This document contains a series of questions about energy levels throughout the day and applications of the concept of diminishing marginal returns. It asks what time of day students feel most/least energetic, what explains their energy levels, and for an example of diminishing returns from their own life. It then lists applications of diminishing returns to various contexts like school, relationships, business, and consumption.
IT is all about data. Are you protecting it? Relentless data growth, virtualization deployments, cloud strategies, consolidation initiatives, and more aggressive service level agreements are just a few of the major trends affecting data protection environments. Data protection is likely to see increased spending in 2013 in the areas of new tools and technologies, particularly those focused on backup and recovery, BC/DR, and regulatory compliance.
The document discusses the iceberg phenomenon, where only 10% of an iceberg is visible above water while 90% is below the surface. It states this also applies to humans, where only a small portion of one's knowledge, skills, attitudes and behaviors are visible to others, while much remains unseen below the surface. It also provides quotes about the importance of maintaining a positive attitude.
Bringing Consistency to Digital Resource EvaluationPaula Weaver
Overview of process used by the Clifton Park-Halfmoon Public Library to create a survey tool for consistent digital resource evaluation. Presented as a flash talk during the SMART Membership Meeting at the 2015 NYLA Conference.
Pivotal CF is a platform as a service solution that allows for rapid application development and scalable deployment. Vblock systems are pre-integrated converged infrastructures from VCE. This document evaluates deploying Pivotal CF on Vblock systems and finds benefits in speed, agility, and predictability through standardized, validated infrastructure and PaaS capabilities that enable automated scaling and updates with high availability. Key components of the solution include Pivotal CF for application services, Vblock systems for flexible, scalable compute and storage, and tools for infrastructure monitoring and provisioning that integrate the two platforms.
This document contains a series of questions about energy levels throughout the day and applications of the concept of diminishing marginal returns. It asks what time of day students feel most/least energetic, what explains their energy levels, and for an example of diminishing returns from their own life. It then lists applications of diminishing returns to various contexts like school, relationships, business, and consumption.
IT is all about data. Are you protecting it? Relentless data growth, virtualization deployments, cloud strategies, consolidation initiatives, and more aggressive service level agreements are just a few of the major trends affecting data protection environments. Data protection is likely to see increased spending in 2013 in the areas of new tools and technologies, particularly those focused on backup and recovery, BC/DR, and regulatory compliance.
The document discusses the iceberg phenomenon, where only 10% of an iceberg is visible above water while 90% is below the surface. It states this also applies to humans, where only a small portion of one's knowledge, skills, attitudes and behaviors are visible to others, while much remains unseen below the surface. It also provides quotes about the importance of maintaining a positive attitude.
Bringing Consistency to Digital Resource EvaluationPaula Weaver
Overview of process used by the Clifton Park-Halfmoon Public Library to create a survey tool for consistent digital resource evaluation. Presented as a flash talk during the SMART Membership Meeting at the 2015 NYLA Conference.
Pivotal CF is a platform as a service solution that allows for rapid application development and scalable deployment. Vblock systems are pre-integrated converged infrastructures from VCE. This document evaluates deploying Pivotal CF on Vblock systems and finds benefits in speed, agility, and predictability through standardized, validated infrastructure and PaaS capabilities that enable automated scaling and updates with high availability. Key components of the solution include Pivotal CF for application services, Vblock systems for flexible, scalable compute and storage, and tools for infrastructure monitoring and provisioning that integrate the two platforms.
This document discusses different methods for allocating scarce resources and poses questions about allocating $15,000 and basketball tournament tickets. It provides a list of 10 allocation methods and asks the reader to choose the best method, provide two reasons for their choice, and note one problem with each of the other methods. It also asks the reader to write a paragraph comparing and contrasting the current organ donation allocation method of first-come, first-served with an auction system and state which they think is the best approach.
To prevent future crashes of the live Confluence environment after releases, performance tests were conducted on a dedicated physical machine configured similarly to the live environment using tests from Atlassian and JMeter. Key performance indicators like 90% line, throughput, and error rate were measured against baselines to ensure the changes would not overload the live system.
This document discusses using bar graphs and pie charts to represent data. It provides examples of a bar graph showing the number of students in different high schools and a pie chart showing the percentage of students with different grades. The document prompts the user to create their own graphs from sample data on high school enrollment and asks questions about interpreting and choosing the appropriate graph type to represent different datasets.
The document provides information on the economy of Zimbabwe and advice for the President of Zimbabwe to improve the economic situation. It notes that Zimbabwe has a population of 13 million and a GDP of $10 billion, giving it a GDP per capita of just $700. Unemployment is at 66%. The advice discusses issues such as high food prices due to price controls, shortages from import bans and land redistribution policies, and lack of money in circulation driving inflation from money printing. Recommendations are made to address unemployment, access to farmland, competition from imports, and increasing the money supply.
