Tuesday, August 25, 2020

Davis Surname Meaning and Origin

Davis Surname Meaning and Origin Davis is the eighth most regular family name in America and one of the 100 most basic last names in both England and Wales. Last name Origin: Welsh, English Interchange Surname Spellings: Davies (Welsh), David, Davidson, Davison, Daves, Dawson, Dawes, Day, Dakin I'm not catching Davis' meaning? Davis is a typical patronymic last name with Welsh roots meaning child of David, a given name that implies dearest. Fun Facts In the United States, Davis is one of the ten most basic family names. The variation Davies, in any case, is scarcely in the best 1,000 most regular last names. In Great Britain, this last name ubiquity is turned around. There, Davies is the sixth most normal family name in general, while Davis is the 45th most basic last name. Where Do People Named Davis Live? As indicated by WorldNames PublicProfiler, the Davis family name is most normally found in the United States, particularly in the southern conditions of Alabama, Mississippi, Arkansas, South Carolina, and Tennessee. It is additionally a typical last name in Australia, the United Kingdom (particularly southern England), New Zealand, and Canada. Progenitors positions Davis as the 320th most basic last name on the planet, with the most elevated numbers found in Jamaica, Anguilla, and the Bahamas, trailed by the U.S., Liberia, and Australia. Celebrated People with the Surname Davis Jefferson Davis, President of the Confederate States of America.Miles Davis, compelling American jazz artist.Angela Davis, political scholar and dark force activist.Captain Howell Davis, Welsh pirate.Sammy Davis Jr., American entertainer.General Benjamin O. Davis,â leader of the Tuskegee Airmen during World War II.William Morris Davis, father of American geology. Sources Beider, Alexander. A Dictionary of Jewish Surnames from Galicia. Avotaynu, June 1, 2004. Cottle, Basil. The Penguin Dictionary of Surnames. (Penguin Reference Books), Paperback, second Edition, Puffin, August 7, 1984. Davis Surname Definition. Ancestors, 2012. Hanks, Patrick. A Dictionary of Surnames. Flavia Hodges, Oxford University Press, February 23, 1989. Hanks, Patrick. Word reference of American Family Names. first Edition, Oxford University Press, May 8, 2003. Hoffman, William F. Clean Surnames: Origins and Meanings. First Edition, Polish Genealogical Society, June 1, 1993. Menk, Lars. A Dictionary of German Jewish Surnames. Hardcover, Bilingual version, Avotaynu, May 30, 2005. Rymut, Kazimierz. Nazwiska Polakow. Hardcover, Zaklad Narodowy im. Ossoliå„skich, 1991. Smith, Elsdon Coles. American Surnames. first Edition, Chilton Book Co, June 1, 1969.

Saturday, August 22, 2020

How the Prologue in Romeo and Juliet Prepares the Audience for the Play Essay Example

How the Prologue in Romeo and Juliet Prepares the Audience for the Play Essay Example How the Prologue in Romeo and Juliet Prepares the Audience for the Play Essay How the Prologue in Romeo and Juliet Prepares the Audience for the Play Essay The preamble to Shakespeare’s Romeo and Juliet’ readies the crowd by doing a short summarize of the dramatization so it gets the crowd accepting about what the story is about. The preamble is a work which is a 14 line section structure. it is other than known as an English. elizabethan work which contains 3 quatrains and a rhymed pair. A work is regularly an adoration stanza structure and that is correctly what Romeo and Juliet’ is roughly. The principal quatrain of the work is about the fight and battle between the two family units. Both of the families have a similar position both moreover in dignity’ however they appear to keep a grudge’ against one another. we aren’t determined what causes the scorn inside the two houses however it is at that spot and hauls the families into fights this is particulaly appeared in line 4 where common blood make common guardianships unclean’ the word blood’ is proposing that expire and harms happen because of the quarrel the families have. Civil’ is intended to expect poliet or just which is a spot dry since there isn’t any delightfulness. The second quatrain is about the darlings. Romeo and Juliet. also, their expires. From forward the deadly pubess of these two foes’ this line is expressing that the two family adversaries have delivered a support of darlings. this is predominantly accentuated in the expression deadly loins’ this infers these being enamored is inertly and they are other than engaged with the quarrel of their folks. It other than implies that their fate has been chosen and that perish will be their destiny. The second line A support of star cross’d darlings end their life this is suggesting that the stars which is planning their destinies. since they accepted that stars told their destiny like horoscopes. so being star cross’d sweethearts implies that their destinies are laced yet they are other than against one another because of the fight. The last line of the second quatrain doth with their expire cover their parents’ strife’ this demonstrates so as to stop the fight the perishes of Romeo and Juliet appear to take influence on their folks. The accompanying quatrain is about both love and disdain. The primary line The frightful progress of their demise checked love’ this implies all the occasions that they experience will take them to their destinies of perish. The second line says that their folks choler is something that isn’t simple to remove yet in the accompanying line which however their children’s terminal. zero could remove’ this implies the solitary thing they can’t end is their children’s expire and it was brought about by their contempt to each other. The last line is presently the two hours’ traffic of our stage’ this suggests the occasions that they have referenced will currently take topographic point on the stage by the histrions. The riming pair is the last to lines of the poem. The which. on the off chance that you with persistent ears join in. what here will lose. our work will try to fix. ’ These two lines are currently coordinated to the crowd and that now they are making a trip to demo them the dramatization in the event that they are happy to remain. The expression tolerant ears attend’ show that since they are on a stage they don’t regularly use view so you need to tune in and use their inventiveness to help what is go oning. In choice the preface to Shakespeare’s Romeo and Juliet’ set up the crowd for the dramatization by adverting the cardinal realities to the show so they comprehend what to foresee when that impossible to miss occasion is being performed other than it assists with explaining the pieces of the show which appear to be a mystery like the guardians contempt. the crowd would non cognize that the two family units are intended to be having a similar position simply that there are two gatherings who don’t like one another. It other than readies the crowd like an admonition expressing that perish will occur in the show each piece great as affection and contempt.

