Saturday, January 25, 2020

Thrust Vectoring :: War Technology Technological Essays

Thrust Vectoring Imagine two US Air Force Jets with controls not responding, they are heading right for each other, the pilots don’t have enough time to eject, there’s a mid-air explosion, and the needless death of American servicemen. About one fifth of peacetime fighter losses during the past few years were due to loss of control. Now imagine that the US has been developing the technology to prevent this for the last decade, but due to budget problems this technology was never installed on our fighters. I’m talking about a Thrust Vectoring. This engineering term describes the use of an engines nozzle to direct the force coming from a jet engine in different directions other then straight out the back. Besides tragic, needless deaths, this technology has a military significance for front line fighter jets. With the wars in Iraq and Afghanistan, Americans have seen the devastating power of our Air Force on Countries without a serious Air Defense network, like Is rael or Great Britain. These are countries with not just a Surface to Air Missile (SAM) threat, but an Air Force that can rival ours in its current state. Thrust Vectoring is the technology that will make our fighter jets true rulers of the air, not just on bombing runs, but air-to-air combat, better know as â€Å"Dog Fighting†. Thrust Vectoring was first used in a trivial form on Nazi Germany’s V-2 rockets. These rockets were devastating to the Allies in WWII with their accuracy due to graphite control vanes that helped the guidance of the missile. Modern rockets, both SAMs and Air-to-Air missiles have been using thrust vectoring to increase their agility in flight, and hence make them more lethal. During the Cold War German military planers recognized the shear numbers of Soviet fighters, and believing that any war would include intense Dog Fighting, began to look for ways to even the odds. Wolfgang Herbst with the Messerschmitt-Boelkow-Blohm, now Deutsche Aerospace, Company led a team in Post-Stall engineering. Post-Stall describes a flight condition in which normal flight controls, like flaps, are no longer sufficient to maintain the flight ability of the aircraft. His team investigated new flight laws to describe the movement of an aircraft in Post-Stall flying conditions.

