Marco Scardino Achitecture Portfolio 2013LUCANO_86
This is the last version of my architecture portfolio.
This portfolio wants to briefly show my new projects, my new design, my disposition and my technical skills.
This document discusses digital inclusion initiatives in Brazil through the development of wireless corridors. It provides an overview of the Wireless Corridor concept launched in 2005 to provide broadband access in underserved areas. Examples are given of projects in Mangaratiba, Brazil that have helped digitally include over 43,000 people in the last 4 years. Challenges of digital inclusion initiatives are outlined related to infrastructure, time to market, and technology transitions.
Seeking to control Enterprise with AchitectureMikkel Brahm
ITU EA Summer School, Findings from the PhD thesis "Seeking to control Enterprise with Achitecture" by Mikkel H. Brahm (work in progress, provisional thesis title, forthcomming 2017-2018)
1) The document discusses systems and methods, arguing that methods precede systems and people often progress in nonlinear ways even if bounded by linear systems.
2) It presents a "Yongian Architectonic" of categories that make meaningful distinctions without creating dichotomies, and suggests reality involves an ongoing growth in freedom and value through emergent realities letting go of equality with their origins.
3) While some see reality as fragile and contingent, the author argues ours is a narrative of remembering our origins and returning home, not of forgetting.
Group members presented on the system operation and management challenges facing Ninak Fireworks. Ninak faces issues with stock level management and a lack of an efficient database. The group recommends implementing a SQL database to track customer sales weekly and monthly, product popularity, and manage stock levels. A SQL database would allow for quicker data access and management compared to Ninak's current manual system, reducing errors and improving accountability.
The document provides a brief history of computers over several generations from ancient calculating devices like the abacus to modern digital computers. It discusses early mechanical computers from the 17th century through early electronic computers of the 1940s-50s. The five generations of computers are then outlined from first generation vacuum tube computers of 1942-1955 to the emerging fifth generation with artificial intelligence capabilities. Different types of computers like analog, digital, and hybrid systems are also defined.
Marco Scardino Achitecture Portfolio 2013LUCANO_86
This is the last version of my architecture portfolio.
This portfolio wants to briefly show my new projects, my new design, my disposition and my technical skills.
This document discusses digital inclusion initiatives in Brazil through the development of wireless corridors. It provides an overview of the Wireless Corridor concept launched in 2005 to provide broadband access in underserved areas. Examples are given of projects in Mangaratiba, Brazil that have helped digitally include over 43,000 people in the last 4 years. Challenges of digital inclusion initiatives are outlined related to infrastructure, time to market, and technology transitions.
Seeking to control Enterprise with AchitectureMikkel Brahm
ITU EA Summer School, Findings from the PhD thesis "Seeking to control Enterprise with Achitecture" by Mikkel H. Brahm (work in progress, provisional thesis title, forthcomming 2017-2018)
1) The document discusses systems and methods, arguing that methods precede systems and people often progress in nonlinear ways even if bounded by linear systems.
2) It presents a "Yongian Architectonic" of categories that make meaningful distinctions without creating dichotomies, and suggests reality involves an ongoing growth in freedom and value through emergent realities letting go of equality with their origins.
3) While some see reality as fragile and contingent, the author argues ours is a narrative of remembering our origins and returning home, not of forgetting.
Group members presented on the system operation and management challenges facing Ninak Fireworks. Ninak faces issues with stock level management and a lack of an efficient database. The group recommends implementing a SQL database to track customer sales weekly and monthly, product popularity, and manage stock levels. A SQL database would allow for quicker data access and management compared to Ninak's current manual system, reducing errors and improving accountability.
The document provides a brief history of computers over several generations from ancient calculating devices like the abacus to modern digital computers. It discusses early mechanical computers from the 17th century through early electronic computers of the 1940s-50s. The five generations of computers are then outlined from first generation vacuum tube computers of 1942-1955 to the emerging fifth generation with artificial intelligence capabilities. Different types of computers like analog, digital, and hybrid systems are also defined.
