Monday, December 30, 2019

How to Change Your Habits and Improve Your Grades

Its disappointing to receive low scores on a big test or a homework assignment, but you dont need to let small setbacks get you down. There is always time to make things better. Steps to Take If It Isnt Over Yet If youve received a few low grades on assignments throughout the year and youre facing a big final, then you still have time to bring up your final grade.   Sometimes, a good grade on the final project or exam can increase your final grade dramatically. Especially if the teacher knows youre really trying. Gather all your work assignments to determine exactly how and why you earned the low grades. Identify your weak points. Did your grades suffer because of careless grammar or poor writing habits? If so, be more mindful of grammar and structure during the final.Visit the teacher and ask her to go over your assignments with you. Ask her what you could have done differently.Ask what can you do for extra credit. By trying to take charge of your destiny, you are showing responsibility. Teachers will appreciate this.Ask for advice from the teacher. Teachers can direct you to resources that are topic-specific.Put all your energy into the final test or project. Find a tutor to help you. Ask the teacher to explain the format of the test. Will it be an essay exam or a multiple choice test? Target your study accordingly.Join a study group. Discuss the final exam with other students. They may have notes that you missed or they may have better insight into the teachers preferences when it comes to test questions and answers.Improve memory skills. There are many techniques to improve your memory. Find one that is best for you and the material youre studying.Get serious. Dont be late to class. Get some sleep. Turn off the TV. Talk to your Parents If you know a bad grade is imminent, then it might be wise to talk to your parents first. Let them know that you are trying to make a change and improve your performance. Get them involved. You may want to discuss creating a homework contract with your parents. The contract should address time commitments, homework help, supplies, and other issues that affect grades. Looking Toward the Future If you have just received your end-of-year grades and youre looking forward to improving your performance next year, there are plenty of things you can do. Get organized. Keep a journal of assignments to identify strengths and weaknesses. Organize your supplies and establish a good study space.Try to use color-coded supplies to stay organized.Identify your personal learning style. This is critical to improving your study habits. Dont waste valuable study time using ineffective study methods.Talk to your counselor about your schedule or your diploma program. You may be enrolled in a program that isnt right for you. Are you taking courses that are too difficult because your diploma program requires it?Review your schedule. Cut out extracurricular activities that dont help you reach your true goals. If youre involved with that team or club just for fun—then you may need to make some tough decisions.Improve your writing skills. Students sometimes complain because they are penalized for poor writing in courses other than English. Teachers dont have much patience for this complaint! Good writing skills are critical for every class.Join a study group. Be Realistic If you are stressing out about a possible B grade, you should know that perfect grades arent everything, and expecting them isnt very realistic, either. While it is true that some colleges place a lot of value in grades, it is also true that they are interested in recruiting humans, not machines.If you are hoping to get into a specific, highly competitive college and you are worried about getting a B, then you are smart enough to make yourself stand out in another way. For instance, you could use your creativity to craft an essay that stands out.Give yourself credit if youre doing your best. If you have tried everything, but you just cant become the perfect student you want to be, perhaps you should give yourself a break. Identify your own strong points and make the best of them.Dont give yourself a bad reputation. If you arent happy with a grade or a report card, you can discuss this with a teacher. However, if you make a habit out of visiting your teacher to complain, then you may be making a pest of yourself.

Sunday, December 22, 2019

CRITICALLY EXAMINING THE IMPACT OCORRUPTION ON THE AFRICAN...

