error in the configuration of IP VoIP. In addition, the implementation and deployment of IP VoIP can have major effect in the Quality of Service (QoS) of the existing network. (Phoenix Datacom, 2007).
Thus, the necessity to enhance the highest performance during deployment and implementation generates the research problems. (Network Instruments, 2007).
To address the research problem, the proposal develops research aims and objectives.
Aim and Objectives
To address the research problems, the proposal will provide the following research aim and objectives:
To investigate the modelling of a network through the deployment and implementation of IP (VOIP).
To explore the extent the IP (VOIP) has been able to make use of less bandwidth for local and international calls.
To investigate the extent of the deployment and implementation of IP (VOIP) has added to the Quality of Service (QoS).
To investigate the extent the IP (VoIP) has been able to provide more efficient network resources for the user.
Thus, the paper will attempt to investigate the areas related to the research proposal. Meanwhile, scope of the paper will be as follows:
Scope of the paper
The scope of the research will limit its investigation on the Modelling of a Network (deployment and implementation of IP (VOIP). The paper will employ methodology to examine the quality and efficiency of the IP (VOIP) during its deployment and its implementation. Thus, the paper will test the quality of IP VoIP through the pre-deployment test in order to avoid surprise that may be generated through network failure. In addition, the scope of the paper will investigate the quality of voice generated by IP VoIP.
Key Deliverables
The key deliverables are as follows:
The effectiveness of IP VoIP after deployment and implementation.
The extent the IP VoIP has been able to deliver the good voice quality during the voice communication.
The extent the IP VoIP has been able to provide cost reduction during long distance call and reduction of network cost to the user.
The extent of the effectiveness of IP VoIP to deliver less bandwidth for local and international calls.
However, the research might encounter some risks during the course of investigation. Some of the risks might be as follows:
Risks
Implementation and deployment problems may arise that may arise to troubleshooting if the researcher does not carry out the pre-deployment testing.
During the deployment and implementation, there may be problem that can affect the output of IP VoIP data and overall network performances.
However, the work plan is essential to reveal the schedule of the project till its completion.
Work plan
Work plan defines the tasks to be carried out during the project. (See Gantt chart in fig 1). Thus, the work plan provides the tasks and the milestone to be carried out in the research in the following manner:
Task 1: The proposal provides the background of the project. This will elaborate the main objectives of the deployment and application of Voice over IP technology (VoIP). The tasks will also involve formulating the problems to address in the project. Thus, with aim and objectives that the proposal intends to achieve the research will solve the research problem.
Task 2: The research will review extensive literatures to explore the contributions of other scholars.
Task 3: The researcher will design methodology to be carried out in achieving the research aims and objectives. Typically, the proposal will design several techniques to carry out its investigation in order to achieve the desired results for the proposal.
Task 4: This task provides the data analysis on all the data collected for the investigation of modelling of a Network (deployment and implementation of IP (VOIP).
Task 5: This phase provides the outcome of the research investigation. The results provided will achieve aims and objectives for the proposal.
Task 6: This phase provides the summary of the findings and provides the provision for the future research.
Task 7: This is where the paper provides the recommendations for the enhancement of the proposals shortcoming. (See fig 1 for the summary of the work plan).
Previous literatures on the deployment and implementation of IP technology (VoIP)
Louis (2004) argued that the implementation and deployment of IP (VoIP) have enhanced the quality of voice conversation, which provides advantages for the business benefit. The benefits that the businesses derived from this could be referred to killer app (p 1) where business derives reduced cost in distance call as well as reduction network cost. Meanwhile, some of the technical benefits that business derived from the IP VoIP have been linked to the less bandwidth for the distance call and the enhancement of distributed network intelligence. Thus, the author argued that despite the growth of email as means of communication, many businesses still prefer voice as the best method to conduct business transactions. Despite the contribution of the paper, the author failed to discuss the technical difficulties in the deployment and implementation of IP VoIP.
For example, the white paper provided by the Network Instruments (2007) argued that VoIP can develop troubleshooting, and technical packet loss, and the VoIP can develop a challenge compared to other network applications such as email. Thus, to ensure that VoIP provides constant quality metrics, there is need to keep constant monitoring on the application and deployment of IP VoIP. Phoenix Datacom (2007) also support the argument of Network Instruments by pointing out that the IP VoIP technology can develop trouble shooting during the application and deployment. Typically, the application of IP VoIP requires essential protocol and monitoring in order to avoid trouble shooting during deployment.
However, the two authors failed to realise that many businesses are diverting to the use of IP VoIP as means of voice communication despite the argument of the authors on the IP VoIP.
Fluke network (2006) also argued many enterprises have faced challenges in the deployment of IP VoIP. Typically, the application and deployment of IP VoIP have reached a high profile with critical application. Thus, there is need for the enterprises to ensure the pre and post deployment of IP VoIP.
The shortcoming of the paper is that the author only discussed the technical aspect on the deployment and application of IP VoIP, the paper did not discuss the benefits that the IP VoIP has provided to the business needs.
For instance, Shacklett (2005) belief that IP VoIP technology has continued to enhance greater role in the network solution. Despite its contribution in the communication efficiency, few companies are still opting for the IP VoIP technology as means of channelling the communication. Thus, the author argued that the deployment of VoIP is still expensive to displace tradition phone calls.
However, the shortcoming of this paper is that the author failed to provide data through survey or other experimental method to validate his argument.
On the other hand, the Net Scout (2007) discussed that the use of IP VoIP has become reality for business solution. However, there are embedded problems with the deployment of the IP VoIP technology. The author pointed out that deployment of the IP VoIP still carry out some risks, there are still complexity in the VoIP application performances.
The weakness of the authors argument is that the growing increase in the use of IP VoIP by many business users shows that there is loophole in the argument provided by the author.
For instance, Audio Codes (2002) argued that the use of IP VoIP has come to stay with way many businesses are turning to the IP VoIP for business telecommunication needs. For example, the worldwide markets between 1999 and 2005 for the IP VoIP technology have increased from $217 Million to over $4.6 Billion. In addition, between 2001 and 2005, the IP VoIP technology equipments have increased annually by 52.5%.
