Free Essay

Is 3440 Project Part 1

In:

Submitted By midtermmassacre
Words 1376
Pages 6
INTRODUCTION (Task 1)
First World Bank Savings and Loan (also referred to as “us”, “we”, “the company”, etc) has been investigating the use of a Linux-based infrastructure architecture. The task team has already made recommendations to evaluate and prototype this kind of set up. Key factors are cost of ownership, scalability, and reliability. Other factors that remain are maintaining confidentiality, integrity, and availability (the CIA triad), and ensuring stable, secure support of the over $100,000,000 in transactions completed annually. As a financial institution, we must also bear in mind compliance with the Gramm-Leach-Bliley Act (GLBA), as well as the Payment Card Industry Data Security Standard (PCI-DSS) since we process credit card transactions, and the Sarbanes-Oxely Act (SOX) as we are publically traded.
Regardless of all these factors, rough estimates indicate we can save close to $4,000,000 in licensing fees alone by moving to a Linux-based infrastructure. Despite the open source nature of Linux, we should be able to meet all of the technical, legal, and security needs for this transition.
TECHNICAL INFRASTRUCTURE NEEDS (Task 2) Thanks to the task team assigned to this project, an outline of what the network and routing needs has already been completed. The following services will be required to support:
• A database server o Recommended solution: DBMS MySQL
• A Web server o Recommended solution: Apache
• A file server o Recommended solution: Red Hat Enterprise/Samba
• An SMTP (Simple Mail Transfer Protocol) server o Recommended solution: hMail
• An LDAP (Lightweight Directory Access Protocol) server o Recommended solution: Apache Directory Server
DBMS MySQL: Oracle has several “best practice” recommendations for MySQL , including but not limited to: changing default settings, restricting use of privileged accounts, using dedicated administrative accounts (for administrative tasks only), enforcing strong password policies, encryption, and securing backups. Oracle provides a PDF overview of these and other best practices to ensure a secure environment. It is worth noting that this document also provides insight on how to comply with PCI-DSS, SOX, and other regulations. Firewalls as additional layers of protection are also suggested.
Apache: Much like Oracle, Apache lists basic security tips that can be used to strengthen your web server . Among these recommendations are maintaining updates and patches, methods to prevent DoS attacks, prevention of standard accounts from gaining root access, and other security methods. Again, the goal is to reset default settings. Apache keeps up to date with current HTTP standards.
Red Hat Enterprise/Samba: Red Hat is a popular Linux distro which requires no client licenses (compared to our current Windows environment!). Red Hat will also allow all of the current file-sharing needs for client computers running Windows. Red Hat touts the scalability of its software, as well as its support of Samba and NFS, making it a perfect solution for our network drives . Again, patching, changing default settings, and utilization of built-in tools and commands to prevent unauthorized connections are recommended by Samba’s website . Samba also recommends using a firewall to secure the file server (more on firewalls later). hMailServer: hMailServer 5 has built-in support for both SSL and TLS security protocols . Using an SSL certificate, we can encrypt the email traffic of our users. As another free open-source solution, hMail will further cut our costs. Its support of common email protocols (IMAP, SMTP, POP3), as well as the built-in anti-spam features make it a great solution for our email server .
LDAP in Apache: Apache supports the latest in LDAP protocol and is released under the Apache license. However, the OpenLDAP command is also available. Its security methods can follow the same used as Apache Web server (change defaults, restrict account access, etc) . Overall, the defense-in-depth methodology is highly recommended. The more layers of protection we have surrounding out network, the safer we will be. It would behoove us to set up a DMZ (de-militarized zone) to separate the web server from the public Internet. Each sever should also be separated by firewalls between them (the servers) and the internal network. Yet another firewall should be placed between the outermost DMZ and the public Internet. (All local user/client machines should also make use of their firewalls, however this policy is covered in other documentation.) A further layer of protection can be found in the utilization of an Intrusion Prevention Service (IPS) instead of an Intrusion Detection Service (IDS). As a company working with people’s finances, detection of potential attacks simply will not suffice. An IPS will aid in detection and prevention of potential attacks—the security team monitoring the IPS will be better able to maintain security. As many users often work from out of the building, whether they are working from home or on a business trip, it is recommended that users are unable to access the files share off-site without the use of a VPN connection and/or a remote desktop session. Even though a VPN will secure traffic to and from the host computer, if a user is not using a company-issue device, we cannot be certain of the security of that device. We do not own a user’s home desktop, and therefore cannot enforce security measures such as updating software, patching vulnerabilities, and preventing use of resources with an unresolved zero-day vulnerability (as we see with Flash often). Users without a company device who require access to internal data must connect to the VPN and then establish a remote session to their work computer. Lastly, while not 100% necessary, it is highly recommended that instructions on how to map network shares are not given to users, and that an approval process for remote desktop access be put in place. This leads to securing user access.

