Saturday, January 25, 2020

X-37B Orbital Test Vehicle (OTV) Orbit

X-37B Orbital Test Vehicle (OTV) Orbit X-37B ORBITAL TEST VEHICLE COMPLETES 625 DAYS IN ORBIT Wg Cdr PA Patil X-37B Orbital Test Vehicle (OTV), a spacecraft operated by the US Air Force was launched aboard the Atlas-V on December 11, 2012 and is stealthily zooming in orbit rising speculations on its clandestine nature of operations. Designed on the contours of Space Shuttle, X-37B is an unmanned spacecraft with a much smaller size fielding advanced technology in a compact airframe structure. X-37B is modified version in the series of X-37 space craft with the earlier version X-37A being used as an Approach Landing and Test Vehicle (ALTV). The USAF claims that this spacecraft is a technology demonstrator of robotic space plane aimed at validating and corroborating the endurance of reusable space vehicle technology. As on date a total of three X-37B missions have been flown. The first mission launched on April 22, 2010 spent a total of 224 days in space and this was followed up with a second mission launched on March 05, 2011 to complete 469 days in the orbit. The third mission continues to or bit in space and has spent in excess of 625 days creating a longevity record. The space craft conceived by NASA in the year 1999 was designed and developed as a reusable re-entry spacecraft by Boeing Integrated Defense System. The project in the year 2004 was transferred to Defence Advance Research Project Agency (DARPA) and was accorded a classified status by the US Air force. The X-37B is 8.9 meters in length, spans 4.5 meters in width, and is 2.9 meters tall weighing 4990 kg.[1] This mini-Space Shuttle like space plane is characterized by the likes of both an aircraft and a spacecraft has been designed for a vertical launch using an expendable launch rocket. The spacecraft is designed to operate in Low Earth Orbit (LEO) at an altitude of 175 to 800 km and is slated to operate at a nominal speed of 7.4 to 7.8 km/s at these orbital altitudes.[2] Once released into the Low Earth Orbit (LEO), the X-37B can stay in orbits for a prolonged duration spread over months. It would derive the power from a specially designed solar array and also carries lithium-ion batt eries to conserve the propellant fuel.[3] Further, it has been designed for aircraft like maneuverability in space and thus would be capable of changing speeds and the altitude or orbits. As the speed of an object irrespective of mass and size at a given altitude in space is fixed, this space plane can continue in its orbit for an indefinite period till it is commanded to change its course or position. The space craft de-orbits from space under the command from ground and would autonomously re-enter the atmosphere in a glider configuration to land horizontally on a runway. As per the latest data extracted on Aug 16, 2014, the X-37B was found to be in an elliptical orbit with a perigee of 313 km and an apogee of 327 km orbiting at the rate of 15.83 revolutions per day.[4] Further, observations of amateur satellite trackers indicate that the X-37B has made only one or two maneuvers. If these observations are true then the spacecraft would have conserved sufficient reserves of thruster propellant for future maneuverability.