Dokumen ini membahas pengukuran nilai-nilai kebutuhan achievement, affiliation, dan power menggunakan indikator-indikator tertentu. Terdapat pembobotan atribut dan perhitungan nilai akhir untuk masing-masing kebutuhan.
The Romans adapted architectonic elements from the Greeks for their urban needs. The Roman orders, including the Tuscan, Doric, Ionic, Corinthian and Composite orders, were modifications of the Greek orders. A key characteristic of Roman design was the combined use of the arch constructed with a lintel. Common Roman architectural features still used in modern buildings include columns, cornices, pediments, acroteria, triglyphs and metopes, and arches with lintels.
This document provides an introduction and history of computers. It defines what a computer is and who a user is. It describes the differences between data and information, and explains information technology. The document then outlines the history of computers from mechanical to modern electronic computers in four generations, describing the technologies used in each generation. Finally, it classifies different types of computers such as supercomputers, mainframes, workstations, servers, desktops, laptops and palmtops based on their features and common uses.
This document discusses various software architectures and design concepts including three-tier architecture, layered architecture, reference architecture, OSI reference model, horizontal and vertical partitioning, and analyzing architectural design. It provides references for further reading on requirements engineering processes, software requirements, and software engineering.
11 Operation System Design And PlanningDhimas kasep
The document discusses operation system design and planning. It covers key aspects like the life cycle of an operation system, product/service and process technology diffusion, major classifications of manufacturing and service processes, equipment selection considerations, types of facility layouts, and operation planning methods. The goal of operation system design is to permit production of goods and services at desired quality, volumes, and cost over the life cycle through integration of product/service delivery with facilities and process technologies.
This document provides an overview of product and service design. It discusses how product and service design translates customer wants and needs into requirements. It also discusses developing new products/services, quality goals, cost targets, and prototyping. Reasons for redesign include market opportunities/threats. The document also covers value analysis, objectives of design like customer satisfaction and cost, issues like lifecycles and standardization, designing for mass customization, phases of design like idea generation and feasibility analysis, and types of processes like job shop and batch processing.
This document provides an overview and instructions for operating an automatic fire detection system at a hotel. It describes the key components of the system, including the Bosch FPA-5000 modular fire panel, intelligent addressable detectors, manual call points, and notification appliances. It explains how to install and connect the different detectors, operate the fire panel interface for bypassing zones, viewing history logs, and conducting drills and resets. The document also outlines the working principles of optical and thermal detectors and shows how to install and operate the manual call points.
The document contains a student registration form listing student names, registration numbers, and assigned slide numbers. It then discusses the key differences between Microsoft Office 2010 and 2007. Some of the main improvements in Office 2010 include a more intuitive ribbon interface with a home menu system, enhanced digital signatures and paste preview options, and the backstage view which combines printing tools. For PowerPoint 2010, improvements include separate transitions and animations tabs, more animation effects, and the ability to broadcast slideshows online. Excel 2010 allows for more customization of ribbons and defines conditional formatting, while Access 2010 provides improved database management tools.
This document provides an overview of how to use Microsoft Project to plan and track a project. It discusses defining the project properties including the start date. It describes adding tasks, durations, predecessors and grouping tasks. It explains identifying and tracking the critical path. Finally, it covers managing resources by identifying available resources, assigning them to tasks, and tracking costs. The overall document serves as a tutorial for using Microsoft Project to manage all aspects of a project from initial planning through ongoing tracking.
The document discusses the five generations of computers from the first to fifth generation. [1] The first generation used vacuum tubes and were very large in size. [2] The second generation used transistors and were smaller with magnetic storage. [3] The third generation used integrated circuits and were smaller still with multiple users accessing remote terminals.
The document discusses fire detection and alarm systems. It provides details on:
1) The purposes of fire detection systems which are to detect fires, notify occupants, summon assistance and initiate suppression systems.
2) The basic components of systems including input devices like manual pull stations and detectors, and output devices like alarms and controls.
3) Different types of detectors like heat, smoke and gas detectors and their functions.
4) Factors to consider for detector placement like area size and layout.
5) Conventional and addressable microprocessor-based systems and their advantages.
6) Approvals and standards required for fire detection systems.
