Premium Essay

Love Bug Project Analysis

Submitted By
Words 607
Pages 3
Winter Haven, Florida | Lake Region High School class of 2015 graduates Melvin Vigo and Jamilette Toress De La Cruz both graduated with high honors created a kindness campaign which is rapidly gaining the support from the Winter Haven community. It all started about a week ago when Melvin was giving the task to create a project that will manage to make others happy. Vigo later on that day reached out to Toress explaining her about the project, instantly, they came up with the idea of creating The Love Bug Project.
Their mission is to make this worldwide so it will inspire people to do every day acts of kindness. Spread love! Both creators stated “We want to bring this to the next level and it all starts right here with the support of our community,

Similar Documents

Premium Essay

Course Project 1-3

...Course Project Parts 1-3 ITT Technical Institute GE 273 Microeconomics How outsourcing affects the US economy and contributes to political stability in developing economies is a matter of great debate. Many people think this practice will have an overall positive effect on the US economy, since it saves money for companies, opens up opportunities for greater entrepreneurship in the US, and leads to more Americans holding higher level jobs. Jobs that companies outsource to save money besides medical and manufacturing include copy writing jobs for publishing companies, administrative jobs, and data entry jobs for insurance companies. Critics suggest hiring foreign workers has an immediate effect on the US economy by stripping many Americans of jobs they would have performed, particularly by semi-skilled or skilled laborers. Further, many argue that giving jobs to workers in less developed countries improves those countries economically and increases trade for US products. It also increases a country’s ability to pay back debts to the US, and may promote better political relationships. Companies economically benefit by selling their products in other countries. This means they can hire more people in the US, lower their prices on products for US consumers. Comparative advantage and efficiency takes place when countries, individuals, and firms have lower opportunity costs in the production of a good or service with comparison to that of their competitors. This creates more...

Words: 1329 - Pages: 6

Premium Essay

Kafka Dehumanization

...Kafka reveals how modernity removes ownership of self by setting up Gregor’s life before he turned into a bug: “He sits with us at the table and reads the paper quietly or studies times tables” (Kafka 16). Just to support his family, Gregor had to prepare for work, thus losing out on any time he could have spent on himself. However, when Gregor turns into a bug, his family imprisons him: “stamping his feet, began to drive Gregor back into his room by brandishing the walking stick and the paper” (Kafka 23). Gregor is forced back into the room immediately after escaping its confines. Previously, Gregor’s family was cheering him on to escape his locked room (Kafka 20). However, when Gregor does escape his room, his family does not see him as human (Kafka 22). Rather, Gregor is forcefully removed from the family, and no member would acknowledge him (Kafka 23). It is interesting; however, that Gregor is dehumanized by his family after he turns into a bug (Elimelekh...

Words: 1739 - Pages: 7

Free Essay

Computer and Technology

...T HE P H .D. G RIND A Ph.D. Student Memoir Philip J. Guo philip@pgbovine.net Third Anniversary Reprint with margin notes from the perspective of a first-year assistant professor To read the original version without margin notes, visit: http://www.pgbovine.net/PhD-memoir.htm Current release: May 28, 2015 Original release: July 16, 2012 Copyright Philip J. Guo To the unexpected. Contents Prologue 1 Year One: Downfall 5 Year Two: Inception 21 Year Three: Relapse 33 Intermission 45 Year Four: Reboot 53 Year Five: Production 69 Year Six: Endgame 85 Epilogue 99 Preface This book chronicles my six years of working towards a Ph.D. in com- These margin notes are puter science at Stanford University from 2006 to 2012. A diverse years after The Ph.D. variety of people can benefit from reading it, including: At this time, I have just written in mid-2015, three Grind was published. finished my first year as an assistant professor • undergraduates who might be interested in pursuing a Ph.D., • current Ph.D. students who are seeking guidance or inspiration, of computer science, so these notes reflect my current opinions as a new faculty member. To download a version without these notes, visit • professors who want to better understand Ph.D. students, • employers who hire and manage people with Ph.D. degrees, • professionals working in any creative or competitive field where ...

Words: 37567 - Pages: 151

Free Essay

The Paper

...knows?) Less bugs (there are much less already). 10.0.0 (29/03/2011) Bugfixes: Fixed problem with sidechain selectors in Vocodex. Fixed tiny bug in envelope filter tool. Fixed rendering start time problem. Fixed small bug on playlist loop marker deletion. Fixed bug when deleting playlist clips through their menu. Fixed bug when undoing recording of audio+piano roll when there were no notes yet. Fixed crash when sending presets directly to plugin window in some rare cases. Fixed bug in Fruity Love Philter's waveshaper. Fixed sample browser's hot hint minor bug. Fixed bug in Fruity Convolver's own smart disabling. Slicex & Fruity Convolver now store local filenames (avoiding searching). Audio clip positions now snapped to samples (better for linear interpolator). FL VSTi: fixed crash on close in other hosts. DirectWave: improved sfz import. Fixed bug in playlist song loop marker when piano roll pops up. Bugfix in Riff Machine's randomization. Additions: New project browser. Patcher plugin. ZGameEditor Visualizer plugin. 9.9.0 (28/02/2011) Bugfixes: (public beta) Fixed problem when relocating effect plugin slots. Fixed time signature in exported midi files. Edison: fixed javascript using pascal unit. DirectWave: fixed freeze when opening project and switch...

