1. Stop spending time with the wrong
people. It’s useless spending time with
people who don’t know your worth.
2. Stop running from your problems.
Face them head on.
3. Stop lying to yourself.
4. Stop putting your own needs on the
back burner. Yes, help others; but help
yourself too.
5. Stop trying to be someone you’re
not. Don’t change so people will like
you. Be yourself and the right people
will love the real you.
6. Stop trying to hold onto the past. You
can’t start the next chapter of your life
if you keep re-reading your last one.
7. Stop being scared to make a
mistake. Every success has a trail of
failures behind it, and every failure is
leading towards success.
8. Stop berating yourself for old
mistakes. Every single thing that has
ever happened in your life is preparing
you for a moment that is yet to come.
9. Stop trying to buy happiness. The
things that really satisfy us are totally
free – love, laughter and working on our
passions.
10 Stop exclusively looking to others for
happiness. – If you’re not happy with
who you are on the inside, you won’t be
happy in a long-term relationship with
anyone else either.
11. Stop being idle. Evaluate situations
and take decisive action.
12. Stop thinking you’re not ready.
Nobody ever feels 100% ready when an
opportunity arises.
13. Stop getting involved in
relationships for the wrong reasons. Fall
in love when you’re ready, not when
you’re lonely.
14. Stop rejecting new relationships
just because old ones didn't work.
Some will test you, some will use you
and some will teach you.
15. Stop trying to compete against
everyone else. Success is a battle
between YOU and YOURSELF only.
16. Stop being jealous of others.
There’s something you have that
everyone wants!
17. Stop complaining and feeling sorry
for yourself. Smile! Let everyone know
that today you are a lot stronger than
you were yesterday, and you will be.
18. Stop holding grudges. Forgiveness
is not just for other people, it’s for you
too.
19. Stop letting others bring you down
to their level. Refuse to lower your
standards to accommodate those who
refuse to raise theirs.
20. Stop wasting time explaining
yourself to others. Your friends don’t
need it and your enemies won’t believe
it anyway. Just do what you know in
your heart is right.
21. Stop doing the same things over
and over without taking a break. If you
keep doing what you’re doing, you’ll
keep getting what you’re getting.
Sometimes you need to distance
yourself to see things clearly.
22. Stop overlooking the beauty of
small moments. Enjoy the little things,
because one day you may look back
and discover they were the big things.
23. Stop trying to make things perfect.
– The real world doesn’t reward
perfectionists; it rewards people who
get things done.
24. Stop following the path of least
resistance. Don’t take the easy way out.
Do something extraordinary.
25. Stop acting like everything is fine if
it isn’t. It’s okay to fall apart for a little
while. Cry if you need to – it’s healthy to
shed your tears. The sooner you do, the
sooner you will be able to smile again.
26. Stop blaming others for your
troubles. The extent to which you can
achieve your dreams depends on the
extent to which you take responsibility
for your life.
27. Stop trying to be everything to
everyone. Doing so is impossible, and
trying will only burn you out.
28. Stop worrying so much. Worry will
not strip tomorrow of its burdens, it will
strip today of its joy.
29. Stop focusing on what you don’t
want to happen. Focus on what you do
want to happen. Positive thinking is at
the forefront of every great success
story.
30. Stop being ungrateful. No matter
how good or bad you have it, wake up
each day thankful for your life.
Steevyee
Monday 20 October 2014
Wednesday 11 June 2014
What is a Hacker?
Brian Harvey
University of California, Berkeley
In one sense it's silly to argue about the ``true'' meaning of a word. A word means whatever people use it to mean. I am not the Academie Française; I can't force Newsweek to use the word ``hacker'' according to my official definition.
Still, understanding the etymological history of the word ``hacker'' may help in understanding the current social situation.
The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s. Popular opinion at MIT posited that there are two kinds of students, tools and hackers. A ``tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As. A ``hacker'' is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground.
What does this have to do with computers? Originally, nothing. But there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers. [In 1986, the word ``hacker'' is generally used among MIT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.]
A ``computer hacker,'' then, is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.)
A hacker is an aesthete.
There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a ``password hacker'' knows how to find out someone else's password. That's what Newsweek should be calling them.
Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker. It's a matter of emphasis.
This simple view of ethics was destroyed about 200 years ago, most notably by Immanuel Kant (1724-1804). Kant is in many ways the inventor of the 20th Century. He rejected the ethical force of tradition, and created the modern idea of autonomy. Along with this radical idea, he introduced the centrality of rational thought as both the glory and the obligation of human beings. There is a paradox in Kant: Each person makes free, autonomous choices, unfettered by outside authority, and yet each person is compelled by the demands of rationality to accept Kant's ethical principle, the Categorical Imperative. This principle is based on the idea that what is ethical for an individual must be generalizable to everyone.
Modern cognitive psychology is based on Kant's ideas. Central to the functioning of the mind, most people now believe, is information processing and rational argument. Even emotions, for many psychologists, are a kind of theorem based on reasoning from data. Kohlberg's theory of moral development interprets moral weakness as cognitive weakness, the inability to understand sophisticated moral reasoning, rather than as a failure of will. Disputed questions of ethics, like abortion, are debated as if they were questions of fact, subject to rational proof.
Since Kant, many philosophers have refined his work, and many others have disagreed with it. For our purpose, understanding what a hacker is, we must consider one of the latter, Sören Kierkegaard (1813-1855). A Christian who hated the established churches, Kierkegaard accepted Kant's radical idea of personal autonomy. But he rejected Kant's conclusion that a rational person is necessarily compelled to follow ethical principles. In the book Either-Or he presents a dialogue between two people. One of them accepts Kant's ethical point of view. The other takes an aesthetic point of view: what's important in life is immediate experience.
A lesson on the history of philosophy may seem out of place in a position paper by a computer scientist about a pragmatic problem. But Kierkegaard, who lived a century before the electronic computer, gave us the most profound understanding of what a hacker is. A hacker is an aesthete.
The life of a true hacker is episodic, rather than planned. Hackers create ``hacks.'' A hack can be anything from a practical joke to a brilliant new computer program. (VisiCalc was a great hack. Its imitators are not hacks.) But whatever it is, a good hack must be aesthetically perfect. If it's a joke, it must be a complete one. If you decide to turn someone's dorm room upside-down, it's not enough to epoxy the furniture to the ceiling. You must also epoxy the pieces of paper to the desk.
Steven Levy, in the book Hackers, talks at length about what he calls the ``hacker ethic.'' This phrase is very misleading. What he has discovered is the Hacker Aesthetic, the standards for art criticism of hacks. For example, when Richard Stallman says that information should be given out freely, his opinion is not based on a notion of property as theft, which (right or wrong) would be an ethical position. His argument is that keeping information secret is inefficient; it leads to unaesthetic duplication of effort.
