...Geo Lab 3 (Pre-Lab Assignment) E1: 2010 Haiti Magnitude - 7.0 Depth - 13km Tectonic Plates Involved - North American & Caribbean Plates Plate Boundary Type - Transformed Building Codes in place? - No building codes available Estimated Financial Cost - 7.8 billion Fatalities (If any) - 100k - 316k E2: 2011 Tohuko Magnitude - 9.0 Depth - 30km Tectonic Plates Involved - Pacific and North American Plates Plate Boundary Type - Convergent Building Codes in place? - Stringet- they are more specific of the swaying of building during seismic events Estimated Financial Cost - 309 billion Fatalities (if any) - ~18k deaths Although both the Haiti (2010) and Tohuko (2011) earthquakes are a ear apart, they have many similarities when it comes to the cause of occurrence. The Haiti earthquake occurred due to a collision between the North American and Caribbean transformed tectonic plates whereas the Tohuko earthquake occurred due to a collision between the North American and Pacific convergent tectonic plates. The depth and magnitude of an earthquake are important to determine how strong the seismic waves of collision would be as the tectonic plates crash. Both of these earthquakes were later associated with geometry and fault types. For example, the 2010 Haiti incident was connected to the Leogane fault and the 2011 Tohuko one was related to the denotation of the P-Mod and J-Mod during the main shock of this earthquake. In Japan earthquakes are very common due to...
Words: 635 - Pages: 3
...MIS 301 Introduction to Information Technology Management FALL 2010 - Unique Numbers: 03905, 03910, 03915 Instructor tructorBin Gu – bin.gu@mccombs.utexas.edu Dr. Information, Risk, & Operations Management (IROM) Dept. Office CBA 5.228 Office Hours MW 4:00-5:00 pm or by appointment Qian Tang - qian.tang@phd.mccombs.utexas.edu Teaching Assistant CBA 1.308B Office TBD Office Hours Course Description Information technology (IT) has transformed all aspects of 21st century business and everyday life. New IT investments continue to be staggering. Worldwide, over $2.5 trillion is invested in IT. In the U.S., over 50% of capital expenditures are related to IT. Information systems influence business processes, organizational structures, and the ways people do business, work, and communicate. Emerging technologies have triggered new forms of organization and business process innovation; they have also impacted organizational structure, culture, politics, decision making, and society as a whole. IT is transforming how physical products are designed, how services are bundled with products, and how individuals interact with businesses and with other individuals. A silent transformation is occurring as more and more physical products use embedded IT to improve customer experience and product performance. The pervasiveness of IT is expanding global trade and changing how and where work is performed. It is vital that future managers—in every area of business—have a...
Words: 3229 - Pages: 13
...Journal of Research on Technology in Education, 2007, 40(1), xx–xxx In-Depth Analysis of the Felder-Silverman Learning Style Dimensions Vienna University of Technology, Austria Sabine Graf Silvia Rita Viola and Tommaso Leo Universita’ Politecnica delle Marche, Italy Athabasca University, Canada Kinshuk Abstract Learning styles are increasingly being incorporated into technology-enhanced learning. Appropriately, a great deal of recent research work is occurring in this area. As more information and details about learning styles becomes available, learning styles can be better accommodated and integrated into all aspects of educational technology. The aim of this paper is to analyse data about learning styles with respect to the Felder-Silverman learning style model (FSLSM) in order to provide a more detailed description of learning style dimensions. The analyses show the most representative characteristics of each learning style dimension as well as how representative these characteristics are. As a result, we provide additional information about the learning style dimensions of FSLSM. This information is especially important when learning styles are incorporated in technology-enhanced learning. (Keywords: learning styles, Felder-Silverman model, data mining, student modelling.) IntroDuctIon In recent years, educational researchers have focused more and more on various aspects of learning styles and how they can be considered in educational technology. Investigations...