CRITICALLY EXAMINING THE IMPACT OCORRUPTION ON THE AFRICAN ECONOMIES: PUBLIC COICE THEORY INTRODUCTION Africa is perceived as the `Eden garden` because of its abundant wealth in copper, aluminium, gold, diamond, crude oil, but it is one of the most underdeveloped regions world-wide due to corruption, which is a major constraint to wealth creation and African economic growth. Public choice is all about applying the methods of economics to the study of politics. Corruption can be resolved by incorporating insights from the theory of public choice into the design and execution of the new anti-corruption programs. The insights include the introduction of relevant rules, reforming existing laws and institutions, providing more effective and†¦show more content†¦The other one states that corruption enhances economic and political development, and according to the other, corruption is a significant constraint to development and modernization. Corruption has the ability to `grease` the wheels of bureaucracy making it more responsive to the private sector, thus increasing the abilit y of entrepreneurs to take part in wealth creating activities. Paying bribes to the right officials can provide deprived groups access to political markets hence improving their ability to participate in governance. As argued by Leff (1964:8) and the other scholars (e.g. Byley: 1966), corruption can be utilized to enhance the potential of entrepreneurs to gain access to government regulators and participate fully and effectively in public policy formulation and implementation. While corruption has made a few civil servants politicians and entrepreneurs rich, overall, it has started the creation of wealth and severely limited the government’s ability to deal effectively with poverty and deprivation. Corruption has failed to improve access to governance to many people in Africa, more especially to women, rural dwellers and those living an urban periphery. Its major accomplishment has been to provide resources to elites, enhancing their ability to monopolize political spaces and allocation of resources. APPROACHES TO CORRUPTION CONTROL: LESSON FROM PUBLIC CHOICE THEORY

Saturday, December 14, 2019

Night Creature Dark Moon Chapter Six Free Essays

I couldn’t tell Nic. He didn’t believe in magic. He’d take me to the nearest hospital, lock me up and throw away the key. We will write a custom essay sample on Night Creature: Dark Moon Chapter Six or any similar topic only for you Order Now Then we’d have real trouble, since my medication had blown up with the compound. Me, locked inside, with the full moon less than a week away. Yeah, trouble. However, that was the least of my worries at the moment. We reached the shed; Nic inspected the place with typical FBI precision. No one was inside. No one had tampered with the ATV. â€Å"I’ll drive,† 1 said. â€Å"I don’t think so.† â€Å"You don’t get to think. I know where we’re going.† â€Å"I could figure it out,† he grumbled, but he climbed on behind me. I could tell by the tenseness of Nic’s thighs against mine, and the tiny starts he was unable to stop every time the ATV tipped a little too far to one side, that he wasn’t used to riding them, and he didn’t care for anyone else to be in control. We reached the highway, a loose terra for any paved road in the vicinity, and I took off at the fastest clip the ATV would allow – about thirty miles per hour. Driving at top speed without a helmet wasn’t my idea of fun, even though I had nothing to fear from a head injury. Nic, however, did. â€Å"It’s going to take us two hours or more to get to town,† he shouted. â€Å"Got a better idea?† His silence was answer enough. We traveled at a pace slower than the average wolf, which could run forty miles per hour on a bad day. Super-wolves, in other words, lycanthropes, could top that speed with ease. As I drove I considered the icon in my pocket. Was the totem a clue? A threat? An accident? I needed to show the talisman to Will Cadotte, our expert on Native American mysticism. Conveniently, he had gone to Wisconsin with Edward. Had the thing truly growled? I would have said no, except Nic had heard it, too. I’d never observed any supernatural behavior from the black totem, but that didn’t mean there hadn’t been any. Jessie McQuade, a J-S agent and former police officer, swore she’d seen the totem move on its own. Who was I to say she was nuts? We continued in silence for close to an hour. Talking was pointless with the roar of the motor and the thunder of the wind. But I didn’t need words to hear Nic loud and clear. The press of his thighs wasn’t the only thing I felt. He’d missed me, in more ways than one. His palms rode my waist; his thumbs slid under my suit coat and toyed with the skin just above my panty hose. His breath teased the hair that had fallen loose from my customary French twist. I had to be honest with him. What had been between us once could never be again, despite the treacherous response of my body to his. I had too many secrets I couldn’t share. Too much work that had to be done. Too many monsters that wanted me dead. I tensed, half-expecting