Words: 18786 - Pages: 76

Free Essay

Project Management

...Final Project Report  COEN 287­ Software Development Process Management  Winter­2016  Instructor: ​ Zoltan Kurczveil            Dhara Tamhare  Shilpita Roy  Kevin Hong                        Preface        Subject  of  software  development  process  management  provides  us  infinite  knowledge  and  understanding  while  witnessing  it  in  at  company  enables  us  to  perceive  how  various  lesson  learned  in  class  are  associated  at  numerous  level  at  work place.       Knowledge  gained  from  a  book  can  provide  immense  amount  of  conceptual  knowledge  and  spotting  it  in  real­time  scenario  can  be  equally  astonishing.  A  through  study  can  be  useful  to  develop instincts to understand how at it is instantly  correlated at a company.     Keeping  this  point  of  view  in  mind  every  student of Software development project  management  class  of  Santa  Clara  University  undertakes  his  /  her  choice  of  project  related to the subject. This initiation enables them to understand this pivotal subject  plus  preparing  them  to  be  competent  enough  to  face  all  future  challenges  that  will  be encountered.     Thus as per syllabus Santa Clara University has specially included this project.                                        Acknowledgement           First,  we  would  like  to  thank  Santa  Clara  University,  which  has  given  us  the  opportunity  to  work ...

Words: 4884 - Pages: 20

Premium Essay

Dissertation on Analysis of Competitor Games

...Dissertation on Analysis of Competitor Games Name Institution Contents 1.0 Introduction…………………………………………………………………………….5 1.1 Aims and Objectives of the Study....... 6 2.0 Project Approach 7 2.2 Background…………………………………………………………………………….9 2.3 Current Problem 9 2.4 Solution 10 2.5 Why Educational game fails? 11 2.6 Why are arcade games so popular 11 Arcade games 11 2.7 Why games on a computer are better? 12 2.8 Tables 13 2.9 Figures 14 3.0 Approach or Methodology………………………………………………………………15 3.2 Why is methodology important 15 3.3 Software Methodology 16 3.4 Chosen Methodology (the Waterfall Methodology) 17 3.5 Summary 19 4.0 Analysis……………………………………………………………………………….19 4.1 Survey 19 4.2 Data 20 4.3 Unity 5 Game Engine 25 5.0 Implementation………………………………………………………………………..25 5.1 Design 25 List of Tables and Figures Table 2.8 A risk analysis table 12 Figure 2.9 A generic model of the Final Year Project 13 Introduction The main purpose of this project is to implement an educational game where children would enjoy learning mathematics without having the pressure of being in a controlled environment. An article by Dr. Brent Conrad on teaching addiction stated that “children consume just over three hours of media and two thirds is spent on screen media e.g. TV...

Words: 4931 - Pages: 20

Free Essay

Marketing

...Contents Contents 2 1. Introduction 3 2. Development 5 2.1 Concept Development 5 2.2 The Process of Development 7 2.3 Testing video game before release. 9 3. Game Marketing 11 3.1 Marketing Strategy 11 3.2 Your media channels 15 3.3 Distribution Platforms 16 4. Bibliography 17 1. Introduction Interactive entertainment industry (sometimes referred to as the video game industry) is the economic sector involved with the development, marketing and sales of video games. It includes a tremendous amount of different job disciplines and employs thousands of people worldwide. This industry exists since 1970-s when the first arcade games appeared, like space invaders and pong. Today, the video game industry transformed into vast and high-growing market. According to data compiled by the “NPD Group”, a global market research company, and released by the Entertainment Software Associations, the computer and video game industry sold over 273 million units in 2009 leading to an astounding $10.5 billion in revenue. The statics of United States of America shows how great is the consumption of video games is. There are 67% of gamers in this country with average age of 34 years old. This is very inspiring that people keep playing games in their conscious adulthood. It will be correct to assume that the result of this statistics tells us how video games have penetrated in life of peoples. I took the US as example because this country has a great influence on...

