SlideShare a Scribd company logo
1 of 102
Critic’s Notebook: What to Look for at the Restaurant
Basics
❏
Name of restaurant
❏
Location
❏
Phone number
❏
Genre
❏
Neighborhood
Large-scale physical detail
❏
Parking
❏
View from outside
❏
First impressions
❏
Number of rooms
❏
Number of tables, spacing between tables
❏
Waiting area
❏
Restrooms
❏
Atmosphere
❏
Decor
❏
Music/noise
Clientele
❏
Nationality
❏
Class
❏
Age
❏
Gender
❏
Other?
Restaurant’s story
❏
When first opened?
❏
Under what circumstances?
❏
Since then?
❏
Owner
❏
Manager
❏
Chef
Menu
❏
What’s it look like?
❏
Easy to understand?
❏
Range of choices?
❏
Range in cost?
❏
Comparisons to other local restaurants
❏
Prices?
❏
Reasonable?
Quality of food
(repeat for each dish)
❏
Physical description (moist, flakey, peppery, mushy)
❏
Serving size (large, small, etc.)?
❏
Speed prepared?
Service
❏
Reservations
❏
Waiting time
❏
Waitresses/Waiters
❏
Friendly?
❏
Quick?
❏
Number of table visits
Little details that count
❏
Web page
❏
Hours
❏
Dress code
❏
Credit cards
Restaurant Review Rubric
Parfait
“Publish this on Page 1
of the food section!”
Tres bien
“Publish this inside the food section!”
Petit problème
“Revise and we’ll talk later.”
Grande problème
“Need to visit the restaurant again?”
This review, so polished that it reads as if it were clipped from
a top-notch publication, does most or all of the following:
❏
Fairly but critically evaluates service, decor, food, and so forth;
offers a developed, firm, convincing point of view.
❏
Artfully weaves in a theme and/or the story of the restaurant, its
neighborhood, owners or chefs.
❏
Employs an interesting hook, develops a middle section and
comes to a sense of closure; compels readers to continue
throughout.
❏
Offers showing-not-telling evidence to support all claims; helps
us see and taste food and experience other aspects of the meal;
uses no clichés.
❏
Shows few errors, if any, in the conventions of written English.
❏
Shows control of language to create a consistent voice from
beginning to end.
❏
Shows flair, style, grace and/or pizzazz.
This review, although impressive, lacks the impact of a Parfait
review. It does most or all of the following:
❏
Fairly but critically evaluates service, decor, food, and so forth;
offers a developed, firm, convincing point of view.
❏
Develops a theme or tell a story related to the restaurant.
❏
Employs an interesting hook, develops a middle section and
comes to a sense of closure; compels readers to continue
throughout, although to a lesser degree than a better review.
❏
Offers showing-not-telling evidence to support claims; may slip
into one or two clichés.
❏
Shows few errors, if any, in the conventions of written English.
❏
Shows control of language to create a consistent voice that
flows smoothly from beginning to end.
❏
Shows some flair, style, grace and/or pizzazz.
This review reads more like a class project than a professional
review. While adequately written, it lacks the impact of a better
story. This review does most or all of the following:
❏
Shows observation and analysis of aspects of the restaurant and
develops a point of view about those aspects.
❏
Indicates an awareness of the restaurant’s place in its
neighborhood or genre; alternately, begins to develop a theme
or tell a story but follow-through is flawed.
❏
Employs a hook, develops a middle and comes to some sense of
closure, but readers’ motivation to continue wavers.
❏
Offers showing-not-telling evidence for most claims; might slip
into clichés in places.
❏
May show more than a few errors in the conventions of written
English.
❏
Has little spark.
This review doesn’t meet the requirements of the assignment. It
not only reads like a class assignment but is flawed in several
noticeable and significant ways. A review in this category:
❏
May demonstrate that the writer has observed and thought a
little about some aspects of the restaurant and developed a point
of view regarding some of those aspects.
❏
Indicates a vague awareness of the restaurant’s place in its
neighborhood or among its peers.
❏
Shows only a semblance of a beginning, middle and end.
❏
Offers only marginally convincing evidence for some claims;
tells rather than shows; might routinely offer clichés.
❏
Includes many errors in the conventions of written English.
❏
Spark? What’s that?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Cisco at-a-glance
Q4 FY18 Revenue: $12.8B, $9.7B Products, $3.2B Services
FY18 Revenue: $49.3B, $36.7B Products, $12.6B Services
(Non-GAAP)
$6.3B Annualized R&D
~72,000 employees
300,000 partners; 62,000 channel partners
480 global sites doing business in 165+ countries
More than 19,000 patents
26,000 engineers (36% of our workforce)
#1 or #2 in most market segments we serve
More than 200 acquisitions since 1993
Broad portfolio of integrated products and solutions
Other Stats
Fiscal Stats
Tom Freeman – Systems Engineer
Francisco Duran – Account Manager
November 2018
The Bridge to Possible
Cisco Systems
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
• Intros
• Cisco Overview
• Life of an Account Team
• Closing Thoughts
Agenda
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
About Me:
• Graduated from UCSC in Fall 2009
• B.S. in Information Systems Management
• Cisco employee for ~10 years
• Former president of ISMA (Information Systems Management
Association)
Professional Experience:
• Project Manager: Cross Functional Software Project &
Programs
• Developer: Web Applications / Mobile
• Business Operations Manager: Finance, Staffing, Mlanning,
Communications, and Metrics Support
• Technical Marketing Engineer: Proof of Concepts, Demos,
RFP, Lab Management, Interlocks
• Systems Engineer: Commercial Sales, Ent Networking, Data
Center, Security, Collaboration
Interests
• Music, Acoustics, Climbing, Disc Golf, Drumming
• Networking, FPS games, LAN parties
Tom Freeman
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
About Me:
• Graduated from SCU in 1992
• B.S. in Marketing
• Cisco employee for ~9 years
Professional Experience:
• Sales:
• AT&T- represented the entire AT&T portfolio
• Microsoft - focused solely on Voice Recognition for Contact
Centers
• Cisco - Commercial Sales, Ent Networking, Data Center,
Security, Collaboration
* In 2006, took 1 year off from Tech to work as Habitat for
Humanity as Donor Relations Manager
Interests
• Music, Piano, playing with my 2 young kids
• Aviation, Sports, and cycling
Francisco Duran
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Market
Research
Web Development
Project Management
PMO Information Systems
Administrator
Operations/Finance
Event Management
Mobile App
Development
POC
Engagement
2014201320122011201020092008 2015
Operations / Chief of Staff
2016
Systems
Engineer
2017 2018
PLM / TME
Tom’s Journey
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Cisco Systems
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
We securely connect everything
to make anything possible.
Connecting the Unconnected
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
For 30 years, we’ve
focused on helping to
change the way the
world works, lives,
plays, and learns.
Our vision
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
We create solutions
built on intelligent
networks that solve our
customers’ challenges.
Our strategy
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Digital is transforming business.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
And everything
we do.
Transform
processes and
business models
Empower
workforce efficiency
and innovation
Personalize
citizen/customer/
employee experience
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
IDC predicts worldwide spending on
digital transformation technologies will
expand at a compound annual growth
rate (CAGR) of 16.8% through 2019 to
more than $2.1 trillion.*
In 2019,
enterprises will spend
to manage digital
business
*IDC FutureScape: Worldwide IT Industry 2017 Predictions,
Doc #US41883016, Nov 2016
$2.1 Trillion
The opportunity:
Embracing digital business
https://www.idc.com/url.do?url=/getdoc.jsp?containerId=US418
83016&term=RnV0dXJlU2NhcGU6IFdvcmxkd2lkZSBJVA==&p
osition=21&page=1&perPage=25&id=37be15b0-63e6-4a1b-
a6df-134042f5b9f6
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Power a
Multicloud
world
Increased pace of innovation
Secure, intelligent platform for digital business
Create
meaningful
experiences
Reinvent the
network
Security is
Foundational
Unlock the
power of data
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Innovation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Customers rely on cisco for innovation
1999
IP Telephony
Patent
2011
ASR 9000 Series
(1st Terabit-
router)
2013
Network
Convergence System
(Planet’s Fastest Router)
2014
Application-
Centric
Infrastructure
2006
TelePresence
1992
Groundbreaking
Interior Gateway
Routing Protocol
patent
2008
Collaboration
Portfolio
1994
1st major supplier
of multiprotocol
products awarded
ISO 9001 cert.
2009
UCS
1998
1st small office/
home/
telecommuting cable
modem
2004
Cisco Carrier
Routing System
(CRS-1)
1986
1st multi-protocol
router, the Advanced
Gateway Server
2014
Advanced
Malware
Protection (AMP)
Everywhere
1989
Border Gateway
Protocol (BGP) for
Service Providers
2005
1st Multiservice
Firewall (ASA)
2016
Tetration Analytics
2017
Cisco Spark Board
Network. Intuitive.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Build
Our innovation
ecosystem
Co-develop
PartnerInvest
Buy
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Growth Strategy for Innovation
• $6B Annual R&D
Spend
• 26K+ Engineers
• 205 Acquisitions • 300K+ Partners • $250-$300M
annually
• 120+ Companies
• 45 LP positions in
27 countries
Co-develop
Build Buy Partner Invest
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Build
19K
Patents
26K+
Engineers
$6.3B
Annual R&D
spend
Internal
Start-ups
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Buy
205
Acquisitions
Meraki
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Partner
300K+
Strategic Partners
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Invest
$2B
Fund
120+
Companies
45 Funds in 27 countries
Invest $200 to $300 million annually
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Co-develop
Alliance Partners 2,500
Customers
40
Solution
s10
Innovation
Centers
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential© 2018 Cisco and/or its affiliates. All rights
reserved. Cisco Confidential
FY18
financials
$46.5b
Total cash and
investments
$36.7b
Product revenue
$12.6b
Services revenue
$49B*
Revenue
*Non-GAAP Rev.
GAAP revenue
$49B Total
$36.7B Products
$12.6B Services
Q4 FY18
financials
$12.8B
Revenue
$9.7B
Product revenue
$3.2B
Services revenue
Total cash and
investments
$46.5B
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Q4 FY18 revenue highlights
Y/Y% Change
Services 3%
Infrastructure platforms 7%
Applications 10%
Security 12%
Other products (18%)
Total Cisco
$M
3,202
7,443
1,339
627
232
12,844 6%
Recurring revenue 32% (+1 pts y/y)
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Revenue by geography: Q4 FY18
Americas
$7.6B
EMEA
$3.2B
APJC
$2.1B
Total Q4 FY18
$12.8B
Total revenues do not add up due to rounding.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Market leadership matters
#1
Access routing
79%
#1
Telepresence
55%
#1
Wireless LAN
44%
#1
Campus
switching
(managed)
58%
#1
SP core + edge
routing
41%
#1
SaaS web
conferencing
45%
#2
X86 blade
servers
32%
#1
Network
security
28%
#1
DC switching
(managed)
55%
#1
LAN switching
(managed)
57%
#1
Voice
43%
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Partners
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Our heritage,
their confidence
Leading market
transitions
together
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Digital Network Architecture
1993
2006
2009
2014
2017
1999
2008
2012
2016 Integrated Security
Software Defined Networking
Internet of Things
Unified Computing Systems
Unified Communications
Video/Telepresence
VoIP
Switching
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Partner routes to market
Resale Ecosystem Designed-inProvider Marketplace
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential© 2018 Cisco and/or its affiliates. All rights
reserved. Cisco Confidential
Reinvent our partners’ go-to-market
Change how we position
Setting expectations
Activate, adopt, expand
Change how we grow
New consumption models
Change how we transact
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Cisco Partner ecosystem
Customer
value
Consultant
ISVIntegrator
TechnologyDistributor
Reseller
Cloud
builder
Service
provider
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Corporate social
responsibility
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
A corporate social responsibility leader
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Ranked #1 most sustainable company
As ranked by recent Barron’s analysis
We rank No. 1 among all U.S.
public companies, after
reducing our greenhouse-gas
emissions by 41% since 2007
and meeting our goal of getting
80% of our electricity from
renewable sources.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Enabling people to reach their full
potential in a digital economy.
Advancing environmentally
sustainable growth in a
digital economy.
People Society Planet
We accelerate global problem solving through our technology
and expertise
to positively impact people, society, and the planet.
Cisco corporate social responsibility
Partnering to scale inclusive social
and economic impact in countries
around the world.
Ethical conduct
Our people
Building skills & entrepreneurship
Building a digital foundation
Human rights
Responsible sourcing & manufacturing
Energy & greenhouse gas reduction
Product end-of-life
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
FY17 highlights: our CSR impact
Hours of
employee
volunteering – the
equivalent of over
40 years!
Company-wide
donations (cash,
product, and
in-kind)
$355M
Students
developed skills
through Cisco
Networking
Academy
1.3M -60%
Reduction in
scope 1 and 2
GHG emissions by
2022
154M
People directly
benefited from our
cash grant
investments
to nonprofits
358K
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Our CSR goals
80%
Achieve 80%
employee
engagement
(volunteering and
donations) by
2020
Reach 2 million
Cisco Networking
Academy
students per year
by 2021
2M -34%
Avoid one million
ton cumulative of
supply chain
greenhouse gas
emissions by 2020
1B
Positively impact
one billion people
by 2025
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
People & culture
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential© 2018 Cisco and/or its affiliates. All rights
reserved. Cisco Confidential
Culture and employees
