...White Paper WHAT’S NEW WITH TIMEFINDER FOR EMC SYMMETRIX VMAX Applied Technology for traditional and virtual environments Abstract This white paper describes the latest EMC® TimeFinder ® features available for traditional and virtual environments running open systems and using Symmetrix VMAX™. Throughout this paper the basis for “traditional environments” will describe hard disk drive or thick device technologies, and the basis for “virtual environments” will describe virtually provisioned thin device environments. June 2011 Copyright © 2011 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate of its publication date. The information is subject to change without notice. The information in this publication is provided “as is.” EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. VMware is a registered trademark of VMware, Inc. All other trademarks used herein are the property of their respective owners. Part Number h8264 What’s New with TimeFinder for EMC Symmetrix VMAX 2 Table of Contents Executive summary .........................
Words: 5721 - Pages: 23
..."design" as much as possible. "If I'm at a meeting with manufacturing people, I'll say: 'How can we make the can feel colder, longer?'," he says as an example. "Or, 'How can we make the cup easier to hold?'" In other words, he talks about the benefits of smart design in a language to which those he's talking to can relate. Based on several recent brand redesigns—including the new Coke identity work that won the Grand Prix at the Cannes Lions awards program in June—and innovations such as an aluminum bottle and a new family of coolers, this surreptitious approach seems to be working. Butler leads a team of 60 designers—a mix of graphic and industrial designers, some poached from companies such as Apple (AAPL), Nike (NKE), MTV (VIA), Target (TGT), and Electrolux—at four centers around the world. All are focused on what Butler describes as a "fix the basics" strategy. The Old Simplicity Gone While there are few companies with a richer design heritage than Coca-Cola, in recent years the company seemed to...
Words: 1273 - Pages: 6
...Gene Marker Identification Targeting Toll-Like Receptor 4 (TLR4), Breast Cancer 1 (BRCA1), and Adenosine Triphosphatase 1 Alpha 1 (ATP1A1) Genes: Assessing Their Association With Subclinical Mastitis Cases in Dairy Water Buffaloes, Bubalus bubalis Thesis Proposal Cyndi Candelaria Biendima Patricia Malapit Cabatit Submitted to the Department of Biology College of Arts and Sciences University of the Philippines Manila Padre Faura, Ermita, Manila In partial fulfilment of the requirements for Undergraduate Thesis (BIO 200) TABLE OF CONTENTS Title Page1 Table of Contents2 Introduction3 Review of Related Literature6 Proposed Methodology14 Presentation of Results20 Literature Cited22 Line Item Budget26 Project Timeline27 1.0 INTRODUCTION 1.1 Background of the Study Cases of intramammary infections such as mastitis in water buffaloes contribute to large annual losses in milk production and net profit for smallholder farmers in the Philippines. Social and economic factors might prevent households from diagnosing, treating, and eliminating from circulation those animals or animal products, such as milk, that are afflicted with mastitis or which came from individuals afflicted with mastitis; this is especially true in the case of the asymptomatic subclinical mastitis, which tends to become chronic and difficult to eradicate by conventional antimicrobial therapies (Brouillette & Malouin, 2005; Ng et al., 2010). With the advent of technology...
Words: 7544 - Pages: 31
...Fourth Edition Financial & Managerial Accounting for MBAs Peter D. Easton Robert F. Halsey Mary Lea McAnally Al L. Hartgraves Wayne J. Morse Cambridge Business Publishers To my daughters, Joanne and Stacey —PDE To my wife Ellie and children, Grace and Christian —RFH To my husband Brittan and my children Loic, Cindy, Maclean, Quinn and Kay. —MLM To my wife Aline. —ALH To my family and students. —WJM Cambridge Business Publishers FINANCIAL & MANAGERIAL ACCOUNTING FOR MBAs, Fourth Edition, by Peter D. Easton, Robert F. Halsey, Mary Lea McAnally, Al L. Hartgraves, and Wayne J. Morse. COPYRIGHT © 2015 by Cambridge Business Publishers, LLC. Published by Cambridge Business Publishers, LLC. Exclusive rights by Cambridge Business Publishers, LLC for manufacture and export. ALL RIGHTS RESERVED. No part of this publication may be reproduced, distributed, or stored in a database or retrieval system in any form or by any means, without prior written consent of Cambridge Business Publishers, LLC, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Student Edition ISBN 978-1-61853-102-5 Bookstores & Faculty: to order this book, call 800-619-6473 or email customerservice@cambridgepub.com. Students: to order this book, please visit the book’s website and order directly online. Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 About the Authors ...
