A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster

Size: px
Start display at page:

Download "A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster"

Transcription

1 A Solution to the Network Chllenges of Dt Recovery in Ersure-coded Distributed Storge Systems: A Study on the Fcebook Wrehouse Cluster K V Rshmi, Nihr Shh, D Gu, H Kung, D Borthkur, K Rmchndrn

2 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO

3 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO

4 Need for Redundnt Storge Frequent unvilbility in dt- centers commodity components fil frequently solwre glitches, mintennce shutdowns, power filures Redundncy gives more relibility nd vilbility

5 Populr pproch: Replicon Mulple copies of dt cross mchines Eg, GFS, HDFS store 3 replics by defult block 1 block 2 block 3 block 4 b b Typiclly stored cross different rcks, b: dt blocks

6 Petbyte Scle dt: Replicon expensive Modertely sized dt: storge is chep replicon vible Mulple tens of PBs ggregte storge no longer chep replicon is expensive

7 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x

8 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures

9 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures

10 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures

11 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: tolertes ny one filure tolertes ny two filures

12 Ersure Codes Repliction Reed-Solomon (RS) code block 1 block 1 dt blocks block 2 block 2 b block 3 b block 3 +b prity blocks block 4 b block 4 +2b Redundncy 2x 2x First order comprison: In generl: tolertes ny one filure lower MTTDL, high storge requirement tolertes ny two filures order of mgnitude higher MTTDL with much lesser storge

13 Ersure Codes Using RS codes insted of 3- replicon on less- frequently ccessed dt hs led to svings of mulple Petbytes in the Fcebook Wrehouse cluster

14 Reed- Solomon (RS) Codes (#dt, #prity) RS code: tolertes filure of ny #prity blocks these (#dt + #prity) blocks constute stripe Fcebook wrehouse cluster uses (10, 4) RS code Exmple: (2, 2) RS code b +b +2b #dt = 2 (dt blocks) #prity = 2 (prity blocks) 4 blocks in stripe

15 Why RS codes? Mximum possible fult- tolernce for storge overhed storge- cpcity opml mximum- distnce- seprble (MDS) (in coding theory prlnce) Flexibility in choice of prmeters Supports ny #dt nd #prity

16 Why RS codes? Mximum possible fult- tolernce for storge overhed storge- cpcity opml mximum- distnce- seprble (MDS) (in coding theory prlnce) Flexibility in choice of prmeters Supports ny #dt nd #prity However result in incresed downlod nd disk IO during dt recovery

17 Dt Recovery: Incresed downlod & disk IO Repliction block 1 block 2 block 3 b Downlod & IO 1x block 4 b

18 Dt Recovery: Incresed downlod & disk IO Repliction Reed-Solomon code block 1 block 2 block 3 b Downlod & IO 1x block 1 block 2 block 3 b +b b +b Downlod & IO 2x block 4 b block 4 +2b

19 Dt Recovery: Incresed downlod & disk IO Repliction Reed-Solomon code block 1 block 2 block 3 b Downlod & IO 1x block 1 block 2 block 3 b +b b +b Downlod & IO 2x block 4 b block 4 +2b In generl Downlod & IO required = #dt x (size of dt to be recovered)

20 Dt Recovery: Burden on TOR switches AS/Router TOR TOR TOR TOR b + + b 2b node 1 node 2 node 3 node 4 Burdens the lredy oversubscribed Top- of- Rck nd higher level switches

21 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO

22 Brief System Descripon HDFS cluster with mulple thousnds of nodes Mulple tens of PBs nd growing Dt immutble unl deleted Reducing storge requirements is of high importnce

23 Brief System Descripon HDFS cluster with mulple thousnds of nodes Mulple tens of PBs nd growing Dt immutble unl deleted Reducing storge requirements is of high importnce Uses (10, 4) RS code to reduce storge requirements on less- frequently ccessed dt Mulple PBs of RS coded dt

24 Brief System Descripon 256 Mbytes dt blocks block 1 block 2 block 10

25 Brief System Descripon dt blocks block 1 block 2 block 10 1 byte 256 Mbytes prity blocks block 11 block 14

26 Mchine Unvilbility Events From HDFS Nme- Node logs Logged when no hert- bet for > 15min Blocks mrked unvilble, periodic recovery process #mchine-unvilbility events logged" Dy" Medin of 50 mchine- unvilbility events logged per dy