The only shortcoming of this literature is that the author failed to point out the benefits that the IP VoIP users are deriving from the IP Void technology.
On the other hand, the Broad Com (2005) believed that the deployment and application of IP VoIP require systematic steps for the implementation and deployment. The major reason is that the VoIP technology has made use of IP network for digitalizing voice transmission. Despite the contribution of the paper, the author failed to point out that there are some voice telephone equipments that do not make use of internet for voice connections. For example, some cellular phones have integrated IP VoIP for voice communication.
However, Canavagh (2009) described how large enterprises have started the implementation of IP VoIP around the world. The author describes how the communication is very essential for business need. Thus, the author argued that in the past two decades, the use of IP VoIP has grown tremendously. There have been integrated of IP VoIP in some cellular phone for voice communication at much lower rates.
The shortcoming about his paper is that the author only describes how the big companies are only implementing the IP VoIP for business use. However, many small businesses are also implementing IP VoIP for business purpose.
With collaboration with the previous authors, Chen (2006) presents how the IP (VoIP) in Taiwan has been able enhanced the telecommunication system in public telephone system in Taiwan. Typically, the use of IP version 6 (IPv6) has been in wide use in public telephone systems in Taiwan and this has enhance voice communication system.
However, the author did not provide the contribution of private telephone companies in the deployment and implementation of IP VoiP for business use.
The research examines the methodology to provide the technique by which the research will be carried out.
Research methodology
The research methodology provides the methods the proposal will carry out the investigation of the modelling of a Network (deployment and implementation of IP (VOIP). The research will use data collection procedure to examine the effectiveness of deployment and implementation of IP VoIP.
Research design
The research will employ survey for the data collection. In addition, the proposal will employ qualitative and quantitative for the data collection. Apart from survey, the paper will employ case study to enhance greater understanding on the deployment and implementation of IP VoIP. There will also be data analysis to ensure the reliability of data collected.
Method
The research method will employ several techniques to investigate the deployment and investigation of IP VoIP. The proposal will employ primary and secondary research methods in carry out the investigations. The primary research methods will involve carrying out the investigations through survey. The researcher will select 100 companies that have had experience with the VoIP for long distance call. The paper will use the structure questionnaires to design the questions that will be used to carry out the survey. Typically, the research will target top executives of the organisations selected for the survey. The survey questions will be distributed to the approximately 300 top executive of the target population where the researcher expects to receive 50 filled questionnaires, which are free of mistakes.
The objective of the questionnaires is to investigate the experiences of this top management on the implementation and deployment of VoIP. Some of the questions that will be asked to examine whether these top executives are deriving higher satisfactions with the use of IP VoIP. Moreover, the survey intends to investigate whether the respondents are being able to achieve lower cost with the use of IP VoIP for long distance call.
Moreover, to carry out the investigation of deployment and investigation of IP VoIP, the paper will employ the secondary research method. This involves reviewing the previous literatures on the deployment and investigation of IP VoIP. Typically, the researcher will employ certain strategies in ensuring that the reliable literatures relevant to the research are reviewed. The researcher will search the academic journals such as Science Direct, Sage Online. In addition, the proposal will also search journals from the database of Emerald. The paper will also search the database of International Business Machine (IBM) and the white papers from other IT organisations such as Cisco, Linux, and Nexus etc.
Conclusion
The proposal provides the modelling network (deployment and implementation of IP VoIP). The proposal provides the methods the proposal will carried out, and the key deliverables from the outcome of the research. Typically, the work plan is essential to ensure the schedule of the research. The paper elaborate the phases of the research proposal. The outcome of this paper will provide the greater understanding to the IT specialists, business organisations, and the overall academic communities.
List of References
Audio Codes (2002). Application Migration to Voice over IP Technologies White Paper, [White Paper] Audio Codes Ltd, USA.
Broad Com, (2005). Critical Steps for Successful VoIP Deployment VoIP-WP101-R [WWW], BroadCom Corporation, Web.
Canavagh, J. (2009). The Definitive Guide to Successful Deployment of VoIP and IP Telephony [E-book], Real time Publisher, Web.
Chen, W. (2006). The deployment of IPv6 SIP-based VoIP applications, [WWW],
International Journal of Internet Protocol Technology, 1(4), 205-213, Web.
Fluke network (2006). VoIP Management Options: IP PBX Enterprise Management Software and Visual UpTime Select, [WWW] Fluke Corporation, Web.
Louis, P.J. (2004). Voice over Internet Protocol (VoIP): The Killer Application?, [WWW],. Web.
Net Scout (2007). Best Practices for Voice Over IP (VoIP) Network Performance Management, [WWW], Net Scout Inc, Web.
Network Instruments, (2007). Your Guide to Troubleshooting VoIP, [WWW] NETWORK NSTRUMENTS WHITE PAPER, Web.
Nanoparticles, also identified as ultrafine particles, refer to matter particles with a diameter of between 1 and 100 nm (nanometers). They have specific characteristics such as their inner structure, shape, surface characteristics, and size, which render them different from other materials, including spatial confinement, high surface energy, and various surface atoms. The above-mentioned innovation has been linked to significant technological advancements in specialties such as medicine and engineering. This paper highlights the application of nanoparticles in the development of nanostructured solar cells and their specific properties.
Application and Its Significance
The application of interest in this write-up is the nanostructured solar cell, an advancement from the traditional silicon-based solar cells. This innovation has an enormous significance and relevance to the modern world due to its efficiency in performance and low costs. According to Kumar et al. (2020), nanostructured solar cells have the advantage of energy conservation, unlike the conventional silicon-based solar cells, which have been associated with high energy losses. Nanotechnology-oriented solar cells boost the electricity generation rate from solar energy (Kumar et al., 2020). Scientists are currently investing financial resources and time developing and advancing nanostructured solar-cells due to their low-cost profile in the production process and improved operability.