Words: 6813 - Pages: 28
...QR Code Security Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl SBA Research Favoritenstrasse 16 AT-1040 Vienna, Austria [1stletterfirstname][lastname]@sba-research.org ABSTRACT This paper examines QR Codes and how they can be used to attack both human interaction and automated systems. As the encoded information is intended to be machine readable only, a human cannot distinguish between a valid and a maliciously manipulated QR code. While humans might fall for phishing attacks, automated readers are most likely vulnerable to SQL injections and command injections. Our contribution consists of an analysis of the QR Code as an attack vector, showing different attack strategies from the attackers point of view and exploring their possible consequences. Figure 2: QR Code cards, public transport vehicles, etc. Indeed, this mechanism has a vast number of potential applications [4, 1, 2, 13, 9]. For instance, the sports brand Umbro have embedded QR codes into the collars of England football shirts, sending fans to a secret website where prizes can be won. In this paper, we explore the structure and creation process of QR codes as well as potential attacks against or utilizing QR codes. We give an overview of the error correction capabilities and possible ways to alter both error correction data and payload in order to either modify or inject information into existing codes. Furthermore, we explore numerous...
Words: 4675 - Pages: 19
... angajaţii 7 1.9 Descrierea produselor şi a servicilor 8 1.9.1 Proiectarea şi realizarea paginilor web 8 1.9.2 Realizare designului pentru paginile create 8 1.9.3 Implementarea softwere 8 1.9.4 Mentenenţă softwere 8 1.10 Analiza mediului extern al firmei 9 1.11 Analiza PEST 10 1.11.1 Mediul Politic 10 1.11.2 Mediul Economie 11 1.11.3 Mediul Social 11 1.11.4 Mediul Tehnologic 11 1.12 Planul de marketing 11 1.12.1 Descrierea Pieţei 11 1.12.2 Segmentul de piaţă căruia ne adresăm 12 1.13 Concurenţa 12 1.14 Analiza SWOT 13 1.15 Strategia de marketing 14 1.15.1 Obiectivele de marketing 14 1.15.2 Mixul de marketing 15 1.16 Previziunea vânzărilor 17 1.17 Planul de management 18 1.17.1 Misiunea şi obiectivele generale 18 1.17.2 Planul operaţional 18 1.17.3 Riscurile associate ideii de afacere 19 2.1 Prezentarea situaţiei actuale a firmei 21 2.2 Prezentarea ipotezelor pe care se bazează previziunile 21 2.3 Prezentarea situaţiei previzionate 21 2.3.1 Fluxul de numerar 21 2.3.2 Factorii care influenţează fluxul de numerar 22 2.4 Bugetul de Cheltuieli 22 Prezentarea concluzilor……………………………………………………………………...………………………………………………… 23 INTRODUCERE SC Innovation SRL este o firmă din domeniul IT care are ca scop principal elaborarea unor programe pentru calculatoare care să fie de o preformanţă înaltă, realizarea paginilor web şi implementarea unui design potrivit şi util pentru...
Words: 7717 - Pages: 31
...performance. The selected articles are collected from the journal of occupational and organisational psychology, organization science and journal of business and industrial marketing, published no earlier than 2009 Contents RBUS2900 Article Review: “Trust and Team Performance” 2 I. Introduction 2 II. Research Design Characteristics 3 III. Summaries of the Three Articles 3 3.1. Article1: “The differential effect of team members’ trust on team performance: The mediation role of team cohesion” (Mach, Dolan & Tzafrir, 2010) 3 3.2. Article 2: “Getting everyone one board: The role of inspirational leadership in geographically dispersed teams” (Joshi, Lazarova & Liao, 2010) 5 3.3. Article 3: “Managerial trust and NPD performance: Team commitment and longevity as mediators” (Doyan, 2010) 6 IV. Critiques of the Three Articles 7 4.1. Article1: “The differential effect of team members’ trust on team performance: The mediation role of team cohesion” (Mach, Dolan & Tzafrir, 2010) 7 4.2. Article 2: “Getting everyone one board: The role of inspirational leadership in geographically dispersed teams” (Joshi, Lazarova & Liao, 2010) 8 4.3. Article 3: “Managerial trust and NPD performance: Team commitment and longevity as mediators” (Doyan, 2010) 9 V. Reference 12 VI. Appendix 13 RBUS2900 Article Review: “Trust and Team Performance” I. Introduction Enhancing employees’ performance is one of the first priorities that organisations are trying to achieve, in order to stay competitive...