Wednesday, August 5, 2020

Neo4j

Neo4j INTRODUCTIONMartin: This time we are in beautiful San Mateo. Hi, Emil, who are you and what do you do?Emil: Guten Morgen! That’s it, that’s all the German I know. So my name is Emil Eifrem and I run a company called Neo Technology and we are a graph database company.BUSINESS MODEL OF NEO4JMartin: Cool, what is that?Emil: So a graph database is a database model that is inspired by the human brain. The human brain is structured in neurons with synapses connecting neurons which build up the big network and the mathematical word for network is a graph. So what we have built is a database that rather than using tables which is sort of the standard model or it was used to be the standard model, it uses nodes and then relationships between these nodes which then builds up this big graph. And people know the word graph now because of Mark Zuckerberg like Social graph and that’s definitely a very common use case. The nodes are people, the relationships are whether you know each other. B ut we have a lot of other use cases, in fact social is not even the most popular use case for us.So for example fraud detection ends up with every node is a transaction or an individual and then you have relationships connecting all of these and you want to find patterns in the big graph of payments, so there is one use case.Identity and access management, so you are a big corporation and you are a big financial institution, so we have a lot of big financial institutions and you want to onboard a new trader and that trader has access to the subset of all of the collateral that the bank has produced and the specific subset is controlled by what nationality they actually are, what products they worked on, even what colleagues they have worked with before because sometimes you may have insider trading rules if two colleagues who have worked before have access to the same thing. So that’s a very big connected, complicated mass.Another final example is recommendation engine, people who bought this have also bought that, those kinds of things are also very graphy in nature.Those are some examples of use cases, if you have connected data, you sometimes get ten times faster performance than relational database and existing table based database but sometimes you even get a thousand times faster or a million times faster, so it is dramatically faster when it comes to this type of connected data operations.Martin: Emil, you are from Sweden. How did you come up with this idea and how did you start?Emil: So we actually ran into the problem ourselves. We worked at a start-up in Sweden, three founders of the project at least. And we worked at the enterprise content management company which is basicallyâ€" Can I draw? Will that stick on camera if I draw?Martin: Yes, I guess so.Emil: So basically the problem that we had, we were building an enterprise content management system. And enterprise content management is basically like web content management which is the popular on e that everyone knows today. So it is basically a big file system on the web where you have folders, like this, where you have other folders in those and inside of those folders you have files. This of course is a big tree but it turns out that when you add security to this, so you are able to say ‘Here is Martin’, over here. He belongs to this group, maybe Product Marketing, let’s say you are in product marketing. This Product Marketing group belongs to the Marketing group. Marketing has read access to this folder but product marketing has write access to this one. So all of the sudden, when Martin logs on and we need to check whether he has access to all these things, we have to look at all big, connected mess over here and this big connected mess over there and the connections between them. As we have this problem and we try to store that in normal square static tables which is entirely possible, entirely doable but it is just really, really hard.And so what ends up happeni ng is that, you end up doing a lot of joins, you end up doing a lot of cumulated things. When we started, we were 10 people in the company, 5 people in the engineering team and I was like twenty years ago. But a year later it was 50 60 people and twenty person engineering team and I was the CTO and I noticed that about the half of my team basically spent the vast majority of the time just fighting with the relational database. At that point we said, “What’s going on here? In all my other projects, the relational database has been my friend. So what is going wrong here?” And then we realized that after we double-click to that and really tried to find out what is going on; it was this miss-match with the shape of data that we had and the tabular abstractions that were exposed.So at this point we said, “There has got to be another way.” What If there was a database that had this graph structure, exactly like the database but had the graph structure, instead of tables, that w ould be amazing, that would solve all our problems. So we said, “There has got to be someone else must have had this problem, we didn’t google around, we altavisted around the search engine at the time but basically we didn’t find anything. At that point we saidâ€"the famous words said, “Let’s just build it ourselves. How hard can it be?” It turns out fifteen years, this is back in 2000, fifteen years later it is pretty hard to build a database.So basically that’s when we decided to build this thing. And we built it for a couple of years but only as an internal tool. Put it in production and in 2003, then backing that enterprise content management system. We always thought of it as something that is very generic. We did not optimize for this particular use case or anything like that and we really initially hadâ€" already from the start we had very high inspirations and felt that this was something that we wanted to unleash upon the world because it just seemed unlikely that we would be the only people with this problem. At a macro perspective, if you take a step back are we moving to a more disconnected world or a more connected world? That is kind of a naïve question how obvious it is, right? Well but if that’s true, that’s going to get me consequences in all parts of the stack right and ultimately everything we do with technology ends up in a freaking database. Everything we do â€" every software that we touch, this mobile phone, everything we touch multiple times per hour, all of that ultimately leads to a consequence in some database somewhere.And if the world is becoming increasingly connected and there is value in representing those connections, then that’s going to exert a lot of pressure on the existing infrastructure and we just didn’t see that over time, we would become less relevant, on the contrary, we felt like we were serving on the right side of history.But in the early 2000s there was absolutely zero market acceptances fo r taking a new type of database to the market. So I don’t know how old you are or if you were around back then but basically in the mid-nineties there was this surge of object oriented programing languages, and on the tail end of that there was also a surge of object oriented databases and the inertia was that we have round objects now, we can’t put them in square tables. Instead as the world is going to move to an object oriented paradigm for their programing languages we are going also to store those objects in object oriented databases. Makes sense, except it didn’t work at all. And there were a number of reasons why and the key contributing factor was one keynote by Larry Ellison at Oracle OpenWorld where he basically wiped out an entire industry with one keynote, Larry Ellison style.The industry kind of tried out this object oriented database thing, failed miserably and so the discourse in the early 2000s was something like the relational database will always be the only database model. It has now proven itself, it’s like people thought of it as a mathematical axiom. We can build things on top of the relational database but it will always be that fundamental thing. And that was the discourse in the industry in the early 2000s. We thought, we have this amazing graph database and it gives us all kind of benefits, and again we thought that we were on the right side of history, like macro trends should be in our favor but we said, that there is no acceptance in the market to take this out there. And that changed in 06’ and 07’.So what happened in 06’ and 07’ was that Amazon published a research paper, an academic paper called Dynamo DB, where they said, “We are Amazon, we tried a bunch of different things but we were unable to solve our problems without having to invent our own database, Invent own database”, right? And if your goal is to be an e-commerce site or sell books or sell computer resources, whatever it is that Amazon wants to d o, like you don’t want to build your own database. You want to use some other database off the shelves so you can invest your energy elsewhere. But the very, very, very smart people at Amazon had concluded that there was nothing off the shelf that worked for them and then they wrote a paper on how they did that. And then a little bit later Google announced basically the same thing, they wrote an academic paper called Big Table where they say “Hey, we are Google, we have some amount of expertise managing data and we have also tried the relational database and it’s also failed for us, so we also had to invent our own, new type of database and we called it ‘Big Table’.”And so this caused a lot of stir in the development community and all of the sudden people started realizing that, “Well actually maybe the relational database isn’t the only thing that is going to be out there”. And then of course for a while, as with everything there is a pendulum, so people then star ted thinking that the relational database is going to die and go completely away but of course it is never true and now I think we are sort of a little bit of a fairly informed state where I think people generally acknowledge the fact that the era of one size fits all database is over. We are no longer just going to take all our data and shove it into a single system, in the past that has been the relational database. But on the flipside, what we are going to do as data architects is, we are going to look at our big data set because all data sets will be big and we are going to look at this part over here in my data is tabular in shape, so let’s put that in a relational database. This part over here is what I call tall skinny tables, so just key value bars, like this, let’s put that in a key value store and this part over here is big and messy and connected and chaotic and dynamic, awesome, let’s put this in a graph database. So we saw that and spun out the company in 2007, to ok all the IP on the database side and put that into this new company, bootstrapped for a couple of years and then raised a small seed round in 09’, focused on community and product, we were open source. And then in 2011, we raised our A round and moved over here and started focusing on building an organization, actually commercial customers and that’s what we have been doing ever since.Martin: Cool. Let’s talk about the technology, so imagine I am a company and I believe in the big data paradigm, I have built all my data pipeline and then I would, for a specific use case only, for example use Neo4j and I would only take a subset of a data which I think applies for the use case. Is your database scalable over nodes?Emil: Yes, so it scales out horizontally. We don’t use the word nodes because nodes mean something else for us. In the graph they are called nodes, the data elements, right? It’sa little bit of terminology confusion. But it scales out across machines, so you can scale horizontally on commodity hardware. It runs on top of the JVM so it really can run wherever the JVM runs which is most places. It also scales up very well. So one of the interesting aspects about a graph database is that you typically don’t want to split up the graph across multiple machines, you can but it is really hard and it sometimes leads to problems where, in order to satisfy one query you are going to need to pop across the network. That’s typically not very fast. So it is awesome if you can fit the entire graph into one machine. You don’t have to but if you can, that’s good. And so we’ve worked also in addition to working a lot on scale out, we worked a lot on scale up, so that made sure that if there is a lot of memory in a machine that we honor that and we use that very efficiently.Martin: And the Neo4j is only the graph database