Friday, December 27, 2019

Essay Comparing the Lamb and the Tyger in In Songs of...

Comparing the Lamb and the Tyger in In Songs of Innocence Children embody the very essence of innocence. They see the world through virgin eyes, hear life with fresh ears and create the world with a simple mind and pure heart. It is about the only time in a persons life when the weight of sin, corruption, egotism, and hatred are not blurring their vision and thoughts. It is the only time a person is completely free. But this state of innocence becomes separated and exiled once experience has tainted the soul. William Blake conveys this theory in his work, Songs of Innocence and of Experience: Shewing the Two Contrary States of the Human Soul. In Songs of Innocence, a childlike vision is conveyed through William Blakes†¦show more content†¦The Lamb is a very pure and wholesome poem, just like the innocence of a child. It asks the question, who made thee? But it also answers that question, God. The poem gives the impression that God is generous and loving. He created the Lamb (child), giving him clothing, food and a tender voice. The child is called by Gods name, which is lamb. Possibly implying that God and child are one, for in true innocence, God is there. This is religion at its purist form. God is found inside the individual, not the organization. It has not being contaminated by human institutions yet. The Tyger is the reverse state of the soul, once experience has become a part of the picture. This is a powerful and formidable poem. The tiger, itself, is a dangerous but beautiful creature, that could possibly be representing an adult, just as the lamb was a child. Again, this poem also asks the question, who made thee? It questions, who or what God dare to make such a beast? Blake never states that it is God, but rather an immortal hand. It leads the reader to believe that this is possible a different God or one that has been altered from His original childlike innocence portrayed in The Lamb. The imagery used in the poem creates a picture of God as blacksmith: seize the fire, twist the sinews, hammer, chain, furnace, and anvil. This is noShow MoreRelatedWilliam Blake s The Tyger1132 Words   |  5 Pagesâ€Å"The Tyger† and Tragedies William Blake wrote a set of poems in his collection Songs of Innocence and Songs of Experience. Some of the poems in each collection were meant to be read together to show the difference between innocence and experience. Many people question why Blake wrote a two part series to his poems and what they could actually mean. Two specific poems, â€Å"The Lamb† and â€Å"The Tyger,† were meant to be read together. â€Å"The Lamb† is a part of Blake’s Songs of Innocence and â€Å"The Tyger† isRead MoreThe Lamb and the Tyger Essay1437 Words   |  6 PagesThe Tyger and The Lamb by William Blake, written in 1794 included both of these poems in his collection Songs of Innocence and Song of Experience, takes readers on a journey of faith. Through a cycle of unanswered questions, William Blake motivates the readers to question God. These two poems are meant to be interpreted in a comparison and contrast. They share two different perspectives, those being innocence and experience. To Blake, innocence is not better than experience. Both states haveRead MoreWilliam Blake s The Lamb And The Tyger1493 Words   |  6 Pagespopular works, Songs of Innocence and of Experience: Showing the Two Contrary States of the Human Soul (1794). Two standout poems, â€Å"The Lamb† and â€Å"The Tyger,† respectively taken from Songs of Innocence and Songs of Experience, demonstrate Blake’s meditation on how innocence and experience in life create a binary and complementary relationship that is observable in our outer world as well as in our inner being. As one of the titles in his Songs of Innocence, William Blake chooses the lamb, naturally gentleRead More Comparing William Blakes The Tyger and The Lamb Essay1246 Words   |  5 PagesComparing William Blakes â€Å"The Tyger† and â€Å"The Lamb† William Blake is referred to as many things, including poet, engraver, painter and mystic, but he is probably most famous for his poetry. Blake began writing the poems below in about 1790 whilst living in Lambeth, London. His poetry has a wide range of styles but his most famous poems are those from â€Å"Songs of Innocence† and Song of Experience†. The two sets of poems are designed to show different states or ways of seeing. They are BlakesRead More The Lamb vs. The Tyger By William Blake Essay1081 Words   |  5 PagesIn this essay I am going to be looking at two poems from the Songs of innocence and experience works. These poems are The Lamb and The Tyger written by William Blake. Both these poems have many underlying meanings and are cryptic in ways and both poems are very different to each other. In this essay I will be analysing the two poems, showing my opinions of the underlying themes and backing them up with quotes from the poems. I will compare the poems looking at the similarities and differences betweenRead MoreThe Lamb and The Tyger Essay955 Words   |  4 PagesThe Lamb and The Tyger In the poems The Lamb and