The use of silicon material in the manufacturing of traditional solar cells rendered them expensive, especially with regard to installation and maintenance. Contrarily, nano-based solar cells utilize inexpensive nano-materials characterized by a higher output than the typical ones. Concerning its impact on the environment, nanostructured solar cells have been associated with minimal pollution rates due to their energy conservation aspect compared to the existing or conventional cells used in solar enhancement. As indicated earlier, the above-mentioned technology can deliver on these fonts as they are less expensive and highly efficient.
The Functioning of the Application
The nanostructured solar cells operate on the principle of nano-technology and nano-particles, whereby thin-layered nano-materials are applied to the solar cells surfaces. Energy efficiency linked to nano-based solar cells emerges from three crucial functional strategies. In the first approach, multiple reflections generated from the thin films surfaces create an effective or reliable optical path used in the absorption procedure, thereby enhancing its thickness in comparison to the existing film (Kumar et al., 2020). In the second phase, electrons emerging from the actions of light coupled with energy holes ordinarily cover a shorter distance due to the nano-particles activities (Kumar et al., 2020). This consequently minimizes the energy losses that may arise from the recombination processes.
During the ultimate phase, nano-particles capacity, which varies in size depending on their manipulation level, facilitates the adjustment of the width of energy-gap layers during its operation. One primary advantage of this entire process is that it enhances nano-particles absorbent potential. The nanostructured solar cells absorb the energy bands from sunlight at minimal losses due to the variability of nano-particles size (Kumar et al., 2020). During this process, high-frequency and low-frequency light electrons are converted to electricity without recording energy losses through heat energy (Kumar et al., 2020). In conventional solar cells, the light energy from ultra-violet radiation is lost since the cells do not adjust to the appropriate absorbent levels.
Specific Properties of the Nano-Particle
One primary property associated with nano-particles is that they have a significantly small or reduced width. Furthermore, their atoms usually occupy the surfaces and depart from the interiors, and this, according to Kumar et al. (2020), presents enormous advantages to the functioning of nano-based solar cells. According to Kumar et al. (2020), the dominant nano-particle disposition is controlled by the activities on the surface section. Nano-particles have nano-crystal diameters that help enhance the positioning of the energy-electron positions (levels) by reducing the distance or thickness (Kumar et al., 2020). This triggers a continuous energy band, which consequently boosts the conversion rate of solar energy to electricity at minimal losses through the nano-particles activities within the solar cells. These aspects present nano-structured solar cells as a novel application. It is an advancement from the expensive and lowly efficient traditional silicon-based solar cells.
Conclusion
Nanoparticles have specific properties such as their inner structure, shape, surface characteristics, and size, which render them different from other materials. Nanostructured solar cells have an enormous significance and relevance to the modern world due to their performance efficiency and low costs. This nano-based innovation has an advantage over silicon-based solar cells due to its ability to conserve energy. They operate on the principle of nanotechnology and nanoparticles, whereby thin-layered nano-materials are applied to the solar cells surfaces.
Recruitment, adaptive environment, and assessment.
Digital Media in Problem-Solving
Convenient and in-demand digital platforms
A variety of procedures to perform (Figure 1).
Free access to different user communities.
Low costs and numerous valuable data.
Solving problems through efficient strategies.
Advanced Data Collection
Data from different platforms (Figure 2).
Information from the target audience (Confos & Davis, 2016).
Determining major preferences and interests.
Marketing algorithms are adjusted to users.
Engaging the Target Audience
Solving the issue of the lack of customers.
A close interaction mode (Du Plessis, 2017)
Building a feedback system among clients.
Avoiding low demand and profits.
Involving new client segments successfully.
Gaining Competitive Advantage
Growing profits due to client recognition (Omidi, Dal Zotto, Norouzi, & Valero-Pastor, 2020).
Expanding the share of customers (Figure 3).
Overcoming a competitive barrier successfully.
Developing a unique marketing strategy.
Creating Solution-Based
Content
Complex algorithms of engagement (Figure 4).
A cluster approach to using media (Barry & Gironda, 2018).
Analyzing competitors activities and products.
Developing unique and in-demand services.
Hiring Professional Staff
An advanced system of recruitment.
Facilitating the hiring process (Baglione, Tucci, & Woock, 2020).
A wide range of applicants (Figure 5).
Using modern recruitment tools and surveys.
Adaptive Marketing Environment
Promoting wide choices and close interaction.
An adaptive environment helps maintain sustainable sales (Dwivedi et al., 2020).
Finding ways to reorganize the work process.
Introducing relevant strategies to develop.
Maintaining changes through digital control.
Simplified Estimation
Algorithms
Numerous evaluation ratings (Figure 6).
Predicting real market changes (Madhani & Rajguru, 2020).
Involving accurate and detailed analytical tools.
Introducing changes based on assessments.
Conclusion
Applying digital media is beneficial.
Using strategies helps in problem-solving.
Achieving market recognition and growth.
Engaging customers and effective hiring.
Collecting data and utilizing estimation tools.
References
Baglione, S., Tucci, L., & Woock, P. (2020). Invasive job hiring practices and social media data usage knowledge on job intentions. The Journal of Social Media in Society, 9(1), 235-252.
Barnhart, B. (2019). Data collection [Image]. Web.
Barry, J. M., & Gironda, J. T. (2018). Developing social selling influence: An archetypal examination of content strategies and influence tactics. Journal of Selling, 18(1), 47-69.
Confos, N., & Davis, T. (2016). Young consumer-brand relationship building potential using digital marketing. European Journal of Marketing, 50(11), 1993-2017.
Crawford, C. (2020). Social media analytics [Image]. Web.
Dienst, P. (2017). Digital media recruitment [Image]. Web.
Du Plessis, C. (2017). The role of content marketing in social media content communities. South African Journal of Information Management, 19(1), 1-7.
Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., Carlson, J., Filieri, R., Jacobson, J.,& Kumar, V. (2020). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 102168.
Hollingsworth, S. (2019). Benefits of social media [Image]. Web.