[5] The sustenance of X-37B in orbit for such a long duration also suggests that the spacecraft is maintaining a persistent orbital profile. The X-37B program from the very beginning has intrigued the world on the secretive nature of its mission and profiles. As per the X-37B OTV factsheet displayed on website of US Air Force, â€Å"the program is to evaluate and test technology of advance guidance, navigation and control, thermal protection systems, avionics, high temperature structures and seals, conformal reusable insulation and lightweight electromechanical flight systems†.[6] However, majority of these stated assessments involve the evaluations in the de-orbiting phase when the spacecraft will be subjected to the re-entry effects and would be required to glide for a controlled landing on the airstrip. Thus, the rationale for sustaining the spacecraft in orbit for such a prolonged duration defeats the proclamation of ‘developing and validating the reusable space vehicle technology’ by the US authorities. A space plane can be planned for numerous tasks that would include maintenance of space assets, extend logistic support for improving life cycle of satellites and space stations, carry out ISR missions, act as a platform for insertion of satellites or act as a space weapon platform. As the mission of X-37B has been closely guarded secret, a number of articles and reports have contemplated the use of this spacecraft as a space weapon platform. The payload bay of the OTV is limited by the size of 7 feet by 4 feet.[7] This size of payload bay would not be in a position to accommodate heavy and large weapon systems. While the platform could be designed to carry small automated weapon systems, the functionality of onboard weapon systems would entail additional payloads in terms of sensors and communication equipment. Further, use of X-37B as a weapon platform would not confer any kind of distinct advantage to United States as it is way ahead in space ventures when compared to its closest adversary. The probability of X-37B acting as an ISR platform is very high as the technologically advanced compact sensor systems can be suitably accommodated in its payload bay. Further, the ground track followed by the space plane is shown below in figure 1 indicates a comprehensive coverage of the middle east countries, the Chinese subcontinent and east Asian subcontinent. While, the exact mission of this space plane would be difficult to judge, the evaluation and experimentations with technology would definitely provide an edge to the United States for its future space ventures. Figure 1. Ground track of X-37B[8] [1]â€Å"X-37B Orbital Test Vehicle†, US Air Force, at http://www.af.mil/AboutUs/FactSheets/Display/tabid/224/Article/104539/x-37b-orbital-test-vehicle.aspx accessed on Aug 26, 2014 [2] â€Å"X-37B Orbital Test Vehicle†, at http://www.boeing.com/boeing/defense-space/ic/sis/x37b_otv/x37b_otv.page [3] â€Å"X-37B OTV Spacecraft Information†, at http://www.spaceflight101.com/x-37b-otv-spacecraft-information.html accessed on August 26, 2014 [4] â€Å"X-37B Orbit†, at https://heavens-above.com/orbit.aspx?satid=39025lat=0lng=0loc=Unspecifiedalt=0tz=UCTcul=en accessed on August 26, 2014 [5] Mike Wall, â€Å"US Air Forces Mysterious X-37B Space Plane Passes 500 Days in Orbit†, at http://www.space.com/25611-x37b-military-space-plane-500-days.html accessed on August 26, 2014 [6] â€Å"X-37B Orbital Test Vehicle†, US Air Force, at http://www.af.mil/AboutUs/FactSheets/Display/tabid/224/Article/104539/x-37b-orbital-test-vehicle.aspx accessed on Aug 26, 2014 [7] â€Å"X-37B Orbital Test Vehicle†, at http://www.boeing.com/boeing/defense-space/ic/sis/x37b_otv/x37b_otv.page [8] â€Å"X-37B Orbit†, at https://heavens-above.com/orbit.aspx?satid=39025lat=0lng=0loc=Unspecifiedalt=0tz=UCTcul=en accessed on August 26, 2014