The Tyger, William Blake uses symbolism, tone, and rhyme to advance the theme that God can create good and bad creatures. The poem The Lamb was in Blakes Songs of Innocence, which was published in 1789. The Tyger, in his Songs of Experience, was published in 1794. In these contrasting poems he shows symbols of what he calls the two contrary states of the human soul (Shilstone 1). In The Lamb, Blake uses the symbol of theRead MoreSongs of Good and Evil1545 Words   |  7 Pages(William Blake Biography). In August 1782 Blake married Catherine Boucher, with whom he fell in love at first sight (Encyclopedia of World Biography). Blake taught Catherine to read and write, and she later became his assistant. Blake wrote Songs of Innocence and Songs of Experience in 1794. With the help of his wife, Catherine, Blake hand-engraved his poems and paintings on a bronze board while his wife, Catherine, assisted with the binding and coloring of the poems (Zhan). At first, Blake experiencedRead More Comparing The Lamb and The Tyger by William Blake Essay1458 Words   |  6 PagesComparing The Lamb and The Tyger by William Blake This essay will focus on the enchanting poem, The Lamb which is taken from the Songs of Innocence which will be compared and contrasted with the mysterious poem, The Tyger, which is taken from the Songs of Experience. The poem of The Lamb represents the childs early years whereas The Tyger portrays an adult (the dominator). Blake has constructed these two poems from natural views and by comparing and contrastingRead More The Poems of William Blake Essay2391 Words   |  10 Pagesbeing free, therefore he disliked the rulings of kings and priests. All that surrounded him had an influence on his poetry. His poems are separated into innocence and experience, both opposites as Innocence has the sounds of laughter and joy the images of simplicity, children being protected, unthreatening animals like the birds and the lamb also beauty of nature, the roses and the non scary daylight, brightness and sunshine reflecting the creators warm love. Next, experience which is somethingRead More Comparing The Lamb and The Tyger by William Blake Essay1288 Words   |  6 PagesComparing The Lamb and The Tyger by William Blake In this essay I am going to analyse, compare and contrast two poems by William Blake. They are called The Lamb and The Tyger. I will be looking at how Blake uses imagery, structure and form to create effects and how the environment that Blake lived in affected the way he wrote his poems. In the late 18th century, the world was changing and developing into a new world quite fast. Blake was born in London, the third of five children

Thursday, December 19, 2019

Pluto s Life As A Planet - 1436 Words

Pluto s life as a planet was very short, lasting only 75 years—which is less than a third of its orbital period. While Pluto independently orbits the sun in a spheroidal shape—two classifications for being considered a planet—Pluto lost its title with the discovery of Eris. Pluto also travels on a different plane than the rest of the planets, and because it has an extremely elliptical orbit, it occasionally crosses Neptune s orbital path and, therefore, is occasionally closer to Earth than Neptune (Countdown, 2011). As a dwarf planet Pluto is the only binary planet in the system due to one of its five moons being half of its size. Pluto, the ninth planet in our solar system, was mourned by many when astronomers decided in 2006 that it did not fit the definition of a planet. With the discovery of Eris (a dwarf planet bigger than Pluto) in 2005, it is easy to understand why astronomers finally ruled out Pluto as a planet. However, there has been a debate as to whether or not Pluto should be allowed back. The biggest downside to claiming Pluto as a planet again is that astronomers will have to classify other dwarf planets as a part of our solar system, forcing children to memorize at least 25 planets instead of eight (Lemonick, 2014). Whether or not it becomes a planet again, we will still be expanding our knowledge of the dwarf planet and its moons, as well as its impact in our solar system. The discovery of Pluto is quite interesting considering Lowell s dedication toShow MoreRelatedThe Earth s Planetary Group1104 Words   |  5 Pagesthe most fascinating was the point at which we discussed the earth s planetary group. I discovered that the earth s planetary group has numerous things in it, however as large as the earth s planetary group is it just has one stay which is called Sol which is otherwise called the sun. The earth s planetary group is 4.568billion years of age, and it comprises of eight planets. The IAU is right now perceiving five midget planets, however of the five there are perhaps a few hundred more to be namedRead MoreSci151 - Planetary Comparison1355 Words   |  6 Pages May 3, 2011 Norman Stradleigh Planetary Comparison Planet Earth is the third planet from the Sun and the fifth largest of the planets of the Solar System. Earth’s surface is 71 percent water and is the only astronomical planet currently known where life exists. Earth is our home planet. Scientist