The original hackers at MIT-AI were mostly undergraduates, in their late teens or early twenties. The aesthetic viewpoint is quite appropriate to people of that age. An epic tale of passionate love between 20-year-olds can be very moving. A tale of passionate love between 40-year-olds is more likely to be comic. To embrace the aesthetic life is not to embrace evil; hackers need not be enemies of society. They are young and immature, and should be protected for their own sake as well as ours.
In practical terms, the problem of providing moral education to hackers is the same as the problem of moral education in general. Real people are not wholly ethical or wholly aesthetic; they shift from one viewpoint to another. (They may not recognize the shifts. That's why Levy says ``ethic'' when talking about an aesthetic.) Some tasks in moral education are to raise the self-awareness of the young, to encourage their developing ethical viewpoint, and to point out gently and lovingly the situations in which their aesthetic impulses work against their ethical standards.
Note: This is an appendix to "Computer Hacking and Ethics," a position paper I wrote for the ACM Select Panel on Hacking in 1985.
University of California, Berkeley
In one sense it's silly to argue about the ``true'' meaning of a word. A word means whatever people use it to mean. I am not the Academie Française; I can't force Newsweek to use the word ``hacker'' according to my official definition.
Still, understanding the etymological history of the word ``hacker'' may help in understanding the current social situation.
The concept of hacking entered the computer culture at the Massachusetts Institute of Technology in the 1960s. Popular opinion at MIT posited that there are two kinds of students, tools and hackers. A ``tool'' is someone who attends class regularly, is always to be found in the library when no class is meeting, and gets straight As. A ``hacker'' is the opposite: someone who never goes to class, who in fact sleeps all day, and who spends the night pursuing recreational activities rather than studying. There was thought to be no middle ground.
What does this have to do with computers? Originally, nothing. But there are standards for success as a hacker, just as grades form a standard for success as a tool. The true hacker can't just sit around all night; he must pursue some hobby with dedication and flair. It can be telephones, or railroads (model, real, or both), or science fiction fandom, or ham radio, or broadcast radio. It can be more than one of these. Or it can be computers. [In 1986, the word ``hacker'' is generally used among MIT students to refer not to computer hackers but to building hackers, people who explore roofs and tunnels where they're not supposed to be.]
A ``computer hacker,'' then, is someone who lives and breathes computers, who knows all about computers, who can get a computer to do anything. Equally important, though, is the hacker's attitude. Computer programming must be a hobby, something done for fun, not out of a sense of duty or for the money. (It's okay to make money, but that can't be the reason for hacking.)
A hacker is an aesthete.
There are specialties within computer hacking. An algorithm hacker knows all about the best algorithm for any problem. A system hacker knows about designing and maintaining operating systems. And a ``password hacker'' knows how to find out someone else's password. That's what Newsweek should be calling them.
Someone who sets out to crack the security of a system for financial gain is not a hacker at all. It's not that a hacker can't be a thief, but a hacker can't be a professional thief. A hacker must be fundamentally an amateur, even though hackers can get paid for their expertise. A password hacker whose primary interest is in learning how the system works doesn't therefore necessarily refrain from stealing information or services, but someone whose primary interest is in stealing isn't a hacker. It's a matter of emphasis.
Ethics and Aesthetics
Throughout most of the history of the human race, right and wrong were relatively easy concepts. Each person was born into a particular social role, in a particular society, and what to do in any situation was part of the traditional meaning of the role. This social destiny was backed up by the authority of church or state.This simple view of ethics was destroyed about 200 years ago, most notably by Immanuel Kant (1724-1804). Kant is in many ways the inventor of the 20th Century. He rejected the ethical force of tradition, and created the modern idea of autonomy. Along with this radical idea, he introduced the centrality of rational thought as both the glory and the obligation of human beings. There is a paradox in Kant: Each person makes free, autonomous choices, unfettered by outside authority, and yet each person is compelled by the demands of rationality to accept Kant's ethical principle, the Categorical Imperative. This principle is based on the idea that what is ethical for an individual must be generalizable to everyone.
Modern cognitive psychology is based on Kant's ideas. Central to the functioning of the mind, most people now believe, is information processing and rational argument. Even emotions, for many psychologists, are a kind of theorem based on reasoning from data. Kohlberg's theory of moral development interprets moral weakness as cognitive weakness, the inability to understand sophisticated moral reasoning, rather than as a failure of will. Disputed questions of ethics, like abortion, are debated as if they were questions of fact, subject to rational proof.
Since Kant, many philosophers have refined his work, and many others have disagreed with it. For our purpose, understanding what a hacker is, we must consider one of the latter, Sören Kierkegaard (1813-1855). A Christian who hated the established churches, Kierkegaard accepted Kant's radical idea of personal autonomy. But he rejected Kant's conclusion that a rational person is necessarily compelled to follow ethical principles. In the book Either-Or he presents a dialogue between two people. One of them accepts Kant's ethical point of view. The other takes an aesthetic point of view: what's important in life is immediate experience.
The choice between the ethical and the aesthetic is not the choice between good and evil, it is the choice whether or not to choose in terms of good and evil. At the heart of the aesthetic way of life, as Kierkegaard characterises it, is the attempt to lose the self in the immediacy of present experience. The paradigm of aesthetic expression is the romantic lover who is immersed in his own passion. By contrast the paradigm of the ethical is marriage, a state of commitment and obligation through time, in which the present is bound by the past and to the future. Each of the two ways of life is informed by different concepts, incompatible attitudes, rival premises. [MacIntyre, p. 39]Kierkegaard's point is that no rational argument can convince us to follow the ethical path. That decision is a radically free choice. He is not, himself, neutral about it; he wants us to choose the ethical. But he wants us to understand that we do have a real choice to make. The basis of his own choice, of course, was Christian faith. That's why he sees a need for religious conviction even in the post-Kantian world. But the ethical choice can also be based on a secular humanist faith.
A lesson on the history of philosophy may seem out of place in a position paper by a computer scientist about a pragmatic problem. But Kierkegaard, who lived a century before the electronic computer, gave us the most profound understanding of what a hacker is. A hacker is an aesthete.
The life of a true hacker is episodic, rather than planned. Hackers create ``hacks.'' A hack can be anything from a practical joke to a brilliant new computer program. (VisiCalc was a great hack. Its imitators are not hacks.) But whatever it is, a good hack must be aesthetically perfect. If it's a joke, it must be a complete one. If you decide to turn someone's dorm room upside-down, it's not enough to epoxy the furniture to the ceiling. You must also epoxy the pieces of paper to the desk.