World War II involved major combat operations in the European Theater from 1942 to 1945. Allied forces led by generals Montgomery, Clark, Alexander, Patton, Bradley, and Devers battled against Axis forces in campaigns across Western, Central, and Eastern Europe. Through coordinated multi-army group operations, the Allies eventually defeated Nazi Germany in 1945.
This white paper describes the benefits, challenges, and strategies of setting up a government entity-wide enterprise content management (ECM) as a service offering within a governmental central IT organization.
This document examines and compares two social media platforms: Twitter and Facebook. It provides details on the origins, user bases, and key features of each platform. For Twitter, it notes it was created in 2006, currently has over 300 million users, and allows for microblogging and rapid sharing of updates limited to 140 characters. For Facebook, it states it was developed in 2004, now has over 700 million active users, and facilitates connecting with friends and sharing photos, videos, and other content. The document also lists advantages and disadvantages of each platform.
This document discusses how disruptive technology trends in 2013 such as cloud computing, social media, big data, and mobile device adoption will impact information security programs and strategies. It identifies gaps that security teams need to address to keep pace with these innovations, including boosting business and risk management skills, building relationships with middle management, tackling IT supply chain issues, and developing technical action plans around cloud computing, social media, big data, and mobile device competencies. The report provides perspectives from C-level security executives on how to navigate the changing landscape and ensure information security teams have the right skills and strategies to enable innovation over the next year.
The document is written from the perspective of an unborn baby writing letters to their mother over the course of several months of pregnancy. It expresses the baby's happiness at being conceived and growing, but also senses the mother's sadness and worries. It describes feeling confused when the parents argue. At three months, the baby is taken for an abortion procedure and pleads for help as it is ripped apart, crying for its mother to defend it. The document aims to persuade the reader against abortion by sharing an emotional story from the perspective of an unborn child.
Banana test -_english-fun_funky[1].com_Chandan Dubey
A lion, monkey, giraffe, and squirrel see a banana at the top of a tall palm tree and have a contest to see who can get it first. The document is a personality test that asks which animal the reader thinks will grab the banana first, but reveals that bananas don't actually grow on palm trees, suggesting the reader is too stressed.
This document discusses key economic concepts including factors of production, productivity, and the circular flow model. It provides examples and prompts discussion questions to help explain these concepts. Specifically, it defines the four factors of production as land, labor, capital, and entrepreneurship/new ideas. It also discusses how increases in productivity can lead to economic growth and provides examples of how technology, education, cheaper inputs, and globalization can increase productivity.
The big 4 accounting firms - KPMG, PricewaterhouseCoopers, Deloitte, and Ernst & Young - are shrouded in secrecy. They have paid billions in fines for various transgressions but their ownership remains unknown. They provide consulting and auditing services to governments and large corporations around the world but have also been accused of improper and even illegal practices. The document calls for increased public awareness of their activities.
The Global IT Trust Curve survey - Comprehensive Results PresentationEMC
The 2013 IT Trust Curve study surveyed 3,200 respondents to assess their organizations’ IT maturity levels and ability to withstand and quickly recover from disruptive incidents such as unplanned downtime, security breaches, and data loss.
Discover the impact and upside of having high IT Trust maturity, as captured in this overview of the survey results.
More via http://www.emc.com/campaign/it-trust-curve/index.htm
September 2011 Webinar: Beyond Fan PagesResearch Now
This document is a presentation about using social media for consumer insights. It discusses how social media monitoring began with engagement but is now used more for insights and planning. Around 18% of researchers are currently using social media for insights generation. The presentation recommends companies collect relevant social media data, exclude wrong data, have someone review the data in context, properly weight the data, and consider privacy issues when using social media for research. It concludes by introducing the company Conversition, which focuses on providing trustworthy social media research data and insights for agencies and companies.
The document discusses France's influence on the development of rights and liberties in the United States. It notes that France helped inspire the American Revolution and drafting of the Bill of Rights through Enlightenment thinkers like Voltaire, Descartes, and the writers of the Encyclopedia. The document then asks students to analyze how the 1789 Declaration of the Rights of Man exemplifies Enlightenment ideals based on evidence from its first paragraph and cites the philosophical inspiration from Chapter 17 of a text.
This document discusses different methods for allocating scarce resources and poses questions about allocating $15,000 and basketball tournament tickets. It provides a list of 10 allocation methods and asks the reader to choose the best method, provide two reasons for their choice, and note one problem with each of the other methods. It also asks the reader to write a paragraph comparing and contrasting the current organ donation allocation method of first-come, first-served with an auction system and state which they think is the best approach.
To prevent future crashes of the live Confluence environment after releases, performance tests were conducted on a dedicated physical machine configured similarly to the live environment using tests from Atlassian and JMeter. Key performance indicators like 90% line, throughput, and error rate were measured against baselines to ensure the changes would not overload the live system.