Words: 5179 - Pages: 21
...To whom it may concern: I am hereby writing this letter to you to seek corporate sponsorship for the ICAR-Top Speed Modified Tour 2015 race season. Motorsports sponsorship can increase name awareness through visibility in the community, improve revenue, and employee morale. Sure, you will have your company’s name on the cars, but there are many other valuable benefits: * You get a sanctioning body that can help network and promote your business. * Provide exposure for your business. * Can be utilized to improve employee morale – it will definitely be fun for you and your employees to become involved in. Attached you will find our schedule for the 2014 season and the 2015 race season is in the works. Also you will find several pictures of the winners for the Top Speed ICAR Modified Tour. Currently we are seeking marketing partners for the 2015 and beyond. Enclosed is supporting documentation, including the history of ICAR. Please feel free to contact me further to discuss potential sponsorship opportunities and to learn more about its many benefits to you. Thank you, Dave Muzzillo ICAR-Top Speed Modified Tour 260-665-8889 About Motorsports Sponsorship | A company can benefit from motorsports sponsorship in many ways, such as: * Enhancing Image and Shaping Consumer Attitudes Companies are often looking to improve how they are perceived by a particular audience. One way of achieving this goal is by becoming affiliated with well-liked sports personalities...
Words: 2155 - Pages: 9
...younger brother Joebert and Eugine have never left my side and are very special. I also dedicate this research and special thanks to my many friends and church family who have supported me throughout the process. I dedicated also this research to my loving and sweetest girlfriend, Cristine Mercado for your love and encouragement, for the support and still by my side. I will always appreciate all they have done, especially Mr. Angle Kenneth Aspa for helping me develop my technology skills. I dedicate this work and give special thanks to my Professor Chef. Edwin T. Casila for many hours of teaching us and making me laugh always. ACKNOWLEDGEMENTS I wish to thank my classmate who were more than generous with their expertise and precious time. A special thanks to Ms Anzano , my Professor for his countless hours of reflecting, reading, encouraging, and most of all patience throughout the entire process. I would like to acknowledge and thank my school division for allowing me to conduct my research and providing any assistance requested. Special thanks goes to the members of staff Information Technology department for their continued support. Finally I would like to thank the beginning teacher, mentor-teacher, Chef Edwin Casila that assisted me with this project. Their excitement and willingness to provide feedback made the completion of this...
Words: 5360 - Pages: 22
...Running head: FIND THE WEB SITE FOR YOUR STATE’S HEALTH DEPARTMENT BHS 450, MOD 3 SLP Medicare and Medicaid Walter Konstantynowicz Touro University International Karen Johnson-Mills, Ph.D. 1. Find the Web site for your State’s health department. The following is a link to the Alaska, Health and Social Services web site: (Commissioner: Karleen Jackson) http://www.hss.state.ak.us/ 2. Summarize eligibility criteria for the Medicaid program in your state of residence. The state of Alaska has a 49 page document that covers the ELIGIBILTY CONDITIONS and REQUIREMENTS for Medicare within the state. In order to be eligible you must be: 1. Financially eligible using the methods and standards described in Parts B and C of this 49 page document. 2. Meet the applicable non-financial eligibility conditions. 3. Categorically needy: a. Categorically needy: i. Except as specified under items A.2.a (ii and iii), for AFDC-related individuals, meets the non-financial eligibility conditions of the AFDC program. ii. For SSI-related individuals, meets the non-financial criteria of the SSI program or more restrictive SSI –related categorically needy criteria iii. For financially eligible pregnant women, infants or children. iv. For financially eligible aged and disabled individuals covered under the 1902 Act, meets the non-financial criteria of section 1902 Act. b. For the medically needy, meets the non-financial...