him to cup my breasts, then latch his mouth onto my neck and suckle. Legs wide as I straddled the seat, the wind shot up my skirt, stirring me where I needed no help being stirred. His fingertips grazed the swell of my rear. â€Å"Nic,† I said. Protest, plea – I wasn’t sure. Didn’t matter. The wind flung the word into the night. Snow began to fall – thick, fluffy flakes that would soon obscure the road. I had to concentrate. We needed to reach a town before the storm hit, or worse. I was already half-frozen and I was certain Nic was, too. But it was impossible to think as Nic’s hand slid across my skin, palm warm, hard, flat against my belly. I glanced down. My skirt was hiked to my hips, and the sight of my stocking-clad legs, my white cotton briefs, his sun-browned hand and callused fingers, excited me so much that 1 did nothing when his middle finger slid lower and stroked me just once. Lucky no one was on the highway except us. Or so I thought. I lifted my gaze, then swerved to avoid the huge black wolf in the middle of the road. The right wheel slipped off the pavement, and we were airborne. Providence was on our side, and we were thrown clear. Most ATV injuries are the result of the machine falling on top of the riders. As it was, I landed on my shoulder and something crunched. Ignoring the pain, I scrambled to my feet, searching frantically for Nic. I found him at the edge of the tree line. He wasn’t moving. The wolf swung his head toward me. Light gray, human eyes shone in a feral face. â€Å"Billy,† I murmured. I should have known he hadn’t died. Guys like him never did. It would take something worse than a firebomb to put an end to Billy Bailey. But where had he been? Had it taken him some time to heal his injuries, then dig his way out of the rubble? What about the others? Had they survived, as well? I strained my ears but heard only the wind, sniffed the air and caught nothing but the scent of snow and crazy Billy. Either the rest of my basement wolves had found freedom, then scattered, or they were ashes and Billy was a lot more powerful than I’d thought. And wasn’t that just special? Billy’s head cocked; his tongue lolled, almost as if he were laughing. Hell, he probably was. I fingered the gun in my pocket. I could put every bullet into Billy, and it wouldn’t slow him down. If I stayed in this form, he’d kill me – if I was lucky – then move on to Nic. I was going to have to shift. However, such things took time, and at mid-shift I’d be defenseless. Billy had no scruples. He’d wait until the worst possible moment, then attack. Nevertheless, I had to take the risk, hope my changing at all would confuse him long enough for me to assume another form. I managed to kick off my shoes – I hated it when my paws burst through them – but I didn’t have the chance to remove anything else. Not that I’d strip in front of Billy even if I had a week. As I lifted my face, snowflakes brushed my cheeks, stuck to my eyelashes, prickled my nose. I pushed aside the sensory distractions and thought of the moon. If it had been full I wouldn’t have had to try. Without the round silver disc that pulled like the ebb and flow of the tide, the transformation was a bit harder, especially for those with stunted imaginations. I bet Billy had had one helluva time getting furry tonight. He growled, low in his throat. I was up to something, but he didn’t know what. Pretty soon he’d get sick of wondering, come over here and kick my ass. With me still a woman, and him already a beast, he’d have no trouble at all. Staring at the black velvet sky, I envisioned the cool metallic white of the moon spilling across my face. I smelled the wind, the trees, the earth. Night. The totem in my pocket shimmied, and my favorite suit split at the seams. The shifting of bones, the curving of spine, usually produced agony. Going from bipedal to quadrapedal wasn’t supposed to feel good. My skin would bum when the fur came. My fingers and toes always ached as they sprouted claws. My face hurt as my nose and my mouth melded into a snout. I loathed getting furry – always had, maybe I always would if I never discovered a cure – but pain was the least of it. I hated being covered with hair, sprouting a tail. The drooling, the panting, the howling, and I never could get the dirt out from under my fingernails. Becoming a werewolf was hell on a manicure. But tonight, the transformation was painless. Tonight I thought about being a wolf, and suddenly I was. Billy yelped. I was the fastest changer in the West. A damned werewolf savant. Something peculiar was going on, but I didn’t have time to figure out what. Werewolves not only have human eyes, they possess human intelligence. I knew what I had to do and why, so without giving Billy time to think, I charged. This wasn’t fun and games but a fight to the death. Billy would come after me, and he’d keep on coming until he had what he wanted. Me. I’d rather be dead than Billy Bailey’s sex slave. That knowledge gave me an edge. I hit him hard, and he tumbled onto his back. Either confusion had slowed his reactions, or I’d suddenly become faster than