Thursday, January 16, 2020

Literary Devices Used in Macbe Essay

Imagine how dull a Shakespearean play would be without the ingenious literary devices and techniques that contribute so much to the fulfillment of its reader or viewer. Macbeth, by William Shakespeare, is a tragedy that combines fact and legend to tell the story of an eleventh century king. Shakespeare uses numerous types of literary techniques to make this tragic play more appealing. Three literary devices that Shakespeare uses to make Macbeth more interesting and effective are irony, symbolism, and imagery. One technique that Shakespeare uses is irony. Verbal irony is when a character says one thing but means the opposite. When a reader understands the irony of what a character is saying, then he can truly understand the nature and intentions of the character. An example of verbal irony is when Macbeth says to Banquo, â€Å"Tonight we hold a solemn supper, sir,/ And I’ll request your presence† (Macbeth 3. 1. 13-14). The reader soon discovers that Banquo never makes it to the banquet because he is brutally murdered by order of Macbeth. Shakespeare also uses situation irony. This occurs when the results of an action or event are different than what is expected. An example of situation irony occurs when Macduff talks to Malcolm and discusses the tragedies that are taking place in Scotland. Without knowing that his own family has been slain Macduff says, † Each new morn/ New widows howl, new orphans cry, new sorrows/ Strike heaven on the face† (4. 3. 4-6). Ironically, Macduff comments about widows, while he is completely unaware that he is a widower himself. Irony, a key element to a tragic play like Macbeth, has the ability to make the tragic hero appear more villainous or the down-fall seem even more tragic. The second type of literary device that Shakespeare uses in Macbeth is symbolism. The predominant symbol is blood and is used as an effective method to describe the theme of the play. Not only does blood symbolize bravery, it is also a means of showing treachery and treason and probably most importantly, guilt. One example of bravery occurs when the captain says, â€Å"For brave Macbeth? well he deserves that name–/Disdaining fortune, with his brandished steel,/Which smoked with bloody execution†(1. 2. 16-18). Soon after this blood changes into a representation of treachery and treason. Lady Macbeth asks the spirits to â€Å"Make thick my blood,/ Stop up th’ access and passage to remorse† (1. 5. 43-44). She asks the spirits to take away compassion and make her remorseless for the actions she is about to take. Also, when Ross asks, â€Å"Is’t known who did this more than bloody deed? † (2. 4. 22), he tries to figure out who performed the disloyal act of murdering the king. Blood is also used many times to express the guilt-ridden consciences of the characters. For instance, Macbeth says, â€Å"What hands are here? Ha! They pluck out mine own eyes! / Will all great Neptune’s ocean wash the blood/ Clean from my hand? † (2. 3. 58-60). Macbeth obviously feels guilty for killing Duncan in cold blood. Later in the play, Lady Macbeth reveals her guilt while sleepwalking. She walks through the castle carrying a candle. She often sits the candle down and begins to rub her hands as if she is trying to wash them. In her somber state, she cries out: What need we fear who knows it, when none can call our pow’r to accompt? Yet who would have thought the old man to have so much blood in him? (5. 1. 38-41). Lady Macbeth feels as though she cannot wipe clean her blood stained hands. This is a bit ironic since earlier she told Macbeth, â€Å"A little water clears us of this deed† (2. 2. 66). Lady Macbeth has many dreams and fantasies about blood, which shows that she cannot clear her conscience of this brutal act. Another literary technique that is used in Macbeth is word imagery. Word imagery is a term for a metaphor, a comparison that does not use the words â€Å"like† or â€Å"as†. One of the best examples of this is clothing imagery. For instance, Ross tells Macbeth that he has been named Thane of Cawdor, and Macbeth says, â€Å"The Thane of Cawdor lives. Why do you dress me in/ Borrowed robes? † (1. 3. 108-109). Macbeth asks why Ross is telling him this. This title is like new clothes to him, but this title and these clothes should still belong to the former Thane of Cawdor. Another example of clothing imagery occurs when Macbeth tells his wife that he has second thoughts of killing Duncan. He says, â€Å"I have bought/ Golden opinions from all sorts of people,/ Which would be worn now in their newest gloss† (1. 7. 32-34). Lady Macbeth thinks he is being irrational. Macbeth knows that he is the center of attention now because he saved the country. He also knows that if he kills Duncan everyone would be more interested in the death of their king than in their hero, Macbeth. Shakespeare’s work reveals that he knew how to make a play a work of art. Through his use of irony, symbolism, and imagery he is able to grab the reader or the viewer’s attention and keep it. These elements have contributed to the endurance of his works for centuries, and they will help it to endure for centuries to come. Without the use of these techniques, Macbeth would not be the tragic play that it is. This play would lack very important methods that help idealize the characters in the play.