Friday, January 17, 2020

Whats Really Good Essay

   (1) (a) One passage from Nouwen I found particularly informative to my learning was from the middle of paragraph one of page 103. Nouwen explains, â€Å"Poverty is the inner disposition that allows us to take away our defenses and convert our enemies into friends. We can only perceive the stranger as an enemy as long as we have something to defend.† Here Nouwen is explaining that a reason for hostility is because we are afraid that others will take away what we have. This can be anything to actual tangent property, or our beliefs of what we are, such as the thought that we are the best math student. We are hesitant to help another student out because we are afraid they may threaten our belief that we are the best student. Nouwen is saying that if we become poor, as in overcome our fear of losing something, we can become great hosts of hospitality. If we are willing to give up everything we have, no longer will strangers become threats. It becomes easier to give and create an open space for our guest to be themselves, once we have invited in poverty and faced the fear of loss. Moving from hostility to hospitality is a major theme of Nouwen’s book. (b) A Christine doctrine implicit in this passage is the doctrine of original sin. Unfortunately, we all believe we can create our own reality and exist as a God in our own right. As a result of this belief we fail to recognize the dignity and commonality in all beings. Our original sin causes us to shun others out believing that we do not need them and can manage sufficiently in isolation. In reality this hurts both ourselves and others from not realizing our interdependent nature. (c) After reading this passage I began to realize how often I do this to other people. I recognized that at times out of selfishness and fear of losing everything I have worked so hard for I view other people as opponents, not as people who inherently deserve respect for being created in the image of God. I then started to ponder how I have felt or would feel if I was viewed by a stranger as enemy for no apparent reason. I discovered how horrible it is that we hold our things and beliefs over the worth and well being of or fellow individuals. It seems so foolish that we would through this. And from this recognition I realized how the marginalized can be used to promote change and growth within myself and others. (2) Loneliness, the longing for deep connection, perfect love and inner peace does give rise to illusion. Nouwen, illustrates, â€Å"It is sad to see how sometimes people suffering from loneliness, often deepened by the lack of affection in their intimate family circle, search for a final solution for their pains and look at a new friend, a new lover, or a new community with Messianic expectations† (Page 30, Par 2). Here is becomes apparent that when people are suffering from loneliness

