CJA 345 ETHICAL ISSUES IN CRIMINAL JUSTICE RESEARCH PAPER

CJA 345 ETHICAL ISSUES IN CRIMINAL JUSTICE RESEARCH PAPER

Write a 1,050- to 1,400-word paper in which you describe the ethical issues related to the research process within the field of criminal justice. Be sure to include responses to the following:

What is the purpose of research in the field of criminal justice? What are some of the benefits it provides?

What are the differences between qualitative and quantitative research?

What are the differences between pure and applied research?

Why is ethics in criminal justice research important?

Format your paper consistent with APA guidelines.

ADVANCED SOLID WASTE MANAGEMENT

ADVANCED SOLID WASTE MANAGEMENT

1) Review some articles on landfills and on compost piles. This assignment is not about summarizing these operations but about analyzing and comparing the differences between these two fundamental principles of solid waste management. Describe when and why each of these fundamentals is appropriate for use to manage municipal solid waste. Include in your discussion details about the differences of microbial mechanisms, the end products of degradation, and of factors that help and harm the performance of these operations. How effective is each one? (Your total response for all parts of this question should be at least 500 words.)

2) A community of 62,000 does not have a municipal recyclinge program, and they it sends all of their its refuse to the municipal landfill. Will the landfill generate enough natural gas to meet the needs of the city if the municipality needs to annually generate 10 million cubic meters of natural gas (methane) and the city collects all of the methane that is generated? How will this affect the population of the city? Explain your answer. (Your total response for all parts of this question should be at least 300 words.)

AMI – 1- TO 2-PAGE EXECUTIVE SUMMARY AND BUSINESS PRESENTATION

AMI – 1- TO 2-PAGE EXECUTIVE SUMMARY AND BUSINESS PRESENTATION

Assignment Preparation: Activities include independent student reading, and research.

Reference the “Understanding Abstraction and Virtualization” section in Ch. 5, “Understanding Abstraction and Virtualization,” of Cloud Computing Bible and research AMI information online.

Create a 1- to 2-page executive summary and business presentation, with eight to ten slides, describing the most appropriate use of AMI in implementing the service you described in Week One Supporting Activity: “Cloud Computing Service.”

Use slide notes to detail why you made the decisions you chose.

Chapter 5
Understanding Abstraction and Virtualization

Chapter 5
Understanding Abstraction and Virtualization

IN THIS CHAPTER

Understanding how abstraction makes cloud computing possible

Understanding how virtualization creates shared resource pools

Using load balancing to enable large cloud computing applications

Using hypervisors to make virtual machines possible

Discussing system imaging and application portability for the cloud

In this chapter, I discuss different technologies that create shared pools of resources. The key to creating a pool is to provide an abstraction mechanism so that a logical address can be mapped to a physical resource. Computers use this technique for placing files on disk drives, and cloud computing networks use a set of techniques to create virtual servers, virtual storage, virtual networks, and perhaps one day virtual applications. Abstraction enables the key benefit of cloud computing: shared, ubiquitous access.

In this chapter, you learn about how load balancing can be used to create high performance cloud-based solutions. Google.com’s network is an example of this approach. Google uses commodity servers to direct traffic appropriately.

Another technology involves creating virtual hardware systems. An example of this type of approach is hypervisors that create virtual machine technologies. Several important cloud computing approaches use a strictly hardware-based approach to abstraction. I describe VMware’s vSphere infrastructure in some detail, along with some of the unique features and technologies that VMware has developed to support this type of cloud.

Finally, I describe some approaches to making applications portable. Application portability is a difficult proposition, and work to make applications portable is in its infancy. Two approaches are described, the Simple API and AppZero’s Virtual Application Appliance (VAA). VAAs are containers that abstract an application from the operating system, and they offer the potential to make an application portable from one platform to another.

Using Virtualization Technologies
The dictionary includes many definitions for the word “cloud.” A cloud can be a mass of water droplets, gloom, an obscure area, or a mass of similar particles such as dust or smoke. When it comes to cloud computing, the definition that best fits the context is “a collection of objects that are grouped together.” It is that act of grouping or creating a resource pool that is what succinctly differentiates cloud computing from all other types of networked systems.

Not all cloud computing applications combine their resources into pools that can be assigned on demand to users, but the vast majority of cloud-based systems do. The benefits of pooling resources to allocate them on demand are so compelling as to make the adoption of these technologies a priority. Without resource pooling, it is impossible to attain efficient utilization, provide reasonable costs to users, and proactively react to demand. In this chapter, you learn about the technologies that abstract physical resources such as processors, memory, disk, and network capacity into virtual resources.

When you use cloud computing, you are accessing pooled resources using a technique called virtualization. Virtualization assigns a logical name for a physical resource and then provides a pointer to that physical resource when a request is made. Virtualization provides a means to manage resources efficiently because the mapping of virtual resources to physical resources can be both dynamic and facile. Virtualization is dynamic in that the mapping can be assigned based on rapidly changing conditions, and it is facile because changes to a mapping assignment can be nearly instantaneous.

These are among the different types of virtualization that are characteristic of cloud computing:

Access: A client can request access to a cloud service from any location.
Application: A cloud has multiple application instances and directs requests to an instance based on conditions.
CPU: Computers can be partitioned into a set of virtual machines with each machine being assigned a workload. Alternatively, systems can be virtualized through load-balancing technologies.
Storage: Data is stored across storage devices and often replicated for redundancy.
To enable these characteristics, resources must be highly configurable and flexible. You can define the features in software and hardware that enable this flexibility as conforming to one or more of the following mobility patterns:

P2V: Physical to Virtual
V2V: Virtual to Virtual
V2P: Virtual to Physical
P2P: Physical to Physical
D2C: Datacenter to Cloud
C2C: Cloud to Cloud
C2D: Cloud to Datacenter
D2D: Datacenter to Datacenter
The techniques used to achieve these different types of virtualization are the subject of this chapter. According to Gartner (“Server Virtualization: One Path that Leads to Cloud Computing,” by Thomas J. Bittman, 10/29/2009, Research Note G00171730), virtualization is a key enabler of the first four of five key attributes of cloud computing:

Service-based: A service-based architecture is where clients are abstracted from service providers through service interfaces.
Scalable and elastic: Services can be altered to affect capacity and performance on demand.
Shared services: Resources are pooled in order to create greater efficiencies.
Metered usage: Services are billed on a usage basis.
Internet delivery: The services provided by cloud computing are based on Internet protocols and formats.
Load Balancing and Virtualization
One characteristic of cloud computing is virtualized network access to a service. No matter where you access the service, you are directed to the available resources. The technology used to distribute service requests to resources is referred to as load balancing. Load balancing can be implemented in hardware, as is the case with F5’s BigIP servers, or in software, such as the Apache mod_proxy_balancer extension, the Pound load balancer and reverse proxy software, and the Squid proxy and cache daemon. Load balancing is an optimization technique; it can be used to increase utilization and throughput, lower latency, reduce response time, and avoid system overload.

The following network resources can be load balanced:

Network interfaces and services such as DNS, FTP, and HTTP
Connections through intelligent switches
Processing through computer system assignment
Storage resources
Access to application instances
Without load balancing, cloud computing would very difficult to manage. Load balancing provides the necessary redundancy to make an intrinsically unreliable system reliable through managed redirection. It also provides fault tolerance when coupled with a failover mechanism. Load balancing is nearly always a feature of server farms and computer clusters and for high availability applications.

A load-balancing system can use different mechanisms to assign service direction. In the simplest load-balancing mechanisms, the load balancer listens to a network port for service requests. When a request from a client or service requester arrives, the load balancer uses a scheduling algorithm to assign where the request is sent. Typical scheduling algorithms in use today are round robin and weighted round robin, fastest response time, least connections and weighted least connections, and custom assignments based on other factors.

A session ticket is created by the load balancer so that subsequent related traffic from the client that is part of that session can be properly routed to the same resource. Without this session record or persistence, a load balancer would not be able to correctly failover a request from one resource to another. Persistence can be enforced using session data stored in a database and replicated across multiple load balancers. Other methods can use the client’s browser to store a client-side cookie or through the use of a rewrite engine that modifies the URL. Of all these methods, a session cookie stored on the client has the least amount of overhead for a load balancer because it allows the load balancer an independent selection of resources.

The algorithm can be based on a simple round robin system where the next system in a list of systems gets the request. Round robin DNS is a common application, where IP addresses are assigned out of a pool of available IP addresses. Google uses round robin DNS, as described in the next section.

Advanced load balancing
The more sophisticated load balancers are workload managers. They determine the current utilization of the resources in their pool, the response time, the work queue length, connection latency and capacity, and other factors in order to assign tasks to each resource. Among the features you find in load balancers are polling resources for their health, the ability to bring standby servers online (priority activation), workload weighting based on a resource’s capacity (asymmetric loading), HTTP traffic compression, TCP offload and buffering, security and authentication, and packet shaping using content filtering and priority queuing.

An Application Delivery Controller (ADC) is a combination load balancer and application server that is a server placed between a firewall or router and a server farm providing Web services. An Application Delivery Controller is assigned a virtual IP address (VIP) that it maps to a pool of servers based on application specific criteria. An ADC is a combination network and application layer device. You also may come across ADCs referred to as a content switch, multilayer switch, or Web switch.

These vendors, among others, sell ADC systems:

A10 Networks (http://www.a10networks.com/)
Barracuda Networks (http://www.barracudanetworks.com/)
Brocade Communication Systems (http://www.brocade.com/)
Cisco Systems (http://www.cisco.com/)
Citrix Systems (http://www.citrix.com/)
F5 Networks (http://www.f5.com/)
Nortel Networks (http://www.nortel.com/)
Coyote Point Systems (http://www.coyotepoint.com/)
Radware (http://www.radware.com/)
An ADC is considered to be an advanced version of a load balancer as it not only can provide the features described in the previous paragraph, but it conditions content in order to lower the workload of the Web servers. Services provided by an ADC include data compression, content caching, server health monitoring, security, SSL offload and advanced routing based on current conditions. An ADC is considered to be an application accelerator, and the current products in this area are usually focused on two areas of technology: network optimization, and an application or framework optimization. For example, you may find ADC’s that are tuned to accelerate ASP.NET or AJAX applications.