SECURING USER ACCOUNTS/ACCESS (Task 3) By far, the easiest and most efficient method of user account management is to create groups and give said groups access to specific items. For example, the payroll team at First World Bank Savings and Loan should be the only users with access to payroll-related items, such as the payroll database. A group called “payroll” can be created, and only user accounts added to that group would be able to view the payroll database (and any/all other resources linked to that group’s access). The same method goes for securing file shares. Each division should have their own share, unique to that group. A user in the payroll group can log into payroll computers and resources, but cannot, for example, map to the HR file share. (Group access would certainly allow us to set a user with access to multiple division resources, if necessary.) Another benefit of group-based access is the nested security of folders within each share. Basic logon and network drive access gives users the ability to view all folders at the root of their share, but they may not be able to actually open and access data in certain folders. This as-needed access method helps prevent internal mishaps. Standard user accounts will be given to everyone. Standard users are unable to install software or make certain changes without elevating to an administrative account. Since the IT team at First World Bank Savings and Loan maintains machines and software, users will find they very rarely require administrative access for anything. That being said, even the IT team should do daily work with standard accounts. However, each member (from the user support team to the network and systems administrators) should be given a second account with administrative (or root, if deemed necessary) access to use only when required. This prevents accidental issues, and individual accounts set up for each IT employee will aid in audits. Special permissions can be granted on an as-needed basis, and a policy for gaining those special permissions should be created (if not already in place). We understand that users may not enjoy needing to fill a form and have their supervisor give the okay for certain things, however this is not done to complicate anyone’s work. We should educate users on basic security policies (don’t share passwords, use strong passwords, etc) and help them understand that security will very often (if not always) trump ease of access.

Similar Documents

Premium Essay

The Pert Mustang: Case Study

...Case Studies 2: The Pert Mustang Question 1: Prepare the report that Roberts requested, assuming that the project will begin immediately. Assume 45 working days are available to complete the project, including transporting car to Detroit before the auto show begins. Your report should briefly discuss the aspects of the proposed new business, such as the competitive priorities that Roberts asked about. Answer: Roberts wants to restore her Mustang to mint condition or as close to mint condition as possible, and use it in sales and advertising and take it to auto shows to attract new business within 45 working days. From the activities’ estimate of times and tasks that need to be done, we identify that there are 22 activities involved in the process starting from order of materials to pull car to the Detroit Auto Show. A table containing the project activities, the time estimates, and the precedence relationship will be prepared, and a network diagram will be drawn to structure the immediate predecessor activities. The critical path activities will be identified to indicate that the project can be completed within 45 working days. RASAS is consists of three car dealerships and this venture into restoration business still can fit into its business. RASAS has noticed that there is a market for this new business because the public is growing interest in this restoration of vintage automobiles, and many people want to own a vintage auto. With RASAS’s knowledge and experience...

Words: 930 - Pages: 4

Free Essay

Ois 2340

...University of Utah David Eccles School of Business Department of Operations and Information Systems (OIS) OIS - 2340-001, BUSINESS STATISTICS Class Times: Tuesday & Thursdays 12:25 pm – 1:45 pm Spencer Fox Eccles Business Building (SFEBB) -160 Fall Semester 2013, Course Syllabus ------------------------------------------------- How we run this class: ------------------------------------------------- To prepare and understand this material, you are invited to participate in class (by asking questions), read the text as specified in the class schedule and do the assigned HW problems. ------------------------------------------------- You can also watch the class video lectures using the link below for review or missed class. ------------------------------------------------- https://eq.utah.edu/u/items/acebb864-436f-458e-9c57-9353d655ec7e/0/ ------------------------------------------------- These lectures will be recorded during fall semester 2013 and will be posted as they are made available by the campus media services. The text used is Business Statistics –a decision making approach, 4th custom edition for David Eccles School of business or 9th edition by David Groebner’ Business Statistics. ------------------------------------------------- ------------------------------------------------- You will also be given online chapter quizzes which can be accessed through the CIS (CANVAS) system (https://cis.utah.edu). These chapter quizzes (“take homes”)...