Words: 5278 - Pages: 22

Premium Essay

The River

...wife describes marrying her husband at age fourteen. After that, she was continuously shy, either out of respect, sub-ordinance, or just because of her introverted personality. According to the next stanza, she became more comfortable with the marriage by age fifteen and "stopped scowling." A year later, her husband (a merchant) departed for another village, which is where he has been for the past five months. The monkeys' sorrowful noise mirrors her loneliness. She writes that her husband "dragged [his] feet" when he left - indicating that he did not want to leave her. She ends her letter by writing that if he comes back along the river, he should send word ahead, and she will come out to meet him. The poem is signed "by Rihaku." Analysis: Pound was not the creator of this poem; he translated it from the original Chinese version by Li Po. The Chinese original likely had a specific form and identifiable meter, but Pound did not know enough about Chinese poetry to preserve it in his translation. Pound wrote his translation in free verse, structured around the chronological life events of the river-merchant and his wife. This form, though perhaps not Li Po's intent, does actually align with the content of this poem. The free verse makes the letter feel more authentic, as if it is a real letter from a wife to...

Words: 3595 - Pages: 15

Free Essay

Cathbaz

...The Cathedral and the Bazaar Eric Steven Raymond cf text and copyright at: www.tuxedo.org/~esr/writings Abstract I anatomize a successful open-source project, fetchmail, that was run as a deliberate test of some surprising theories about so=ware engineering suggested by the history of Linux. I discuss these theories in terms of two fundamentally di:erent development styles, the “cathedral” model of most of the commercial world versus the “bazaar” model of the Linux world. I show that these models derive from opposing assumptions about the nature of the so=ware-debugging task. I then make a sustained argument from the Linux experience for the proposition that “Given enough eyeballs, all bugs are shallow”, suggest productive analogies with other self-correcting systems of selfish agents, and conclude with some exploration of the implications of this insight for the future of so=ware. 1 The Cathedral and the Bazaar Linux is subversive. Who would have thought even five years ago (1991) that a world-class operating system could coalesce as if by magic out of part-time hacking by several thousand developers scattered all over the planet, connected only by the tenuous strands of the Internet? Certainly not I. By the time Linux swam onto my radar screen in early 1993, I had already been involved in Unix and open-source development for ten years. I was one of the first gnu contributors in the mid-1980s. I had released a good deal of open-source so=ware onto the net, developing...

Words: 15545 - Pages: 63

Premium Essay

Group B (Polar Ice)

...12/11/2015 HR Articles: Problem Statement, HR Recruitment influenced by Internet 1   More    Next Blog» Create Blog   Sign In Find Air Tickets, Book Hotels & Rent Cars Problem Statement, HR Recruitment influenced by Internet +1   Recommend this on Google jetradar Origin Origin Destination Destination Depart date 18 december, fr Return date 25 december, fr Passengers/Class 1 passenger economy сlass Search http://humanresourcesarticles.blogspot.my/2014/11/problem­statement­hr­recruitment.html 1/15 12/11/2015 HR Articles: Problem Statement, HR Recruitment influenced by Internet Show hotels Most Popular Posts Most Popular Posts Launching an Intranet; Data in Hiring; Bad Phish Thursday, Dec. 10, 2015 7 Tips to Launching an Intranet Social intranets are helping organizations overcome the barriers of location, language and ... Dec 10, 2015 11:21 AM Kutik on the Real Five Generations in the Workplace Email not displaying correctly, click here. December 10, 2015 Welcome to our weekly look at Web­exclusive columns that appear on www.HREOnline.com ... Dec 10, 2015 11:08 AM Last Chance: 40% Off + Free Shipping on Custom Holid... It's crunch­time to order your holiday cards ­ get them today to ensure delivery next week! Grab them now from The Signature Collection, with cards... Dec 10, 2015 9:50 AM A day in the Life of HR The industrial relations system is defined as an analytically subsystem of...

Words: 3288 - Pages: 14

Premium Essay

Session Hijacking

...vulnerability areas that every organization need to put into consideration before any implementation of cloud computing. The paper gives the basis for further research that would help curb the challenge of session hijacking in cloud computing. TABLE OF CONTENTS Abstract 2 CHAPTER ONE 5 1.0 INTRODUCTION 5 1.1 Motivation for the study 6 1.2 Premises of the study 7 1.3 Problem Statement 7 1.4 Technical objectives of the study 7 CHAPTER TWO 9 2.0 RELATED WORK 9 2.1 Issues with Cloud Computing 9 2.2 ANALYSIS OF SESSION HIJACKING 9 2.2.1 Cookies: 10 2.2.2 TCP session capturing 10 2.3 PREVENTING SESSION HIJACKING 11 2.3.2 Information encryption programming 11 2.3.3 Virus Detection Applications 12 2.3.4 Digitized Signature 12 2.3.5 Computerized Authentication 13 2.3.6 Firewalls 14 2.3.7 Surf Anonymously 14 CHAPTER THREE 16 3.0 RESEARCH METHODOLOGY AND DESIGN 16 3.1 Introduction 16 3.2 Research Design 16 3.3 Data Collection Instruments 16 3.4 Methods of data Analysis and expected results 17 3.5 Time tables 17 3.6 Conclusion 18 REFERENCES 19 CHAPTER ONE 1.0 INTRODUCTION Enthusiasm towards...