Madhani, J. V., & Rajyaguru, K. H. (2020). Impact analysis of digital marketing: An Indian perspective. Jurnal Manajemen dan Kewirausahaan (Journal of Management and Entrepreneurship), 22(2), 161-164.
Minardi, M. (2018). Solution-based content [Image]. Web.
Omidi, A., Dal Zotto, C., Norouzi, E., & Valero-Pastor, J. M. (2020). Media innovation strategies for sustaining competitive advantage: Evidence from music download stores in Iran. Sustainability, 12(6), 2381.
Marc Prensky claims that electronic books are more useful and efficient than paper ones. The process of education would become more interesting and modern with the use of new technologies. He puts forward the idea that colleges and universities should ban nonelectronic books (Prensky 1). Improving the learning process requires following the rules of the progress.
Main body
First of all, electronic books provide more space for multimedia work. It would be possible to continue discussions far from the class, to have access to all books at any time and anywhere. Second, the notes from the professor would be available for all the students in one click. And for them, it would be much easier to stay connected and to do the tasks together. Marc Prensky maintains that the use of electronic books is necessary to move the educational system to the future. From his point of view, the change would be transformational, in very positive ways, for education (Prensky 2). It would provide an opportunity to see all the latest versions of the books, comments, notes and ideas in one gadget.
Conclusion
The position of Marc Prensky seems to be ambiguous: the perfect solution is somewhere in the middle between following the traditions and introducing new technologies. Electronic books provide access to many sources, but they also can break, run out of the battery or not have an Internet connection. What is more, e-books are much more expensive than paper ones; and not everyone can afford them. At the present moment, it is better to use the classical variants of getting information; however, electronic devices should not be forbidden, they may be used as an additional way to study.
References
Prensky, Marc. Colleges Should Mandate That All Textbooks Be Digitized. What Is the Impact of Digitizing Books? edited by Louise I. Gerdes. Greenhaven Press, 2013.
Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the service companies are one of the last parts of the infrastructure to be put into place (Belobaba et al 2009). As a consequence, many countries have a significant gap between the information wants and needs of their populations and the information that could potentially be available to them without the latest IT. The purpose of this paper will be to evaluate how information technology and telecommunications can aid alliances between organizations and external companies and help significantly increase the service quality of any given countrys population through analyzing one technology installation as it relates to increased service provision.
Industries Background
Airline Industry
Today, airline industry is one of the most profitable service industries in the world in spite of terrorist attacks and fear of new ones. Airline industry depends upon customer satisfaction and service quality, so alliances with other external companies including hotels and recreation facilities influence its image and customer loyalty. While some members of the flying industry give indiscriminate attention to their customer service, Virgin Atlantic Airways is taking the road less traveled. Widely known for its exceptional customer service, Virgin Atlantic never fails to surprise its clients: there is always something new, and what is new is given in the best service possible. Focus on people, technology, and methodology gave Virgin Atlantic the edge in customer relations management. This lead to many achievements, and for them to be among the pillars of service in their respective ground. Diversity of opinion is a team strength, but it can degenerate into splintering unless the team members put the task first. Employees value the importance of the service they provide and a unique image of airline service (Belobaba et al 2008).
Hotel Industry
The key feature of hotel industry today is the exceptional service quality based on the Personal Valets System and core of loyal supporters. Management of such hotel chains as Ritz-Carlton helps to develop a vision for the future, creating an environment for change and convincing others to join in making the vision a reality. The unique feature of the service system is that it is based on personal interests of employees and unique perception of guest satisfaction. This system shows that culture and personal values of employees are the core of the hotel prosperity. Alliances with other external service companies are crucial of hotel chains as they help its managers to meet needs and wants of thousands of guests daily. For hotel chains, complex decision making is a key aspect of team management. Complex decision deliberations may be made jointly, but decisions should be made singly. Although there may be disagreement and conflict during deliberations, once there is consensus on a course of action, team members must support the decision as if it are their own (Powers and Barrows 2002).
Rational For Alliances with External Companies
Developing countries hotel chains and airlines are always behind developed countries in receiving and using newly available IT technologies. Even in developed countries, the vast majority of hotel chains and airlines have been constructed with very minimal budgets and low priority is given to their technological infrastructures and technological potentials that would benefit the potential customers (Stutts 2001). Since hotel chains and airlines are usually the last part of the infrastructure that countries put into place, there is minimal resources and finances provided in most cases to include the appropriate technologies that most hotel chains and airlines regularly use and implement today. Most hotel chains and airlines have major problems with staffing and training of their employees because of their budget shortfalls and absence of effective leadership in this important area (Powers and Barrows 2002). The human resources available for most countries are usually undereducated, unqualified individuals who accept the very low pay for the positions offered. Most companies facilities are also inadequate and in bad shape to give incentives to any qualified candidate for library positions to look elsewhere in the job market. Alliances with external organizations and companies help both hotel chains and airlines to join their internal resources and create a complex interaction systems and networks around the globe (Stair and Reynolds 2008).
Customer Relationships Management and IT Facilities
Customer relationship management (CRM) is an important aspect of any business. Without it there will be no chance for a business to thrive and survive the highly-saturated markets, for what sets a business apart is how it offers its service to consumers and what they do to surpass their expectations. A focal point of having customers choose to do business with an organization, CRM involves the whole package of giving the information the client requires, assisting the choosing stage, assisting the sale, and providing after-sales and technical support. Thus, oftentimes, more attention is given on the customer servicethe product or service purchased becomes a mere part of the purchasing process. Customer relations management has been one of the important tools of the flying trade. Primarily, it is the need to gain competitive advantage. There are many airlines now compared to the past, and each airline hopes to get a portion of the traveling packs (Stair and Reynolds 2008). As it has long been known, flying from one point of the world to another is not everybodys comfort zone. There is always a big chance in air commuting for some things to go wronglost luggage, missed flights, excess baggage, flight delays, being bumped off, and so on. While these are often evitable, it still helps to know that the airlines carrying you to wherever you are headed is behind you to assist when things do not go as planned. This is the art of customer service in the airlines industry, the thing that sets the difference of one airway from another (OBrien and Marakas 2006).