Steven Levy, in the book Hackers, talks at length about what he calls the ``hacker ethic.'' This phrase is very misleading. What he has discovered is the Hacker Aesthetic, the standards for art criticism of hacks. For example, when Richard Stallman says that information should be given out freely, his opinion is not based on a notion of property as theft, which (right or wrong) would be an ethical position. His argument is that keeping information secret is inefficient; it leads to unaesthetic duplication of effort.
The original hackers at MIT-AI were mostly undergraduates, in their late teens or early twenties. The aesthetic viewpoint is quite appropriate to people of that age. An epic tale of passionate love between 20-year-olds can be very moving. A tale of passionate love between 40-year-olds is more likely to be comic. To embrace the aesthetic life is not to embrace evil; hackers need not be enemies of society. They are young and immature, and should be protected for their own sake as well as ours.
In practical terms, the problem of providing moral education to hackers is the same as the problem of moral education in general. Real people are not wholly ethical or wholly aesthetic; they shift from one viewpoint to another. (They may not recognize the shifts. That's why Levy says ``ethic'' when talking about an aesthetic.) Some tasks in moral education are to raise the self-awareness of the young, to encourage their developing ethical viewpoint, and to point out gently and lovingly the situations in which their aesthetic impulses work against their ethical standards.
Reference
MacIntyre, Alasdair. After Virtue. Notre Dame, Indiana: University of Notre Dame Press, 1981.Note: This is an appendix to "Computer Hacking and Ethics," a position paper I wrote for the ACM Select Panel on Hacking in 1985.
www.cs.berkeley.edu/~bh
Monday 12 May 2014
THE BENEFITS OF PROJECT MANAGEMENT TRAINING
Now that we’ve laid out the ground-rules, it’s a lot easier to visualize what some of the benefits of project management are. I’ve put together my own top-ten list of the benefits of project management. Your personal mileage with these benefits may vary:
- Better Efficiency in Delivering Services: Project management provides a “roadmap” that is easily followed and leads to project completion. Once you know where to avoid the bumps and pots holes it stands to reason that you’re going to be working smarter and not harder and longer.
- Improved / Increased / Enhanced Customer Satisfaction: Whenever you get a project done on time and under budget, the client walks away happy. And a happy client is one you’ll see again. Smart project management provides the tools that enable this client/manager relationship to continue.
- Enhanced Effectiveness in Delivering Services: The same strategies that allowed you to successfully complete one project will serve you many times over.
- Improved Growth and Development Within your Team: Positive results not only command respect but more often than not inspire your team to continue to look for ways to perform more efficiently.
- Greater Standing and Competitive Edge: This is not only a good benefit of project management within the workplace but outside of it as well; word travels fast and there is nothing like superior performance to secure your place in the marketplace.
- Opportunities to Expand your Services: A by-product of greater standing. Great performance leads to more opportunities to succeed.
- Better Flexibility: Perhaps one of the greatest benefits of project management is that it allows for flexibility. Sure project management allows you to map out the strategy you want to take see your project completed. But the beauty of such organization is that if you discover a smarter direction to take, you can take it. For many small-to-midsize companies, this alone is worth the price of admission.
- Increased Risk Assessment: When all the players are lined up and your strategy is in place potential risks will jump out and slap you in the face. And that’s the way it should be. Project management provides a red flag at the right time: before you start working on project completion.
- Increase in Quality: Goes hand-in-hand with enhanced effectiveness
- Increase in Quantity: I saved the best for last> And increase in quality is often the result of better efficiency, a simple reminder regarding the benefits of project management.
By implementing fundamental project management strategies, you will narrow your focus, reach desired goals and achieve those goals within specific time and cost perimeters. The final result is that everyone comes out a winner - which just may be Project Management's best benefit of all.
Project Management is all about the effective management of change and can benefit an organisation in many ways because it provides a systematic approach to managing and controlling different types of projects and different types of change.
Professional project management training can ensure that organisations of all sizes reap the benefits of a well-controlled, project-based approach to business. Some of these benefits are listed below:
When questioned, almost 90% of course attendees believed that their organisation had benefited from their attending the course. Specific benefits mentioned by delegates are
Typical new skills learnt included:
The survey of past course attendees further revealed that many delegates gained a clearer understanding of PM terminology with which they were already familiar. The courses reinforced their understanding and ability to use a common language to discuss project management subjects. This enabled them to better capture and communicate project requirements and success criteria, and to obtain concise consensus on what would constitute a successful project from the perspective of the stakeholders, project manager and customers.
But for many, one of the major benefits of the training course was formalising the topics that they already understood; putting these topics
BY PAUL NAYBOUR
Paul Naybour is the Business Development Director of Parallel Project Training. He has been a project management consultant for 9 years and has experience managing project management development programmes for many clients, both small and large. Paul's Google Profile
Professional project management training can ensure that organisations of all sizes reap the benefits of a well-controlled, project-based approach to business. Some of these benefits are listed below:
- Develop a full understanding of the project goals, objectives and benefits before committing significant resources.This ensures that only the projects which are expected to provide benefits exceeding the investment of time and money are initiated.
- Ensure that the project proceeds effectively through all the essential phases, from concept through to completion.This makes sure the project is properly reviewed by the stakeholders at key stages including initiation and final acceptance.
- Provide a rigorous approach to defining a realistic, but still challenging, timescale and budget for completion of the project.
- Establish a structured approach for clearly defining roles and responsibilities for the delivery of the project and its work packages.This is critical to building commitment to the project objectives.
- Implement a systematic process to manage changes to the project scope or objectives.This minimises the risks associated with change to the end-product or to the benefits for the sponsors.
What People Say About Training Courses
A survey of past delegates who have attended Parallel Project Management Training Courses has provided further insight into the benefits of training in terms of acquiring new skills, developing existing skills and gaining practical advice to implement in the day-to-day work environment.When questioned, almost 90% of course attendees believed that their organisation had benefited from their attending the course. Specific benefits mentioned by delegates are
- Having a common language to describe issues within a business and has helped allow clearer definitions of areas for development versus best practice.
- Using people to successfully deliver projects
- With everyone following APMP it is helping bring a consistent baseline knowledge base to the business.
Benefits in the Everyday Work EnvironmentFormal training was seen to be particularly useful for improving communication between stakeholders and developing a better awareness of the leadership qualities required in a project manager. In meetings and when discussing project management tools and techniques a formal training course helped those involved to better understand what was being discussed and to ensure everyone was working from a consistent knowledge base. Training also helped when it came to putting together and managing the project team and dealing with the different characteristics of project teams; many delegates viewed the professional qualifications obtained as a necessary part of progressing up the career ladder by equipping PMs with a thorough understanding of the essential attributes of a successful project.