or are you also offering tools for pattern analyzers, data visualizations, etc.?Emil: We do a little bit of tooling. But say 95 percent of our bandwidth goes into building the core database engine. Just because we are a small team and it is quite a big effort building a database but there is some amount of tooling offered by us and a lot of tooling offered by the ecosystem. Today we are the most popular graph database by a wide margin. Actually if you look at some objective measures, we are probably twice as big as all the other graph databases combined and not necessarily because we are so much smarter or so much better than anyone else but we just got started earlier and that does lead to number of really interesting benefits, in particular we run ecosystem. So since we have the largest user base of graph database users. It just makes more sense for any tooling provider to ride in our ecosystem. That’s a nice benefit of being the leader in a category and so we rely a lot on external tooling providers to provide the stuff around the database.Martin: Cool. What things are you doing in order to foster this kind of ecosystem?Emil: A couple of things. First off, we are open source and I think that’s really the key thing. We have a community edition which is available for free. You can use it, wherever you use MySQL for free, you can use Neo4j Community for free, it’s the same license as GPL. So that’s the key one, then of course we do a lot of things to try to grow the community and engage the community. Last year we ran, this is kind of crazy, we ran 500 Neo4j events last year, 500.Martin: Only in US orâ€"?Emil: Worldwide. So if you go online on http://neo4j.com/events/ today, when you watch this, you are going to see 2 â€" 3 events somewhere, probably. And I kind of lied there because I said we run them and that’s not strictly true because the vast majority of those is just volunteers; people who love the technology so much and are so fascinated by it, that they started meet up group in Kuala Lumpur or in Onaka or whatever. They just talk about use cases, they talk about cust omers, they talk about new features, etc. And so our role in those is typically, we write a check for the pizza or something like this. But we also have big events, so next week we have Graph Connect which is our annual big conference that we run twice per year, that’s how annual it is. In the fall we run it here in San Francisco and in spring in London. We are expecting about a 1000 people next Wednesday and Thursday, here in San Francisco. So it really ranges from the 10, 15, 20 people spontaneously, informally organized pizza and beer, all the way up to a big professional event. Those are some of the things that we are doing to foster and grow and engage the community.Martin: Emil, you said that you are open source basically. How do you make money?Emil: We’re open source, we also have the Community edition which is available for free of the website. We also have an Enterprise edition which has a number of features that if you are a big company, you don’t need them but you r eally want them. Things like the clustering that we discussed before which if you are Walmart, who is a customer of ours or UPS is a customer of ours and you have a graph database, running in production, you don’t want that running on just a single machine. You want that replicated and clustered across a number of machines so that if one goes down, the cluster will still be up and running. There is a large financial institution which use us for onboarding of traders â€" the use case I mentioned earlier. And if we down in minutes, the entire bank stands still. It handles 50 million requests per day. If that’s down for a minute that’smillions and millions of dollars. Also that just cannot happen. So obviously, then you want clustering and that’s available in the Enterprise edition. So that’s how we make money. We sell it in the normal fashion these days which is a subscription based model so you pay every year for your right to use the software. So that’s how I am able to buy water at Starbucks and things alike.Martin: And how do you acquire those customers? Is it mainly due to the community aspect or is it that you are having a direct sales force or maybe even a partner network?Emil: Yes, that’s a great question. The actual acquisition I’d say 95+ percent is organic, inbound through the community work that we are doing. So it’s someone out there who picks up the software, plays around with it, typically during weekends and evenings, likes it, realizes that, “Hey, I actually had a problem, like last year that this could have solved” and the following year thy run into the similar problems like, “Maybe I’ll try this graph database thing”. Then they try it out, start playing around with it; realize it does solve the problem. At that point if they work in a big company, typically they call us and the moment they call us we have a direct sales force. We are very much a traditional enterprise software company in the sense that we have actu al people answering the phones. But we do vast majority via phone so it’s not go out and visit with customers, that’s the primary one. But we do million dollar deals, in all recurring revenue million dollar deals with global 200 companies working with the CIOs and it’s a very big strategic bet for them. And at that point of course we go out there and we shake hands. So that’s how that model works.Martin: In the beginning of the interview you said, “How hard can it be to build up a database”, right? If you look back, why was it so hard?Emil: Wow, that’s a great question. I think there are two aspects to that question. Sure there are multiple nuances but I will focus on two aspects.First off, it is technically very difficult to do a database and we have very high aspirations. There is a number of those no-sequel databases out there like for example, they said that the relational database is good with some things but they threw away a lot of other things. One of the thing s they threw away that we disagree with is transactions. Transactions means that if you run a number operations, if you write to the database and then you say ‘commit’, than once the database says, “yup, that’s committed”, the database will guarantee that your data will be there forever. And we think for a database that’s not a negotiable feature. That has to be there. And actually a lot of people, strangely enough from your perspective, disagree with that and it’s very popular today to talk about eventual consistency and things like that.We actually agree with eventual consistency but we want to do that layer on top of a transactional core. My point is that writing this software is really, really hard; really, really hard. I mean it is the kind of thing, where it is like nine women won’t give birth to baby in one month. It requires calendar time. It requires you to be out in the wild, with customers, in production for a long time in order to really get the kinks out of that system.Just as an example, early on we had situations that, it is like back in 03’ and 04’, so a long time ago, where if someone was writing a transaction to the database and the database crashed, so one thing that we do, unlike some other databases today is that we will always roll back to safe state so you will either see; not see that transaction at all or you will see the full transaction. You will never see half written data. In order to do that you basically use what’s called a transaction log. And without geeking out too much in this, although I’d love to do that. It’s suffice to say that basically what’s called a transaction log will write your data. Now so what ends up happeningâ€" or what happened to us in 03’ and 04’ was that if the database crashed while you wrote this data that was fine. When you booted it up after the machine booted up when you started the database it will just recover, bring it back to stable state. Except there is a little bi t of a process, called a recovery process where it reads the logs, tries to figure out what is that stable state. What happens if you crash during that time? Then you will need to be able to recover from that.Martin: It’s an infinite loop.Emil: Exactly. And those are just one tiny little examples of the loopholes that once are up and running with tens of thousands of customers in production, you are going to run into all of these kind of eventualities and it’s going to be on the combinatorial explosion of different versions of the Java virtual machines combined with different versions of the 10, 20, 30 OS’s out there, of the different versions of disk controllers and that’s a very large combination of things that you need to guarantee that it works because that’s what we ultimately sell to our customers. It is piece of mind, trustability of the data and so it must never fail. And writing that kind of software, it just takes a lot of time. So that’s one aspect.The second aspect that I actually alluded to before which is that there was just no market acceptance for a new type of database. And what we have done is one of the hardest things in technology that we’ve created a new category. This equivalent to what, for example, VM Ware did back in the late nineties. No one knew what virtualization was. It actually had been invented earlier in the mainframe era but basically they took the concept and created a market around virtualization. And Palm Pilot did that when they launched, if you remember Palm Pilot.Martin: Doesn’t ring a bell.Emil: Well, that dates you actually. So they launched this thing that was this ‘personal digital assistant’ PDA, right? It was that phones end up killing them. But they created this new category. And we have been able to do that with graph databases. Graph databases is a term that we put together with some academic articles from the 80’s but that looked nothing like the modern graph database. So we just took the word graph and database and put it together and started defining it, giving it meaning and popularizing it. And now it isâ€"Forester researchers which is one of the big analysts firm says that 25 percent of enterprise will be running on graph databases in 2017. Garker says that 75 to 80 percent of the leading organizations are going to be piloting and proof of concepting graph databases by 2018. The entire Global 2000, the entire Fortune 500 will be using graph databases in production by the end of this decade. That’s a very much zero to one kind of Peter Thiels terminology; so going from absolutely zero putting those two words together into where we are heading, we are nowhere near done yet but where we are heading is very, very hard and it takes a lot of work.Martin: When I look at entrepreneurs I always think, ok one thing they need is vision and they need to be naïve. And this is a good example because if you have expected how hard it would be you would never have started.Emi l: For sure. That is very, very true and if someone had told me in 2000 that 15 years later you still going to be working on this piece of software, I would be like, “Dude, that’s never going to happen.”Martin: Six months maximum.Emil: Exactly! That’s very true. If we had known how difficult it is to pull off and all the things that could have killed us and should have killed us we never would have even started.Martin: Good.ADVICE TO ENTREPRENEURS FROM EMIL EIFREM In San Mateo (CA), we meet CEO and Co-Founder of Neo4j, Emil Eifrem. Emil talks about his story how he came up with the idea and founded Emil Eifrem, how the current business model works, as well as he provides some advice for young entrepreneurs.INTRODUCTIONMartin: This time we are in beautiful San Mateo. Hi, Emil, who are you and what do you do?Emil: Guten Morgen! That’s it, that’s all the German I know. So my name is Emil Eifrem and I run a company called Neo Technology and we are a graph database company.BUSINESS MODEL OF NEO4JMartin: Cool, what is that?Emil: So a graph database is a database model that is inspired by the human brain. The human brain is structured in neurons with synapses connecting neurons which build up the big network and the mathematical word for network is a graph. So what we have built is a database that rather than using tables which is sort of the standard model or it was used to be the standard model, it uses nodes and then relationships between thes e nodes which then builds up this big graph. And people know the word graph now because of Mark Zuckerberg like Social graph and that’s definitely a very common use case. The nodes are people, the relationships are whether you know each other. But we have a lot of other use cases, in fact social is not even the most