Critic’s Notebook: What to Look for at the Restaurant
Basics
❏
Name of restaurant
❏
Location
❏
Phone number
❏
Genre
❏
Neighborhood
Large-scale physical detail
❏
Parking
❏
View from outside
❏
First impressions
❏
Number of rooms
❏
Number of tables, spacing between tables
❏
Waiting area
❏
Restrooms
❏
Atmosphere
❏
Decor
❏
Music/noise
Clientele
❏
Nationality
❏
Class
❏
Age
❏
Gender
❏
Other?
Restaurant’s story
❏
When first opened?
❏
Under what circumstances?
❏
Since then?
❏
Owner
❏
Manager
❏
Chef
Menu
❏
What’s it look like?
❏
Easy to understand?
❏
Range of choices?
❏
Range in cost?
❏
Comparisons to other local restaurants
❏
Prices?
❏
Reasonable?
Quality of food
(repeat for each dish)
❏
Physical description (moist, flakey, peppery, mushy)
❏
Serving size (large, small, etc.)?
❏
Speed prepared?
Service
❏
Reservations
❏
Waiting time
❏
Waitresses/Waiters
❏
Friendly?
❏
Quick?
❏
Number of table visits
Little details that count
❏
Web page
❏
Hours
❏
Dress code
❏
Credit cards
Restaurant Review Rubric
Parfait
“Publish this on Page 1
of the food section!”
Tres bien
“Publish this inside the food section!”
Petit problème
“Revise and we’ll talk later.”
Grande problème
“Need to visit the restaurant again?”
This review, so polished that it reads as if it were clipped from a top-notch publication, does most or all of the following:
❏
Fairly but critically evaluates service, decor, food, and so forth; offers a developed, firm, convincing point of view.
❏
Artfully weaves in a theme and/or the story of the restaurant, its neighborhood, owners or chefs.
❏
Employs an interesting hook, develops a middle section and comes to a sense of closure; compels readers to continue throughout.
❏
Offers showing-not-telling evidence to support all claims; helps us see and taste food and experience other aspects of the meal; uses no clichés.
❏
Shows few errors, if any, in the conventions of written English.
❏
Shows control of language to create a consistent voice from beginning to end.
❏
Shows flair, style, grace and/or pizzazz.
This review, although impressive, lacks the impact of a Parfait review. It does most or all of the following:
❏
Fairly but critically evaluates service, decor, food, and so forth; offers a developed, firm, convincing point of view.
❏
Develops a theme or tell a story related to the restaurant.
❏
Employs an interesting hook, develops a middle section and comes to a sense of closure; compels readers to continue throughout, although to a lesser degree than a better review.
❏
Offers showing-not-telling evidence to support claims; may slip into one or two clichés.
❏
Shows few errors, if any, in the conventions of written English.
❏
Shows control of language to create a consistent voice that flows smoothly from beginning to end.
❏
Shows some flair, style, grace and/or pizzazz.
This review reads more like a class proj.
This PowerPoint helps students to consider the concept of infinity.
Critic’s Notebook What to Look for at the RestaurantBasics❏.docx
1. Critic’s Notebook: What to Look for at the Restaurant
Basics
❏
Name of restaurant
❏
Location
❏
Phone number
❏
Genre
❏
Neighborhood
Large-scale physical detail
❏
Parking
❏
View from outside
❏
First impressions
❏
Number of rooms
❏
Number of tables, spacing between tables
3. ❏
When first opened?
❏
Under what circumstances?
❏
Since then?
❏
Owner
❏
Manager
❏
Chef
Menu
❏
What’s it look like?
❏
Easy to understand?
❏
Range of choices?
❏
Range in cost?
❏
Comparisons to other local restaurants
❏
4. Prices?
❏
Reasonable?
Quality of food
(repeat for each dish)
❏
Physical description (moist, flakey, peppery, mushy)
❏
Serving size (large, small, etc.)?
❏
Speed prepared?
Service
❏
Reservations
❏
Waiting time
❏
Waitresses/Waiters
❏
Friendly?
❏
Quick?
5. ❏
Number of table visits
Little details that count
❏
Web page
❏
Hours
❏
Dress code
❏
Credit cards
Restaurant Review Rubric
Parfait
“Publish this on Page 1
of the food section!”
Tres bien
“Publish this inside the food section!”
Petit problème
“Revise and we’ll talk later.”
Grande problème
“Need to visit the restaurant again?”
This review, so polished that it reads as if it were clipped from
a top-notch publication, does most or all of the following:
❏
6. Fairly but critically evaluates service, decor, food, and so forth;
offers a developed, firm, convincing point of view.