the average werewolf. Maybe both. My teeth grazed Billy’s throat before he sent me flying. I landed on the same shoulder that had hit the ground when I’d flown off the ATV, and I whimpered. Without human blood, I wouldn’t heal completely tonight, though just becoming a wolf would improve any injury faster than it was possible to explain. Billy struck me broadside before I could roll onto all fours. I slammed into the dirt hard enough to make my ears ring. My head ached, and I had a difficult time focusing. He could have killed me then, if he hadn’t been an insane sadomasochist. Instead of going for my jugular, he drew blood from my belly, and then licked it away. Disgust flowed through me, followed closely by anger. Using my legs, my claws, I threw him free, then I did what he hadn’t. Jumping on top, I latched onto Billy’s throat and pulled. Though I tried to get out of the way, blood sprayed my face and chest. I scuttled backward, not even waiting to see Billy’s human eyes go wolf as he died. I shifted into a woman more quickly than I ever had before. My clothes a torn tangle, I still managed to cover myself adequately. Scooping a handful of snow, I let it melt in my palm so I could scrub away some of the blood and the dirt. Remembering the slash to my stomach, I lifted my suit. Nothing. Frowning, I rolled my shoulder. Not a twinge. Had the talisman granted fast healing powers along with swift changing ability? Seemed so. I could get used to this. I hurried to Nic, kneeling next to him as his eyes opened, crossed, then focused on my face. â€Å"I saw a wolf.† â€Å"I know. I almost hit him.† â€Å"No.† He reached up and tugged my hair, loose now and swirling around my shoulders. â€Å"With fur like this and†¦Ã¢â‚¬  He frowned. â€Å"Your eyes.† I kept my face neutral, even as my heart threatened to choke me. Nevertheless, when I spoke, my voice was as cool as the breeze. â€Å"You must have bumped your head a lot harder than I thought.† How to cite Night Creature: Dark Moon Chapter Six, Essay examples

Friday, December 6, 2019

Cloud Computing Green IT Products

Question: Discuss about the Cloud Computing for Green IT Products. Answer: Part A Exercise 1: Greenhouse computing Greenhouse effect can be defined as the warming of the earth as a result of atmospheric gases (referred as greenhouse gases) absorbing, radiating, and trapping the suns energy close to the earth. The gases include nitrous oxide, methane, carbon dioxide, and artificial chemicals like chlorofluorocarbons released into the atmosphere from human activities ("Greenhouse effect", n.d.). Greening IT Products: It is true that we are required to green our IT products. Legally, there are environmental regulations in all countries that seek to minimize the cost of waste disposal and this has been adopted by manufacturing companies formulating policies geared towards environmental protection (Murugesan, 2008). Ethically as well as socially, greening IT products benefits us as well as improve the environmental conditions for sustainable life. Ethically no one would like to stay in a polluted environment therefore greening IT products is also our social responsibility. Greening IT and Benefits According to Murugesan (2008), green IT is concerned with production/manufacturing, usage, and disposal of IT products that have little or no impact to the environment. IT products consume a lot of electricity which has in turn placed a burden on electric grid thereby contributing to greenhouse gases. Besides the disposal of electronic devices which IT products are part of is costly. Individuals and organizations can benefit from greening IT products for efficient energy use, reuse, and recycling thereby reducing the cost of energy and waste disposal. In addition, most governments are becoming environment-conscious and impose levies for environmental pollution (Murugesan, 2008). Businesses and manufacturing companies can avoid these through IT products greening. Furthermore, investors and consumers are increasingly considering investing and purchasing of products that are environment friendly. IT companies practicing green IT stands to benefits from this as individuals become more en vironmental conscious. Exercise 2: Environmental Sustainability How to build a greener environment According to Murugesan (2010), we can create a greener environment by ensuring that the entire lifecycle of an IT product from designing, manufacturing, usage to disposal are greener. In terms of usage, all IT products should consume less energy and in consideration of the environmental sustainability. The products should also be easy to dispose, recycle, and reuse without any environmental impact. Designers should also ensure that new products designed such as computers, servers, data centers, and cooling systems among others are consume energy efficiently in addition to being environment friendly. In the manufacturing phase of the product lifecycle, manufacturing standards should be able to address environmental concerns or issues such that products manufactured have little or no impact at all to the environment. Observing these