Thursday, January 9, 2020

Implementing The Network s Security - 873 Words

In the future organization need to take a proactive approach to the network s security. This strategy of safeguarding the network as well as the patient data, such as scanning and social engineering should be mandatory as opposed to best practices. As the case study shows a major breach had a drastic impact on the healthcare organization and efforts should have been made ahead of time to prevent disaster. Organizations should understand security and risk budgeting and learn how to gain support from the board level for the investment needed to protect data. The industry should push the government to include required annual Health Information Trust Alliance (HITRUST) assessments compared to the current HIPAA [7]. HITRUST is an organization developed by healthcare and IT professionals to help healthcare organizations protect patient information better than HIPAA guidelines. If government mandates shifted towards HITRUST standards the healthcare industry as a whole could benefit across t he boards and it can focus more on the patient care and less on the fear of an impending data breach. As mentioned in the previous sections these software and techniques won t 100\% prevent attacks, but they will definitely help prevent and detect attacks beforehand. section{Future of Cybersecurity} There is a growing realization that cybersecurity requires budgetary commitment, sincere collaboration, and a solid plan. If companies and government can work and contribute money a bright futureShow MoreRelatedSecuring Healthcare Networks Against Cyber Attacks Essay1371 Words   |  6 PagesHealthcare Networks against Cyber-Attacks Abstract: In the current era of digitization, with all the data being converted from paper to electronic records, even the healthcare industry has become so dependent on technology. As hospitals are adopting electronic means for data storage, medical results, transactions and billing, utmost care is to be taken to protect a patient’s personal privacy by protecting their electronic health records, which is only possible by enhancing the security and privacyRead MoreNetwork Security For Organizations And Organizations1669 Words   |  7 PagesNETWORK SECURITY FOR ORGANIZATIONS Divya Bhimineni, Bhimi1d@cmich.edu BIS 625 Research in Information Systems College of Business Administration, Department of Business Information Systems Central Michigan University Mount Pleasant, MI 48858, USA. Introduction Network Security is an approach and plan for establishing the security for organizations like universities, industries. IT Security Policy is the basis archive for Network Security. Security is a control for protecting networks and systemsRead MoreA Security Plan Policy For An Dod Information Protection From Loss Of Confidentiality, Integrity, And Availability1246 Words   |  5 Pagesof Defense (DoD) is America s oldest and largest government agency, with military traces dating way back to pre-Revolutionary times. The Department of Defense has since grown and evolved with the nation, hence becoming the national’s largest employer with over 1.4 million active duty soldiers, 1.1 million National Guard and Reserve forces, and 718,000 civilian personnel. With such a huge organization does come with a huge network, and security infrastructure network, and the burden to protect theRead MoreMalicious Attack : Malicious Attacks And Threats That Could Be Carried Out Against The Netwo rk1609 Words   |  7 Pagescould be carried out against the network and organization are malicious attack, malicious, and the risk, threats, and vulnerabilities that is carried out against the network and organization. Malicious Attack is an attempt to forcefully abuse or take advantage of someone s computer, whether through computer viruses, social engineering, phishing, or other types of social engineering. Malicious Attack have four general categories of attacks on computer systems and networks. The first it have to fabricationsRead MoreProject : Enhancing Network Security Utilizing Software Defined Networks1257 Words   |  6 PagesState Of Art Project: Enhancing Network security Utilizing Software Defined Networks (SDN) The idea Internet technology was implemented in the early 1970’s. Rapid growth of the Internet is constantly being observed from the past two decades. Internet actually elevated the world of technology to the next level. It became so common that most day-to-day activities were dependent on the Internet. Mass usage of the Internet made things simple and was considered as one of the most reliable sources. ItRead MoreNetwork Security : Information Security1276 Words   |  6 Pages CIS647-NETWORK SYSTEMS COMPUTER NETWORK SECURITY Prof : Philip Fitzpatrick By: Suresh Palleboina (21063613) COMPUTER NETWORK SECURITY Introduction: Computer network Security is the most essential and complex topic in IT field. It is important that all user must have an awareness about computer network security. Internet is a biggest network in the world which connects all computer devices in the world. In our daily life millions of people communication each other by using internetRead MoreNational Cybersecurity Policies And Regulations Essay1255 Words   |  6 Pagesshielded systems to protect their assets and resources at home. The foundation of any mandated cybersecurity strategies that secure our nation national security must incorporate worldwide or state local threats whether targeted toward the federal government or the private sector forces. The OPM breach highlighted the insufficient and inconsistence security approaches the federal government has already used in modernizing the existing cybersecurity policies. There is a requirement for the United StatesRead MoreSecurity Policies : Security Planning Essay911 Words    |  4 PagesSecurity Policies The very important factor of network deployment is security planning. Without doing a full risk assessment, it is not possible to plan for security. This security planning involves developing security policies and implementing controls to prevent computer risks from becoming reality. Each and every organization is different and will need to plan and create policies based upon its individual security goals and needs. The risk assessment provides a baseline forRead MoreModelling Of Scada Networks By Implementing The Dbsy Modelling Method, And Risk Assessment997 Words   |  4 PagesIMPLICATION OF DBSY ON SCADA NETWORKS RESEARCH ADVISORS: DR. PAVOL ZAVARSKY SHIREESHA KATAM {skatam@student.concordia.ab.ca}- ID: 130526 DECEMBER 03, 2014 1 Research Statement This research proposal is focused on modelling of SCADA networks by implementing the DBSy modelling method, and risk assessment. 2 Problem Statement SCADA and ICS are the Critical Infrastructures, Which Operates a number of significant resources including fuel, energy, water, airports, and biotech and run many day-day utilitiesRead MoreUnit 5 Assignment 11371 Words   |  6 Pagesï » ¿Unit 5 Assignment 1: Implementing Comprehensive Human Resources Risk Management Plan Human Resources Risk Mitigation: Objective †¢ Human resources policies and practices should reduce the human risk factors in information technology (IT) security and information access controls. Decrease the risk of theft, fraud or misuse of information facilities by employees, contractors and third-party users. Scope †¢ the organization’s human resources policies, taken as a whole, should extend to all the persons