❏
Artfully weaves in a theme and/or the story of the restaurant, its
neighborhood, owners or chefs.
❏
Employs an interesting hook, develops a middle section and
comes to a sense of closure; compels readers to continue
throughout.
❏
Offers showing-not-telling evidence to support all claims; helps
us see and taste food and experience other aspects of the meal;
uses no clichés.
❏
Shows few errors, if any, in the conventions of written English.
❏
Shows control of language to create a consistent voice from
beginning to end.
❏
Shows flair, style, grace and/or pizzazz.
This review, although impressive, lacks the impact of a Parfait
review. It does most or all of the following:
❏
Fairly but critically evaluates service, decor, food, and so forth;
offers a developed, firm, convincing point of view.
❏
Develops a theme or tell a story related to the restaurant.
7. ❏
Employs an interesting hook, develops a middle section and
comes to a sense of closure; compels readers to continue
throughout, although to a lesser degree than a better review.
❏
Offers showing-not-telling evidence to support claims; may slip
into one or two clichés.
❏
Shows few errors, if any, in the conventions of written English.
❏
Shows control of language to create a consistent voice that
flows smoothly from beginning to end.
❏
Shows some flair, style, grace and/or pizzazz.
This review reads more like a class project than a professional
review. While adequately written, it lacks the impact of a better
story. This review does most or all of the following:
❏
Shows observation and analysis of aspects of the restaurant and
develops a point of view about those aspects.
❏
Indicates an awareness of the restaurant’s place in its
neighborhood or genre; alternately, begins to develop a theme
or tell a story but follow-through is flawed.
❏
Employs a hook, develops a middle and comes to some sense of
8. closure, but readers’ motivation to continue wavers.
❏
Offers showing-not-telling evidence for most claims; might slip
into clichés in places.
❏
May show more than a few errors in the conventions of written
English.
❏
Has little spark.
This review doesn’t meet the requirements of the assignment. It
not only reads like a class assignment but is flawed in several
noticeable and significant ways. A review in this category:
❏
May demonstrate that the writer has observed and thought a
little about some aspects of the restaurant and developed a point
of view regarding some of those aspects.
❏
Indicates a vague awareness of the restaurant’s place in its
neighborhood or among its peers.
❏
Shows only a semblance of a beginning, middle and end.
❏
Offers only marginally convincing evidence for some claims;
tells rather than shows; might routinely offer clichés.
❏
Includes many errors in the conventions of written English.
❏
36. digital economy.
People Society Planet
We accelerate global problem solving through our technology
and expertise
to positively impact people, society, and the planet.
Cisco corporate social responsibility
Partnering to scale inclusive social
and economic impact in countries
around the world.
Ethical conduct
Our people
Building skills & entrepreneurship
Building a digital foundation
Human rights
Responsible sourcing & manufacturing
Energy & greenhouse gas reduction
Product end-of-life
39. engagement
(volunteering and
donations) by
2020
Reach 2 million
Cisco Networking
Academy
students per year
by 2021
2M -34%
Avoid one million
ton cumulative of
supply chain
greenhouse gas
emissions by 2020
1B
Positively impact
one billion people
by 2025
43. whatever the background of the person or team
who came up with it. Have the debate and have a
backbone. Make your point, then commit to what’s
been agreed and deliver it with agility and pace.
We become bigger as individuals and more
powerful as a collective when we respect and value
what makes us so special - our unique, personal
differences. Inclusion will always beat exclusion.
GIVE Something Of Yourself TAKE A Bold Step
A simple smile or “hi” every day is worth its weight
in gold, so don’t hide it away. Show care and
consideration to your colleagues, our customers,
our communities, our partners and the world we all
share. Be worthy of trust. Be an inspiration. Be
delightful to everyone. Even if you don’t like them.
Whatever your position, show leadership and
courage when it comes to innovating and
disrupting. If it doesn’t feel safe, be secure in the
knowledge that shooting for the stars will always be
a part of who we are. Together we can figure out
how to get there so let’s dream big.