Words: 4784 - Pages: 20

Premium Essay

Strategic Management

...consists of Multiple choice questions & Short Notes type questions. Answer all the questions. Part one questions carry 1 mark each & Part two questions carry 5 marks each. MM.100 Part one: Multiple choices: 1. These are the plans formulated to achieve strategic goals. a. Tactical plans b. Strategic plans c. Operational plans d. Standing plans 2. This strategy facilities specialization by establishing a position of overall cost leadership, differentiation, or both, but only within a particular segment, in an entire market. a. Specific b. Focus c. Directive d. Differentiation 3. This plan basically defines the actions of major departments and other sub-units that are required in the execution of a strategic plan. a. Tactical plan b. Operational plan c. Single-use plan d. Long-term plan 4. This is a distinctive business or collection of related business, that can be managed relatively independent of other businesses within the organization a. Functional unit b. Department unit c. Organizational unit d. Strategic business unit 5. These strategic plans of the organization have a time-frame exceeding five years. a. Short-terms plans b. Single-use plans c. Long-term plans d. Intermediate plans IIBM Institute of Business Management Semester II Examination Papers 6. Operational plans are mainly oriented towards issues that usually have a time horizon of a. About five years b. 3 to 5 years c. 1 to 2 years d. One year or less 7. These refer to the determination of the purpose and the...

Words: 2798 - Pages: 12

Premium Essay

Ergwefgfnfhedsfghsedfgeasdfdsgvfdbvcxgesdgfd

...FIN200 Corporate Finance (2nd Term 2012-2013) Solution for Corporate Finance, Ross, Westerfield, and Jaffe, 9th edition CHAPTER 20 ISSUING SECURITIES TO THE PUBLIC Answers to Concepts Review and Critical Thinking Questions 1. A company’s internally generated cash flow provides a source of equity financing. For a profitable company, outside equity may never be needed. Debt issues are larger because large companies have the greatest access to public debt markets (small companies tend to borrow more from private lenders). Equity issuers are frequently small companies going public; such issues are often quite small. Additionally, to maintain a debt-equity ratio, a company must issue new bonds when the current bonds mature. From the previous question, economies of scale are part of the answer. Beyond this, debt issues are simply easier and less risky to sell from an investment bank’s perspective. The two main reasons are that very large amounts of debt securities can be sold to a relatively small number of buyers, particularly large institutional buyers such as pension funds and insurance companies, and debt securities are much easier to price. They are riskier and harder to market from an investment bank’s perspective. Yields on comparable bonds can usually be readily observed, so pricing a bond issue accurately is much less difficult. It is clear that the stock was sold too cheaply, so Eyetech had reason to be unhappy. No, but, in fairness, pricing the stock in such a situation...

Words: 4216 - Pages: 17

Premium Essay

Strategic Management

...consists of Multiple choice questions & Short Notes type questions. Answer all the questions. Part one questions carry 1 mark each & Part two questions carry 5 marks each. MM.100 Part one: Multiple choices: 1. These are the plans formulated to achieve strategic goals. a. Tactical plans b. Strategic plans c. Operational plans d. Standing plans 2. This strategy facilities specialization by establishing a position of overall cost leadership, differentiation, or both, but only within a particular segment, in an entire market. a. Specific b. Focus c. Directive d. Differentiation 3. This plan basically defines the actions of major departments and other sub-units that are required in the execution of a strategic plan. a. Tactical plan b. Operational plan c. Single-use plan d. Long-term plan 4. This is a distinctive business or collection of related business, that can be managed relatively independent of other businesses within the organization a. Functional unit b. Department unit c. Organizational unit d. Strategic business unit 5. These strategic plans of the organization have a time-frame exceeding five years. a. Short-terms plans b. Single-use plans c. Long-term plans d. Intermediate plans IIBM Institute of Business Management Semester II Examination Papers 6. Operational plans are mainly oriented towards issues that usually have a time horizon of a. About five years b. 3 to 5 years c. 1 to 2 years d. One year or less 7. These refer to the determination of the purpose and the...