are our competitive
advantage
Corporate
Functions
19%
Services
20%
Engineering
35%
Sales
26%
74K
employees
480
offices
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Our People Deal is the culture we all
want and our business needs for
success. It’s our unique culture of
speed, agility, innovation, customer
focus, collaboration and doing good for
the world. It’s how, together, we
connect everything, innovate
everywhere, and benefit everyone.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Our Guiding Principles
GIVE Your Best TAKE Accountability
Show that desire to be at your best, connect with
others to share quickly with whoever needs it; open
your mind to ideas from everywhere and anywhere
- and use them to build on the possibilities to pour a
little drop of love into our customers’ worlds.
Whatever comes your way, understand it and be
personally accountable for its success. Assume the
answer’s “yes” and that you don’t need to wait in
line for permission. Check the data but don’t let that
slow down taking responsibility. And ... deliver.
GIVE Your Ego The Day Off TAKE Difference To Heart
It’s the best solution our customers need, not the
best-protected Cisco turf, so support that solution,
whatever the background of the person or team
who came up with it. Have the debate and have a
backbone. Make your point, then commit to what’s
been agreed and deliver it with agility and pace.
We become bigger as individuals and more
powerful as a collective when we respect and value
what makes us so special - our unique, personal
differences. Inclusion will always beat exclusion.
GIVE Something Of Yourself TAKE A Bold Step
A simple smile or “hi” every day is worth its weight
in gold, so don’t hide it away. Show care and
consideration to your colleagues, our customers,
our communities, our partners and the world we all
share. Be worthy of trust. Be an inspiration. Be
delightful to everyone. Even if you don’t like them.
Whatever your position, show leadership and
courage when it comes to innovating and
disrupting. If it doesn’t feel safe, be secure in the
knowledge that shooting for the stars will always be
a part of who we are. Together we can figure out
how to get there so let’s dream big.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential© 2018 Cisco and/or its affiliates. All rights
reserved. Cisco Confidential
21 consecutive years on the
Best Companies to Work
For list.
See more awards:
weare.cisco.com/awards
Great place to work
Top 20 Global Rankings
Latin America (#2)
Singapore (#2)
Portugal (#2)
Peru (#2)
Poland (#2)
China (#3)
Australia (#3)
Europe (#3)
Ireland (#3)
Costa Rica (#3)
United Kingdom (#4)
Netherlands (#5)
Asia (#5)
#1 Global Rankings
Italy
Spain
Japan
Switzerland
United States
#1 Most sustainable company by Barron’s
#3 Best place for giving back
Poland
Mexico
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Life of an Account Team
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Sales Organization
Systems
Engineer
Manager
Systems Engineers
Regional
Manager
Account Managers
Area VP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Systems EngineerAccount Manager
Customer
Technical Details
Knowledge SharingPartnership
Strategy
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Specialists
Consulting
Systems Engineer
Product Sales
Specialist
Client Services
Manager
Partner Account
Manager
Domain Specific
Account Team
Value-add Services
(deployment, survey, etc..)
Partner/Resale
Strategy
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Territory Sales
SEAM
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Select Sales
SEAM
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Account Team Role
Represent the Cisco portfolio
Own engagements from a business & technical perspective
Embody Cisco culture & values
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Cisco Portfolio
DatacenterEnterprise
Networking
Security Collaboration
Assure
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Meraki
Cloud Managed
Networking
WebEx Share
Simple
Screen Sharing
HyperFlex
Hyperconverged
Infrastructure
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
CloudCenter
Multi-Cloud
Management
Viptela
Software Defined
WAN
Stealthwatch
Machine Learning Based
Threat Detection
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Cisco Digital Network Architecture (DNA)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
Closing Thoughts
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
• Internships – The earlier the better
• Educational focus:
• Product development processes
• Software development
• Supply chain management
• Technology classes that interest you
• Stay up on industry trends:
• Blogs, News articles, Webinars/Seminars, Reddit
• Participate in local events and organizations e.g. ISMA,
Meetups, etc.
• Develop yourself through personal projects
Be Relevant
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco
Confidential
• Understand the interview process
• Practice
• Be yourself, honesty is critical
• Potential is everything when evaluating graduates
• NO FEAR !!
Interviewing
*
| Styx Review | January 23, 2013 | Confidential – Internal
Only
FROM THE PS/2 TO THE SMARTPHONE, A PERSPECTIVE
OF THE COMPUTING REVOLUTION FROM THE TRENCHES
Sam Huynh
Principal Member of Technical Staff
November 16, 2017
AgendaWho am I? Introduction to AMDMy role inside
AMDFrom the PS/2 to the smartphone, a perspective of the
computing revolution from the trenchesQ and A
*
*
Who am I?Born in Saigon (now known as Ho Chi Minh City),
Vietnam at the end of the Vietnam War.Family immigrated to
Seattle, Washington after the Vietnam WarGrew up in Seattle
and eventually attended the University of WashingtonBSEE ’94,
MSEE ‘96 and Ph.D. EE ’99Relocated to Mountain View, CA in
‘98 and now live in Santa Cruz, CAThree patents
(ATI/AMD)Dynamic impedance compensation circuit and
methodBit deskewing IO method and systemMethods and
apparatus for transmitting and receiving data signals
*
*
Career Journey
*
*
Cascade
Design
Automation
Introduction to AMDAdvanced Micro Devices (AMD), Inc was
founded on May 1, 1969 and is based in Sunnyvale, CA. The
company designs, develops, and sells microprocessor products,
such as central processing units (CPU), accelerated processing
units (APU), and graphics processing units (GPU) for servers,
desktop PCs, and mobile devices. Its microprocessors for server
platforms include AMD Opteron 6000, 4000, and 3000 series
processors; APUs for mobile PC platforms consist of
performance mainstream AMD A-Series APU, the AMD E-
Series APU for everyday performance, the AMD C-Series APU
for HD Internet experiences in small form factors, and the AMD
Z-Series APU for Windows-based tablets; CPUs for mobile PC
platforms comprise the AMD Phenom II mobile processor, AMD
Turion X2 mobile processor, AMD Turion II mobile processor,
AMD Turion II ultra mobile processor, and AMD Athlon II
processor. Discreet graphics solutions include Radeon and
Radeon HD seriesAMD controller hub-based chipsets for its
APUs; and graphics, video, and multimedia products for use in
desktop and notebook computers
*
*
World wide locations
*
*
Sunnyvale, CA
Austin, TX
Orlando, FL
Toronto, Ontario
Boston, MA
Beijing, China
Shanghai, China
Bangalore, India
Hydrabad, India
9 major
design
centers
world wide
Approximately
10,000 employees
World wide
About AMDThe AMD mission: To be the leading designer and
integrator of innovative, tailored technology solutions that
empower people to push the boundaries of what is
possibleOperations in 31 countries with more than 50 locations,
including more than a dozen R&D facilities, nearly two dozen
international sales offices, and assembly/test manufacturing
facilities in Malaysia and ChinaFortune 500 company2014
revenues of $5.51 billionMain competitors:
*
*
AMD and YOUGreat brands join with AMD to bring their
products to lifeTechnology providers you know and trust, such
as Acer, Apple, Asus, Cisco, Dell, GE, HP, Lenovo, Microsoft,
Nintendo, Samsung, Sapphire, Sony, Toshiba, Vizio, and XFX.
These leading brands count on AMD to find innovative ways to
power the solutions they create for the different ways you work
and play with technology in your every day life.Named Top 100
best corporate citizens of 2013 by the Corporate Responsibility
(CR) MagazineInnovation and technology are what we do, but
responsibility is who we are. AMD was founded on the belief
that if you put people first, products and profits will follow.
Today we call this culture The AMD Way. It means doing
business in a responsible way, caring for the environment and
contributing to our communities.
*
*
AMD Time line (1969 – 2010)
*
*
AMD Founded
5/1/1969
1970
1980
1990
2000
2010
ATI acquires
ArtX in 2000
AMD acquires
ATI in 2006
AMD signs on
as second source
for x86 in 1982
AMD introduced
K5; split with Intel
in 1996
Athlon 64
Introduced in
2003
ATI Founded
In 1985
ATI introduced
Radeon in 2000
GameCube
In 2001
Wii in
2006
Xbox 360
in 2005
AMD was founded in
1969 by a group of former
executives from Fairchild
Semiconductors.
AMD became a fabless semiconductor
company in 2009 with the spin off of foundry
operations to become Global Foundries.
Dual core 2005
AMD Time line (2010 – Present)
*
*
2010
2015
AMD introduce
APUs in 2011
Wii U in
2012
AMD Seattle
64 bit ARM sever
in 2014
Xbox one/PS4
in 2013
Carrizo introduced in 2015
Radeon
HD8000
In 2013
Radeon Fury X
In 2015
2016
2017
Polaris line
June, 2016
Launched in early 2017
Epyc launched in mid 2017
Vega GPU Q3 2017
2018
My role inside AMDResponsible for developing methodologies
using next generation technologies (7nm)Our main
mission:Convert source code into an actual silicon chipThis
process is known as RTL-to-GDSRegister Transfer Level (RTL)
is a form of verilog used to describe the chip’s
functionalityGraphic Database System (GDS) is the geometrical
information released to foundries for silicon
manufacturingWork with teams in Austin, Boston, Toronto, and
IndiaCreate synergies for cross functional teams and inter
disciplines Work with flex timeCycles (CES, E3, back to
school, and Christmas)
*
*
RTL-to-GDS
*
*
Input: RTL
Synthesis
DRC/LVS
Floorplanning
Place and Route
Timing closure
Output: GDS
to the foundry
Converts high
level description
language into
physical gates
Organizes blocks
based on timing
and connectivity
Makes the physical
connections
Design Rule Check (DRC)
Layout Versus Schematic (LVS)
Meets frequency
specs
FROM THE PS/2 TO THE SMARTPHONE, A PERSPECTIVE
OF THE COMPUTING REVOLUTION FROM THE TRENCHES
*
*
How did we get from…
*
*
$3000 ($6658.79 in 2017 dollars) in
1987 with university student
discount
~$600 with 2 year commitment
(in 2017)
This is how…Demand: Performance, Power, and Price
GlobalizationFoundry/circuit technologyElectronic Design
Automation (EDA) tools
*
*
Performance, Power and PricePerformanceClock frequencyIPC
(Instructions Per Cycle)PowerMaintain a certain level of
performance but reduce power consumptionBattery
lifePriceLower and keeps getting lower More features
*
*
GlobalizationHow do we improve performance, reduce power,
lower cost/price and still make money? Performance and power
wide specifically China, India, Brazil, etc…Intellectual
competition especially Taiwan, China and IndiaTSMC is the
world’s largest independent semiconductor foundry (founded in
1987)Effective “24 hour” operation
*
*
Foundry/Circuit technologyFoundry technologyBipolar junction
nmApproximately 428x
reduction in approximately 35 yearsCircuit technologySerial
Memory
*
*
BJT versus CMOSAdvantages of CMOS over BJTCMOS is a
better switchEffective zero static power consumptionHigh
packing densitiesRelative easy design, integration and
manufacturing process
*
*
Radeon from 2000 - 2017
*
*
8086 - APUs
*
*YearTechnologyVoltageBus widthFreq.808619763000nm>
5V16 bits5MHz – 10MHz28619841500nm5V16 bits8MHz –
20MHz36819911500nm - 800nm5V32 bits20MHz –
40MHz4861993500nm3.3V – 5V32 bits25MHz –
100MHz5x861995350nm3.3V – 3.45V32 bits133MHz –
150MHzK61997350nm2.9V – 3.3V32 bits166MHz –
300MHzAthlon1999250nm – 130nm1.6V – 1.8V32 bits500MHz
– 2.33GHzAthlon64 (first dual core)2003130nm – 65nm1.3V –
1.5V64 bits1GHz – 3.2GHzPhenom (2 – 6 cores)200765nm –
45nm1.2V64 bits2GHz – 3.8GHzAPU (2 – 8 cores with
GPU)201132nm1.2V64 bits3GHz – 5GHzRyzen (4 – 16
cores)201714nm1.1V64 bits3GHz – 5GHz
APUs
*
*
Age of Parallel ComputingSISD = Single Instruction Single
Data8086 – 486SIMD = Single Instruction Multiple
DataGraphics Processing Units (GPU) – RadeonMISD =
Multiple Instruction Single DataNo personal experience with
this architectureMIMD = Multiple Instruction Multiple
DataMulti-core CPU (Athlon, Phemon, Ryzen, etc…)APU =
Accelerated Processing UnitMulit-core CPU + GPU (MIMD +
SIMD)
*
*
Parallel versus Serial linksParallel link transmits several
streams of data simultaneously along multiple channels (wires,
etc…)Pros: Easier to designCons: More pins (more area),
limited data rate Serial link transmits a single stream of
dataPros: Fewer pins (less area), higher data rateCons: Design
complexity
*
*
BUS interfaces (1981 – now)
*
*StyleBus WidthBit rateISAParallel8 or 168/16/32
Mbytes/sIndustry Standard ArchitectureEISAParallel3233
Mbytes/sExtended ISAVLBParallel32100/133/166/200
Mbytes/sVideo Electronics Standards Association local
busPCIParallel32 or 64133/266/533 Mbytes/sPeripheral
Component Interconnect AGPParallel322133
Mbytes/sAccelerated Graphics
PortATAParallel1616/33/66/100/133 Mbytes/sPC/AT
AttachmentUSBSerial11.5/12/480/5000/10000 Mbits/sUniversal
Serial BusPCIeSerial1250/500/985/1969 Mbytes/sPCI
expressSATASerial11.5/3.0/6.0 Gbits/sSerial ATA
DRAMs (Dynamic random access memory)
*
*
HBM 2016 Peak bandwidth = 128GBps
DRAM density
*
*
*
*
High Bandwidth Memory
*
*
AMD Polaris with HBM
*
*
Today’s tools to build tomorrow’s technologiesElectronic
Design Automation (EDA) toolsCadence (Virtuoso), Synopsys
(PrimeTime), Mentor Graphics (Calibre), etc… Linux
(approximately 2003 to present)Enabled cheap PCs (~$2K) to
replace specialized expensive servers (~$20K)Get a lot more
compute for the same priceMulti-threading (approximately 2007
to present)Took advantage of multiple cores
*
*
All that leads to this…
*
*
CPU
Northbridge
Southbridge
AGP
Single core
ATA
1994
$2000 ($3376.46 in 2017 dollars)
2017
(< $250 laptop)
SDR DRAM
KB
M
USB
SATA
PCIe
PCI
VLB
Network
DDR DRAM
KB
M
other
SB
Graphics
NB
CPU
(2 - 8 cores)
*
*
1994
2000
2006
2013
2013
2012
2006
2001
1996
1991
1985
2005
2001
ConsumptionReduced Instruction Set Computing (RISC) versus
Complex Instruction Set Computing (CISC)RISC (Alpha, ARM,
PowerPC, SPARC) CISC (x86, Motorola 68K)Clock
gating/Power gating – stopping the clock/turning off the power
when idlingFoundry Technology – reduce static leakage