and astronomers have studied our planet for Centuries and they have discovered much about our planet. Scientist have gained so much more knowledge of our Solar System in the lastRead MoreShould The United States Attempt A Manned Mission?927 Words   |  4 Pagescapabilities of humans. We desire to figure out our purpose of being the only known living and thriving planet in the Universe. We take satellite pictures of our planet as well as other planets in our solar system and out of it. Our solar system consists of an average star we call the Sun, the planets Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, and Pluto. In addition, Mars is a planet that the National Aeronautics and Space Administration (NASA) have t aken an interest upon. The appealRead MoreIn a Category All Their Own: Dwarf Planets Essay1893 Words   |  8 Pagesobserved as either a star or a planet. During the twentieth century, with advancement in telescopes to see further into space with more accurate details, scientists were able to find numerous stars and planet like objects within the solar system. Scientists had no trouble classifying objects such as Uranus and Neptune as planets. However, the real trouble came when they discovered a planetary object called Ceres. Objects like Ceres and Pluto behaved similarly to regular planets. Because of the limitationsRead MoreSpace Exploration : Science Fiction1156 Words   |  5 Pagesyears. Ideas such as landing humans on mars, the recent flyby of pluto and landing a probe on an asteroid are related to space exploration.This trend is anything that is space related and gives us a better understanding of the universe. This trend affects everyone. Space exploration is a human achievement, if bacteria lif e is found on mars, then it would be a human discovery. When Neil Armstrong first stepped on the moon he said â€Å"That s one small step for a man, one giant leap for mankind.† As previouslyRead MorePossibility Of Life On Europa1568 Words   |  7 Pages The thesis of this paper is that possibly finding life on Europa, likely in the future, will illuminate the origins of life on Earth but will likely cause conflict for some subcultures as well. Section 1: Possibility of Life on Europa There is possibility of finding life on Europa. Europa is one of four moons orbiting Jupiter. The premises of the possibility of life on Europa is that there are hydrothermal vents with life on Earth as well as on Europa. By observation, it is known that Europa hasRead MoreThe Planet Of Earth : Planet Earth1234 Words   |  5 PagesDescriptions of the 8 planets including a dwarf planet: Mercury: Mercury is only slightly larger than earth’s moon and the sun is the closest to this planet than any other planet. This planet can reach 840 degrees Fahrenheit (450 Celsius). Its diameter is 3,031 miles (4,878 km), its orbit is 88 earth days and mercury’s full day lasts 58.6 earth days. Venus: Venus takes first place when it comes to the hottest planet. Venus is substantially hot with an atmosphere that is toxic. The diameter isRead MoreApplication And Values Of The Non Living Entities1350 Words   |  6 Pagesto assist with locating specific places/things. God has given us his written word to serve as a GPS to help us navigate life’s turns and twists. Just like a GPS, the Bible only works if you use it. By using it we can avoid going the wrong way in life, and avoid situations and circumstances because God has filled it with coordinates that will lead us to him in all thing. Psalms 8:3 in the Bible says, When I consider Your heavens, the work of Your fingers, the moon and the stars, which You haveRead MoreResearch Review Of New Horizons 2375 Words   |  10 PagesResearch Paper– A Trip to Pluto Synopsis: New Horizons is the first probe to get within 8000 miles of Pluto. We currently think our best shot at finding extraterrestrial life is Mars or Europa, but if New Horizon were to send us signs of life from Pluto, it would drastically change goals for the future of space exploration. A manned mission to Pluto might go from a distant dream to a top priority, but the challenges of such a journey are immense. The spacecraft must be able to travel to the outerRead MoreThe Solar System1779 Words   |  8 PagesThe solar system consists of our sun and everything that travels around it such as, eight planets and their moons, asteroids, comets, and other space objects. Our solar system is constantly in motion and has an elliptical shape which means it looks like an egg. It is believed to be more than 4 million years old and contain some of our most amazing discoveries. Theories suggest that our solar system along with our Universe formed due to the â€Å"big bang.† The big bang was an explosion that in response

Wednesday, December 11, 2019

Challenges Faced By VIC -Free-Samples for Students-Myassignment