Words: 33010 - Pages: 133
...Fourth Edition Financial Statement Analysis & Valuation Peter D. Easton University of Notre Dame Mary Lea McAnally Texas A&M University Gregory A. Sommers Southern Methodist University Xiao-Jun Zhang University of California, Berkeley Cambridge Business Publishers To my daughters, Joanne and Stacey —PDE To my husband Brittan, and my children Loic, Maclean, Quinn and Kay —MLM To my wife Susan, and my children Christian, Peter and Philip —GAS To my wife Sharon, my daughter Jasmine, and my parents 滕惠清 and 张祥林 —XZ Financial Statement Analysis & Valuation, Fourth Edition, by Peter D. Easton, Mary Lea McAnally, Gregory A. Sommers, and Xiao-Jun Zhang. COPYRIGHT © 2015 by Cambridge Business Publishers, LLC. Published by Cambridge Business Publishers, LLC. Exclusive rights by Cambridge Business Publishers, LLC for manufacture and export. ALL RIGHTS RESERVED. No part of this publication may be reproduced, distributed, or stored in a database or retrieval system in any form or by any means, without prior written consent of Cambridge Business Publishers, LLC, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Student Edition ISBN 978-1-61853-104-9 Bookstores & Faculty: to order this book, call 800-619-6473 or email customerservice@cambridgepub.com. Students: to order this book, please visit the book’s Website and order directly online. Printed in...
Words: 28387 - Pages: 114
...FINANCIAL ANALYSIS PROJECT 1 CONTENTS INTRODUCTION...........................................................................................................................................4 VISION STATEMENT................................................................................................................................5 MISSION and OBJECTIVES.......................................................................................................................5 COMPANY SUMMARY................................................................................................................................6 OWNERSHIP....................................................................................................................................................6 ORGANIZATIONAL STRUCTURE..........................................................................................................7 HISTORY OF WAL-MART..........................................................................................................................8 INDUSTRY ANALYSIS.................................................................................................................................9 MARKETING ANALYSIS...........................................................................................................................10 MARKET SEGMENT.............................................................................................................................
Words: 12302 - Pages: 50
...SSCP Study Notes 1. Access Controls 2. Administration 3. Audit and Monitoring 4. Risk, Response, and Recovery 5. Cryptography 6. Data Communications 7. Malicious Code Modified version of original study guide by Vijayanand Banahatti (SSCP) Table of Content 1.0 ACCESS CONTROLS…………………………………………………………...... 03 2.0 ADMINISTRATION ……………………………………………………………... 07 3.0 AUDIT AND MONITORING…………………………………………………...... 13 4.0 RISK, RESPONSE, AND RECOVERY………………………………………....... 18 5.0 CRYPTOGRAPHY……………………………………………………………....... 21 6.0 DATA COMMUNICATIONS…………………………………………………...... 25 7.0 MALICIOUS CODE……………………………………………………………..... 31 REFERENCES………………………………………………………………………........ 33 1.0 ACCESS CONTROLS Access control objects: Any objects that need controlled access can be considered an access control object. Access control subjects: Any users, programs, and processes that request permission to objects are access control subjects. It is these access control subjects that must be identified, authenticated and authorized. Access control systems: Interface between access control objects and access control subjects. 1.1 Identification, Authentication, Authorization, Accounting 1.1.1 Identification and Authentication Techniques Identification works with authentication, and is defined as a process through which the identity of an object is ascertained. Identification takes place by using some form of authentication. Authentication Types Example Something you know...