*
*
ConclusionThe Revolution continuesCompanies that can adapt
and evolve continues to survive (AMD)Because you demand
more performance, less power, lower pricesThe electronics
industry responds with innovations in technologyAnd AMD puts
it all together and brings those products to you.
*
*
Q & AOpen forum – questions and answers
*
*
Xantrion:
Who We Are, What We Do, and How We Do It
Speaker:
Diana Lara, Recruiting, Xantrion Inc.
© 2010 VMware Inc. All rights reserved
© 2010 VMware Inc. All rights reserved
‹#›
1
Introductions
SOLUTIONTRACK | VMware vSphere
Diana Lara, Recruiting
© 2010 VMware Inc. All rights reserved
‹#›
30minutesXantrion: A Managed Service Provider15 minutesA
Day in the Life15 minutesWrap-up and Final Q&A
Agenda
SOLUTIONTRACK | VMware vSphere
Resumes Accepted!
We’re hiring interns and full-time system administrators who
are authorized to work in the US
© 2010 VMware Inc. All rights reserved
‹#›
3
SAY
Briefly note where you are on the agenda.
DO
Check to see if there are any questions before moving forward.
Xantrion: A Managed Service Provider
Xantrion:
Who We Are, What We Do, and How We Do It
© 2010 VMware Inc. All rights reserved
© 2010 VMware Inc. All rights reserved
‹#›
4
What is a SMB and MSP?
SOLUTIONTRACK | VMware vSphere
SMB = Small to Medium Business
Traditionally under 50-100 for “Small”, under 250-500 for
“Medium”
MSP = Managed Service Provider
Providing services for a monthly fee
In IT consulting, it’s providing IT support for a monthly
contract
Contrast this to “T&M” or Time and Materials – you only
charge the customer for the hours you put in
Monthly contracts are good
Us: Recession proof
Client: IT budget is fixed
© 2010 VMware Inc. All rights reserved
‹#›
What Services Do We Provide?
SOLUTIONTRACK | VMware vSphere
Monthly Ongoing Services
The majority of our business is services for which we receive a
reliable check each month
Resolve computer issues for employees
Find parts and order
Setup new desktops/laptops/handhelds
Troubleshoot things like “my computer is slow”
Handle all server-related issues
One-time services
Revamp network design (when acquiring a new client)
High-end projects for companies with in-house IT who have
insufficient knowledge/experience
© 2010 VMware Inc. All rights reserved
‹#›
How We Provide Service: A 4-Tiered Approach
SOLUTIONTRACK | VMware vSphere
Tier 1: Help Desk Engineers
Provide desktop support and act as dispatchers for complex
issues
Maintain documentation of systems and networks
Over 50% of issues are addressed at this tier
Tier 2:Associate Consultants
Proactive monitoring and maintenance of networks and backups
First point of escalation for complex issues
Tier 3: Consultants
Account managers, maintain strong relationships with clients
Plan long-term IT strategy and ensure day-to-day support is
smooth
Second point of escalation for complex issues
Tier 4: Senior Engineers
Experts in a particular area (networking, virtualization, mail,
etc.)
Brought in to manage bring-ups and implementations
Final point of escalation for complex issues
© 2010 VMware Inc. All rights reserved
‹#›
Workflow and Escalation
SOLUTIONTRACK | VMware vSphere
© 2010 VMware Inc. All rights reserved
‹#›
Tools We Use
SOLUTIONTRACK | VMware vSphere
Remote Support
All client servers are remotely accessible, maintenance doesn’t
require an on-site presence.
Most desktop support is done remotely, minimizing downtime
while clients wait for a technician to be dispatched.
Network Monitoring
Every critical component of client’s network is monitored
(servers, firewalls, ISPs, etc.)
We know about problems before the client does and can work
proactively rather than reactively.
Standardization and Virtualization
After supporting hundreds of clients over the past 10 years, we
know what works best. Easier to support standardized
environments.
Replace several outdated servers with one robust server machine
hosting several virtual servers. Decreases problems related to
hardware failure.
© 2010 VMware Inc. All rights reserved
‹#›
Xantrion Mission
SOLUTIONTRACK | VMware vSphere
Provide clients with a 5 star experience every time they interact
with a Xantrion team member or recommended product
Our average customer satisfaction score for 2014 is 4.7/5.0
98% of our clients stay with us year after year
© 2010 VMware Inc. All rights reserved
‹#›
Xantrion Values
SOLUTIONTRACK | VMware vSphere
Our clients are our reason for being
Without them, we would not exist
Our people are our business
If we do nothing other than hire right, we will do well by our
clients
If our people are inspired, they will take the company and it’s
community to places we have yet to imagine
Our community is our future
Our clients, growing businesses, are the key to turning around
the US economy
We are dedicated to being a spring board for our clients
© 2010 VMware Inc. All rights reserved
‹#›
Questions?
SOLUTIONTRACK | VMware vSphere
© 2010 VMware Inc. All rights reserved
‹#›
Day in the Life of a Help Desk Administrator
Xantrion:
Who We Are, What We Do, and How We Do It
© 2010 VMware Inc. All rights reserved
© 2010 VMware Inc. All rights reserved
‹#›
13
Example Responsibilities
SOLUTIONTRACK | VMware vSphere
Assist clients with desktop issues
Create and manage user accounts
Identify and assign appropriate resources for escalated service
requests
Assist consultants with projects as needed
Shadow consultants
Learn!
© 2010 VMware Inc. All rights reserved
‹#›
Xantrion Work Environment
SOLUTIONTRACK | VMware vSphere
Professional and positive
Able to see the impact of your work on a daily basis
Fast paced
Room to grow
Learning oriented and continuously evolving
Everyone has a say in what we do and how we do it
Team oriented
Contribution appreciated and outstanding performance rewarded
Work hard, play hard
People have the information and tools they need to succeed
© 2010 VMware Inc. All rights reserved
‹#›
Examples: impact of work on customers
Process improvement
Training to process to policy and procedure
We support clients in teams, answer technical questions for one
another, we cover for each other when out, we rotate on call
duties, we have each other’s back in general
Big on thank you and do things like dinner for 2 or hotel stay
for outstanding work
We do 1 scheduled company event ea quarter like our Christmas
party and a visit to 6 Flags. We also do ad hoc events like A’s
games, shuffle board, beers after monthly training.
We use state of the art service management and monitoring
software. We provide 4 – 6 weeks of initial training and then
ongoing coaching and training there after.
15
Questions?
SOLUTIONTRACK | VMware vSphere
© 2010 VMware Inc. All rights reserved
‹#›
Xantrion Summary, Wrap-up, and Q&A
Xantrion:
Who We Are, What We Do, and How We Do It
© 2010 VMware Inc. All rights reserved
© 2010 VMware Inc. All rights reserved
‹#›
17
Xantrion Facts
SOLUTIONTRACK | VMware vSphere
Founded in Oakland, CA in 2000
88% growth between 2006 and 2015
51 person elite technical team
420 servers under management and 5,500 end users supported
Premium partner for major vendors such as Microsoft, Dell,
Vmware, Citrix, and Iron Mountain
Compensation package that includes:
100% of your healthcare premium for you and your family
Profit sharing
Matching 401K plan
Certification reimbursement
Monthly in-house training
Third party training event each year
17 days PTO
© 2010 VMware Inc. All rights reserved
‹#›
Xantrion People
SOLUTIONTRACK | VMware vSphere
Interns and full-time employees
US based and authorized to work in the US
90% retention year after year
Elite team of professionals
4 year degrees – Information Systems to Film
Industry certifications
Like people as much as computers
Explain technical recommendations in business/layman’s terms
Go the extra mile to assist clients
Proactive because they own IT
Team players
Take pride in their work because when done well, IT is a spring
board for business
“Dave is an EXPERT but he is so humble about it; I
have NEVER felt that my questions were in the "Idiot" realm
nor has he ever implied that I've overreacted to a
situation that was really no big deal. ”
© 2010 VMware Inc. All rights reserved
‹#›
Xantrion Career Opportunities
SOLUTIONTRACK | VMware vSphere
Years
$47K
$65K
$80K
$95K
Profit Sharing, Benefits & Training
Positive Computer Experience
© 2010 VMware Inc. All rights reserved
‹#›
Because we are growing and have a clear cut career ladder, we
provide more opportunities than most businesses. Ex =
Catherine. Consultant for a year and a half prior to being
promoted to Ops mgr.
Because we are a consulting company that works with growing
businesses we are the perfect place to quickly learn and stay
abreast of the latest technology. We implement new systems for
a variety of customers on a regular basis which allows us to
expand our experience and skill set. Last but not least, you get
to work with and learn from some of the best IT pros in the
business.
20
Questions?
© 2010 VMware Inc. All rights reserved
© 2010 VMware Inc. All rights reserved
‹#›
21
Resumes?
We’re hiring summer interns and full-time system
administrators who are authorized to work in the US
© 2010 VMware Inc. All rights reserved
© 2010 VMware Inc. All rights reserved
‹#›
22
012345678910Sys AdminNetwork AdminConsultantSr
Consultant
Ops Mgr
Chart1Sys AdminNetwork AdminConsultantSr Consultant Ops
Mgr
Sys Admin
0
3
6
9
Sheet1Column1Sys Admin0Network Admin3Consultant6Sr
Consultant Ops Mgr9To resize chart data range, drag lower
right corner of range.
information security and
compliance case study:
managing issues
arising from
DEVICE PROLIFERATION and adoption of “BRING your own
device” policies in Smb Non-profits
1
Device Proliferation Complicates Security and Privacy
Tools for unified security management aren’t adequate to
enforce the following.
Encryption
Password policy
Inactivity timeout and screen lock
Users mix personal and sensitive company data on the same
device complicating
Legal discovery
Remote wipe
Ability to attest to a known security state
A“bad day” looks like…..
A personal MacBook with company e-mail containing sensitive
data (donor list / patient information) is lost. A disgruntled
employee reports this to: your Board / the Department of Health
and Human Services / the San Francisco Business Times. Upon
investigation it is discovered:
There was no policy prohibiting e-mail on unmanaged devices
Your helpdesk set up e-mail on the device
The device was not password protected
The device was not encrypted
The device can not be remotely erased
IT had never informed management of the risks of allowing e-
mail to synchronize to unmanaged devices
Your organization is now publically on the wall of shame at
Privacyrights.org
The Department of Health and Human Services
The Office of the California Attorney General
YOU
The risk of an incident is very real
Target
Loss of nearly 110M customer’s payments cards
Home Depot
56M customer’s payments cards compromised
Anthem Health Insurance
Cyber-attack resulting in exposure of over 80M people’s health
and SS infomation
Thousands of other examples
http://www.privacyrights.org/data-breach
http://oag.ca.gov/ecrime/databreach/list
Legal Mandates to disclose increase the consequences of a
privacy breach
Department of Health and Human Services HITECH
Health Information Technology (HITECH) Act section 13402
HIPAA covered entities
Federal Trade Commission
FTC 16 C.F.R. Part 318: Health Breach Notification Rule
Health Information
California Privacy Act:
Civil Code 1798.80-1798.84
Broad variety of personal information
The California Privacy Act covers a very broad range of
personal information
Name, Signature, physical characteristics or description
Social security number, passport number
Driver's license or state identification card number
Address, telephone number
Insurance policy number
Education, employment, employment history
Bank account number, credit card number, debit card number
Any other financial information
Any other medical information
Any other health insurance information
Does not include publicly available information that is lawfully
made available to the general public from federal, state, or local
government records
Source:
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnoti
ficationrule/breachtool.html
Loss and Theft of devices is the biggest cause of incidents
Sources of HIPAA Data Breaches 2010 to 2013 and
Recommended Controls
Hacking / IT Error
[PERCENTAGE]
Insider Disclosure
[PERCENTAGE]
Hacking/IT IncidentUnauthorized DisclosureLoss / Improper
DisposalTheft5412799321
= Endpoints, encrypt= Servers and Backups, locate in data
centers
Loss and theft occurs for all types of network equipment, each
needs to be properly protected.
DesktopLaptopPhone / tabletServerBackup
Media23.75181.257328.757
Small to Mid Sized Non-Profits have a particularly big problem
Often have sensitive information
Donor lists
Client information subject to HIPAA controls
Client information subject to California Privacy Act
Cost considerations prohibit providing a dedicated company
phone / tablet. Users are encouraged to use personal devices
Cultural norms limit ability of IT to enforce policy
Budget and lack of scale exacerbate issues of having a
heterogeneous set of devices
Don’t do this!
Recruit allies who can drive adoption of security best practices
CPA’s (auditors)
Homogeneity eases HIPAA or SSAE 16 compliance
Legal Counsel
Inadequate data protection practices increase legal liability
Insurance Brokers
Inability to attest to certain controls will increase insurance
costs or make coverage unavailable
IT Consultants
Confirm for management the challenges and costs of supporting
multiple platforms
Help identify and the best tools to manage various platforms
Manage Risks Holistically
Educate top management
Get sign-off on a risk based security and privacy policy.
Budget for tools to support new devices
Control risks of user ignorance or anger at the firm
Educate employees on legal and ethical requirements for
protecting sensitive data
Encourage good human resource practices to improve employee
satisfaction
Security requirements
Restrict data storage to only those devices that can be
physically secured or affirmatively encrypted
Restrict uncontrolled devices to streaming only access
Reduce Legal Liability
Get audited for HIPAA or SSAE 16 compliance
Buy Insurance
Security leads to Supportability
Pushing back against having to support a new device is often a
problem IT has to face alone.
Security of company and customer data should be an
organization wide issue everyone can get behind.
By ensuring that everyone is on-board with security you will
have the buy-in you need to restrict access to a supportable
environment.
Appendix
Some MDM