Questions: 1.Use a diagram (produced by the means of using Rationale, Visio or any other relevant software application of your choice) to illustrate current security risks and concerns considered by the VIC government. 2.Provide detailed explanation of the diagram and identify the areas of: high, medium, medium-low, and low risk exposure. 3.Carry out comparative analysis of the Deliberate and Accidental Threats and rank those threats in order of importance. Justify your rankings not only on the basis of the case study but also by the means of doing further research and drawing upon other relevant case studies (e.g. Security guidelines for other private and public organizations) that you can identify. 4.While drawing upon theories, tools and patterns covered in the subject as well as your own research, explain the challenges that the VIC government is going to face while deciding on whether security/risk management should be carried out internally or externally (e.g. via outsourcing). 5.Explain the difference between the concepts of Risk and Uncertainty (make sure that your discussion is linked to the case considered). 6.Discuss and evaluate (with examples) different approaches available to the VIC government for risk control and mitigation. Answers: Introduction: The VPDSF or the Victorian Protective Data Security Framework has been the overall scheme to manage the protective risks of data security at the public sector of Victoria. The framework has been encouraging the cultural transformation in the sector through the promotion of protective security of data as the part of daily business ("CPDP - Home", 2017). The following report used diagram and theoretical explanations about the areas of risk. It has covered the comparative analysis on accidental and deliberate threats and the challenges faced by VIC or Victoria government to implement the risk management. Further, it has compared the ideas of risk and uncertainty and lastly discussed with examples the process to control and mitigate risks. 1.Diagram illustrating the current security risks and concerns considered by VIC government: Figure 1: Current security risks and concerns considered by the VIC government (Source: Created by Author) 2.Explanation of the diagram: The risks have been lying on the foundation of certain basic features. The event risk is the possibility that could negatively affect the VPDSF by any unforeseen event. The recurrent risks have been originating as an insufficient reporting format on the capacity and the inventory. The emerging risks has been perceived to be significant but are not been understood fully (McNeil, Frey Embrechts, 2015). There have been the creeping risks also. They have been originating from the present non-planning. These are done by various jurisdictions of the rising demographic changes in the workplace. The risks are identified below, according to the very high, high, medium, medium-low and the low risk areas of exposure. The level of risks The identified risks Description High The state significance risk These are the risks where the potential impacts or the consequences of the risk on the private sectors, community and the government have been large as the state significance. It could be the extension of the current agency risk that beyond any particular threshold turns serious enough having wide implications. This could also be the assimilation of various agency specific risks. Medium The primary systematic risks for VPS These risks have the implications for every parts of the government operations. This has needed the high level of the coordination and management between the agencies (Hopkin, 2017). As with the state significant and the inter agency risks the agencies have been responsible regarding the contrition of the management and recognition of the system risks as the proper one. Medium-low The primary interagency risks These risks have been the shared risks by the two or more than two agencies. These agencies require the coordinated management through more than a single agency. This might include the systemic risks. The role to control the inter-agency risk has been shared by every related agency and takes advantages from the coordinated responses. Here one of the agencies has been taking the lead role. Low The agency specific risks These risks could be managed completely under one operation of the agency (Davies, 2014). It could be well understood generally and managed effectively with the simple process of risk management. 3.Comparative analysis of the Deliberate and Accidental Threats: The deliberate threats: These types of threats are arranged according to their order of importance. The trespass or espionage: This has been taking place as any unauthorized people try to have illegal access. The information extortion: This has been happening as the attackers threatened by the conditions commit any theft or they possess their individual intention in committing theft of the data under VPDSF. The vandalism or sabotage: This has also been taking place which id the international act involving the destruction of the website of VPDSF. The theft of the information or equipment: As the storage devices or the computers experience the decrease in size and the rise in strength the devices could be stolen easily. The cost of the loss of the electronic devices like the laptops has been including the loss of intellectual property, data, productivity and new laptop replacement. Compromising