Wednesday, January 8, 2020

Real and Cyber World Threats - 654 Words

Every day we are prone to threats against our lives that may harm us in many ways, in the real world and cyber world. In the cyber realm, we have a big issue with something called malware; malware is malicious software that comes in many forms. It may attack in many ways at any time or place; that is why there is a lot of research going into figuring out how malware works. Malware costs people in the US alone billions of dollars yearly (Consumer Reports Magazine). There are many types of malware such as: Viruses, Trojan horses, Phishing, Worms, and Spyware. They work in many different ways but they all corrupt something in the everyday lives of the computer users. First off, Phishing, poses as a real legitimate such as: bank websites. It wants you to go to the link while it â€Å"fishes† for the data you provide on the site. Spyware is a monitor of your personal use on your computer. It sends advertising info after it has your data, this is one of the most difficult to get rid of. Trojan horses, like Phishing, may be covered and look like a real program and have actual function but it can delete data and compromise security. A Virus, we all have heard of a virus before. It is the most common known to man. A Virus infects your computer by overtaking the control of the computer it also looks for sensitive data like, credit card info, passwords , etc. Lastly, there are Worms. Worms are usually sent through email and they venture out into your address book; creating aShow MoreRelatedCyber Attack And Cyber Attacks Essay1656 Words   |  7 Pagesa terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all systems connected to cyber networks fail to work (Rhodes 20). An example is the Morris worm that affected the world cyber infrastructures and caused them to slow down to a position of being impractical. Therefore, as a result of these cyber-attacks resources are being established and designed to help counter the attacks. Cyber threat simulation is one of the resourcesRead MoreCyber Terrorism1716 Words   |  7 Pagesof America was the victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that claim.   Cyber terror attacks pose a threat against the national security of the United States. In order to fully comprehend the threat that cyber terrorism poses, it is essential to understand the background, the effects, the reality of the threat and the future of cyber terrorism. This assessment examines the reality of the cyber terrorism threat, and also questions its validityRead MoreWho Holds The Clicker? Essay1637 Words   |  7 Pagesmuch more convenience. Cyber alterations have helped people to connect with each other easily instead of traditional face-to-face communication. In â€Å"Alone Together,† Sherry Turkle promotes the idea that the new technology is changing the way people communicate with one another and remark the relationships between the m. She has brought about concerns of intimate relationship between robot and human and provided examples to show various attitudes towards digital technologies. Cyber alterations cause newRead MoreEssay on Abuse and Fox Man Point656 Words   |  3 Pagesï » ¿Quintin Anthony English 097 11/11/13 â€Å"Social Networking Sites Can Be Forums for Cyber bullying† Why are Cyber bullying and Social Networking sites becoming more and more Harmful? Abraham Forman’s article on â€Å"Social Networking Sites Can Be Forums for Cyber bullying† by: Abraham Fox man. Abraham Fox man explains why Cyber bullying/Social Networking Sites have been a threat for teenagers and children (par.1), and why teenagers are the cause. Abraham Fox man tells us that teenagers are the onlyRead MoreEssay about Cyber Bullying1223 Words   |  5 Pageshurt physically, but to those who have been or are currently victims of cyber bullying words can be the difference between life and death. â€Å"Words hurt, and they hurt much more when repeated in the echo chamber of the Internet.† (Rep. Linda Sanchez via FoxNews.com) There are at least 4 examples in the United States where cyber-bullying has been linked to the suicide of a teenager [1]. What is Cyber Bullying? Cyber bullying is defined as â€Å"bullying through information and communicationRead MoreIs Bullying A Serious Problem?1683 Words   |  7 PagesHistory of the Problem Bullying has been an ongoing problem all over the world for as long as people can remember. Bullying by definition is, to use superior strength or influence to intimidate (someone), typically to force him or her to do what one wants. Bullying is a very serious problem, victims of bullying are more prone to depression. Bullying does not affect just one group, it can happen to anyone making it a prevalent threat to all of society. Approximately 160,000 teens skip school every dayRead MoreThe Security Measures Protect The Digital Infrastructure1476 Words   |  6 Pagesintention. The constant threat of digital breach and exploitation gave birth to the field of Cyber Security, which is the field of technology dedicated to protecting computer devices and information systems from unintended or unauthorized access to the software, hardware or the information they hold. It also involves preventing disruption or misdirection of the services they provide. The banking industry, which supports the financial infrastructure of every today’s world, is heavily reliant on theRead MoreCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of information systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreCyber Security : The New Wave Of Social Media1604 Words   |  7 Pages Cyber Security If you were to look around a room of young adults or teens today, you would likely notice an eerie silence. A silence accompanied with most of these individuals staring down at their cellphones, the sound of conversation is exchanged for the sound of clicking keys. It’s no secret; this generation relies on their phones and the internet much like food and water. It’s a necessity. With the new wave of social media, which is being used by an alarming 78% of U.S. citizens, theRead MoreAre Social Networking Sites Good for Our Society Essay1670 Words   |  7 Pagesfocused on social networking sites. Such social networking sites are Facebook, Twitter, Instagram, etc. These social networking sites have sparked a debate on whether it is good or bad for the society. Social networking can put people at risk for cyber-bullying, false information, fake rumors, and online predators, along with other negative results. It causes two friends that are hanging out, or a mom and her daughter in the car together, to not even converse with each other. Their focus is what