popular use case for us.So for example fraud detection ends up with every node is a transaction or an individual and then you have relationships connecting all of these and you want to find patterns in the big graph of payments, so there is one use case.Identity and access management, so you are a big corporation and you are a big financial institution, so we have a lot of big financial institutions and you want to onboard a new trader and that trader has access to the subset of all of the collateral that the bank has produced and the specific subset is controlled by what nationality they actually are, what products they worked on, even what colleagues they have worked with before because sometimes you may have insider trading rules if two colleagues who have worked before have access to the same thing. So that’s a very big connected, complicated mass.Another final example is recommendation engine, people who bought this have also bought that, those kinds of things are also very graphy in nature.Those are some examples of use cases, if you have connected data, you sometimes get ten times faster performance than relational database and existing table based database but sometimes you even get a thousand times faster or a million times faster, so it is dramatically faster when it comes to this type of connected data operations.Martin: Emil, you are from Sweden. How did you come up with this idea and how did you start?Emil: So we actually ran into the problem ourselves. We worked at a start-up in Sweden, three founders of the project at least. And we worked at the enterprise content management company which is basicallyâ€" Can I draw? Will that sti ck on camera if I draw?Martin: Yes, I guess so.Emil: So basically the problem that we had, we were building an enterprise content management system. And enterprise content management is basically like web content management which is the popular one that everyone knows today. So it is basically a big file system on the web where you have folders, like this, where you have other folders in those and inside of those folders you have files. This of course is a big tree but it turns out that when you add security to this, so you are able to say ‘Here is Martin’, over here. He belongs to this group, maybe Product Marketing, let’s say you are in product marketing. This Product Marketing group belongs to the Marketing group. Marketing has read access to this folder but product marketing has write access to this one. So all of the sudden, when Martin logs on and we need to check whether he has access to all these things, we have to look at all big, connected mess over here and this big connected mess over there and the connections between them. As we have this problem and we try to store that in normal square static tables which is entirely possible, entirely doable but it is just really, really hard.And so what ends up happening is that, you end up doing a lot of joins, you end up doing a lot of cumulated things. When we started, we were 10 people in the company, 5 people in the engineering team and I was like twenty years ago. But a year later it was 50 60 people and twenty person engineering team and I was the CTO and I noticed that about the half of my team basically spent the vast majority of the time just fighting with the relational database. At that point we said, “What’s going on here? In all my other projects, the relational database has been my friend. So what is going wrong here?” And then we realized that after we double-click to that and really tried to find out what is going on; it was this miss-match with the shape of data that we had and t he tabular abstractions that were exposed.So at this point we said, “There has got to be another way.” What If there was a database that had this graph structure, exactly like the database but had the graph structure, instead of tables, that would be amazing, that would solve all our problems. So we said, “There has got to be someone else must have had this problem, we didn’t google around, we altavisted around the search engine at the time but basically we didn’t find anything. At that point we saidâ€"the famous words said, “Let’s just build it ourselves. How hard can it be?” It turns out fifteen years, this is back in 2000, fifteen years later it is pretty hard to build a database.So basically that’s when we decided to build this thing. And we built it for a couple of years but only as an internal tool. Put it in production and in 2003, then backing that enterprise content management system. We always thought of it as something that is very generic. We did not op timize for this particular use case or anything like that and we really initially hadâ€" already from the start we had very high inspirations and felt that this was something that we wanted to unleash upon the world because it just seemed unlikely that we would be the only people with this problem. At a macro perspective, if you take a step back are we moving to a more disconnected world or a more connected world? That is kind of a naïve question how obvious it is, right? Well but if that’s true, that’s going to get me consequences in all parts of the stack right and ultimately everything we do with technology ends up in a freaking database. Everything we do â€" every software that we touch, this mobile phone, everything we touch multiple times per hour, all of that ultimately leads to a consequence in some database somewhere.And if the world is becoming increasingly connected and there is value in representing those connections, then that’s going to exert a lot of pressure o n the existing infrastructure and we just didn’t see that over time, we would become less relevant, on the contrary, we felt like we were serving on the right side of history.But in the early 2000s there was absolutely zero market acceptances for taking a new type of database to the market. So I don’t know how old you are or if you were around back then but basically in the mid-nineties there was this surge of object oriented programing languages, and on the tail end of that there was also a surge of object oriented databases and the inertia was that we have round objects now, we can’t put them in square tables. Instead as the world is going to move to an object oriented paradigm for their programing languages we are going also to store those objects in object oriented databases. Makes sense, except it didn’t work at all. And there were a number of reasons why and the key contributing factor was one keynote by Larry Ellison at Oracle OpenWorld where he basically wiped out an entire industry with one keynote, Larry Ellison style.The industry kind of tried out this object oriented database thing, failed miserably and so the discourse in the early 2000s was something like the relational database will always be the only database model. It has now proven itself, it’s like people thought of it as a mathematical axiom. We can build things on top of the relational database but it will always be that fundamental thing. And that was the discourse in the industry in the early 2000s. We thought, we have this amazing graph database and it gives us all kind of benefits, and again we thought that we were on the right side of history, like macro trends should be in our favor but we said, that there is no acceptance in the market to take this out there. And that changed in 06’ and 07’.So what happened in 06’ and 07’ was that Amazon published a research paper, an academic paper called Dynamo DB, where they said, “We are Amazon, we tried a bunch of different things but we were unable to solve our problems without having to invent our own database, Invent own database”, right? And if your goal is to be an e-commerce site or sell books or sell computer resources, whatever it is that Amazon wants to do, like you don’t want to build your own database. You want to use some other database off the shelves so you can invest your energy elsewhere. But the very, very, very smart people at Amazon had concluded that there was nothing off the shelf that worked for them and then they wrote a paper on how they did that. And then a little bit later Google announced basically the same thing, they wrote an academic paper called Big Table where they say “Hey, we are Google, we have some amount of expertise managing data and we have also tried the relational database and it’s also failed for us, so we also had to invent our own, new type of database and we called it ‘Big Table’.”And so this caused a lot of stir in the development community a nd all of the sudden people started realizing that, “Well actually maybe the relational database isn’t the only thing that is going to be out there”. And then of course for a while, as with everything there is a pendulum, so people then started thinking that the relational database is going to die and go completely away but of course it is never true and now I think we are sort of a little bit of a fairly informed state where I think people generally acknowledge the fact that the era of one size fits all database is over. We are no longer just going to take all our data and shove it into a single system, in the past that has been the relational database. But on the flipside, what we are going to do as data architects is, we are going to look at our big data set because all data sets will be big and we are going to look at this part over here in my data is tabular in shape, so let’s put that in a relational database. This part over here is what I call tall skinny tables, so j ust key value bars, like this, let’s put that in a key value store and this part over here is big and messy and connected and chaotic and dynamic, awesome, let’s put this in a graph database. So we saw that and spun out the company in 2007, took all the IP on the database side and put that into this new company, bootstrapped for a couple of years and then raised a small seed round in 09’, focused on community and product, we were open source. And then in 2011, we raised our A round and moved over here and started focusing on building an organization, actually commercial customers and that’s what we have been doing ever since.Martin: Cool. Let’s talk about the technology, so imagine I am a company and I believe in the big data paradigm, I have built all my data pipeline and then I would, for a specific use case only, for example use Neo4j and I would only take a subset of a data which I think applies for the use case. Is your database scalable over nodes?Emil: Yes, so it sc ales out horizontally. We don’t use the word nodes because nodes mean something else for us. In the graph they are called nodes, the data elements, right? It’sa little bit of terminology confusion. But it scales out across machines, so you can scale horizontally on commodity hardware. It runs on top of the JVM so it really can run wherever the JVM runs which is most places. It also scales up very well. So one of the interesting aspects about a graph database is that you typically don’t want to split up the graph across multiple machines, you can but it is really hard and it sometimes leads to problems where, in order to satisfy one query you are going to need to pop across the network. That’s typically not very fast. So it is awesome if you can fit the entire graph into one machine. You don’t have to but if you can, that’s good. And so we’ve worked also in addition to working a lot on scale out, we worked a lot on scale up, so that made sure that if there is a lot of m emory in a machine that we honor that and we use that very efficiently.Martin: And the Neo4j is only the graph database or are you also offering tools for pattern analyzers, data visualizations, etc.?Emil: We do a little bit of tooling. But say 95 percent of our bandwidth goes into building the core database engine. Just because we are a small team and it is quite a big effort building a database but there is some amount of tooling offered by us and a lot of tooling offered by the ecosystem. Today we are the most popular graph database by a wide margin. Actually if you look at some objective measures, we are probably twice as big as all the other graph databases combined and not necessarily because we are so much smarter or so much better than anyone else but we just got started earlier and that does lead to number of really interesting benefits, in particular we run ecosystem. So since we have the largest user base of graph database users. It just makes more sense for any tooling p rovider to ride in our ecosystem. That’s a nice benefit of being the leader in a category and so we rely a lot on external tooling providers to provide the stuff around the database.Martin: Cool. What things are you doing in order