to the intellectual property: This has been created by various people and organizations. They are protected by the copyright laws, patent and trade secret. The software attack: This has been rising in the age of computerization as the attackers have been using the malicious software infecting more companies worldwide (Haimes, 2015). The accidental threats: The accidental threats have been happening as the staffs have not been vigilant or alert. They have been moreover unaware of the consequences or risks of the cyber attacks and are unaware of the security policies. These threats have been regarding the following. The social engineering: This has been occurring as the staffs fall victim to the phishing attacks where the attackers retrieve the sensitive data through impersonating anyone trusted. The poor security of password: This take place as the staff sets weak passwords or possesses poor behavior such as wiring or sharing them down anywhere. This has been thus permitting the access to the unauthorized people. The unauthorized download of the damaged applications and software: This has been taking place without the department of IT knowing about that. These downloads could have the malware spread around the entire network (Mcube, Gerber Von Solms, 2016). 4.Challenges that VIC government might face: The message stating that the security should be the essential component of outsourcing is not new in the market. Similarly the requirement of setting particular criteria, to select the suppliers as the tool, for managing the outsourcing security risks is also documented. Despite that, the taking in account of the patterns, of lesser time frames, is often associated with the outsourcing decisions. The security risk analysis might also be conducted at the proper time and with the needed granularity. In few cases, the challenges for the risks might not be taken into consideration (Lam, 2014). For instance, this take place where the very preliminary theory of Lift and shift attitude has been applied in the outsourcing of the activities of business. Also as the security necessities are agreed, the challenges could also take place with the current responsibility ownership and the security controls. This happens especially as the amount of vendors is included with the deliveries of the simi lar service or product. The stakeholders or the customers have turned out to be more concerned regarding the information and privacy confidentiality. This is due to the rise of the abuse of personal information via identity theft and fraud. The other challenges from the threat levels have also been occurring. The VICs prominent position under the ICT sector has been pointing to the target for the agent of threats. They have been finding the comprising of availability, integrity and confidentiality of the data or the operational capability. Additional concerns have been lying under the global extension of the IT infrastructures of the country external to the conventional protection domains (Sadgrove, 2016). The selection of the lesser supplier numbers for the critical processes of business have been resulting in the aggregation of data. This might not take place under the own infrastructure of IT of VIC. The changes have been delivering new scopes for the agents of identity information vulnerabilities and as sets. This has been in the geographical sectors that might have been more susceptible to the targeting attacks. 5.Difference between the Risk and Uncertainty: There has been a saying that without any risk there has been no gain. As the VIC government needs to survive in the long term, they require taking the measured risks where the losing probability has been less comparatively. Moreover the changes of benefits have been higher here. The difference between the concepts of risk and uncertainty is described below: The basis Risk Uncertainty Meaning It has been the probability to loose or win anything worthy. This has been implying to the case where the future vents have been unknown. Outcome The changes of the outcome are already known. Here, the chances of the outcomes are not known. Control This is controllable. This has been uncontrollable. Ascertainment It could be measured It could never be measured. Minimization Here the minimization take place Here no minimization take place Probabilities Here the probabilities are assigned Here no probabilities are assigned. Distinction in nature The risk has been the measured uncertainty. The uncertainty has been the unknown risk. Insurance and the insurability There have been particular risks fully covered by taking the insurance policies like the robbery, theft, draught, flood and fire (Pritchard PMP, 2014). In the uncertainty the insurance has not been possible. Transferability The risks could be transferred into other risks However, the uncertainty could not be transferred. Elements of costs The cost of production also includes the risk bearing costs. The entrepreneur never gets any benefit for bearing the risks. The uncertainty has not been involved in the production cost. The profit has been the reward of entrepreneur to bear the uncertainty. Subjectivity and objectivity The risk has been objective. The uncertainty has been subjective. The knowledge of the alternatives Every possible alternative to the challenges have been known by the economists from before. Here the prior knowledge has not been possible. Nature of decisions The decisions taken in risks situations are of lesser importance. The decision undertaken under the uncertainty situations have been more vital that the risk decisions taken under the risk situations (Webster, 2014). This has been due to the measuring of the alternatives has not been possible in the condition of uncertainty. 