54. *
| Styx Review | January 23, 2013 | Confidential – Internal
Only
FROM THE PS/2 TO THE SMARTPHONE, A PERSPECTIVE
OF THE COMPUTING REVOLUTION FROM THE TRENCHES
Sam Huynh
Principal Member of Technical Staff
November 16, 2017
AgendaWho am I? Introduction to AMDMy role inside
AMDFrom the PS/2 to the smartphone, a perspective of the
computing revolution from the trenchesQ and A
*
*
55. Who am I?Born in Saigon (now known as Ho Chi Minh City),
Vietnam at the end of the Vietnam War.Family immigrated to
Seattle, Washington after the Vietnam WarGrew up in Seattle
and eventually attended the University of WashingtonBSEE ’94,
MSEE ‘96 and Ph.D. EE ’99Relocated to Mountain View, CA in
‘98 and now live in Santa Cruz, CAThree patents
(ATI/AMD)Dynamic impedance compensation circuit and
methodBit deskewing IO method and systemMethods and
apparatus for transmitting and receiving data signals
*
*
Career Journey
*
*
Cascade
Design
Automation
Introduction to AMDAdvanced Micro Devices (AMD), Inc was
56. founded on May 1, 1969 and is based in Sunnyvale, CA. The
company designs, develops, and sells microprocessor products,
such as central processing units (CPU), accelerated processing
units (APU), and graphics processing units (GPU) for servers,
desktop PCs, and mobile devices. Its microprocessors for server
platforms include AMD Opteron 6000, 4000, and 3000 series
processors; APUs for mobile PC platforms consist of
performance mainstream AMD A-Series APU, the AMD E-
Series APU for everyday performance, the AMD C-Series APU
for HD Internet experiences in small form factors, and the AMD
Z-Series APU for Windows-based tablets; CPUs for mobile PC
platforms comprise the AMD Phenom II mobile processor, AMD
Turion X2 mobile processor, AMD Turion II mobile processor,
AMD Turion II ultra mobile processor, and AMD Athlon II
processor. Discreet graphics solutions include Radeon and
Radeon HD seriesAMD controller hub-based chipsets for its
APUs; and graphics, video, and multimedia products for use in
desktop and notebook computers
*
*
World wide locations
*
57. *
Sunnyvale, CA
Austin, TX
Orlando, FL
Toronto, Ontario
Boston, MA
Beijing, China
Shanghai, China
Bangalore, India
Hydrabad, India
9 major
design
centers
world wide
Approximately
10,000 employees
World wide
58. About AMDThe AMD mission: To be the leading designer and
integrator of innovative, tailored technology solutions that
empower people to push the boundaries of what is
possibleOperations in 31 countries with more than 50 locations,
including more than a dozen R&D facilities, nearly two dozen
international sales offices, and assembly/test manufacturing
facilities in Malaysia and ChinaFortune 500 company2014
revenues of $5.51 billionMain competitors:
*
*
AMD and YOUGreat brands join with AMD to bring their
products to lifeTechnology providers you know and trust, such
as Acer, Apple, Asus, Cisco, Dell, GE, HP, Lenovo, Microsoft,
Nintendo, Samsung, Sapphire, Sony, Toshiba, Vizio, and XFX.
These leading brands count on AMD to find innovative ways to
power the solutions they create for the different ways you work
and play with technology in your every day life.Named Top 100
best corporate citizens of 2013 by the Corporate Responsibility
(CR) MagazineInnovation and technology are what we do, but
responsibility is who we are. AMD was founded on the belief
59. that if you put people first, products and profits will follow.
Today we call this culture The AMD Way. It means doing
business in a responsible way, caring for the environment and
contributing to our communities.
*
*
AMD Time line (1969 – 2010)
*
*
AMD Founded
5/1/1969
1970
1980
1990
2000
2010
ATI acquires
ArtX in 2000
AMD acquires
ATI in 2006
AMD signs on
as second source
60. for x86 in 1982
AMD introduced
K5; split with Intel
in 1996
Athlon 64
Introduced in
2003
ATI Founded
In 1985
ATI introduced
Radeon in 2000
GameCube
In 2001
Wii in
2006
Xbox 360
in 2005
AMD was founded in
1969 by a group of former
executives from Fairchild
Semiconductors.
AMD became a fabless semiconductor
company in 2009 with the spin off of foundry
operations to become Global Foundries.
