дбн в.2.5 23~2010. інженерне обладнання будинків проектування електрообладнан...Sergey Yrievich
ДЕРЖАВНІ БУДІВЕЛЬНІ НОРМИ УКРАЇНИ
Інженерне обладнання будинків і споруд
ПРОЕКТУВАННЯ ЕЛЕКТРООБЛАДНАННЯ ОБ'ЄКТІВ ЦИВІЛЬНОГО ПРИЗНАЧЕННЯ
ДБН В.2.5-23:2010
Київ
Мінрегіонбуд України
2010
This document analyzes startup names from the 2012 MassChallenge competition. It finds that most names were between 5-10 characters long, with the most popular first letters being S, C, P, and T. The majority of winning startups and finalists had names beginning with S. The document provides this analysis to help guide startups in choosing a unique yet effective name.
The CREDE model aims to integrate local culture into lessons to make learning more relevant for students. There are five CREDE standards for teaching methods, including using group projects and giving students options in topics. The standards are: using instructional group activities with students and teachers working together; applying literacy strategies across subjects; connecting lessons to students' lives; maintaining challenging standards; and emphasizing dialogue over lectures.
ICT Development in Kyrgyzstan - Presentation for University of WashingtonBolot Bazarbaev
The document discusses information and communication technology (ICT) development in Kyrgyzstan. It provides an overview of the current situation of ICT and telecommunications in the country, including government policies to support the industry and statistics on mobile, internet, and fixed telephone access. The document outlines Kyrgyzstan's goals to modernize its telecommunications network through projects that expand telephone access to rural areas, install fiber optic infrastructure, and advance the overall development of the technology industry in support of an information society.
The document provides an overview of various aspects of Australian culture including family life, education, social etiquette, business etiquette, and trivia. It notes that most Australian adults have two children, education is highly valued with 11 years of compulsory schooling, and opinions are respected in social conversations. Business etiquette advises avoiding nose blowing or discussions about indigenous people, and gives trivia about Australia's wildlife and population. The full presentation can be downloaded from the provided website.
дбн в.2.5 23~2010. інженерне обладнання будинків проектування електрообладнан...Sergey Yrievich
ДЕРЖАВНІ БУДІВЕЛЬНІ НОРМИ УКРАЇНИ
Інженерне обладнання будинків і споруд
ПРОЕКТУВАННЯ ЕЛЕКТРООБЛАДНАННЯ ОБ'ЄКТІВ ЦИВІЛЬНОГО ПРИЗНАЧЕННЯ
ДБН В.2.5-23:2010
Київ
Мінрегіонбуд України
2010
This document analyzes startup names from the 2012 MassChallenge competition. It finds that most names were between 5-10 characters long, with the most popular first letters being S, C, P, and T. The majority of winning startups and finalists had names beginning with S. The document provides this analysis to help guide startups in choosing a unique yet effective name.
The CREDE model aims to integrate local culture into lessons to make learning more relevant for students. There are five CREDE standards for teaching methods, including using group projects and giving students options in topics. The standards are: using instructional group activities with students and teachers working together; applying literacy strategies across subjects; connecting lessons to students' lives; maintaining challenging standards; and emphasizing dialogue over lectures.
ICT Development in Kyrgyzstan - Presentation for University of WashingtonBolot Bazarbaev
The document discusses information and communication technology (ICT) development in Kyrgyzstan. It provides an overview of the current situation of ICT and telecommunications in the country, including government policies to support the industry and statistics on mobile, internet, and fixed telephone access. The document outlines Kyrgyzstan's goals to modernize its telecommunications network through projects that expand telephone access to rural areas, install fiber optic infrastructure, and advance the overall development of the technology industry in support of an information society.
The document provides an overview of various aspects of Australian culture including family life, education, social etiquette, business etiquette, and trivia. It notes that most Australian adults have two children, education is highly valued with 11 years of compulsory schooling, and opinions are respected in social conversations. Business etiquette advises avoiding nose blowing or discussions about indigenous people, and gives trivia about Australia's wildlife and population. The full presentation can be downloaded from the provided website.
The document discusses problems managing large Postgres installations containing terabytes of data. Key issues include: system resource exhaustion from running out of inodes or file descriptors; slow performance from huge catalogs, statistics collection, and backups that take many hours; and handling VACUUM problems like bloat and transaction wraparound. Solutions proposed include using connection poolers, moving statistics files to RAM, upgrading Postgres versions, and avoiding clusters with over 400,000 tables.
Enhancing the pedagogical value through lecture captureIlkka Kukkonen
This document discusses a project to enhance the pedagogical value of lecture capture. Preliminary results from the project found that students were generally satisfied with lecture capture and found it useful for their studies, especially for making up missed classes and preparing for exams. However, challenges remained in understanding how students used the recordings to support their learning and developing formats to help students engage with the content. The project gathered usage data, discussions, and notes to analyze how lecture capture impacted learning outcomes and student study strategies with the goal of improving the technology's educational value.
This document discusses issues around data ownership, portability, and communal data/identity. It proposes a model where:
1) Users have control over their own identities and data ("Yours"), while also participating in shared communal data and identities ("Ours") through social networks and services.
2) Communal/shared data is stored and accessed through instances of individual identities, so that shared content and transactions are unique to instances of identities.
3) This model aims to balance user control over personal data with enabling shared participation and transactions through communal identities and content. However, it raises questions around whether transactional data derived from shared participation could be considered a shared/communal asset.
This document discusses recent payment card industry hacks, including international and regional incidents from 2012. It provides statistics on the culprits behind these hacks (both external and internal actors), their motives (usually financial gain), and the means used (including social engineering, skimming devices, and hacking servers or databases). Some possible defenses are proposed, such as implementing social engineering tests, enhancing physical security of POS and ATM machines, strengthening server security through testing and audits, and balancing business needs with security.
The document discusses problems managing large Postgres installations containing terabytes of data. Key issues include: system resource exhaustion from running out of inodes or file descriptors; slow performance from huge catalogs, statistics collection, and backups that take many hours; and handling VACUUM problems like bloat and transaction wraparound. Solutions proposed include using connection poolers, moving statistics files to RAM, upgrading Postgres versions, and avoiding clusters with over 400,000 tables.
Enhancing the pedagogical value through lecture captureIlkka Kukkonen
This document discusses a project to enhance the pedagogical value of lecture capture. Preliminary results from the project found that students were generally satisfied with lecture capture and found it useful for their studies, especially for making up missed classes and preparing for exams. However, challenges remained in understanding how students used the recordings to support their learning and developing formats to help students engage with the content. The project gathered usage data, discussions, and notes to analyze how lecture capture impacted learning outcomes and student study strategies with the goal of improving the technology's educational value.
This document discusses issues around data ownership, portability, and communal data/identity. It proposes a model where:
1) Users have control over their own identities and data ("Yours"), while also participating in shared communal data and identities ("Ours") through social networks and services.
2) Communal/shared data is stored and accessed through instances of individual identities, so that shared content and transactions are unique to instances of identities.
3) This model aims to balance user control over personal data with enabling shared participation and transactions through communal identities and content. However, it raises questions around whether transactional data derived from shared participation could be considered a shared/communal asset.
This document discusses recent payment card industry hacks, including international and regional incidents from 2012. It provides statistics on the culprits behind these hacks (both external and internal actors), their motives (usually financial gain), and the means used (including social engineering, skimming devices, and hacking servers or databases). Some possible defenses are proposed, such as implementing social engineering tests, enhancing physical security of POS and ATM machines, strengthening server security through testing and audits, and balancing business needs with security.