to foster this kind of ecosystem?Emil: A couple of things. First off, we are open source and I think that’s really the key thing. We have a community edition which is available for free. You can use it, wherever you use MySQL for free, you can use Neo4j Community for free, it’s the same license as GPL. So that’s the key one, then of course we do a lot of things to try to grow the community and engage the community. Last year we ran, this is kind of crazy, we ran 500 Neo4j events last year, 500.Martin: Only in US orâ€"?Emil: Worldwide. So if you go online on http://neo4j.com/events/ today, when you watch this, you are going to see 2 â€" 3 events somewhere, probably. And I kind of lied there because I said we run them and that’s not strictly true b ecause the vast majority of those is just volunteers; people who love the technology so much and are so fascinated by it, that they started meet up group in Kuala Lumpur or in Onaka or whatever. They just talk about use cases, they talk about customers, they talk about new features, etc. And so our role in those is typically, we write a check for the pizza or something like this. But we also have big events, so next week we have Graph Connect which is our annual big conference that we run twice per year, that’s how annual it is. In the fall we run it here in San Francisco and in spring in London. We are expecting about a 1000 people next Wednesday and Thursday, here in San Francisco. So it really ranges from the 10, 15, 20 people spontaneously, informally organized pizza and beer, all the way up to a big professional event. Those are some of the things that we are doing to foster and grow and engage the community.Martin: Emil, you said that you are open source basically. How do yo u make money?Emil: We’re open source, we also have the Community edition which is available for free of the website. We also have an Enterprise edition which has a number of features that if you are a big company, you don’t need them but you really want them. Things like the clustering that we discussed before which if you are Walmart, who is a customer of ours or UPS is a customer of ours and you have a graph database, running in production, you don’t want that running on just a single machine. You want that replicated and clustered across a number of machines so that if one goes down, the cluster will still be up and running. There is a large financial institution which use us for onboarding of traders â€" the use case I mentioned earlier. And if we down in minutes, the entire bank stands still. It handles 50 million requests per day. If that’s down for a minute that’smillions and millions of dollars. Also that just cannot happen. So obviously, then you want clustering a nd that’s available in the Enterprise edition. So that’s how we make money. We sell it in the normal fashion these days which is a subscription based model so you pay every year for your right to use the software. So that’s how I am able to buy water at Starbucks and things alike.Martin: And how do you acquire those customers? Is it mainly due to the community aspect or is it that you are having a direct sales force or maybe even a partner network?Emil: Yes, that’s a great question. The actual acquisition I’d say 95+ percent is organic, inbound through the community work that we are doing. So it’s someone out there who picks up the software, plays around with it, typically during weekends and evenings, likes it, realizes that, “Hey, I actually had a problem, like last year that this could have solved” and the following year thy run into the similar problems like, “Maybe I’ll try this graph database thing”. Then they try it out, start playing around with it; rea lize it does solve the problem. At that point if they work in a big company, typically they call us and the moment they call us we have a direct sales force. We are very much a traditional enterprise software company in the sense that we have actual people answering the phones. But we do vast majority via phone so it’s not go out and visit with customers, that’s the primary one. But we do million dollar deals, in all recurring revenue million dollar deals with global 200 companies working with the CIOs and it’s a very big strategic bet for them. And at that point of course we go out there and we shake hands. So that’s how that model works.Martin: In the beginning of the interview you said, “How hard can it be to build up a database”, right? If you look back, why was it so hard?Emil: Wow, that’s a great question. I think there are two aspects to that question. Sure there are multiple nuances but I will focus on two aspects.First off, it is technically very difficult to do a database and we have very high aspirations. There is a number of those no-sequel databases out there like for example, they said that the relational database is good with some things but they threw away a lot of other things. One of the things they threw away that we disagree with is transactions. Transactions means that if you run a number operations, if you write to the database and then you say ‘commit’, than once the database says, “yup, that’s committed”, the database will guarantee that your data will be there forever. And we think for a database that’s not a negotiable feature. That has to be there. And actually a lot of people, strangely enough from your perspective, disagree with that and it’s very popular today to talk about eventual consistency and things like that.We actually agree with eventual consistency but we want to do that layer on top of a transactional core. My point is that writing this software is really, really hard; really, really hard. I mean it is the kind of thing, where it is like nine women won’t give birth to baby in one month. It requires calendar time. It requires you to be out in the wild, with customers, in production for a long time in order to really get the kinks out of that system.Just as an example, early on we had situations that, it is like back in 03’ and 04’, so a long time ago, where if someone was writing a transaction to the database and the database crashed, so one thing that we do, unlike some other databases today is that we will always roll back to safe state so you will either see; not see that transaction at all or you will see the full transaction. You will never see half written data. In order to do that you basically use what’s called a transaction log. And without geeking out too much in this, although I’d love to do that. It’s suffice to say that basically what’s called a transaction log will write your data. Now so what ends up happeningâ€" or what happened to us in 03â €™ and 04’ was that if the database crashed while you wrote this data that was fine. When you booted it up after the machine booted up when you started the database it will just recover, bring it back to stable state. Except there is a little bit of a process, called a recovery process where it reads the logs, tries to figure out what is that stable state. What happens if you crash during that time? Then you will need to be able to recover from that.Martin: It’s an infinite loop.Emil: Exactly. And those are just one tiny little examples of the loopholes that once are up and running with tens of thousands of customers in production, you are going to run into all of these kind of eventualities and it’s going to be on the combinatorial explosion of different versions of the Java virtual machines combined with different versions of the 10, 20, 30 OS’s out there, of the different versions of disk controllers and that’s a very large combination of things that you need to guarant ee that it works because that’s what we ultimately sell to our customers. It is piece of mind, trustability of the data and so it must never fail. And writing that kind of software, it just takes a lot of time. So that’s one aspect.The second aspect that I actually alluded to before which is that there was just no market acceptance for a new type of database. And what we have done is one of the hardest things in technology that we’ve created a new category. This equivalent to what, for example, VM Ware did back in the late nineties. No one knew what virtualization was. It actually had been invented earlier in the mainframe era but basically they took the concept and created a market around virtualization. And Palm Pilot did that when they launched, if you remember Palm Pilot.Martin: Doesn’t ring a bell.Emil: Well, that dates you actually. So they launched this thing that was this ‘personal digital assistant’ PDA, right? It was that phones end up killing them. But they cr eated this new category. And we have been able to do that with graph databases. Graph databases is a term that we put together with some academic articles from the 80’s but that looked nothing like the modern graph database. So we just took the word graph and database and put it together and started defining it, giving it meaning and popularizing it. And now it isâ€"Forester researchers which is one of the big analysts firm says that 25 percent of enterprise will be running on graph databases in 2017. Garker says that 75 to 80 percent of the leading organizations are going to be piloting and proof of concepting graph databases by 2018. The entire Global 2000, the entire Fortune 500 will be using graph databases in production by the end of this decade. That’s a very much zero to one kind of Peter Thiels terminology; so going from absolutely zero putting those two words together into where we are heading, we are nowhere near done yet but where we are heading is very, very hard and it takes a lot of work.Martin: When I look at entrepreneurs I always think, ok one thing they need is vision and they need to be naïve. And this is a good example because if you have expected how hard it would be you would never have started.Emil: For sure. That is very, very true and if someone had told me in 2000 that 15 years later you still going to be working on this piece of software, I would be like, “Dude, that’s never going to happen.”Martin: Six months maximum.Emil: Exactly! That’s very true. If we had known how difficult it is to pull off and all the things that could have killed us and should have killed us we never would have even started.Martin: Good.ADVICE TO ENTREPRENEURS FROM EMIL EIFREMMartin: Emil, what start-up advice could you give to first time entrepreneurs so they can make less errors that they could avoid?Emil: So first off start-up advice, I think start-up is really hard and really dangerous because I think so much is contextualized and I actually think that some of those brilliant things in life but let’s focus on building companies, some the most brilliant things in building companies comes from people who go completely 180 degrees from common wisdom. And so I try to refrain from giving generic start up advice. Having said that, I think the thing that have helped me is the obvious thing is, the obvious thing which everyone say which is passion for what you do. I’ve been doing this for 15 years, sure the company for 7 â€" 8 years but worked on the technology for 15 years and every freaking year I’ve had more fun than previous year. When we were two guys and hadn’t had salary for a year and we are just so completely dirt poor I still had so much fun. And then when we grew the team to like 6 people, I was like, “Oh wow, we actually have a team now!” It’s just amazing. And then we gain 15 and 20 and it’s like, “We need some kind of management or something here”, all the way up to now, I guess we are 110, 12 0 people and we are across 12-14 countries. I am still having as much fun as I’ve ever had in my entire life. So I think that has to be there, just because it’s just so hard that if you are not crazily passionate about what you do, you just don’t have the persistence to do it. So that would be the first and obvious one.And then there are the tactics, stay close to your customers. If you aren’t the customer yourself and some of the best technologies I think in the word have been written for the people are themselves a customer, then really, really have empathy for the customers, stay close to the customer.Both are truisms, both are things that everyone is saying. They have helped me a lot.Martin: Emil, thank you so much for your time!Emil: Pleasure! Dankeschön!Martin: And next time when you are thinking about starting a company you have to be passionate. But you need to think about ideas that are contrary to what that mainstream is thinking about but you have to be right. An d then you are starting a successful company.Emil: Contrarian and right.Martin: Right. But contrarian false is not such a good choice. OK, thank you so much. Great!Emil: Awesome!