6.Discussion and evaluation of different approaches available for risk control and mitigation: The various approaches to control and mitigate the risks are as follows. Approaches Discussion Evaluation with examples Establishing the context This indicates the understanding of the objectives and defining the internal and external factors that could be the uncertainty source. This helps in identification of risk and setting scope and the risk criteria regarding the residual process of risk management at VIC. Risk identification This determines why, hoe, when, where and what risks could arise. The various industry and government resources could be employed for assisting the recognition if risks (Brindley, 2017). The risk analysis This indicates the level of risk against the risk criteria through the understanding of how fast the risk could take place (Libich Mach?ek, 2017). The analysis are considered at VIC regarding the effectively of the current controls. It has been following the typical process of risk analysis to apply the likelihood and consequence matrix. The risk treatment This has been involving the selection and assessment of one or more scopes to modify risks. In VIC this is done by altering the likelihood or outcomes and implementation of the chosen options by the treatment plan. Consultation and communication This has been taking place around the process of risk management with the stakeholders identified. At VIC this is done by ensuring the accountable to implement the process of risk management. The stakeholders must know the basis over which the decisions have been made (Webster, 2014). Monitoring and review This confirms that the risks of the risk and control treatments have been monitored (Webster, 2014). AT VIC this could be reported for assuring that the altering priorities and context have been managed and the rising risks are identified. Conclusion: The risks have been involving the short and long terms effects. They are recurrent, event based, creeping or the emerging features. With the emerging risks, the VPDSF have developed the understanding of the scopes of the threats. Keeping these potential effects in mind, the report has helped to understand the monitoring of the risks with further investigation. The stakeholders of VIC government have been consistently aware of the dependability of the electronic information and the risks. These are seen or otherwise presented not only by the malicious activities but also by the accidental exposure. The uncertainty has been inherent in VIC. This could not be avoided. However, in order to complete the projects successfully, VIC must be very proactive, cautious and free minded in managing the uncertainty and risks References: Brindley, C. (Ed.). (2017).Supply chain risk. Taylor Francis. CPDP - Home. (2017).Cpdp.vic.gov.au. Retrieved 21 August 2017, from https://www.cpdp.vic.gov.au/10-data-security Davies, J. C. (2014).Comparing environmental risks: tools for setting government priorities. Routledge. Drennan, L. T., McConnell, A., Stark, A. (2014).Risk and crisis management in the public sector. Routledge. Haimes, Y. Y. (2015).Risk modeling, assessment, and management. John Wiley Sons. Hopkin, P. (2017).Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Libich, J., Mach?ek, M. (2017). Insurance by government or against government? Overview of public risk management policies.Journal of Economic Surveys,31(2), 436-462. McNeil, A. J., Frey, R., Embrechts, P. (2015).Quantitative risk management: Concepts, techniques and tools. Princeton university press. Mcube, U., Gerber, M., Von Solms, R. (2016, May). Scenario-based IT risk assessment in local government. InIST-Africa Week Conference, 2016(pp. 1-9). IEEE. MetaAuthor:, M. (2017).Victorian Government Risk Management Framework.Vmia.vic.gov.au. Retrieved 21 August 2017, from https://www.vmia.vic.gov.au/risk/victorian-government-risk-management-framework Olson, D. L., Wu, D. D. (2015).Enterprise risk management(Vol. 3). World Scientific Publishing Co Inc. Pritchard, C. L., PMP, P. R. (2014).Risk management: concepts and guidance. CRC Press. Sadgrove, K. (2016).The complete guide to business risk management. Routledge. Webster, D. (2014). Effective Enterprise Risk Management: Mapping the Path Forward.Managing Risk and Performance: A Guide for Government Decision Makers, 267-292. Webster, D. W. (2014). Introduction to Enterprise Risk Management for Government Managers.Managing Risk and Performance: A Guide for Government Decision Makers, 113-136.