An architectural layer containing ADCs is described as an Application Delivery Network (ADN), and is considered to provide WAN optimization services. Often an ADN is comprised of a pair of redundant ADCs. The purpose of an ADN is to distribute content to resources based on application specific criteria. ADN provide a caching mechanism to reduce traffic, traffic prioritization and optimization, and other techniques. ADN began to be deployed on Content Delivery Networks (CDN) in the late 1990s, where it added the ability to optimize applications (application fluency) to those networks. Most of the ADC vendors offer commercial ADN solutions.

In addition to the ADC vendors in the list above, these are additional ADN vendors, among others:

Akamai Technologies (http://www.akamai.com/)
Blue Coat Systems (http://www.bluecoat.com/)
CDNetworks (http://www.cdnetworks.com/)
Crescendo Networks (http://www.crescendonetworks.com/)
Expand Networks (http://www.expand.com/)
Juniper Networks (http://www.juniper.net/)
Google’s cloud is a good example of the use of load balancing, so in the next section let’s consider how Google handles the many requests that they get on a daily basis.

The Google cloud
According to the Web site tracking firm Alexa (http://www.alexa.com/topsites), Google is the single most heavily visited site on the Internet; that is, Google gets the most hits. The investment Google has made in infrastructure is enormous, and the Google cloud is one of the largest in use today. It is estimated that Google runs over a million servers worldwide, processes a billion search requests, and generates twenty petabytes of data per day.

Google is understandably reticent to disclose much about its network, because it believes that its infrastructure, system response, and low latency are key to the company’s success. Google never gives datacenter tours to journalists, doesn’t disclose where its datacenters are located, and obfuscates the locations of its datacenters by wrapping them in a corporate veil. Thus, the discretely named Tetra LLC (limited liability company) owns the land for the Council Bluffs, Iowa, site, and Lapis LLC owns the land for the Lenoir, North Carolina, site. This makes Google infrastructure watching something akin to a sport to many people.

So what follows is what we think we know about Google’s infrastructure and the basic idea behind how Google distributes its traffic by pooling IP addresses and performing several layers of load balancing.

Google has many datacenters around the world. As of March 2008, Rich Miller of DataCenterKnowledge.com wrote that Google had at least 12 major installations in the United States and many more around the world. Google supports over 30 country specific versions of the Google index, and each localization is supported by one or more datacenters. For example, Paris, London, Moscow, Sao Paolo, Tokyo, Toronto, Hong Kong, Beijing and others support their countries’ locale. Germany has three centers in Berlin, Frankfurt, and Munich; the Netherlands has two at Groningen and Eemshaven. The countries with multiple datacenters store index replicas and support network peering relationships. Network peering helps Google have low latency connections to large Internet hubs run by different network providers.

You can find a list of sites as of 2008 from Miller’s FAQ at http://www.datacenterknowledge.com/archives/2008/03/27/google-data-center-faq/.

Based on current locations and the company’s statements, Google’s datacenters are sited based on the following factors (roughly in order of importance):

Availability of cheap and, if possible, renewable energy
The relative locations of other Google datacenters such that the site provides the lowest latency response between sites
Location of nearby Internet hubs and peering sites
A source of cooling water
The ability to purchase a large area of land surrounding the siteSpeculation on why Google purchases large parcels of land ranges from creating a buffer zone between the datacenter and surrounding roads and towns or possibly to allow for building wind farms when practical.
Tax concessions from municipalities that lower Google’s overhead
Google maintains a pool of hundreds of IP addresses, all of which eventually resolve to its Mountain View, California, headquarters. When you initiate a Google search, your query is sent to a DNS server, which then queries Google’s DNS servers. The Google DNS servers examine the pool of addresses to determine which addresses are geographically closest to the query origin and uses a round robin policy to assign an IP address to that request. The request usually goes to the nearest datacenter, and that IP address is for a cluster of Google servers. This DNS assignment acts as a first level of IP virtualization, a pool of network addresses have been load balanced based on geography.

A Google cluster can contain thousands of servers. Google servers are racks of commodity (low cost) 1U or 2U servers containing 40 to 80 servers per rack with one switch per rack. Each switch is connected to a core gigabit switch. Google servers run a customized version of Linux with applications of several types.

When the query request arrives at its destination, a Google cluster is sent to a load balancer, which forwards that request to a Squid proxy server and Web cache dameon. This is the second level of IP distribution, based on a measure of the current system loading on proxy servers in the cluster. The Squid server checks its cache, and if it finds a match to the query, that match is returned and the query has been satisfied. If there is no match in the Squid cache, the query is sent to an individual Google Web Server based on current Web server utilizations, which is the third level of network load balancing, again based on utilization rates.

It is the Google Web Servers that perform the query against the Google index and then format the results into an HTML page that is returned to the requester. This procedure then performs two more levels of load balancing based on utilization rates.

Google’s secret sauce is its in-memory inverted index and page rank algorithm. Google’s GoogleBot (a spider or robot) crawls the Web and collects document information. Some details of the search and store algorithm are known. Google looks at the title and first few hundred words and builds a word index from the result. Indexes are stored on an index server.

Some documents are stored as snapshots (PDF, DOC, XLS, and so on), but lots of information is not addressed in the index. Each document is given a unique ID (“docid”), and the content of the document is disassembled into segments called shards, subjected to a data compression scheme and stored on a document server. The entire index is maintained in system memory partitioned over each instance of the index’s replicas. A page rank is created based on the significant links to that page.

Queries are divided into word lists, and the Google algorithm examines the words and the relationships of one word to another. Those word relationships are mapped against the main index to create a list of documents, a feature called an inverted index. In an inverted index, words are mapped to documents, which can be done very quickly when the index is fully kept in memory.

The Web server takes the result of a query and composes the Web page from that result. Ads included on the page are from ad servers, which provide Google’s AdSense and AdWords services. The query also is presented to a spelling server to provide suggestions for alternative spellings to include in the search result. Certain keywords, data input patterns, and other strings are recognized as having special operational significance. For example entering “2 plus 2” initiates Google’s calculator program, and a ten-digit number returns a reverse phone lookup using the phonebook program. These programs are supported by special application servers.

Google doesn’t use hardware virtualization; it performs server load balancing to distribute the processing load and to get high utilization rates. The workload management software transfers the workload from a failed server over to a redundant server, and the failed server is taken offline. Multiple instances of various Google applications are running on different hosts, and data is stored on redundant storage systems.

Understanding Hypervisors
Load balancing virtualizes systems and resources by mapping a logical address to a physical address. Another fundamental technology for abstraction creates virtual systems out of physical systems. If load balancing is like playing a game of hot potato, then virtual machine technologies is akin to playing slice and dice with the potato.

Given a computer system with a certain set of resources, you can set aside portions of those resources to create a virtual machine. From the standpoint of applications or users, a virtual machine has all the attributes and characteristics of a physical system but is strictly software that emulates a physical machine. A system virtual machine (or a hardware virtual machine) has its own address space in memory, its own processor resource allocation, and its own device I/O using its own virtual device drivers. Some virtual machines are designed to run only a single application or process and are referred to as process virtual machines.

A virtual machine is a computer that is walled off from the physical computer that the virtual machine is running on. This makes virtual machine technology very useful for running old versions of operating systems, testing applications in what amounts to a sandbox, or in the case of cloud computing, creating virtual machine instances that can be assigned a workload. Virtual machines provide the capability of running multiple machine instances, each with their own operating system.

From the standpoint of cloud computing, these features enable VMMs to manage application provisioning, provide for machine instance cloning and replication, allow for graceful system failover, and provide several other desirable features. The downside of virtual machine technologies is that having resources indirectly addressed means there is some level of overhead.

Virtual machine types
A low-level program is required to provide system resource access to virtual machines, and this program is referred to as the hypervisor or Virtual Machine Monitor (VMM). A hypervisor running on bare metal is a Type 1 VM or native VM. Examples of Type 1 Virtual Machine Monitors are LynxSecure, RTS Hypervisor, Oracle VM, Sun xVM Server, VirtualLogix VLX, VMware ESX and ESXi, and Wind River VxWorks, among others. The operating system loaded into a virtual machine is referred to as the guest operating system, and there is no constraint on running the same guest on multiple VMs on a physical system. Type 1 VMs have no host operating system because they are installed on a bare system.

An operating system running on a Type 1 VM is a full virtualization because it is a complete simulation of the hardware that it is running on.

Note
Not all CPUs support virtual machines, and many that do require that you enable this support in the BIOS. For example, AMD-V processors (code named Pacifica) and Intel VT-x (code named Vanderpool) were the first of these vendor’s 64-bit offerings that added this type of support.

Some hypervisors are installed over an operating system and are referred to as Type 2 or hosted VM. Examples of Type 2 Virtual Machine Monitors are Containers, KVM, Microsoft Hyper V, Parallels Desktop for Mac, Wind River Simics, VMWare Fusion, Virtual Server 2005 R2, Xen, Windows Virtual PC, and VMware Workstation 6.0 and Server, among others. This is a very rich product category. Type 2 virtual machines are installed over a host operating system; for Microsoft Hyper-V, that operating system would be Windows Server. In the section that follows, the Xen hypervisor (which runs on top of a Linux host OS) is more fully described. Xen is used by Amazon Web Services to provide Amazon Machine Instances (AMIs).

Figure 5.1 shows a diagram of Type 1 and Type 2 hypervisors.

On a Type 2 VM, a software interface is created that emulates the devices with which a system would normally interact. This abstraction is meant to place many I/O operations outside the virtual environment, which makes it both programmatically easier and more efficient to execute device I/O than it would be inside a virtual environment. This type of virtualization is sometimes referred to as paravirtualization, and it is found in hypervisors such as Microsoft’s Hyper-V and Xen. It is the host operating system that is performing the I/O through a para-API.

Figure 5.2 shows the difference between emulation, paravirtualization, and full virtualization. In emulation, the virtual machine simulates hardware, so it can be independent of the underlying system hardware. A guest operating system using emulation does not need to be modified in any way. Paravirtualization requires that the host operating system provide a virtual machine interface for the guest operating system and that the guest access hardware through that host VM. An operating system running as a guest on a paravirtualization system must be ported to work with the host interface. Finally, in a full virtualization scheme, the VM is installed as a Type 1 Hypervisor directly onto the hardware. All operating systems in full virtualization communicate directly with the VM hypervisor, so guest operating systems do not require any modification. Guest operating systems in full virtualization systems are generally faster than other virtualization schemes.

The Virtual Machine Interface (VMI) open standard (http://vmi.ncsa.uiuc.edu/) that VMware has proposed is an example of a paravirtualization API. The latest version of VMI is 2.1, and it ships as a default installation with many versions of the Linux operating system.