IT Capabilities and Collaborative Alliances
A theory of collaborative alliances suggests that this type of business relations is crucial for modern organizations as it helps them to improve internal resources and deliver better services to larger target populations. One of the prospective solutions for hotel chains and airlines is improving the role of information technology and alliances with external companies. This prospective solution can only be implemented through some kind of comprehensive strategy on behalf of the countries government and economic development plan to include this IT improvement as an official policy goal and objective (Kalakota and Robinson 2001). By improving the role of IT, a host of problem issues currently plaguing these important institutions could be addressed and resolved. By focusing on equipping hotel chains and airlines with computers, necessary software, and provide Internet access to patrons, many of these hotel chains and airlines would become vastly improved from their current decrepit states (Oz, 2006). IT improvements of this sort would result in these hotel chains and airlines having information connectivity outside their geographic isolated conditions and having opportunities to share the information flow on the Internet with the rest of the world (Stair and Reynolds 2008). For example, many hotel chains and airlines would substantially improve their information resources and organizational structures if they were able to improve the role of IT. Also, a new role for IT in different countries would result in obvious incentives for staff to learn and master these technologies and their uses to enable them to show and demonstrate their uses to managers. The staff would need to be qualified and trained to handle the improved role of IT in the operations and this availability of training and education in this area would need to an integral part of the process of upgrading internal resources of organizations and improving their information technologies (Kroenke, 2007).
The education and training of staff to adapt and handle any improved IT role could also be considered an excellent way to improve the job positions and enrich these job positions for the workers to view them with greater satisfaction and have incentives to be motivated to pursue these jobs as fundamentally important for the improvement of the information availability for their larger community and nation (Oz, 2006). These education and training programs to help developing countries improve the role of IT would provide a spring board for the students and young people to become the first generation of qualified, competent workers who take pride in their jobs and careers. Through making these IT improvements, in other words, the library workers would be elevated in status and value to the larger society (Stair and Reynolds 2008).
Competitive Advantage
Following Michael Porter, firms are not the source of competition. Instead, firms derive their competitive advantage from their national environment shaped by four determinants of national advantage: factor conditions; home demand conditions; related and supporting industries; and firm strategy, structure, and rivalry. The four elements form a mutually reinforcing system, the Porter diamond (Porter 1985, p. 54). The improved role of IT in hotel chains and airlines would have a profound impact on increasing the service quality and clients satisfaction rates of these countries populations because of the obvious attractiveness and importance that companies would assume as valuable sources of new and current information for the public. The host of problem issues plaguing hotel chains and airlines could be readily and comprehensively addressed through this improved IT role because of the new value and perspective of these institutions as important sources of learning and information for the public at large (Laudon and Traver 2008). The improved role of IT and alliances between hotel chains and airlines would also change the fundamental nature of service industry being decrepit, useless places that have very little important information for people to use and derive benefits. Over a period of time, service sphere would definitely increase substantially because of this improved role of IT and the increase in use of them by both customers and the general population (Oz, 2006).
For instance, if Virgin Atlantic outsources its customer service, which is a growing trend among many big companies nowadays. If they do, it shall be essential to know which aspects of operations are outsource and, consequently, to attempt how this has helped Virgin Atlantic develop and maintain good customer relations management contributing further to a better company.. Lastly, and most importantly, Virgin Atlantic customers will be asked about their flying experience with Virgin Atlantic, giving focus on satisfaction or the opposite, creating a clear picture of the minds of the most important judges for the operations of Virgin Atlantic: the customers. These are just some among the many issues aroused by the limited studies on the subject. This paper shall try to explore the possibilities on these issues and, ultimately, try to provide answers. Customer relations management is all about making customers happy and still keeping pace with the policies of the company. The balance may oftentimes be elusive, but successful customer relations management does the trick. When a customer chooses a specific company or store to transact business with, it follows that the customer is expecting more than what she is paying for. It will be safe to say that customers set into themselves standards on how they may be servedor should be servedand the company gets free hand on satisfying that expectation. This means that customers are also looking at how the service is or will be given to her, and what difference it makes for her purchasing experience. Failing this expectation often leads the customer to look for services elsewhere (Stair and Reynolds 2008).
Porters studies have proven that the customer experience is almost always the deciding factor when clients need to make up their minds on a purchase or if they will have to move on and check with what the competition offers. In effect, bad customer experience leads to loss of customers, which is directly equal to loss of income, customer satisfaction, and loyalty. The worst part about bad customer relations management in organizations is the stigma that may result to word-of-mouth. With the advent of technology, it has never been easier to tell people how a company maltreated a customer. This reminds companies to be extra careful and to be diligent and vigilant in implementing customer relations standards (Stutts 2001).
Customer relations management may also be said to be a business strategy wherein the goal is to get and keep the customers where, in the process, long-term customers are identified. This is an essential part of the system as it allows the company to cultivate relationships with these long-term prospects, while also nurturing relationships with occasional and regular clients by exceeding their expectations. When the hotel chains or airlines know who to value and pay attention to customers, and knows who deserves less of the time and effort they invest, companies will find it easier and more fruitful to serve their customers. It will also avoid the customer representatives from being neglected and declined. A company may adapt a ranking process for classifying their customers. In the ranking, the loyal customers and the prospective loyalists, including the new clients, come on top, followed by the regular customers, and the occasional customers. New clients go on top of the ladder because treating them positively creates good first impressions, which can most likely lead to customer loyalty (Stair and Reynolds 2008).
Conclusion
Alliances with external companies are the main factor of competitive advantage for both hotel and airline industry. Service, backed up by IT capabilities, is actually dependent on the need of the client. If he needs help with purchasing a good, he may have to coordinate with the sales people who can help him with anything about purchasing. Assistance on technicalities must be directed to the technical department, and so on and so forth. The bottom line is to always give contentment and satisfaction. Relationship refers to the connection that invisibly forms between the client and the company and its representatives. It may be a good connection or a bad one. If it is the good connection, a company can rest assured that the customer will be an asset to them in the long run and in the course of many other future transactions.
