...Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Asimo Unit 2 assignment 2 | AbstractASIMO is a humanoid Robot that was built to genuinely help people. Linda Vaughn | Linda Vaughn GS1145T 10/3/2015 Why Create ASIMO? ASIMO is humanoid robot created to duplicate human motion and genuinely help people. ASIMO took more than two decades of persistent study, research, trial and error before achieving a humanoid robot. ASIMO's design, development and operation rely on many different disciplines including Mathematics, Physics, Anatomy, Engineering and Computer Science. In 1986 Honda engineer’s set out to create a walking humanoid robot early models (E1, E2, and E3) focused on developing legs that could simulate the walk of a human. Models (E4, E5, and E6) focused on developing walk stabilization and climbing stairs. Then the head, arms and body were added to improve balance. Hondas first robot P1 was rather rugged standing at 6’2 and weighing at 386lbs. P2 had a more friendly design. P3 model was more compact standing at 5’2 and weighing 287lbs. ASIMO can run, walk on uneven slopes and surfaces turn smoothly and reach and grab for objects. ASIMO can also comprehend and respond to simple voice commands. It can also recognize the face of a selective group of individuals using camera eyes. It can also map environment and register stationary objects and can avoid moving objects as it moves along...
Words: 598 - Pages: 3
...NT2580 Unit 2 Assignment 2 10/1/13 1. The five vulnerabilities that exist for this LAN based workgroup are 2755801, 2501696, 2588513 2639658, 2659883. 2. Yes, the vulnerability that involves privilege elevation is 2639658 (Vulnerability in TrueType Font Parsing), but it is not a high priority. 3. 2719662 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Apply the Microsoft Fix it solution that blocks the attack vector for this vulnerability. Disable Sidebar in Group Policy. Disable the Sidebar in the system registry. 2737111 Solution: Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available. Disable WebReady document view for Exchange. 2755801 Solution: Workaround refers to a setting or configuration change that would help block known attack vectors before you apply the update. Prevent Adobe Flash Player from running. Prevent Adobe Flash Player from running on Internet Explorer 10 through Group Policy on Windows 8 and Windows Server 2012. Prevent Adobe Flash Player from running in Office 2010 on Windows 8 and Windows Server 2012. Prevent ActiveX controls from running in Office 2007 and Office 2010. Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting...
Words: 257 - Pages: 2
...Unit 1 Research Paper 1 Injectable Tissue Engineering Brand Zae GS1140 Injectable Tissue Engineering Introduction Every year more than700,000 Americans undergo a form of joint replacement surgery. The procedure-in which a knee or a hip is replaced with an artificial implant-is highly invasive, and many patients delay said surgery for as long as they can. A doctor by the name of Jennifer Elisseeff , a biomedical engineer at Johns Hopkins University, hopes to change that with a simple and quick procedure that does away with surgery entirely. Dr. Elisseeff and her colleagues have developed a way to inject joints with specially designed mixtures of polymers, cells, and growth stimulators that solidify and form healthy tissue. This form of technology can eliminate the need for many expensive and dangerous surgeries. Surgeries involving muscle development, the cardio vascular system, and even limb repair after a traumatic incident. This form of technology can improve our health care system dramatically and open new windows of opportunity for new forms of medicine. Even the possibility for new cures for diseases that we currently fight every day such as cancer and possibly even HIV, eliminating the need for long and expensive treatments. As well as repairing worn or damaged tissue, this form of engineering can also be used in the future for growing new organs or limbs to replace old damaged or missing ones. If a patient is in need of a new heart...