Saturday, May 23, 2020

Immigration And Its Impact On America Essay - 1239 Words

For hundreds of years, immigration has been the engine to social and economic progress. The social mobility of populations has always existed and will never cease. It all began with the persecution of religious groups, escaping tyrants, looking for freedom and peace. It started as a movement of religious freedom, but quickly transformed into a quest for political freedom and democracy, which even today constitutes a model for other nations. In that sense, every immigrant that set foot on the American soil, contributed to the creation of the political, social and cultural American power house. Filling in the unsettled territories of the west, populating what we now call the 51 states, immigrants made America a leader in the world, and the promised land for other thousands of immigrants, who aspired to be part of this amazing project. The impact immigration has had on America is considered one of the most significant aspects that shaped the country and will continue to do so. To begin with, one of main arguments against immigration is that people don’t change, and that they harm the American society and values. They are also perceived as being a burden, too radical, and undermining the established society. Though in reality, this is more of a result of xenophobia. The idea of newcomers has never been welcomed. One example is â€Å"Benjamin Franklin [, who] worried, that too many German immigrants would swamp America’s predominantly British culture. [then] †¦mid-1800s, IrishShow MoreRelatedImmigration And Its Impact On America Essay1917 Words   |  8 PagesAmerica as we know it today has been shaped by immigrants. It can be argued that America shapes immigrants as well. It is a nation that people, nationalist or foreign-born, desire to assimilate partially or fully into. According to a New York University professor, â€Å"Immigration, however, played a key role not only in making America’s development possible but also in s haping the basic nature of the society† (Diner, p. 2). It is a nation built on this idea of the â€Å"American dream† which varies dependingRead MoreImmigration Policy And Its Impact On America882 Words   |  4 Pagespermanently settling in America, the immigration policy has affected all aspects of society in terms of growth and development of economy, societal issues, and national security. As the immigration policy is a broad topic among senators, it needs to be prioritize for it to be better understood. In doing so will improve the immigration policy and grasp the significance of its impact in America. Many of the values that brings America together as a nation, is due to immigration. America is a melting potRead MoreEssay on The Impact of Latin American Immigration on America1553 Words   |  7 Pages Immigration is the process of entry of individuals into a new country (23). Throughout past centuries, immigration has been a means of discovery and exploration of new lands. In today’s culture, immigration to the United States is an avenue for individuals who wish to start new lives and take advantage of the capitalistic, entrepreneurial system. People from many countries have migrated into the United States. Most recently, the migrants have come from Central and South AmericanRead MoreThe Impact Of Immigration On The United States Of America Essay1707 Words   |  7 Pagesfamily of eighteen boarded a ship leaving their homeland of Chiette Abruzzi, Italy. Headed for a nation they had only heard about in the newspapers, each member of the family bore thei r own excitement and reservation. The history of immigration to the United States of America was seen at unprecedented numbers during the late eighteen hundreds and early twentieth century. Families from Italy, Ireland, Germany, Poland, and numerous other nations flocked to the west by the millions, in hopes of discoveringRead MoreMedia Reaction to Immigration1471 Words   |  6 PagesMedia Reaction to Immigration Name Course Date Submitted Media Reaction to Immigration: The issue of illegal immigration is one of the hotly debated topics in almost every facet of society, especially among political leaders. This topic has also received huge media attention and reaction in the recent past including an article written by William Finnegan and published by The New Yorker. The article focuses on addressing the issue of borderlines and is based on the move by 17 Congress membersRead MoreDanielle Grieco. Ms. Mahoney. English 8 Aap B.1. 5 May1317 Words   |  6 PagesDanielle Grieco Ms. Mahoney English 8 AAP B.1 5 May 2017 The Impact of People and Policy on Immigration Americans display the most admirable level of responsibility of which many countries are envious. Whether it comes to family, economics or self-accountability, citizens of the U.S. consistently exhibit high standards for being responsible. Imitating America, immigrants from foreign countries that are undergoing arduous economical or physical circumstances must take the only step they know willRead MoreImmigration Is A Part Of Globalization Essay1067 Words   |  5 PagesImmigration has always been a part of globalization, starting from the first land occupants hat occupied the world in prehistoric times. These nomads would often move from place to place in search for their food and a more comfortable place to live, and at the same time leaving a major impact on the culture and way of life in a certain area. In those times it was essential for people to migrate to new areas to succeed in surviving. Today, with the worldwide movement, people are constrained to migrateRead MoreThe Soci al Issues That Affect All Citizens Of The United1479 Words   |  6 PagesCitizens of the United States of America in 2017 In the early months of 2017, the United States of America has already faced a crucial change, the election of a new president. The election of President Trump will impact social issues that affect citizens of the United States of America. For example, the two most important social issues that will impact citizens of the United States of America in 2017 include immigration and health care. Another aspect that affects immigration and health care in the UnitedRead MoreUnderstanding Americans Perspective Toward Immigration Essay1362 Words   |  6 PagesUnderstanding Americans’ Perspective toward Immigration Introduction It is no astonishingly to observe that the American population has increased enormously in the last fifteen years. Nevertheless, the massive population growth has occurred due to the arrival of immigrants at a large scale. The Pew Hispanic Center published that from 2005 to 2015, immigrants and their offspring born in the America contributed 45 percent to its total population growth. Within this group of immigrants, Latino immigrantsRead MorePoliticians And Immigration Reform : Donald Trump Essay1292 Words   |  6 PagesPoliticians’ and Immigration Reform Donald Trump, usually well-known for his absurd and preposterous laws, is our president- elect and had many things to say about a lot of laws in America at the moment but mostly immigration.   Immigration is a topic where America and its people are divided as a whole just because of the simple fact they choose to look at it from a negative standpoint and not a positive one. â€Å"The U.S. immigrant population stood at more than 42.4 million, or 13.3 percent, of the