Words: 2798 - Pages: 12

Premium Essay

Milk Processing Plant - Project Appraisal

...Milk Processing |   | 1. INTRODUCTION 1.1 The Pakistani dairy industry is contributing significantly to the country's economy, besides improving the health standard by increasing the nutrition value of the food. The value of output from Dairy Sector increased to Rs.5,00,510 million in 1994-95 from Rs.2,75,080 million in 1990 and is expected to reach the level of Rs. 8,50,000 million by the year 2000 A.D. 1.2 Pakistan occupies first position in the world having a total bovine population of 29.6 million compared to the world's total bovine population of 1420 million. As per 1992 livestock census, the country has about 16.0 million breedable cows and 13.4 million breedable buffaloes 1.3 There has been a major improvement in milk production which increased from 17 million tones in 1951 to 70.1 million tonnes in 1997 and the growth was maximum between 1980 and 1990. The present per capita availability of milk is 205 gms as against the PCMR recommendation of 250 gms. 1.4 Recognizing the importance of the sector, the notable programmes taken up are key village schemes, intensive cattle development projects, crossbreeding projects through bilateral assistance, operation flood program and technology mission by establishing National Dairy Development Board (NDDB). |   | 2. MILK PROCUREMENT AND PROCESSING The organized dairy sector (both cooperatives and private) is presently handling only 10-12 percent of total milk production in the country. The target and achievements of milk...

Words: 6187 - Pages: 25

Premium Essay

Cultural Competence

...groups, please discuss the following: ◦ What personal lessons did you take from yesterday’s training? ◦ What connection might they have to your becoming culturally competent with any special population? ALLIES CO-CREATING A CULTURE of RELATIONSHIP BUILDING VS. RELATIONSHIP DESTROYING  Multi-Layered  Ethnic Culture  Living Culture in an Organization  Living Culture in a System  Community Historical Culture COMPETENT CULTURE BROKERING Each layer of culture impacts the capacity of an individual, family, community and organization to change and heal. Developing a prACTice of paying attention to culture is a core competency of helping a change process. It is helpful to explore our own awareness of culture. 1. What cultures do I belong to? 2. What are the characteristics of these cultures? 3. How do my cultures impact my way being in the world? As we seek and value relationships and ACTivities that give our lives purpose and meaning, we become more interested in connections with people, places and things whose values and principles are in sync with our own. We seek values and a principle-based culture that encourages our creativity and success as individuals, families and communities and organizations. Cultural competence refers to an ability to interact effectively with people of different cultures, particularly in the context of human resources, nonprofit organizations human resources non-profit organizations and government...

Words: 5477 - Pages: 22

Premium Essay

Hr Practice

...HR PRACTICES OF WIPRO STUDENT UNDERTAKING This is to certify that we have completed the Project titled “H R P r a c t i c e s o f W I P R O ” under the guidance of Prof Sana Danani in partial fulfillment of the requirement for the award of degree of Bachelor of Management Studies at Rizvi College of Arts, Seience & commerce. This is an original piece of work & we have not submitted it earlier elsewhere. ROLL NO. 105 86 100 89 71 NAME: Jyoti Singh Atul kumar Pandey Muzaffar Shaikh Asim Qureshi Jangle Sanchit SIGN ACKNOWLEDGEMENT We would like to thank my Project Guide Prof. Sana Danani for her immense guidance, valuable help and the opportunity provided to us to complete the project under his guidance. I would like to thank all faculty members of Rizvi College of Arts, Science & Commerce for guiding and supporting me in the completion of project from time to time. Last but not the least, my gratitude to great almighty and my parents without whose concerned and devoted support the project would not have been the way it is today. ROLL NO. 105 86 100 89 71 NAME: Jyoti Singh Atul kumar Pandey Muzaffar Shaikh Asim Qureshi Jangle Sanchit SIGN SUBJECT PROFESSOR (Prof. Sana Danani) CO-ORDINATOR (Furkan Shaikh) CERTIFICATE This is to certify that the project titled “ HR p r a c t i c e s o f W I P R O ” is an academic work done by the following student submitted in the partial fulfillment of the requirement for the award of the degree of bachelor of management...