This document discusses using bar graphs and pie charts to represent data. It provides examples of a bar graph showing the number of students in different high schools and a pie chart showing the percentage of students with different grades. The document prompts the user to create their own graphs from sample data on high school enrollment and asks questions about interpreting and choosing the appropriate graph type to represent different datasets.
The document provides information on the economy of Zimbabwe and advice for the President of Zimbabwe to improve the economic situation. It notes that Zimbabwe has a population of 13 million and a GDP of $10 billion, giving it a GDP per capita of just $700. Unemployment is at 66%. The advice discusses issues such as high food prices due to price controls, shortages from import bans and land redistribution policies, and lack of money in circulation driving inflation from money printing. Recommendations are made to address unemployment, access to farmland, competition from imports, and increasing the money supply.
World War II involved major combat operations in the European Theater from 1942 to 1945. Allied forces led by generals Montgomery, Clark, Alexander, Patton, Bradley, and Devers battled against Axis forces in campaigns across Western, Central, and Eastern Europe. Through coordinated multi-army group operations, the Allies eventually defeated Nazi Germany in 1945.
This white paper describes the benefits, challenges, and strategies of setting up a government entity-wide enterprise content management (ECM) as a service offering within a governmental central IT organization.
This document examines and compares two social media platforms: Twitter and Facebook. It provides details on the origins, user bases, and key features of each platform. For Twitter, it notes it was created in 2006, currently has over 300 million users, and allows for microblogging and rapid sharing of updates limited to 140 characters. For Facebook, it states it was developed in 2004, now has over 700 million active users, and facilitates connecting with friends and sharing photos, videos, and other content. The document also lists advantages and disadvantages of each platform.
This document discusses how disruptive technology trends in 2013 such as cloud computing, social media, big data, and mobile device adoption will impact information security programs and strategies. It identifies gaps that security teams need to address to keep pace with these innovations, including boosting business and risk management skills, building relationships with middle management, tackling IT supply chain issues, and developing technical action plans around cloud computing, social media, big data, and mobile device competencies. The report provides perspectives from C-level security executives on how to navigate the changing landscape and ensure information security teams have the right skills and strategies to enable innovation over the next year.
The document is written from the perspective of an unborn baby writing letters to their mother over the course of several months of pregnancy. It expresses the baby's happiness at being conceived and growing, but also senses the mother's sadness and worries. It describes feeling confused when the parents argue. At three months, the baby is taken for an abortion procedure and pleads for help as it is ripped apart, crying for its mother to defend it. The document aims to persuade the reader against abortion by sharing an emotional story from the perspective of an unborn child.
Banana test -_english-fun_funky[1].com_Chandan Dubey
A lion, monkey, giraffe, and squirrel see a banana at the top of a tall palm tree and have a contest to see who can get it first. The document is a personality test that asks which animal the reader thinks will grab the banana first, but reveals that bananas don't actually grow on palm trees, suggesting the reader is too stressed.
This document discusses key economic concepts including factors of production, productivity, and the circular flow model. It provides examples and prompts discussion questions to help explain these concepts. Specifically, it defines the four factors of production as land, labor, capital, and entrepreneurship/new ideas. It also discusses how increases in productivity can lead to economic growth and provides examples of how technology, education, cheaper inputs, and globalization can increase productivity.
The big 4 accounting firms - KPMG, PricewaterhouseCoopers, Deloitte, and Ernst & Young - are shrouded in secrecy. They have paid billions in fines for various transgressions but their ownership remains unknown. They provide consulting and auditing services to governments and large corporations around the world but have also been accused of improper and even illegal practices. The document calls for increased public awareness of their activities.
The Global IT Trust Curve survey - Comprehensive Results PresentationEMC
The 2013 IT Trust Curve study surveyed 3,200 respondents to assess their organizations’ IT maturity levels and ability to withstand and quickly recover from disruptive incidents such as unplanned downtime, security breaches, and data loss.
Discover the impact and upside of having high IT Trust maturity, as captured in this overview of the survey results.
More via http://www.emc.com/campaign/it-trust-curve/index.htm
September 2011 Webinar: Beyond Fan PagesResearch Now
This document is a presentation about using social media for consumer insights. It discusses how social media monitoring began with engagement but is now used more for insights and planning. Around 18% of researchers are currently using social media for insights generation. The presentation recommends companies collect relevant social media data, exclude wrong data, have someone review the data in context, properly weight the data, and consider privacy issues when using social media for research. It concludes by introducing the company Conversition, which focuses on providing trustworthy social media research data and insights for agencies and companies.
The document discusses France's influence on the development of rights and liberties in the United States. It notes that France helped inspire the American Revolution and drafting of the Bill of Rights through Enlightenment thinkers like Voltaire, Descartes, and the writers of the Encyclopedia. The document then asks students to analyze how the 1789 Declaration of the Rights of Man exemplifies Enlightenment ideals based on evidence from its first paragraph and cites the philosophical inspiration from Chapter 17 of a text.