Words: 925 - Pages: 4
...NET MasterPage Pagini de continut o interactiune cu clasa MasterPage o setare pagini master in mod dinamic o pagini master inlantuite SiteMap TreeView Menu ASP.NET AJAX Bibliografie: Matthew MacDonald, Mario Szpuszta: Pro ASP.NET 3.5 in C# 2008 – Second Edition Ioan Asiminoaei ASP.NET 17.03.2014 Pag.2/33 Master page ASP.NET defineste doua tipuri specializate de pagini: master page pagini de continut O pagina master este un template de pagina si poate contine orice combinatie de HTML, controale web si chiar cod. Master page pot include regiuni predefinite ce pot fi modificate ulterior : locul unde va fi plasat un continut. Fiecare pagina de continut (content page) referentiaza o singura pagina master si poate adauga continut in regiunile predefinte de aceasta. Exemplu Pagina master poate folosi controlul ContentPlaceHolder ce identifica regiunea din cadrul paginii unde poate fi adaugat continut. Un control ContentPlaceHolder poate fi definit in sectiunea si altul in sectiunea ce permite paginii obisnuite ce foloseste acest master page sa insereze continutul propriu. Untitled Page My Site Copyright © 2008. Pentru a folosi master page trebuie sa construim o pagina de continut ce are ca template aceasta pagina. Directiva Page contine atributul MasterPageFile. Vezi exemplul de mai jos. Ioan Asiminoaei ASP.NET 17.03.2014 Pag.3/33 Pagina definita mai sus nu poate contine elemente cum ar fi : , , si , aceasta va contine...
Words: 5114 - Pages: 21
...University Kathy Vest MOD 440 Strategic Planning 6/23/2011 Strategic Planning Concepts 2 Strategic Planning Concepts Organizations from all over the world have one thing in common: competition. In order for organizations to compete in today’s marketplace they have to have a plan of action or strategy. Strategic planning refers to a process which defines an organization’s plan to effectively allocate its available resources (Strategic Planning Performance, 2011). A strategic plan is not the same as a business plan. A business plan tells how and why the company’s products or services will garner revenues. A strategic plan identifies the objectives, goals, direction, and opportunities within an organization and how to go about executing them. Different Forms of Planning A strategic plan must be realistic, attainable, feasible, and flexible. A company’s strategy is the game plan management is using to stake out a market position, conduct its operations, attract and please customers, compete successfully, and achieve organizational objectives (Bethel College, 2005). Having a competitive advantage in the marketplace is crucial to an organization’s success. Just to create a strategic plan does not mean that all is complete, it is only the beginning. It cannot be treated as a “cure all” for an organization, but needs to be treated as a viable option for future operations. Strategic planning and long-range planning are sometimes used Strategic Planning Concepts 3 interchangeably...
Words: 1314 - Pages: 6
...Internet Value Chain Economics Gaining a deeper understanding of the Internet economy W hen considering the technological innovations of the past 50 years, the Internet is probably the one that has had the greatest impact on everyday life in developed economies. Nearly six out of 10 Americans now shop online and more than four out of 10 bank online. Twenty hours of video are uploaded to YouTube every minute, while 5 percent of all time online is spent on the social networking site, Facebook. The Internet has also changed the way in which businesses operate—today, 64 percent of C-level executives conduct six or more searches per day to locate business information. The Internet has been a source of great good—as evidenced by the role played by Internet-based mapping and communications in the relief effort following the recent Haiti earthquake. The Internet also has shown a negative side—more than 97 percent of all emails are spam, while more than 70 percent of Americans fear online identity theft and 57 percent feel that their personal privacy has been greatly diminished by the Internet.1 Behind these statistics and headlines, however, there remains a low level of understanding of how the Internet economy works. Who are the different players involved in the Internet, beyond the flagship names? How is the industry structured and how concentrated is it? How do players make money and how do revenues flow across the value chain? Is the industry attractive in terms of growth...