Bet you thought you knew everything satellites were used for....military and civilian observation, communication, navigation, weather and research? Yep. But, how about for advertising? HUH?? Read this presentation as Momentum Worldwide has a bit of fun creating a recommendation on how brands can use satellites as "stars" in the shape of logos to promote their products in the sky! We are a bit late for April Fools...but it is still hilarious!
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes, were enormous in size, and had low processing speeds. The second generation used transistors, were smaller and more reliable. The third generation used integrated circuits, which were faster and cheaper to produce. The fourth generation used microprocessors, allowing computers to become smaller and more personal. Current computers are considered fifth generation, pursuing artificial intelligence and new technologies like quantum computing.
Fire detection and alarm systems are installed to notify occupants of a fire, summon assistance to fight fires, and initiate automatic suppression systems. There are different types of automatic alarm initiating devices like heat, smoke, and flame detectors that sense fire. Indicating devices like audible alarms and visible strobes alert people of a fire. Automatic alarm systems transmit alarm signals off-site to notify emergency responders. These systems are supervised to ensure proper operation and may include auxiliary functions to support firefighting and safety.
Microsoft Excel 2007 is a widely used spreadsheet program that is part of the Microsoft Office suite, with capabilities for performing calculations, organizing data, creating charts and graphics, and automating tasks through macros. Excel allows users to enter and manipulate data in worksheets and perform calculations with formulas, analyze information with built-in functions and tools, and visualize data through a variety of chart types. Key features and functions of Excel 2007 include entering and editing data, working with formulas and functions, formatting worksheets, inserting objects and illustrations, printing and preparing files, reviewing and sharing workbooks, and customizing the Excel environment.
Dokumen ini membahas pengukuran nilai-nilai kebutuhan achievement, affiliation, dan power menggunakan indikator-indikator tertentu. Terdapat pembobotan atribut dan perhitungan nilai akhir untuk masing-masing kebutuhan.
The Romans adapted architectonic elements from the Greeks for their urban needs. The Roman orders, including the Tuscan, Doric, Ionic, Corinthian and Composite orders, were modifications of the Greek orders. A key characteristic of Roman design was the combined use of the arch constructed with a lintel. Common Roman architectural features still used in modern buildings include columns, cornices, pediments, acroteria, triglyphs and metopes, and arches with lintels.
This document provides an introduction and history of computers. It defines what a computer is and who a user is. It describes the differences between data and information, and explains information technology. The document then outlines the history of computers from mechanical to modern electronic computers in four generations, describing the technologies used in each generation. Finally, it classifies different types of computers such as supercomputers, mainframes, workstations, servers, desktops, laptops and palmtops based on their features and common uses.
This document discusses various software architectures and design concepts including three-tier architecture, layered architecture, reference architecture, OSI reference model, horizontal and vertical partitioning, and analyzing architectural design. It provides references for further reading on requirements engineering processes, software requirements, and software engineering.
11 Operation System Design And PlanningDhimas kasep
The document discusses operation system design and planning. It covers key aspects like the life cycle of an operation system, product/service and process technology diffusion, major classifications of manufacturing and service processes, equipment selection considerations, types of facility layouts, and operation planning methods. The goal of operation system design is to permit production of goods and services at desired quality, volumes, and cost over the life cycle through integration of product/service delivery with facilities and process technologies.
This document provides an overview of product and service design. It discusses how product and service design translates customer wants and needs into requirements. It also discusses developing new products/services, quality goals, cost targets, and prototyping. Reasons for redesign include market opportunities/threats. The document also covers value analysis, objectives of design like customer satisfaction and cost, issues like lifecycles and standardization, designing for mass customization, phases of design like idea generation and feasibility analysis, and types of processes like job shop and batch processing.
This document provides an overview and instructions for operating an automatic fire detection system at a hotel. It describes the key components of the system, including the Bosch FPA-5000 modular fire panel, intelligent addressable detectors, manual call points, and notification appliances. It explains how to install and connect the different detectors, operate the fire panel interface for bypassing zones, viewing history logs, and conducting drills and resets. The document also outlines the working principles of optical and thermal detectors and shows how to install and operate the manual call points.
