Free Essay

Cmn Writing Instructions

In:

Submitted By asif2
Words 313
Pages 2
Writing Instructions

Prepare a standard memo (approx. 1 to 1½ pages, single spaced) in response to the writing situation below and submit it in hard copy in class and as an electronic copy to the Turnitin link for Assignment #1 in your Assignments folder. For a review of memo format, refer to the style sheet posted to your Assignments folder.

Writing Situation

You are the Research Business Manager for Dalhousie University. One of the university’s scientists, Dr. Melinda Chen, has, as the Principal Investigator, signed the research contract (the “Research Contract Template” .pdf document found under “Preparation for Assignment #1” in the Assignment folder). The contract is between Dalhousie University and Company ABC.

Dr. Chen is an untenured Assistant Professor in a STEM discipline and is in the early stages of her academic career. She has received funding for this research project but has limited experience of legal agreements such as the one she has signed and she finds its language ambiguous and problematic. In other words, such is a specialist when it comes to her discipline but a layperson in terms of her understanding of legal language. Violating terms of the agreement could have serious consequences for Dr. Chen, however.

Dr. Chen has produced some interesting results from this funded research and would like to present the results at an upcoming academic conference. The conference takes place in four months. She has asked you to explain what she must do in order to be allowed to present at this conference and, perhaps, publish a paper summarizing her research in the conference proceedings. Review the contract with respect to publication and other related clauses. Consider the principles of easification and simplification, as well as other concepts discussed in the readings and in course lectures, and write a memo to Dr. Chen with a copy to the VP of Research explaining the requirements.

Similar Documents

Premium Essay

Simply Wooo

...UNDERGRADUATE CURRICULA AND FACULTY 2007 – 2011 Proposed 2009 – 2013 2 Requirements for the BBA degree: Foundation Courses 40-41 Credits Core Courses 45 Credits Departmental Requirement 24 Credits Minor 15 Credits Total variable requirement for Graduation 124-125 Credits Foundation Courses Communication Skills ENG 101 ENG 102 ENG 105* ENG 106 ENG 202 Listening and Speaking Skills English Reading Skills Business English Advanced English Skills Introduction to English Literature 40-41 Credits 9 3 3 3 3 3 * Prerequisite ENG 101 & 102 Note: students not exempted from ENG 101 and ENG 102 will have to take ENG 101, ENG 102 and ENG 105. Note: students exempted from ENG 101 and ENG 102 will have to take ENG 105, ENG 106, ENG 202 Computer Skills CIS 101* CSC 101** Fundamentals of Computer System Introduction to Computer Science 3 3 3 * For students without basic knowledge of computer **For students with basic knowledge of computer & mandatory for students with Major in subjects offered from the SECS Numeracy MAT 100* MAT 210* Basic University Mathematics 1 Basic University Mathematics 2 6 3 3 3 *MAT 100 and MAT 210 mandatory for SLAS majors(English, Media & Communication, Anthropology) other than Sociology MAT 101* MAT 211* MAT 102* MAT 212* Intermediate University Mathematics II Probability and Statistics Introduction to Linear Algebra & Calculus Probability & Statistics for Sc. & Engr. 3 3 3 3 **MAT 101and MAT 211 mandatory for...

Words: 16148 - Pages: 65

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558

Free Essay

International Trade

...6 août 2014 LOGISTIQUE ET ADMINISTRATION DU COMMERCE INTERNATIONAL François Soulet de Brugière 16 avenue de la Clairière 59650 Villeneuve d’Ascq Tél mobile : +33 (0)6.0779.0699 e-mail : fsoulet@leroymerlin.fr I. Le monde et sa diversité 21 I - A : Les perceptions du monde 21 I-A-1 / La perception de l’espace 21 I-A-2 / La perception du temps 22 I-A-3 / La perception de l'argent 23 I-A-4 / La perception du rapport à l'autre 23 I-A-5 / Les espaces économiques mondiaux, 23 I - B : Territoire national, territoire douanier et territoire fiscal 41 I-B-1 / La France : 83 territoires et possessions à ce jour : 41 I-B-2 / Le territoire fiscal communautaire 41 I-B-3 / Les principaux opérateurs du commerce extérieur 43 II. Etre présents sur les marchés étrangers 43 II - A : Les différentes formes de distribution 43 II-A-1 / Les trois formes de distribution 43 II-A-2 / Le transfert de savoir-faire 43 II-A-3 / 7 Critères capitaux de sélection d’un fournisseur 44 II-A-4 / Les possibilités de représentation commerciale à l'étranger 44 II-A-5 / L’entreprise conjointe (Joint Venture – JV) 44 II-A-6 / Les zones franches (Free Trade Zone) 45 II-A-7 / Le dispositif français d'aide à l'export en matière commerciale 45 II-A-8 / Les entreprises françaises et l’export 52 II-A-9 / Une esquisse...