Bibliography
Belobaba, P., Odoni, A., Barnhart, C. 2009, The Global Airline Industry (Aerospace Series (PEP)). Wiley.
Jessup L. and Valacich J. 2008, Information Systems Today: Managing in the Digital World 3rd Ed, Pearson Prentice Hall.
Laudon, K.C and Traver C.G. 2008, E-Commerce: Business, Technology, Society 4th Ed., Pearson Education International.
Kalakota, R. and Robinson M. 2001, E-Business 2.0: Roadmap for Success 2nd Ed., Addison Wesley.
Kroenke, D.M. 2007, Using MIS, Pearson Prentice Hall.
Oz, E. 2006, Management of Information Systems 5th Ed., Thomson Course Technology.
OBrien J. A. and Marakas G.M. 2006, Management Information Systems 7th Ed., McGraw Hill.
Porter M.E. 1985. Competitive Advantage. New York, Free Press.
Powers T., Barrows C.W. 2002, Introduction to the Hospitality Industry. Wiley, 5 edition.
Stutts A. 2001, Hotel and Lodging Management : An Introduction Wiley.
Stair, R. and Reynolds, G. 2008, Fundamentals of Information Systems 4th Ed., Thomson Course Technology.
VHF systems are the most reliable alternative for avionic communication systems. This is generally explained by the high reliability and selectivity of VHF radio transmission. The principles and rules of VHF transmission are helpful for creating safe navigation, operation, control and other systems.
VHF Communication
The purposes of VHF communication in aviation are various. This band is used in commercial and general aviation, and the main aim is the radio-navigational aid, traffic control and similar purposes. The frequency range of VHF is 30 to 300 MHz, however, the airband is 108 137 MHz. Military aircrafts operate on 225 400 MHz frequencies. (Andersen, Rappaport, et.al., 1995) The wave propagation may be impeded by various physical obstacles and objects that create reflections, as the signal may come to the receiving point by multiple ways and with numerous interferences. The main factor of the successful radio transmission is the observation of sight-line transmission rule. Consequently, antennas of the land service network can not be surrounded by buildings, mountains, or located in low places. (Dexter-Smith, 1998)
VHF station spacing in Australia is defined as 25 kHz. The Spacing that is accepted in European air traffic control network is 8.33 kHz. This is explained by the fact that highly loaded air traffic control system of Europe requires more channels for communication in comparison with Australian one. (Freeman, 2002) The limitations, that may be place on the operator if the communication system does not comply with the required spacing is obvious the operator will not be able to operate within the air space of the European continent until the communication system of the required standards will be used on the planes. (CCIR Report, 2001)
The VHF communication systems on numerous aircraft types are powered by either 28Vdc Battery Bus or the 28Vdc Essential Bus and never by the main power bus because of several reasons. Navigation and communication are the key factors required for flight, hence, communication systems should be independent from the main power source for the pilot and avionic systems could communicate with the air traffic control systems before the engine startup and in the case when main electric supply system is down. (Herrick, 2006)
One of the reasons why antenna is put on the top of the fuselage is that it is an effective lightning rod. If a lightning strikes a plane, it hits the antenna but not a random point on the fuselage. From the perspective of radio transmission, no 1 antenna (on the top) is used when the plane is on the ground, and no 2 antenna (on the bottom) is used when the plane is in the air. (Erwin, 2007)
3 VHF COM is used for using the Inmarsat SatCom interface, Iridium Interface datalink communication, as well as additional Amplitude Modulated short range voice communication of air-to-air and air-to-ground systems. Some aircrafts use this system for communicating the flight and technical data to maintenance and engineering teams, and do not require pilot interference, as they work independently on the aero-navigation communication.
VHF Problem Case Analysis
In spite of the fact MEL points out that either VHF system may be inoperative, this does not mean that the problem does not need to be fixed. The maintenance system is capable to remove any problem if it is observed independently on the MEL requirements. Surely, it is not a reason to delay a flight, however, the maintenance team will inevitably perform the required actions for fixing the appeared problem.
In accordance with the requirements of CAR 35/36 certification, the offered way of problem fixing may be authorized, as this certificate offers the required modification of the construction areas of avionics, propulsion, performance, structures, propellers and rotors, systems and equipment. Additionally, the certified specialists are free to make all the required replacements if the plane is operating on the territory of Australia. These changes may be performed if this is the only solution of the problem, however, the changes of cable location will not influence the performance of other systems within the plane, consequently, this action may be performed freely in accordance with the CAR 35 and CAR 36 certification.
Reference List
Andersen, J.B., Rappaport, T.S. and Yoshida, S. 1995. Propagation Measurements and Models for Wireless Communications Channels, IEEE Communications Magazine, pp. 42-49.
CCIR Report 567-4. 2001 Propagation data and prediction methods for the terrestrial land mobile service using the frequency range 30 MHz to 3 GHz. International Telecommunication Union, Geneva.
Dexter-Smith, J. 1998. High Frequency Communication. African Business 37.
Erwin, S. I. 2007. High Frequency. National Defense, 92, 43.
Freeman, R.L. 2002. Radio System Design for Telecommunications. Wiley & Sons publishing, New York.
Herrick, H. 2006. Radio Communications in the Digital Age: VHF/UHF Technology. Harris Corporation, RF Communications Division. Vol. 2.
TCP/IP is the combination (protocol suite) of Transmission Control Protocol (TCP) and Internet Protocol (IP), also known as the Internet protocol suite. It is the most commonly used suite for both local area networks (LANs) and the broader internet (Schneider & Gersting, 2019). In the Open Systems Interconnection (OSI) framework, they primarily function at layers 4 (transport layer) and 3 (network layer), respectively (Schneider & Gersting, 2019). The purpose of these protocols is ensuring the formation, sending and delivery of data between host machines. TCP is concerned with establishing a connection and transporting data between two nodes on the network, whereas IP is responsible for the packets transmission through the network. Before transmission, data received from the application layer is split up into smaller pieces called packets, each appended with a header containing data required to determine its destination address and position within the finished message. Then, the packet is routed through the network using IP. Once the packets are received at the destination host, they are reassembled into usable data.