The document contains a student registration form listing student names, registration numbers, and assigned slide numbers. It then discusses the key differences between Microsoft Office 2010 and 2007. Some of the main improvements in Office 2010 include a more intuitive ribbon interface with a home menu system, enhanced digital signatures and paste preview options, and the backstage view which combines printing tools. For PowerPoint 2010, improvements include separate transitions and animations tabs, more animation effects, and the ability to broadcast slideshows online. Excel 2010 allows for more customization of ribbons and defines conditional formatting, while Access 2010 provides improved database management tools.
This document provides an overview of how to use Microsoft Project to plan and track a project. It discusses defining the project properties including the start date. It describes adding tasks, durations, predecessors and grouping tasks. It explains identifying and tracking the critical path. Finally, it covers managing resources by identifying available resources, assigning them to tasks, and tracking costs. The overall document serves as a tutorial for using Microsoft Project to manage all aspects of a project from initial planning through ongoing tracking.
The document discusses the five generations of computers from the first to fifth generation. [1] The first generation used vacuum tubes and were very large in size. [2] The second generation used transistors and were smaller with magnetic storage. [3] The third generation used integrated circuits and were smaller still with multiple users accessing remote terminals.
The document discusses fire detection and alarm systems. It provides details on:
1) The purposes of fire detection systems which are to detect fires, notify occupants, summon assistance and initiate suppression systems.
2) The basic components of systems including input devices like manual pull stations and detectors, and output devices like alarms and controls.
3) Different types of detectors like heat, smoke and gas detectors and their functions.
4) Factors to consider for detector placement like area size and layout.
5) Conventional and addressable microprocessor-based systems and their advantages.
6) Approvals and standards required for fire detection systems.
Bet you thought you knew everything satellites were used for....military and civilian observation, communication, navigation, weather and research? Yep. But, how about for advertising? HUH?? Read this presentation as Momentum Worldwide has a bit of fun creating a recommendation on how brands can use satellites as "stars" in the shape of logos to promote their products in the sky! We are a bit late for April Fools...but it is still hilarious!
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes, were enormous in size, and had low processing speeds. The second generation used transistors, were smaller and more reliable. The third generation used integrated circuits, which were faster and cheaper to produce. The fourth generation used microprocessors, allowing computers to become smaller and more personal. Current computers are considered fifth generation, pursuing artificial intelligence and new technologies like quantum computing.
Fire detection and alarm systems are installed to notify occupants of a fire, summon assistance to fight fires, and initiate automatic suppression systems. There are different types of automatic alarm initiating devices like heat, smoke, and flame detectors that sense fire. Indicating devices like audible alarms and visible strobes alert people of a fire. Automatic alarm systems transmit alarm signals off-site to notify emergency responders. These systems are supervised to ensure proper operation and may include auxiliary functions to support firefighting and safety.
Microsoft Excel 2007 is a widely used spreadsheet program that is part of the Microsoft Office suite, with capabilities for performing calculations, organizing data, creating charts and graphics, and automating tasks through macros. Excel allows users to enter and manipulate data in worksheets and perform calculations with formulas, analyze information with built-in functions and tools, and visualize data through a variety of chart types. Key features and functions of Excel 2007 include entering and editing data, working with formulas and functions, formatting worksheets, inserting objects and illustrations, printing and preparing files, reviewing and sharing workbooks, and customizing the Excel environment.
1. חישוב הערך "פאי" בדיוק
של 5 טריליון* ספרות אחרי
הנקודה
π
*5 טריליון = 000,000,000,000,5
התפרסם ב- 5 באוגוסט 0102
2. מהו המספר ?π
מייצג את היחס הקבוע בין היקף המעגל •
לקוטרו.
קבוע מתמטי המופיע בנוסחאות רבות •
במתמטיקה ובפיזיקה.
מספר אי רציונלי, כלומר אינו ניתן לכתיבה •
כיחס בין שני מספרים שלמים.
למספר פאי אורך אינסופי של ספרות מעבר •
לנקודה, שלעולם אינן חוזרות על עצמן )אינן
מחזוריות(.