More Related Content

Similar to Critic’s Notebook What to Look for at the RestaurantBasics❏.docx

Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Jose Gonzalez
 
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
casschoppy
 
Winning your Customers Minds, Hearts and Wallets - Russell Biggarts presentation
Winning your Customers Minds, Hearts and Wallets - Russell Biggarts presentationWinning your Customers Minds, Hearts and Wallets - Russell Biggarts presentation
Winning your Customers Minds, Hearts and Wallets - Russell Biggarts presentation
Morag Lehrle
 

Similar to Critic’s Notebook What to Look for at the RestaurantBasics❏.docx (20)

Demystifying the Business Awards Process
Demystifying the Business Awards ProcessDemystifying the Business Awards Process
Demystifying the Business Awards Process
 
Lateral Due Diligence and Integration
Lateral Due Diligence and IntegrationLateral Due Diligence and Integration
Lateral Due Diligence and Integration
 
Dimensions18 Sponsorship Opportunities
Dimensions18 Sponsorship OpportunitiesDimensions18 Sponsorship Opportunities
Dimensions18 Sponsorship Opportunities
 
Dimensions18 Sponsorship Opportunities
Dimensions18 Sponsorship OpportunitiesDimensions18 Sponsorship Opportunities
Dimensions18 Sponsorship Opportunities
 
10 principles for successful international web presence | Susanne Dirks - eVo...
10 principles for successful international web presence | Susanne Dirks - eVo...10 principles for successful international web presence | Susanne Dirks - eVo...
10 principles for successful international web presence | Susanne Dirks - eVo...
 
Web Design Proposal PowerPoint Presentation Slides
Web Design Proposal PowerPoint Presentation Slides Web Design Proposal PowerPoint Presentation Slides
Web Design Proposal PowerPoint Presentation Slides
 
Web Design Proposal Powerpoint Presentation Slides
Web Design Proposal Powerpoint Presentation SlidesWeb Design Proposal Powerpoint Presentation Slides
Web Design Proposal Powerpoint Presentation Slides
 
Karina-Sotnik.pdf
Karina-Sotnik.pdfKarina-Sotnik.pdf
Karina-Sotnik.pdf
 
Project Proposal PowerPoint Presentation Slides
Project Proposal PowerPoint Presentation Slides Project Proposal PowerPoint Presentation Slides
Project Proposal PowerPoint Presentation Slides
 
Project Proposal Powerpoint Presentation Slides
Project Proposal Powerpoint Presentation SlidesProject Proposal Powerpoint Presentation Slides
Project Proposal Powerpoint Presentation Slides
 
Site search-bronto
Site search-brontoSite search-bronto
Site search-bronto
 
Design Thinking Project Template
Design Thinking Project TemplateDesign Thinking Project Template
Design Thinking Project Template
 
Speaker Proposal Template PowerPoint Presentation Slides
Speaker Proposal Template PowerPoint Presentation SlidesSpeaker Proposal Template PowerPoint Presentation Slides
Speaker Proposal Template PowerPoint Presentation Slides
 
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
 
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
Thebeststartuppitchdeckhowtopresenttoangelsvcs 130706124526-phpapp01
 
Forget your feelings: How to actually quantify your buyer personas - SaaSFest...
Forget your feelings: How to actually quantify your buyer personas - SaaSFest...Forget your feelings: How to actually quantify your buyer personas - SaaSFest...
Forget your feelings: How to actually quantify your buyer personas - SaaSFest...
 