Tuesday, December 3, 2019

The Jaguar Project Questions free essay sample

To illustrate the principles described in the Systems Engineering Body of Knowledge (SEBoK) Parts 1-6, Part 7 is a collection of systems engineering (SE) implementation examples. These examples describe the application of SE practices, principles, and concepts in real settings. The intent is to provide typical instances of the application of SE so readers can learn from these experiences. This can improve the practice of SE by illustrating to students, educators, and practitioners the benefits of effective practice, as well as the risks and liabilities of poor practice. A matrix of implementation examples is used to map the implementation examples to topics in the SEBoK, primarily Part 3. To provide a broader set of domains, both formal case studies and shorter vignettes are used. For the case studies, an introduction and analysis of the case is given with references to the full external case study. For the vignettes, the implementation example is described directly. We will write a custom essay sample on The Jaguar Project Questions or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page In the SE literature, a wide variety of examples and formats are considered case studies. Here, the distinction between a case study and a vignette is that a vignette is a short wiki article written for the SEBoK and a case study exists externally in the SE literature. An initial set of examples is included with the anticipation that more will be added over time to highlight the different aspects and applications of SE. In addition, new examples can be added to demonstrate the evolving state of practice, such as the application of model-based SE and the engineering of complex, adaptive systems. Knowledge Areas in Part 7 Each part of the SEBoK is divided into knowledge areas (KAs), which are groupings of information with a related theme. Part 7 is organized into the following KAs: †¢ Matrix of Implementation Examples †¢ Case Studies †¢ Vignettes References None. Matrix of Implementation Examples The following matrix maps the SEBoK Systems Engineering Implementation Examples to topics in the Systems Engineering Body of Knowledge (SEBoK), primarily Part 3. It provides both a list of potential systems engineering implementation examples for topics of interest, and a list of relevant topics for each implementation example. Since the number of topics in the SEBoK is extensive, only a subset are included here for clarity. For additional information, see the implementation example of interest and the corresponding SEBoK topic. Organization and Mapping of Case Studies to the SEBoK The following short titles shown in Table 1 (Developed for BKCASE) are used for the implementation examples: Table 1. Short Titles for the SEBoK Case Studies and Vignettes. (SEBoK Original) Case Studies Vignettes HST Hubble Space Telescope Bag Handling Denver Airport Baggage Handling System GPS Global Positioning System VA Sub Virginia Class Submarine Radiation Medical Radiation Route Mod UK West Coast Route Modernisation Project FBI VCF FBI Virtual Case File System Water Mgmt Singapore Water Management MSTI Miniature Seeker Technology Integration FAA AAS FAA Advanced Automation System Infusion Pump Next Generation Medical Infusion Pump Light Rail Standard Korean Light Transit System Table 2 shows how the topics (each row) align with the implementation examples (each column). Table 2. Implementation Examples. Coverage of SEBoK Topics for Each Case Study and Vignette. (SEBoK Original) SEBoK Topic (Part 3) HST GPS Radiation FBI VCF MSTI Infusion Pump Bag Handling VA Sub Route Mod Water Mgmt FAA AAS Light Rail Mission Analysis X X X X X Stakeholder Needs and Requirements X X X X X System Requirements X X X X X X X Architectural Design: Logical X X X X X X X X Architectural Design: Physical X X X X X X X X System Analysis X X X X X System Implementation X X System Integration X X X X X X System Verification X X X X X X X System Validation X X X X X X X System Deployment X X Operation of the System X X X X System Maintenance X SEBoK v. 1. 0 Extracted from www. sebokwiki. org/1. 0 on September 13, 2012 Matrix of Implementation Examples 3 Logistics X Planning X X X X X X X X Assessment and Control X X X X X Risk Management X X X X X X X X X X Measurement X X Decision Management X X X X Configuration Management X X X X Information Management X Quality Management X References None.