Words: 17808 - Pages: 72
...Objectives Writing Questions and Objectives Using Bloom’s Taxonomy 57 Input and Modeling Implications of Short-Term Memory Research Implications of Long-Term Memory Research Presentation Skills: Verbal, Vocal, Visual Presentation Skills: Questioning 77 93 105 113 Guided Practice Cooperative Learning Learning Styles/Modalities: Multiple Intelligences 121 135 Independent Practice Differentiated Instruction Assessment 153 161 Closure 171 REFERENCES 177 1 2 3 4 5 6 Course Overview Lesson Planning • • • • • • • • • • • Class Schedule • Start Time • Lunch • Dismissal • Breaks Class Agenda: what topics are taught on what days Review Anticipatory Set Objectives Purpose Input and Modeling Check for Understanding Guided Practice Closure Independent Practice (Sousa, 2011) The instructor is given what to teach, and he/she chooses how to teach it. We intend not to overwhelm students with information, and we will learn why in later lessons on memory. 7 Reliable Sources • • • • Quick reference guides Training manuals Manufacturer’s website or customer service Coworkers, other Subject Matter Experts (SMEs) Instructor Notes • • • • • 8 4 or less main points (McArdle, 1993); 5-9 chunks or individual pieces of information (Woolfolk, 2001; M. L. Tate, personal communication, 2007) Cues rather than whole sentences (McArdle,...
Words: 11421 - Pages: 46
...4,607 11,084 74 92,301 stores millions of euros in sales countries with sales presence employees A nnual Report 2009 6 14 16 Global Reporting Initiative Indicators Letter from the Chairman Inditex business model 18 IP 53 IC 54 Inditex Commitment 163 Inditex Performance 20 26 28 46 Summary of 2009 financial year Milestones for the year Commercial concepts International presence 56 66 124 136 Customers, shareholders and society Corporate Social Responsibility Human Resources Environmental dimension 4 Inditex Annual Report 2009 164 LD 309 Legal Documentation 167 233 296 303 Economic and financial report Corporate governance report Activities Report Audit and Control Committee Activities Report Nomination And Remuneration Committee 308 Verification of the audit of GRI indicators 5 G lobal Reporting Initiative Indicators in 2002. Using this guide, Inditex With transparency as the fundamental principle in its relationship with society, Inditex has followed the Global Reporting Initiative indicators since it published its first Sustainability Report attempts to provide detailed, organised access to the information on its activity to all its stakeholders. Within the general indicators, specific indicators for the textile and footwear sector have been included, identified in the following way: Specific indicator for the sector Specific indicator comment for the sector 6 Inditex Annual Report...
Words: 42810 - Pages: 172
...Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen 6336 Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany Richard Hull Jan Mendling Stefan Tai (Eds.) Business Process Management 8th International Conference, BPM 2010 Hoboken, NJ, USA, September 13-16, 2010 Proceedings 13 Volume Editors Richard Hull IBM Research, Thomas J. Watson Research Center 19 Skyline Drive, Hawthorne, NY 10532, USA E-mail: hull@us.ibm.com Jan Mendling Humboldt-Universität zu Berlin, Institut für Wirtschaftsinformatik Unter den Linden 6, 10099 Berlin, Germany E-mail: contact@mendling.com Stefan Tai Karlsruhe Institute of...