Where courses were undertaken by a group from the same organisation the common learning of a standard method such as APMP helped in developing a consistent approach to managing projects using a common language. This common language to describe issues within a business enabled clearer definitions of areas for development versus best practice.
On a practical level the courses provided real-life scenarios to hone skills with software tools and equip delegates to truly take advantage of features such as Pert Charts and Critical Paths. Courses offered powerful insights into establishing stakeholder requirements and how to satisfy them by spending more time with key stakeholders and focusing on the Critical Success Factors for project managers.
Where courses were undertaken by a group from the same organisation the common learning of a standard method such as APMP helped in developing a consistent approach to managing projects using a common language. This common language to describe issues within a business enabled clearer definitions of areas for development versus best practice.
On a practical level the courses provided real-life scenarios to hone skills with software tools and equip delegates to truly take advantage of features such as Pert Charts and Critical Paths. Courses offered powerful insights into establishing stakeholder requirements and how to satisfy them by spending more time with key stakeholders and focusing on the Critical Success Factors for project managers.
Developing Existing Skills
Where respondents to the survey, who participated in a range of APM courses, PRINCE2 Practitioner and PMP Certification courses, felt that the course had also been beneficial in developing their existing project management skills the areas in which they felt they had gained most included:- Dealing with Change
- People Management
- Stakeholder Management and Engagement
- Communication with Stakeholders
- Communication with Project Teams
- Planning
- Leadership
- Developing Critical Success Factors
- Managing Conflict
Learning New Skills
Clearly every delegate would also expect to learn new skills on a training course as well as reinforcing existing skills and being able to take a fresh perspective on what they already know.Typical new skills learnt included:
- Active risk management
- Planning, implementing and monitoring projects
- Pert Charts
- Costing
- Detailed knowledge of scheduling
- The Procurement process
- Earned Value Management
The survey of past course attendees further revealed that many delegates gained a clearer understanding of PM terminology with which they were already familiar. The courses reinforced their understanding and ability to use a common language to discuss project management subjects. This enabled them to better capture and communicate project requirements and success criteria, and to obtain concise consensus on what would constitute a successful project from the perspective of the stakeholders, project manager and customers.
But for many, one of the major benefits of the training course was formalising the topics that they already understood; putting these topics
Project Management Training Benefits at A Glance
Improved Efficiency
Enabling a project manager to accurately determine the requirements of a project and to assess the available resources and make best use of those resources. This ensures the scope, schedule and budget are accurately set from the start.
Enabling a project manager to accurately determine the requirements of a project and to assess the available resources and make best use of those resources. This ensures the scope, schedule and budget are accurately set from the start.
Enhanced Confidence
Learning about how to identify risks in projects, and how to manage, them helps build a project manager's confidence and ability to manage projects effectively.
Learning about how to identify risks in projects, and how to manage, them helps build a project manager's confidence and ability to manage projects effectively.
Consistent Delivery
Confident, efficient project managers who are able to deal effectively with risks will consistently and reliably deliver successful projects avoiding wasted time, effort and money.
Confident, efficient project managers who are able to deal effectively with risks will consistently and reliably deliver successful projects avoiding wasted time, effort and money.
Customer Satisfaction
When the tools and techniques are used to deliver projects reliably; deliver what was required and within budget then the customer will be satisfied.
When the tools and techniques are used to deliver projects reliably; deliver what was required and within budget then the customer will be satisfied.
A Fresh Perspective
Experienced project managers can improve their PM knowledge with new techniques but can also simply learn to approach a familiar scenario with a new perspective.
Experienced project managers can improve their PM knowledge with new techniques but can also simply learn to approach a familiar scenario with a new perspective.
Behavioural Changes
Project Management is not just about experience, tools and techniques but also learning how to influence others and resolve conflict.
Project Management is not just about experience, tools and techniques but also learning how to influence others and resolve conflict.
BY PAUL NAYBOUR
Paul Naybour is the Business Development Director of Parallel Project Training. He has been a project management consultant for 9 years and has experience managing project management development programmes for many clients, both small and large. Paul's Google Profile
Monday 5 May 2014
Steevyee: Chimamanda Adichie writes on the kind of President...
Steevyee: Chimamanda Adichie writes on the kind of President...: Award winning author Chimamanda Adichie writes on the kind of President she wants. Read below.. Some of my relatives lived for decades in...
Chimamanda Adichie writes on the kind of President she wants.
Award winning author Chimamanda Adichie writes on the kind of President she wants. Read below..
Some of my relatives lived for decades in the North, in Kano and Bornu. They spoke fluent Hausa. (One relative taught me, at the age of eight, to count in Hausa.) They made planned visits to Anambra only a few times a year, at Christmas and to attend weddings and funerals. But sometimes, in the wake of violence, they made unplanned visits. I remember the word ‘Maitatsine’ – to my young ears, it had a striking lyricism – and I remember the influx of relatives who had packed a few bags and fled the killings. What struck me about those hasty returns to the East was that my relatives always went back to the North. Until two years ago when my uncle packed up his life of thirty years in Maiduguri and moved to Awka. He was not going back. This time, he felt, was different.
My uncle’s return illustrates a feeling shared by many Nigerians about Boko Haram: a lack of hope, a lack of confidence in our leadership. We are experiencing what is, apart from the Biafran war, the most violent period in our nation’s existence. Like many Nigerians, I am distressed about the students murdered in their school, about the people whose bodies were spattered in Nyanya, about the girls abducted in Chibok. I am furious that politicians are politicizing what should be a collective Nigerian mourning, a shared Nigerian sadness.
And I find our president’s actions and non-actions unbelievably surreal.
I do not want a president who, weeks after girls are abducted from a school and days after brave Nigerians have taken to the streets to protest the abductions, merely announces a fact-finding committee to find the girls.
I want President Jonathan to be consumed, utterly consumed, by the state of insecurity in Nigeria. I want him to make security a priority, and make it seem like a priority. I want a president consumed by the urgency of now, who rejects the false idea of keeping up appearances while the country is mired in terror and uncertainty. I want President Jonathan to know – and let Nigerians know that he knows – that we are not made safer by soldiers checking the boots of cars, that to shut down Abuja in order to hold a World Economic Forum is proof of just how deeply insecure the country is. We have a big problem, and I want the president to act as if we do. I want the president to slice through the muddle of bureaucracy, the morass of ‘how things are done,’ because Boko Haram is unusual and the response to it cannot be business as usual.
I want President Jonathan to communicate with the Nigerian people, to realize that leadership has a strong psychological component: in the face of silence or incoherence, people lose faith. I want him to humanize the lost and the missing, to insist that their individual stories be told, to show that every Nigerian life is precious in the eyes of the Nigerian state.