27 Missing blocks per stripe # blocks missing in stripe % of stripes with missing blocks x x 10-9 Dominnt scenrio: Single block recovery

28 #Blocks Recovered & Cross- rck Trnsfers Medin of 180 TB trnsferred cross rcks per dy for recovery operons Around 5 mes tht under 3- replicon

29 Outline Introducon: Ersure coding in dt centers Low storge, high fult- tolernce High downlod & disk IO during recovery Mesurements from Fcebook wrehouse cluster in producon Proposed lternve: Piggybcked- RS codes Sme storge overhed & fult tolernce 30% reducon in downlod & disk IO

30 Piggybcking: Toy Exmple Step 1: Tke (2, 2) Reed- Solomon code dt blocks block 1 block b 1 b 2 prity blocks block 3 block b 1 +b 2 b 1 +2b 2 1 byte 1 byte

31 Piggybcking: Toy Exmple (In (2,2) RS code: recovery downlod & IO = 4 bytes) block 1 1 b 1 2 b b 1 +b 2 block 2 2 b 2 block b 1 +b 2 block b 1 +2b 2

32 Piggybcking: Toy Exmple Step 2: Add piggybcks to prity nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b No ddionl storge!

33 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b 2 + 1

34 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b

35 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 1 b 1 block 2 2 b 2 block b 1 +b 2 block b 1 +2b subtrct 1 2

36 Fult- Tolernce (toy exmple) Sme fult tolernce s RS code: cn tolerte filure of ny 2 nodes block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b b 1 b 2

37 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) block 1 block 2 block 3 block b 1 b 2 b 1 +b 2 b 1 +2b 2 + 1

38 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) b 2 block 1 1 b 1 b 1 +b 2 block 2 2 b 2 b 1 +2b block b 1 +b 2 block b 1 +2b 2 + 1

39 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) b 2 subtrct block 1 1 b 1 b 1 +b 2 block 2 2 b 2 b 1 +2b block b 1 +b 2 block b 1 +2b 2 + 1

40 Recovery (toy exmple) Downlod & IO only 3 bytes (insted of 4 bytes s in RS) b 2 block 1 1 b 1 b 1 +b 2 block 2 block b 2 b 1 +b 2 b 1 +2b subtrct block b 1 +2b 2 + 1

41 Generl Piggybcking Recipe To construct Piggybcked- RS code: Step 1: Tke RS code with idencl prmeters Step 2: Add crefully designed funcons from one byte stripe on to nother retins sme fult- tolernce nd storge overhed piggybck funcons designed to reduce mount of downlod nd IO for recovery Generl theory nd lgorithms: KV Rshmi, Nihr Shh, K Rmchndrn, A Piggybcking Design Frmework for Red-nd Downlod-efficient Distributed Storge Codes, in IEEE Interntionl Symposium on Informtion Theory (ISIT) 2013

42 (10,4) Piggybcked- RS lternve to (10,4) RS currently used in HDFS

43 (10,4) Piggybcked- RS code Step 1: Tke (10, 4) Reed- Solomon code block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) f 3 (b 1,,b 10 ) f 4 (b 1,,b 10 ) 1 byte 1 byte

44 (10,4) Piggybcked- RS code Step 2: Add `Piggybcks block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) 1 byte 1 byte

45 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0)

46 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) recover 1,, 10 like in RS

47 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) recover 1,, 10 like in RS

48 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block 14 recover 1,, 10 like in RS 1 10 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 1 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 1 (0,,0, 4, 5, 6,0,,0) subtrct piggybcks (funcons of 1,, 10 ) f 4 (b 1,,b 10 ) + f 1 (0,,0, 7, 8, 9,0)

49 (10,4) Piggybcked- RS code Tolertes ny 4 block filures block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 1 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 1 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 1 (0,,0, 7, 8, 9,0) recover 1,, 10 like in RS subtrct piggybcks (funcons of 1,, 10 ) recover b 1,,b 10 like in RS