measures throughout a product lifecycle will guarantee environment sustainability. Article Summary After a long time of neglect or unawareness of the negative impacts IT products have on the environment, IT companies and individuals are now promoting greener standards within the industry to minimize these impact. So as to create a greener environment, the design, manufacturing, usage, and disposal phases of IT product lifecycle has to ensure that these products are energy sufficient, can be refurbished, reused, and recycled. Besides, innovations in IT can lead to creation of systems that brings about efficiency in business processes in other industries resulting to minimal environmental pollution. In addition, IT can help in environmental assessments via development of decision-support systems that can help mangers in making informed decisions concerning a companys operations in relation to environmental impact. However, Green IT can only be achieved if there is increased awareness and education of the IT professionals on the environmental impact of IT systems (Murugesan, 2010). Exercise 3: Environmentally Sound Practices Power Usage Effectiveness (PUE) Power usage effectiveness (PUE) is a metric used to measure the proficiency of data centers in relation to energy consumed. This is determined by comparing the total amount of power supplied to the IT systems and the actual amount of power used by facilities in the data center (Belady, Rawson, Pfleuger, Cader, 2008). The reciprocal of PUE gives the Data Center infrastructure Efficiency (DCiE) which is the percentage of load (power supplied) used by the IT equipment. This is expressed in equation as follows: Data Center Efficiency Data Center Efficiency refers to the measures taken in ensuring the data center facilities consumption of energy is efficient. This can be expressed or determined by using the PUE and DCiE metrics as outlined above. Data Center Infrastructure Efficiency (DCiE) DCiE is a metric for calculating the amount of load (power) used by the IT equipment at the data center to determine its efficiency in energy consumption. It is expressed in terms of percentage as shown below: Universities offering Green Computing course The American Public University System green computing course is called Green Computing - advanced topics. It covers current research progress and developments in areas of green computing from computer hardware, software, to emerging organizations advocating for green computing ("AMU Course: ISSC387 - Green Computing: Advanced Topics", n.d.). Athabasca University (Canada) offers the course Green ICT Strategies ("Computer Science (COMP) 635", n.d.). This course focuses on different strategies used by private and public sectors at both local and international stage and how to apply them in working environment. Acadia University from Canada offers Green Computing IT (COMP 2923 A2) course that introduces students to issues raised from energy consumption by ICT systems and their impact ("Acadia University COMP 2923 X2 - Green Computing IT", n.d.). It also highlights the concerns by governments and business organizations in promoting development and use of energy efficient systems with minimal impact to the environment. In Sweden, Linkoping University has TDDD50 Green Computing course on offer. The course emphasizes on green computing through efficient energy consumption and gives students an opportunity to learn from various research works on green ICT ("TDDD50 Green Computing", n.d.). The Australian National University offers ICT Sustainability (COMP7310) course. The course looks at various ways of assessing and reducing the environmental impact of ICT systems with a view to ensuring efficient energy consumption ("COMP7310: ICT Sustainability", n.d.). Exercise 4: Major Cloud APIs JSON is an API by Google that provides backend interface for developers to access and manipulate projects on Google cloud ("Google Cloud Storage JSON API Overview", n.d.). According to Google, it is suitable for software developers experienced in web programming for HTTP based applications. The Developer Publishing API by Amazon enables developers to create, manage, and update their android applications hosted in the Amazon Appstore ("Developer Publishing API", n.d.). This has ease the publishing process for developers as this can be done from the building systems automatically. GoGrid has GoGrid Basic Firewall API v2. This API provides developer with an option of defining group security policies in a VM network ("GoGrid Basic Firewall API v2", n.d.). With a single API call, developers can be able to create and deploy multiple group policies in the network. For health application developers interested in using Microsoft health data, Microsoft provides the Microsoft Health Cloud API. With this API, developers can integrate their applications and have access to health data presented in JSON format (Microsoft Health Cloud API, n.d.). Part B Exercise 1: Greening IT Standards and Regulations The Electronic Product Environmental Assessment Tool (EPEAT) is a tool, system, or method that helps