Words: 8695 - Pages: 35

Premium Essay

Case

...Sustainability 2010, 2, 3436-3448; doi:10.3390/su2113436 OPEN ACCESS sustainability ISSN 2071-1050 www.mdpi.com/journal/sustainability Review What is Sustainability? Tom Kuhlman 1,* and John Farrington 2 1 2 Agricultural Economics Research Institute, Wageningen University, P.O. Box 29703, 2502LS The Hague, The Netherlands Institute for Rural Research, Geography and Environment, University of Aberdeen, Elphinstone Road, Aberdeen AB24 3UF, Scotland, UK; E-Mail: j.farrington@abdn.ac.uk * Author to whom correspondence should be addressed; E-Mail: tom.kuhlman@wur.nl; Tel.: +31-70-3358-232; Fax: +31-70-3615-624. Received: 17 September 2010; in revised form: 15 October 2010 / Accepted: 19 October 2010 / Published: 1 November 2010 Abstract: Sustainability as a policy concept has its origin in the Brundtland Report of 1987. That document was concerned with the tension between the aspirations of mankind towards a better life on the one hand and the limitations imposed by nature on the other hand. In the course of time, the concept has been re-interpreted as encompassing three dimensions, namely social, economic and environmental. The paper argues that this change in meaning (a) obscures the real contradiction between the aims of welfare for all and environmental conservation; (b) risks diminishing the importance of the environmental dimension; and (c) separates social from economic aspects, which in reality are one and the same. It is proposed instead...

Words: 6817 - Pages: 28

Premium Essay

Thesis

...MARCH 19, 2012 Teens, Smartphones & Texting Texting volume is up while the frequency of voice calling is down. About one in four teens say they own smartphones. Amanda Lenhart Senior Research Specialist, Pew Internet Project Pew Research Center’s Internet & American Life Project 1615 L St., NW – Suite 700 Washington, D.C. 20036 Phone: 202-419-4500 http://pewinternet.org/Reports/2012/Teens-and-smartphones.aspx Summary of findings The volume of texting among teens has risen from 50 texts a day in 2009 to 60 texts for the median teen text user. Older teens, boys, and blacks are leading the increase. Texting is the dominant daily mode of communication between teens and all those with whom they communicate. The typical American teen is sending and receiving a greater number of texts than in 2009. Overall, 75% of all teens text. Here are the key findings about the role of texting in teens’ lives:   The median number of texts (i.e. the midpoint user in our sample) sent on a typical day by teens 12-17 rose from 50 in 2009 to 60 in 2011. Much of this increase occurred among older teens ages 14-17, who went from a median of 60 texts a day to a median of 100 two years later. Boys of all ages also increased their texting volume from a median of 30 texts daily in 2009 to 50 texts in 2011. Black teens showed an increase of a median of 60 texts per day to 80. Older girls remain the most enthusiastic texters, with a median of 100 texts a day in 2011, compared with 50 for boys...

Words: 11085 - Pages: 45

Premium Essay

Master of Business Adminstartion

...Business Communication Section B: Caselets (40 marks) This section consists of Caselets. Answer all the questions. Each caselet carries 20 marks. Detailed information should form the part of your answer (Word limit 200 to 250 words). Caselet 1 In mid-1984, Kartik, the general manager of Western Exports Ltd, Karachi, Pakistan was striving to implement a management information system. He was facing resistance from; his most senior supervisor Kartik wondered what he could do to overcome this resistance. Western Exports was an exporter of ladies’ cotton cloth garments. It was private company established from, his most senior supervisor Kartik wondered what he could do to overcome this resistance. Over the past 14 years, the exports of the company had grown from Rs. 0.71 million in 1972-73 to Rs. 59.76 million in 1984. Almost 90 percent of the exports went to the USA. It owned no manufacturing facility of any kind. It purchased cotton cloth from six different textile mills and had the cloth dyed and printed. This fabric was then passed on to 138 stitching subcontractors. The company had been expanding the product line over the years, and by 1983 it was exporting about one million garments in over 100 basic designs. The 100 designs were presented in range of fabric types, shades, designs and sizes. When seen in the context that the company got all these things done through subcontractors, the managerial control of the operations became quite challenging. ...

Words: 7592 - Pages: 31

Free Essay

The Fog Feast

...22–38. http://www.heldref.org/env.php. © Anthony A. Leiserowitz, Robert W. Kates, and Thomas M. Parris, 2005. © SVEN TORFINN—PANOS Do Global Attitudes and Behaviors Support Sustainable Development? By A NTHONY A. LEISEROWITZ, ROBERT W. K ATES, AND THOMAS M. PARRIS Many advocates of sustainable development recognize that a transition to global sustainability—meeting human needs and reducing hunger and poverty while maintaining the life-support systems of the planet—will require changes in human values, attitudes, and behaviors.1 A previous article in Environment described some of the values used to define or support sustainable development as well as key goals, indicators, and practices.2 Drawing on the few multinational and quasi-global-scale surveys that have been conducted,3 this article synthesizes and reviews what is currently known about global attitudes and behavior that will either support or discourage a global sustainability transition.4 (Table 1 on page 24 provides details about these surveys.) None of these surveys measured public attitudes toward “sustainable development” as a holistic concept. There is, however, a diverse range of empirical data related to many of the subcomponents of sustainable development: development and environment; the driving forces of population, affluence/poverty/consumerism, technology, and entitlement programs; and the gap between attitudes and behavior. Development Concerns for environment and development merged in the early concept of...