Dual core 2005
61. AMD Time line (2010 – Present)
*
*
2010
2015
AMD introduce
APUs in 2011
Wii U in
2012
AMD Seattle
64 bit ARM sever
in 2014
Xbox one/PS4
in 2013
Carrizo introduced in 2015
Radeon
HD8000
In 2013
Radeon Fury X
In 2015
2016
2017
62. Polaris line
June, 2016
Launched in early 2017
Epyc launched in mid 2017
Vega GPU Q3 2017
2018
My role inside AMDResponsible for developing methodologies
using next generation technologies (7nm)Our main
mission:Convert source code into an actual silicon chipThis
process is known as RTL-to-GDSRegister Transfer Level (RTL)
is a form of verilog used to describe the chip’s
functionalityGraphic Database System (GDS) is the geometrical
information released to foundries for silicon
manufacturingWork with teams in Austin, Boston, Toronto, and
IndiaCreate synergies for cross functional teams and inter
disciplines Work with flex timeCycles (CES, E3, back to
school, and Christmas)
*
*
63. RTL-to-GDS
*
*
Input: RTL
Synthesis
DRC/LVS
Floorplanning
Place and Route
Timing closure
Output: GDS
to the foundry
Converts high
level description
language into
physical gates
Organizes blocks
based on timing
and connectivity
Makes the physical
connections
Design Rule Check (DRC)
Layout Versus Schematic (LVS)
Meets frequency
64. specs
FROM THE PS/2 TO THE SMARTPHONE, A PERSPECTIVE
OF THE COMPUTING REVOLUTION FROM THE TRENCHES
*
*
How did we get from…
*
*
$3000 ($6658.79 in 2017 dollars) in
1987 with university student
discount
~$600 with 2 year commitment
(in 2017)
This is how…Demand: Performance, Power, and Price
GlobalizationFoundry/circuit technologyElectronic Design
Automation (EDA) tools
65. *
*
Performance, Power and PricePerformanceClock frequencyIPC
(Instructions Per Cycle)PowerMaintain a certain level of
performance but reduce power consumptionBattery
lifePriceLower and keeps getting lower More features
*
*
GlobalizationHow do we improve performance, reduce power,
lower cost/price and still make money? Performance and power
wide specifically China, India, Brazil, etc…Intellectual
competition especially Taiwan, China and IndiaTSMC is the
world’s largest independent semiconductor foundry (founded in
1987)Effective “24 hour” operation
*
*
66. Foundry/Circuit technologyFoundry technologyBipolar junction
nmApproximately 428x
reduction in approximately 35 yearsCircuit technologySerial
Memory
*
*
BJT versus CMOSAdvantages of CMOS over BJTCMOS is a
better switchEffective zero static power consumptionHigh
packing densitiesRelative easy design, integration and
manufacturing process
*
*
Radeon from 2000 - 2017
*
*
68. APUs
*
*
Age of Parallel ComputingSISD = Single Instruction Single
Data8086 – 486SIMD = Single Instruction Multiple
DataGraphics Processing Units (GPU) – RadeonMISD =
Multiple Instruction Single DataNo personal experience with
this architectureMIMD = Multiple Instruction Multiple
69. DataMulti-core CPU (Athlon, Phemon, Ryzen, etc…)APU =
Accelerated Processing UnitMulit-core CPU + GPU (MIMD +
SIMD)
*
*
Parallel versus Serial linksParallel link transmits several
streams of data simultaneously along multiple channels (wires,
etc…)Pros: Easier to designCons: More pins (more area),
limited data rate Serial link transmits a single stream of
dataPros: Fewer pins (less area), higher data rateCons: Design
complexity
*
*
BUS interfaces (1981 – now)
*
*StyleBus WidthBit rateISAParallel8 or 168/16/32
Mbytes/sIndustry Standard ArchitectureEISAParallel3233
Mbytes/sExtended ISAVLBParallel32100/133/166/200
Mbytes/sVideo Electronics Standards Association local
70. busPCIParallel32 or 64133/266/533 Mbytes/sPeripheral
Component Interconnect AGPParallel322133
Mbytes/sAccelerated Graphics
PortATAParallel1616/33/66/100/133 Mbytes/sPC/AT
AttachmentUSBSerial11.5/12/480/5000/10000 Mbits/sUniversal
Serial BusPCIeSerial1250/500/985/1969 Mbytes/sPCI
expressSATASerial11.5/3.0/6.0 Gbits/sSerial ATA
71. DRAMs (Dynamic random access memory)
*
*
HBM 2016 Peak bandwidth = 128GBps
DRAM density
*
*
*
*
High Bandwidth Memory
*
*
72. AMD Polaris with HBM
*
*
Today’s tools to build tomorrow’s technologiesElectronic
Design Automation (EDA) toolsCadence (Virtuoso), Synopsys
(PrimeTime), Mentor Graphics (Calibre), etc… Linux
(approximately 2003 to present)Enabled cheap PCs (~$2K) to
replace specialized expensive servers (~$20K)Get a lot more
compute for the same priceMulti-threading (approximately 2007
to present)Took advantage of multiple cores
*
*
All that leads to this…
*
*
CPU
Northbridge
Southbridge
76. *
*
ConclusionThe Revolution continuesCompanies that can adapt
and evolve continues to survive (AMD)Because you demand
more performance, less power, lower pricesThe electronics
industry responds with innovations in technologyAnd AMD puts
it all together and brings those products to you.