Words: 12241 - Pages: 49
...Extending the NATO Architecture Framework to Support Service Oriented Architectures Mr J Keefe – NATO AF Overview Dr I Bailey – SOA Views 23 May 2006 NATO NEC and the Decision Loop Understand Faster and better Cognitive Domain Knowledge Superiority Orient Information Domain Decide Better and faster Decision Superiority Decide Network Enabled Information Effects Capability Observe Act Superiority Superiority Physical Domain See first, more Act decisively NATO NEC will enable us to operate more effectively in the future strategic environment through the more efficient sharing and exploitation of information within the Alliance and with our coalition partners This will lead to better situational awareness across the board, facilitating improved decision-making, and bringing to bear the right military capabilities at the right time to achieve the desired military effect. Key Issues Clarity of vision Roadmap for change Dealing with complexity Legacy Environments – ‘stove-piped’ solutions Multiple Agencies New Technologies – SOA Information Assurance Multiple Customers Operators Operational planners Acquisition community Developers Framework and Methodology NAF Reality: Complexity of Defence Applications Reality: Complexity of Defence Applications inhibit agility inhibit agility Mainframe PC/NT apps Unix apps 3rd Party Interface AIS Reports Depository Banks Vendor Setup Budget ...
Words: 2809 - Pages: 12
...Chapter – 1 Introduction Virtually all businesses, most government agencies and many individuals now have web sites. The number of individuals and companies with internet access is expanding rapidly and all of these have graphical user browser. As a result businesses are enthusiastic about setting up facilities on the web for electronic commerce. But in real web and internet are vulnerable to compromises with various sorts. As business wake up to this reality, the demand for secure web services grows. There are two types of threats to the web services : 1.1 Passive attacks : It is eavesdropping on network traffic between browser and server and gaining access to information on a web site that is supposed to be restricted. 1.2 Active attack : It includes impersonating another user, altering messages in transit between client and server and altering information on a web site. In all distributed environment electronic mail is the most heavily used network based application. It is the only application that is widely used across all architecture and vendor platforms. Users expect to be able to and do, send mail to others who are connected directly or indirectly to the internet. PGP(Pretty Good Privacy) is an open-source freely available software for E-Mail security. It provides authentication through the use of digital signature, confidentiality through the use of symmetric block encryption, compression using the ZIP algorithm, E-Mail compatibility using...
Words: 27771 - Pages: 112
...rights reserved. No part of this publication may be reproduced or transmitted in any form, including photocopying or recording, without the written permission of the copyright holder, application for which should be made to the publisher at the above address. Such written permission must also be obtained before any part of this publication is stored in an information retrieval system of any kind. The information in this document is subject to change without notice and does not represent a commitment on the part of reFX Audio Software Inc. The software described by this document is subject to a License Agreement and may not be copied to any other media unless specifically allowed in the License Agreement. INTRODUCTION NEXUS2 User Manual 3 INTRODUCTION W elcome and thank your for purchasing NEXUS2. You are now the owner of a highquality product that includes a professional and comprehensive sound library and an easy-to-use but powerful patch management system. The demands placed on your computer’s CPU are surprisingly low. NEXUS2 is a sample-ROM based synthesizer (often called a “rompler”). This means that NEXUS2 accesses sampled waveforms from your hard disk to generate its sounds. Apart from the low demands on your CPU mentioned above, this method also has other benefits: It allowed us to sample several prohibitively expensive analog hardware devices and make these quality sounds available to you, the NEXUS2 user. Furthermore, the complex sound architecture in...
Words: 9726 - Pages: 39