Words: 427 - Pages: 2
...| Retinal implants/The Boston Retinal implant project | Unit2 assignment2 Gs1145 | | | 1/17/2014 | Retinal Implants The article talks about the Boston Retinal Implant Project. It had thirty academically based biologists and engineers. It included several researches from Harvard, Cornell and Massachusetts institute of technology. Professor W. Kizzy Jones from Florida International University college of engineering and computing was one of the thirty researchers. The project focuses on people who loss vision though injury, vision loss caused by eye disorder or age related macular degeneration. Jones’s work on the feed though component that transfer the signals from the implanted microchip to the electrodes was the most technological development device. The improvements on this device will greatly improve the quality of the image the person can see. The device has more than two hundred fifty six electrodes that helps see images with larger number of pixels. It is a device with sixty electrodes that help people who are blind to read words on a screen. Hopefully in the next ten years macular degeneration and retinitis pigmentosa will be a thing of the past. Macular degeneration affects older adults that loss vision in the center of the visual field because of damaged retina. Retinitis pigmentosa is a inherited eye disorder that severe vision impairment. The Boston Ritnal implants project was founded in 1980 and was working with Bionic Eye Technologies inc along...
Words: 251 - Pages: 2
...Diana Firebaugh Kaplan University CS204-13: Professional Presence Unit 2 Assignment I chose the professional law firm slide. I believe this person was professional. The things that make this person professional are the way he presents himself with assertiveness, being a tactful presenter with a professional vocabulary and clear communication skills. He also has good posture and is aware of personal space. I don’t believe there was anything about him that was not professional. If it had said he uses slang and profanity or slouched a lot or came to work in street clothes, then there would definitely be a need for improvement. He showed proper professionalism. The appropriate attire for an individual in tax accountancy is professional attire, meaning suits and skirts. Some offices may have a “dress-down” policy for office casual like, semi-smart trousers and skirts, and a button down shirt or blouse for a more relaxed work environment. This depends on an office by office basis. Julie Becht says “It’s important for clothing to not be suggestive or provocative in any way so as not to distract from one’s talent and abilities.” (2012, August 31). This means that skirts should be appropriate length, clothes should not be too loose or too tight, and should not show too much. The things that make someone a professional in my field are a professional demeanor, proper etiquette, and a strong set of communication skills. A person needs to go by a professional dress code and wear...
Words: 523 - Pages: 3
...Unit 2 Assignment Page 2 My biggest problems that I suffer with in my writing career is tone, format, and eve though I'm not really sure this can really considered is time management. I have a very bad habit of writing in a tone in which people tend to think can be very hateful. I have to work on this if I ever expect to have a successful professional writing career as legal secretary as I do not want my employer to think I am being hateful. Some of the ways I can work on this to use better wording and better sentence structure and most importantly better punctuation. I have actually found some online exercises in which can help me accomplish this. As far as format, I sometimes have a hard time finding the right format for certain documents and then when I do find the write format I have a hard time putting the format together. I have found that finding templates can be of great help with this. If your word processing program doesn't come with the template you need a lot of the time you can find online templates to download which is what I have done in the past and it has greatly helped. Time management is my biggest problem. I am a single mom of three kids and I also help to take care of my 89 year old grandfather and I do not allow myself proper time to get things done before a deadline. One of the ways I plan to work on this is to do a chart system. Perhaps set a time for all the kids to take a nap and work during that time and take some time after the kids go...
Words: 521 - Pages: 3
...For category number one I chose Unit two Activity 5 Assignment 2. In this assignment I used my previous knowledge of my interests form, the last unit. This helped me decide how I can volunteers and help out side of the classroom. I will need forty hours of volunteer work to graduate high school and after high school to find a job it would be a good idea to have some volunteer work on my resume. I learned that I love to help others and teach. I like to share my knowledge with the world to make it a better place, and I feel I want a career that can do the same. This shows how this assignment has impact on my life outside the classroom, as my new knowledge has thought me new information when I’m deciding to volunteer. Unit 3 Activity 2 Assignment 1 fits the criteria of category 2 perfectly. In this assignment I learned and figured out what my occupational goals are. I used research skills and information I already had from previous activities. I might need to do something like this again when I am trying to find which career options are best form me after university. By doing this assignment I learned that I have many options in my interest through art and that I should not be ashamed to peruse art further on as there are many careers that would want my creative mind. Over all I had found some back up plans for my occupation....