I want the president to seek new ideas, to act, make decisions, publish the security budget spending, offer incentives, sack people. I want the president to be angrily heartbroken about the murder of so many, to lie sleepless in bed thinking of yet what else can be done, to support and equip the armed forces and the police, but also to insist on humaneness in the midst of terror. I want the president to be equally enraged by soldiers who commit murder, by policemen who beat bomb survivors and mourners. I want the president to stop issuing limp, belated announcements through public officials, to insist on a televised apology from whoever is responsible for lying to Nigerians about the girls having been rescued.
I want President Jonathan to ignore his opponents, to remember that it is the nature of politics, to refuse to respond with defensiveness or guardedness, and to remember that Nigerians are understandably cynical about their government.
I want President Jonathan to seek glory and a place in history, instead of longevity in office. I want him to put aside the forthcoming 2015 elections, and focus today on being the kind of leader Nigeria has never had.
I do not care where the president of Nigeria comes from. Even those Nigerians who focus on ‘where the president is from’ will be won over if they are confronted with good leadership that makes all Nigerians feel included. I have always wanted, as my president, a man or a woman who is intelligent and honest and bold, who is surrounded by truth-telling, competent advisers, whose policies are people-centered, and who wants to lead, who wants to be president, but does not need to – or have to- be president at all costs.
President Jonathan may not fit that bill, but he can approximate it: by being the leader Nigerians desperately need now.
By Chimamanda Adichie
Wednesday 16 April 2014
SWEP REPORT 2012
|
NWOBODO STEPHEN EMEKA
THE DEPARTMENT OF CIVIL
ENGINEERING,
COLLEGE
OF SCIENCE AND ENGINEERING,
LANDMARK UNIVERSITY,
OMU-ARAN, KWARA STATE.
|
|
Dedication.
This book is dedicated to those students who wish to have an
overview of what SWEP program is like and its intending benefits in this walk
to becoming an Engineer. To all those who are seeking and searching to know
what general engineering is all about and what they will spend a number of
weeks at school, doing as part of the SWEP curriculum.
To all who stood by
me and encouraged me to continue to push harder in other to attain my set goals
and all those who have added immeasurably, tangible benefits towards my pursuit
to becoming a Civil Engineer.
PROLOGUE.
The SWEP program began on the 6th of August 2012
with an assembly of students at the university multi-purpose hall with the
presence of the vice chancellor, Registrar, learned professors, dean of the
college, dean of students, lecturers and all the 200 level engineering students
as well as it was graced by the university chaplain and his deputy.
We, the engineering
students were asked questions that will keep us thinking and as well should
provide an answer for. Such questions are
Why do engineers work in the bank?
Why do engineers venture into business despite their
knowledge about engineering?
Why are most contracts handled by rich men rather than
engineers?
Why do buildings and structures fail despite being handled by
professionals?
In the message presented that day, we were told to something
that even if we are not being paid for, we will derive pleasure in doing. Do
not think of getting one million naira per month but naturally do what will
attract one million naira per month and you will be relevant.
The chaplain also said that when we get interested about our
assignment in life, we will make it in our individual field.
Finally, SWEP is the
accumulation of what have been gathered so far. Knowledge is the application of
feed that have been gathered so far, knowledge is power.
Turns were taken to go round the five workshops and
laboratories covering the Electrical, mechanical, Civil and Chemical
engineering fields to give us tips, knowledge on all, bits of the essential and
needed general knowledge in engineering.
ACKNOWLEGEMENT.
I sincerely want to use this medium to thank the management of landmark university
for the immeasurable help and contribution towards the program, it has been an
eye-opener for all the students that were involved especially the area of
general engineering practice and how a field inn engineering needs another in
other to successfully achieve all its needs met.
I want to thank the HOD of Civil Engineering, Prof. S.I.A
Ojo, Dr. Gana and Engr. Hilary for their
support and vigilance, they did allowed us do the work and we know the dignity
of labor.
My colleagues
were of great support during the program because we did everything together and
it was fun as well. There was division of labor and each encouraged one another
to carry on till the end.
I can never forget to thank the almighty God for his
provisions, protection and guidance throughout the SWEP program and departure.
TABLE OF CONTENT.
TITLE PAGE ………………………………………………………………………………………………….
DEDICATION …………………………………………………………………………………………………. i
PROLOGUE ……………………………………………………………………………………………………
ii
ACKNOWLEGEMENT …………………………………………………………………………………….. iii
TABLE OF CONTENT …………………………………………………………………………….………… iv
SWEP AND PRECAUTIONS…………………………………………………………….…….…………….v
CHEMICAL ENGINEERING LABORATORY……………………….……………………..…………...vi
CIVIL ENGINEERING LABORATORY…………………………………………………………..………..x
ELECTRICAL AND INFORMATION ENGINEERING LABORATORY……………..………….xiv
MECHANICAL ENGINEERING LABORATORY………………………………………………….….xviii
AGRICULTURAL ENGINEERING LABORATORY……………………………………..…………...xxi
CIVIL ENGINEERING PROJECT……………………………..……………………………..…….……...xxv
CONCLUSION……………………………………………………………………………………………………xxvi
SWEP AND PRECAUTIONS.
SWEP which means
students work experience program was designed only to expose the students to
skills acquisition and also inculcate in
them the development of right team spirit as well as expose them to rudimentary
expectations for the world of work.
- It exposes the students to all aspects of engineering
practice
- It develops the
students’ innovative and creative abilities and skills relevant to their
programme.
- SWEP engages the students in manual labour so that they can
appreciate the dignity of labour.
- It also develops in the students; a logical mode of
thinking and reasoning that promotes a practical application of acquired
theoretical, knowledge in overcoming technical and professional challenges.
- It trains the students on how to acknowledge and appreciate
the numerous professional challenges of their immediate environment and the
society at large and offer solutions, which their knowledge empowerment avails
them.
- SWEP also helps in student’s project work in the final
year.
SAFETY PRACAUTIONS
largely a matter of common sense and the greatest safe guard
of all is simply think before performing an operation.
1. Use your common sense to do any job.
2. Ask if you are in doubt.
3. Always use the correct tool for the correct job.
4. Keep the tools and equipment in the proper place when not
in use.
5. Keep the gang way and machine area clear.
6. Do not walk away when the machine is on.
7. Do not direct the compressed air on yourself.
8. Always clamp your
job firmly to the table jock or vice of the machine.
PERSONAL
SAFETY
1. Wear lab
coat. 2. Never put sharp object in your pocket. 3. Always wear safety boot. 4.
Wear approved eyes protector.
CHEMICAL ENGINEERING
LABORATORY.
is It held between 6th to 9th of August
2012, In the lab, we met Engr. Olalekan and
Engr. Okewale from the department
of chemical engineering. We were shown the equipment in the lab and how it
works.