Note
Wikipedia maintains a page called “Comparison of platform virtual machines” at http://en.wikipedia.org/wiki/Comparison_of_platform_virtual_machines. The page contains a table of features of the most common Virtual Machine Managers.

You are probably familiar with process or application virtual machines. Most folks run the Java Virtual Machine or Microsoft’s .NET Framework VM (called the Common Language Runtime or CLR) on their computers. A process virtual machine instantiates when a command begins a process, the VM is created by an interpreter, the VM then executes the process, and finally the VM exits the system and is destroyed. During the time the VM exists, it runs as a high-level abstraction.

Applications running inside an application virtual machine are generally slow, but these programs are very popular because they provide portability, offer rich programming languages, come with many advanced features, and allow platform independence for their programs. Although many cloud computing applications provide process virtual machine applications, this type of abstraction isn’t really suitable for building a large or high-performing cloud network, with one exception.

The exception is the process VMs that enable a class of parallel cluster computing applications. These applications are high-performance systems where the virtual machine is operating one process per cluster node, and the system maintains the necessary intra-application communications over the network interconnect. Examples of this type of system are the Parallel Virtual Machine (PVM; see http://www.csm.ornl.gov/pvm/pvm_home.html) and the Message Passing Interface (MPI; see http://www.mpi-forum.org/). Some people do not consider these application VMs to be true virtual machines, noting that these applications can still access the host operating system services on the specific system on which they are running. The emphasis on using these process VMs is in creating a high-performance networked supercomputer often out of heterogeneous systems, rather than on creating a ubiquitous utility resource that characterizes a cloud network.

Some operating systems such as Sun Solaris and IBM AIX 6.1 support a feature known as operating system virtualization. This type of virtualization creates virtual servers at the operating system or kernel level. Each virtual server is running in its own virtual environment (VE) as a virtual private server (VPS). Different operating systems use different names to describe these machine instances, each of which can support its own guest OS. However, unlike true virtual machines, VPS must all be running the same OS and the same version of that OS. Sun Solaris 10 uses VPS to create what is called Solaris Zones. With IBM AIX, the VPS is called a System Workload Partition (WPAR). This type of virtualization allows for a dense collection of virtual machines with relatively low overhead. Operating system virtualization provides many of the benefits of virtualization previously noted in this section.

VMware vSphere
VMware vSphere is a management infrastructure framework that virtualizes system, storage, and networking hardware to create cloud computing infrastructures. vSphere is the branding for a set of management tools and a set of products previously labeled VMware Infrastructure. vSphere provides a set of services that applications can use to access cloud resources, including these:

VMware vCompute: A service that aggregates servers into an assignable pool
VMware vStorage: A service that aggregates storage resources into an assignable pool
VMware vNetwork: A service that creates and manages virtual network interfaces
Application services: Such as HA (High Availability) and Fault Tolerance
vCenter Server: A provisioning, management, and monitoring console for VMware cloud infrastructures
Figure 5.3 shows an architectural diagram of a vSphere cloud infrastructure.

A vSphere cloud is a pure infrastructure play. The virtualization layer that abstracts processing, memory, and storage uses the VMware ESX or ESXi virtualization server. ESX is a Type 1 hypervisor; it installs over bare metal (a clean system) using a Linux kernel to boot and installs the vmkernel hypervisor (virtualization kernel and support files). When the system is rebooted, the vmkernel loads first, and then the Linux kernel becomes the first guest operating system to run as a virtual machine on the system and contains the service console.

VMware is a very highly developed infrastructure and the current leader in this industry. A number of important add-on products are available for cloud computing applications. These are among the more notable products:

Virtual Machine File System (VMFS): A high-performance cluster file system for an ESX/ESXi cluster.
VMotion: A service that allows for the migration of a virtual machine from one physical server to another physical server while the virtual server runs continuously and without any interruption of ongoing transactions.The ability to live migrate virtual machines is considered to be a technological tour de force and a differentiator from other virtual machine system vendors.
Storage VMotion: A product that can migrate files from one datastore to another datastore while the virtual machine that uses the datastore continues to run.
Virtual SMP: A feature that allows a virtual machine to run on two or more physical processors at the same time.
Distributed Resource Scheduler (DRS): A system for provisioning virtual machines and load balancing processing resources dynamically across the different physical systems that are in use. A part of the DRS called the distributed power management (DPM) module can manage the power consumption of systems.
vNetwork Distributed Switch (DVS): A capability to maintain a network runtime state for virtual machines as they are migrated from one physical system to another. DVS also monitors network connections, provides firewall services, and enables the use of third-party switches such as the Cisco Nexus 1000V to manage virtual networks.
You can get a better sense of how the different resources are allocated by vSphere into a virtual set of components by examining Figure 5.4. Physical computers can be standalone hosts or a set of clustered systems. In either case, a set of virtual machines can be created that is part of a single physical system or spans two or more physical systems.

You can define a group of VMs as a Resource Pool (RP) and, by doing so, manage those virtual machines as a single object with a single policy. Resource Pools can be placed into a hierarchy or nested and can inherit properties of their parent RP. As more hosts or cluster nodes are added or removed, vSphere can dynamically adjust the provisioning of VMs to accommodate the policy in place. This fine tuning of pooled resources is required to accommodate the needs of cloud computing networks.

The datastore shown at the center of Figure 5.4 is a shared storage resource. These storage resources can be either Direct Attached Storage (DAS) of a server using SCSI, SAS, or SATA connections, Fibre Channel disk arrays/SANs, iSCSI disk arrays/SANs, or Network Attached Storage (NAS) disk arrays. Although the lines drawn between the datastore and different VMs indicate a direct connection, with the exception of DAS, the other storage types are shared storage solutions.

Storage virtualization is most commonly achieved through a mapping mechanism where a logical storage address is translated into a physical storage address. Block-based storage such as those used in SANs use a feature called a Logical Unit Identifier (LUN) with specific addresses stored in the form of an offset called the Logical Block Address (LBA). The address space mapping then maps the address of the logical or virtual disk (vdisk) to the logical unit on a storage controller. Storage virtualization may be done in software or in hardware, and it allows requests for virtualized storage to be redirected as needed.

Similarly, network virtualization abstracts networking hardware and software into a virtual network that can be managed. A virtual network can create virtual network interfaces (VNICs) or virtual LANs (VLANS) and can be managed by a hypervisor, operating system, or external management console. In a virtualized infrastructure such as the one presented in this section, internal network virtualization is occurring and the hypervisor interacts with networking hardware to create a pseudo-network interface. External network virtualization can be done using network switches and VLAN software.

The key feature that makes virtual infrastructure so appealing for organizations implementing a cloud computing solution is flexibility. Instantiating a virtual machine is a very fast process, typically only a few seconds in length. You can make machine images of systems in the configuration that you want to deploy or take snapshots of working virtual machines. These images can be brought on-line as needed.

Understanding Machine Imaging
In the preceding sections, you have seen how the abstractions that cloud computing needs can be achieved through redirection and virtualization. A third mechanism is commonly used to provide system portability, instantiate applications, and provision and deploy systems in the cloud. This third mechanism is through storing the state of a systems using a system image.

Cross-Ref
Backing up to the cloud often involves imaging or snapshot applications; this process is described in Chapter 15, “Working with Cloud-Based Storage.”

A system image makes a copy or a clone of the entire computer system inside a single container such as a file. The system imaging program is used to make this image and can be used later to restore a system image. Some imaging programs can take snapshots of systems, and most allow you to view the files contained in the image and do partial restores.

Note
The one open standard for storing a system image is the Open Virtualization Format (OVF; see http://www.dmtf.org/standards/published_documents/DSP0243_1.1.0.pdf) that is published by the Distributed Task Format (DMTF; http://www.dmtf.org/). Some notable virtualization vendors, such as VMware, Microsoft, Citrix, and Oracle (Sun), are supporting this effort.

A prominent example of a system image and how it can be used in cloud computing architectures is the Amazon Machine Image (AMI) used by Amazon Web Services to store copies of a virtual machine. Because this is a key feature of Amazon’s Elastic Compute Cloud and is discussed in detail in Chapter 9, I briefly mention it here. An AMI is a file system image that contains an operating system, all appropriate device drivers, and any applications and state information that the working virtual machine would have.

When you subscribe to AWS, you can choose to use one of its hundreds of canned AMIs or to create a custom system and capture that system’s image to an AMI. An AMI can be for public use under a free distribution license, for pay-per-use with operating systems such as Windows, or shared by an EC2 user with other users who are given the privilege of access.

Cross-Ref
Refer to Chapter 9, “Using Amazon Web Services,” for more information about AMIs and their uses in the EC2 service.

The AMI file system is not a standard bit-for-bit image of a system that is common to many disk imaging programs. AMI omits the kernel image and stores a pointer to a particular kernel that is part of the AWS kernel library. Among the choices are Red Hat Linux, Ubuntu, Microsoft Windows, Solaris, and others. Files in AMI are compressed and encrypted, and an XML file is written that describes the AMI archive. AMIs are typically stored in your Amazon S3 (Simple Storage System) buckets as a set of 10MB chunks.

Machine images are sometimes referred to as “virtual appliances”—systems that are meant to run on virtualization platforms. AWS EC2 runs on the Xen hypervisor, for example. The term virtual appliance is meant to differentiate the software image from an operating virtual machine. The system image contains the operating system and applications that create an environment. Most virtual appliances are used to run a single application and are configurable from a Web page. Virtual appliances are a relatively new paradigm for application deployment, and cloud computing is the major reason for the interest in them and for their adoption. This area of WAN application portability and deployment, and of WAN optimization of an application based on demand, is one with many new participants. Certeon (http://www.certeon.com/), Expand Networks (http://www.expand.com/), and Replify (http://www.replify.com/) are three vendors offering optimization appliances for VMware’s infrastructure.

Porting Applications
Cloud computing applications have the ability to run on virtual systems and for these systems to be moved as needed to respond to demand. Systems (VMs running applications), storage, and network assets can all be virtualized and have sufficient flexibility to give acceptable distributed WAN application performance. Developers who write software to run in the cloud will undoubtedly want the ability to port their applications from one cloud vendor to another, but that is a much more difficult proposition. Cloud computing is a relatively new area of technology, and the major vendors have technologies that don’t interoperate with one another.