Winning your Customers Minds, Hearts and Wallets - Russell Biggarts presentation
Winning your Customers Minds, Hearts and Wallets - Russell Biggarts presentationWinning your Customers Minds, Hearts and Wallets - Russell Biggarts presentation
Winning your Customers Minds, Hearts and Wallets - Russell Biggarts presentation
 
SaaS in Asia Pacific
SaaS in Asia PacificSaaS in Asia Pacific
SaaS in Asia Pacific
 
Hacking Freelance: Creating and Sustaining Your Freelance Career
Hacking Freelance: Creating and Sustaining Your Freelance CareerHacking Freelance: Creating and Sustaining Your Freelance Career
Hacking Freelance: Creating and Sustaining Your Freelance Career
 
Are you prepared for international franchising?
Are you prepared for international franchising? Are you prepared for international franchising?
Are you prepared for international franchising?
 

More from mydrynan

CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
mydrynan
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
mydrynan
 
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
CSI Paper Grading Rubric- (worth a possible 100 points)   .docxCSI Paper Grading Rubric- (worth a possible 100 points)   .docx
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
mydrynan
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
mydrynan
 
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxCSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
mydrynan
 
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018  Ho.docxCSE422 Section 002 – Computer Networking Fall 2018  Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
mydrynan
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docx
mydrynan
 
CSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxCSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docx
mydrynan
 
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
mydrynan
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
mydrynan
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
mydrynan
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
mydrynan
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
mydrynan
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
mydrynan
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
mydrynan
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
mydrynan
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
mydrynan
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
mydrynan
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
mydrynan
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
mydrynan
 

More from mydrynan (20)

CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docxCSIA 413 Cybersecurity Policy, Plans, and Programs.docx
CSIA 413 Cybersecurity Policy, Plans, and Programs.docx
 
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docxCSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
CSIS 100CSIS 100 - Discussion Board Topic #1One of the object.docx
 
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
CSI Paper Grading Rubric- (worth a possible 100 points)   .docxCSI Paper Grading Rubric- (worth a possible 100 points)   .docx
CSI Paper Grading Rubric- (worth a possible 100 points) .docx
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
 
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docxCSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
CSI 170 Week 3 AssingmentAssignment 1 Cyber Computer CrimeAss.docx
 
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018  Ho.docxCSE422 Section 002 – Computer Networking Fall 2018  Ho.docx
CSE422 Section 002 – Computer Networking Fall 2018 Ho.docx
 
CSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docxCSCI  132  Practical  Unix  and  Programming   .docx
CSCI  132  Practical  Unix  and  Programming   .docx
 
CSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docxCSCI 714 Software Project Planning and EstimationLec.docx
CSCI 714 Software Project Planning and EstimationLec.docx
 
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docxCSCI 561Research Paper Topic Proposal and Outline Instructions.docx
CSCI 561Research Paper Topic Proposal and Outline Instructions.docx
 
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docxCSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
CSCI 561 DB Standardized Rubric50 PointsCriteriaLevels of .docx
 
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docxCryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
CryptographyLesson 10© Copyright 2012-2013 (ISC)², Inc. Al.docx
 
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docxCSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
CSCI 352 - Digital Forensics Assignment #1 Spring 2020 .docx
 
CSCE 1040 Homework 2 For this assignment we are going to .docx
CSCE 1040 Homework 2  For this assignment we are going to .docxCSCE 1040 Homework 2  For this assignment we are going to .docx
CSCE 1040 Homework 2 For this assignment we are going to .docx
 
CSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docxCSCE509–Spring2019Assignment3updated01May19DU.docx
CSCE509–Spring2019Assignment3updated01May19DU.docx
 
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docxCSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
CSCI 2033 Elementary Computational Linear Algebra(Spring 20.docx
 
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docxCSCE 3110 Data Structures & Algorithms Summer 2019   1 of .docx
CSCE 3110 Data Structures & Algorithms Summer 2019 1 of .docx
 
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docxCSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
CSCI 340 Final Group ProjectNatalie Warden, Arturo Gonzalez, R.docx
 
CSC-321 Final Writing Assignment In this assignment, you .docx
CSC-321 Final Writing Assignment  In this assignment, you .docxCSC-321 Final Writing Assignment  In this assignment, you .docx
CSC-321 Final Writing Assignment In this assignment, you .docx
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docxCSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
CSc3320 Assignment 6 Due on 24th April, 2013 Socket programming .docx
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Critic’s Notebook What to Look for at the RestaurantBasics❏.docx