Monday, May 11, 2020

Convicted Child Killer Darlie Routier Guilty or Railroaded

Darlie Routier is on death row in Texas, convicted of the murder of one of her two sons, Devon and Damon Routier, who were killed in the early morning of June 6, 1996. The media coverage of the murder investigation depicted Routier as another psychopath or heartless mother whose children were getting in the way of her lifestyle, so she killed them for money. Thats also how books such as Precious Angels by Barbara Davis, and the prosecutors at her trial portrayed Darlie Routier. Most found it believable in the aftermath of the Susan Smith case two years earlier. Since her conviction, Darlie and her family have learned a whole lot more about the legal system and have presented a far different picture than was originally shown by the press. Even Barbara Davis changed her mind about the case and added a chapter to her book disputing the prosecutors case. Read both sides and decide for yourself if this young woman is the she-devil portrayed by the prosecutors and press, or a woman naive of the inner workings of the legal system. Darlie and Darin Routier Darlie and Darin Routier were high-school sweethearts who married in August 1988, after Darlie completed high school. By 1989, they had their first boy, Devon Rush, and in 1991, Damon Christian, their second son was born As their family grew, so did Darins computer-related business and the family moved to an affluent area known as Dalrock Heights Addition in Rowlett, Texas. Life was going well for the Routiers and they celebrated their successes by surrounding themselves with expensive items such as a new Jaguar, a cabin cruiser, lush furnishings, jewelry, and clothing. After a few years of living an affluent lifestyle, Darins business began to falter and with it came financial problems for the couple. Rumors began that the couples relationship was in trouble and there was talk of extramarital affairs. Friends said Darlie, obsessed with her appearance, reportedly had little patience for the children. Despite the rumors, on October 18, 1995, the couple had their third son Drake, after which Darlie experienced postpartum depression. Desperate to lose the weight she had gained during pregnancy she began taking diet pills which failed to help and contributed to her mood swings. She confided to Darin about having suicidal thoughts and the two began talking and reviewing their future. Things were looking fixable for the young couple. But with this hopeful period was cut short by a tragedy  that no one could have predicted.   The Murder of Devon and Damon Around 2:30 in the morning on June 6, 1996, the Rowlett Police received an emergency call from the Routier home. Darlie was screaming that she and her two boys had been stabbed by an intruder and her boys were dying. Darin Routier, awakened by the Darlies screams, ran down the stairs into the family room, where just hours before he had left his wife and two sons lying by the television. Now, as he entered, all he saw was the blood-soaked bodies of his two sons and his wife. Darin tried to save Devon, who was not breathing. As reported by Barbara Davis, Torn between two sons, the horrified father momentarily panicked, then made the decision to begin cardiopulmonary resuscitation on the son who was not breathing. Darin placed his hand over Devons nose and breathed into his childs mouth. Blood sprayed back onto the fathers face. Damon, with deep gashes in his chest, struggled for air. The house filled with paramedics and police. The paramedics began trying to save the children as the police searched the home for the intruder who Darlie said had run in the direction of the attached garage. Policeman David Waddell and Sergeant Matthew Walling noted a bloody knife on the kitchen counter, Darlies purse and expensive jewelry lying near it, a slash in the screen of a window in the garage, and splattered blood on the floor. The medics were unable to save either child. The knife thrusts left deep gashes in the boys chests and punctured their lungs. Gasping for air, they both suffered horrible deaths. Darlies wounds—more superficial and not life-threatening—were temporarily patched up while Darlie told the police of the horrific events that unfolded just an hour earlier. Darlie Routier stood on her porch in her blood-soaked nightgown and told the police what she remembered about the attack that had just occurred to her and her two sons. She said that an intruder had entered their home and mounted her while she slept. When she woke up, she screamed and fought with him, fighting off his blows. She said he then fled toward the garage and that was when she noticed her two sons who were covered in blood. She said she had heard nothing while they were being attacked. She described the intruder as medium-to-tall height, dressed in a black T-shirt, black jeans, and a baseball cap. Darlie and Darin were then taken to the hospital and the Rowlett Police Department seized the house and began their investigation. Within 11 days of the murder of Devon and Damon, the Rowlett Police Department arrested Darlie Routier, charging her with capital murder of her sons. The prosecutor’s case against Darlie was presented with these key issues: Coroner Janice Townsend-Parchman testified that the boys wounds were savage and deep, but described Darlies as hesitation wounds, possibly self-inflicted.Paramedic Larry Byford said Darlie never asked about the condition of her children when she was in the ambulance on the way to the hospital.Charles Hamilton, a fingerprint expert who examined the scene, said that the only prints found belonged to Darlie and her children.Tom Bevel, a blood expert, testified that the blood on Darlies nightshirt belonged to her sons. It had been sprayed on her and he suggested that this could happen as she raised her arms upward in a stabbing motion.Nurses from the hospital testified that Darlie did not demonstrate grief towards the loss of her sons. They claimed she seemed more concerned with making a point to say she picked up the knife off the kitchen floor, which put her prints on the knife.Also mentioned was the blood found under a vacuum cleaner and blood spots on the cleaner itself, indicating t hat the vacuum cleaner had been placed there after the crime was committed.Charles Linch, a trace-evidence expert, said it was impossible for an intruder to leave that scene without a trail of blood. There was no blood found outside the Routier home.FBIs special agent Al Brantley testified that the window screen that was cut could have merely been removed by an intruder. Also that Darlies expensive jewelry had been left untouched, discounting robbery as a motive. As to the motive being rape, he said that a rapist would have used her children as leverage to get her to submit, not killed them. And finally, he addressed the savagery of the stabbing of the boys and said that in his opinion, it was a personal attack done with extreme anger, not by a stranger. Darlie took the stand against the advice of her counsel. They asked her why she told different versions of the story to different policemen. They asked about her dog, which barks at strangers but didnt bark when the intruder entered her home. They asked her why her kitchen was cleaned but under testing showed remnants of blood all over. To most of the questions, Darlie answered that she didnt remember or didnt know. The jury found Darlie Routier guilty of the murder and sentenced her to death. The prosecutions case against Darlie Routier was circumstantial and based on experts who theorized about evidence collected or viewed at the crime scene. The prosecution did what it set out to do, which was to get the jury to find Darlie guilty of murder, but was all the evidence shown to the jury? If not, why wasnt it? Websites that support Darlie Routiers appeal list many issues and facts that have come to light after her trial that, if true, would appear to provide enough evidence that a new trial would be appropriate. Some of those issues include: The attorney that represented Darlie Routier at trial had an apparent conflict of interest because he reportedly had a pre-arrangement with Darin Routier and other family members not to pursue any defense that could implicate Darin. This attorney allegedly stopped key experts for the defense from completing forensic examinations. Other areas of concern which were never brought to the attention of the jury include the pictures of Darlies cuts and bruises on her arms which were taken when she was hospitalized the night of the murders. At least one juror told reporters he would never have voted to convict if he had seen the photographs. Bloody fingerprints have been found that do not belong to Darlie, Darin, the children or any of the police or other people in the Routier house the night of the murder. This contradicts testimony given during her trial that there were no fingerprints found outside the home. Questions Her Defense Team Want to Be Answered A bloody fingerprint was found on the living room table. Who does it belong to?There was a bloody fingerprint on the door of the garage. Who does it belong to?Darin Routiers jeans had blood on them. Whose blood is it?A pubic hair was found in the Routier living room. Who does it belong to?How did the blood on Darlies nightshirt get there and whose is it?Did the police get debris on the knife in the kitchen while investigating the murder or did it come from the screen door? Darin Routier has admitted to trying to arrange an insurance scam, which included someone breaking into their home. He has admitted that he had begun the initial steps to arrange a break-in, but that it was to be done when no one was at home. No jury has heard this admission. The incriminating Birthday Party film that was viewed by the jury showed Darlie dancing on the graves of her son along with other family members, but did not include the filming of the hours previous to that scene when Darlie sobbed and grieved over the graves with her husband Darin. Why was the additional footage not shown to the jury? Neighbors reported seeing a black car sitting in front of the Routier home a week before the murders took place. Other neighbors reported seeing the same car leaving the area on the night of the murders. Were these reports investigated by police? Investigators during her trial invoked their fifth amendment rights against self-incrimination during cross-examination, preventing the defense from rebutting their testimony. What did these investigators fear by being cross-examined? There was some discussion about the police not protecting the evidence as they collected it which could have possibly damaged its origins. Did this really occur? More Questions That Need Answers The screen which investigators reported to the press as being cut from the inside was later proven in court to be cut from the outside.When the paramedics arrived at the scene they said that Darin Routier was outside, but Darin was inside trying to save his children. Who was the man outside?Was the testimony from the nurses in the hospital coached and rehearsed in mock trials by the prosecution prior to their testimony, as it has been reported?The surgeon who operated on Darlie said that the cut in her neck was 2mm of the carotid sheath but was superficial to the carotid artery. The necklace she was wearing was damaged as a result of the wound but it also blocked the knife from going deeper into her neck. Did the jury get a clear understanding as to the seriousness of her wounds?Was there an improper read-back of testimony to the jury by the court reporter, due to mistakes she made in the transcript?The prosecution has reportedly refused to provide access to any evidence in their cus tody in the case. Why is it not readily available to all interested parties?The advancements in DNA testing could put many of these questions to rest. Why is there such a reluctance to do the testing?Some writers who have interviewed Darlie Routier have decided to help her fight to get a new trial. Since reporting their opinions on her situation, they report that their ability to visit her has been blocked or made so inconvenient that little can be accomplished.