The Simple Cloud API
If you build an application on a platform such as Microsoft Azure, porting that application to Amazon Web Services or GoogleApps may be difficult, if not impossible. In an effort to create an interoperability standard, Zend Technologies has started an open source initiative to create a common application program interface that will allow applications to be portable. The initiative is called the Simple API for Cloud Application Services (http://www.simplecloud.org/), and the effort has drawn interest from several major cloud computing companies. Among the founding supporters are IBM, Microsoft, Nivanix, Rackspace, and GoGrid.

Simple Cloud API has as its goal a set of common interfaces for:

File Storage Services: Currently Amazon S3, Windows Azure Blob Storage, Nirvanix, and Local storage is supported by the Storage API. There are plans to extend this API to Rackspace Cloud Files and GoGrid Cloud Storage.
Document Storage Services: Amazon SimpleDB and Windows Azure Table Storage are currently supported. Local document storage is planned.
Simple Queue Services: Amazon SQS, Windows Azure Queue Storage, and Local queue services are supported.
Zend intends to add the interface to their open source PHP Framework (http://www.framework.zend.com) as the Zend_Cloud framework component. Vendors such as Microsoft and IBM are supplying adapters that will use part of the Simple Cloud API for their cloud application services.

AppZero Virtual Application Appliance
Applications that run in datacenters are captive to the operating systems and hardware platforms that they run on. Many datacenters are a veritable Noah’s Ark of computing. So moving an application from one platform to another isn’t nearly as simple as moving a machine image from one system to another.

The situation is further complicated by the fact that applications are tightly coupled with the operating systems on which they run. An application running on Windows, for example, isn’t isolated from other applications. When the application loads, it often loads or uses different Dynamic Link Libraries (DLL), and it is through the sharing or modification of DLLs that Windows applications get themselves in trouble. Further modifications include modifying the registry during installation. These factors make it difficult to port applications from one platform to another without lots of careful work. If you are a Platform as a Service (PaaS) application developer, you are packaging a complete software stack that includes not only your application, but the operating system and application logic and rules as well. Vendor lock-in for you application is assured.

The ability to run an application from whatever platform you want is not one of the characteristics of cloud computing, but you can imagine that it is a very attractive proposition. While the Simple Cloud API is useful for applications written in PHP, other methods may be needed to make applications easily portable. One company working on this problem is AppZero (http://www.appzero.com/), and its solution is called the Virtual Application Appliance (VAA).

The AppZero solution creates a virtual application appliance as an architectural layer between the Windows or the UNIX operating system and applications. The virtualization layer serves as the mediator for file I/O, memory I/O, and application calls and response to DLLs, which has the effect of sandboxing the application. The running application in AppZero changes none of the registry entries or any of the files on the Windows Server.

VAA creates a container that encapsulates the application and all the application’s dependencies within a set of files; it is essentially an Application Image for a specific OS. Dependencies include DLL, service settings, necessary configuration files, registry entries, and machine and network settings. This container forms an installable server-side application stack that can be run after installation, but has no impact on the underlying operating system. VAAs are created using the AppZero Creator wizard, managed with the AppZero Admin tool, and may be installed using the AppZero Director, which creates a VAA runtime application. If desired, an application called AppZero Dissolve removes the VAA virtualization layer from the encapsulated application and installs that application directly into the operating system.

Note
Microsoft App-V (http://www.microsoft.com/windows/enterprise/products/mdop/app-v.aspx) and VMware ThinApp (http://www.vmware.com/products/thinapp/) are two application delivery platforms, but their main focus is on desktop installations and not on server deployment in the cloud.

Installations can be done over the network after the AppZero application appliance is installed. Therefore, with this system, you could run applications on the same Windows Server and eliminate one application from interfering with another; applications would be much more easily ported from one Windows system to another. AppZero’s approach provides the necessary abstraction layer that frees an application from its platform dependence.

An interesting use of VAAs involves segmenting an application into several VAAs, some of which are read-only runtime components, while others can be modified. When backing up or replicating VAAs in a cloud, you would need to synchronize only those VAAs that are modified. In many instances, the portion of an application that changes is only a very small component of large applications, which means that this technique can greatly reduce the amount of data required to replicate a VM in the cloud.

AppZero envisages using VAAs to create what it calls a stateless cloud. In a stateless cloud, the application’s state information is stored on a network share where it is available to run on different cloud systems as needed. This approach allows the cloud system to run with a VM containing a clean operating system (like AWS does now) and provisioned by the VAA. This approach should greatly reduce the number of complete system images that cloud vendors and cloud users should need to store to support their work; it also should make the running of applications on secure, well-performing VEs easier to achieve.

Summary
In this chapter, you learned about some of the more important characteristics of cloud computing networks and applications, including ubiquitousness and on-demand service. To enable a cloud service, you need to create a pool of resources you can call on. The key techniques for enabling this are abstraction and virtualization. Abstraction maps a logical identity or address to a physical identity or address. Changes to the underlying systems, therefore, do not affect the client requesting a service.

Several different methods for abstraction have been considered. A widely used technique is load balancing. With load balancing, system requests are directed to appropriate systems on demand. All large cloud networks use some form of load balancing. You learned about some of the details of Google’s load balancing for queries.

Another technology virtualizes hardware. You learned about the different types of hypervisors—software that can serve as a virtualization layer for operating systems accessing the underlying hardware. As an example of hardware virtualization VMware’s vSphere infrastructure was considered. vSphere can create virtual machines, virtual datastores, and virtual networks, and move these resources about while the system is active. vSphere is a potent cloud-building technology.

System imaging also can be useful in creating and instantiating machine instances. A brief explanation of Amazon Machine Instances was given.

Finally, the topic of application portability was considered. Applications are hard to move from platform to platform, because they are bound up with the operating system on which they run. Eventually, applications will be as portable as virtual machines. A cloud programming interface was described, as was an application delivery appliance.

In Chapter 6, “Capacity Planning,” the idea of system workloads is described. Understanding this concept allows you to scale your systems correctly, choose the right type of infrastructure, and do availability planning. Some of the key performance metrics for cloud computing “right sizing” are described.

LABOR LAW

LABOR LAW

Review the Union Organizing Case Study.

Research labor laws and legal cases on union organization in parking lots using online law libraries or other Internet sources of your choice.

Using the IRAC method (Issue, Rule, Analysis, Conclusion) of legal case analysis, analyze the case study by identifying the applicable rule of law(s) relevant to the case.

Explain in 100 words whether or not the storeowner may prohibit nonemployee union organizers from distributing leaflets in a shopping mall parking lot owned by the storeowner.
Explain in 200 words what Rule(s) (of law) apply in the third-person voice

ITCE 3200 Informational Interview

ITCE 3200 Informational Interview

Purpose
The purpose of this assignment is to practice interviewing and listening skills through an informational interview with a professional. An informational interview involves talking with people (and asking them predetermined career related questions) who are currently working in the field to gain a better understanding of an occupation or industry — and to build a network of contacts in that field.
Assignment
In this assignment you will do four things:
1. Create a professional email and send it to individuals you have identified to request an informational interview as part of your course studies (use letter writing concepts similar to a cover letter). You will need to submit in the dropbox one email including the reply from the person you will be interviewing who accepted your invitation. This email with the reply must be uploaded in the dropbox as a separate pdf file.
2. Interview one professional in person or via video call (ask about 5-6 questions, 20 minutes)
3. Write a brief reflective essay about the information you learned (1-2 pages of content not including the appendix list of questions, single spaced, 12-point font)
4. Create a professional “thank you” email and send it to the individual you met with as a sincere expression of gratitude (use letter writing concepts similar to a cover letters). The actual “thank you” email you sent (and if the person replied include that too) must be uploaded in the dropbox as a separate pdf file.
The person you choose to interview may not be someone with whom you already have an established relationship. They must be someone new to you, otherwise you are playing it safe and not expanding your professional network. Do not seek an interviewee who is a family member or personal friend. You may conduct a face-to-face interview (best) or in a Skype/video interview. As a last resort you may interview over the phone but you will lose points for a phone interview. You may not “interview” via email.
Narrative Essay
You will write a brief reflective essay as a narrative of your experience highlighting one or two key points that you found interesting as it relates to your consideration of this industry or job. The content of your essay will summarize and reflect upon your findings from the interview. Essays will be 1-2 pages (not including the appendix – your list of questions), single-spaced, 12-point font size with an introduction, body, conclusion, and an appendix. Your paper should contain:
Introduction:
• name of your informational interviewee
• their job title/position and the company they work for
• a brief description of his/her job or career field
• the reason why you chose to interview this person
• how you met and made the contact with this individual.
Body:
• Summary of the significant information you gained from your interviewee o What did you learn (include both positive and negative impressions)?
• Reflect on one or two items you learned /discovered from the informational interview
o How does this information fit or not fit your own interests, abilities, goals, values, skills etc.?
• Reflect on how the information you learned pertains to you, your future, and career interests o What do you still need to know about this industry/job? o What is one thing you will do as part of your career plan of action based on the information your learned in the informational interview?
Conclusion:
• Closing remarks and additional positive outcomes from your interview (e.g. did you get the name of another networking contact, did they offer to assist you in your job search, send you job postings, or offer to review your résumé)
• The impact this interview had on your career plan and pursuits Appendix:
• Include a list of questions you asked at the informational interview (not the answers, just questions)
Be sure to apply the concepts that we discussed in class when preparing your documents (read the
“Preparing for your Informational Interview” document on DC Connect and be sure to take the 60-minute tutorial). Also, make sure that you review the rubric carefully (next page), so you have a clear understanding of how your work will be assessed.

HIS 105: American History after 1865

HIS 105: American History after 1865

HIS 105: American History after 1865

Historical Event Influence” Please respond to the following: Please respond in a primary posting of at least 200 words. In addition, please make a substantive comment of at least 100 words to at least one [1] of your classmates.