Words: 147474 - Pages: 590
...J.C. Penney’s Real Problem: The Shrinking Middle Class * Rita McGrath April 12, 2013 Ron Johnson’s office seat has barely cooled off following his departure as business observers everywhere dissect what went so dreadfully wrong at J.C. Penney. The former Apple executive was too Silicon Valley for the Plano, Texas, retailer. He was arrogant. He didn’t test his ideas, maintaining the Apple mantra that customers don’t know what they want until you show it to them. He approved marketing campaigns that told loyal Penney’s shoppers that “you deserve to look better,” basically telling them that they looked less than glamorous wearing the brand they had trusted and been comfortable with for years. He hoarded information so that individual store merchandisers didn’t know how various lines were performing. He mocked J.C. Penney’s ways of doing things. He abandoned the discounting customers had come to expect from retailers. And he, and most of the team he recruited, were commuter leaders, jetting back to California after cramming in marathon work sessions at headquarters. These factors certainly couldn’t have helped. I think, however, there’s one major reason behind J.C. Penney’s sudden swoon that not enough commentators are picking up on. There’s one big reason JCP would never be “Bloomingdale’s for the mass market,” as Johnson wanted it to be, and that’s because the mass market is gone. Because the middle class is gone, or at least rapidly going. This reflects a troubling development...
Words: 8818 - Pages: 36
...Standard 1: A school administrator is an educational leader who promotes the success of all students by facilitating the development, articulation, implementation, and stewardship of a vision of learning that is shared and supported by the school community. The effective administrator: 1.1 Uses research about best professional practice. Cooperative Learning "Cooperative learning is the instructional use of small groups so that students work together to maximize their own and each other's learning." WHAT IS IT? Cooperative learning is a successful teaching strategy in which small teams, each with students of different levels of ability, use a variety of learning activities to improve their understanding of a subject. Each member of a team is responsible not only for learning what is taught but also for helping teammates learn, thus creating an atmosphere of achievement. WHY USE IT? Documented results include improved academic achievement, improved behavior and attendance, increased self-confidence and motivation, and increased liking of school and classmates. Cooperative learning is also relatively easy to implement and is inexpensive. HOW DOES IT WORK? Here are some typical strategies that can be used with any subject, in almost any grade, and without a special curriculum: Group Investigations are structured to emphasize higher-order thinking skills such as analysis and evaluation. Students work to produce a group project, which they may have a hand...
Words: 52057 - Pages: 209
... What Is an Ethical Hacker? 3. Summary 4. Exam Essentials 5. Review Questions 4. Chapter 2: System Fundamentals 1. Exploring Network Topologies 2. Working with the Open Systems Interconnection Model 3. Dissecting the TCP/IP Suite 4. IP Subnetting 5. Hexadecimal vs. Binary 6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions 8. Chapter 6: Enumeration of Services 3 1. A Quick Review 2. What Is Enumeration? 3. Windows Basics 4. Enumeration with...
Words: 71242 - Pages: 285
...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...
Words: 125224 - Pages: 501
...A ∑ E= mc 2 This eBook is provided by www.PlentyofeBooks.net Plenty of eBooks is a blog with an aim of helping people, especially students, who cannot afford to buy some costly books from the market. For more Free eBooks and educational material visit www.PlentyofeBooks.net Uploaded By Bhavesh Pamecha (samsexy98) 1 INFLUENCE The Psychology of Persuasion ROBERT B. CIALDINI PH.D. This book is dedicated to Chris, who glows in his father’s eye Contents Introduction 1 Weapons of Influence 2 Reciprocation: The Old Give and Take…and Take 3 Commitment and Consistency: Hobgoblins of the Mind 4 Social Proof: Truths Are Us 5 Liking: The Friendly Thief 6 Authority: Directed Deference 7 Scarcity: The Rule of the Few Epilogue Instant Influence: Primitive Consent for an Automatic Age Notes Bibliography Index Acknowledgments About the Author Cover Copyright About the Publisher v 1 13 43 87 126 157 178 205 211 225 241 INTRODUCTION I can admit it freely now. All my life I’ve been a patsy. For as long as I can recall, I’ve been an easy mark for the pitches of peddlers, fundraisers, and operators of one sort or another. True, only some of these people have had dishonorable motives. The others—representatives of certain charitable agencies, for instance—have had the best of intentions. No matter. With personally disquieting frequency, I have always found myself in possession of unwanted magazine subscriptions or tickets to the sanitation workers’ ball. Probably...
Words: 111279 - Pages: 446