50 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 block 13 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) block 14 f 4 ( 1,, 10 ) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0)

51 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0)

52 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS

53 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS

54 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 )

55 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 )

56 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 1 b 1 block 2 2 b 2 block 3 3 b 3 block b 10 block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 ) remove effect of 2 nd 3 to get 1

57 (10,4) Piggybcked- RS code block 1 1 b 1 block 2 2 b 2 Downlod & IO: block 3 3 b 3 block in RS 10 b in Piggybcked- RS block 11 block 12 f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 1 ( 1, 2, 3,0,,0) recover b 1,,b 10 like in RS subtrct f 2 (b 1,,b 10 ) remove effect of 2 nd 3 to get 1

58 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of blocks 1,2,3

59 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of blocks 4,5,6

60 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of blocks 7,8,9

61 (10,4) Piggybcked- RS code Efficient dt- recovery block 1 block 10 block 11 block 12 block 13 block f 1 ( 1,, 10 ) f 2 ( 1,, 10 ) f 3 ( 1,, 10 ) f 4 ( 1,, 10 ) b 1 b 10 f 1 (b 1,,b 10 ) f 2 (b 1,,b 10 ) + f 4 ( 1, 2, 3,0,,0) f 3 (b 1,,b 10 ) + f 4 (0,,0, 4, 5, 6,0,,0) f 4 (b 1,,b 10 ) + f 4 (0,,0, 7, 8, 9,0) Repir of block 10

62 Expected Performnce Storge efficiency nd relibility no ddionl storge vs RS sme fult- tolernce vs RS

63 Expected Performnce Storge efficiency nd relibility no ddionl storge vs RS sme fult- tolernce vs RS Reduced recovery downlod & disk IO 30% less for single block recoveries in stripe potenl reducon >50TB cross- rck trffic per dy

64 Expected Performnce Storge efficiency nd relibility no ddionl storge vs RS sme fult- tolernce vs RS Reduced recovery downlod & disk IO 30% less for single block recoveries in stripe potenl reducon >50TB cross- rck trffic per dy Recovery me: expect fster recovery need to connect to more nodes system limited by disk nd network bndwidth corroborted by preliminry experiments hence, expect higher MTTDL

65 Relted Work: Mesurements Exisng Studies Avilbility studies: Schroeder & Gibson 2007, Jing et l 2008, Ford et l 2010 etc Comprisons between replicon nd ersure codes: Rodrigues & Liskov 2005, Wetherspoon & Kubitowicz 2002 etc Our focus Incresed network trffic due to incresed downlods during recovery of ersure- coded dt Mesurements from Fcebook wrehouse cluster in producon

66 Relted Work: Codes for Efficient Dt Recovery Hung et l (Windows Azure) 2012, Sthimoorthy et l (Xorbs) 2013 dd ddionl pries: need extr storge Hu et l (NCFS) 2011 Network file system using repir- by- trnsfer codes (Shh et l): need extr storge Khn et l (Rotted- RS) 2012 #prity 3 (lso, #dt 36) Xing et l, Wng et l (Opmized RDP & EVENODD) 2010 #prity <=2 Our solu;on: Piggybcked- RS no ddionl storge: storge- cpcity opml ny #dt & #prity s good s or bezer thn Rotted- RS, opmized RDP & EVENODD

67 Summry nd Future Work Ersure codes require higher downlod & IO for recovery Mesurements from Fcebook wrehouse cluster in producon Piggybcked- RS: lternve to RS no ddionl storge required; sme fult- tolernce s RS 30% reducon in downlod & disk IO for recovery Future Work implementon in HDFS (in progress t UC Berkeley) empiricl evluon

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster

A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster K. V. Rashmi 1, Nihar B. Shah 1, Dikang Gu 2, Hairong Kuang

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Comp anies. Innova,ve. Promotion. a w n

Comp anies. Innova,ve. Promotion. a w n Innov,ve Comp nies & Cloud u,ng Ake Edlund, PhD Project leder t KTH Cloud projects CEO Pwn Promo=on Cloud strtegies Strtup Evngelist Numeri, MySQL Cluster, Cycore SeOng the stge First: Wht is cloud compu=ng?