Words: 566 - Pages: 3
...Joseph V. Stewart NT1210 Unit 2 Assignment 2 Computer Basics Review 1. C. Datacom 2. B. Bob’s incoming email server 3. B. The call uses only digital electrical signals, D. The call represents short sounds as a unique set of bits 4. C. The call uses both analog and digital electrical signals, E. The call represents each spoken word as a unique set of bits. 5. D. A choice for the number of frames per second 6. B. Use an incoming video server 7. D. None of the answers is correct 8. B. The web browser asks for the one object identified by the web address, and the web server automatically sends the rest of the objects to the browser. 9. A. A website typically contains many web objects, C. A web page typically contains many web objects, D. A website typically contains many web pages. 10. C. The operating system on the PC, D. The PC’s NIC 11. A. 16 HTTP GET request messages with 16 matching HTTP GET reply messages 12. A. Web browsers 13. A. http 14. C. Node 15. B. Cable, D. Switch 16. D. SMB Network 17. A. Router 18. D. The Internet 19. A. Internet service provider 20. B. Any ISP’s network Key Terms Computer Networking-the stuff that works together Computer network-the process of the stuff working together Application-a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device Email-electronic mail Voice...
Words: 483 - Pages: 2
...Employee's Tasks and Responsibilities Kenneth Wilson Kaplan University AB299: Associates Capstone in Management Prof: Vickie Palzewicz 5/29/12 The question “What is a mangers responsibility?” is a extremely hard question to answer in general. There are so many different responsibilities a manger has to handle. Recruiting employees for the store is the manager’s prime responsibility. He not only has to hire the right candidates for the store but also train and guide them for their overall progression. He also must ensure that all the employees contribute to their level best for the efficient operation of the store. He must act as a strong leader and stand by his team at the hour of any crisis. It is his duty to explain to his team members with any other newly launched store software. It is his responsibility to delegate other responsibilities to his subordinates according to their specializations and bring the best out of them. Tim’s Responsibilities must align with every manager general responsibilities Tim must motivate his team members often. He has to make sure the store is meeting the targets and earning profits. He is responsible for the smooth and effective functioning of the operation. He is responsible for maintaining the overall image of the store as well. He must ensure that his operation meets the expectations of the customers and lives up to its predefined brand image. He must ensure: The store is kept clean, properly stocked and products do not fall off...
Words: 924 - Pages: 4
...SC300 Big Ideas in Science Unit 2 Project In analyzing attendance of some local middle schools there seems to be a spike in student absences. After careful consideration in examining these absences there may be a link that connects them being a cause for concern. It seems that students involved with school band have a spike in absences due to sickness resulting in the same symptoms. Further investigations would want to look into the following: 1. Where did the bands travel? 2. What did the band members eat? 3. Were meals provided by the band and by whom? 4. Did the bands stop and eat at any same local restaurants? 5. What drinking sources were provided to band members, what were they and where did they come from? 6. Were there any band members sick prior to the events? By interviewing students, parents and school faculty similarities could be drawn to conclude the source of contamination causing such a rise in sickness among the Band students. There is concern and diligence to find out the source of this common sickness among the students so that an epidemic can be ruled out as quickly as possible preventing wide spread panic within the schools and community. Epidemics can take a while to determine if cases are not connected, meanwhile cases start to increase without proper treatment. There are modern epidemics such as parasites and mercury poisoning (Hubpages, 2012)....
Words: 434 - Pages: 2
...IMC of McDonalds Rachel Walker Kaplan University MT 359-01 Integrated Marketing Communication Strategies Professor Kevin Cojanu May 28, 2013 McDonalds is a well-known world-wide corporation. Richard (Dick) and Maurice (Mac) McDonald started a barbeque car hop in California in 1940. First starting out they offered a menu that consisted of twenty-nine different items that were served by car hops. By 1947, their business started to slow way down and they had discovered that hamburgers were one of the largest sellers within food sales. That was when the transformation began. The grills, once cast iron, were upgraded to stainless steel and the research of candy machines resulted in the finding of the ideal hamburger shaper. Dick and Mac made a comeback in December of 1948 with a completely different approach and opened as a hamburger venue advertising the famous 15 cent hamburger. When the menu first started out they served 9 different items and French fries was not one of them. It wasn’t until 1949 that the French fries came to the menu to replace regular potato chips and they also introduced a triple thick milkshake. In 1955, Ray Kroc opened a restaurant in Illinois. This was when the famous golden arches were designed by an architect by the name of Stanley Meston. Little did they know that those golden arches would soon become their well-known trademark. The very first advertisement done for this restaurant was the amount of hamburgers sold with the first sign...