TCP/IP Packet Headers and Structure
The IP header structure for IPv4 is shown in Figure 1, containing the following data:
Version number, 4 for IPv4.
IHL: the total length of this header in 32-bit words.
Type of Service: bit flags indicating precedence, delay, throughput, and reliability parameters. These parameters are used by intermediary nodes along the datagrams path to determine its route.
Total Length: the total length of the datagram, in octets. Although a length of 65,535 is technically allowed, this size is impractical, and generally significantly shorter datagrams are sent.
Identification: a value assigned by the sender, used in reassembling the datagram by the receiver.
Flags: 2 control flags, describing whether the datagram may be fragmented and whether this is the last fragment.
Fragment offset: indicates the fragments position in the datagram.
Time to live: this field is reduced at each node processing the fragment. If it reaches zero, the datagram must be destroyed, preventing network congestion with undeliverable datagrams.
Protocol: a numeric value representing the next-layer protocol for which the message is intended; in case of TCP, this is 6 (Internet Assigned Numbers Authority, 2020).
Checksum: the checksum for the header. This field is modified at each processing point.
Source and destination addresses.
The IPv6 header is relatively simplified compared to IPv4; however, it allows extension headers to be appended, containing any additional relevant data to the datagram (Deering & Hinden, 2017). The protocol specification introduces the concepts of traffic class and flow, which are used for traffic management and packet identification (Deering & Hinden, 2017). The next header field is either identical to the IPv4 Protocol field or references extension headers (Deering & Hinden, 2017). A hop limit replaces IPv4s time to live, but serves the same function. Notably, the source and destination addressing fields are larger to address the problem of IPv4s address space running out. The IPv6 is less commonly used, but its adoption is gradually increasing.
The TCP header structure is as follows:
Source and destination ports: describe the addressing within the sending and receiving hosts.
Sequence number: the number of the first octet in the segment, used to reassemble datagrams at the receiving end.
Acknowledgement number: the next sequence number that should be received.
Data offset: describes the size of the header.
Reserved: currently unused.
The following six bits are control flags for various service data about the packet, particularly, affecting the interpretation of sequence and acknowledgement number fields and an indication that the communications channel should be closed.
Window: the amount of data octets the sender is allowed to transmit before requiring additional premission.
Checksum: the checksum for the entire packet, used for error-checking.
Urgent pointer: if the URG flag is set, indicates where the urgent data ends; not commonly used.
Options: optional modifiers to the packet, variable size.
Padding: as TCP headers must be multiples of 32 in size and options is a variable-size field, the header can be padded with zeroes.
The segments data can be of variable size.
TCP/IP Packet Transmission
TCP establishes connection between two programs (applications) running on different nodes of a network. This initial connection establishment process is achieved through a three-message handshake where the source and destination side exchange their uniquely chosen send and receive initial sequence numbers (ISNs) (ISI, 1981b). This handshake technically consists of four messages that contain SYN or ACK bit flags:
SYN sent by the sending system.
ACK sent back by the receiver.
SYN sent by the receiving system.
ACK from the sending system.
Messages 2 and 3, however, are combined into a simultaneous SYN-ACK message from the receiver.
Individual connections are assigned a port number within the system, identifying the sending and receiving applications internally (ISI, 1981b). The data passed down to TCP from the application layer on the sending system is divided into packets, or segments, which are then sent to the receiving node. Each segment is given a header that contains critical addressing and verification data. Once received, the segments are reassembled according to the enumeration assigned in the header. The receiving system also communicates back, acknowledging the reception of each packet; thus, if a packets delivery fails, the sending system can resend only that part of the data. This makes TCP a reliable and error-resistant protocol, although it also limits its transmission speed, compared to protocols like UDP.
IP encapsulates the TCP segment with an additional header concerned with routing the datagram to its destination node in the network. Thus, the TCP header follows the IP header in the packet. An addressing scheme is used to identify individual nodes in the network, consisting of a 4-byte IP address in IPv4 and 128-byte IP address in IPv6. A domain name is often employed to identify hosts (e. g. websites) in a way that is easier for humans to recognize and remember. In this case, IP obtains the IP address corresponding to the domain name through DNS before it can communicate with the destination (Schneider & Gersting, 2019). Then, an optimal route is determined between the source and destination through Djikstras shortest path algorithm, also accounting for the possibility of network failures when a path between two nodes is unavailable (Schneider & Gersting, 2019). The packet is then passed along the route by pairs of linked nodes until it reaches its destination, where it is finally processed. As seen in the IP headers above, the protocol has a built-in safety feature, time to live in IPv4 and hop limit in IPv6. These fields are decremented at each hop, and the packet is deemed undeliverable and destroyed if they reach zero, preventing network congestion.
References
Deering, S., & Hinden, R. (2017). Internet Protocol, Version 6 (IPv6) Specification). Internet Engineering Task Force.
Information Sciences Institute. (1981a). Internet Protocol.
Information Sciences Institute. (1981b). Transmission Control Protocol.
Internet Assigned Numbers Authority. (2020) Protocol Numbers. Web.
Schneider, G. M., & Gersting, J. L. (2019). Invitation to Computer Science (8th ed.). Cengage.
According to the video series, SQL Server 2005 Express Edition for Beginners, a database is defined as a computer file that is optimized to store up data in a structured manner. The way in which data is stored in a database is well organized and ensures that data is accurate and precise. Some databases are simply files while others require server software that manages the connection between these database files. This software majorly allows the accessibility to applications and their users. It also handles and retains the data in the databases. The creation and management of databases for applications is allowed by the SQL server 2005 edition which is a free application. The management of data is made easy by Relational Database Management System (RDBMS), which handles most intricate tasks that are related to incorporating data into ones application. This enhances a high security of the data and hence prevents it from being corrupted (Microsoft ASP.net(a), 2005).