Digital turbidity
meter
·
Used in unit operation for floucation
·
It is used in
coagulation
To know how turbid
water
Spectrophotometer
·
Used to get the transmittance absorbance and
concentration of a solution
·
To get the wavelength of solution
·
Centrifuge For sterilizing or separation process, to
agitate solution to mix compounds.
Hydraulic bench
It is used mainly in transport phenomena of
fluids.
It is used to study the effect of
friction and determine headloss on fluid
rate.
Platform weighing scale: It is a
digital instrument for weighing chemicals.
It is used
to know the force exerted by load.
Others include vacuum freezer dryer to dry products, beam
balance used to determine the center if mass of substance, differencial manometer
to used to measure pressure and to test liquid force.
SOAP MAKING
Types of soap are
Laundry
Soap
Toilet (soft) soap
Liquid (detergent)
soap
Powdered detergent –
Solid soap.
things
needed for soap production are - Palm
kernel oil, Tyroid(Animal fats), Shell
butter , Vegetable oil , Caustic soda added
for cleansing effects and
saponification , Sodium carbonate , Sodium sulphate to preserves the colour , Sodium sililcate for
binding and to make the soap shine , Titanium dioxide , Fatty acid which aids saponification and cleansings effects ,
Coloured perfume.
PROCEDURE FOR PRODUCTION >>> Get a mixer
and supply it with heat and pour an amount of oil for the production. Then make
the solution sodium carbonate, sodium sulphide and sodium hydroxide. Then add
sodium hydroxide then saponification process occurs after about 30 minutes then
your soap is formed.
Note: for 20litres of soap you need 100-200litres of oil.
Equipment
1. Crusher: to
dissolve chemicals
2. Boiler: to supply eat to the crusher
3. Blender: to blend the chemicals together
4. Chiller: used to
make the product cool
5. Warmer
6. Drier
7. Storage and fermenting tank
In conclusion, saponification is centralized and is a
catalyst base and hydraulising esters because when NAOH hydraulises with fatty
acid, you get a hydraulised esters.
CIVIL ENGINEERING LABORATORY.
At the civil engineering lab, we were introduced to most
civil engineering equipments as obtainable in that field of engineering. The
geotechnical lab, concrete, structural and environmental laboratories.
Sieve
machine- A machine that uses a series of progressively finer screens
to sort abrasive grains into similar sizes
Grain moisture meter- The proper use of a moisture
meter is critical in making sound grain harvesting, drying, storage and
marketing decisions.
Measuring cylinder- A measuring cylinder is used
for measuring solutions, liquids.
Mortar and pestle - It is used for crushing soil
samples.
Moisture content machine- It is used to check the
moisture content of the soil sample.
Ranging pole- It is used in marking during site operation.
Theodolite- It is a precision scientific instrument; it measures
an angle from your reference line and the distance from the object.
Metal tape rule- Used to measure linear distances.
Compass- A compass is a navigational instrument that measures
directions. It indicates east, west, north and south direction.
Other instruments include
PH metre, Oven, Vibrating table, Digital planimeter, Simple
collector, Wheel barrow.
SOIL
ANALYSIS
s/n
|
Sieve diameter
|
Weight of sieve pan + sand
|
Weight of soil pan alone
|
Weight of soil retained in (kg)
|
Weight of soil retained in (g)
|
% retained
|
Cumulative % retained
|
1
|
20mm
|
0.670
|
0.665
|
0.005
|
5
|
1.04
|
1.042
|
2
|
13.2mm
|
0.575
|
0.560
|
0.015
|
15
|
3.125
|
4.101
|
3
|
5.0mm
|
0.670
|
0.520
|
0.15
|
150
|
31.250
|
35.164
|
4
|
4.75mm
|
0.610
|
0.590
|
0.02
|
20
|
4.167
|
98.95
|
5
|
4.25mm
|
0.770
|
0.470
|
0.288
|
288
|
59.37
|
99.996
|
|
---
|
0.370
|
0.365
|
0.005
|
5
|
1.042
|
|
total
|
|
|
|
0.495
|
|
99.996
|
|
Weight of pan + sand = 0.67kg
Weight of pan= 0.19kg
Weight of soil = 0.67-0.19=0.48kg
%retained = weight of soil/total soil *100
SURVEYING
Instruments used in land surveying are
- Theodolite
-
Ranging poles
- Metal
rule
-
Compass
- Pegs-
Jotter
-
Measuring tapes
Water treatment
Process of water treatment
(1) Extraction of
water from source
(2) Sedimentation
(3) Coagulation
(4) Decantation
(5) Treatment
WHAT CONTAMINATES WATER
Ph, heavy metal, BOD biological oxygen disease, COD carbo
oxygen disease, semolina typhae, septic
tank.
TREATMENT: Test for pH, colour, temperature, turbidity, taste,
odor, aesthetic value, chlorinationozonation.
Chemical treatment: BOD5
(Biological oxygen demand), this is the maximum amount of oxygen required to
degrade a particular amount of biological waste. It is normally measured in the
lab within the first five days, hence the word BOD5.
Biological treatment: Test for the presence of pathogens
(bacteria, fungi, protozoan, amoeba)
The process of determining the amount of pathogen in water is
called CALIFON count
ELECTRICAL AND INFORMATION
ENGINEERING LABORATORY.
Mr. Abioye, the technologist n the lab in the lab ,He started
with safety precautions in the laboratory. He defined safety as the act of
protecting both the physical assets, human and other resources against loss,
harm, damage, tragedy, calamity and other hazards. In his words, he said “Man
is endowed with not only safety instinct but also sensed to identify the signs
and symptoms of dangers, his hands to protect himself by fighting for his own
safety and his legs for running away from danger to safety.” He taught us how
to calculate the resistance of a resistor. He then later treated the questions
that came out under the Electrical aspect in GEC 226 in the last session
examination. He gave us resistors so that we can tell him the value of the resistor,
which we did. We were taken to the transformer beside the workshop by Engineer
Kelechi Abanhi. We were shown some of the things we were taught in class. He
said the reason why the transformer is in that shape is the cooling system. He
also said there are 2 types of cooling system;
oil cooled system and
air cooled system
the one we visited was the oil cooled system. He told us
about the wiring of the transformer, he showed us the wire connecting to the
poles.
Resistors:
Resistors are devices
used to regulate or prevent current flow
0- Black
1- Brown
2- Red
3- Orange
4- Yellow
5- Green
6- Blue
7- Violet
8- Grey
9- White
Gold is _|_ 5%
Silver _+ 10%
Others 20%
SAFETY IN ELECTRICAL ENGINEERING LABORATORY
Safety
is the act of protecting both the physical assets, human and other resources
against loss, damage, tragedy and other hazards.