Choose one (1) historical event and discuss the effect that it has had on you. Provide a rationale for your response

Polynomials

Polynomials

Polynomials
two PDFs of polynomials math study guide. If possible can you do a step by step so I can study from it. It’s highschool level

File #1
File #2

Section 4.1 ? Introduction to Polynomials and Polynomial Functions 4-1
Copyright © 2015 Pearson Education, Inc.
Polynomial Expressions
ESSENTIALS
A monomial is a constant or a constant times some variable or variables raised to powers
that are nonnegative integers.
A polynomial is a monomial or a combination of sums and/or differences of monomials.
Examples of polynomials in one variable: 3 2 4 , 2 1, 5 6 ay xx ? ? ?
Examples of polynomials in several variables: 72 2 3 2 ,2 3,5 6 4 x y x yx y z ? ??
The terms of a polynomial are separated by + signs.
Names for certain types of polynomials:
Type
Definition:
Polynomial of Examples
Monomial One term 2 48 2 53 3, 2 , 4 , 7 , 2 x ? ? y ab xyz
Binomial Two terms 22 2 2 3 3 5, , 6 7 , 4 x ?? ? ? a b x x x y xy
Trinomial Three terms 2 2 22 2
x ?? ? ? ? ? 6 9, 2 7 3 , 3 4 x a ab b x y xy xy
The coefficient is the part of a term that is a constant factor. A constant term is a term
that contains only a number and no variable.
The degree of a term is the sum of the exponents of the variables, if there are variables.
The degree of a polynomial is the same as the degree of its term of highest degree.
The leading term of a polynomial is the term of highest degree. Its coefficient is called
the leading coefficient.
Descending order: arrangement of terms so that exponents decrease from left to right.
Ascending order: arrangement of terms so that exponents increase from left to right.
Example
? Identify the terms, the degree of each term, and the degree of the polynomial
3 2 ? ? ?? 6 4 53. x x x Then identify the leading term, the leading coefficient, and the
constant term. Finally, write the polynomial in both descending and ascending order.

Descending order:
3 2 4 3 65 x ? x x ? ?
Ascending order:
2 3 56 3 4 ?? ? x x x
Term ?6x 3 4x 5 2 ?3x
Degree of term 1 3 0 2
Degree of polynomial 3
Leading term 3 4x
Leading Coefficient 4
Constant term 5
4-2 Section 4.1 ? Introduction to Polynomials and Polynomial Functions
Copyright © 2015 Pearson Education, Inc.
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Identify the terms, the degree of each term, and the
degree of the polynomial
5 39 ? ?? ? ? 6 2 4 12 10. y yy y Then identify the
leading term, the leading coefficient, and the
constant term.
Term 5 ?6y ?2y 3 ?4y
9 12y 10
Degree of
term 3 0
Degree of
polynomial
Leading
term
9 12y
Leading
Coefficient
Constant
term
Identify the terms, the degree of each
term, and the degree of the polynomial
473 12 7 6 8. yyy ? ? ? Then identify the
leading term, the leading coefficient,
and the constant term.
Term
Degree of
term
Degree of
polynomial
Leading
term
Leading
Coefficient
Constant
term
EXAMPLE 2 YOUR TURN 2
Consider 5 93 ? ? ? ?? 6 12 4 2 10. y yyy Arrange in
descending order and then in ascending order.
Descending order: 5 ? ? ?? 6 2 y y
Ascending order: 3 10 4 ? ?? ? y
Consider 473 12 7 6 8. yyy ? ? ?
Arrange in descending order and then
in ascending order.
Descending order:
Ascending order:
YOUR NOTES Write your questions and additional notes.
Section 4.1 ? Introduction to Polynomials and Polynomial Functions 4-3
Copyright © 2015 Pearson Education, Inc.
Evaluating Polynomial Functions
ESSENTIALS
To evaluate a polynomial, substitute a number for the variable.
Example
? For the polynomial function ? ? 4 Px x x ? ? ?? 2 3 1, find P?4 .?
? ?
?? ?? ??
? ?
4
4
2 31
4 24 34 1
2 256 12 1
512 12 1
501
Px x x
P
?? ? ?
?? ? ?
?? ? ?
?? ? ?
? ?
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
For the polynomial function
? ? 2 fx x x ? ?? 3 5 4, find f ? ? ?1 .
? ?
?? ?? ??
?? ? ?
2
2
3 54
1 31 51 4
31 5 1 4
5 4
? ??
?? ? ? ??
? ? ??
? ?? ?
fx x x
f
For the polynomial function
? ? 3 2 fx x x x ?? ? ? ? 6 4 2 10, find f ?2 .?
EXAMPLE 2 YOUR TURN 2
When an object is launched upward with an
initial velocity of 25 m/sec and from the top
of a bridge that is 30 m high, its altitude, in
meters, after t seconds is given by the
polynomial function ? ? 2 A t tt ?? ? 30 25 4.9 .
Find the altitude of the ball after 3 seconds.
We substitute 3 for t.
? ?
?? ?? ??
?? ??
2
2
30 25 4.9
3 30 25 3 4.9 3
30 25 3 4.9 9
30 75
m
At t t
A
?? ?
?? ?
?? ?
???
?
The polynomial function
? ? 3 2 Fx x x x ?? ? ? ? 0.00016 0.0096 0.367 10.8
can be used to estimate the fuel economy, in
miles per gallon (mpg), for a particular
vehicle traveling x miles per hour (mph).
What is the gas mileage for this vehicle at
40 mph?
YOUR NOTES Write your questions and additional notes.
4-4 Section 4.1 ? Introduction to Polynomials and Polynomial Functions
Copyright © 2015 Pearson Education, Inc.
Adding Polynomials
ESSENTIALS
Similar, or like, terms are terms that have the same variable(s) raised to the same
power(s).
Polynomials are added by combining, or collecting, like terms.
Example
? Add: ? ?? ? 3 32 ? ? ?? ? ? 4 5 3 6 2 7. xx xx
? ?? ? ? ? ? ? 3 32 32 32 ? ? ? ? ? ? ??? ? ? ? ? ? ? ? ? 4 5 3 6 2 7 46 2 5 37 2 2 5 4 xx xx xxx xxx
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Collect like terms: 2 2 2 12 11 3 15 6. xx xx ? ?? ? ?
? ? ? ?? ?
2 2
2
2 12 11 3 15 6
2 3 12 15 11 6
3
xx xx
x x
x
? ?? ? ?
? ? ? ? ?? ?
? ?
?
?
Collect like terms:
2 2 ?4 3 1 8 10 6. xx x x ? ?? ? ?
EXAMPLE 2 YOUR TURN 2
Add: ? ?? ? 3 33 3 4 2 5 6 5. x ? ?? ? ? xy y x xy y
? ?? ?
? ? ? ? ??
3 33 3
3 3
3
42 565
45 26 15
9
x xy y x xy y
x xy y
x
? ?? ? ?
? ? ??? ? ?
?
?
? ?
Add: ? ?
? ?
23 2 4
23 2 4
12 3 2
5 10 .
xy xy xy
x y xy xy
? ? ?
? ?
EXAMPLE 3 YOUR TURN 3
Add using columns:
? ?? ? 3 32 5 6 8 2 4 4. yy yy ? ? ?? ? ?
In order to use columns to add, we write the
polynomials one under the other, listing like terms
under one another and leaving spaces for missing
terms.
3 2
3 2
3
5 68 4
24 4
3 6
6
y y
y y
y y
y
y
? ?
?? ? ?
? ?
? ?
?
Add using columns:
? ? ? ? 43 4 5 2 5 7 3 10 . yy yy ? ?? ? ?
YOUR NOTES Write your questions and additional notes.
Section 4.1 ? Introduction to Polynomials and Polynomial Functions 4-5
Copyright © 2015 Pearson Education, Inc.
Subtracting Polynomials
ESSENTIALS
If the sum of two polynomials is 0, the polynomials are opposites, or additive inverses.
The Opposite of a Polynomial
The opposite of a polynomial P can be written as ?P or, equivalently, by replacing
each term in P with its opposite.
To subtract a polynomial, we add its opposite.
Examples
? Write two equivalent expressions for the opposite of 3 2 3 2 10 1. xx x ? ? ?
The opposite can be written with parentheses as ? ? 3 2 ? 3 2 10 1 . xx x ???
The opposite can be written without parentheses by replacing each term by its
opposite: 3 2 ?? ? ? 3 2 10 1. xx x
? Subtract: ? ? ? ? 2 2 ? ? ?? ? ? 4 3 1 10 6 8 . xx xx
? ?? ? ? ? ? ? 22 2 2
2 2
2
4 3 1 10 6 8 4 3 1 10 6 8
4 3 1 10 6 8
14 9 7
xx xx xx xx
xx xx
x x
? ? ? ? ? ? ?? ? ? ?? ? ?
?? ? ? ? ? ?
? ? ??
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Write two equivalent expressions for the
opposite of 2 3 2 4 12. x xy y ? ??
The opposite can be written with parentheses
as ? ? 2 ? ? ?? 3 2 4 12 . x xy y
The opposite can be written without
parentheses by replacing each term by its
opposite: 2 ?? ? ? 3 12. x
Write two equivalent expressions for the
opposite of 2 ? ??? 6 5 16 20. xy xy y
EXAMPLE 2 YOUR TURN 2
Subtract: ? ? ? ? 3 ? ? ?? ? 7 5 1 15 7 . x xy xy
We add the opposite of the polynomial being
subtracted.
? ? ? ?
? ? ? ?
3
3
3
7 5 1 15 7
7 5 1 15 7
7 5 1 15 7
10
x xy xy
x xy xy
x xy xy
xy
? ? ?? ?
?? ? ? ?? ?
?? ? ? ? ?
? ?
?
?
Subtract: ? ?? ? 2 33 2 33 6 5 8 3 11 . x xy x xy ? ?? ?
4-6 Section 4.1 ? Introduction to Polynomials and Polynomial Functions
Copyright © 2015 Pearson Education, Inc.
EXAMPLE 3 YOUR TURN 3
Subtract: 1 51 3 31 2 2 . 4 82 4 82
xx xx
? ?? ? ? ?? ? ??? ?? ? ?? ?
2 2
2 2
2
2
1 51 3 31
4 82 4 82
1 51 3 3
4 82 4 8
1 51 31
4 82 82
2 8 1
4 8
xx xx
xx xx
xx x
x x
x
? ?? ? ? ?? ? ??? ?? ? ?? ?
? ? ? ? ? ? ? ?? ? ? ? ? ? ? ? ? ? ?
? ? ?? ? ?
?? ? ?
? ??
Subtract:
7 25 2 11 2 2 . 9 36 9 36
xx xx
? ?? ? ? ?? ? ? ? ?? ? ? ? ?? ?
YOUR NOTES
Write your questions and additional notes.
Section 4.1 ? Introduction to Polynomials and Polynomial Functions 4-7
Copyright © 2015 Pearson Education, Inc.
Practice Exercises
Readiness Check
Choose the word, number, or expression that best completes each statement.
1. The expression 2 4 2 x ? is a __________________ with a leading coefficient of
binomial / trinomial
_____. The degree of the term 2 is _____.
2 / 4 0 / 2
2. The degree of the polynomial 2 2 ?3 5 10 4 xy xyz xy ? ?? is _____. The leading
2 / 4
coefficient is ______. The polynomial has _____ terms.
5 / 3 ? 4 / 3
3. The polynomial 2 ?? ? 12 3 15 x x is written in ____________________ order.
ascending / descending
4. To add or subtract polynomials you must add or subtract ____________________.
like terms / exponents
Polynomial Expressions
Identify the terms, the degree of each term, and the degree of the polynomial. Then identify
the leading term, the leading coefficient, and the constant term.
5. 3 4 ? ? ?? 6 83 x x x 6. 473 5 12 6 3 2 ? x ??? xxx 7. 2 ?? ? ? 36 27 xy xyz x
Arrange in descending powers of x.
8. 4 2 15 3 2 ??? x x x 9. 2 63 4 3 12 8 10 xx x x ? ? ??
Arrange in ascending powers of y.
10. 24 3 2 39 yy y ?? ? 11. 2 432 3 5 26 x y xy x y ? ??
Evaluating Polynomial Functions
Find f ? ? 5 and f ??1? for each polynomial function.
12. ? ? 3 2 fx x x ?? ? 4 12 20 13. ? ? 2 3 f x xx ?? ? 43 5
4-8 Section 4.1 ? Introduction to Polynomials and Polynomial Functions
Copyright © 2015 Pearson Education, Inc.
14. A firm determines that, when it sells x tablet computers, its total revenue, in dollars, is
? ? 2 Rx x x ? ? 280 0.4 . What is the total revenue from the sale of 62 tablet computers?
Adding Polynomials
Collect like terms to write an equivalent expression.
15. 3 9 34 2 4 7 x xx x ?? ? ? ? 16. 22 3 22 3 ? ?? ? 4 5 9 15 x y x xy x
Add.
17. ? ?? ? 2 835 2 xyz x y xy xyz xy ? ? ?? ? 18. ? ? ? ? ? ? 2 22 3 2 5 84 7 xx x x ? ?? ? ? ?
Subtracting Polynomials
Write two expressions, one with parentheses and one without, for the opposite of each
polynomial.
19. 43 2 9325 xxx ?? ? 20. 2 2 ?12 7 6 xy x y xyz ? ??