*
*
Q & AOpen forum – questions and answers
*
*
Xantrion:
Who We Are, What We Do, and How We Do It
Speaker:
95. information security and
compliance case study:
managing issues
arising from
DEVICE PROLIFERATION and adoption of “BRING your own
device” policies in Smb Non-profits
1
Device Proliferation Complicates Security and Privacy
Tools for unified security management aren’t adequate to
enforce the following.
Encryption
Password policy
Inactivity timeout and screen lock
Users mix personal and sensitive company data on the same
device complicating
Legal discovery
Remote wipe
Ability to attest to a known security state
96. A“bad day” looks like…..
A personal MacBook with company e-mail containing sensitive
data (donor list / patient information) is lost. A disgruntled
employee reports this to: your Board / the Department of Health
and Human Services / the San Francisco Business Times. Upon
investigation it is discovered:
There was no policy prohibiting e-mail on unmanaged devices
Your helpdesk set up e-mail on the device
The device was not password protected
The device was not encrypted
The device can not be remotely erased
IT had never informed management of the risks of allowing e-
mail to synchronize to unmanaged devices
Your organization is now publically on the wall of shame at
Privacyrights.org
The Department of Health and Human Services
The Office of the California Attorney General
YOU
97. The risk of an incident is very real
Target
Loss of nearly 110M customer’s payments cards
Home Depot
56M customer’s payments cards compromised
Anthem Health Insurance
Cyber-attack resulting in exposure of over 80M people’s health
and SS infomation
Thousands of other examples
http://www.privacyrights.org/data-breach
http://oag.ca.gov/ecrime/databreach/list
Legal Mandates to disclose increase the consequences of a
privacy breach
Department of Health and Human Services HITECH
98. Health Information Technology (HITECH) Act section 13402
HIPAA covered entities
Federal Trade Commission
FTC 16 C.F.R. Part 318: Health Breach Notification Rule
Health Information
California Privacy Act:
Civil Code 1798.80-1798.84
Broad variety of personal information
The California Privacy Act covers a very broad range of
personal information
Name, Signature, physical characteristics or description
Social security number, passport number
Driver's license or state identification card number
Address, telephone number
Insurance policy number
Education, employment, employment history
Bank account number, credit card number, debit card number
Any other financial information
Any other medical information
Any other health insurance information
Does not include publicly available information that is lawfully
99. made available to the general public from federal, state, or local
government records
Source:
http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnoti
ficationrule/breachtool.html
Loss and Theft of devices is the biggest cause of incidents
Sources of HIPAA Data Breaches 2010 to 2013 and
Recommended Controls
Hacking / IT Error
[PERCENTAGE]
Insider Disclosure
[PERCENTAGE]
Hacking/IT IncidentUnauthorized DisclosureLoss / Improper
DisposalTheft5412799321
= Endpoints, encrypt= Servers and Backups, locate in data
centers
Loss and theft occurs for all types of network equipment, each
needs to be properly protected.
100. DesktopLaptopPhone / tabletServerBackup
Media23.75181.257328.757
Small to Mid Sized Non-Profits have a particularly big problem
Often have sensitive information
Donor lists
Client information subject to HIPAA controls
Client information subject to California Privacy Act
Cost considerations prohibit providing a dedicated company
phone / tablet. Users are encouraged to use personal devices
Cultural norms limit ability of IT to enforce policy
Budget and lack of scale exacerbate issues of having a
heterogeneous set of devices
Don’t do this!
Recruit allies who can drive adoption of security best practices
CPA’s (auditors)
Homogeneity eases HIPAA or SSAE 16 compliance
Legal Counsel
Inadequate data protection practices increase legal liability
101. Insurance Brokers
Inability to attest to certain controls will increase insurance
costs or make coverage unavailable
IT Consultants
Confirm for management the challenges and costs of supporting
multiple platforms
Help identify and the best tools to manage various platforms
Manage Risks Holistically
Educate top management
Get sign-off on a risk based security and privacy policy.
Budget for tools to support new devices
Control risks of user ignorance or anger at the firm
Educate employees on legal and ethical requirements for
protecting sensitive data
Encourage good human resource practices to improve employee
satisfaction
Security requirements
Restrict data storage to only those devices that can be
physically secured or affirmatively encrypted
Restrict uncontrolled devices to streaming only access
Reduce Legal Liability
Get audited for HIPAA or SSAE 16 compliance
Buy Insurance
102. Security leads to Supportability
Pushing back against having to support a new device is often a
problem IT has to face alone.
Security of company and customer data should be an
organization wide issue everyone can get behind.
By ensuring that everyone is on-board with security you will
have the buy-in you need to restrict access to a supportable
environment.
Appendix
Some MDM