Words: 899 - Pages: 4
...self-fulfilling prophecy, or anything about yourself you would like to alter related to how you think about the person you are. I would like to be a more positive and confident person. I do strive for that; however I feel improvements can be made in this area. I tend to look at life in terms of Murphy’s Law, which states “Whatever can go wrong will go wrong.” So as a result I try to stay safe and protected in case certain negative things may happen. Also I like to say that I expect the best but am prepared for the worst to happen. Which makes sense, but it also tends to lean more towards negativity. I would like to be able to expect good things to happen and therefore I will hopefully make a more positive life a self-fulfilling prophecy. 2. Where did you place your statement so you could see it every day? What statement did you use? Clearly write the change you want to make. Use strong, affirmative language to motivate yourself, such as “I will start speaking up in class,” or “I will share my opinions in meetings.” The statement I decided to use is “Stay positive and walk boldly. Expect the best and make it happen.” I feel this summarizes what I need to do on an ongoing basis. I have placed this statement on a sticky note and have it on my computer at work where I will be able to see it every day. This should help to remind me that I am capable of doing great things and that I can also move forward in a more positive way. 3. Refine your general goal by making sure it is...
Words: 818 - Pages: 4
...Vulnerability of a Cryptosystem The assignment asks that the student portray a newly hired IT person at a University. It is told to you by a supervisor that the University cryptosystem and would like research done on the vulnerability. Once the research is complete, come up with things that the University should do to handle the problem. The University used the Message-Digest algorithm 5 (MD5) in most of the areas at the University. It provides the hashes to check for file integrity of downloaded files by using MD5 based certificates that have been approved by and internal Certificate Authority. The University uses Cisco ASA firewall devices that create and sign digital certificates that authenticate the users and the systems. In addition, the default setting for the Cisco ASA devices in the MD5. It was discovered back in 2008 that the MD5 based systems have a problem; there is the feasibility of collision attacks. This means that attackers could generate extra digital certificates with different content but have the same digital signature as the original certificate. This basically means that if an attacker can get a hold of a digital certificate, they might be able to gain access to information by creating a replica of the certificate but adding different information or contents to it. According to the research, the likeliness of this vulnerability is very little due to the fact that most attackers do not know how to obtain rogue certificates. There does...
Words: 380 - Pages: 2
...Data storage center centers will benefit greatly from the continued evolution of Ethernet. We saw in the past and present how Ethernet protocols enabled faster transmissions of data. How Xerox was able to network thousands of computers to a common printer. We even seen the benefit of collision management introduced in 1971. Data centers will improve the security of the cloud making it more cost effective to have virtual/roaming desktops. This will better enable companies to spend less on sky-scrapers by having most employees work from home. The hold back will be the telecom industry commonly referred to as ISP (internet service providers). Most of these companies have hesitated on the implementation of Gigabit connections due to the current high cost. VLAN-enabled Ethernet networks require switches and routers. The switches connect the users in a specific geographical area together and to a common connection to routers, one being for traffic and the other being a dedicated firewall. VLANs enable corporations to “hide in plane site” over the internet while still having the benefit of mobility like VPNs. Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers...
Words: 402 - Pages: 2
...Assignment 2 The next project we will be working on is digitally designing and fabricating a 3D printable object that a specific audience would use while conveying an argument. This entire project carries a total of nine grades and will be done in a group. I am excited for the experience to be able to work with 3D printing, it’s not every day that you get the opportunity to do this. I’m already coming up with great ideas for what my group can pursue to do. I hope this is something the class gets the opportunity to discuss tomorrow, I have a lot of questions. Bleecker’s Design Fiction I was very fascinated by Bleecker’s perspective on science fiction and what he describes as design fiction. Design fiction is a design practice that is focused...
Words: 402 - Pages: 2