Words: 49583 - Pages: 199

Premium Essay

Sql Quiz

...Emory University | Internetworking Technology Handbook | [Type the document subtitle] | | SAVIOUR EMMANUEL UDOBONG | [Pick the date] | [Type the abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet...

Words: 217433 - Pages: 870

Free Essay

Digital Image Processing

...Digital Image Processing: PIKS Inside, Third Edition. William K. Pratt Copyright © 2001 John Wiley & Sons, Inc. ISBNs: 0-471-37407-5 (Hardback); 0-471-22132-5 (Electronic) DIGITAL IMAGE PROCESSING DIGITAL IMAGE PROCESSING PIKS Inside Third Edition WILLIAM K. PRATT PixelSoft, Inc. Los Altos, California A Wiley-Interscience Publication JOHN WILEY & SONS, INC. New York • Chichester • Weinheim • Brisbane • Singapore • Toronto Designations used by companies to distinguish their products are often claimed as trademarks. In all instances where John Wiley & Sons, Inc., is aware of a claim, the product names appear in initial capital or all capital letters. Readers, however, should contact the appropriate companies for more complete information regarding trademarks and registration. Copyright  2001 by John Wiley and Sons, Inc., New York. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic or mechanical, including uploading, downloading, printing, decompiling, recording or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the Publisher. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 605 Third Avenue, New York, NY 10158-0012, (212) 850-6011, fax (212) 850-6008, E-Mail: PERMREQ @ WILEY.COM. This publication is designed...

Words: 173795 - Pages: 696

Free Essay

General

...THE STUDENT'S PRACTICAL DICTIONARY ; fNdkoq ; CONTAINING English words with English and Hindi Meanings and Pronunciation in Deva Nagri Character with an Appendix containing Familiar Foreign Words and Phrases and Abbreviations in Common use. FIFTEENTH EDITION Thoroughly Revised,Improved,Enlarged and Illustrated PRICE 3 RUPESS ALLAHABAD RAM NARAIN LAL PUBLISHER AND BOOKSELLER 1936 ISCII text of dictionary taken from from TDIL's ftp: anu.tdil.gov.in pub dict site I N 1.m I Pron 1.m a Det 1.ek, abatement N abbey N 1.kmF, GVtF, GVAv, mdApn, b A, 2.yAg, smAE ag jF vZmAlA kA Tm a"r tTA -vr, 2.tk mphlA kESpt pzq vA -tAv  , aback Adv 1.acAnk, ekAek, 2.pFC  abandon VT 1.CoX  nA, yAg  nA, yAgnA, tjnA, d d 2.EbnA aAj^ nA nOkrF CoXnA, apn kodrAcAr aAEd mCoX  nA,   d ,   nA d d abandoned A 1.CoXA h,aA, Enjn-TAn, 2.EbgXA h,aA, iEdy lolp, lMpV, drAcArF, aAvArA , , abandonment N 1.pZ yAg, sMpZ aAmosg,   EbSkl CoX  nA d , abate VI 1.km honA, GVnA, DFmA honA abate VT 1.km krnA, GVAnA, DFmA krnA, m@ym krnA, rok  nA, smA krnA d 1 1.IsAiyo kA mW, gz\ArA, kVF, mW, , , 2.mht  aADFn sADao kF mXlF k , abbot N 1.mht, mWDArF, mWAEDkArF abbreviate VT 1.km krnA, s" krnA, CoVA krnA, p sAr EnkAlnA abbreviation N 1.s" , GVAv, sAr, lG,!p, skt, p  2.sE" pd yAf, fNd yA pd kA lG!p ^ , abdicate VTI 1.-vQCA s CoXnA, yAg krnA, tjnA,   pd yAg krnA abdication N 1.pd yAg abdomen N 1.X, V, k"F, udr p p , abdominal A 1.udr sMbDF, V kA p abduct VI 1.BgA l jAnA, EnkAl l...

Words: 164153 - Pages: 657