individuals, institutions, manufacturers, and resellers to identify electronic products that are environment friendly and meet the environmental regulations according to the given region (EPEAT Program Guidelines, 2015). Managed by Green Electronics Council (GEC) organization established in 2005, the EAPEAT requires the assessment of a products environmental impact throughout its lifecycle, from design, manufacturing, usage, recycling, reuse, to disposal. EPEAT certified products are labeled or categorized into bronze, silver, and gold levels. This levels basically indicate the environmental performance of the product. Products that meet all criteria requirements are rate as bronze while those that meet all set criteria and 50% of the requirements categorized as optional are silver rated. Those products certified with gold ratings have met all mandatory requirements and 75% of the req uirements identified as optional. Energy star 4.0 is a standard that came into effect in 2007 defining the energy requirements, power management, and guidelines for computing device manufacturers. The standard is meant to ensure that all computer products are energy efficient with minimal consumption of energy and environmental impact (ENERGY STAR Program Requirements for Computers, 2007). This will in turn translate to saving costs for power consumed and reduced demand on national power grids or generators of electricity. As a result, greenhouse gas emissions will be reduced. All computing devices from manufacturers are required to be tested before releasing them to the market based on the test cases, power management requirements, and energy efficiency requirements set by the standard. Products that meet these requirements are labeled with the ENERGY STAR logo and users are encouraged to purchase these certified products as they consume less energy with lower environmental effects. The Restriction of Hazardous Substances Directive is directive that restricts the use of certain hazardous materials or chemical elements in the manufacturing of the electrical and electronic devices ("RoHS: compliance and guidance", 2014). Electronic manufactures, distributors, resellers as well as importers are required to observe that all electrical products that fall under the restricted devices as defined by the directive do not contain the chemical levels that are deemed dangerous to human besides being an environmental hazard. Some of these restricted materials and accepted levels include Lead (0,1%), Cadmium (0,01%), Mercury (0,1%), Polybrominated biphenyls (PBB) (0,1%), Hexavalent chromium (0,1%), and Polybrominated diphenyl ethers (PBDE) (0,1%). Those found violating the directive will be punished as per the laws depending on the nature of the case. The directive is meant to guarantee the health of the population while minimizing pollution of environment from use of electro nic devices. Exercise 2: Green cloud computing There are various new methods and technologies proposed to reduce energy consumption and cost. With new innovations, it is possible to regulate the frequency of microprocessors and turn off circuit blocks that are not in use to save energy. Multiple Clock Domain (MCD) processor chip are split into four regions that supports independent and varying energy consumption that can be adjusted for efficient energy consumption (Xiong, Vandenberg, Han, 2012). There has also been development in task scheduling algorithms like 3D Computational Fluid Dynamics for rack-mounted servers that reduces the amount of power required during computational processing. To reduce the amount of power required for cooling, this has been achieved through task assignment algorithms. There are also proposed methods such as use of predictive thermal mapping tool called weatherman, use of Generic, Algorithm and Quadratic Programming for task scheduling, and deployment of sensor based thermal evaluation model. Furthermore, even though use of Virtual Machines helps reduce the number of hardware required and consequentially energy consumption, there have been proposals to reduce further energy requirements for the virtual machines. According to Xiong, Vandenberg, and Han (2012), Nathuji and Schwan have recommended a Virtual Power approach to isolate, support, and coordinate power management policies for the VMs that will in turn reduce energy consumption. There is also significant saving on energy for cloud computing platforms as a result of consolidating applications. There are also algorithms that manage efficiently requests and schedules for processes in multi-tiered web applications for virtual environments thereby reducing energy use. For cooling purposes in mainframe computers, researchers have proposed use of chilled-liquid that has shown significant results in reducing overheating in microprocessors. Use of networking equipment that can accommodate additional network traffic and smal ler hard disk drives has also been recommended to reduce energy consumption. Exercise 3: Cloud API Functionalities Nectar API The API in the link is the unofficial Nectar API, sainsburys-nectar-api. This is a Java based