Words: 4485 - Pages: 18

Premium Essay

Session Hijacking

...vulnerability areas that every organization need to put into consideration before any implementation of cloud computing. The paper gives the basis for further research that would help curb the challenge of session hijacking in cloud computing. TABLE OF CONTENTS Abstract 2 CHAPTER ONE 5 1.0 INTRODUCTION 5 1.1 Motivation for the study 6 1.2 Premises of the study 7 1.3 Problem Statement 7 1.4 Technical objectives of the study 7 CHAPTER TWO 9 2.0 RELATED WORK 9 2.1 Issues with Cloud Computing 9 2.2 ANALYSIS OF SESSION HIJACKING 9 2.2.1 Cookies: 10 2.2.2 TCP session capturing 10 2.3 PREVENTING SESSION HIJACKING 11 2.3.2 Information encryption programming 11 2.3.3 Virus Detection Applications 12 2.3.4 Digitized Signature 12 2.3.5 Computerized Authentication 13 2.3.6 Firewalls 14 2.3.7 Surf Anonymously 14 CHAPTER THREE 16 3.0 RESEARCH METHODOLOGY AND DESIGN 16 3.1 Introduction 16 3.2 Research Design 16 3.3 Data Collection Instruments 16 3.4 Methods of data Analysis and expected results 17 3.5 Time tables 17 3.6 Conclusion 18 REFERENCES 19 CHAPTER ONE 1.0 INTRODUCTION Enthusiasm towards...

Words: 4485 - Pages: 18

Premium Essay

Brand-Building

... Branding consists of the name, symbol, slogan, design or any blend of these that identify the offerings of your entity and differentiate it from another. Branding is the visual influence of your company. Brand-building is enhancing brand’s equity directly and indirectly through marketing campaign and promotions respectively. Brand equity is the significance your business name has in the industry without accounting the profitability of the company (Vincent, 2012). Equity mean gives an edge, consideration, or autonomy to a company in comparison to another. Positioning is employing promotion to project differentiation in your business and its offering to targeted customers. Building and upholding a strong brand is a primary intention for successful organizations. A general talk with my friend Mark, the word Apple or iPhone is bound to come up whether in terms a discovery of a new exciting app in the App Store or just about the release of another “out of this world” product. This behavior is not because he’s a young tech savvy but because he adores this particularly brand and all its products. Apple is the leading technological firms in the world. It’s mainly involved in the manufacture of premium and innovative electronic products. Recent studies suggest the company enjoys the largest consumer or brand loyalty as compared to its competitors...

Words: 1293 - Pages: 6

Premium Essay

Rymco Blue Ocean Strategy

...PROJECT MANAGEMENT By Michael Harding Roberts Table of Contents Chapter 1 - Introduction and Principles .............................................................................. 1 Chapter 2 - Projects and Stages ........................................................................................ 4 Chapter 3 - Roles and Responsibilities ............................................................................ 27 Chapter 4 - Project Definition ........................................................................................... 45 Chapter 5 - Risk Management ......................................................................................... 57 Chapter 6 - Estimating ..................................................................................................... 66 Chapter 7 - Planning ........................................................................................................ 79 Chapter 8 - Stage Agreement ........................................................................................ 101 Chapter 9 - Project Support ........................................................................................... 110 Chapter 10 - Tracking, Controlling and Reporting .......................................................... 122 Chapter 11 - Change and Issue Management ............................................................... 144 Chapter 12 - Quality Management ......................................................................

Words: 93619 - Pages: 375

Premium Essay

Social, Legal, and Ethical Issues in the Information Age

...Chapter 5 Social, Legal, and Ethical Issues in the Information Age Teaching Objectives Students should be able to answer the following questions: 1. What ethical, social, and political issues are raised by information systems? 2. Are there specific principles for conduct that can be used to guide decisions about ethical dilemmas? 3. Why does contemporary information technology pose challenges to the protection for individual privacy and intellectual property? 4. How have information systems affected everyday life? 5. How can organizations develop corporate policies for ethical conduct? Key Terms The following alphabetical list identifies the key terms discussed in this chapter. The page number for each key term is provided. |Accountability, 154 |Intellectual property, 164 | |Carpal tunnel syndrome (CTS), 176 |Liability, 154 | |Computer abuse, 173 |Non-obvious relationship awareness (NORA), 153 | |Computer crime, 173 |Opt-in, 161 | |Computer vision syndrome (CVS), 177 |Opt-out, 161 | |Cookie, 160 ...

Words: 5310 - Pages: 22