Subtract.
21. ? ?? ? 2 2 4 52 2 49 xx xx ? ?? ? ? 22. ? ? ? ? 3 2 32 7 4 5 3 17 a a aa ? ? ?? ? ?
23. ? ?? ? 7 2 22 7 6 2 32 x yz x y z x x x yz ? ??? 24. ? ? ? ? 5 5 ? ? ? ?? 2 12 7 15 13 x xy x
Section 4.2 ? Multiplication of Polynomials 4-9
Copyright © 2015 Pearson Education, Inc.
Multiplication of Any Two Polynomials
ESSENTIALS
Multiplying Monomials:
To multiply two monomials, multiply the coefficients and multiply the variables using
the rules for exponents and the commutative and associative laws.
Multiplying Monomials and Binomials:
The distributive law is used to multiply polynomials other than monomials.
Multiplying Binomials:
To multiply binomials use the distributive law twice, first consider one of the binomials
as a single expression and multiply it by each term of the other binomial.

Multiplying Any Two Polynomials:
To find the product of two polynomials P and Q, multiply each term of P by every term
of Q and then collect like terms.
Examples
? Multiply: ? ?? ? 34 22 5 3. x y xy ?
? ?? ? ? ? 34 22 3 2 4 2
32 42
5 6
5 3 53
15
15
x y xy x x y y
x y
x y
? ?
? ? ?? ? ? ? ?
?? ?
? ?
? Multiply: 4 5 2. x x ? ? ?
? ?
2
4 5 2 4 5 4 2 Using the distributive law
20 8 Multiplying monomials
xx xx x
x x
?????
? ?
? Multiply: ? ?? ? 2 2
x x ? ? 1 2 3.
? ?? ? ? ? ? ?
? ?? ?
2 2 2 22 2
22 2
22 2 2
422
4 2
1 2 3 1 2 1 3 Distributing the 1
2 1 3 1 Using a commutative law
2 2 1 3 3 1 Using the distributive law twice
2 2 3 3 Multiplying monomials
2 3 Collecting like terms
x x x xx x
xx x
xx x x
xxx
x x
? ?? ? ? ? ?
? ?? ?
? ? ? ?? ? ? ?
? ???
? ??
? Multiply: ? ?? ? 3 2
xx x ?? ? 4 5 3.
? ?? ? ? ?? ? ? ?? ?
?? ?? ?? ?? ?? ??
32 32 32
3 2 32
43 3 2
43 2
4 5 3 4 5 4 53
4 5 3 4 3 53
4 5 3 12 15
12 5 15
x x x x x xx x
xx xx x x x
x x xx x
xx x x
? ? ?? ? ? ? ? ?
? ? ?? ? ?
?? ?? ? ?
??? ??
4-10 Section 4.2 ? Multiplication of Polynomials
Copyright © 2015 Pearson Education, Inc.
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Multiply and simpify: ? ?? ? 23 5 ?7 3. a bc abc
? ?? ? 23 5 2 35
11 3 5
7 3 73
21
a bc abc a a b b c c
a bc ? ? ?
? ?? ? ? ? ? ? ? ?
?? ? ? ?
?
Multiply and simplify:
? ?? ? 35 4 12 4 . a b c a bc ?
EXAMPLE 2 YOUR TURN 2
Multiply: ? ? 23 4 24 5. aa a ?
? ? 23 4 23 4
3
24 5 24 5
8
aa a aa a
a
? ??? ?
? ?
Multiply: ? ? 3 9 4 8. a a ?
EXAMPLE 3 YOUR TURN 3
Multiply: ? ?? ? 2 3 x x ? ? 5 2.
? ?? ? ? ? ? ?? ?
? ?? ?
2 3 2 32
32 2
32 3
5 2 5 52
52 5
2 25
x x x xx
xx x
xx x
? ?? ? ? ? ?
? ?? ?
? ? ? ? ?? ??
?
Multiply: ? ?? ? 4 5 x x ? ? 1 3 6.
EXAMPLE 4 YOUR TURN 4
Multiply: ? ?? ? 3 2 3 2 2 2 4 5. xx xx ?? ? ??
5 4
3
2
3
4
5 32
2
5 3
4
12 12
15 1 10
1
3 22
2 45
15 10 10
12 8
2 1 1 10 10 4 4
xx x
x
x x
x x
x x
x
x x
x x
x xx
?
?
? ?
?
???
?? ?
? ?
? ?
? ?
? ?? ? ?
Multiply: ? ?? ? 3 2 2 4 6 5 1. x x xx ? ? ? ??
YOUR NOTES Write your questions and additional notes.
Section 4.2 ? Multiplication of Polynomials 4-11
Copyright © 2015 Pearson Education, Inc.
Product of Two Binomials Using the FOIL Method
ESSENTIALS
The FOIL Method
To multiply two binomials ? A? B? and ?C D? ?:
1. Multiply First terms: AC
2. Multiply Outer terms: AD
3. Multiply Inner terms: BC
4. Multiply Last terms: BD
FOIL
?
? ?? ? A? ?? ? ? ? B C D AC AD BC BD
Example
? Multiply: ? ?? ? x x ? ? 6 3.
? ?? ? 2
2
6 3 3 6 18 FOIL
3 18 Collecting like terms
x x x xx
x x
? ?? ?? ?
???
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Multiply: ? ?? ? 2 1 4 5. x x ? ??
? ?? ? 2 2145 8 45 x ? ? ? ?? ? ? ? xx x
?
Multiply: ?3 6 6 2. x x ? ?? ? ?
EXAMPLE 2 YOUR TURN 2
Multiply: ? ?? ?? ? mm m ?? ? 1 4 7.
? ?? ?? ?
? ?? ?
? ?? ?
? ?? ?? ?
2
2
2 2
2
147
4 47
4 7
3 4 3 47
3 4 21 28
mm m
m mm m
m m
m m mm m
mm m
?? ?
? ? ?? ?
?? ? ?
? ? ? ?? ? ? ?
? ? ?? ? ?
?
?
Multiply: ?mmm ?8 5 4. ?? ? ? ?? ?
YOUR NOTES Write your questions and additional notes.
4-12 Section 4.2 ? Multiplication of Polynomials
Copyright © 2015 Pearson Education, Inc.
Squares of Binomials
ESSENTIALS
Squaring a Binomial
? ?
? ?
2 2 2
2 2 2
2
2
A B A AB B
A B A AB B
? ?? ?
? ?? ?
Trinomials of the form 2 2 A AB B ? ? 2 or 2 2 A AB B ? 2 ? are called trinomial squares.
Example
? Multiply: ? ?2
x ? 4 .
? ?
? ?
2 2 2
2 2 2
2
2
4 2 44
8 16
A B A AB B
x xx
x x
? ? ?? ? ?
? ? ? ?? ?
? ? ??? ?
???
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Multiply: ? ?2
4 6. y ?
? ? ?? 2 2 2 4 6 4 24 6 6 y yy ? ? ?? ??
?
Multiply: ? ?2
? ? 3 5. y
EXAMPLE 2 YOUR TURN 2
Multiply:
2
1 2 .
4
x
? ? ? ? ? ? ?
2 2 1 11 2 2 2 22
4 44
x xx
? ?? ? ? ?? ? ? ? ?? ?? ? ?? ?
?
Multiply:
2
1 5 .
2
x
? ? ? ? ? ? ?
YOUR NOTES Write your questions and additional notes.
Section 4.2 ? Multiplication of Polynomials 4-13
Copyright © 2015 Pearson Education, Inc.
Products of Sums and Differences
ESSENTIALS
The Product of a Sum and a Difference
? ?? ? 2 2 A? ??? BAB A B
The product of the sum and the difference of the same two terms is called a difference of
squares.
Example
? Multiply: ? ?? ? x x ? ? 3 3.
? ?? ?
? ?? ?
2 2
2 2
2
33 3
9
A BAB A B
xx x
x
? ???
???? ? ?
? ???
? ?
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Multiply: ? ?? ? 2 4 2 4. xy x xy x ? ?
? ?? ? ? ? ? ? 2 2 2 42 4 2 4 xy x xy x xy x ? ?? ?
?
Multiply: ? ?? ? 2 2 5 1 5 1. xy xy ? ?
EXAMPLE 2 YOUR TURN 2
Multiply: ? ?? ? 0.3 2.1 0.3 2.1 . mnmn ? ?
? ?? ? ? ? ? ? 2 2 0.3 2.1 0.3 2.1 0.3 2.1 mnmn m n ? ?? ?
?
Multiply: ?0.6 1.2 0.6 1.2 . x ? ? yxy ?? ?
4-14 Section 4.2 ? Multiplication of Polynomials
Copyright © 2015 Pearson Education, Inc.
YOUR NOTES Write your questions and additional notes.
Section 4.2 ? Multiplication of Polynomials 4-15
Copyright © 2015 Pearson Education, Inc.
Using Function Notation
ESSENTIALS
Example
? Given ? ? 2 fx x x ??? 6 7, find (a) f t? ? ?10 and (b) f t? ?10 .?
a) ? ? 2 fx x x ??? 6 7
? ? ? ? ? ? 2
2
10 6 7 10 Evaluating
6 17 Simplifying
f t t t ft
t t
? ? ???
???
b) ? ? 2 fx x x ??? 6 7
? ?? ? ? ? ? ? 2
2
2
10 10 6 10 7 Substituting 10 for
20 100 6 60 7 Multiplying
14 33 Simplifying
f tt t t x
tt t
t t
? ?? ? ? ? ?
?? ? ?? ?
?? ?
GUIDED LEARNING
EXAMPLE 1 YOUR TURN 1
Given ? ? 2 fx x ? ? 2 3, find (a) f a? ? ?1;
(b) f a? ? ?1 .
a) ? ?
? ? ? ?
2
2
2
2 3
1 2 31
2 4
fx x
fa a
a
? ?
?? ? ?
? ?
b) ? ?
? ?? ?
? ?
3
2
2
2 3
12 1 3
2 3
24 3
fx x
fa a
a a
? ?
?? ? ?
? ?
? ?? ?
?
Given ? ? 2 f xx x ? ? 5 , find (a) f a? ? ? 4;
(b) f a? ? 4 .?
4-16 Section 4.2 ? Multiplication of Polynomials
Copyright © 2015 Pearson Education, Inc.
EXAMPLE 2 YOUR TURN 2
Given ? ? 2 3
g x xy ? ? 3 2, find gx gx ? ?? ? ?.
?? ?? ? ?? ?
? ?
? ?
23 23
2 2 3
23 2
3 23 2
3 2
23 22
g x g x xy xy
x y
x y
?? ? ?
? ?
? ?? ??
?
Given ? ? 2 6
g x xy ? 4 3, ? find gx gx ? ?? ? ?.
YOUR NOTES Write your questions and additional notes.
Section 4.2 ? Multiplication of Polynomials 4-17
Copyright © 2015 Pearson Education, Inc.
Practice Exercises
Readiness Check
Classify each of the following statements as either true or false.
1. FOIL can be used whenever two binomials are multiplied.
2. Given fx x ? ? ? ? 2 1, fy fy ? ? ?? ? 8 8. ? ?
3. A trinomial square is of the form 2 2 A ? B .
4. When multiplying polynomials, the distributive law can always be used.
Multiplying Monomials
Multiply.
5. 5 3 2 4 x ? x 6. ? ?? ? 67 22 ? ? 5 3 x y xy 7. ? ?? ? 4 2 ?9 3 abc a bc
Multiplying Monomials and Binomials
Multiply.
8. 64 2 ? ? x? 9. ? ? 2 43 7 aa a ? ? 10. ? ? 23 4 57 6 xy xy xy ? ?
Multiplying Any Two Polynomials
Multiply.
11. ? ?? ? 2 35 1 x x ? ? 12. ? ?? ? 2
x xx ? 5 2 ? ? 13. ? ?? ? 2
x xx ? ?? 43 5
The Product of Two Binomials: FOIL
Multiply.
14. 1 1
6 2
x x
? ?? ? ? ?? ? ? ? ? ?? ? 15. ?4 23 1 x x ? ?? ? ? 16. ? ?? ? 1.3 3 2.4 5 x x ? ?
4-18 Section 4.2 ? Multiplication of Polynomials
Copyright © 2015 Pearson Education, Inc.
Squares of Binomials
Multiply.
17. ? ?2
x ? 6 18. ? ?2
2 3 x ? y 19. ? ?
2 3
x y ? 2
Products of Sums and Differences
Multiply.
20. ? ?? ? a a ? ? 10 10 21. ? ? 36 36 ? ? x ? x? 22. ? ?? ? 2 2 ?? ? 4 4 ab ab
Function Notation
23. Let Px x ? ? ? ? 2 5 and
? ? 2 Qx x x ? ?? 4 3 1.
Find Px Qx ?? ?? ? .
24. Given ? ? 2 fx x x ? ? ? 3 9, find
f t? ? 4 .?
25. Given ? ? 2 fx x ? ? 2 3, find
f ?a h ? ?.
26. Given ? ? 2 f x xx ?? ? 64 , find
f a? ? ? 7.