Man
is endowed with not only safety idea, but also his senses to identify the signs
and symptoms of danger. His hands to protect himself by fighting for his own
safety and leg for running away from danger for safety.
This
is why Maslow in all his wisdom postulated that apart from basic needs of life
(food, water, rest etc.) safety comes next as the needs of man.
·
You must never assume in electrical engineering laboratory
·
Maximum of 40 volts for electrical sensation on human
AVOMETER
An avometer is an instrument that measure current , voltage
and resistance.
DC_
AC_
When measuring current, you’ll need to open the circuit , but
wen measuring vltage you short circuit the system.
The red wire represents the positive terminal, while the
black wire represents the negative terminal.
We were told that whenever we want to the current on the
ammeter, we should connect it by open circuit; also when to use voltmeter, it
connected by short circuiting. We were told that ohmmeter is used to measure
resistor and it has no polarity; it is also connected by short circuiting;
wattmeter is connected by open circuiting. Also Ohmmeter can be used to test
for continuity. We were also taught Joints and jointing. It is also known as
soldering. We were told the theories behind soldering. I.E.E Regulation 208
requires that every connection between cables shall be made soldered joint or
mechanical connector, and shall be readily accessible and mechanically and
electrically sound. We were told the method of soldering. The correct method of
soldering is to heat the wire to be soldered to such a temperature that will
melt the solder put in contact with it. Soldering cannot be satisfactorily
accomplished by simply dropping blobs of melted solder on to the cold wire as
this will give rise to what is referred to as “dry- joints” which do not
present good electrical contacts. The heating is done either by means of a
soldering iron for small cables or by the uses of blow lamp. We were also shown
how to use soldering iron. The soldering iron comprises a- heavy copper riveted
to an Iron bolt and fitted with a wooden or plastic handle. A convenient size
is about 1 1/2 in. Square and 3 in long with ¼ in. diameter, with circular
groove across the bit. The iron bit requires tinning prior to use. A stick of
solder is applied, melting freely and adhering to surface as a thin film.
When it is certain that the solder has penetrated
throughout the joint the iron is withdrawn speedily. If the joint is kept too
long in the groove of the Iron, heat is conducted along the cable and damage
may be done to the cable insulation, proper preparation, cleaning, and tinning
of the wires
facilitate
quick operation. And finally, we did some soldering; we sold and desold
electrical components on a given electrical board.
IDENTIFYING
ELECTRICAL PRODUCT
Information on
the name plate.
–
Name of the manufacturer;
- Place of manufacture;
- Date of
manufacture;
- Model or
serial number;
- Voltage rating (if it is an electrical material)
- Current rating, maximum current and continuous
current;
- Frequency, 50Hz (Nigeria), 60Hz(America);
- Speed (revolution per unit);
- Power rating, horse power (hp), kilowatts (KW),
KVA
- The volume
and the weight;
- The height;
Final sub circuit For Lightning
socket:
Use 1-1.5 mm2 2-core cable and
protect the cable on the distribution board with 5Amps or 10 Amps.
For Socket outlet: - Only 15 Amps socket
outlet per final sub circuit. Use 4mm2 cable, protect with 15, 20 or 20 Amps
depending on the power rating of air conditioners.
MECHANICAL ENGINEERING
LABORATORY .
The supervisor in charge of the laboratory. He started by
giving us the scheme to work to do within the four days; - Measurement and
measuring tools - marking tools, Cutting tools, Work holding and work holding devices ,
Tightening and loosening equipment. We started with measurement and measuring tools.
He defined measurement as just a given length that is use to describe or
produce item. Measurement can be divided into two.
1)
Linear/end measurement
2)
Non-linear measurement
-
Angular measurement
-
Non- angular measurement Instruments used in linear measurement.
1) Tape rule/
tape measure: It is a long strip of plastic, cloth or flexible metal that has
measurements marked on it and is used for measuring length of something.
2)
Steel rule: Measure short linear length; also used with the calipers.
3) Vernier caliper: Used to measure
very small length like internal diameter of a small tube
.
4) Outside caliper: Measure external diameter.
5) Inside caliper: Measure internal
diameter.
6)
Height gauge: To measure height of an object.
7)
Micrometer screw gauge: To measure a small thickness.
Marking is the act of taking
note at the point you want to work on, and to do these you need some tools
which are called marking tools. Marking and marking tools. Instrument used as
marking tools
1) Scriber: Used for scribing lines.
2) Divider: It is an instrument made of two thin metal parts
joined together at the top, used for making a measured line.
3) Odd leg caliper
4) Punch: (dot and center). Dot punch: point at angle 60,
while center point at angle 90. It can function both as a marking tool and a
cutting tool.
CUTTING TOOLS
Cutting is the act of making
an opening in something especiallywith a sharp tool, and the tools used are
called cutting tools.Instrument used as cutting tools
These are some tools used in cutting.
1) Saw:
It is a tool that has a long blade with sharp point called teeth along one of
its edges. A saw is moved backwards and forwards by the hand or driven by
electricity, and is used in cutting wood or metal. There are also different
types, which include, hack saw, panel saw, circular saw, jigsaw, etc
2) Drill: A tool or machine with a pointe
end for making holes.
3)
Chisel: A tool with a sharp flat edge
at the end for shaping wood or metal.
How to
make a screw thread
Determine the tapping hole size/ drill hole
size
Fix your job on bench vice
Do the tapping
Then do the dieting.
DRIVING TOOLS
They are called driving tools
because of the work they are used to do; the driving tools are used to force in
materials. The major driving tool we have is the hammer.
Hammers:
It is a tool with a heavy metal on a long handle. A hammer is a tool meant to
deliver an impact to an object. The most common uses are for driving nails,
fitting parts, forging metal and breaking up objects. Hammers are often
designed for a specific purpose, and vary widely in their shape and structure.
The usual features are a handle and a head, with most of the weight in the
head. We have different types of hammer; which include:ball point.straight pin
and steel hammer
Loosening and tighting tools.
They are the tools used in tighting and
loosening a work piece if there is need to.
-
Spanner: It is a
metal tool that fits over a nut; used for turning the nut to make it tight or
to loosen it. We have different types of spanners; they’re identified by the
size and shape of the bolt head. We have ring spanner, flat spanner, combined
ring and flat spanner, box spanner, socket spanner, etc.
-
Allen Key:
It is a six-sided tool used as a driver for screws, bolts, and other fasteners
designed to fit the tool. The Allen key comes in several different shapes and
sizes, but the most typical shape for an Allen key is an L-shape. This allows
the user to take advantage of the wrench’s
reach — while using the longer arm of
the L-shape — or its torque capabilities while using the shorter arm of the
L-shape. Some Allen keys come with a ball end on the longer arm of the L-shape
to further aid in reach and allowing the wrench to be used at odd angles.