3. נקודות ציון דרך בחישוב הפאי
• קירובים לפאי היו ידועים עוד
בבבל ובמצרים העתיקה, אך
ארכימדס הציג לראשונה שיטה
המאפשרת לחשב אותו.
• שיטתו מתבססת על כך שהיקף
המעגל קטן מהיקפו של מצולע
החוסם את המעגל וגדול מהיקפו
ארכימדס ))Archimedes
212-782( לפנה"ס(
של מצולע החסום במעגל.
4. נקודות ציון דרך בחישוב הפאי
בשנת 6951 השתמש ההולנדי לודולף ואן צאולן
בשיטתו של ארכימדס, וחישב את πבדיוק של 02
ספרות, וכעבור שנים אחדות הגיע לדיוק של 53
לודולף ואן צאולן
ספרות. הוא היה כל כך גאה בהישג זה, עד
()Ludolph van Ceulen
0161-0451 שציווה לכתוב ספרות אלה על מצבתו. גם
הגרמנים התרשמו מאוד מהישג זה, וקראו ל־π
בשם מספר לודולף.
5. חישוב עדכני ומדויק יותר עבור הערך "פאי"
השתכללות המחשבים ומציאת אלגוריתמים יעילים יותר לחישובו של π
הביא לשיא זמני, שנקבע בשנת 0102, של חישוב 5 טריליון הספרות
הראשונות של פאי ע"י Alexander Yeeו- .Shigeru Kondo
יש לציין, שב-1102 אותו צמד הצליח לחשב 01 טריליון ספרות מעבר
לנקודה.
6. כלים לחישוב 5 טריליון הספרות הראשונות
• התוכנה לחישוב נבנתה ע"י .Yee
• המחשב בו הם השתמשו נבנה ע"י .Kondo
מדובר במחשב המוגדר כ"מחשב אישי",
אולם נתוניו גבוהים בהרבה מהמחשב
הביתי הממוצע.
• לתוכנה לקח 09 ימים לחשב את 5 טריליון
הספרות מעבר לנקודה.
כמו כן, נדרשו לה מעל ל-06 שעות לוודא
את התוצאה.
7. משמעות הגילוי העדכני ביותר עבור
הערך "פאי"
• מבחינה יישומית, יש לגילוי חשיבות פחותה יותר,
משום שלצורך זה ניתן להסתפק בדיוק של כמה
עשרות ספרות מעבר לנקודה.
• מנגד, מהבחינה התיאורטית, גילוי זה מהווה אתגר
גדול, וכן לתוצאה זו חשיבות רבה בהפגנת
מהירותם של מחשבים ושל אלגוריתמים.
8. כיצד חישבו את 5 טריליון הספרות הראשונות
של פאי
האלגוריתם לחישוב פותח ע"י Yeeעצמו, שבעברו •
פיתח אלגוריתמים ששברו שיאי חישוב עבור
קבועים נוספים, כגון קבוע eויחס הזהב.
פאי חושב ע"י סכומים אינסופיים המתכנסים אל •
תוך עצמם.
האלגוריתם נובע מסדרה מתכנסת* הידועה בשם •
. Chudnovsky formula
בהמשך Yeeהשתמש בשתי סדרות נוספות •
לווידוא התוצאה.
*סדרה מתכנסת- היא סדרה שיש לה גבול. וגבול של סדרה הוא מספר, שאליו
הולכים ומתקרבים איברי הסדרה עד אינסוף.
10. פעילות – המחשת המספר π
כל תלמיד ישרטט על דף מעגל ובתוכו קוטר. •
כל תלמיד ימדוד בעזרת סרגל את אורך •
הקוטר.
כל תלמיד יקבל חוט, יניח את החוט •
מסביב למעגל, ימדוד את אורך החוט
שהקיף את המעגל בעזרת סרגל,
וכך ימצא למעשה את היקף המעגל.
התלמיד יחשב את היחס בין קוטר •
המעגל לבין היקפו.
מה התוצאה שהתקבלה? השוו עם חברכם. •