API that can be used to link and collect information from user accounts at Nectar. The information can include account name, currency, offers, points balance, and account type among others ("Google Code Archive - Long-term storage for Google Code Project Hosting.", 2013). Openstack Nova API The API mentioned in the link is the Openstack Nova API. This API is used in conjunction with the Python API and Command-line API ("python-novaclient 3.3.2 : Python Package Index", n.d.). Using this APIs, developers can be able to interact and access data hosted in the OpenStack cloud. Openstack Software Openstack is open source software that developers can use in developing public as well as private clouds ("Openstack", n.d.). In order for the developer to conveniently work with the Openstack softare, there are numerous APIs that one can work with to faster the development and deployment of a certain functionalities that the developer wants. Working through the APIs, the developer can be able to start server, instances, create images and link them with metadata instances, develop storage containers and related objects for data storage among other activities in the OpenStack cloud. Some examples of these APIs include the Data Processing API that can be used to configure Hadoop distributed database system, Domain name Server (DNS) API for configuration of the DNS services, and Container Infrastructure Management API for defining, creating, and management of storage containers. Other APIs include Compute API, Identity API, Image Service API, Messaging API, networking APi, Search API am ong others to facilitate the developers work ("OpenStack Docs: OpenStack API Documentation", 2016). The APIs are many and can be used to attain different functionalities in the OpenStack cloud depending on the application one is building. References Acadia University COMP 2923 X2 - Green Computing IT.Acadia University. Retrieved 13 October 2016, from https://socrates.acadiau.ca/courses/comp/dsilver/2923/ AMU Course: ISSC387 - Green Computing: Advanced Topics.Apus.edu. Retrieved 13 October 2016, from https://www.apus.edu/schedule-classes/schedule/course/issc387 Belady, C., Rawson, A., Pfleuger, J., Cader, T. (2008).GREEN GRID DATA CENTER POWER EFFICIENCY METRICS: PUE AND DCIE.Thegreengrid.org. Retrieved 13 October 2016, from https://www.thegreengrid.org/~/media/WhitePapers/White_Paper_6_-_PUE_and_DCiE_Eff_Metrics_30_December_2008.ashx?lang=en COMP7310: ICT Sustainability.Australian National University. Retrieved 13 October 2016, from https://cs.anu.edu.au/courses/comp7310/ Computer Science (COMP) 635.Athabasca University. Retrieved 13 October 2016, from https://www.athabascau.ca/syllabi/comp/comp635.php Developer Publishing API.Amazon Developer Portal. Retrieved 13 October 2016, from https://developer.amazon.com/developer-publishing ENERGY STAR Program Requirements for Computers. (2007) (1st ed., pp. 1-16). Retrieved from https://www.energystar.gov/ia/partners/prod_development/revisions/downloads/computer/Computer_Spec_Final.pdf EPEAT Program Guidelines. (2015) (1st ed., pp. 2-11). Retrieved from https://www.epeat.net/documents/EPEAT_Program_Guidelines.pdf GoGrid Basic Firewall API v2.GoGrid. Retrieved 13 October 2016, from https://wiki.gogrid.com/index.php/API_v2:GoGrid_Basic_Firewall_API_v2#Overview Google Cloud Storage JSON API Overview.Google Cloud Platform. Retrieved 13 October 2016, from https://cloud.google.com/storage/docs/json_api/ Google Code Archive - Long-term storage for Google Code Project Hosting.. (2013).Code.google.com. Retrieved 13 October 2016, from https://code.google.com/archive/p/sainsburys-nectar-api/ Greenhouse effect.Environment.gov.au. Retrieved 12 October 2016, from https://www.environment.gov.au/climate-change/climate-science/greenhouse-effect Microsoft Health Cloud API(1st ed., pp. 3-49). Retrieved from https://developer.microsoftband.com/Content/docs/MS%20Health%20API%20Getting%20Started.pdf Murugesan, S. (2008).Harnessing Green IT: Principles and Practices(1st ed., pp. 24-33). IEEE Computer Society. Retrieved from https://www.pitt.edu/~dtipper/2011/GreenPaper.pdf Murugesan, S. (2010). Making IT Green.IT Professional,12(2), 4-5. https://dx.doi.org/10.1109/mitp.2010.60 OpenStack Docs: OpenStack API Documentation. (2016).Developer.openstack.org. Retrieved 13 October 2016, from https://developer.openstack.org/api-guide/quick-start/ Openstack. Support.rc.nectar.org.au. Retrieved 13 October 2016, from https://support.rc.nectar.org.au/docs/openstack python-novaclient 3.3.2 : Python Package Index.Pypi.python.org. Retrieved 13 October 2016, from https://pypi.python.org/pypi/python-novaclient RoHS: compliance and guidance. (2014).Gov.UK. Retrieved 13 October 2016, from https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2011:174:0088:0110:EN:PDF TDDD50 Green Computing.Linkoping University. Retrieved 13 October 2016, from https://www.ida.liu.se/~TDDD50/info/courseinfo.en.shtml Xiong, N., Vandenberg, A., Han, W. (2012). Green cloud computing schemes based on networks: a survey.IET Communications,6(18), 3294-3300. https://dx.doi.org/10.1049/iet-com.2011.0293