  • 1. Critic’s Notebook: What to Look for at the Restaurant Basics ❏ Name of restaurant ❏ Location ❏ Phone number ❏ Genre ❏ Neighborhood Large-scale physical detail ❏ Parking ❏ View from outside ❏ First impressions ❏ Number of rooms ❏ Number of tables, spacing between tables
  • 3. ❏ When first opened? ❏ Under what circumstances? ❏ Since then? ❏ Owner ❏ Manager ❏ Chef Menu ❏ What’s it look like? ❏ Easy to understand? ❏ Range of choices? ❏ Range in cost? ❏ Comparisons to other local restaurants ❏
  • 4. Prices? ❏ Reasonable? Quality of food (repeat for each dish) ❏ Physical description (moist, flakey, peppery, mushy) ❏ Serving size (large, small, etc.)? ❏ Speed prepared? Service ❏ Reservations ❏ Waiting time ❏ Waitresses/Waiters ❏ Friendly? ❏ Quick?
  • 5. ❏ Number of table visits Little details that count ❏ Web page ❏ Hours ❏ Dress code ❏ Credit cards Restaurant Review Rubric Parfait “Publish this on Page 1 of the food section!” Tres bien “Publish this inside the food section!” Petit problème “Revise and we’ll talk later.” Grande problème “Need to visit the restaurant again?” This review, so polished that it reads as if it were clipped from a top-notch publication, does most or all of the following: ❏
  • 6. Fairly but critically evaluates service, decor, food, and so forth; offers a developed, firm, convincing point of view. ❏ Artfully weaves in a theme and/or the story of the restaurant, its neighborhood, owners or chefs. ❏ Employs an interesting hook, develops a middle section and comes to a sense of closure; compels readers to continue throughout. ❏ Offers showing-not-telling evidence to support all claims; helps us see and taste food and experience other aspects of the meal; uses no clichés. ❏ Shows few errors, if any, in the conventions of written English. ❏ Shows control of language to create a consistent voice from beginning to end. ❏ Shows flair, style, grace and/or pizzazz. This review, although impressive, lacks the impact of a Parfait review. It does most or all of the following: ❏ Fairly but critically evaluates service, decor, food, and so forth; offers a developed, firm, convincing point of view. ❏ Develops a theme or tell a story related to the restaurant.
  • 7. ❏ Employs an interesting hook, develops a middle section and comes to a sense of closure; compels readers to continue throughout, although to a lesser degree than a better review. ❏ Offers showing-not-telling evidence to support claims; may slip into one or two clichés. ❏ Shows few errors, if any, in the conventions of written English. ❏ Shows control of language to create a consistent voice that flows smoothly from beginning to end. ❏ Shows some flair, style, grace and/or pizzazz. This review reads more like a class project than a professional review. While adequately written, it lacks the impact of a better story. This review does most or all of the following: ❏ Shows observation and analysis of aspects of the restaurant and develops a point of view about those aspects. ❏ Indicates an awareness of the restaurant’s place in its neighborhood or genre; alternately, begins to develop a theme or tell a story but follow-through is flawed. ❏ Employs a hook, develops a middle and comes to some sense of
  • 8. closure, but readers’ motivation to continue wavers. ❏ Offers showing-not-telling evidence for most claims; might slip into clichés in places. ❏ May show more than a few errors in the conventions of written English. ❏ Has little spark. This review doesn’t meet the requirements of the assignment. It not only reads like a class assignment but is flawed in several noticeable and significant ways. A review in this category: ❏ May demonstrate that the writer has observed and thought a little about some aspects of the restaurant and developed a point of view regarding some of those aspects. ❏ Indicates a vague awareness of the restaurant’s place in its neighborhood or among its peers. ❏ Shows only a semblance of a beginning, middle and end. ❏ Offers only marginally convincing evidence for some claims; tells rather than shows; might routinely offer clichés. ❏ Includes many errors in the conventions of written English. ❏
  • 9. Spark? What’s that? © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco at-a-glance Q4 FY18 Revenue: $12.8B, $9.7B Products, $3.2B Services FY18 Revenue: $49.3B, $36.7B Products, $12.6B Services (Non-GAAP) $6.3B Annualized R&D ~72,000 employees 300,000 partners; 62,000 channel partners 480 global sites doing business in 165+ countries More than 19,000 patents 26,000 engineers (36% of our workforce) #1 or #2 in most market segments we serve More than 200 acquisitions since 1993 Broad portfolio of integrated products and solutions Other Stats Fiscal Stats
  • 10. Tom Freeman – Systems Engineer Francisco Duran – Account Manager November 2018 The Bridge to Possible Cisco Systems © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Intros • Cisco Overview • Life of an Account Team • Closing Thoughts Agenda © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential About Me: • Graduated from UCSC in Fall 2009 • B.S. in Information Systems Management • Cisco employee for ~10 years • Former president of ISMA (Information Systems Management Association) Professional Experience: • Project Manager: Cross Functional Software Project &
  • 11. Programs • Developer: Web Applications / Mobile • Business Operations Manager: Finance, Staffing, Mlanning, Communications, and Metrics Support • Technical Marketing Engineer: Proof of Concepts, Demos, RFP, Lab Management, Interlocks • Systems Engineer: Commercial Sales, Ent Networking, Data Center, Security, Collaboration Interests • Music, Acoustics, Climbing, Disc Golf, Drumming • Networking, FPS games, LAN parties Tom Freeman © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential About Me: • Graduated from SCU in 1992 • B.S. in Marketing • Cisco employee for ~9 years Professional Experience: • Sales: • AT&T- represented the entire AT&T portfolio • Microsoft - focused solely on Voice Recognition for Contact Centers • Cisco - Commercial Sales, Ent Networking, Data Center, Security, Collaboration * In 2006, took 1 year off from Tech to work as Habitat for Humanity as Donor Relations Manager
  • 12. Interests • Music, Piano, playing with my 2 young kids • Aviation, Sports, and cycling Francisco Duran © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Market Research Web Development Project Management PMO Information Systems Administrator Operations/Finance Event Management Mobile App Development POC Engagement 2014201320122011201020092008 2015 Operations / Chief of Staff
  • 13. 2016 Systems Engineer 2017 2018 PLM / TME Tom’s Journey © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Systems © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential We securely connect everything to make anything possible. Connecting the Unconnected © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential For 30 years, we’ve focused on helping to change the way the
  • 14. world works, lives, plays, and learns. Our vision © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential We create solutions built on intelligent networks that solve our customers’ challenges. Our strategy © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Digital is transforming business. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential And everything we do. Transform processes and business models
  • 15. Empower workforce efficiency and innovation Personalize citizen/customer/ employee experience © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential IDC predicts worldwide spending on digital transformation technologies will expand at a compound annual growth rate (CAGR) of 16.8% through 2019 to more than $2.1 trillion.* In 2019, enterprises will spend to manage digital business *IDC FutureScape: Worldwide IT Industry 2017 Predictions, Doc #US41883016, Nov 2016 $2.1 Trillion The opportunity: Embracing digital business
  • 16. https://www.idc.com/url.do?url=/getdoc.jsp?containerId=US418 83016&term=RnV0dXJlU2NhcGU6IFdvcmxkd2lkZSBJVA==&p osition=21&page=1&perPage=25&id=37be15b0-63e6-4a1b- a6df-134042f5b9f6 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Power a Multicloud world Increased pace of innovation Secure, intelligent platform for digital business Create meaningful experiences Reinvent the network Security is Foundational Unlock the power of data © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 17. Innovation © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Customers rely on cisco for innovation 1999 IP Telephony Patent 2011 ASR 9000 Series (1st Terabit- router) 2013 Network Convergence System (Planet’s Fastest Router) 2014 Application- Centric Infrastructure 2006 TelePresence 1992
  • 18. Groundbreaking Interior Gateway Routing Protocol patent 2008 Collaboration Portfolio 1994 1st major supplier of multiprotocol products awarded ISO 9001 cert. 2009 UCS 1998 1st small office/ home/ telecommuting cable modem 2004 Cisco Carrier Routing System (CRS-1) 1986
  • 19. 1st multi-protocol router, the Advanced Gateway Server 2014 Advanced Malware Protection (AMP) Everywhere 1989 Border Gateway Protocol (BGP) for Service Providers 2005 1st Multiservice Firewall (ASA) 2016 Tetration Analytics 2017 Cisco Spark Board Network. Intuitive. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Build
  • 20. Our innovation ecosystem Co-develop PartnerInvest Buy © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Growth Strategy for Innovation • $6B Annual R&D Spend • 26K+ Engineers • 205 Acquisitions • 300K+ Partners • $250-$300M annually • 120+ Companies • 45 LP positions in 27 countries Co-develop Build Buy Partner Invest © 2018 Cisco and/or its affiliates. All rights reserved. Cisco
  • 21. Confidential Build 19K Patents 26K+ Engineers $6.3B Annual R&D spend Internal Start-ups © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Buy 205 Acquisitions Meraki © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Partner
  • 22. 300K+ Strategic Partners © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Invest $2B Fund 120+ Companies 45 Funds in 27 countries Invest $200 to $300 million annually © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Co-develop Alliance Partners 2,500 Customers 40 Solution
  • 23. s10 Innovation Centers © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential FY18 financials $46.5b Total cash and investments $36.7b Product revenue $12.6b Services revenue $49B*
  • 24. Revenue *Non-GAAP Rev. GAAP revenue $49B Total $36.7B Products $12.6B Services Q4 FY18 financials $12.8B Revenue $9.7B Product revenue $3.2B Services revenue Total cash and investments
  • 25. $46.5B © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Q4 FY18 revenue highlights Y/Y% Change Services 3% Infrastructure platforms 7% Applications 10% Security 12% Other products (18%) Total Cisco $M
  • 26. 3,202 7,443 1,339 627 232 12,844 6% Recurring revenue 32% (+1 pts y/y) © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Revenue by geography: Q4 FY18 Americas $7.6B EMEA
  • 27. $3.2B APJC $2.1B Total Q4 FY18 $12.8B Total revenues do not add up due to rounding. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Market leadership matters #1 Access routing 79% #1 Telepresence
  • 28. 55% #1 Wireless LAN 44% #1 Campus switching (managed) 58% #1 SP core + edge routing 41% #1 SaaS web conferencing
  • 30. #1 Voice 43% © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Partners © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Our heritage, their confidence Leading market transitions together © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 31. Digital Network Architecture 1993 2006 2009 2014 2017 1999 2008 2012 2016 Integrated Security Software Defined Networking Internet of Things Unified Computing Systems
  • 32. Unified Communications Video/Telepresence VoIP Switching © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Partner routes to market Resale Ecosystem Designed-inProvider Marketplace © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reinvent our partners’ go-to-market
  • 33. Change how we position Setting expectations Activate, adopt, expand Change how we grow New consumption models Change how we transact © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Partner ecosystem Customer value Consultant ISVIntegrator TechnologyDistributor
  • 34. Reseller Cloud builder Service provider © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Corporate social responsibility © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A corporate social responsibility leader
  • 35. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Ranked #1 most sustainable company As ranked by recent Barron’s analysis We rank No. 1 among all U.S. public companies, after reducing our greenhouse-gas emissions by 41% since 2007 and meeting our goal of getting 80% of our electricity from renewable sources. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Enabling people to reach their full potential in a digital economy. Advancing environmentally sustainable growth in a
  • 36. digital economy. People Society Planet We accelerate global problem solving through our technology and expertise to positively impact people, society, and the planet. Cisco corporate social responsibility Partnering to scale inclusive social and economic impact in countries around the world. Ethical conduct Our people Building skills & entrepreneurship Building a digital foundation Human rights Responsible sourcing & manufacturing Energy & greenhouse gas reduction Product end-of-life
  • 37. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential FY17 highlights: our CSR impact Hours of employee volunteering – the equivalent of over 40 years! Company-wide donations (cash, product, and in-kind) $355M Students developed skills through Cisco Networking Academy
  • 38. 1.3M -60% Reduction in scope 1 and 2 GHG emissions by 2022 154M People directly benefited from our cash grant investments to nonprofits 358K © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Our CSR goals 80% Achieve 80% employee
  • 39. engagement (volunteering and donations) by 2020 Reach 2 million Cisco Networking Academy students per year by 2021 2M -34% Avoid one million ton cumulative of supply chain greenhouse gas emissions by 2020 1B Positively impact one billion people by 2025
  • 40. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential People & culture © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Culture and employees are our competitive advantage Corporate Functions 19% Services 20% Engineering