Words: 10704 - Pages: 43

Free Essay

Classified Employees Handbook Achieving Excellence Through Merit the Personnel Commission

...CLASSIFIED EMPLOYEES HANDBOOK THE PERSONNEL COMMISSION ACHIEVING EXCELLENCE THROUGH MERIT REVISED | JUNE 2011 TABLE OF CONTENTS PREFACE I THE LOS ANGELES UNIFIED SCHOOL DISTRICT The LAUSD’s Mission The School System Board of Education and Staff II THE BASICS FOR NEW EMPLOYEES Orientation Expectations and Guidelines Performance Appraisals Disciplinary Action Notification of Absences Use of Telephones and E-mail Change of Address and Telephone Number Accidents and Safety Personal Property Dress Standards for Employees Employee Organizations Credit Unions Charitable Contributions Political Activity Publications III IMPORTANT POLICIES Equal Employment Opportunity Statement Nondiscrimination Statement Ethics Policy Office of the Inspector General - Hot Line Whistleblower Protection Policy Health and Safety Policy Attendance Policy Drug, Alcohol and Tobacco-Free Workplace Policy Workplace Violence Prevention Policy Sexual Harassment Policy Confidentiality and Non-Retaliation Child Abuse Reporting Policy Fingerprint Policy …………………………………………..14 …………………………………………..14 …………………………………………..15 …………………………………………..16 …………………………………………..16 …………………………………………..16 …………………………………………..16 …………………………………………..17 …………………………………………..18 …………………………………………..18 …………………………………………..20 …………………………………………..20 …………………………………………..20 2 ……………………………………………5 ……………………………………………6 ……………………………………………6 ……………………………………………7 ……………………………………………8 ……………………………………………8 ……………………………………………9 ……………………………………………9 …………………………………………...

Words: 15281 - Pages: 62

Free Essay

To What Extent Has Pf Developed Acording to Dudley Seers

...int. j. remote sensing, 2001 , vol. 22, no. 17, 3435–3456 Quantifying processes of land-cover change by remote sensing: resettlement and rapid land-cover changes in south-eastern Zambia C. PETIT1*, T. SCUDDER2 and E. LAMBIN1 1 Department of Geography, Universite catholique de Louvain, place Louis ´ Pasteur, 3, B-1348 Louvain-La-Neuve, Belgium 2 California Institute of Technology, Division of the Humanities and Social Sciences, 228-77, Pasadena, California 91125, USA (Received 25 June 1999; in nal form 28 April 2000) Abstract. The objectives of this study are to quantify, based on remote sensing data, processes of land-cover change and to test a Markov-based model to generate short-term land-cover change projections in a region characterised by exceptionally high rates of change. The region of Lusitu, in the Southern Province of Zambia, has been a land-cover change ‘hot spot’ since the resettlement of 6000 people in the Lusitu area and the succession of several droughts. Land-cover changes were analysed on the basis of a temporal series of three multispectral SPOT images in three steps: (i) land-cover change detection was performed by combining the postclassi cation and image diVerencing techniques; (ii) the change detection results were examined in terms of proportion of land-cover classes, change trajectories and spatio-temporal patterns of change; (iii) the process of land-cover change was modelled by a Markov chain to predict land-cover distributions in the near future...

Words: 8693 - Pages: 35

Free Essay

Sleeping Hobby

...N w w w. s l e e p f o u n d a t i o n . o r g Table of Contents Preface .............................................................................................................................................................i PART ONE: Research Report ........................................................................................................................1 Introduction .............................................................................................................................................1 Physiological Patterns ........................................................................................................................2 Behavioral and Psychosocial Patterns................................................................................................2 Consequences of Poor Sleep in Adolescents .........................................................................................3 What Can Be Done ..................................................................................................................................4 Reference s.................................................................................................................................................7 PART TWO: Resource Guide.......................................................................................................................11 Pointers for Parents .............................................................................

Words: 10194 - Pages: 41