More information

Humana Critical Illness/Cancer

Humana Critical Illness/Cancer Humn Criticl Illness/Cncer Criticl illness/cncer voluntry coverges py benefits however you wnt With our criticl illness nd cncer plns, you'll receive benefit fter serious illness or condition such s hert

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

The Velocity Factor of an Insulated Two-Wire Transmission Line

The Velocity Factor of an Insulated Two-Wire Transmission Line The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A

Agenda. Who are we? Agenda. Cloud Computing in Everyday Life. Who are we? What is Cloud Computing? Drivers and Adoption Enabling Technologies Q & A Agend Who re we? Wht is Cloud Computing? Drivers nd Adoption Enbling Technologies Cloud Computing in Everydy Life Joe Wong Senior Development Mnger, ICS, IBM Kit Yeung Advisory Softwre Engineer, ICS, IBM

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

SCRIBE: A large-scale and decentralized application-level multicast infrastructure

SCRIBE: A large-scale and decentralized application-level multicast infrastructure !! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec

More information

FortiClient (Mac OS X) Release Notes VERSION 5.0.10

FortiClient (Mac OS X) Release Notes VERSION 5.0.10 FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors

Data quality issues for accounting information systems implementation: Systems, stakeholders, and organizational factors Journl of Technology Reserch Dt qulity issues for ccounting informtion systems implementtion: Systems, stkeholders, nd orgniztionl fctors ABSTRACT Hongjing Xu Butler University Qulity informtion is one

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Scalable Mining of Large Disk-based Graph Databases

Scalable Mining of Large Disk-based Graph Databases Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Human Pedigrees. Independent Assortment. Mendel s Second Law. Independent Assortment Test Cross. 4 phenotypes. Pedigree analysis:

Human Pedigrees. Independent Assortment. Mendel s Second Law. Independent Assortment Test Cross. 4 phenotypes. Pedigree analysis: Biology 2250 rinciples of Genetics nnouncements B2250 edings nd roblems Lb 3 Informtion: B2250 (Innes) webpge downlod nd print before lb. Virtul fly: log in nd prctice http://biologylb.wlonline.com/ Ch.

More information

trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007

trademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007 trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.

More information

The CUBE. Thunderbolt and PCIe Expansion

The CUBE. Thunderbolt and PCIe Expansion Trnsform lptop in worksttion in The CUBE TM TM TM Thunderbolt PCIe Expnsion The CUBE mcube re trdemrks of One Stop Systems, Inc. All rights reserved. PCI Express PCIe re trdemrks of PCI-SIG. Thunderbolt

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

File Storage Guidelines Intended Usage

File Storage Guidelines Intended Usage Storge 1 Google Cloud 2 Other cloud storge Exmple or Box, Dropbox, Crbonite, idrive File Storge Guidelines Usge Fculty nd student collbortion Specil use cses. When non-lcc employee nd students need ccess

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Abusfian Elgelany, Nader Nada Sudan University, Khartoum, Sudan, Fatih University, Istanbul,Turkey

Abusfian Elgelany, Nader Nada Sudan University, Khartoum, Sudan, Fatih University, Istanbul,Turkey IN: 2277-3754 Interntionl Journl of Engineering nd Innovtive Technology (IJEIT) Energy Efficiency for Dt Center nd Cloud Computing: A Literture Review Abusfin Elgelny, Nder Nd udn University, Khrtoum,

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

STRM Log Manager Installation Guide

STRM Log Manager Installation Guide Security Thret Response Mnger Relese 2012.0 Juniper Networks, Inc. 1194 North Mthild Avenue Sunnyvle, CA 94089 USA 408-745-2000 www.juniper.net Pulished: 2012-09-12 Copyright Notice Copyright 2012 Juniper

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t [email protected] nd t [email protected] Or visit our

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Lectures 8 and 9 1 Rectangular waveguides

Lectures 8 and 9 1 Rectangular waveguides 1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

A generic Decision Support System for integrated weed management

A generic Decision Support System for integrated weed management A generic Decision Support System for integrted weed mngement By: Per Rydhl, IPM Consult, Denmrk nd: Nicols Munier-Jolin (INRA), Frnce Robert Msin, University of Pdov, Itly Murizio Sttin (IBAF-CNR), Itly