the SQ3R concept

the SQ3R concept

By using the SQ3R concept, read and evaluate your article and answer two questions.

1. Did I learn anything new? Explain.
2. What, if any, part of the SQ3R concept helped you in anyway? Explain.

•Irrigation modernization has greatly changed the land structure in the District.•Irrigation modernization has improved the irrigation efficiency.•Irrigation modernization has reduced the irrigation labor cost and increased the energy cost.•Availability of real-time irrigation consumption data provided by remote control.•Analyses of remote control data to optimize water and energy use efficiency.

An important modernization process providing pressurized irrigation systems to the traditional surface irrigation districts has taken place in Spain over the last 20 years However, an adverse consequence of modernization is the important increase in the energy cost in the modernized irrigation districts, which is aggravated by the current high energy prices. The Almudévar irrigation district (AID), a traditional surface irrigation district, was transformed into a pressurized sprinkler irrigation system in late 2010. The irrigation network was equipped with a high-level telemetry and remote control system that reaches the hydraulic valves of the irrigated blocks into which the plots are divided. Therefore, the telemetry system enables the centralized management of the irrigation scheduling from the district office. The district is divided into four independent networks with their own reservoirs and electric pump stations. A comparison of the land structure, crop patterns and irrigation management between the modernized AID in 2011 and the pre-modernization AID in 2006-2008 was performed. The temporal evolution of the irrigation water and energy demands in the 2011 irrigation season was analyzed with the available telemetry data from 2011. An irrigation performance index (SIPI) of the monthly and seasonal frequencies was computed for the main crops of the AID. Most irrigation events were performed during the low electricity tariff periods (P6 electric tariff) due to the centralized irrigation scheduling. Meteorological constraints had a low incidence in irrigation scheduling. Generally, a slight decrease in total irrigation deliveries was observed before and after medium-to-large precipitation events, but no changes in irrigation deliveries was observed with increases in wind speed. The exploitation of telemetry data in the AID has been an important tool to optimize the contracted electricity power in each tariff period and in decreasing the electric bill of the AID. This type of telemetry data analysis, similar to the analysis performed in the modernized AID in 2011, could be used in other water use associations as an important decision-making tool to improve water and energy management and to control the irrigation cost.

human service

human service

Points to Consider in Human Services Delivery
The Irony of Human Services

Read these introductory materials carefully, as they form the basis of the assignments and discussions that follow.

Yeheskel Hasenfeld

Click the image to review Hasenfeld’s Reality: What A Concept! Ten Concepts from Human Services as Complex Organizations

In order to effectively develop components in the human service delivery system it is important to understand the characteristics of human service organizations. Yeheskel Hasenfeld in an article, “The Nature of Human Service Organizations,” discusses the types of work that are transacted in these organizations. Hasenfeld introduces us to familiar human service organizations as those that provide services to people in need. Institutions such as hospitals, schools, mental health centers and welfare departments are examples of such entities.

Hasenfeld notes an essential irony in these human services organizations. In outward form and manifestations, the human service agency embodies the values of caring and commitment to human welfare through effective and timely response to client needs. However, in practical terms, the human service organization is often a formidable bureaucracy, burdened by incomprehensible rules and regulations that impede the delivery of services. This course is designed to help you effectively respond to human needs within the constraints of bureaucratic requirements.

Halley: Learning the Language of Human Services

In the Halley text, the discussions move from the theoretical to the pragmatic and focus on the steps the practitioners go through in a learning process that focuses on the awareness of the skills and knowledge that are necessary to properly deliver services to clients in need.

The readings and exercises in the introductory portion prepare you to understand and implement practice elements that are needed to respond to the client’s service needs. Many of the interactions that human service workers and clients enter into require listening, reading, observation, and analytical skills. The focus of this section is to concentrate on learning the language and systems necessary to manage work and competent practice. The readings and exercises will heighten your awareness of your role as practitioner in complex and sometimes confusing systems.

Halley’s third lesson in Chapter One introduces systems approach as a way of thinking about delivering human services. (See the videos on this module’s Media Section for descriptions of systems thinking.) There are several ways Human Service systems can be analyzed when using systems thinking. Halley reviews human service systems from the perspective of single social institutions, as subsystems of programs, as areas of functioning, as networks of agencies and based upon approaches to service delivery. Institutions, agencies and consumers themselves are all systems, which can be analyzed using this method. We are all a part of several systems and systems thinking means recognizing the interrelatedness of these parts. Consumers are also connected to multiple systems and a systems thinking approach means the human services worker looks at a consumer holistically, as a person connected to multiple systems.

Changes in Case Management

Dr. Kenneth B. Clark, a New York psychologist and educator, is shown at a staff meeting of the North Side Center for Child Development he founded, in Harlem, NYC, 11/9/1965. Earlier this year Dr. Clarke resigned from the Harlem Youth Opportunities Unlimited program, stating it was becoming a political vehicle.The program provided guidelines for President Johnson’s War on Poverty initiative. (AP Photo)

Case Management is a central ingredient in the delivery of human services that provides the linkage between the client, and the agency or program that will meet the client’s needs. The case manager furnishes direction and leadership in an effort to deliver quality services. Norma Raiff (1993) in her discussion of case management, states that case management is a major activity that is critically important to the delivery of human services.