Data integrity is the correctness and accuracy of data and it is important in a database thus it needs to be maintained. Data integrity is an essential role of an RDBMS. A relational database does this by making sure that the data type is correct and it eradicates superfluous data that may result to incorrect versions of a single data unit. Furthermore, relation database ensures that the retrieval and manipulation of data is done efficiently and it eliminates the likelihood of accidental deletion of related data. RDBMS is most popular type of database and has several functions which include; offering security to the stored data, offering administration services which back up data and replicate of information, making the data available when required and lastly the capability to write and receive data using ad hoc reporting.
SQL server database is a complete toolset where the management tools and server tools administer the system and are used in data storage in the database. In a situation where there is a single server, a network web page is requested and this command goes to the web server and the internet information services retrieves the request and if it has a file extension the ASP.NET runtime engine interprets and retrieves the request. ASP.NET executes the command stored in the assembly which is generated when the web page is run for the first time which relies on a framework class library and ADO.NET communicates with the database whether to save or retrieve the information. ADO-NET is the bridge between a code and the database. The multiple servers are also known as N-Tier. In a tools viewpoint, the SQL server 2005 express edition gives an allowance for the opportune establishment and management capacity directly from visual studio IDE. It has visual drag and drop features that allow the functionality of integration of data, its recovery and operation. The SQL server has more functions in correspondence to maintenance and ad hoc reporting.
Understanding database tables and records
Data is maintained in a database by the use of tables, which are the building blocks of a database. A table is made up of columns and rows. A column on the other hand has three distinct pieces of information, which are; the name of the column, the type of data defined and stored in the column for instance numbers, dates and currency. The function of this is enabling data integrity, data usability and allocation of the right space in the file in which the data is stored. Each column can store one specific type of data and this enables data reliability. The third piece of information that defines columns is special properties for example the automatic numbering sequence and also it defines whether the column can empty. Each new instance of columns that joint structure a table is referred to as a row. A row is commonly termed as a tuple or as a record. A row of data is a unified set of single fields of information that work hand in hand to embody a complete unit. In a record, a field of data is usually a single value. When working with tables where its columns are defined and input can be added, data retrieved, updated and deleted in the database in a couple of ways which are by the use of table data view, using an ad hoc SQL statement and finally by use of an application such as ADO.NET (Microsoft ASP.net(c), 2005).
More about column data types and other properties
Data integrity is enforced by introducing special constraints in columns hence allowing performance of more complex operations such as looking up to see whether other values are present before it allows the insertion of data and factor is allowed in Structured Query Language (SQL).this constraints occur in several forms where they are data type constraints, referential integrity constraints and special rules. These constraints eliminate the more prone dangers that may occur when a person tries to put hazardous data in your database. In column data types it is advisable to use int for big numbers while smallint is for small numbers. In the case of using characters such as that of Chinese the nvarchar is used. In order for the database to function appropriately, one should select the correct data type since too large of a data type ends up wasting space while too small of a data type causes artificial ceiling. An identity column is used in numbering a field automatically with regards to the previous field values for the existing records (Microsoft ASP.net(b), 2005).
Designing relational database tables
In designing relational databases, small related tables should be created to break the data up and link the tables using keys. There are two keys known as primary and foreign key. Primary keys specially classify a single row of a table. The identity column is used to guarantee that each row has a distinctive and unique feature. However foreign keys are used to link a record of data from the second table to the primary key of the first table. In the case where the primary key in one table and the foreign key of another table both having corresponding fields with slightly different names yet they hold the same data. Relational tables can be designed through a process known as normalization where non-relational tables are split into relational tables. There are a series of rules in the normalization process called forms and the more rules taken the more normalized the tables become. This tutorial has done a tremendous job since it teaches exclusively what a database is and it brings into light the database tables and records. It provides sufficient information about column data type and it finally teaches on how to design relational database tables.
Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the emissions of greenhouse gases. This includes the generation of electricity from waste heat (Ayres & Ayres, 2009). In addition to curtailing pollution, these companies are also saving on the cost of energy.
Major Stakeholders
Companies engaged in cogeneration intend to use the produced electricity to accomplish other manufacturing activities. For instance, Mittal Steel Company has a coking system known as Cokenergy. The waste heat it releases during the conversion of coal into coke is harnessed and ultimately used to produce 90 megawatts (MW) of power. This is what keeps the rolling machinery at the steel plant running. Using the same energy generation process, U.S. Steel salvages 100MW (Ayres & Ayres, 2009). Together, these two companies recover more electricity than is produced using solar-photovoltaic systems.
Objectives
Organizations that seek alternative sources of energy endeavor to save the cost of operation while still protecting the environment. Their choice must be sufficient and reliable enough to either increase or retain the level of efficiency they enjoy at the moment. The electricity that is produced as a by-product through cogeneration is as clean as a power acquired through solar collectors (Ayres & Ayres, 2009). Companies that recycle power are geared towards reducing the amount they purchase from local utilities. It is an effective way of ensuring that this important factor of production is under the control of internal stakeholders.
The Plan-of Action
Firms start by undertaking a feasibility study to determine the viability of implementing a certain strategy. It takes between three to four years to install a cogeneration plant. Once its operations have started, the generated power is supplied to other facilities as a substitute for electricity gotten from the local utility. Such a strategy is worthwhile because, henceforth, a companys cost of electric power is reduced by half (Ayres & Ayres, 2009). Organizations have the incentive to salvage the waste heat which would otherwise escape into the atmosphere as it happens in conventional facilities.
Successes and Failures
The primary processes of manufacturing are bound to continue being powered by fossil fuel. The energy produced through emission-free means accounts for only 10% of the entire amount needed to run plants all over the country (Ayres & Ayres, 2009). Therefore, some level of pollution will persist until there has been technological progress to warrant getting rid of fossil fuels. Nevertheless, cogeneration should continue, especially because it will take several years before the amount of solar-PV and wind energy is significant enough to replace fossil fuels.
Reference
Ayres, R. U., & Ayres, E. H. (2009). Crossing the energy divide: Moving from fossil fuel dependence to a clean-energy future. Prentice Hall.