More information

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009

How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009 CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

THERMAL EXPANSION OF TUNGSTEN

THERMAL EXPANSION OF TUNGSTEN . THERMAL EXPANSION OF TUNGSTEN S515 By Peter Hidnert nd W. T. Sweeney ABSTRACT This pper gives the results of n investigtion on the therml expnsion of tungsten (99.98 per cent) over vrious temperture

More information

Secure routing for structured peer-to-peer overlay networks

Secure routing for structured peer-to-peer overlay networks Secure routing for structured peer-to-peer overly networks Miguel Cstro 1, Peter Druschel 2, Aylvdi Gnesh 1, Antony Rowstron 1 nd Dn S. Wllch 2 1 Microsoft Reserch Ltd., 7 J J Thomson Avenue, Cmbridge,

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

VMware Horizon Mirage Web Manager Guide

VMware Horizon Mirage Web Manager Guide VMwre Horizon Mirge We Mnger Guide Horizon Mirge 4.3 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To check for

More information

Student Access to Virtual Desktops from personally owned Windows computers

Student Access to Virtual Desktops from personally owned Windows computers Student Aess to Virtul Desktops from personlly owned Windows omputers Mdison College is plesed to nnoune the ility for students to ess nd use virtul desktops, vi Mdison College wireless, from personlly

More information

What is the closest Metro/Train or Bus station? The T - (www.the-t.com)

What is the closest Metro/Train or Bus station? The T - (www.the-t.com) Are GABLES 411: Sutter Creek Where is the closest post office? Locted 5.3 miles from the community, t the intersection of E Prk Row Dr. nd New York Ave. Below is the ddress nd phone number for your reference.

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journl of Systems nd Softwre xxx (2008) xxx xxx Contents lists ville t ScienceDirect The Journl of Systems nd Softwre journl homepge: www.elsevier.com/locte/jss Energy-efficient rel-time oject trcking

More information

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach

Firm Objectives. The Theory of the Firm II. Cost Minimization Mathematical Approach. First order conditions. Cost Minimization Graphical Approach Pro. Jy Bhttchry Spring 200 The Theory o the Firm II st lecture we covered: production unctions Tody: Cost minimiztion Firm s supply under cost minimiztion Short vs. long run cost curves Firm Ojectives

More information

Savvis IT Infrastructure. Savvis SaaS Infrastructure Solutions Enterprise-class Resources for SaaS Delivery

Savvis IT Infrastructure. Savvis SaaS Infrastructure Solutions Enterprise-class Resources for SaaS Delivery Svvis IT Infrstructure Svvis SS Infrstructure Solutions Enterprise-clss Resources for SS Delivery Softwre-s--Service (SS) Cretes New Opportunities Originlly ppeling to mostly smller businesses, SS is now

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

Warm-up for Differential Calculus

Warm-up for Differential Calculus Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:

More information

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany

g(y(a), y(b)) = o, B a y(a)+b b y(b)=c, Boundary Value Problems Lecture Notes to Accompany Lecture Notes to Accompny Scientific Computing An Introductory Survey Second Edition by Michel T Heth Boundry Vlue Problems Side conditions prescribing solution or derivtive vlues t specified points required

More information

COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials

COMPUTER SECURITY CS 470. Catalog Description. Course Objectives. Course Materials COMPUTER SECURITY CS 470 Ctlog Description PREREQUISITE: CS 350. Study of network security rchitectures nd models, cryptogrphy, uthentiction nd uthoriztion protocols, secure ppliction nd systems development,

More information

STATUS OF LAND-BASED WIND ENERGY DEVELOPMENT IN GERMANY

STATUS OF LAND-BASED WIND ENERGY DEVELOPMENT IN GERMANY Yer STATUS OF LAND-BASED WIND ENERGY Deutsche WindGurd GmbH - Oldenburger Strße 65-26316 Vrel - Germny +49 (4451)/9515 - [email protected] - www.windgurd.com Annul Added Cpcity [MW] Cumultive Cpcity [MW]

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Morgan Stanley Ad Hoc Reporting Guide

Morgan Stanley Ad Hoc Reporting Guide spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd

More information