The majority of professionals involved in the delivery of services have recognized the importance of case management. Despite that recognition, they have not always used it effectively as a link to the client’s needs. Raiff begins the discussion of case management by defining it. In the “new case management paradigm,” Raiff introduces terminology, which relates to components and models of service delivery that have emerged in the past two decades. Landmark movements like the War on Poverty, and the Model Cities programs of the 1960’s brought the issue of fragmentation and inaccessibility of human services programs to national conscientiousness. In the 1970’s, service integration became the key ingredient of case management. At that time, “information and referral” became two of the key components of service for people in need. Large multi-service agencies grew out of this era, and have been a major part of the service delivery system ever since.

After these innovations were introduced, there was an effort to develop methods to focus on the “hard to reach” clients. These “treatment resistant” groups caused the professionals in the field to rethink old models. This effort caused the birth of new forms of case management such as Intensive Case Management. managed care and other alternative delivery systems that dominate the delivery system emerged from these intensive case management efforts. With the onset of these new forms of client triage and management, case management has taken on a new perspective. While case management is critically important, its content and application have had to be adapted to respond to the new and sometimes complex infrastructures have been developed to accommodate new reimbursement and funding methodology.

Core Tasks of Case Management

Core Tasks of Case Management

Norma Raiff and Barbara Shore (1993) in a textbook used for this course in the past, list six core tasks of case managers. Although this textbook is now fourteen years old, the core tasks of case management remain the same although the list has been modified by McKnight (2007) to reflect the recent emphasis on outcomes based assessment. It should be noted that although the term “client” generally refers to an individual, it may also refer to a couple, a family, a small group, an organization, a neighborhood or community, or a self-identified category such as alcoholics, parents of small children, etc.
A word cloud created from the text of this page. The larger the word, the more frequently it appears(and by implication the more important it is).

The six core tasks are:

1. Assessment: To ensure adequate understanding of the client’s strengths, weaknesses, values, goals, and interpersonal environment

• Collection of information on clients’ needs and resources including resources within the family and community

• Establishment of a baseline status by observation and contact with other service providers (observing appropriate rules of confidentiality)

• Conduct formal assessments

• Collect ancillary information as appropriate

• Integrate case management assessment with clinical and testing data

2. Service Planning To plan appropriate services with the active participation of the client

• Ensure client input and feedback

• Set long and short term goals compatible with the client’s values and strengths

• Consult with multidisciplinary team for input and review

• Establish who (staff, client, other) is responsible for specific functions

• Establish clear criteria for success

• Establish timeline for objectives and plan review

• Establish crisis plan in advance

• Develop a cycle of service planning review with the client.

3. Implementation To assure optimum outcomes based on client needs

• Maximize client autonomy in making contacts, keeping appointments, and following through with service plan

• Provide direct counseling and support to empower clients to participate in services

• Contact and broker individually tailored “wrap-around” services

• Provide crisis services, if needed

• Discuss progress regularly with client and make changes as needed.

4. Systems Coordination To monitor the various service systems involved in the service plan. To make corrections as needed

• Identify key systems involved in service plan including internal agency services, other formal human services organizations, community systems, family supports, and other formal or informal support systems available to the client.

• Develop/clarify purchase of service control and authority.

• Develop a joint process for client and case manager evaluation of each system as implementation unfolds.

• With client jointly monitor service provision for appropriateness, quantity, quality, intensity, and efficacy.

• Systematically document unmet needs in services/resources.

• Monitor outcomes in measurable terms such as client’s/case manager’s perceptions of client quality of life, crisis events, acute/long term care requirements, overall client satisfaction.

• Monitor cost of services.

• Monitor client utilization of services and reasons for non-compliance (i.e. missed appointments, failure to follow through on recommended treatment options, etc.).

• Work with client to identify and “unblock” barriers to compliance.

• Follow-up with service providers as well as with client to assure expectations of each are being met (being careful to maintain client confidentiality).

5. Advocacy Advocacy involves both enabling individual clients to obtain deserved services and whole categories of clients to receive needed services. Case managers have a responsibility in both areas.

Case Advocacy: To enable clients to receive needed services.

• Explain client’s perspective to others

• Appropriately intervene on client’s behalf

• Help client collect evidence of need and qualify for benefits

• Support client attendance at self-advocacy training

• Role play self-advocacy with the client.

Class Advocacy

• Define group or “class” in need of advocacy

• Document need using accepted social science research methods

• Provide accurate information for needs assessments

• Staff an advocacy committee or group

• Identify effective community leaders and resources

• Facilitate community groups

6. Termination typically takes two forms: transfer to another case manager or completion of services

Case Transfer

• Help client assess continuing need for services and their intensity

• Provide (and/or brainstorm) options for meaningful choice

• Schedule transition meetings with yourself, client, and new case manager

Termination

• Allow time for termination and processing experiences

• Help client assess options and maximize choices with emphasis on client-generated plans

• Allow ventilation of feelings (expect feelings of abandonment, fear, loneliness, relief, etc.)

• Mutually review progress and goal achievement

• Celebrate successes

• Follow-up as needed and appropriate

• Be careful of encouraging on-going dependency

Raiff and Shore (1993) edited by McKnight (2007)

M1 Media Resources

Systems Thinking Videos

This Systems Thinking video was produced by the University of South Australia.

Systems Thinking – Text

Systems thinking explores how separate parts work together as a whole. It’s a way of looking at the world, where everything works as a system of systems.

In this line of thinking, every system is made up of smaller systems. For example, a lake is composed of the chemical systems of the water, but also biological systems of plants and fish.

Conversely, every system is also part of a larger system. For example, our lake is also part of an ecological system weather patterns, mountains, plants, animals and watershed. This ecological system is also part of a larger social system of a resort community composed of vacationers and townspeople. Additionally, all of these local systems interact with and within larger political, economic and ecological systems.

This complex relationship of systems is called an environment. Environments are dynamic, which means they are constantly changing. A change in any one system can have a ripple effect on all the other systems that make up the environment. For example, waste water from the watershed can cause a change in the chemical composition of the lake that may kill off a number of plants, which may decrease the population of the fish, which may discourage vacationers from coming to the lake, which then may depress the economy of the town.

Systems thinking views the world as a system of systems. Each system is made up of a number of smaller systems; while at the same time is part of a number of larger systems. Consumers are always part of multiple systems.


Systems Thinking and Systems Coordination

Systems Thinking is an approach to problem solving that looks at all of the parts of system and examines the relationship of these parts. The goal is to see the larger picture rather than narrowly focusing on one element of the problem. When working with consumers, using a systems thinking approach means attempting to understand more than a single issue or problem. 

Systems Coordination is one of the tasks of case management that involves monitoring the various service systems that a consumer is involved with. A consumer may be referred to different agencies for help with different types of problems. Perhaps the consumer has a housing problem and mental health problem and a child care problem. The role of the human services worker is to not just make referrals to agencies to assist the consumer but to coordinate and monitor the consumer’s progress with all of these systems.

STATISTICAL ANALYSIS FOR MANAGERS

STATISTICAL ANALYSIS FOR MANAGERS

STATISTICAL ANALYSIS FOR MANAGERS
only 16 questions

1. For some positive value of Z, the probability that a standard normal variable is between 0 and Z is 0.3770. The value of Z is:

a. 0.18

b. 0.81

c. 1.16

d. 1.47

-2-

2. If we know that the length of time it takes a college student to find a parking spot on central campus follows a normal distribution with a mean of 3.5 minutes and a standard deviation of 1 minute, find the probability that a randomly selected college student will find a parking spot in less than 3 minutes.

a. 0.3551

b. 0.3085

c. 0.2674

d. 0.1915

3. Given the data above, find the probability that a randomly selected college student will take between 2 and 4.5 minutes to find a parking spot.

a. 0.0919

b. 0.2255

c. 0.4938

d. 0.7745

4. Given the data above, find the point in the distribution that 75.8% of the college students exceed when trying to find a parking spot.

a. 2.8 minutes.

b. 3.2 minutes.

c. 3.4 minutes.

d. 4.2 minutes.

5. The owner of a fish market determined that the average weight for a catfish is 3.2 pounds with a standard deviation of 0.8 pound. A citation catfish should be one of the top 2% in weight. Assuming the weights of catfish are normally distributed, at what weight ( in pounds ) should the citation designation be established?

a. 1.56 pounds.

b. 4.84 pounds.

c. 5.20 pounds.

d. 7.36 pounds.

6. Suppose a sample of n = 50 items is drawn from a population of manufactured products and the weight, X, of each item is recorded. Prior experience has shown that the weight has a probability distribution with µ = 6 ounces and s = 2.5 ounces. Which of the following is true about the sampling distribution of the sample mean if a sample of size “15” is selected?

a. the mean of the sampling distribution is 6 ounces.

b. the standard deviation of the sampling distribution is 2.5 ounces.

c. the shape of the sample distribution is approximately normal.

d. all of the above are correct.

7. At a computer manufacturing company, the actual size of computer chips is normally distributed with a mean of 1 centimeter and a standard deviation of 0.1 centimeter. A random sample of 12 computer chips is taken. What is the standard error for the sample mean?

a. 0.029

b. 0.050

c. 0.091

d. 0.120

8. The owner of a fish market has an assistant who has determined that the weights of catfish are normally distributed, with mean of 3.2 pounds and standard deviation of 0.8 pound. If a sample of 64 fish yields a mean of 3.4 pounds, what is the probability of obtaining a sample mean this large or larger?

a. 0.0001

b. 0.0013

c. 0.0228

d. 0.4987

-5-

9. The standard error of the mean for a sample of 100 is 30. In order to cut the standard error of the mean to “15”, we would:

a. increase the sample size to 200.

b. increase the sample size to 400.

c. decrease the sample size to 50.

d. decrease the sample size to 25.

44. The amount of bleach that a machine pours into bottles has a mean

of 36 ounces with a standard deviation of 0.15 ounces. Suppose we

take a random sample of 36 bottles filled by this machine.

The probability that the mean of the sample is between 35.94 and

36.06 ounces is 0.9836 .

TRUE FALSE

Problems ( Fill In The Blank )

The amount of time necessary for assembly line workers to complete a product is a normal random variable with a mean of fifteen ( 15 ) minutes and a standard deviation of two ( 2 ) minutes.

Requirement:

1) What is the probability that a product is assembled in less than 12 minutes?

______________

2) What is the probability that a product is assembled between 14 and 16 minutes?

______________

3) What is the probability that a product is assembled between 10 and 12 minutes?

______________

-10-

4) What is the probability that a product is assembled in more than 11 minutes?

______________

5) What is the probability that a product is assembled in less than 20 minutes?

______________

6) Within how many minutes would 70% of the products be assembled?