  • 41. 35% Sales 26% 74K employees 480 offices © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Our People Deal is the culture we all want and our business needs for success. It’s our unique culture of speed, agility, innovation, customer focus, collaboration and doing good for the world. It’s how, together, we connect everything, innovate everywhere, and benefit everyone.
  • 42. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Our Guiding Principles GIVE Your Best TAKE Accountability Show that desire to be at your best, connect with others to share quickly with whoever needs it; open your mind to ideas from everywhere and anywhere - and use them to build on the possibilities to pour a little drop of love into our customers’ worlds. Whatever comes your way, understand it and be personally accountable for its success. Assume the answer’s “yes” and that you don’t need to wait in line for permission. Check the data but don’t let that slow down taking responsibility. And ... deliver. GIVE Your Ego The Day Off TAKE Difference To Heart It’s the best solution our customers need, not the best-protected Cisco turf, so support that solution,
  • 43. whatever the background of the person or team who came up with it. Have the debate and have a backbone. Make your point, then commit to what’s been agreed and deliver it with agility and pace. We become bigger as individuals and more powerful as a collective when we respect and value what makes us so special - our unique, personal differences. Inclusion will always beat exclusion. GIVE Something Of Yourself TAKE A Bold Step A simple smile or “hi” every day is worth its weight in gold, so don’t hide it away. Show care and consideration to your colleagues, our customers, our communities, our partners and the world we all share. Be worthy of trust. Be an inspiration. Be delightful to everyone. Even if you don’t like them. Whatever your position, show leadership and courage when it comes to innovating and disrupting. If it doesn’t feel safe, be secure in the knowledge that shooting for the stars will always be a part of who we are. Together we can figure out how to get there so let’s dream big.
  • 44. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 consecutive years on the Best Companies to Work For list. See more awards: weare.cisco.com/awards Great place to work Top 20 Global Rankings Latin America (#2) Singapore (#2) Portugal (#2) Peru (#2) Poland (#2) China (#3) Australia (#3)
  • 45. Europe (#3) Ireland (#3) Costa Rica (#3) United Kingdom (#4) Netherlands (#5) Asia (#5) #1 Global Rankings Italy Spain Japan Switzerland United States #1 Most sustainable company by Barron’s #3 Best place for giving back Poland Mexico © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 46. Life of an Account Team © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Sales Organization Systems Engineer Manager Systems Engineers Regional Manager Account Managers Area VP
  • 47. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Systems EngineerAccount Manager Customer Technical Details Knowledge SharingPartnership Strategy © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Specialists Consulting Systems Engineer Product Sales Specialist
  • 48. Client Services Manager Partner Account Manager Domain Specific Account Team Value-add Services (deployment, survey, etc..) Partner/Resale Strategy © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Territory Sales SEAM
  • 49. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Select Sales SEAM © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Account Team Role Represent the Cisco portfolio Own engagements from a business & technical perspective Embody Cisco culture & values © 2017 Cisco and/or its affiliates. All rights reserved. Cisco
  • 50. Confidential Cisco Portfolio DatacenterEnterprise Networking Security Collaboration Assure © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Meraki Cloud Managed Networking WebEx Share Simple Screen Sharing
  • 51. HyperFlex Hyperconverged Infrastructure © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CloudCenter Multi-Cloud Management Viptela Software Defined WAN Stealthwatch Machine Learning Based Threat Detection
  • 52. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Digital Network Architecture (DNA) © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Closing Thoughts © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Internships – The earlier the better • Educational focus: • Product development processes • Software development
  • 53. • Supply chain management • Technology classes that interest you • Stay up on industry trends: • Blogs, News articles, Webinars/Seminars, Reddit • Participate in local events and organizations e.g. ISMA, Meetups, etc. • Develop yourself through personal projects Be Relevant © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Understand the interview process • Practice • Be yourself, honesty is critical • Potential is everything when evaluating graduates • NO FEAR !! Interviewing
  • 54. * | Styx Review | January 23, 2013 | Confidential – Internal Only FROM THE PS/2 TO THE SMARTPHONE, A PERSPECTIVE OF THE COMPUTING REVOLUTION FROM THE TRENCHES Sam Huynh Principal Member of Technical Staff November 16, 2017 AgendaWho am I? Introduction to AMDMy role inside AMDFrom the PS/2 to the smartphone, a perspective of the computing revolution from the trenchesQ and A * *
  • 55. Who am I?Born in Saigon (now known as Ho Chi Minh City), Vietnam at the end of the Vietnam War.Family immigrated to Seattle, Washington after the Vietnam WarGrew up in Seattle and eventually attended the University of WashingtonBSEE ’94, MSEE ‘96 and Ph.D. EE ’99Relocated to Mountain View, CA in ‘98 and now live in Santa Cruz, CAThree patents (ATI/AMD)Dynamic impedance compensation circuit and methodBit deskewing IO method and systemMethods and apparatus for transmitting and receiving data signals * * Career Journey * * Cascade Design Automation Introduction to AMDAdvanced Micro Devices (AMD), Inc was
  • 56. founded on May 1, 1969 and is based in Sunnyvale, CA. The company designs, develops, and sells microprocessor products, such as central processing units (CPU), accelerated processing units (APU), and graphics processing units (GPU) for servers, desktop PCs, and mobile devices. Its microprocessors for server platforms include AMD Opteron 6000, 4000, and 3000 series processors; APUs for mobile PC platforms consist of performance mainstream AMD A-Series APU, the AMD E- Series APU for everyday performance, the AMD C-Series APU for HD Internet experiences in small form factors, and the AMD Z-Series APU for Windows-based tablets; CPUs for mobile PC platforms comprise the AMD Phenom II mobile processor, AMD Turion X2 mobile processor, AMD Turion II mobile processor, AMD Turion II ultra mobile processor, and AMD Athlon II processor. Discreet graphics solutions include Radeon and Radeon HD seriesAMD controller hub-based chipsets for its APUs; and graphics, video, and multimedia products for use in desktop and notebook computers * * World wide locations *
  • 57. * Sunnyvale, CA Austin, TX Orlando, FL Toronto, Ontario Boston, MA Beijing, China Shanghai, China Bangalore, India Hydrabad, India 9 major design centers world wide Approximately 10,000 employees World wide
  • 58. About AMDThe AMD mission: To be the leading designer and integrator of innovative, tailored technology solutions that empower people to push the boundaries of what is possibleOperations in 31 countries with more than 50 locations, including more than a dozen R&D facilities, nearly two dozen international sales offices, and assembly/test manufacturing facilities in Malaysia and ChinaFortune 500 company2014 revenues of $5.51 billionMain competitors: * * AMD and YOUGreat brands join with AMD to bring their products to lifeTechnology providers you know and trust, such as Acer, Apple, Asus, Cisco, Dell, GE, HP, Lenovo, Microsoft, Nintendo, Samsung, Sapphire, Sony, Toshiba, Vizio, and XFX. These leading brands count on AMD to find innovative ways to power the solutions they create for the different ways you work and play with technology in your every day life.Named Top 100 best corporate citizens of 2013 by the Corporate Responsibility (CR) MagazineInnovation and technology are what we do, but responsibility is who we are. AMD was founded on the belief
  • 59. that if you put people first, products and profits will follow. Today we call this culture The AMD Way. It means doing business in a responsible way, caring for the environment and contributing to our communities. * * AMD Time line (1969 – 2010) * * AMD Founded 5/1/1969 1970 1980 1990 2000 2010 ATI acquires ArtX in 2000 AMD acquires ATI in 2006 AMD signs on as second source
  • 60. for x86 in 1982 AMD introduced K5; split with Intel in 1996 Athlon 64 Introduced in 2003 ATI Founded In 1985 ATI introduced Radeon in 2000 GameCube In 2001 Wii in 2006 Xbox 360 in 2005 AMD was founded in 1969 by a group of former executives from Fairchild Semiconductors. AMD became a fabless semiconductor company in 2009 with the spin off of foundry operations to become Global Foundries. Dual core 2005
  • 61. AMD Time line (2010 – Present) * * 2010 2015 AMD introduce APUs in 2011 Wii U in 2012 AMD Seattle 64 bit ARM sever in 2014 Xbox one/PS4 in 2013 Carrizo introduced in 2015 Radeon HD8000 In 2013 Radeon Fury X In 2015 2016 2017
  • 62. Polaris line June, 2016 Launched in early 2017 Epyc launched in mid 2017 Vega GPU Q3 2017 2018 My role inside AMDResponsible for developing methodologies using next generation technologies (7nm)Our main mission:Convert source code into an actual silicon chipThis process is known as RTL-to-GDSRegister Transfer Level (RTL) is a form of verilog used to describe the chip’s functionalityGraphic Database System (GDS) is the geometrical information released to foundries for silicon manufacturingWork with teams in Austin, Boston, Toronto, and IndiaCreate synergies for cross functional teams and inter disciplines Work with flex timeCycles (CES, E3, back to school, and Christmas) * *
  • 63. RTL-to-GDS * * Input: RTL Synthesis DRC/LVS Floorplanning Place and Route Timing closure Output: GDS to the foundry Converts high level description language into physical gates Organizes blocks based on timing and connectivity Makes the physical connections Design Rule Check (DRC) Layout Versus Schematic (LVS) Meets frequency
  • 64. specs FROM THE PS/2 TO THE SMARTPHONE, A PERSPECTIVE OF THE COMPUTING REVOLUTION FROM THE TRENCHES * * How did we get from… * * $3000 ($6658.79 in 2017 dollars) in 1987 with university student discount ~$600 with 2 year commitment (in 2017) This is how…Demand: Performance, Power, and Price GlobalizationFoundry/circuit technologyElectronic Design Automation (EDA) tools
  • 65. * * Performance, Power and PricePerformanceClock frequencyIPC (Instructions Per Cycle)PowerMaintain a certain level of performance but reduce power consumptionBattery lifePriceLower and keeps getting lower More features * * GlobalizationHow do we improve performance, reduce power, lower cost/price and still make money? Performance and power wide specifically China, India, Brazil, etc…Intellectual competition especially Taiwan, China and IndiaTSMC is the world’s largest independent semiconductor foundry (founded in 1987)Effective “24 hour” operation * *
  • 66. Foundry/Circuit technologyFoundry technologyBipolar junction nmApproximately 428x reduction in approximately 35 yearsCircuit technologySerial Memory * * BJT versus CMOSAdvantages of CMOS over BJTCMOS is a better switchEffective zero static power consumptionHigh packing densitiesRelative easy design, integration and manufacturing process * * Radeon from 2000 - 2017 * *
  • 67. 8086 - APUs * *YearTechnologyVoltageBus widthFreq.808619763000nm> 5V16 bits5MHz – 10MHz28619841500nm5V16 bits8MHz – 20MHz36819911500nm - 800nm5V32 bits20MHz – 40MHz4861993500nm3.3V – 5V32 bits25MHz – 100MHz5x861995350nm3.3V – 3.45V32 bits133MHz – 150MHzK61997350nm2.9V – 3.3V32 bits166MHz – 300MHzAthlon1999250nm – 130nm1.6V – 1.8V32 bits500MHz – 2.33GHzAthlon64 (first dual core)2003130nm – 65nm1.3V – 1.5V64 bits1GHz – 3.2GHzPhenom (2 – 6 cores)200765nm – 45nm1.2V64 bits2GHz – 3.8GHzAPU (2 – 8 cores with GPU)201132nm1.2V64 bits3GHz – 5GHzRyzen (4 – 16 cores)201714nm1.1V64 bits3GHz – 5GHz
  • 68. APUs * * Age of Parallel ComputingSISD = Single Instruction Single Data8086 – 486SIMD = Single Instruction Multiple DataGraphics Processing Units (GPU) – RadeonMISD = Multiple Instruction Single DataNo personal experience with this architectureMIMD = Multiple Instruction Multiple
  • 69. DataMulti-core CPU (Athlon, Phemon, Ryzen, etc…)APU = Accelerated Processing UnitMulit-core CPU + GPU (MIMD + SIMD) * * Parallel versus Serial linksParallel link transmits several streams of data simultaneously along multiple channels (wires, etc…)Pros: Easier to designCons: More pins (more area), limited data rate Serial link transmits a single stream of dataPros: Fewer pins (less area), higher data rateCons: Design complexity * * BUS interfaces (1981 – now) * *StyleBus WidthBit rateISAParallel8 or 168/16/32 Mbytes/sIndustry Standard ArchitectureEISAParallel3233 Mbytes/sExtended ISAVLBParallel32100/133/166/200 Mbytes/sVideo Electronics Standards Association local
  • 70. busPCIParallel32 or 64133/266/533 Mbytes/sPeripheral Component Interconnect AGPParallel322133 Mbytes/sAccelerated Graphics PortATAParallel1616/33/66/100/133 Mbytes/sPC/AT AttachmentUSBSerial11.5/12/480/5000/10000 Mbits/sUniversal Serial BusPCIeSerial1250/500/985/1969 Mbytes/sPCI expressSATASerial11.5/3.0/6.0 Gbits/sSerial ATA
  • 71. DRAMs (Dynamic random access memory) * * HBM 2016 Peak bandwidth = 128GBps DRAM density * * * * High Bandwidth Memory * *
  • 72. AMD Polaris with HBM * * Today’s tools to build tomorrow’s technologiesElectronic Design Automation (EDA) toolsCadence (Virtuoso), Synopsys (PrimeTime), Mentor Graphics (Calibre), etc… Linux (approximately 2003 to present)Enabled cheap PCs (~$2K) to replace specialized expensive servers (~$20K)Get a lot more compute for the same priceMulti-threading (approximately 2007 to present)Took advantage of multiple cores * * All that leads to this… * * CPU Northbridge Southbridge
  • 73. AGP Single core ATA 1994 $2000 ($3376.46 in 2017 dollars) 2017 (< $250 laptop) SDR DRAM KB M USB SATA PCIe PCI VLB Network
  • 74. DDR DRAM KB M other SB Graphics NB CPU (2 - 8 cores) * * 1994 2000 2006
  • 75. 2013 2013 2012 2006 2001 1996 1991 1985 2005 2001 ConsumptionReduced Instruction Set Computing (RISC) versus Complex Instruction Set Computing (CISC)RISC (Alpha, ARM, PowerPC, SPARC) CISC (x86, Motorola 68K)Clock gating/Power gating – stopping the clock/turning off the power when idlingFoundry Technology – reduce static leakage