Wednesday, May 6, 2020

Case #1 Cca (Board of Directors) Free Essays

BUSN7045: Corporate Governance Case Study 1 Jiachen Lyu u5264027 1 Evaluation of the Board of Directors of Coca-Cola Amatil Jiachen Lyu Student ID: u5264027 1. Basic analysis – a macro perspective From the publicly open information, the member composition of the Board Of Directors (BOD) of Coca-Cola Amatil (CCA) can be summarised as the following table (Table 1- 1). It can be easily seen that non-executive directors account for the majority of the board. We will write a custom essay sample on Case #1: Cca (Board of Directors) or any similar topic only for you Order Now According to Tricker (1994), this particular composition is of a typical American kind, which is specifically designed to emphasis the independence among members in the board and their loyalty to the shareholders. Table 1-1 Composition of Board of Directors Compan y Name Total direc tor No. Executi ve director Nonexecuti ve directo r Composition of non-executive directors Exper t direct ors Chairma n of other compani es Investment agency representati ves Individu al investor s Coca- Cola Amatil 9 1 8 8 2 3 0 However, it is worth noting that this particular formation is a result of the highly developed American capital market. In such a market, the frequency of hostile takeover is so common a market phenomenon that masks the lack of BOD’s function. In American companies’ management practice, people focus more on centralisation and expert system, which reduces the importance of executive directors. Comparing with the U. S. , both the turnover of Australian stock market and the frequency of hostile takeover are low, which posts a shadow on the adaption of Cola’s American empirical practice into Australia. 2. Focus on non-executive directors The non-executive directors are directors who are employed from the outside. They are normally specialist in areas such as strategic management, finance, investment, legal and public relation. In order to better fulfil the duties of a BOD, National Association of Corporate Directors Blue Ribbon Commission emphasises that each director should contribute his knowledge in at least a field listed below: (1) accounting and finance, (2) judgment, (3) management skills, (4) crisis response, (5) industrial knowledge, (6) experience in international markets, (7) leadership, and (8) strategic vision. According to this point of BUSN7045: Corporate Governance Case Study 1 Jiachen Lyu u5264027 2 view, it can be analysed from the information available on the CCA’s website as Table 2-1: Table 2-1 Appraisal of CCA’s non-executive directors D. G . I. A . C. B . A. F . M. J . G. K . W. K. D. M . Judgment Y Y Y Y Y Y Y Y Management skills Y Y Y Y Y Y Y Y Crisis Response Y Y Y Y Y Y Y Y Industrial Knowledge N N N Y Y Y N N Experience in the international market N N N Y Y Y N N Leadership Y Y Y Y Y Y Y Y Strategic vision Y Y Y Y Y Y Y Y Abbreviation: David Gonski (D. G. ), Ilana Atlas (I. A. ), Catherine Brenner (C. B. ), Anthony Froggatt (A. F. ), Martin Jansen (M. J. ), Geoffrey Kelly (G. K. ), Wal King (W. K. ), David Meiklejohn (D. K. ). From Table 2-1, it is clear that some finance and law background non-executive directors (i. e. D. G. and I. A. ) lack of knowledge in beverage industry and have little experience in international markets. When they were facing situations that need industrial judgement and global vision, the limit of their knowledge would be likely to hurt the interest of shareholders. Most non-executive directors, due to their insufficient knowledge about the inner working of the company, tend to rely on financial criteria rather than innovation criteria to evaluate the long-term management of the enterprise, which may lead to short-sighted decisions and further hurt the goodwill and innovation of CCA. Furthermore, most aforementioned non-executive directors are quite busy as they may be managers of other companies or partners of investment banks, they therefore do not have sufficient time to collect detailed management information about CCA. Consequently, the most probable channel of their source of CCA’s information is from the managers. Ironically, while the purpose of establishing a BOD is to solve principleagent problems between the ownership and management, the possible information asymmetry between manager and BOD (thanks to the large proportion of busy nonexecutive directors) may result this vehicle into null. From a strategic perspective, on the other hand, all these non-executive directors as experts in finance, investment, legal issues and science have long term experience, most of whom are over 50 year’s old. They can provide more specific knowledge and advice in terms of strategic management. This is the positive effect of having eight nonexecutive directors in the BOD of CCA. References: Bol Tricker. , Corporate Governance, An International View, p. 20, Prentice Hall, 1994. How to cite Case #1: Cca (Board of Directors), Papers

Friday, May 1, 2020

Information Security Policies-Free-Samples for Students-Myassignment

Question: Discuss about the IT Security Management. Answer: Identification and Ranking of Assets There were various important information assets that were involved for completing as well as exceeding expectations in my academic performance. The several information assets that were involved for completing this assignment are given below People Data and Information Software Hardware According to the priority of the assets, they are listed below: Information Assets Criterion 1: Contribution to me Criterion 2: Contribution to my academic performance Weighted Score Criterion Weight (1-100) 40 60 Software 1.0 1.0 100 Hardware 0.9 0.9 90 Data and Information 0.7 0.8 75 People 0.5 0.3 40 The software and hardware are the most important information assets that were required towards the completion of this assignment. Next, comes the data and information. It is ranked in three in my assets ranking. The weighted score of this particular asset is 75. This information and data were extremely important to understand the value of the assignment and also towards my academic performance. The final information asset is the people. It has the weighted score of 40. Threats Threats are the most vulnerable risks that can occur to any person or any asset. For this assignment, there are few threats that can occur to my group for not completing the assignment. These threats with proper examples are given below: Threats Examples Compromise to intellect Piracy, copying Deviation in quality in our group performance Failure There are few threats for me as well if I will not be able to participate fully in the assignment. They are as follows: Threats Examples Compromise to my intellect and knowledge Less marks, Lack of knowledge Deviation in my career Failure Threat Vulnerability Assessment Worksheet There are few possible vulnerabilities to all the threats identified for me and my group members. They are listed below: Threats Possible Vulnerabilities Compromise to intellect Due to the unsatisfactorily completion of the assignment, our career would be affected. Deviation in quality in our group performance Even if one person does not work properly, the entire group performance would be hampered. Compromise to my intellect and knowledge If I will not be able to participate in the assignment completely, it would be affecting my intellect and knowledge. Deviation in my career When I will not be able to learn anything new, there would a straight downfall in my career. The Threat Vulnerability Assessment Worksheet or TVA worksheet depicts a clear view of the priority of threats to the various assets. Software Hardware Data and Information People Compromise to intellect Deviation in quality in our group performance Compromise to my intellect and knowledge Deviation in my career Priority of Controls 1 2 Risk Worksheet Severity Negligible small/unimportant; not likely to have a major effect on the operation of the event / no bodily injury to requiring minor first aid injury Marginal minimal importance; has an effect on the operation of event but will not affect the event outcome / requires medical treatment Critical serious/important; will affect the operation of the event in a negative way / suffers serious injuries or medical treatment of minors Catastrophic maximum importance; could result in disaster/death; WILL affect the operation of the event in a negative way / death, dismemberment or serious injury to minors Probability LOW This risk has rarely been a problem and never occurred at a college event of this nature Compromise to intellect (1) Deliberate Software Attacks (4) Technological Obsolescence (6) Act of human error or failure (10) MEDIUM This risk will MOST LIKELY occur at this event Compromise in my knowledge and intellect(2) Technical Hardware Failures (5) Deliberate acts of information extortion (8) Deviation in the quality in our group performance (11) HIGH This risk WILL occur at this event, possibly multiple times, and hasoccurred in the past Technical software failures or errors (3) Deliberate acts of theft (7) Deliberate acts of sabotage or vandalism (9) Deviation in career (12) List All Activities Your activity name Associated Risk(s) Risk(s) associated with the activity Severity Level of impact on the trip and students Probability The chances of that risk happening Risk Score Risk score, found by combining impact and probability on the risk matrix Meeting all requirements 1. Sending wrong deliverables. 2. Not understanding requirements 1. Negligible 2. Negligible 1. Low 2. Low 1. Low 2. Low Completing within deadline 1. Not meeting all requirements. 2. Stuck on any particular step 1. Critical 2. Medium 1. Low 2. Medium 1. Medium 2. High Group participation 1. Absence of any one group member. 2. Reduction in quality and efficiency. 1. Catastrophic 2. High 1. Low 2. Critical 1. High 2. Risks Control and Residual Worksheet Activities Identified Risks Initial Risk Level Develop Controls Residual Risk Level Management Strategy 1. Meeting all requirements 1. Sending wrong deliverables Low Resending the deliverables Critical Checking from the supervisor and sending new deliverables. 2. Not understanding requirements. Negligible Asking from the supervisor or other team members High Immediately clarify from the seniors, supervisor or team members 2. Completing within deadline 1. Not meeting all requirements. Critical Asking for more time. High Asking more time from the supervisor for properly completing it by fulfilling all requirements. 2. Stuck on any particular step Medium Taking help from supervisor. Low Taking help from supervisor or other team members. 3. Group Participation 1. Absence if any one group member. Catastrophic Contacting him or her. Low Trying to contact that group member 2. Reduction in quality and efficiency High Trying to make up the loophole in quality and efficiency. High Immediately trying for adding another group member for managing the lack of quality and efficiency. Bibliography Alexander, D., Finch, A., Sutton, D. (2013, June). Information security management principles. BCS. Covello, V. T., Merkhoher, M. W. (2013).Risk assessment methods: approaches for assessing health and environmental risks. Springer Science Business Media. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Lee, S. S. (2014). Management information systems.Management,166137(01), 02. Li, W. (2014).Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rhodes-Ousley, M. (2013).Information security: the complete reference. McGraw Hill Education. Sennewald, C. A., Baillie, C. (2015).Effective security management. Butterworth-Heinemann. Soomro, Z. A., Shah, M. H., Ahmed, J. (2016). Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), 215-225. Suter II, G. W. (2016).Ecological risk assessment. CRC press. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102.