Wednesday, January 1, 2020

Womens Rights Through History - 1127 Words

HALAC Whitehead 3/27/11 Women’s Voices, Women’s Lives Women’s roles through history have changed and stayed the same in many different ways. Based on evidence from historical documents, â€Å"The Yellow Wallpaper† by Charlotte Gilman, â€Å"The Life You Save May Be Your Own† by Flannery O’Connor, â€Å"Raising A Son - With Men on the Fringes† by Robyn Marks, â€Å"Self in 1958† by Anne Sexton and modern day examples as well. Overall, since 1880, women’s rights have been a controversial topic based on their power, roles and societal expectations to a very interesting extent. First, a strong example of women’s roles in the late 1800’s is represented in the document â€Å"The Husband Commandments† by H. De Marsan. It gives a fairly accurate portrayal of how†¦show more content†¦The ‘noise’ referring to the loud commands from her husband not giving her freedom at all. The woman is living a life that is sm all and has limited possibilities. Additionally, Raising A Son - With Men on the Fringes by Robyn Marks, Is a portrayal of how the average woman is supposed to raise her children and be expected to maintain the expected behavior that women have. It also shows how women’s roles have changed and that men can be on the ‘fringes’ and get away with it. However if the woman in this story wanted to act like the man, it would have been looked down upon and since she was a black woman she was facing many more struggles then a white single mother would. This reveals how women can’t back out of their responsibilities and have more pressure. On the other hand, in the modern day, women‘s roles are very superficial and based on the perfect image. An example of this is based on â€Å"Seventeen† magazine’s January 2009 issue, it displays the perfect figure by a picture of Beyonce. It has big labels saying ‘Pretty Looks for You’ and ‘ Get Your Best Body’. This shows that today in the modern day women are just basically expected to have the perfect body and looks. Another example would be in the magazine â€Å"Mother Baby,† there is always a picture of the mother and baby and very rarely the father is mentioned in these magazines. This portrays the image that women are supposed to beShow MoreRelatedGender History : Women And Women1602 Words   |  7 PagesGender history focuses on the fundamental idea of what it means to be defined as a man or woman in history. Gender historians are concerned with the different changes that occur within a society, during a particular period of time in regards to the perceived differences between women and men. Also, they are concerned with the impact of gender on various historically important events. Gender history developed because traditional historiography excluded women from ‘universal’ and ‘general’ history. FeminismRead MoreThe Wom en s Rights Movement1547 Words   |  7 PagesFlorida SouthWestern State College The Women’s Rights Movement What was the significance of the Seneca Falls Convention on the Women’s Rights Movement? Jennifer Flores AMH2010 Mr. Stehlin 16 November 2015 The Women’s Rights Movement began in 1848 with the first assembly of women and men gathering to discuss the civil, social, and other conditions of women. The Seneca Falls Convention was the start of the women’s movement. The two women who organized this event were Lucretia Mott andRead MoreFeminism Throughout History1698 Words   |  7 PagesFeminism Throughout history, women around the globe have been struggling to gain rights that are equal to men in the society. Women have been struggling to obtain respect, equality, and the same rights men have in the society. However, this has been difficult to them because of patriarchy, an ideology whereby, men are always considered to be superior to women, and have the right to control women. This thought has spread widely among the social structures of the society around the globe and thisRead MoreWomen s Movement Of History1351 Words   |  6 Pages                                 Women s Movement in History Setitra Y Malcolm Southern New Hampshire University    Women’s Movement in History Through countless decades women have been struggling to be equal to men, both at home, politics and the work place. Starting back from the 1800s to mid-1900s, numerous women took time out of their day to step out and fight for what they believed in and that was women’s rights.   Women were gaining incredible ground amid the 1840s and 50s. They were currentlyRead MoreWomen Struggles By Nina Revoyr1481 Words   |  6 PagesCourse Unit Date Women Struggles in History In her Novel, Southland, 2003, Nina Revoyr captures the struggles that women, especially those of the Asian American descent, have navigated through history. The novel provides interesting material on many fronts including aspects such as sexuality, multiracial and multigenerational family saga. The book is based upon three women characters with the main protagonist being a young Japanese AmericanRead MoreThe Women Suffrage Movement1745 Words   |  7 PagesThe Women Suffrage Movement The right to vote, the right to go to college, the right to own property. Some people take it as a right that they had all along. That is far from the truth. Suffragists fought long and hard for many years to gain women suffrage. Before the suffrage movement began, women did not have the right to vote, child custody rights, property rights, and more (Rynder). The American Women Suffrage Movement was going to change that. People known as suffragists spoke up, and joinedRead MoreThe First Wave Of Women950 Words   |  4 PagesThere have been numerous women throughout history whom have influenced and helped spread change for feminism. The first wave feminists (from the 1800’s to the early 20th century) started numerous organizations to help and support women’s rights and also helped in part of passing legislations that further aid the rights granted to women. Some of the most important first wave feminists include Susan B. Anthony and Alice Paul. The second wave feminists (from the mid 20th century to late 20th century)Read MoreHistorical Perspective Of The Services Provided And The Funding Or Lack Thereof1362 Words   |  6 PagesPerspective of the Services Provided and the Funding or Lack Thereof Planned Parenthood is an organization dedicated to fighting for women’s health and rights as well as equality (History and Success, 2015). Margaret Sanger, an activist, sex educator, writer, and nurse is credited for finding the organization. She knew the effects firsthand of what women went through when dealing with an unwanted pregnancy. Her mother birth eighteen children and out of the eighteen, eleven survived. As a result of having soRead MoreOverview of American History Since Civil War1235 Words   |  5 PagesAmerican History since Civil War Name Professor Institution Course Date American History since Civil War Identify at least two (2) major historical turning points in the period under discussion. There are several historical turning points in the History of the United States of America since the aspect of the civil war. One of the essential historical turning points is the end of the cold war in 1989 thus falling of the Berlin war. Another historical turning point is the aspect of the digitalRead MoreGrace Kirby. Trahan. English 8. 3/22/17. Elizabeth Cady904 Words   |  4 Pages8 3/22/17 Elizabeth Cady Stanton and the Fight for Women’s Rights In the early 1800 s women were expected to stay in the home and care for the children. They were not allowed to vote or own property. The women were also expected to care for their husband’s needs. When a woman entered into marriage she lost her rights to speak for herself and she could not work for wages outside the home. A shift in the societal environment for women started with an idea of equality which led to the beginning of