-
Screwdriver: It is a tool with a narrow blade at
one end that you use for turning screws; the most common ones are flat and
round mouth.
- Adjustable Spanner:
It is quite different from ordinary spanner. An adjustable spanner is a spanner
with a "jaw" of adjustable width, allowing it to be used with
different sizes of fastener head (nut, bolt, etc.) rather than just one
fastener, as with a conventional fixed spanner.
-
G-clamp: It is a type of clamp device typically
used to hold a wood or metal work piece, and are often used in, but are not
limited to, carpentry and welding. These clamps are called "C" clamps
because of their C shaped frame, but are otherwise often called G-clamps or
G-cramps below are gclamp spanner and bolt screw
Work Holding and work holding devices.
It deals with the aspect on how we how
the work piece.
- Bench Vice: It must
be bolted to a bench securely to work properly. It has two jaws that can be
cranked together to hold an object being worked on. Most often used in
automotive, hobbies, craft work etc.
- Machine vice: It is a
device used to hold a work piece when operating a milling machine or a drill
press. The machine vice is adjustable in many different ways, allowing the work
piece to be manipulated into any angle or position required.
- Jig: It is a type
of tool used to control the location or motion of another tool in metal works
and wood works. A jig's primary purpose is to provide repeatability, accuracy,
and interchangeability in the manufacturing of products.
AGRICULTURAL ENGINEERING LABORATORY.
Machine
tool
It is a
device which utilizes energy to deform a raw material to desired shape and
form. E.g. lathe machine, milling machine, shear machine, universal machine,
etc.
a) Lathe
machine: It
is used for producing flat, cylindrical, conical surface, for originating holes
with twist drills and to expand hole using boring tools, for cutting threads
and rods.it is the father of all machines.
Parts of a lathe.
-
Head stock: It
contains the mechanism of the machine electrical motor to the shaft called
spindle which rotates about an axis.
-
Bed: It
carries the saddle that moves left and right parallel to the bed, the cross
slide which moves in and out. It also carries a compound slide which moves at
an angle. It also carries a tool post which carries the tool for cutting.
-
Tall stock: For
supporting jaws when turning between center and for holding drills.
- Coolant:
For prevention against burning, corroding, etc. It
contains lubricating and cooling property.
- Spindle: The
main spindle is driven on a bearing which the rotary motion to the work piece.
In most cases, spindles are hollow so as to guide the back stock through.
-
Carriage:
It is mainly supports and carries the turning tool. The cross lamp is mounted
on the carriage which moves at right angles to the bed and fits the tool into the
work. This carriage travels along the bed in a longitudinal direction and cross
slide along the carriage moves in the cross direction.
Lathe machine
WORK
HOLDING TOOLS
It is method used in holding a
work piece in the workshop.
- 2-jaw chuck:
It is independent
and for holding square and rectangular metals.
-
3-jaw chuck: It is
self-centering and for holding round metals.
-
4-jaw chuck: It
is independent and for holding irregular metals.
-
Cullet plate: For
holding rough metals; it also used in automatic machine for mass production and
method of turning between center.
CUTTING
FLUID
. It is the fluid used during
cutting process
- It prevents corrosion
- It cools the work and cutting tool
- Saves time - Wash away chimps
Milling
machine:
It is used for making flat surfaces, cutting grooves, cutting spiral gear,
cutting rack and pinion, cutting drills.
It is of three types:
- Vertical milling machine
- Horizontal milling machine
- Universal milling machine: Consists of both
vertical and horizontal milling machine.
Power
sawing machine:
It consists of frame, table that carries the device operated electrically
Shaping machine: Used for rough removing
surface.cutting materials.
Shear machine: They are used for cutting sheet
metals. Types include: hand operated, leg operated and power operated shearing
machine.
Grinding
machine: It
is used in sharpening metals. Types include; hand, pedestal, cutter and tool
grinding machine.
Drilling machine: They use twist drill for
originating a hole or expanding a hole. Types include; hand, bench, pillar,
radial arm drilling machine.
Metal joining
It
deals with the joints in metals. There are mainly two methods used; temporary
and permanent joints.
- Temporary joints: It consists of bolt, nuts,
screw, etc.
- Permanent joints: Used to join metals that
you don’t want to disassemble, e.g. soldering, brazing, welding, etc.
Sequence of producing a soldering
joint
Soldering method
§ Clean the component surface to be joined either with
brush, file or emery cloth(sand cloth)
§ Apply a flux to the cleaned surface, this will
protect the surface from oxidation
§ Use a hot soldering iron to apply
a thin layer of iron to the surface you are soldering. This process is called
tinning.
§ Reflux the surface, apply heat
and pressure with soldering iron.
§ Allow the molten solder to
solidify and wash excessive flux.
§ Heat the soldering iron, clean
the bit with a file wire, and brush dipping the bit in flux separating a thin
layer over the dip surface. Zinc chloride usually called key spirit is the most
common flux used which is suitable with the mild steel and brass and tin plate
brass cubed and tin slay but it is corrosive, hence, there is need to wash away
excess flux after completion of this process. Basin method: when a joint
stronger than the joint of a solder is required, basin is used. It is called
the hard soldering. It is a process similar to soft soldering. The filer metal
is usually a copper zinc alloy and mixture with brass. Brass has a higher
melting point and can only be used for joining higher metals higher than brass
(e.g. Copper and steel).
Successful
basin will depend on:
Cleaned surface to be joined.
Used flux e.g. borax to remove
oxidation.
CIVIL ENGINEERING PROJECT.
The project work we did was to
adjust the elevation of some parts of the workshop where waste water from
outside come in and cause damage and secondly, the civil engineering students
were engaged in the construction of two waste water drainage where all the
waste water from the workshop either as sewage or rain water pass through.
The project was monitored by all the civil engineering lecturers
available also with the assistance of
Prof. J.Adeniyi of the mechanical engineering department. The project was
designed and measurements were taken and the work commenced, the vice
chancellor Prof. olarotimi Matthew Ajayi approved the equipment and the order
for the equipment to use in realization of the project.
The project was successfully completed and checked, below is a pictures of
the project work done by civil engineering students
.
conclusion
In conclusion, the projects were done and
students were getting ready to leave for a short break. We were commended by
the dean of college, head of department and the technologists all present for
our outstanding performance during the program.
The SWEP provided an avenue for us all
to express our skills and what we have learnt so far in civil engineering and
all other engineering discipline.
Subscribe to:
Posts (Atom)