  • 76. * * ConclusionThe Revolution continuesCompanies that can adapt and evolve continues to survive (AMD)Because you demand more performance, less power, lower pricesThe electronics industry responds with innovations in technologyAnd AMD puts it all together and brings those products to you. * * Q & AOpen forum – questions and answers * * Xantrion: Who We Are, What We Do, and How We Do It Speaker:
  • 77. Diana Lara, Recruiting, Xantrion Inc. © 2010 VMware Inc. All rights reserved © 2010 VMware Inc. All rights reserved ‹#› 1 Introductions SOLUTIONTRACK | VMware vSphere Diana Lara, Recruiting © 2010 VMware Inc. All rights reserved ‹#› 30minutesXantrion: A Managed Service Provider15 minutesA Day in the Life15 minutesWrap-up and Final Q&A Agenda
  • 78. SOLUTIONTRACK | VMware vSphere Resumes Accepted! We’re hiring interns and full-time system administrators who are authorized to work in the US © 2010 VMware Inc. All rights reserved ‹#› 3 SAY Briefly note where you are on the agenda. DO Check to see if there are any questions before moving forward. Xantrion: A Managed Service Provider Xantrion: Who We Are, What We Do, and How We Do It
  • 79. © 2010 VMware Inc. All rights reserved © 2010 VMware Inc. All rights reserved ‹#› 4 What is a SMB and MSP? SOLUTIONTRACK | VMware vSphere SMB = Small to Medium Business Traditionally under 50-100 for “Small”, under 250-500 for “Medium” MSP = Managed Service Provider Providing services for a monthly fee In IT consulting, it’s providing IT support for a monthly contract Contrast this to “T&M” or Time and Materials – you only charge the customer for the hours you put in Monthly contracts are good Us: Recession proof Client: IT budget is fixed
  • 80. © 2010 VMware Inc. All rights reserved ‹#› What Services Do We Provide? SOLUTIONTRACK | VMware vSphere Monthly Ongoing Services The majority of our business is services for which we receive a reliable check each month Resolve computer issues for employees Find parts and order Setup new desktops/laptops/handhelds Troubleshoot things like “my computer is slow” Handle all server-related issues One-time services Revamp network design (when acquiring a new client) High-end projects for companies with in-house IT who have insufficient knowledge/experience
  • 81. © 2010 VMware Inc. All rights reserved ‹#› How We Provide Service: A 4-Tiered Approach SOLUTIONTRACK | VMware vSphere Tier 1: Help Desk Engineers Provide desktop support and act as dispatchers for complex issues Maintain documentation of systems and networks Over 50% of issues are addressed at this tier Tier 2:Associate Consultants Proactive monitoring and maintenance of networks and backups First point of escalation for complex issues Tier 3: Consultants Account managers, maintain strong relationships with clients Plan long-term IT strategy and ensure day-to-day support is
  • 82. smooth Second point of escalation for complex issues Tier 4: Senior Engineers Experts in a particular area (networking, virtualization, mail, etc.) Brought in to manage bring-ups and implementations Final point of escalation for complex issues © 2010 VMware Inc. All rights reserved ‹#› Workflow and Escalation SOLUTIONTRACK | VMware vSphere
  • 83. © 2010 VMware Inc. All rights reserved ‹#› Tools We Use SOLUTIONTRACK | VMware vSphere Remote Support All client servers are remotely accessible, maintenance doesn’t require an on-site presence. Most desktop support is done remotely, minimizing downtime while clients wait for a technician to be dispatched. Network Monitoring Every critical component of client’s network is monitored (servers, firewalls, ISPs, etc.) We know about problems before the client does and can work proactively rather than reactively. Standardization and Virtualization After supporting hundreds of clients over the past 10 years, we know what works best. Easier to support standardized environments. Replace several outdated servers with one robust server machine hosting several virtual servers. Decreases problems related to hardware failure.
  • 84. © 2010 VMware Inc. All rights reserved ‹#› Xantrion Mission SOLUTIONTRACK | VMware vSphere Provide clients with a 5 star experience every time they interact with a Xantrion team member or recommended product Our average customer satisfaction score for 2014 is 4.7/5.0 98% of our clients stay with us year after year © 2010 VMware Inc. All rights reserved ‹#›
  • 85. Xantrion Values SOLUTIONTRACK | VMware vSphere Our clients are our reason for being Without them, we would not exist Our people are our business If we do nothing other than hire right, we will do well by our clients If our people are inspired, they will take the company and it’s community to places we have yet to imagine Our community is our future Our clients, growing businesses, are the key to turning around the US economy We are dedicated to being a spring board for our clients © 2010 VMware Inc. All rights reserved ‹#› Questions? SOLUTIONTRACK | VMware vSphere
  • 86. © 2010 VMware Inc. All rights reserved ‹#› Day in the Life of a Help Desk Administrator Xantrion: Who We Are, What We Do, and How We Do It © 2010 VMware Inc. All rights reserved © 2010 VMware Inc. All rights reserved ‹#› 13 Example Responsibilities SOLUTIONTRACK | VMware vSphere Assist clients with desktop issues Create and manage user accounts
  • 87. Identify and assign appropriate resources for escalated service requests Assist consultants with projects as needed Shadow consultants Learn! © 2010 VMware Inc. All rights reserved ‹#› Xantrion Work Environment SOLUTIONTRACK | VMware vSphere Professional and positive Able to see the impact of your work on a daily basis Fast paced Room to grow Learning oriented and continuously evolving Everyone has a say in what we do and how we do it Team oriented Contribution appreciated and outstanding performance rewarded Work hard, play hard People have the information and tools they need to succeed
  • 88. © 2010 VMware Inc. All rights reserved ‹#› Examples: impact of work on customers Process improvement Training to process to policy and procedure We support clients in teams, answer technical questions for one another, we cover for each other when out, we rotate on call duties, we have each other’s back in general Big on thank you and do things like dinner for 2 or hotel stay for outstanding work We do 1 scheduled company event ea quarter like our Christmas party and a visit to 6 Flags. We also do ad hoc events like A’s games, shuffle board, beers after monthly training. We use state of the art service management and monitoring software. We provide 4 – 6 weeks of initial training and then ongoing coaching and training there after. 15 Questions?
  • 89. SOLUTIONTRACK | VMware vSphere © 2010 VMware Inc. All rights reserved ‹#› Xantrion Summary, Wrap-up, and Q&A Xantrion: Who We Are, What We Do, and How We Do It © 2010 VMware Inc. All rights reserved © 2010 VMware Inc. All rights reserved ‹#› 17 Xantrion Facts SOLUTIONTRACK | VMware vSphere
  • 90. Founded in Oakland, CA in 2000 88% growth between 2006 and 2015 51 person elite technical team 420 servers under management and 5,500 end users supported Premium partner for major vendors such as Microsoft, Dell, Vmware, Citrix, and Iron Mountain Compensation package that includes: 100% of your healthcare premium for you and your family Profit sharing Matching 401K plan Certification reimbursement Monthly in-house training Third party training event each year 17 days PTO © 2010 VMware Inc. All rights reserved ‹#› Xantrion People SOLUTIONTRACK | VMware vSphere Interns and full-time employees
  • 91. US based and authorized to work in the US 90% retention year after year Elite team of professionals 4 year degrees – Information Systems to Film Industry certifications Like people as much as computers Explain technical recommendations in business/layman’s terms Go the extra mile to assist clients Proactive because they own IT Team players Take pride in their work because when done well, IT is a spring board for business “Dave is an EXPERT but he is so humble about it; I have NEVER felt that my questions were in the "Idiot" realm nor has he ever implied that I've overreacted to a situation that was really no big deal. ” © 2010 VMware Inc. All rights reserved ‹#› Xantrion Career Opportunities
  • 92. SOLUTIONTRACK | VMware vSphere Years $47K $65K $80K $95K Profit Sharing, Benefits & Training Positive Computer Experience © 2010 VMware Inc. All rights reserved ‹#› Because we are growing and have a clear cut career ladder, we provide more opportunities than most businesses. Ex = Catherine. Consultant for a year and a half prior to being promoted to Ops mgr. Because we are a consulting company that works with growing
  • 93. businesses we are the perfect place to quickly learn and stay abreast of the latest technology. We implement new systems for a variety of customers on a regular basis which allows us to expand our experience and skill set. Last but not least, you get to work with and learn from some of the best IT pros in the business. 20 Questions? © 2010 VMware Inc. All rights reserved © 2010 VMware Inc. All rights reserved ‹#› 21 Resumes? We’re hiring summer interns and full-time system administrators who are authorized to work in the US
  • 94. © 2010 VMware Inc. All rights reserved © 2010 VMware Inc. All rights reserved ‹#› 22 012345678910Sys AdminNetwork AdminConsultantSr Consultant Ops Mgr Chart1Sys AdminNetwork AdminConsultantSr Consultant Ops Mgr Sys Admin 0 3 6 9 Sheet1Column1Sys Admin0Network Admin3Consultant6Sr Consultant Ops Mgr9To resize chart data range, drag lower right corner of range.
  • 95. information security and compliance case study: managing issues arising from DEVICE PROLIFERATION and adoption of “BRING your own device” policies in Smb Non-profits 1 Device Proliferation Complicates Security and Privacy Tools for unified security management aren’t adequate to enforce the following. Encryption Password policy Inactivity timeout and screen lock Users mix personal and sensitive company data on the same device complicating Legal discovery Remote wipe Ability to attest to a known security state
  • 96. A“bad day” looks like….. A personal MacBook with company e-mail containing sensitive data (donor list / patient information) is lost. A disgruntled employee reports this to: your Board / the Department of Health and Human Services / the San Francisco Business Times. Upon investigation it is discovered: There was no policy prohibiting e-mail on unmanaged devices Your helpdesk set up e-mail on the device The device was not password protected The device was not encrypted The device can not be remotely erased IT had never informed management of the risks of allowing e- mail to synchronize to unmanaged devices Your organization is now publically on the wall of shame at Privacyrights.org The Department of Health and Human Services The Office of the California Attorney General YOU
  • 97. The risk of an incident is very real Target Loss of nearly 110M customer’s payments cards Home Depot 56M customer’s payments cards compromised Anthem Health Insurance Cyber-attack resulting in exposure of over 80M people’s health and SS infomation Thousands of other examples http://www.privacyrights.org/data-breach http://oag.ca.gov/ecrime/databreach/list Legal Mandates to disclose increase the consequences of a privacy breach Department of Health and Human Services HITECH
  • 98. Health Information Technology (HITECH) Act section 13402 HIPAA covered entities Federal Trade Commission FTC 16 C.F.R. Part 318: Health Breach Notification Rule Health Information California Privacy Act: Civil Code 1798.80-1798.84 Broad variety of personal information The California Privacy Act covers a very broad range of personal information Name, Signature, physical characteristics or description Social security number, passport number Driver's license or state identification card number Address, telephone number Insurance policy number Education, employment, employment history Bank account number, credit card number, debit card number Any other financial information Any other medical information Any other health insurance information Does not include publicly available information that is lawfully
  • 99. made available to the general public from federal, state, or local government records Source: http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnoti ficationrule/breachtool.html Loss and Theft of devices is the biggest cause of incidents Sources of HIPAA Data Breaches 2010 to 2013 and Recommended Controls Hacking / IT Error [PERCENTAGE] Insider Disclosure [PERCENTAGE] Hacking/IT IncidentUnauthorized DisclosureLoss / Improper DisposalTheft5412799321 = Endpoints, encrypt= Servers and Backups, locate in data centers Loss and theft occurs for all types of network equipment, each needs to be properly protected.
  • 100. DesktopLaptopPhone / tabletServerBackup Media23.75181.257328.757 Small to Mid Sized Non-Profits have a particularly big problem Often have sensitive information Donor lists Client information subject to HIPAA controls Client information subject to California Privacy Act Cost considerations prohibit providing a dedicated company phone / tablet. Users are encouraged to use personal devices Cultural norms limit ability of IT to enforce policy Budget and lack of scale exacerbate issues of having a heterogeneous set of devices Don’t do this! Recruit allies who can drive adoption of security best practices CPA’s (auditors) Homogeneity eases HIPAA or SSAE 16 compliance Legal Counsel Inadequate data protection practices increase legal liability
  • 101. Insurance Brokers Inability to attest to certain controls will increase insurance costs or make coverage unavailable IT Consultants Confirm for management the challenges and costs of supporting multiple platforms Help identify and the best tools to manage various platforms Manage Risks Holistically Educate top management Get sign-off on a risk based security and privacy policy. Budget for tools to support new devices Control risks of user ignorance or anger at the firm Educate employees on legal and ethical requirements for protecting sensitive data Encourage good human resource practices to improve employee satisfaction Security requirements Restrict data storage to only those devices that can be physically secured or affirmatively encrypted Restrict uncontrolled devices to streaming only access Reduce Legal Liability Get audited for HIPAA or SSAE 16 compliance Buy Insurance
  • 102. Security leads to Supportability Pushing back against having to support a new device is often a problem IT has to face alone. Security of company and customer data should be an organization wide issue everyone can get behind. By ensuring that everyone is on-board with security you will have the buy-in you need to restrict access to a supportable environment. Appendix Some MDM