Essay Examples on New England Law Boston

Serious issue with Time Management

Introduction I have suffered a lot because I had a serious issue with time management This resulted in procrastination and accumulating tasks until the last minute Therefore I had very low grades and since I could not keep up with my social life and the college's requirements I constantly stayed awake to finish my assignments that should have been done before I will be explaining the importance of time management and how it can be improved according to Kolb s Theory Therefore this reflective journal was written in hope of identifying my past errors and finding effective solutions to solve my problems I feel that time management is an essential skill to acquire to become more effective in achieving my goals 2 0 Concrete Experience Time management has been a serious issue for me in my experience during my university study period I was terrible in prioritising tasks since I had no regular routine This is because I stayed up all night long to study for my upcoming exams and submit my coursework on time Yet I still wouldn't finish the task required because I used to rush my coursework 

Therefore this highly influenced my grades since my body was deprived of sleep so I couldn t concentrate nor learn efficiently Moreover due to the reasons mentioned above I have never been able to attend any of my lectures on time I always missed my morning lectures which are another reason for the fall of my grades Consequently I was forced to remain active during the night to compensate the material I missed 3 0 Reflective Observation Aside from that the obstacles I faced made me frustrated I was arriving late to my lectures which gave my professors a bad idea of my commitment to the course


2 pages | 585 words
Save

Reliable agents Authentication based Cloud Search Engine

1 Abstract In this project we proposed reliable agents authentication based cloud search engine In our proposed method the agent client requires service with specific functional and technical requirements For privacy concern we provide authentication for each agent in cloud by using Elliptic Curve Cryptography ECC By using authentication id agents discover the cloud service based on service engine Focused Selection Contract Net Protocol is performed to find the relevant cloud service and it plays multiple roles in cloud search engine The similarity between the agent s request and cloud service is computed based on service specifications and consumer service using Cloud ontology Each legitimate agent provides reliable cloud services for agent clients users Service capability Table records the list of cloud service and their corresponding ID and services for reliable cloud discovery 2 Introduction Cloud computing is a collection of interconnected virtual machines and it is a collection of networks and virtual systems Cloud computing defined by NIST such as cloud computing is a paper use model for enabling available convenient on demand network access to a shared collection of configurable computing resources Examples Networks servers storage application service that can be rapidly provisioned and release with minimal management effect or service provided interaction The characteristics of cloud computing are on demand service pay per use model elastic capacity self service interface resources are abstracted The roots of cloud computing are Hardware virtualization internet technologies distributed computing system management

2 pages | 476 words
Save